Immigration

The Pronk Pops Show 881, April 26, 2017, Story 1: District Court Judge in 9th Circuit Commits Judicial Fraud Makes Up A Violation of Law — Trump Executive Order Requires Existing Federal Laws Passed By Congress Be Enforced — Videos — Story 2: Senator Ted Cruz Great Idea For Paying For The Wall — Videos — Story 3: Trump’s Latest Tax Proposal — Good But Not Great — Missed Opportunity To Transition From An Income Tax Based System To A Broad Based Consumption Tax — FairTax or Fair Tax Less — Forget The Republican Establishment Border Adjustment Tax — Videos

Posted on April 26, 2017. Filed under: American History, Banking System, Blogroll, Breaking News, Budgetary Policy, Business, College, Communications, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald Trump, Economics, Education, Elections, Foreign Policy, Free Trade, Government, Health Care Insurance, History, House of Representatives, Illegal Immigration, Illegal Immigration, Immigration, Law, Legal Immigration, Mexico, News, North Korea, Philosophy, Photos, Politics, Polls, President Trump, Radio, Raymond Thomas Pronk, Regulation, Rule of Law, Senate, Social Networking, Tax Policy, Taxation, Taxes, Ted Cruz, United States of America, United States Supreme Court, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 881: April 26, 2017 to be posted as soon as possible

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

 

Image result for Mexico Southern Border Fence

Story 1: District Court Judge in 9th Circuit Commits Judicial Fraud Makes Up A Violation of Law — Trump Executive Order Requires Existing Federal Laws Passed By Congress Be Enforced — Videos — 

Sanctuary Cities, Fed Money, and 9th Circuit Judge Block!

CA Fed Judge: Pres Trump Can’t Punish Sanctuary Cities By Withholding Funds – Tucker Carlson

Judge Blocks Attempts To Withhold Funding For Sanctuary Cities

9th Circuit Court “Going Bananas”

A federal judge suspends Trump’s unenforced ban on funding for sanctuary cities. A showboating federal judge in San Francisco has issued an injunction against President Trump’s executive order cutting off federal funds from so-called sanctuary cities. The ruling distorts the E.O. beyond recognition, accusing the president of usurping legislative authority despite the order’s express adherence to “existing law.” Moreover, undeterred by the inconvenience that the order has not been enforced, the activist court — better to say, the fantasist court — dreams up harms that might befall San Francisco and Santa Clara, the sanctuary jurisdictions behind the suit, if it were enforced. The court thus flouts the standing doctrine, which limits judicial authority to actual controversies involving concrete, non-speculative harms.

Although he vents for 49 pages, Judge William H. Orrick III gives away the game early, on page 4. There, the Obama appointee explains that his ruling is about . . . nothing. That is, Orrick acknowledges that he is adopting the construction of the E.O. urged by the Trump Justice Department, which maintains that the order does nothing more than call for the enforcement of

That is, Orrick acknowledges that he is adopting the construction of the E.O. urged by the Trump Justice Department, which maintains that the order does nothing more than call for the enforcement of already existing law. Although that construction is completely consistent with the E.O. as written, Judge Orrick implausibly describes it as “implausible.”

Since Orrick ultimately agrees with the Trump Justice Department, and since no enforcement action has been taken based on the E.O., why not just dismiss the case? Why the judicial theatrics?

There appear to be two reasons.

The first is Orrick’s patent desire to embarrass the White House, which rolled out the E.O. with great fanfare. The court wants it understood that Trump is a pretender: For all the hullaballoo, the E.O. effectively did nothing. Indeed, Orrick rationalizes his repeated misreadings of what the order actually says by feigning disbelief that what it says could possibly be what it means. Were that the case, he suggests, there would have been no reason to issue the order in the first place.

Thus, taking a page from the activist left-wing judges who invalidated Trump’s “travel ban” orders, Orrick harps on stump speeches by Trump and other administration officials. One wonders how well Barack “If you like your plan, you can keep your plan” Obama would have fared under the judiciary’s new Trump Doctrine: The extravagant political rhetoric by which the incumbent president customarily sells his policies relieves a court of the obligation to grapple with the inevitably more modest legal text of the directives that follow.

Of course, the peer branches of government are supposed to presume each other’s good faith in the absence of a patent violation of the law. But let’s put aside the unseemliness of Orrick’s barely concealed contempt for a moment, because he is also wrong. The proper purpose of an executive order is to direct the operations of the executive branch within the proper bounds of the law. There is, therefore, nothing untoward about an E.O. that directs the president’s subordinates to take enforcement action within the confines of congressional statutes.

In fact, it is welcome.

It is the president’s burden to set federal law-enforcement priorities. After years of Obama’s lax enforcement of immigration law and apathy regarding sanctuary jurisdictions, an E.O. openly manifesting an intent to execute the laws vigorously can have a salutary effect. And indeed, indications are that the cumulative effect of Trump’s more zealous approach to enforcement, of which the sanctuary-city E.O. is just one component, has been a significant reduction in the number of aliens seeking to enter the U.S. illegally.

In any event, eight years of Obama’s phone and pen have made it easy to forget that the president is not supposed to make law, and thus that we should celebrate, not condemn, an E.O. that does not break new legal ground. Orrick, by contrast, proceeds from the flawed premise that if a president is issuing an E.O., it simply must be his purpose to usurp congressional authority. Then he censures Trump for a purported usurpation that is nothing more than a figment of his own very active imagination.

Orrick’s second reason for issuing his Ruling About Nothing is to rationalize what is essentially an advisory opinion. It holds — I know you’ll be shocked to hear this — that if Trump ever did try to cut off funds from sanctuary cities, it would be an epic violation of the Constitution. Given that courts are supposed to refrain from issuing advisory opinions, the Constitution is actually more aggrieved by Orrick than by Trump. * * *

In a nutshell, the court claims that the E.O. is presidential legislation, an unconstitutional violation of the separation of powers. Orrick insists that the E.O. directs the attorney general and the secretary of homeland security to cut off any federal funds that would otherwise go to states and municipalities if they “willfully refuse to comply” with a federal law (Section 1373 of Title 8) that calls for state and local cooperation in enforcing immigration law.

According to Judge Orrick, Trump’s E.O. is heedless of whether Congress has approved any terminations of state funding from federal programs it has enacted. In one of the opinion’s most disingenuous passages, Orrick asserts that the E.O. “directs the Attorney General and the [Homeland Security] Secretary to ensure that ‘sanctuary jurisdictions’ are ‘not eligible to receive’ federal grants.” (Emphasis in original.)

But this is just not true; Orrick has omitted key context from the relevant passage, which actually states that “the Attorney General and the Secretary, in their discretion and to the extent consistent with law, shall ensure that jurisdictions that willfully refuse to comply with 8 U.S.C. 1373 (sanctuary jurisdictions) are not eligible to receive Federal grants.” (Emphasis added.) In plain English, the president has expressly restricted his subordinates to the limits that Congress has enacted. Under Trump’s order, there can be no suspension or denial of funding from a federal program unless congressional statutes authorize it. The president is not engaged in an Obama-

Of course, the peer branches of government are supposed to presume each other’s good faith in the absence of a patent violation of the law. But let’s put aside the unseemliness of Orrick’s barely concealed contempt for a moment, because he is also wrong. The proper purpose of an executive order is to direct the operations of the executive branch within the proper bounds of the law. There is, therefore, nothing untoward about an E.O. that directs the president’s subordinates to take enforcement action within the confines of congressional statutes. In fact, it is welcome.

It is the president’s burden to set federal law-enforcement priorities. After years of Obama’s lax enforcement of immigration law and apathy regarding sanctuary jurisdictions, an E.O. openly manifesting an intent to execute the laws vigorously can have a salutary effect. And indeed, indications are that the cumulative effect of Trump’s more zealous approach to enforcement, of which the sanctuary-city E.O. is just one component, has been a significant reduction in the number of aliens seeking to enter the U.S. illegally. In any event, eight years of Obama’s phone and pen have made it easy to forget that the president is not supposed to make law, and thus that we should celebrate, not condemn, an E.O. that does not break new legal ground. Orrick, by contrast, proceeds from the flawed premise that if a president is issuing an E.O., it simply must be his purpose to usurp congressional authority. Then he censures Trump for a purported usurpation that is nothing more than a figment of his own very active imagination.

Orrick’s second reason for issuing his Ruling About Nothing is to rationalize what is essentially an advisory opinion. It holds — I know you’ll be shocked to hear this — that if Trump ever did try to cut off funds from sanctuary cities, it would be an epic violation of the Constitution. Given that courts are supposed to refrain from issuing advisory opinions, the Constitution is actually more aggrieved by Orrick than by Trump. * * *

In a nutshell, the court claims that the E.O. is presidential legislation, an unconstitutional violation of the separation of powers. Orrick insists that the E.O. directs the attorney general and the secretary of homeland security to cut off any federal funds that would otherwise go to states and municipalities if they “willfully refuse to comply” with a federal law (Section 1373 of Title 8) that calls for state and local cooperation in enforcing immigration law. According to Judge Orrick, Trump’s E.O. is heedless of whether Congress has approved any terminations of state funding from federal programs it has enacted. In one of the opinion’s most disingenuous passages, Orrick asserts that the E.O. “directs the Attorney General and the [Homeland Security] Secretary to ensure that ‘sanctuary jurisdictions’ are ‘not eligible to receive’ federal grants.” (Emphasis in original.)

But this is just not true; Orrick has omitted key context from the relevant passage, which actually states that “the Attorney General and the Secretary, in their discretion and to the extent consistent with law, shall ensure that jurisdictions that willfully refuse to comply with 8 U.S.C. 1373 (sanctuary jurisdictions) are not eligible to receive Federal grants.” (Emphasis added.)

In plain English, the president has expressly restricted his subordinates to the limits that Congress has enacted. Under Trump’s order, there can be no suspension or denial of funding from a federal program unless congressional statutes authorize it. The president is not engaged in an Obama-esque rewrite of federal law; he explicitly ordered his subordinates to follow federal law.

It is not enough to say Orrick mulishly ignores the clear text of the executive order. Again and again, Justice Department lawyers emphasized to the court that Trump’s order explicitly reaffirmed existing law. Orrick refused to listen because, well, what fun would that be? If the president is simply directing that the law be followed, there is no basis for a progressive judge to accuse him of violating the law.

Were he to concede that, how would Orrick then win this month’s Social Justice Warrior in a Robe Award for Telling Donald Trump What For? Orrick can’t confine himself to merely inventing a violation, either, because there is no basis for a lawsuit unless a violation results in real damages. So, the judge also has to fabricate some harm. This takes some doing since, in addition to merely directing that the law be enforced, the Trump administration has not actually taken any action against any sanctuary jurisdiction to this point.

No problem: Orrick theorizes that because San Francisco and Santa Clara receive lots of government funding, Trump’s order afflicts them with “pre-enforcement” anxiety. They quake in fear that their safety-net and services budgets will be slashed. Sanctuary cities? Maybe we should call them snowflake cities. As noted above, there is a transparent agenda behind Orrick’s sleight of hand. The judge is keen to warn the president that, if ever his administration were to deny funds to sanctuary cities, it would violate the Constitution. It is in connection with this advisory opinion that the judge makes the only point worthy of consideration — albeit not in the case before him. Here, it is useful to recall the Supreme Court’s first Obamacare ruling.

Sanctuary cities? Maybe we should call them snowflake cities.

As noted above, there is a transparent agenda behind Orrick’s sleight of hand. The judge is keen to warn the president that, if ever his administration were to deny funds to sanctuary cities, it would violate the Constitution. It is in connection with this advisory opinion that the judge makes the only point worthy of consideration — albeit not in the case before him. Here, it is useful to recall the Supreme Court’s first Obamacare ruling.

Sanctuary cities? Maybe we should call them snowflake cities. As noted above, there is a transparent agenda behind Orrick’s sleight of hand. The judge is keen to warn the president that, if ever his administration were to deny funds to sanctuary cities, it would violate the Constitution. It is in connection with this advisory opinion that the judge makes the only point worthy of consideration — albeit not in the case before him. Here, it is useful to recall the Supreme Court’s first Obamacare ruling.

As noted above, there is a transparent agenda behind Orrick’s sleight of hand. The judge is keen to warn the president that, if ever his administration were to deny funds to sanctuary cities, it would violate the Constitution. It is in connection with this advisory opinion that the judge makes the only point worthy of consideration — albeit not in the case before him. Here, it is useful to recall the Supreme Court’s first Obamacare ruling.

While conservatives inveighed against Chief Justice Roberts’s upholding of the individual mandate, the decision had a silver lining: The majority invalidated Obamacare’s Medicaid mandate, which required the states, as a condition of qualifying for federal Medicaid funding, to enforce the federal government’s generous new Medicaid qualifications. In our system, the states are sovereign — the federal government may not dictate to them in areas of traditional state regulation, nor may it conscript them to enforce federal law. The Supremes therefore explained that state agreements to accept federal funding in return for adopting federal standards (e.g., to accept highway funding in exchange for adopting the federally prescribed 55-mph speed limit) are like contracts. The state must agree to the federal government’s terms. Once such an agreement is reached, the feds may not unilaterally make material changes in the terms, nor may they use their superior bargaining position to extort a state into acceding to onerous new terms in order to get the federal money on which it has come to depend. Whether a particular case involves such an extortion, as opposed to a permissible nudge, depends on the facts. If the feds are too heavy-handed, they run the risk of violating the Tenth Amendment’s federalist division of powers.

Who knew federal judges in ur-statist San Francisco had become such federalists? Orrick contends that if Trump were to cut off funds from sanctuary cities for failure to assist federal immigration-enforcement officials, it would offend the Tenth Amendment. This is highly unlikely. First, let’s remember — though Orrick studiously forgets — that Trump’s order endorses only such stripping of funds as Congress has already approved. Thus, sanctuary jurisdictions would be ill-suited to claim that they’d been sandbagged.

Second, the money likely to be at issue would surely be nothing close to Medicaid funding. Finally, Trump would not be unilaterally rewriting an existing federal–state contract; he’d be calling for the states to follow federal laws that (a) were on the books when the states started taking federal money and (b) pertain to immigration, a legal realm in which the courts have held the federal government is supreme and the states subordinate. Still, all that said, whether any Trump-administration effort to cut off funding would run afoul of the Tenth Amendment would depend on such considerations as how much funding was actually cut; whether Congress had authorized the cut in designing the funding program; whether the funding was tightly related or unrelated to immigration enforcement; and how big a burden it would be for states to comply with federal demands. Those matters will be impossible to evaluate unless and until the administration actually directs a slashing of funds to a sanctuary jurisdiction. If that happens, there will almost certainly be no legal infirmity as long as Trump’s E.O. means what it says — namely, that any funding cuts must be consistent with existing federal law. But it hasn’t happened. And as long as it hasn’t happened, there is no basis for a court to involve itself, much less issue an anticipatory ruling. Such niceties matter only if you’re practicing law, though. Judge Orrick is practicing politics.

Thus, taking a page from the activist left-wing judges who invalidated Trump’s “travel ban” orders, Orrick harps on stump speeches by Trump and other administration officials. One wonders how well Barack “If you like your plan, you can keep your plan” Obama would have fared under the judiciary’s new Trump Doctrine: The extravagant political rhetoric by which the incumbent president customarily sells his policies relieves a court of the obligation to grapple with the inevitably more modest legal text of the directives that follow.

Here, it is useful to recall the Supreme Court’s first Obamacare ruling. While conservatives inveighed against Chief Justice Roberts’s upholding of the individual mandate, the decision had a silver lining: The majority invalidated Obamacare’s Medicaid mandate, which required the states, as a condition of qualifying for federal Medicaid funding, to enforce the federal government’s generous new Medicaid qualifications.

 

In our system, the states are sovereign — the federal government may not dictate to them in areas of traditional state regulation, nor may it conscript them to enforce federal law. The Supremes therefore explained that state agreements to accept federal funding in return for adopting federal standards (e.g., to accept highway funding in exchange for adopting the federally prescribed 55-mph speed limit) are like contracts. The state must agree to the federal government’s terms. Once such an agreement is reached, the feds may not unilaterally make material changes in the terms, nor may they use their superior bargaining position to extort a state into acceding to onerous new terms in order to get the federal money on which it has come to depend. Whether a particular case involves such an extortion, as opposed to a permissible nudge, depends on the facts. If the feds are too heavy-handed, they run the risk of violating the Tenth Amendment’s federalist division of powers.

Who knew federal judges in ur-statist San Francisco had become such federalists?

Orrick contends that if Trump were to cut off funds from sanctuary cities for failure to assist federal immigration-enforcement officials, it would offend the Tenth Amendment. This is highly unlikely. First, let’s remember — though Orrick studiously forgets — that Trump’s order endorses only such stripping of funds as Congress has already approved. Thus, sanctuary jurisdictions would be ill-suited to claim that they’d been sandbagged. Second, the money likely to be at issue would surely be nothing close to Medicaid funding. Finally, Trump would not be unilaterally rewriting an existing federal–state contract; he’d be calling for the states to follow federal laws that (a) were on the books when the states started taking federal money and (b) pertain to immigration, a legal realm in which the courts have held the federal government is supreme and the states subordinate.

Still, all that said, whether any Trump-administration effort to cut off funding would run afoul of the Tenth Amendment would depend on such considerations as how much funding was actually cut; whether Congress had authorized the cut in designing the funding program; whether the funding was tightly related or unrelated to immigration enforcement; and how big a burden it would be for states to comply with federal demands. Those matters will be impossible to evaluate unless and until the administration actually directs a slashing of funds to a sanctuary jurisdiction.

If that happens, there will almost certainly be no legal infirmity as long as Trump’s E.O. means what it says — namely, that any funding cuts must be consistent with existing federal law. But it hasn’t happened. And as long as it hasn’t happened, there is no basis for a court to involve itself, much less issue an anticipatory ruling.

Such niceties matter only if you’re practicing law, though. Judge Orrick is practicing politics.

 http://www.nationalreview.com/article/447058/trump-administration-sanctuary-city-executive-order-activist-liberal-judge-william-h-orrick

Story 2: Senator Ted Cruz Great Idea For Paying For The Wall — Videos —

Image result for United states / Mexico Southern Border Fence barrier or wallImage result for map of miles of United states / Mexico Southern Border Fence barrier or wall

Image result for Mexico Southern Border FenceImage result for Mexico Southern Border FenceImage result for Mexico Southern Border FenceImage result for United states / Mexico Southern Border Fence barrier or wall

Is a wall an expensive, ineffective solution to border security?

How we can build Trump’s border wall

Is Trump’s Wall Possible?

Trump Maintains Mexico Will Pay for Border Wall

Donald Trump’s ‘Simple’ Response to How He Will Get Mexico To Pay for Wall

BREAKING: Trump’s ENTIRE Wall Just Got Paid For By ONE Person & You Won’t Believe Who!

Senator Ted Cruz Has a Great Plan to Pay for the Wall! Watch!

BREAKING Ted Cruz Teams With Trump, Figures Out PERFECT Way To Pay For Border Wall… – News

Inside the Homes of the Biggest Drug Kingpins

How El Chapo Became World’s Biggest Drug Lord

10 Massive TRUMP Walls That Already Exist

Mexico–United States barrier

From Wikipedia, the free encyclopedia

Border fence near El Paso, Texas

Border fence between San Diego‘s border patrol offices in California (left) and Tijuana, Mexico (right)

The Mexico–United States barrier is a series of walls and fences along the Mexico–United States border aimed at preventingillegal crossings from Mexico into the United States and vice versa.[1] The barrier is not one continuous structure, but a grouping of relatively short physical walls, secured in between with a “virtual fence” which includes a system of sensors and cameras monitored by the United States Border Patrol.[2] As of January 2009, U.S. Customs and Border Protection reported that it had more than 580 miles (930 km) of barriers in place.[3]The total length of the continental border is 1,989 miles (3,201 km).

Background

Two men scale the border fence into Mexico near Douglas, Arizona, in 2009

Two men scale the border fence into Mexico near Douglas, Arizona, in 2009

The barriers were built from 1994 as part of three larger “Operations” to taper transportation of illegal drugs manufactured in Latin America and immigration: Operation Gatekeeper in California, Operation Hold-the-Line[4] in Texas, and Operation Safeguard[5] in Arizona.

96.6 per cent of apprehensions by the Border Patrol in 2010 occurred at the southwest border.[6] The number of Border Patrol apprehensions declined 61% from 1,189,000 in 2005 to 723,840 in 2008 to 463,000 in 2010. The decrease in apprehensions may be due to a number of factors including changes in U.S. economic conditions and border enforcement efforts. Border apprehensions in 2010 were at their lowest level since 1972.[6] In March 2017 there were 17,000 apprehensions, which was the fifth month in a row of decline. In December 2016 apprehensions were at 58,478.[7]

The 1,954-mile (3,145 km) border between the United States and Mexico traverses a variety of terrains, including urban areas and deserts. The barrier is located on both urban and uninhabited sections of the border, areas where the most concentrated numbers of illegal crossings and drug trafficking have been observed in the past. These urban areas include San Diego, California and El Paso, Texas. As of August 29, 2008, the U.S. Department of Homeland Security had built 190 miles (310 km) of pedestrian border fence and 154.3 miles (248.3 km) of vehicle border fence, for a total of 344.3 miles (554.1 km) of fence. The completed fence is mainly in New Mexico, Arizona, and California, with construction underway in Texas.[8]

U.S. Customs and Border Protection reported that it had more than 580 miles (930 km) of fence in place by the second week of January 2009.[3] Work is still under way on fence segments in Texas and on the Border Infrastructure System in California.

The border fence is not one continuous structure and is actually a grouping of short physical walls that stop and start, secured in between with “virtual fence” which includes a system of sensors and cameras monitored by Border Patrol Agents.[2]

As a result of the effect of the barrier, there has been a marked increase in the number of people trying to illegally cross the Sonoran Desert and crossing over the Baboquivari Mountain in Arizona.[9] Such illegal immigrants must cross 50 miles (80 km) of inhospitable terrain to reach the first road, which is located in the Tohono O’odhamIndian Reservation.[9][10]

Status

Aerial view of El Paso, Texas and Ciudad Juárez, Chihuahua; the border can clearly be seen as it divides the two cities at night

Aerial view of El Paso, Texas (on the left) and Ciudad Juárez, Chihuahua (on the right), the border can clearly be seen as it divides the two cities at night

The wall in Tijuana, Mexico.

U.S. RepresentativeDuncan Hunter, a Republican from California and the then-chairman of the House Armed Services Committee, proposed a plan to the House on November 3, 2005 calling for the construction of a reinforced fence along the entire United States–Mexican border. This would also have included a 100-yard (91 m) border zone on the U.S. side. On December 15, 2005, Congressman Hunter’s amendment to the Border Protection, Anti-terrorism, and Illegal Immigration Control Act of 2005 (H.R. 4437) passed in the House. This plan called for mandatory fencing along 698 miles (1,123 km) of the 1,954-mile (3,145-km) border.[11] On May 17, 2006 the U.S. Senate proposed with Comprehensive Immigration Reform Act of 2006 (S. 2611) what could be 370 miles (600 km) of triple layered-fencing and a vehicle fence. Although that bill died in committee, eventually the Secure Fence Act of 2006 was passed by Congress and signed by President George W. Bush on October 26, 2006.[12]

The government of Mexico and ministers of several Latin American countries condemned the plans. Rick Perry, governor of Texas, also expressed his opposition saying that instead of closing the border it should be opened more and through technology support legal and safe migration.[13] The barrier expansion was also opposed by a unanimous vote of the Laredo, Texas City Council.[14] Laredo’s Mayor, Raul G. Salinas, was concerned about defending his town’s people by saying that the Bill which included miles of border wall would devastate Laredo. He stated “These are people that are sustaining our economy by forty percent, and I am gonna [sic] close the door on them and put [up] a wall? You don’t do that. It’s like a slap in the face.” He hoped that Congress would revise the Bill to better reflect the realities of life on the border.[15] There are no plans to build border fence in Laredo at this time.[citation needed]However, there is a large Border Patrol presence in Laredo.

Secure Fence Act

H.R. 6061, the “Secure Fence Act of 2006“, was introduced on September 13, 2006. It passed through the U.S. House of Representatives on September 14, 2006 with a vote of 283–138.

On September 29, 2006, by a vote of 80–19 the U.S. Senate confirmed H.R. 6061 authorizing, and partially funding the “possible” construction of 700 miles (1,125 km) of physical fence/barriers along the border. The very broad support implied that many assurances were been made by the Administration—to the Democrats, Mexico, and the pro “Comprehensive immigration reform” minority within the GOP—that Homeland Security would proceed very cautiously. Secretary of Homeland SecurityMichael Chertoff, announced that an eight-month test of the virtual fence he favored would precede any construction of a physical barrier.

On October 26, 2006, President George W. Bush signed H.R. 6061 which was voted upon and passed by the 109th Congress of the United States.[16] The signing of the bill came right after a CNN poll showed that most Americans “prefer the idea of more Border Patrol agents to a 700-mile (1,125-kilometer) fence.”[17] The Department of Homeland Security has a down payment of $1.2 billion marked for border security, but not specifically for the border fence.

As of January 2010, the fence project had been completed from San Diego, California to Yuma, Arizona.[dubious ] From there it continued into Texas and consisted of a fence that was 21 feet (6.4 m) tall and 6 feet (1.8 m) deep in the ground, cemented in a 3-foot (0.91 m)-wide trench with 5000 psi (345 bar; 352 kg/cm²) concrete. There were no fatalities during construction, but there were 4 serious injuries with multiple aggressive acts against building crews. There was one reported shooting with no injury to a crew member in Mexicali region. All fence sections are south of the All-American Canal, and have access roads giving border guards the ability to reach any point easily, including the dunes area where a border agent was killed 3 years before and is now sealed off.

The Republican Party’s 2012 platform stated that “The double-layered fencing on the border that was enacted by Congress in 2006, but never completed, must finally be built.”[18] The Secure Fence Act’s costs were estimated at $6 billion,[19] more than the Customs and Border Protection’s entire annual discretionary budget of $5.6 billion.[20] The Washington Office on Latin America noted on its Border Fact Check site in about the year 2013 that the cost of complying with the Secure Fence Act’s mandate was the reason it had not been completely fulfilled.[21]

Rethinking the expansion

In January 2007 incoming House Majority Leader Steny H. Hoyer (D-MD) announced that Congress would revisit the fence plan, with committee chairs holding up funding until a comprehensive border security plan was presented by the United States Department of Homeland Security. Then the Republican senators from Texas, John Cornyn and Kay Bailey Hutchison, advocated revising the plan, as well.[14]

The REAL ID Act, attached as a rider to a supplemental appropriations bill funding the wars in Iraq and Afghanistan, decreed, “Not withstanding any other provision of law, the Secretary of Homeland Security shall have the authority to waive all legal requirements such Secretary, in such Secretary’s sole discretion, determines necessary to ensure expeditious construction of the barriers and roads.” Secretary Chertoff used his new power to “waive in their entirety” the Endangered Species Act, the Migratory Bird Treaty Act, the National Environmental Policy Act, the Coastal Zone Management Act, the Clean Water Act, the Clean Air Act, and the National Historic Preservation Act to extend triple fencing through the Tijuana River National Estuarine Research Reserve near San Diego.[22] The Real ID Act further stipulates that the Secretary’s decisions are not subject to judicial review, and in December 2005 a federal judge dismissed legal challenges by the Sierra Club, the Audubon Society, and others to Chertoff’s decision.[citation needed]

Secretary Chertoff exercised his waiver authority on April 1, 2008. In June 2008, the U.S. Supreme Court declined to hear the appeal of a lower court ruling upholding the waiver authority in a case filed by the Sierra Club.[23] In September 2008 a federal district court judge in El Paso dismissed a similar lawsuit brought by El Paso County, Texas.[24]

By January 2009, U.S. Customs and Border Protection and Homeland Security had spent $40 million on environmental analysis and mitigation measures aimed at blunting any possible adverse impact that the fence might have on the environment. On January 16, 2009, DHS announced it was pledging an additional $50 million for that purpose, and signed an agreement with the U.S. Department of the Interior for utilization of the additional funding.[25]

Expansion freeze

On March 16, 2010, the Department of Homeland Security announced that there would be a halt to expand the “virtual fence” beyond two pilot projects in Arizona.[26]

Contractor Boeing Corporation had numerous delays and cost overruns. Boeing had initially used police dispatching software that was unable to process all of the information coming from the border. The $50 million of remaining funding would be used for mobile surveillance devices, sensors, and radios to patrol and protect the border. At the time, the Department of Homeland Security had spent $3.4 billion on border fences and had built 640 miles (1,030 km) of fences and barriers as part of the Secure Border Initiative.[26]

Local efforts

In response to a perceived lack of will on the part of the federal government to build a secure border fence, and a lack of state funds, Arizona officials plan to launch a website allowing donors to help fund a state border fence.[citation needed]

Piecemeal fencing has also been established. In 2005, under its president, Ramón H. Dovalina, Laredo Community College, located on the border, obtained a 10-foot fence built by the United States Marine Corps. The structure was not designed as a border barrier per se but was intended to divert smugglers and illegal immigrants to places where the authorities can halt entrance into the United States.[27]

Trump administration

Further information: Executive Order 13767

Donald Trump signing Executive Order 13767

Throughout his 2016 presidential campaign, Donald Trump called for the construction of a much larger and fortified wall along the Mexico–United States border, and claimed Mexico will pay for its construction, estimated at $8 to $12 billion, while others state there are enough uncertainties to drive up the cost between $15 to $25 billion.[28][29][30][31] In January 2017, Mexican President Enrique Peña Nieto said the country would not pay,[32][28] and later compared then President-elect Trump’s rhetoric to the former Dictator of Italy Benito Mussolini.[33] On January 25, 2017, the Trump administration signed a Border Security and Immigration Enforcement Improvements Executive Order, 13767 to commence the building of the border wall.[34]In response, Peña Nieto gave a national televised address confirming they would not pay, adding “Mexico doesn’t believe in walls”, and cancelled a scheduled meeting with Trump at the White House.[35][36]

In March 2017, President Donald Trump submitted a budget amendment for fiscal year (FY) 2017 that included an extra $3 billion for border security and immigration enforcement. Trump’s FY 2018 Budget Blueprint increases discretionary funds for the Department of Homeland Security (DHS) by $2.8 billion (to $44.1 billion). DHS would be the agency in charge of building the border wall.[7]

DHS Secretary John F. Kelly told the Senate Homeland Security and Governmental Affairs Committee during a hearing that the Budget Blueprint “includes $2.6 billion for high-priority border security technology and tactical infrastructure, including funding to plan, design and construct the border wall.” Specific details will come in mid-May 2017, he said.[7]

According to Homeland Preparedness News, “Former members of U.S. Customs and Border Protection downplayed the idea that a wall alone would be enough to strengthen the U.S. southern border in a Senate hearing on [April 4, 2017], framing it as part of a broader strategy.”[37]

One vocal critic of the wall is U.S. Senator Claire McCaskill (D-MO). She said during the hearing that while Americans want a secure border, she has “not met anyone that says the most effective way is to build a wall across the entirety of our southern border. The only one who keeps talking about that is President Trump.”[37]

Controversy

The barrier has been criticized for being easy to get around. Some methods include digging under it (sometimes using complex tunnel systems), climbing the fence (using wire cutters to remove barbed-wire) or locating and digging holes in vulnerable sections of the wall. Many Latin-Americans have also traveled by boat through the Gulf of Mexico or the Pacific Coast.

Divided land

Tribal lands of three indigenous nations would be divided by the proposed border fence.[38][39]

On January 27, 2008, a U.S. Native American human rights delegation, which included Margo Tamez (Lipan Apache-Jumano Apache) and Teresa Leal (Opata-Mayo) reported the removal of the official International Boundary obelisks of 1848 by the U.S. Department of Homeland Security in the Las Mariposas, Sonora-Arizona sector of the Mexico–U.S. border.[40][41] The obelisks were moved southward approximately 20 meters, onto the property of private landowners in Sonora, as part of the larger project of installing the 18-foot (5.5 m) steel barrier wall.[42]

The proposed route for the border fence would divide the campus of the University of Texas at Brownsville into two parts, according to Antonio N. Zavaleta, a vice president of the university.[43] There have been campus protests against the wall by students who feel it will harm their school.[2] In August 2008, UT-Brownsville reached an agreement with the U.S. Department of Homeland Security for the university to construct a portion of the fence across and adjacent to its property. The final agreement, which was filed in federal court on Aug 5 and formally signed by the Texas Southmost College Board of Trustees later that day, ended all court proceedings between UTB/TSC and DHS. On August 20, 2008, the university sent out a request for bids for the construction of a 10-foot (3.0 m) high barrier that incorporates technology security for its segment of the border fence project. The southern perimeter of the UTB/TSC campus will be part of a laboratory for testing new security technology and infrastructure combinations.[44] The border fence segment on the UTB campus was substantially completed by December 2008.[45]

Hidalgo County

In the spring of 2007 more than 25 landowners, including a corporation and a school district, from Hidalgo and Starr County in Texas refused border fence surveys, which would determine what land was eligible for building on, as an act of protest.[46]

In July 2008, Hidalgo County and Hidalgo County Drainage District No. 1 entered into an agreement with the U.S. Department of Homeland Security for the construction of a project that combines the border fence with a levee to control flooding along the Rio Grande. Construction of two of the Hidalgo County fence segments are under way; five more segments are scheduled to be built during the fall of 2008; the Hidalgo County section of the border fence will constitute 22 miles (35 km) of combined fence and levee.[47]

Mexico’s condemnations

Mexico-United States barrier at the pedestrian border crossing in Tijuana

Mexico-United States barrier at the pedestrian border crossing in Tijuana

In 2006, the Mexican government vigorously condemned the Secure Fence act of 2006. Mexico has also urged the U.S. to alter its plans for expanded fences along their shared border, saying that it would damage the environment and harm wildlife.[48]

In June 2007, it was announced that a section of the barrier had been mistakenly built from 1 to 6 feet (2 meters) inside Mexican territory. This will necessitate the section being moved at an estimated cost of over $3 million (U.S.).[49]

In 2012, then presidential candidate of Mexico Enrique Peña Nieto was campaigning in Tijuana at the Playas de Monumental, less than 600 yards (550 m) from the U.S.–Mexico border adjacent to Border Field State Park. In one of his speeches he criticized the U.S. government for building the barriers, and asked for them to be removed. Ultimately, he mocked Ronald Reagan’s “Tear down this wall!” speech from Berlin in 1987.[citation needed]

Migrant deaths

The Wall at the border of Tijuana, Mexico and San Diego. The crosses represent migrants who died in the crossing attempt. Some identified, some not. Surveillance tower in the background.

Between 1994 and 2007, there were around 5,000 Migrant deaths along the Mexico–United States border, according to a document created by the Human Rights National Commission of Mexico, also signed by the American Civil Liberties Union.[50] Between 43 and 61 people died trying to cross the Sonoran Desert from October 2003 to May 2004; three times that of the same period the previous year.[9] In October 2004 the Border Patrol announced that 325 people had died crossing the entire border during the previous 12 months.[51] Between 1998 and 2004, 1,954 persons are officially reported to have died along the US-Mexico border. Since 2004, the bodies of 1,086 migrants have been recovered in the southern Arizona desert.[52]

U.S. Border Patrol Tucson Sector reported on October 15, 2008 that its agents were able to save 443 undocumented immigrants from certain death after being abandoned by their smugglers, during FY 2008, while reducing the number of deaths by 17% from 202 in FY 2007 to 167 in FY 2008. Without the efforts of these agents, hundreds more could have died in the deserts of Arizona.[53] According to the same sector, border enhancements like the wall have allowed the Tucson Sector agents to reduce the number of apprehensions at the borders by 16% compared with fiscal year 2007.[54]

Environmental impact

"Wildlife-friendly" border wall in Brownsville, Texas, which would allow wildlife to cross the border. A young man climbs wall using horizontal beams for foot support.

“Wildlife-friendly” border wall in Brownsville, Texas, which would allow wildlife to cross the border. A young man climbs wall using horizontal beams for foot support.

In April 2008, the Department of Homeland Security announced plans to waive more than 30 environmental and cultural laws to speed construction of the barrier. Despite claims from then Homeland Security Chief Michael Chertoff that the department would minimize the construction’s impact on the environment, critics in Arizona and Texas asserted the fence endangered species and fragile ecosystems along the Rio Grande. Environmentalists expressed concern about butterfly migration corridors and the future of species of local wildcats, the ocelot, the jaguarundi, and the jaguar.[55]

U.S. Customs and Border Protection (CBP) conducted environmental reviews of each pedestrian and vehicle fence segment covered by the waiver, and published the results of this analysis in Environmental Stewardship Plans (ESPs).[56] Although not required by the waiver, CBP has conducted the same level of environmental analysis (in the ESPs) that would have been performed before the waiver (in the “normal” NEPA process) to evaluate potential impacts to sensitive resources in the areas where fence is being constructed.

ESPs completed by CBP contain extremely limited surveys of local wildlife. For example, the ESP for border fence built in the Del Rio Sector included a single survey for wildlife completed in November 2007, and only “3 invertebrates, 1 reptile species, 2 amphibian species, 1 mammal species, and 21 bird species were recorded.” The ESPs then dismiss the potential for most adverse effects on wildlife, based on sweeping generalizations and without any quantitative analysis of the risks posed by border barriers. Approximately 461 acres (187 ha) of vegetation will be cleared along the impact corridor. From the Rio Grande Valley ESP: “The impact corridor avoids known locations of individuals of Walker’s manioc and Zapata bladderpod, but approaches several known locations of Texas ayenia. For this reason, impacts on federally listed plants are anticipated to be short-term, moderate, and adverse.” This excerpt is typical of the ESPs in that the risk to endangered plants is deemed short-term without any quantitative population analysis.[citation needed]

By August 2008, more than 90 percent of the southern border in Arizona and New Mexico had been surveyed. In addition, 80 percent of the California/Mexico border has been surveyed.[8]

See also

https://en.wikipedia.org/wiki/Mexico%E2%80%93United_States_barrier

Story 3: Trump’s Latest Tax Proposal — Good But Not Great — Missed Opportunity To Transition From An Income Tax Based System To A Broad Based Consumption Tax — FairTax or Fair Tax Less — Forget The Republican Establishment Border Adjustment Tax — Videos

Trump announces tax plan coming Wednesday

Trump Tax Plan Cuts Top Rate to 35 PercentBreaking Tonight ,

President Trump Latest News Today 4/26/17 , White House news , trump tax plan

The Lead with Jake Tapper April 26, 2017 – White House Reveals Plan for ‘Biggest Tax Cut in History’

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 878-881

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 878, April 21, 2017, Story 1: French Confirm Killing of Police Officer By Radical Islamic Terrorist Killer, Karim Cheurfi, Connected To Islamic State, — Videos — Story 2: Will Marine Le Pen Win In The First Round of French Presidential Election? First Round –Yes — — Making France Great Again — Second Round –Marine Le Pen May Be First Woman President or Emmannuel Marcon The Youngest — Videos — Story 3: Trump Administration Rolls Out New Tax Reform Plan and House Votes On Repeal and Replace Compromise Bill — By Day 100 — American People Want The FairTax And Full Repeal of Obamacare and Republican Establishment Wants Partial Repeal of Obamacare and Border Adjustment Tax — Stupid Party? — Videos — Story 4: Democrats Want To Shut-down Government Over Trump’s Wall — Republicans Pass Continuing Resolution — Videos

Posted on April 21, 2017. Filed under: American History, Banking System, Blogroll, Breaking News, Budgetary Policy, Communications, Computers, Congress, Corruption, Countries, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Federal Government, Fiscal Policy, Foreign Policy, Free Trade, Government, Health Care, Health Care Insurance, History, House of Representatives, Human, Illegal Immigration, Immigration, Independence, Insurance, Investments, Labor Economics, Law, Legal Immigration, Life, Media, Monetary Policy, News, Philosophy, Photos, Politics, Polls, President Trump, Presidential Appointments, Progressives, Radio, Raymond Thomas Pronk, Regulation, Rule of Law, Tax Policy, Terror, Terrorism, U.S. Negotiations with Islamic Republic of Iran, United States of America, Videos, Wealth, Wisdom | Tags: , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Masked police officers were photographed standing on top of a vehicle on the Champs Elysees following an incident which left one officer deadEmmanuel Macron and Marine Le Pen.Image result for trump omb director mike mulveney

Image result for fairtax

Story 1: French Confirm Killing of Police Officer By Radical Islamic Terrorist Killer, Karim Cheurfi, Connected To Islamic State,  — Videos — 

ISIS Reportedly Claims Responsibility For Paris Attack That Left 1 Officer Dead | TODAY

Is Marine Le Pen the Donald Trump of France?

Paris shooting: Gunman was ‘focus of anti-terror’ probe – BBC News

Police search home of shooting suspect in Paris suburb

Raw: Memorial For Officer Killed In Paris Shooting

Geert Wilders message for Europe

Revealed: ISIS terrorist who shot dead cop in Paris attack was arrested TWO MONTHS ago for threatening to kill police and served 15 years for trying to murder two officers

  • Policeman Xavier Jugele, 37, was killed last night after being ‘targeted’ on the Champs Elysees in central Paris
  • The attacker was eventually shot dead after French police officers rushed to the scene in the heart of the city
  • The gunman’s Audi contained a pump action shotgun, knives and ID of known ‘extremist’ Karim Cheurfi 
  • Two other police officers were ‘seriously injured’ and a ‘female foreign tourist’ was wounded in the incident
  • A note declaring allegiance to ISIS was discovered on the Champs Elysees and is being investigated by police 

French security services are today facing troubling questions as to how they failed to prevent an ISIS gunman from slaughtering one policeman and wounding two other officers in Paris when he was arrested as recently as February.

Karim Cheurfi, 39, had served 15 years of a 20-year jail sentence for attempting to kill two officers in 2001, before his release last year.

In February, the terrorist tried to obtain weapons and made threats to kill police officers, but was let go in early March due to lack of evidence.

On Thursday night, the fanatic was killed by police after he got out of his Audi and opened fire at police who had stopped at a red light on Champs Elysees. His car was packed with more weapons, including a pump action shotgun and knives. A copy of the Koran was also found in the vehicle.

Traffic officer Xavier Jugele, 37, died instantly with a shot to the head, while the other two were hurt before Cheurfi himself was gunned down by nearby armed police. A ricocheting bullet fired by the terrorist also wounded a female foreign tourist passing by.

ISIS has claimed responsibility for the attack and nicknamed the attacker ‘Abu Yousuf al-Belgiki’, which translates to ‘the Belgian’ in Arabic – a name which was listed in uncovered documents from the terror group last year.

A note declaring allegiance to ISIS was discovered on the Champs Elysees and is being investigated by police. Its presence and the speed at which ISIS claimed responsibility may suggest the attack was directed by the jihadist group rather than carried out by a lone supporter.

Karim Cheurfi

Pictured is the suspected ISIS gunman, who has been identified locally as 39-year-old father Karim Cheurfi

Pictured (left and right) is the suspected ISIS gunman, who has been identified locally as 39-year-old Karim Cheurfi

The alleged ISIS gunman, identified as 39-year-old Karim Cheurfi - who was jailed for 20 years for trying to kill officers in 2001 - parked his Audi and opened fire after police stopped at a red light on the world famous avenue. Pictured is his arrest warrant from last month, when he was detained for trying to obtain weapons 'to kill police'

The alleged ISIS gunman, identified as 39-year-old Karim Cheurfi – who was jailed for 20 years for trying to kill officers in 2001 – parked his Audi and opened fire after police stopped at a red light on the world famous avenue. Pictured is his arrest warrant from last month, when he was detained for trying to obtain weapons ‘to kill police’

Traffic officer Xavier Jugele (pictured), 37, died instantly with a shot to the head, while the other two were hurt before Cheurfi himself was gunned down by nearby armed police

Traffic officer Xavier Jugele (pictured), 37, died instantly with a shot to the head, while the other two were hurt before Cheurfi himself was gunned down by nearby armed police

Pictured is armed police crowded two other officers, believed to have been shot in the attack, on Champs Elysees on Thursday night

Pictured is armed police crowded two other officers, believed to have been shot in the attack, on Champs Elysees on Thursday night

French police leave the home of ISIS gunman Karim Cheurfi in the suburb of Chelles, in Paris, following last night's attack

French police leave the home of ISIS gunman Karim Cheurfi in the suburb of Chelles, in Paris, following last night’s attack

A woman places a flower near the spot on the Champs Elysees where the shooting occurred last night in the French capital

A woman places a flower near the spot on the Champs Elysees where the shooting occurred last night in the French capital

A body is removed from the scene after a traffic officer was killed by an ISIS gunman in central Paris last night

A body is removed from the scene after a traffic officer was killed by an ISIS gunman in central Paris last night

French police officers and forensic teams searched a vehicle which was close to the scene on the Champs Elysees in Paris

French police officers and forensic teams searched a vehicle which was close to the scene on the Champs Elysees in Paris

A police lorry seized the Audi which the attacker was driving, before he got out and shot at traffic officers last night

A police lorry seized the Audi which the attacker was driving, before he got out and shot at traffic officers last night

A still image from video footage shows police forensic investigators inspect the car used by the attacker in Paris last night

A still image from video footage shows police forensic investigators inspect the car used by the attacker in Paris last night

In the latest developments after the attack:

  • French police have this morning arrested three family members of ISIS gunman Karim Cheurfi 
  • Police are hunting a second suspect, who was brought to their attention by Belgian authorities 
  • A man whose image appeared on social media as ‘second suspect’ handed himself to police in Antwerp claiming he was not linked to the plot. Detectives have said this man had nothing to do with the attack 
  • Far-right presidential candidate Marine Le Pen called for all French terror suspects to be expelled
  • France’s government has reviewed its already extensive election security measures and says it is ‘fully mobilised’ and nothing will stop Sunday’s presidential vote
  • US President Donald Trump believes the attack will have a ‘big effect’ on the outcome of the election 
  • British Prime Minister Theresa May has sent condolences to the French president following the latest attack but the pair have not spoken directly since last night 
  • Iran’s foreign secretary Bahram Ghasemi said France was feeling a blowback for its support of rebels in Syria 

French officials revealed that Cheurfi was detained in Meaux, 24 miles east of Paris, on February 23 this year, after it emerged he was trying to buy weapons ‘to kill police’.

On Friday night, but prosecutors tonight denied that he was on a security watch list and added the terrorist showed no signs of radicalisation before the attack.

He reportedly used the alias ‘Abu Yousuf the Belgian’ and reportedly made threats to murder officers using the social media app Telegram, an instant messaging service.

Despite having a long list of police-hating convictions, he was able to obtain a Kalashnikov, a pump action shotgun and several knives ahead of last night’s attack.

He had been jailed for 20 years in 2005 for trying to kill two policemen.  He opened fire five times with a .38 revolver following a car chase in 2001, leaving the officers and a third victim wounded. All three survived the attack in Roissy-en-Brie, in the Seine-et-Marne department of northern France.

An armed police officer hoists his weapon as they storm the streets of Paris after the latest terror attack to hit the city

An armed police officer hoists his weapon as they storm the streets of Paris after the latest terror attack to hit the city

Armed police outside a shop in central Paris after an ISIS gunman killed a traffic officer and injured three other people

Armed police outside a shop in central Paris after an ISIS gunman killed a traffic officer and injured three other people

Armed police officers on the streets of Paris after a gunman killed a traffic cop and seriously injured two others last night

Armed police officers on the streets of Paris after a gunman killed a traffic cop and seriously injured two others last night

Armed police officers stood guard after they rushed to the scene in the centre of the capital following the incident which left frightened witnesses sprinting for their lives 

Armed police officers stood guard after they rushed to the scene in the centre of the capital following the incident which left frightened witnesses sprinting for their lives

A team of forensic detectives examine the Audi, which the gunman was driving. ID of Karim Cheurfi was found in the vehicle

A team of forensic detectives examine the Audi, which the gunman was driving. ID of Karim Cheurfi was found in the vehicle

Cheurfi, who was born in France, was a recluse who blamed police for ruining his life, a friend of the family revealed today.

OFFICER SHOT DEAD GUARDED BATACLAN AT ITS REOPENING

By Sam Tonkin for MailOnline 

The policeman killed by an ISIS gunman on the Champs-Elysees was today named as Xavier Jugelé, a 37-year-old Paris officer who defiantly said ‘no to terrorists’ at the reopening of the Bataclan theatre last November.

He was shot in the head when the terrorist – identified today as French national Karim Cheurfi, 39 – launched his attack on three police officers at around 9pm last night.

Jugelé, who was a proud defender of gay rights, was named as the victim who died by French newspaper Le Parisien.

It has since emerged that Jugelé was on duty at the reopening of the Bataclan theatre on November last year - a year on from the Paris attacks which left 130 dead.
Jugelé

It has since emerged that Jugelé (pictured left and right) was on duty at the reopening of the Bataclan theatre on November last year – a year on from the Paris attacks which left 130 dead

It has since emerged that Jugelé was on duty at the reopening of the Bataclan theatre on November last year – a year on from the Paris attacks which left 130 dead.

As British singer Sting marked the occasion with a performance at the concert hall, Jugelé defiantly told PEOPLE.com that he was there ‘to say no to terrorists’.

The policeman added: ‘I’m happy to be here. Glad the Bataclan is reopening. It’s symbolic.

‘We’re here tonight as witnesses. Here to defend our civic values. This concert’s to celebrate life. To say no to terrorists.

‘It doesn’t feel strange, it feels important,’ he added. ‘Symbolic.’

He did not attend formal mosque prayer services and became fascinated by jihadist propaganda via the internet, a confident of his mother claimed.

‘Karim did not pray, he drank alcohol and watched jihadist propaganda,’ neighbour Hakim, 50, told MailOnline.

‘He was not a good Muslim, he was a lost soul. He had no friends, no girlfriend, he never went out. He stayed at home all day watching stuff on the internet.’

Another neighbour added: ‘Karim didn’t go to the mosque. He just stayed at home. You never saw him.’

Hakim continued: ‘Karim blamed the police for ruining his life. He fired (a pistol) at police during a burglary and got sentenced to 15 years prison.

‘He was only 20 at the time. He hated the police, he said they had ruined his life. He was ‘anti-cop’. He would swear at officers in the street, call them bastards. He didn’t care.’

Hakim, whose family is close to Cheurfi’s mother, said the gunman had only recently returned to the quiet residential street after spending years behind bars.

Cheurfi lived separately from his mother in a purpose-built apartment in the front of the property.

Hakim added: ‘He lived in the studio in the garden. The mother lived in the big house.’

Cheurfi’s Algerian-born mother had divorced his father and had married a Frenchman with who she had second son. She later divorced her second son.

Another neighbour said: ‘His parents split up but they stayed living at the same property.

‘The father Salat lived in the apartment in the front of the garden and the mother lived in the house at the back of the property.

‘The mother married again, to a Frenchman, and they had a son together but the father stayed living at the property.

‘So it was a bit complicated but that’s life. Karim got on well with his half brother who is called Stephane.

‘But he went to live in the apartment with his father when he got of prison.’

Another neighbor added: ‘The mother is not here. She is in Algeria. She goes there every few months to visit relatives. She’s not been well.’

Officers have been searching the home of Karim in east Paris and arrested three of his family members.

A French government spokesman said the ISIS gunman began firing against police using ‘a weapon of war’.

The fatal incident unfolded as presidential candidates, including National Front party leader Marine Le Pen, debated on a TV show nearby before Sunday’s election.

Paris police search the suspected Champs-Elysee attacker’s house

A French police officer has been shot dead on the Champs Elysees in Paris (pictured) - just days before the French presidential election 

A French police officer has been shot dead on the Champs Elysees in Paris (pictured) – just days before the French presidential election

People held their hands up as they walked towards officers close to the scene where a policeman was fatally shot in Paris

People held their hands up as they walked towards officers close to the scene where a policeman was fatally shot in Paris

Police closed off the popular avenue (pictured) after a policeman was killed during a shooting incident in the French capital

Police closed off the popular avenue (pictured) after a policeman was killed during a shooting incident in the French capital

Pictured is the scene of a restaurant in Paris when the gunman opened fire on the streets outside. Diners are seen cowering on the ground in fear

Pictured is the scene of a restaurant in Paris when the gunman opened fire on the streets outside. Diners are seen cowering on the ground in fear

An armed policeman speaks to diners in a nearby Parisien restuarant, who cowered to the floor in fear of the ISIS gunman

An armed policeman speaks to diners in a nearby Parisien restuarant, who cowered to the floor in fear of the ISIS gunman

The gunman has been identified by police but they will not officially reveal his name until investigators determine whether he had accomplices, according to the Paris prosecutor.

Prosecutor Francois Molins said: ‘The identity of the attacker is known and has been checked. I will not give it because investigations with raids are ongoing.

‘The investigators want to be sure whether he had or did not have accomplices.’

The Interior Ministry spokesman said the officers were deliberately targeted and the police union added that the policeman was killed while sat in a car at a red light.

US President Donald Trump said: ‘It looks like another terrorist attack. What can you say? It never ends.’

The attack which took place on the Champs Elysees (pictured) comes just three days before the first round of balloting in France's tense presidential election

The attack which took place on the Champs Elysees (pictured) comes just three days before the first round of balloting in France’s tense presidential election

A French police officer stood guard on the Champs Elysees in central Paris following the fatal shooting, which has been described as 'terrorist related' 

A French police officer stood guard on the Champs Elysees in central Paris following the fatal shooting, which has been described as ‘terrorist related’

Police officers secured the area after a gunman got of an Audi vehicle and targeted officers by firing an automatic gun towards them 

Police officers secured the area after a gunman got of an Audi vehicle and targeted officers by firing an automatic gun towards them

A man and a woman put their hands in the air as armed officers stood just yards away from them following the incident in the city 

A man and a woman put their hands in the air as armed officers stood just yards away from them following the incident in the city

Officers searched the home of the suspected gunman on Thursday evening after they travelled to his home in the east part of the capital 

Officers searched the home of the suspected gunman on Thursday evening after they travelled to his home in the east part of the capital

People were seen running away from the area after Thursday night's attack, which has been described as being 'terrorist related'

People were seen running away from the area after Thursday night’s attack, which has been described as being ‘terrorist related’

Police officers searched the home of the suspected gunman in east Paris following the attack in the capital on Thursday 

Police officers searched the home of the suspected gunman in east Paris following the attack in the capital on Thursday

The Audi which is believed to belong to the attacker was taken away from the scene on the back of a lorry as police rushed to the popular avenue 

The Audi which is believed to belong to the attacker was taken away from the scene on the back of a lorry as police rushed to the popular avenue

Forensic experts and police officers were seen examining evidence from a van on the Champs Elysees in central Paris 

Forensic experts and police officers were seen examining evidence from a van on the Champs Elysees in central Paris

ISIS claimed responsibility for the attack and dramatic video footage showed the immediate aftermath of the incident which left one policeman dead.

Pierre-Henry Brandet, spokesman for the French Interior Ministry, confirmed that both injured officers in hospital were now ‘out of danger’ and ‘stable’, while the female tourist was far less badly hurt.

Mr Brandet did not name any of the victims, but praised the officers for ‘helping to avoid a bloodbath’ by ‘neutralising’ the attacker as quickly as possible.

French President Francois Hollande said the attack was ‘terrorist related’ and scheduled an emergency meeting following the shootings on Thursday evening.

Mr Hollande said a national tribute will be paid to the policeman and added that a ‘passerby was hit’ before the ‘assailant was neutralised’.

Conservative contender Francois Fillon, who has campaigned against ‘Islamic totalitarianism,’ said on France 2 television that he was canceling his planned campaign stops Friday.

Far-right candidate Le Pen, who campaigns against immigration and Islamic fundamentalism, took to Twitter to offer her sympathy for law enforcement officers ‘once again targeted.’

She canceled a minor campaign stop, but scheduled another.

Centrist candidate Emmanuel Macron offered his thoughts to the family of the dead officer.

Socialist Benoit Hamon tweeted his ‘full support’ to police against terrorism.

Le Pen and Francois Fillon announced that they have both cancelled their campaigning on Friday.

Paris gunman’s neighbour speaks out as police raid suspect’s home

French presidential election candidate Jean-Luc Melenchon (pictured) took part in the TV show just days before the election 

French presidential election candidate Jean-Luc Melenchon (pictured) took part in the TV show just days before the election

French presidential candidates, including National Front party leader Marine Le Pen (pictured), took part in a key debate

French presidential candidates, including National Front party leader Marine Le Pen (pictured), took part in a key debate

Mr Brandet said ‘all lines of investigation were being pursued’, while intelligence sources said the dead assailant was a known radical on a so-called S-file, for ‘State-security’.

This means he would have been under surveillance, because he was a known risk to the country.

An eyewitness, called Chelloug, said: ‘It was a terrorist. He came out with a Kalashnikov and started shooting, but he could’ve shot us on the pavement and killed more people with a spray of shots.

‘But he targeted the policemen and fortunately there were the policemen who killed him.’

Another witness said: ‘I saw someone shoot at the police officers. They returned fire, they killed him, he fell on the floor. And then the emergency services came.

‘It took place by Zara and there was a CRS (Republican Security Companies) van parked up and the man shot the police officers. He took out a weapon and shot them.

‘I think the police officer was killed on the spot and his colleagues fired back and killed the individual.’

The attack comes just three days before the first round of balloting in France’s tense presidential election.

A witness, identified only as Ines, told BFM that she heard a shooting, saw a man’s body on the ground and the area was quickly evacuated by police.

It comes just two days after police arrested two men in southern Marseille with weapons and explosives who were suspected of preparing an attack to disrupt the first-round of the presidential election on Sunday.

France is in a state of emergency and at its highest possible level of alert since a string of terror attacks that began in 2015, which have killed over 230 people.

Thousands of troops and armed police have been deployed to guard tourist hotspots such as the Champs Elysees or other potential targets like government buildings and religious sites.

Police officers quickly secured the area - which is popular with tourists and Parisians - after the attack and the road was on lockdown by 9pm 

Police officers quickly secured the area – which is popular with tourists and Parisians – after the attack and the road was on lockdown by 9pm

Police search the car reportedly used in Paris attack

Police officers took positions near the Champs Elysees avenue in Paris after the gunman - who was known to the security services - launched the attack 

Police officers took positions near the Champs Elysees avenue in Paris after the gunman – who was known to the security services – launched the attack

An armed soldier spoke to a man a told him to leave the area following the fatal shooting close to the Arc de Triomphe (pictured) 

An armed soldier spoke to a man a told him to leave the area following the fatal shooting close to the Arc de Triomphe (pictured)

French soldiers secure the Champs Elysees Avenue after a police officer was killed when a gunman opened fire in Paris

French soldiers secure the Champs Elysees Avenue after a police officer was killed when a gunman opened fire in Paris

French police officers searched the area after some of their colleagues were shot in the heart of Paris on Thursday evening

French police officers searched the area after some of their colleagues were shot in the heart of Paris on Thursday evening

French President Francois Hollande (pictured) said the attack was 'terrorist related' and scheduled an emergency meeting following the shootings

French President Francois Hollande (pictured) said the attack was ‘terrorist related’ and scheduled an emergency meeting following the shootings

‘Stay back, stay back!’ Police warn after shooting in Paris

LE PEN ACCUSED OF ‘EXPLOITING’ ATTACK FOR VOTES

By Thomas Burrows for MailOnline 

French Prime Minister Bernard Cazeneuve has accused far-right candidate Marine Le Pen of ‘exploiting’ the Champs-Elysees terror attack to win votes ahead of Sunday’s presidential election.

In the wake of the shooting Le Pen called for foreign terror suspects to be expelled immediately and claimed France needed a ‘presidency which acts and protects us.’

Responding to that, Cazeneuve, a Socialist, said Le Pen’s National Front (FN) ‘after each attack, seeks to exploit it and use it for purely political means.’

Experts believe the shooting last night could boost Le Pen’s chances of getting elected just days before France goes to the polls.

Le Pen today called for foreign terror suspects to be kicked out the country despite the fact the ISIS gunman was French

Le Pen today called for foreign terror suspects to be kicked out the country despite the fact the ISIS gunman was French

Voters could flock to far-right candidate Marine Le Pen following the latest terror attack

Voters could flock to far-right candidate Marine Le Pen following the latest terror attack

In last night’s attack a police officer was killed and two more were injured after a gunman opened fire close to the Champs-Elysees.

Le Pen today called for foreign terror suspects to be kicked out the country despite the fact the ISIS gunman was French. The 39-year-old had used the war name ‘Abu Yousuf the Belgian’.

Officials confirmed the homegrown fanatic was a French national despite his nickname.

A manhunt is underway for the second suspect who travelled by train to France from Belgium.

The Champs-Elysees terror attack could boost far-right candidate Marine Le Pen's chances of getting elected, experts believe

The Champs-Elysees terror attack could boost far-right candidate Marine Le Pen’s chances of getting elected, experts believe

The shooting took place just four days before the French election and experts believe it could bolster Le Pen’s chances of being elected.

Le Pen has made immigration and security the core part of her campaign. She has pledged to tighten French borders controls and build more jails, and claimed authorities were not doing enough to protect citizens from terror attacks.

More than half of police officers in France had already said they were voting for Le Pen because of her strong anti-terror stance, according to an IFOP poll.

Experts believe it could increase her chances of winning Sunday’s election.

Fredrik Erixon, director at the European Centre for International Political Economy, told CNBC: ‘[It could lead to] a greater performance of Marine Le Pen than otherwise would have been the case.

‘It’s difficult to see how this attack will not play into the hands of political forces that want this campaign to be focused only on issues around migration and terrorism.’

Vishnu Varathan, senior economist at Mizuho Bank, added: ‘The Paris gunman attack may well swing support in her favor; and this may not be picked up by the polls in a timely manner.’

Armed police officers were quick on the scene and closed the world famous avenue following the incident which shocked the city

Armed police officers were quick on the scene and closed the world famous avenue following the incident which shocked the city

The world famous was shut at around 9pm and it is believed police are still searching for a second suspect in relation to the attack 

The world famous was shut at around 9pm and it is believed police are still searching for a second suspect in relation to the attack

Police officers blocked the access of a street near the Champs Elysees in Paris after the fatal shooting on Thursday, April 20

Police officers blocked the access of a street near the Champs Elysees in Paris after the fatal shooting on Thursday, April 20

Officers were wearing vests and helmets as they patrolled the area close to where the fatal shooting took. A 39-year-old man is believed to be responsible for the shooting 

Officers were wearing vests and helmets as they patrolled the area close to where the fatal shooting took. A 39-year-old man is believed to be responsible for the shooting

The world famous street was put on lockdown by 9pm and officers guarded the area in central Paris (pictured, the Eiffel Tower in the background) 

The world famous street was put on lockdown by 9pm and officers guarded the area in central Paris (pictured, the Eiffel Tower in the background)

A policeman attended the scene and was armed with a gun following the incident. Police have reportedly issued a warrant for a second attacker

A policeman attended the scene and was armed with a gun following the incident. Police have reportedly issued a warrant for a second attacker

Up until now, polls showed voters more concerned about unemployment and their spending power than terrorism or security, though analysts warned this would change in the event of further bloodshed.

For weeks, centrist former banker Le Pen has been out in front but opinion polls now show there is a chance that any of the four leading candidates could reach the second-round runoff on May 7.

Scandal-plagued conservative Fillon and far-left firebrand Jean-Luc Melenchon have closed the gap substantially in the last two weeks.

A COUNTRY UNDER SIEGE: TIMELINE OF FRANCE TERROR

By Rory Tingle for MailOnline 

March, 18, 2017 – Convicted criminal with links to radical Islam shouted ‘I am here to die for Allah, there will be deaths’ seconds before he was shot dead during an attack at Orly airport. The 39-year-old, named locally as career criminal Ziyed Ben Belgacem, was killed after wrestling a soldier’s gun from her and fleeing into a McDonald’s. He sent a text message to his brother and father stating ‘I shot the police’, shortly before he was killed.

February 3, 2017 – A man is shot five times outside the Louvre museum in the heart of Paris after attempting to storm the historic art gallery.

July 14, 2016 – Amid Bastille Day celebrations in the Riviera city of Nice, a large truck is driven into a festive crowd. Some 86 people from a wide variety of countries are killed. The driver is shot dead. Islamic State extremists claim responsibility for the attack. The state of emergency in France is extended and extra protection, including robust barriers to prevent similar attacks, is put in place at major sites in France.

June 13, 2016 – Two French police officers are murdered in their home in front of their 3-year-old son. Islamic State claims responsibility for the slaying, which was carried out by a jihadist with a prior terrorist conviction. He is killed by police on the scene.

Nov. 13, 2015 – Islamic State militants kill 130 people in France’s worst atrocity since World War II. A series of suicide bomb and shooting attacks are launched on crowded sites in central Paris, as well as the northern suburb of Saint-Denis. Most of those killed are in a crowded theater where hostages are taken. Islamic State extremists claim responsibility and say it was in retaliation for French participation in airstrikes on the militant group’s positions in Syria and Iraq. It leads to the declaration of a state of emergency in France. Police powers are expanded.

Jan. 7, 2015 – Two brothers kill 11 people inside the Paris building where the satirical magazine Charlie Hebdo is headquartered in what Islamic State extremists claim is retaliation for the publication of cartoons about the Prophet Muhammad. More are killed subsequently in attacks on a kosher market in eastern Paris and on police. There are 17 victims in all, including two police officers. The attackers are killed.

The UK Foreign Office said: ‘The British Embassy is in contact with local authorities and urgently seeking further information following reports of a shooting incident on the Champs-Elysees in Paris.

‘You should remain vigilant and follow the advice of the local security authorities and/or your tour operator.

‘If you’re in the area and it is safe to do so, contact your friends and family to tell them you are safe.’

 were photographed standing on top of a vehicle on the Champs Elysees following an incident which left one officer dead

French police officers reacted after the shooting which left one officer dead and two more seriously injured in Paris 

French police officers reacted after the shooting which left one officer dead and two more seriously injured in Paris

French soldiers were armed with guns (pictured) and stood guard at the Arc de Triomphe near the Champs Elysees in Paris

French soldiers were armed with guns (pictured) and stood guard at the Arc de Triomphe near the Champs Elysees in Paris

Heavily armed officers had flooded the area following the gunshots which were heard in a busy part of the French capital 

Heavily armed officers had flooded the area following the gunshots which were heard in a busy part of the French capital

Reports have suggested that two police officers have been killed on the Champs Elysees in central Paris (pictured) this evening

Reports have suggested that two police officers have been killed on the Champs Elysees in central Paris (pictured) this evening

It was originally believed the other officer was seriously wounded while the attacker was killed on the world famous avenue (pictured)

It was originally believed the other officer was seriously wounded while the attacker was killed on the world famous avenue (pictured)

The incident last night comes as France remains in a state of emergency following the Paris attacks in 2015 and the Bastille Day killings in Nice in 2016.

The shooting comes just hours after one of the busiest roads in Paris was closed off by police as officers dealt with a ‘suspicious package’.

Reports suggested that items were discovered by officers as Rue de Rivoli remained shut. Stunned witnesses described seeing a large police presence on the two-mile-long road.

Rue de Rivoli is a busy commercial street just north of the River Seine which is home to some of the most fashionable shops in the world.

CHAMPS-ELYSEES: THE MOST BEAUTIFUL AVENUE IN THE WORLD

By Thomas Burrows for MailOnline 

The Champs-Elysees – the scene of Thursday night’s terror attack – is the beating historic heart of Paris.

It has been described as the ‘most beautiful avenue’ in the world and is visited by millions of tourists every year.

Tens of thousands of people daily throng the tree-lined 1.2 mile avenue that is home to luxury stores and chain stores, cafes, cinemas and high-end offices.

A tourist draw as famed as the Eiffel Tower just across the River Seine, the avenue, stretching from the Arc de Triomphe down to Concorde Square, was first laid out in 1670.

Over the decades people have gathered there to mark momentous moments in French history.

During the French Revolution in 1789 an angry mob set off from the avenue to march on Versailles, Louis XVI’s opulent retreat.

It was also the site chosen by General Charles de Gaulle to celebrate the August 25, 1944, liberation of Paris from the Germans during World War Two.

More recently, hundreds of thousands congregated along the avenue to celebrate France’s 1998 World Cup victory (sealed with a 3-0 win over Brazil) on home soil.

The Champs Elysees is famously the finish line for the world’s toughest cycling race, the Tour de France.

Thursday was not the first time violence has been visited on the avenue.

In 1986, it witnessed two attacks – the first, on February 3, seeing one death and eight injured at the Claridge shopping arcade.

A second attack on March 20 at the Point Show arcade killed two and injured 29. Both attacks were linked to Middle East terrorism.

On Bastille Day in 2002, president Jacques Chirac survived an assassination attempt by a right-wing extremist who fired off one shot from a rifle hidden in a guitar case before bystanders wrestled him to the ground.

http://www.dailymail.co.uk/news/article-4429938/Paris-terror-attack-video-shows-police-shoot-gunman.html#ixzz4evbT4kjq

Story 2: Will Marine Le Pen Win In The First Round of French Presidential Election? First Round –Yes — — Making France Great Again —  Second Round –Marine Le Pen May Be First Woman President or Emmanuel Marcon The Youngest President — Videos

 Image result for candidates for french president 2017 emmanuel macron Image result for candidates for french president 2017 emmanuel macron  Image result for candidates for french president 2017 le pen vs. macron Image result for candidates for french president 2017 le pen vs. macron

Image result for candidates for french president 2017 names and photos

“Marine Le Pen will be the next French President” – Christopher Dickey

Dear French People | French Presidential Election 2017

Who will be France’s next leader? | DW English

France’s Presidential Election: What You Need to Know

French election 2017: Who’s who – BBC News

France’s presidential election: A populist front

French Presidential Election 2017 Explained

French presidential candidate Marine Le Pen and Europe’s far-right movement

Le Pen vs Macron

RT – Why Marine Le Pen is The Only Way to Save Europe #Frexit #EndEU

Le Pen destroys Merkel

Marine Le Pen will not put up with any nonsense from BBC reporter

Marine Le Pen gets poll boost after Paris attack as Donald Trump says her chances of victory have improved

Donald Trump Marine Le Pen

Donald Trump has said the Paris terrorist attack would boost Marine Le Pen’s presidential chances after a last-minute poll gave her a modest increase in support.

The US president said the shooting would “probably help” Ms Le Pen in Sunday’s election, because she is “strongest on borders, and she’s the strongest on what’s been going on in France.”

“Whoever is the toughest on radical Islamic terrorism, and whoever is the toughest at the borders, will do well in the election,” he said.

Marine Le Pen at a campaign rally in Marseille
Marine Le Pen at a campaign rally in Marseille CREDIT: EPA

US presidents typically avoid weighing in on specific candidates running in overseas election. But Mr Trump suggested his opinion was no different from an average observer, saying: “Everybody is making predictions on who is going to win. I’m no different than you.”

Cancelling visits and meetings on Friday, candidates traded blows across the airwaves as it emerged that the Isil-backed gunman had been kept in custody just 24 hours in February despite attempts to procure weapons to murder police.

Xavier Jugelé, 37, a policeman who had been deployed in the 2015 Bataclan attack, was killed in the shooting.

This undated image provided on Friday, April 21, 2017, by FLAG, an association of LGBT police officers, shows French police officer Xavier Jugele
This undated image provided on Friday, April 21, 2017, by FLAG, an association of LGBT police officers, shows French police officer Xavier Jugele CREDIT: FLAG VIA AP

Ms Le Pen, the far-Right candidate, blasted the mainstream “naive” Left and Right for failing to get tough on Islamism, calling for France to instantly reinstate border checks and expel foreigners who are on the watch lists of intelligence services.

François Fillon, the mainstream conservative candidate, pledged an “iron fist” in the fight against “Islamist totalitarianism” – his priority if elected. “We are at war, it’s either us or them,” said the conservative, whose campaign has been weighed down by allegations he gave his British wife a “fake job”.

Meanwhile, Emmanuel Macron, the independent centrist, whom critics dismiss as a soft touch, hit back at claims shutting borders and filling French prisons would solve the problem, saying: “There’s no such thing as zero risk. Anyone who pretends (otherwise) is both irresponsible and deceitful.”

Sticking to his campaign agenda, far-Left candidate Jean-Luc Mélenchon told everyone to keep a “cool head” as he took part in a giant picnic.

A last-minute Odoxa poll taken after the attack suggested that Mr Macron was still on course to come first in Sunday’s first round, with Ms Le Pen just behind and through to the May 7 runoff.

However, Mr Fillon and Mr Mélenchon were still snapping at their heels.

The government on Friday announced elite units would join 50,000 police and troops to guard polling booths on Sunday in France’s first presidential election to be held in a state of emergency.

Matthieu Croissandeau, editor of Nouvel Obs magazine, said the French are now thicker-skinned after two years of bloodshed. “The French are unfortunately getting used to terror attacks on home soil and I don’t think this latest one created the shock and awe that might have made a significant difference,” he said.

Ms Le Pen has struggled to get the campaign to focus on her party’s pet issues of security, Islam and immigration. By contrast, she has been thrown on the defensive over her position to pull out of the eurozone.

After the attack, she called on the “notoriously feeble” socialist, President François Hollande, to instantly reinstate border checks and expel foreigners who are on the watch lists of intelligence services. She said: “We cannot afford to lose this war. But for the past 10 years, Left-wing and Right-wing governments have done everything they can for us to lose it.

“We need a presidency which acts and protects us,” she said from her Paris campaign headquarters. Elected French president, I would immediately, and with no hesitation, carry out the battle plan against Islamist terrorism and against judicial laxity.”

Marine Le Pen reacts to the terror attack in Paris
But Ms Le Pen was not the only one to issue stern pledges. Mr Fillon, who also talks tough on security, said the fight against “Islamist totalitarianism” should be the next president’s priority.

“It will require an unyielding determination and a cool head,” the former prime minister said. “We are at war, there is no alternative, it’s us or them.”

Mr Fillon, though knocked off his initial course towards victory by incessant allegations involving “fake job” payments to his British wife, promised to govern with “an iron fist”.

But the moderate Mr Macron, whom other candidates have portrayed as too inexperienced, took a different tack, warning against any attempts to use the shooting for political gain. “I think we must once and for all have a spirit of responsibility at this extreme time and not give in to panic and not allow it to be exploited, which some might try to do,” he told French radio.

Karim Cheurfi had been detained in February after reports that he had threatened police 
Karim Cheurfi had been detained in February after reports that he had threatened police 

Ms Le Pen’s solutions, he said, were woefully simplistic and “would not protect France”. And he added that to promise a “zero risk” scenario “is both irresponsible and deceitful”.

He also took a swipe at Mr Fillon, saying that intelligence had been depleted on his watch as the prime minister in Nicolas Sarkozy’s presidency.

Meanwhile, Bernard Cazeneuve, the Socialist prime minister, accused Le Pen of “shamelessly seeking to exploit fear and emotion”.

Footage shows moments after suspected terrorist is shot in Paris

00:24

Opinion polls have for months forecast that Le Pen would make it through to the run-off, but then lose in the final vote. Given the margin of error, none of the leading four candidates is a sure bet to reach the final. All hope to woo the third of French voters still undecided.

Previous terror attacks ahead of elections – such as the November 2015 attacks in Paris before regional ballots – did not effect those ballots.

Analyst Who Predicted Trump’s Ascendancy Bets on Le Pen Win

April 21, 2017, 3:41 AM CDT April 21, 2017, 5:42 AM CDT
  • Undecided voters bad news for Macron, says GaveKal’s founder
  • Recommends overweight sterling, large-caps; bond shorts
 How Will Markets React to Elections in France?

Don’t bank on a relief rally in the euro area anytime soon.

Markets are underpricing the prospect of Marine Le Pen emerging victorious in the French election as a sea of undecided voters throws into sharp relief pronounced apathy for center-leftist Emmanuel Macron — the front-runner by a whisker — and the backlash against the European Union project.

That’s the conclusion drawn by Charles Gave, founder of Hong-Kong based asset-allocation consultancy GaveKal Research, who predicted the triumph of Donald Trump in the U.S. election, and is now betting on a win for the anti-euro National Front candidate.

“Le Pen’s momentum is a slow-moving reaction against the men of Davos — as we have seen with Brexit and Trump — but markets don’t want to believe it,” he said by phone before the first round of the French poll on April 23.

Given the prospect of a Le Pen victory, Gave, who has been researching tactical asset allocation for more than 40 years, is advising clients to adopt long positioning in the pound as the U.K. would benefit from haven bids, and shorts on inflation-linked German bonds amid the risk of deflation in the euro area.

Safer Bet

The French economist also recommends bets on the likely outperformance of publicly-listed European multinationals, given their outsize share of income in foreign currencies. In effect, for investors obliged to invest liquidity in euros, Gave says a basket of high-quality stocks is a safer bet than euro-denominated government bonds.

“The market is talking about the nightmare scenario but it’s not pricing it in” said Mark Tinker, head of AXA Framlington Asia. Tinker’s a GaveKal client, and admirer of Gave’s tail-risk warnings over the past year. “After Sunday, we will have more information to make a considered risk-return wager to trade and hedge, but high-quality European companies and German bonds look like an attractive bet,” Tinker said.

Markets are pining for a scenario that would preserve the status quo: Macron, an independent candidate, defeating Le Pen in the second round on May 7. Thursday saw something of a French relief rally, with strong demand at a government debt auction, while France’s benchmark CAC 40 Index rose 1.5 percent aspolls showed Macron pulling marginally ahead of Le Pen.

The euro held steady on Friday and French bonds gained after a police officer was shot in Paris, which may influence the outcome of the first-round vote, according to some analysts. The CAC 40 dropped for the first time in three days, declining 0.5 percent.

The stars, however, appear to be aligning for the National Front candidate, said Gave. The fact two candidates for the runoff are likely to be determined by voters who have yet to make up their minds — as many as 40 percent — is a bad omen for the centrist contender, he said.

Momentum Curtailed

At least half of the far-left and half of the center-right won’t vote for Macron in the second round if he is pitted against Le Pen, believing he is“tainted” by his association with Francois Hollande’s government, and would rather abstain, Gave said.

Supporters of Francois Fillon, a center-right candidate whose momentum has been curtailed by graft charges, and a sizable chunk of Macron’s followers would probably rally to Le Pen’s cause if she were to face leftist Jean-Luc Mélenchon in the final round, according to Gave. He sees only Fillon with a chance to defeat Le Pen in the run-off.

If she emerges victorious, the euro would tank as markets would price in the prospect of its dissolution, rather than focus on Le Pen’s legislative hurdles to exit the single-currency bloc. French and Italian bonds will be “unquotable” given vanishing bids, and the European banking system would be beset by seismic turmoil, he said.

https://www.bloomberg.com/news/articles/2017-04-21/analyst-who-predicted-trump-ascendancy-is-betting-on-le-pen-win

French Elections: Marine Le Pen Backed By Quiet Army of Women

Image: Marine Le Pen campaign rally in Paris

Le Pen waves at the audience after speaking at a rally in Paris on April 17. Christophe Petit Tesson / EPA

COGOLIN, France — Muslims preoccupy Jennifer Troin.

“I’m worried about my nieces having to wear the veil,” said the soft-spoken 29-year-old.

This fear has helped propel the young mother to the far-right of the political spectrum ahead of key presidential elections Sunday — and into the arms of the hard-line National Front party.

Troin sells children’s clothes at a store in Cogolin, a town of 11,000 a few miles from the jet-set resorts of the French Riviera. In 2014, Cogolin became one of a handful of communities nationwide to elect mayors from the National Front, which is also known by the acronym FN.

Image: Jennifer Troin, 29, is a sales assistant in a children's clothes store in Cogolin on April 13, 2017

Jennifer Troin, 29, is a sales assistant in a children’s clothes store in Cogolin, France on April 13, 2017.Saphora Smith / for NBC News

Troin told NBC News that it wasn’t just the FN’s stance on Islam and immigration that attracted her, but also the party’s populist take on the economy.

But most of all, it was the party’s charismatic leader, Marine Le Pen, who captured Troin’s loyalty.

“She fights for women’s rights against Islam,” she said. “I vote because of Marine.”

Troin is part of a quiet army of female National Front supporters, who could well tip the balance of the election and give the presidency to the hard-right.

An FN victory would rewrite the continent’s political playbook, given the party’s pledge to take France out of the European Union. Were it to win, it would not have been an easy ride for a movement that peaked in 2002 when founder Jean Mari Le Pen — Marine Le Pen’s father — reached the second and final round of the presidential election.

French voters flocked to the polls in the runoff to ensure Le Pen did not win, instead electing former President Jacques Chirac with a resounding 78 percent of the vote. Most pollsters expect a similar outcome in May’s second-round vote, predicting moderate voters to rally once again to shut out the FN.

But few doubt that the party’s anti-immigrant and anti-establishment platform is resonating.

The Front’s anti-Islamic message is especially potent in France, whose 4.7 million Muslims make up around 7.5 percent of the population. Islamist militant attacks have killed more than 230 people over two years and plunged the country into a long-term state of emergency.

Play
Marine Le Pen: Mass Immigration Is a Tragedy for France 1:00

This anxiety deepened on the eve of the election after a gunman ambushed three Parisian police officers on the Champs-Elysees late Thursday, killing one and wounding two others. ISIS claimed responsibility for the shooting and French President Francois Hollande said it was likely a terrorist attack.

Meanwhile, the FN’s influence has spread from its heartlands along the Mediterranean coast and in the rust-belt north, into rural “forgotten” France.

‘Marine is different’

Polling institute Elabe recently predicted that 22 percent of women would vote for the National Front in the first round Sunday — almost 5 percent more than in 2012.

With just days to go, polls show the race is tightening. Centrist Emmanuel Macron is edging his way ahead on 24 percent and Le Pen is a fraction behind on 22.5 percent, according to Bloomberg polling.

Just below them, hard-left candidate Jean-Luc Melenchon has enjoyed a late surge and scandal-hit conservative Francois Fillon has hung in there despite a slew of allegations that he paid thousands of euros to his British-born wife for assistance she allegedly did not provide. A third of voters remain undecided.

Image: French far-right Front National leader Marine Le Pen is kissed by her father Jean-Marie Le Pen
Front National leader Marine Le Pen is kissed by her father Jean-Marie Le Pen after being re-elected as president of the party on Nov. 30, 2014.Laurent Cipriani / AP, file

The FN’s ability to motivate French women could be decisive. Traditionally, it has struggled to attract female voters amid accusations of sexism, racism and anti-Semitism.

In its early years under Jean-Marie Le Pen, the party advocated a traditional image of women, opposed abortion rights and developed a reputation for a macho, strongman culture.

This bias showed. The FN was far less successful at attracting women than men. During Jean-Marie Le Pen’ time in charge, around 12 percent of French women supported the party compared with 17 percent of men, according toSciences Po Cevipof, a political institute based in Paris.

Marine Le Pen changed this.

Since taking over in 2011, she has softened the party’s image, steering the FN away from some of its overtly anti-Semitic and racist rhetoric in an effort to broaden its electoral base. In 2015, she expelled her father after he repeated his view that the Holocaust was a “detail of history.”

In the run up to the this year’s election, Le Pen dropped her last name from campaign handouts, referring to herself simply as Marine.

More recently, she specifically targeted the female vote. She has published special pamphlets and a campaign video that describes her as a woman and a mother and shows her flicking through family photo albums. She has also changed the party’s logo from a flame to a blue rose.

‘Hitler-like figure’

For Troin, the children’s clothes seller in Cogolin, her interest in the National Front has grown with Marine Le Pen’s rise. While immigration, job security and her fear of Islam remained underlying motivators, she was also attracted to the party’s re-brand.

For her, the former leader “was too outspoken, too offensive. He was a Hitler-like figure,” Troin said. “But Marine is different.”

In the last presidential election in 2012 — the first with Marine Le Pen as leader — the party’s gender gap closed to 1.5 percentage points. It’s what Cevipof professor and FN expert Nonna Mayer called the “Marine Le Pen effect.”

The party has long advocated clamping down on immigration and securing borders, and throughout her campaign Le Pen has consistently made the country’s Muslims a target.

Image: Marine Le Pen supporters cheer
Marine Le Pen supporters cheer at a rally in the southern city of Marseille on Wednesday.Jeff J Mitchell / Getty Images

“In France we respect women, we don’t beat them, we don’t ask them to hide themselves behind a veil as if they were impure. We drink wine when we want, we can criticize religion and speak freely,” she said during a rally Monday night, comments clearly aimed at Muslims.

During the rally, Le Pen pledged to suspend all visas from non-European migrants hoping to join their families in France — often code for immigrants from mainly Muslim North Africa and the Middle East.

After Thursday night’s attack in Paris, she again singled out what she sees as the threat posed by Islam.

“It is a war in which there can be no retreat because all our population and all our territory are exposed,” she said.

And for all her rebranding, Marine Le Pen can also fall back into the older, harsher style of messaging.

Cathy, a 50-year-old dental assistant who was shopping for groceries in Cogolin, said she was all set to vote FN but was taken aback by Le Pen’s recent comments that the French were not to blame for the anti-Jewish policies of the government during the Nazi occupation in World War II.

Referring to the “Vel d’Hiv” roundup of Jews by French police in July 1942, in which nearly 13,000 were detained and deported to concentration camps, Le Pen told French radio earlier this month she thought France was “not responsible.”

Cathy, who didn’t want to be identified by her second name, said Le Pen’s remarks had made her pause.

“Perhaps she has the same ideas as her father but they’re just hidden behind good PR skills,” she said. “So I’m still thinking.”

Others needed no time to reflect.

“The FN is xenophobic, racist and anti-feminist,” said retired teacher Mireille Escarrat. “For me it feels like the 1930s. We’re going backwards.”

‘I don’t talk politics here’

Many of the National Front supporters interviewed by NBC News were reluctant to admit it, and others were concerned about being named.

“I don’t talk politics here,” a local woman said, having led the way into a backroom of her business in the town. The 60-year-old asked not to be named or for her business to be described because she felt that admitting her loyalty to the FN would damage her reputation.

“I wouldn’t mind if it weren’t for my business,” she added, out of earshot of her customers. “But this is somewhere everyone can come whether you vote communist or for the right.”

Even in this town — where 53 percent of the population voted FN in 2014 — voting Le Pen still carries a social stigma. There’s no telling just how many closet female FN voters there may be.

The party’s marriage of socialist economic policy and right-wing identity politics is working in the town, which sits in the FN’s traditional southern heartland. With the decline of traditional industries and unemployment at 18 percent, locals worry Cogolin is being reduced to a seasonal economy dependent on rich resort communities.

Newly-converted women at the FN’s regional headquarters in neighboring Sainte-Maxime said Sunday’s election would be the first time they voted for the Front in a presidential race.

“We didn’t vote for Jean-Marie Le Pen because he scared us,” said Monique Guckert, 67, a retired shop assistant. “His ideas were too fascist, too racist. It was too much.”

Image: Mayor Marc Etienne Lansade sits at his desk
Cogolin’s mayor Marc Etienne Lansade sits at his desk.Saphora Smith / for NBC News

Even the FN mayor of Cogolin, Marc Etienne Lansade, admitted his mother would never have voted for Jean-Marie Le Pen.

“He drove her crazy,” he said. “Women understand Marine Le Pen, she’s divorced, she has three children, she works — she’s a modern woman,” he added, sitting in his second-floor office in the town hall.

Still, not all women appreciate Le Pen’s message. On Monday, a topless protester carrying flowers charged the candidate during a rally northern Paris.

Le Pen does not try to make out that she is a feminist. Of her 144 manifesto pledges, only one addresses women’s issues. In it, she promises to defend women’s rights by fighting against Islam, implementing a plan for equal pay and combating social and job insecurity.

“She’s a fake feminist,” said Camille Froidevaux-Metterie, a political scientist and expert on women in politics at the University of Reims.

Asked if a Le Pen win would be a victory for women, she said that though symbolically “it would not be nothing.” She said it would mean France is ready for a female president but would have elected one on a non-feminist agenda.

“It’s a sort of paradox,” she said.

http://www.nbcnews.com/news/world/french-elections-marine-le-pen-backed-quiet-army-women-n748136

French elections: New poll shows Macron’s lead over Le Pen is narrowing

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 878

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 871, April 11, 2017, Story 1: Trump Rattling Cages (Sending Messages) in Syria and North Korea (Democratic People’s Republic of Korea (DPRK)) — Training Exercise — Trump Neoconed — Videos — Story 2: Attorney General Sessions Enforces Immigration Law — The Trump Era — Videos

Posted on April 11, 2017. Filed under: American History, Breaking News, Business, Communications, Congress, Corruption, Countries, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Empires, Federal Government, Government, Health, History, Human, Illegal Immigration, Illegal Immigration, Immigration, Law, Legal Immigration, Life, Media, North Korea, Obama, Philosophy, Photos, Politics, President Trump, Progressives, Rand Paul, Rand Paul, Raymond Thomas Pronk, Regulation, Rule of Law, Scandals, Success, Syria, Taxation, Taxes, Terror, Terrorism, Trump Surveillance/Spying, Unemployment, United States of America, Videos, Violence, War, Weapons, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Story 1: Trump Rattling Cages (Sending Messages) in Syria and North Korea (Democratic People’s Republic of Korea (DPRK)) —  Training Exercise — Trump Neoconed — Videos —

Image result for pipelines in middle east existing and plannedImage result for map north and south korea missilesImage result for pipelines in syria iran to europeImage result for map north and south korea japan us navy warships april 2017

Image result for map north and south korea missiles

Image result for map north and south korea missiles

Image result for map north and south korea missiles

Image result for map north and south korea missiles

General James Mattis Delivers a THREAT at Defense Briefing at Pentagon on Russia, North Korea, China

What the Media Won’t Tell You about Syria

Alex Jones : We Must Stop Donald Trump and Globalists in Syria !

Rand Paul: Syria strikes ‘not in the national interest’

Ron Paul “Nobody’s Proven Anything About Who Gassed Whom!”

Congressman Ron Paul, MD – We’ve Been NeoConned

Rand Paul Says McCain Stupidity Hinders Political Solution in Syria

LIMBAUGH: Trump Voters Feel SHOCKED And BETRAYED After Syria Missile Strike

There’s No Such Thing As the Bad Guy

Keiser Report: What is Wrong with America? (E 1056)

Syria: Why Now, What’s the Strategy, What Are Critical Issues Before Us?

Ann Coulter’s take on Syria, Trump’s foreign policy

Unintended Consequences

Donald Trump, Commander in Chief

EXCLUSIVE: Michael Savage Begs Trump To Stop WWIII

Fears mount as the USS Carl Vinson heads does an about face

North Korea warns US over aircraft carrier deployment

united states SENDS warships To KOREA! TRUMP reacts to NORTH KOREA!

NORTH KOREA READY for UNITED STATES! SOUTH KOREA wants THEM OUT! BREAKING NEWS

Is North Korea next?

The U.S. vs. North Korea: Inside a Pentagon war game

The Real Doctor Evil: Kim Jong Il’s North Korea – Full Documentary

North Korea: The Great Illusion

Special report: North Korea: Credible threat?

Jack Posobiec: Will Trump Strike North Korea?

TRUMP sends HUGE message with USS GERALD R.FORD! after NORTH KOREA WARNS UNITED STATES

Alex Jones Breaks Down War Scenarios With China/North Korea! This Doesn’t End Well

Trump: We’ll solve North Korea ourselves

HE’S UNBELIEVABLE! MATTIS JUST SCARED KIM JONG UN TO DEATH WITH THESE 5 WORDS!

THIS CHANGES EVERYTHING! JAPAN IS CONSIDERING ULTIMATE ACT OF WAR AGAINST NORTH KOREA – THIS IS IT!

The Dangerous Tone of US Media and Revisionist History Towards Korea

Why Korea Split Into North and South Korea

Arirang Special M60Ep199 The Untold Story – “The Korean Empire”

 

North Korea state media warns of nuclear strike if provoked as U.S. warships approach

* North Korea media warns of nuclear strike on U.S. if provoked

* U.S. warships head for Korean peninsula

* Trump says North Korea “looking for trouble”

* Russia “really worried” about possible U.S. attack on North (Adds Trump Tweet)

By Sue-Lin Wong

PYONGYANG, April 11 (Reuters) – North Korean state media on Tuesday warned of a nuclear attack on the United States at any sign of U.S. aggression as a U.S. Navy strike group steamed towards the western Pacific.

U.S. President Donald Trump, who has urged China to do more to rein in its impoverished neighbour, said in a Tweet North Korea was “looking for trouble” and the United States would “solve the problem” with or without China’s help.

Tension has escalated sharply on the Korean peninsula with talk of military action by the United States gaining traction following its strikes last week against Syria and amid concerns the reclusive North may soon conduct a sixth nuclear test.

For more news videos visit Yahoo View, available now on iOS and Android.

North Korea’s official Rodong Sinmun newspaper said the country was prepared to respond to any aggression by the United States.

“Our revolutionary strong army is keenly watching every move by enemy elements with our nuclear sight focused on the U.S. invasionary bases not only in South Korea and the Pacific operation theatre but also in the U.S. mainland,” it said.

South Korean acting President Hwang Kyo-ahn warned of “greater provocations” by North Korea and ordered the military to intensify monitoring and to ensure close communication with the United States.

“It is possible the North may wage greater provocations such as a nuclear test timed with various anniversaries including the Supreme People’s Assembly,” said Hwang, acting leader since former president Park Geun-hye was removed amid a graft scandal.

Trump said in a Tweet a trade deal between China and the United States would be “far better for them if they solved the North Korea problem”.

“If China decides to help, that would be great,” he said. “If not, we will solve the problem without them!”

Trump and his Chinese counterpart, Xi Jinping, met in Florida last week and Trump pressed Xi to do more to rein in North Korea.

The North convened a Supreme People’s Assembly session on Tuesday, one of its twice-yearly sessions in which major appointments are announced and national policy goals are formally approved. It did not immediately release details.

But South Korean officials took pains to quell talk in social media of an impending security crisis or outbreak of war.

“We’d like to ask precaution so as not to get blinded by exaggerated assessment about the security situation on the Korean peninsula,” Defence Ministry spokesman Moon Sang-kyun said.

Saturday is the 105th anniversary of the birth of Kim Il Sung, the country’s founding father and grandfather of current ruler, Kim Jong Un.

A military parade is expected in the North’s capital, Pyongyang, to mark the day. North Korea often also marks important anniversaries with tests of its nuclear or missile capabilities in breach of U.N. Security Council resolutions.

Men and women in colourful outfits were singing and dancing on the streets of Pyongyang, illuminated by better lighting than that seen in previous years, apparently practising for the parade planned.

Syrian President Bashar al-Assad sent a message of congratulations to mark the event, lambasting “big powers” for their “expansionist” policy.

“The friendly two countries are celebrating this anniversary and, at the same time, conducting a war against big powers’ wild ambition to subject all countries to their expansionist and dominationist policy and deprive them of their rights to self-determination,” the North’s KCNA news agency quoted the message as saying.

The North’s foreign ministry, in a statement carried by KCNA, said the U.S. navy strike group’s approach showed America’s “reckless moves for invading had reached a serious phase”.

“We never beg for peace but we will take the toughest counteraction against the provocateurs in order to defend ourselves by powerful force of arms and keep to the road chosen by ourselves,” an unidentified ministry spokesman said.

North Korea and the rich, democratic South are technically still at war because their 1950-53 conflict ended in a truce, not a peace treaty. The North regularly threatens to destroy the South and its main ally, the United States.

http://finance.yahoo.com/news/north-korea-state-media-warns-100014004.html

Coming to Terms With the American Empire

APRIL 14, 2015 | 07:54 GMT

 

By George Friedman

“Empire” is a dirty word. Considering the behavior of many empires, that is not unreasonable. But empire is also simply a description of a condition, many times unplanned and rarely intended. It is a condition that arises from a massive imbalance of power. Indeed, the empires created on purpose, such as Napoleonic France and Nazi Germany, have rarely lasted. Most empires do not plan to become one. They become one and then realize what they are. Sometimes they do not realize what they are for a long time, and that failure to see reality can have massive consequences.

World War II and the Birth of an Empire

The United States became an empire in 1945. It is true that in the Spanish-American War, the United States intentionally took control of the Philippines and Cuba. It is also true that it began thinking of itself as an empire, but it really was not. Cuba and the Philippines were the fantasy of empire, and this illusion dissolved during World War I, the subsequent period of isolationism and the Great Depression.

The genuine American empire that emerged thereafter was a byproduct of other events. There was no great conspiracy. In some ways, the circumstances of its creation made it more powerful. The dynamic of World War II led to the collapse of the European Peninsula and its occupation by the Soviets and the Americans. The same dynamic led to the occupation of Japan and its direct governance by the United States as a de facto colony, with Gen. Douglas MacArthur as viceroy.

The United States found itself with an extraordinary empire, which it also intended to abandon. This was a genuine wish and not mere propaganda. First, the United States was the first anti-imperial project in modernity. It opposed empire in principle. More important, this empire was a drain on American resources and not a source of wealth. World War II had shattered both Japan and Western Europe. The United States gained little or no economic advantage in holding on to these countries. Finally, the United States ended World War II largely untouched by war and as perhaps one of the few countries that profited from it. The money was to be made in the United States, not in the empire. The troops and the generals wanted to go home.

But unlike after World War I, the Americans couldn’t let go. That earlier war ruined nearly all of the participants. No one had the energy to attempt hegemony. The United States was content to leave Europe to its own dynamics. World War II ended differently. The Soviet Union had been wrecked but nevertheless it remained powerful. It was a hegemon in the east, and absent the United States, it conceivably could dominate all of Europe. This represented a problem for Washington, since a genuinely united Europe — whether a voluntary and effective federation or dominated by a single country — had sufficient resources to challenge U.S. power.

The United States could not leave. It did not think of itself as overseeing an empire, and it certainly permitted more internal political autonomy than the Soviets did in their region. Yet, in addition to maintaining a military presence, the United States organized the European economy and created and participated in the European defense system. If the essence of sovereignty is the ability to decide whether or not to go to war, that power was not in London, Paris or Warsaw. It was in Moscow and Washington.

The organizing principle of American strategy was the idea of containment. Unable to invade the Soviet Union, Washington’s default strategy was to check it. U.S. influence spread through Europe to Iran. The Soviet strategy was to flank the containment system by supporting insurgencies and allied movements as far to the rear of the U.S. line as possible. The European empires were collapsing and fragmenting. The Soviets sought to create an alliance structure out of the remnants, and the Americans sought to counter them.

The Economics of Empire

One of the advantages of alliance with the Soviets, particularly for insurgent groups, was a generous supply of weapons. The advantage of alignment with the United States was belonging to a dynamic trade zone and having access to investment capital and technology. Some nations, such as South Korea, benefited extraordinarily from this. Others didn’t. Leaders in countries like Nicaragua felt they had more to gain from Soviet political and military support than in trade with the United States.

The United States was by far the largest economic power, with complete control of the sea, bases around the world, and a dynamic trade and investment system that benefitted countries that were strategically critical to the United States or at least able to take advantage of it. It was at this point, early in the Cold War, that the United States began behaving as an empire, even if not consciously.

The geography of the American empire was built partly on military relations but heavily on economic relations. At first these economic relations were fairly trivial to American business. But as the system matured, the value of investments soared along with the importance of imports, exports and labor markets. As in any genuinely successful empire, it did not begin with a grand design or even a dream of one. Strategic necessity created an economic reality in country after country until certain major industries became dependent on at least some countries. The obvious examples were Saudi Arabia or Venezuela, whose oil fueled American oil companies, and which therefore — quite apart from conventional strategic importance — became economically important. This eventually made them strategically important.

As an empire matures, its economic value increases, particularly when it is not coercing others. Coercion is expensive and undermines the worth of an empire. The ideal colony is one that is not at all a colony, but a nation that benefits from economic relations with both the imperial power and the rest of the empire. The primary military relationship ought to be either mutual dependence or, barring that, dependence of the vulnerable client state on the imperial power.

This is how the United States slipped into empire. First, it was overwhelmingly wealthy and powerful. Second, it faced a potential adversary capable of challenging it globally, in a large number of countries. Third, it used its economic advantage to induce at least some of these countries into economic, and therefore political and military, relationships. Fourth, these countries became significantly important to various sectors of the American economy.

Limits of the American Empire

The problem of the American Empire is the overhang of the Cold War. During this time, the United States expected to go to war with a coalition around it, but also to carry the main burden of war. When Operation Desert Storm erupted in 1991, the basic Cold War principle prevailed. There was a coalition with the United States at the center of it. After 9/11, the decision was made to fight in Afghanistan and Iraq with the core model in place. There was a coalition, but the central military force was American, and it was assumed that the economic benefits of relations with the United States would be self-evident. In many ways, the post-9/11 wars took their basic framework from World War II. Iraq War planners explicitly discussed the occupation of Germany and Japan.

No empire can endure by direct rule. The Nazis were perhaps the best example of this. They tried to govern Poland directly, captured Soviet territory, pushed aside Vichy to govern not half but all of France, and so on. The British, on the other hand, ruled India with a thin layer of officials and officers and a larger cadre of businessmen trying to make their fortunes. The British obviously did better. The Germans exhausted themselves not only by overreaching, but also by diverting troops and administrators to directly oversee some countries. The British could turn their empire into something extraordinarily important to the global system. The Germans broke themselves not only on their enemies, but on their conquests as well.

The United States emerged after 1992 as the only global balanced power. That is, it was the only nation that could deploy economic, political and military power on a global basis. The United States was and remains enormously powerful. However, this is very different from omnipotence. In hearing politicians debate Russia, Iran or Yemen, you get the sense that they feel that U.S. power has no limits. There are always limits, and empires survive by knowing and respecting them.

The primary limit of the American empire is the same as that of the British and Roman empires: demographic. In Eurasia — Asia and Europe together — the Americans are outnumbered from the moment they set foot on the ground. The U.S. military is built around force multipliers, weapons that can destroy the enemy before the enemy destroys the relatively small force deployed. Sometimes this strategy works. Over the long run, it cannot. The enemy can absorb attrition much better than the small American force can. This lesson was learned in Vietnam and reinforced in Iraq and Afghanistan. Iraq is a country of 25 million people. The Americans sent about 130,000 troops. Inevitably, the attrition rate overwhelmed the Americans. The myth that Americans have no stomach for war forgets that the United States fought in Vietnam for seven years and in Iraq for about the same length of time. The public can be quite patient. The mathematics of war is the issue. At a certain point, the rate of attrition is simply not worth the political ends.

The deployment of a main force into Eurasia is unsupportable except in specialized cases when overwhelming force can be bought to bear in a place where it is important to win. These occasions are typically few and far between. Otherwise, the only strategy is indirect warfare: shifting the burden of war to those who want to bear it or cannot avoid doing so. For the first years of World War II, indirect warfare was used to support the United Kingdom and the Soviet Union against Germany.

There are two varieties of indirect warfare. The first is supporting native forces whose interests are parallel. This was done in the early stages of Afghanistan. The second is maintaining the balance of power among nations. We are seeing this form in the Middle East as the United States moves between the four major regional powers — Iran, Saudi Arabia, Israel and Turkey — supporting one then another in a perpetual balancing act. In Iraq, U.S. fighters carry out air strikes in parallel with Iranian ground forces. In Yemen, the United States supports Saudi air strikes against the Houthis, who have received Iranian training.

This is the essence of empire. The British saying is that it has no permanent friends or permanent enemies, only permanent interests. That old cliche is, like most cliches, true. The United States is in the process of learning that lesson. In many ways the United States was more charming when it had clearly identified friends and enemies. But that is a luxury that empires cannot afford.

Building a System of Balance

We are now seeing the United States rebalance its strategy by learning to balance. A global power cannot afford to be directly involved in the number of conflicts that it will encounter around the world. It would be exhausted rapidly. Using various tools, it must create regional and global balances without usurping internal sovereignty. The trick is to create situations where other countries want to do what is in the U.S. interest.

This endeavor is difficult. The first step is to use economic incentives to shape other countries’ behavior. It isn’t the U.S. Department of Commerce but businesses that do this. The second is to provide economic aid to wavering countries. The third is to provide military aid. The fourth is to send advisers. The fifth is to send overwhelming force. The leap from the fourth level to the fifth is the hardest to master. Overwhelming force should almost never be used. But when advisers and aid do not solve a problem that must urgently be solved, then the only type of force that can be used is overwhelming force. Roman legions were used sparingly, but when they were used, they brought overwhelming power to bear.

The Responsibilities of Empire

I have been deliberately speaking of the United States as an empire, knowing that this term is jarring. Those who call the United States an empire usually mean that it is in some sense evil. Others will call it anything else if they can. But it is helpful to face the reality the United States is in. It is always useful to be honest, particularly with yourself. But more important, if the United States thinks of itself as an empire, then it will begin to learn the lessons of imperial power. Nothing is more harmful than an empire using its power carelessly.

It is true that the United States did not genuinely intend to be an empire. It is also true that its intentions do not matter one way or another. Circumstance, history and geopolitics have created an entity that, if it isn’t an empire, certainly looks like one. Empires can be far from oppressive. The Persians were quite liberal in their outlook. The American ideology and the American reality are not inherently incompatible. But two things must be faced: First, the United States cannot give away the power it has. There is no practical way to do that. Second, given the vastness of that power, it will be involved in conflicts whether it wants to or not. Empires are frequently feared, sometimes respected, but never loved by the rest of the world. And pretending that you aren’t an empire does not fool anyone.

The current balancing act in the Middle East represents a fundamental rebalancing of American strategy. It is still clumsy and poorly thought out, but it is happening. And for the rest of the world, the idea that the Americans are coming will become more and more rare. The United States will not intervene. It will manage the situation, sometimes to the benefit of one country and sometimes to another.

https://www.stratfor.com/weekly/coming-terms-american-empire

 

History of North Korea

From Wikipedia, the free encyclopedia
For history of Korea before its division, see History of Korea.
Part of a series on the
History of North Korea
Emblem of Emblem of North Korea
Soviet Civil Administration 1945–46
Provisional People’s Committee for North Korea 1946–48
Kim Il-sung’s rule 1948–94
Korean War 1950–53
Korean DMZ Conflict 1966–69
Juche 1972
Death and state funeral of Kim Il-sung 1994
Kim Jong-il’s rule 1994–2011
North Korean famine 1994–98
Songun 1998
Sunshine Policy 1998–2010
Six-party talks 2003
ROKS Cheonan sinking 2010
Death and state funeral of Kim Jong-il 2011
Kim Jong-un’s rule 2011–present
State Affairs Commission 2016
Flag of North Korea.svgNorth Korea portal

The history of North Korea began with the partition of Korea at the end of World War II in 1945, and the creation of the Communist-aligned Democratic People’s Republic of Korea (DPRK) headed by the former guerrilla leader, Kim Il-sung. In 1950 the Korean War broke out. After much destruction, the war ended with the status quo being restored. The DPRK had failed to unify Korea under its leadership, and the US-led United Nations force had failed to conquer North Korea. The peninsula was divided by the Korean Demilitarized Zone, and a US military force remained in South Korea.

Tension between the two sides continued. Kim Il-sung remained in power until his death in 1994. He developed a pervasive personality cult and steered the country on an independent course in accordance with the principle of Juche (or self-reliance). However, with natural disasters and the collapse of the Soviet Bloc in 1991, North Korea went into a severe economic crisis. Kim Il-sung’s son, Kim Jong-il, succeeded him, and was in turn succeeded by his son, Kim Jong-un. Amid international alarm, North Korea developed nuclear missiles.

Northern Korea before the division

From 1910 to the end of World War II, Korea was under Japanese rule. Most Koreans were peasants engaged in subsistence farming.[1] In the 1930s, Japan developed mines, hydro-electric dams, steel mills, and manufacturing plants in northern Korea and neighboring Manchuria.[2] The Korean industrial working class expanded rapidly, and many Koreans went to work in Manchuria.[3] As a result, 65% of Korea’s heavy industry was located in the north, but, due to the harshness of the terrain, only 37% of its agriculture.[4]

A Korean guerrilla movement emerged in the mountainous interior and in Manchuria, harassing the Japanese imperial authorities. One of the most prominent guerrilla leaders was the Communist Kim Il-sung.[5]

Northern Korea had very little exposure to modern, Western ideas.[6] One partial exception of this was the penetration of religion. Since the arrival of missionaries in the late nineteenth century, the northwest of Korea, and Pyongyang in particular, had been a stronghold of Christianity.[7]

Division of Korea

Main article: Division of Korea

At the Tehran Conference in November 1943 and the Yalta Conference in February 1945, the Soviet Union promised to join its allies in the Pacific War within three months of victory in Europe. On August 8, 1945, after three months to the day, the Soviet Union declared war on Japan.[8] Soviet troops advanced rapidly, and the US government became anxious that they would occupy the whole of Korea. On August 10, the US government decided to propose the 38th parallel as the dividing line between a Soviet occupation zone in the north and a US occupation zone in the south. The parallel was chosen as it would place the capital Seoul under American control.[9] The division placed sixteen million Koreans in the American zone and nine million in the Soviet zone.[10] To the surprise of the Americans, the Soviet Union immediately accepted the division. The agreement was incorporated into General Order No. 1 (approved on 17 August 1945) for the surrender of Japan.[11]

Soviet forces began amphibious landings in Korea by August 14 and rapidly took over the north-east of the country, and on August 16 they landed at Wonsan.[12] On August 24, the Red Army reached Pyongyang.[13] US forces did not arrive in the south until September 8.[10]

During August, People’s Committees sprang up across Korea, affiliated with the Committee for the Preparation of Korean Independence, which in September founded the People’s Republic of Korea. When Soviet troops entered Pyongyang, they found a local People’s Committee established there, led by veteran Christian nationalist Cho Man-sik.[14] Unlike their American counterparts, the Soviet authorities recognized and worked with the People’s Committees.[15][16] By some accounts, Cho Man-sik was the Soviet government’s first choice to lead North Korea.[17][18]

On September 19, Kim Il-sung and 36 other Korean Red Army officers arrived in Wonsan. They had fought the Japanese in Manchuria in the 1930s but had lived in the USSR and trained in the Red Army since 1941.[19] On October 14, Soviet authorities introduced Kim to the North Korean public as a guerrilla hero.[19]

In December 1945, at the Moscow Conference, the Soviet Union agreed to a US proposal for a trusteeship over Korea for up to five years in the lead-up to independence. Most Koreans demanded independence immediately, but Kim and the other Communists supported the trusteeship under pressure from the Soviet government. Cho Man-sik opposed the proposal at a public meeting on January 4, 1946, and disappeared into house arrest.[20][21] On February 8, 1946, the People’s Committees were reorganized as Interim People’s Committees dominated by Communists.[22] The new regime instituted popular policies of land redistribution, industry nationalization, labor law reform, and equality for women.[23]

Meanwhile, existing Communist groups were reconstituted as a party under Kim Il-sung’s leadership. On December 18, 1945, local Communist Party committees were combined into the North Korean Communist Party.[19] In August 1946, this party merged with the New People’s Party to form the Workers’ Party of North Korea. In December, a popular front led by the Workers Party dominated elections in the North.[22] In 1949, the Workers’ Party of North Korea merged with its southern counterpart to become the Workers’ Party of Korea with Kim as party chairman.[24]

Kim established the Korean People’s Army (KPA) aligned with the Communists, formed from a cadre of guerrillas and former soldiers who had gained combat experience in battles against the Japanese and later Nationalist Chinese troops. From their ranks, using Soviet advisers and equipment, Kim constructed a large army skilled in infiltration tactics and guerrilla warfare. Before the outbreak of the Korean War, Joseph Stalin equipped the KPA with modern medium tanks, trucks, artillery, and small arms. Kim also formed an air force, equipped at first with ex-Soviet propeller-driven fighter and attack aircraft. Later, North Korean pilot candidates were sent to the Soviet Union and China to train in MiG-15 jet aircraft at secret bases.[25]

In 1946, a sweeping series of laws transformed North Korea on Stalinist lines. The “land to the tiller” reform redistributed the bulk of agricultural land to the poor and landless peasant population, effectively breaking the power of the landed class.[26] This was followed by a “Labor Law”, a “Sexual Equality Law”, and a “Nationalisation of Industry, Transport, Communications and Banks Law”.[27]

Kim Il-sung with Kim Koo in 1948

As negotiations with the Soviet Union on the future of Korea failed to make progress, the US took the issue to the United Nations in September 1947. In response, the UN established the United Nations Temporary Commission on Korea to hold elections in Korea. The Soviet Union opposed this move. In the absence of Soviet co-operation, it was decided to hold UN-supervised elections in the south only.[28] In April 1948, a conference of organizations from the North and the South met in Pyongyang, but conference produced no results. The southern politicians Kim Koo and Kim Kyu-sik attended the conference and boycotted the elections in the South.[29] Both men were posthumously awarded the National Reunification Prize by North Korea.[30] The elections were held in South Korea on May 10, 1948. On August 15, the Republic of Korea formally came into existence.[31] A parallel process occurred in North Korea. A new Supreme People’s Assembly was elected in August 1948, and on September 3 a new constitution was promulgated. The Democratic People’s Republic of Korea (DPRK) was proclaimed on September 9, with Kim as premier.[32] On October 12, the Soviet Union declared that Kim’s regime was the only lawful government on the peninsula.[citation needed] On December 12, 1948, the United Nations General Assembly accepted the report of UNTCOK and declared the Republic of Korea to be the “only lawful government in Korea”.[31]

By 1949, North Korea was a full-fledged Communist state. All parties and mass organizations joined the Democratic Front for the Reunification of the Fatherland, ostensibly a popular front but in reality dominated by the Communists. The government moved rapidly to establish a political system that was partly styled on the Soviet system, with political power monopolised by the Worker’s Party of Korea (WPK).

The Korean War (1950-1953)

Main article: Korean War

The consolidation of Syngman Rhee‘s government in the South with American military support and the suppression of the October 1948 insurrection ended North Korean hopes that a revolution in the South could reunify Korea, and from early 1949 Kim Il-sung sought Soviet and Chinese support for a military campaign to reunify the country by force. The withdrawal of most U.S. forces from South Korea in June 1949 left the southern government defended only by a weak and inexperienced South Korean army. The southern régime also had to deal with a citizenry of uncertain loyalty. The North Korean army, by contrast, had benefited from the Soviet Union‘s WWII-era equipment, and had a core of hardened veterans who had fought either as anti-Japanese guerrillas or alongside the Chinese Communists.[33] In 1949 and 1950 Kim traveled to Moscow with the South Korean Communist leader Pak Hon-yong to raise support for a war of reunification.[34]

InitiallyJoseph Stalin rejected Kim Il-sung’s requests for permission to invade the South, but in late 1949 the Communist victory in China and the development of Soviet nuclear weapons made him re-consider Kim’s proposal. In January 1950, after China’s Mao Zedong indicated that the People’s Republic of China would send troops and other support to Kim, Stalin approved an invasion.[35] The Soviets provided limited support in the form of advisers who helped the North Koreans as they planned the operation, and Soviet military instructors to train some of the Korean units. However, from the very beginning Stalin made it clear that the Soviet Union would avoid a direct confrontation with the U.S. over Korea and would not commit ground forces even in case of major military crisis.[36] The stage was set for a civil war between the two rival régimes on the Korean peninsula.

For over a year before the outbreak of war, the two sides had engaged in a series of bloody clashes along the 38th parallel, especially in the Ongjin area on the west coast.[37] On June 25, 1950, claiming to be responding to a South Korean assault on Ongjin, the Northern forces launched an amphibious offensive all along the parallel.[38] Due to a combination of surprise and military superiority, the Northern forces quickly captured the capital Seoul, forcing Syngman Rhee and his government to flee. By mid-July North Korean troops had overwhelmed the South Korean and allied American units and forced them back to a defensive line in south-east South Korea known as the Pusan Perimeter. During its brief occupation of southern Korea, the DPRK regime initiated radical social change, which included the nationalisation of industry, land reform, and the restoration of the People’s Committees.[39]According to the captured US General William F. Dean, “the civilian attitude seemed to vary between enthusiasm and passive acceptance”.[40][41]

The United Nations condemned North Korea’s actions and approved an American-led intervention force to defend South Korea. In September, UN forces landed at Inchon and retook Seoul. Under the leadership of US General Douglas Macarthur, UN forces pushed north, reaching the Chinese border. According to Bruce Cumings, the North Korean forces were not routed, but managed a strategic retreat into the mountainous interior and into neighboring Manchuria.[42] Kim Il-sung’s government re-established itself in a stronghold in Chagang Province.[43] In late November, Chinese forces entered the war and pushed the UN forces back, retaking Pyongyang in December 1950 and Seoul in January 1951. According to Bruce Cumings, the Korean People’s Army played an equal part in this counterattack.[44] UN forces managed to retake Seoul for South Korea. The war essentially became a bloody stalemate for the next two years.

2012 rehearsal in Pyongyang for Victory Day, marking the end of the war

American bombing included the use of napalm against populated areas and the destruction of dams and dykes, which caused devastating floods.[45][46] China and North Korea also alleged the US was deploying biological weapons.[47] As a result of the bombing, almost every substantial building and much of the infrastructure in North Korea was destroyed.[48][49] The North Koreans responded by building homes, schools, hospitals, and factories underground.[50] Economic output in 1953 had fallen by 75-90% compared with 1949.[51]

While the bombing continued, armistice negotiations, that had commenced in July 1951, wore on. North Korea’s lead negotiator was General Nam Il. The Korean Armistice Agreement was signed on July 27, 1953. A ceasefire followed, but there was no peace treaty, and hostilities continued at a lower intensity.[52]

Postwar developments

Internal politics

Despite the failure of his attempt at unifying the nation under his rule, Kim Il-sung considered the war a victory in the sense that he remained in power. As a result, the North Korean media made the most of it by focusing entirely on the defeats suffered by the US and UN forces during the failed invasion of North Korea in late 1950. The armistice was celebrated in Pyongyang with a military parade in which Kim declared: “Despite their best efforts, the imperialist invaders were defeated with great loss in men and material.”[citation needed]

Kim began gradually consolidating his power. Up to this time, North Korean politics were represented by four factions: the Yan’an faction, made up of returnees from China; the “Soviet Koreans” who were ethnic Koreans from the USSR; native Korean communists led by Pak Hon-yong; and Kim’s Kapsan group who had fought guerrilla actions against Japan in the 1930s.[53][54]

When the Worker’s Party Central Committee plenum opened on 30 August 1953 Choe Chang-ik made a speech attacking Kim for concentrating the power of the party and the state in his own hands as well as criticising the party line on industrialisation which ignored widespread starvation among the North Korean people. However, Kim neutralised the attack on him by promising to moderate the regime, promises which were never kept. The majority in the Central Committee voted to support Kim and also voted in favour of expelling Choe and Pak Hon-yong from the Central Committee. Eleven of Kim’s opponents were convicted in a show trial. It is believed that all were executed. A major purge of the KWP followed, with members originating from South Korea being expelled.[55]

Pak Hon-yong, party vice chairman and Foreign Minister of the DPRK, was blamed for the failure of the southern population to support North Korea during the war, was dismissed from his positions in 1953, and was executed after a show-trial in 1955.[56][57] Most of the South Korean leftists and communist sympathizers who defected to the North in 1945–1953 were also accused of espionage and other crimes, and subsequently killed, imprisoned, or exiled to remote agricultural and mining villages. Potential rivals from other groups such as Kim Tu-bong were also purged.[citation needed]

The Party Congress in 1956 indicated the transformation that the party had undergone. Most members of other factions had lost their positions of influence. More than half the delegates had joined after 1950, most were under 40 years old, and most had limited formal education.[58]

In February 1956, Soviet leader Nikita Khrushchev made a sweeping denunciation of Stalin, which sent shock waves throughout the Communist world. Encouraged by this, members of the party leadership in North Korea began to criticize Kim’s dictatorial leadership, personality cult, and Stalinist economic policies. They were defeated by Kim at the August Plenum of the party.[59][60] By 1960, 70 per cent of the members of the 1956 Central Committee were no longer in politics.[61]

Kim Il-sung had initially been criticized by the Soviets during a previous 1955 visit to Moscow for practicing Stalinism and a cult of personality, which was already growing enormous. The Korean ambassador to the USSR, Li Sangjo, a member of the Yan’an faction, reported that it had become a criminal offense to so much as write on Kim’s picture in a newspaper and that he had been elevated to the status of Marx, Lenin, Mao, and Stalin in the communist pantheon. He also charged Kim with rewriting history to appear as if his guerrilla faction had single-handedly liberated Korea from the Japanese, completely ignoring the assistance of the Chinese Communist Party. In addition, Li stated that in the process of agricultural collectivization, grain was being forcibly confiscated from the peasants, leading to “at least 300 suicides” and that Kim made nearly all major policy decisions and appointments himself. Li reported that over 30,000 people were in prison for completely unjust and arbitrary reasons as trivial as not printing Kim Il-sung’s portrait on sufficient quality paper or using newspapers with his picture to wrap parcels. Grain confiscation and tax collection were also conducted forcibly with violence, beatings, and imprisonment.[62] During Kim Il-sung’s Moscow visit, the Soviets recommended that he discard the personality cult, adhere to the ideas of collective leadership, remove falsified history accounts from textbooks, and work towards improving the living standards of the Korean people, which remained poor and below prewar standards. Foodstuffs during the initial postwar period were rationed and extremely expensive, as were consumer items. By comparison, South Korea, which had less of an industrial base than the DPRK, had a better food supply and was also flooded with American goods although it should be noted that the overall destruction there during the war was smaller.[citation needed]

In late 1968, known military opponents of North Korea’s Juche ideology such as Kim Chang-bong (minister of National Security), Huh Bong-hak (chief of the Division for Southern Intelligence) and Lee Young-ho(commander in chief of the DPRK Navy) were purged as anti-party/counter-revolutionary elements, despite their credentials as anti-Japanese guerrilla fighters in the past.[55]

Kim’s personality cult was modeled on Stalinism and his regime originally acknowledged Stalin as the supreme leader. After Stalin’s death in 1953, however, Kim was described as the “Great Leader” or “Suryong”. As his personality cult grew, the doctrine of Juche (or self-reliance) began to displace Marxism–Leninism. At the same time the cult extended beyond Kim himself to include his family in a revolutionary blood line.[63] In 1972, to celebrate Kim Il-sung’s birthday, the Mansu Hill Grand Monument was unveiled, including a 22-meter bronze statue of him.[64]

International relations

Like Mao in China, Kim Il-sung refused to accept Nikita Khrushchev‘s denunciation of Stalin and continued to model his regime on Stalinist norms.[65][66] At the same time, he increasingly stressed Korean independence, as embodied in the concept of Juche.[67] Kim told Alexei Kosygin in 1965 that he was not anyone’s puppet and “We…implement the purest Marxism and condemn as false both the Chinese admixtures and the errors of the CPSU”.[68]

Relations with China had worsened during the war. Mao Zedong criticized Kim for having started the whole “idiotic war” and for being an incompetent military commander who should have been removed from power. PLA commander Peng Dehuai was equally contemptuous of Kim’s skills at waging war.[69]

By some analysis, Kim Il-sung remained in power partially because the Soviets turned their attention to the Hungarian Revolution of 1956 that fall.[70] The Soviets and Chinese were unable to stop the inevitable purge of Kim’s domestic opponents or his move towards a one-man Stalinist autocracy and relations with both countries deteriorated in the former’s case because of the elimination of the pro-Soviet Koreans and the latter because of the regime’s refusal to acknowledge Chinese assistance in either liberation from the Japanese or the war in 1950-53.[71]

Stalin continued to be honored in North Korea long after his death in 1953, and a street in Pyongyang bore his name until 1980. By contrast, neighboring Chinese leader Mao Zedong was mostly ignored and Kim Il-sung rejected most of his policies such as the Hundred Flowers Campaign and (later) the Cultural Revolution.[citation needed]

The captured USS Pueblo being visited by tourists in Pyongyang

Tensions between North and South escalated in the late 1960s with a series of low-level armed clashes known as the Korean DMZ Conflict. In 1966, Kim declared “liberation of the south” to be a “national duty”.[72] In 1968, North Korean commandos launched the Blue House Raid, an unsuccessful attempt to assassinate the South Korean President Park Chung-hee. Shortly after, the US spy ship Pueblo was captured by the North Korean navy.[73] The crew were held captive throughout the year despite American protests that the vessel was in international waters and finally released in December after a formal US apology was issued.[74] In April 1969 North Korea shot down an EC-121 aircraft, killing everyone on board. The Nixon administration found itself unable to react at all, since the US was heavily committed in Vietnam and had no troops to spare if the situation in Korea escalated. However, the Pueblo capture and EC-121 shootdown did not find approval in Moscow, as the Soviet Union did not want a second major war to erupt in Asia. China’s response to the USS Pueblo crisis is less clear.[75]

After Khrushchev was replaced by Leonid Brezhnev as Soviet Leader in 1964, and with the incentive of Soviet aid, North Korea strengthened its ties with the USSR. Kim condemned China’s Cultural Revolution as “unbelievable idiocy”. In turn, China’s Red Guards labelled him a “fat revisionist”.[76][77] But by 1970, most of the storm clouds of the Cultural Revolution had blown away and relations with China quickly returned to normal. Chinese premier Zhou Enlai visited Pyongyang that year and apologized for the attacks made on Kim by the Red Guards. At the same time, the Soviets were again criticized by both Chinese and North Korean officials for being too soft on the United States. The Cultural Revolution was now viewed in North Korea as an excellent idea and “completely correct”.

In 1972, the first formal summit meeting between Pyongyang and Seoul was held, but the cautious talks did not lead to a lasting change in the relationship.[78]

With the fall of South Vietnam to the North Vietnamese on April 30, 1975, Kim Il-sung began to feel that the US had shown its weakness and that reunification of Korea under his regime was finally possible. Kim visited Beijing in May 1975 in the hope of gaining political and military support for this plan to invade South Korea again, but Mao Zedong refused.[79] Despite public proclamations of support, Mao privately told Kim that China would be unable to assist North Korea this time because of the lingering after-effects of the Cultural Revolution throughout China, and also because Mao had recently decided to restore diplomatic relations with the US. Afterwards, Kim went home empty-handed.[80]

Meanwhile, North Korea emphasized its independent orientation by joining the Non-Aligned Movement in 1975.[81] It promoted Juche as a model for developing countries to follow.[82] It developed strong ties with the regimes of Bokassa in the Central African Republic, Macias Nguema in Equatorial Guinea, Idi Amin in Uganda, Pol Pot in Cambodia, Gaddafi in Libya, and Ceausescu in Romania.[83]

Economic development

Reconstruction of the country after the war proceeded with extensive Chinese and Soviet assistance.[84][85] Koreans with experience in Japanese industries also played a significant part.[86]Land was collectivized between 1953 and 1958. Resistance appears to have been minimal as landlords had been eliminated by the earlier reforms or during the war.[87]

Although developmental debates took place within the Workers’ Party of Korea in the 1950s, North Korea, like all the postwar communist states, undertook massive state investment in heavy industry, state infrastructure and military strength, neglecting the production of consumer goods.[71]

The first Three Year Plan (1954–1956) introduced the concept of Juche or self-reliance.[88] The first Five Year Plan (1957-1961) consolidated the collectivization of agriculture and initiated mass mobilizations campaigns: the Chollima Movement, the Chongsan-ni system in agriculture and the Taean Work System in industry.[88][89] The Chollima Movement was influenced by China’s Great Leap Forward, but did not have its disastrous results.[88]Industry was fully nationalized by 1959.[90] Taxation on agricultural income was abolished in 1966.[91]

North Korea was placed on a semi-war footing, with equal emphasis being given to the civilian and military economies. This was expressed in the 1962 Party Plenum by the slogan, “Arms in one hand and a hammer and sickle in the other!”[92] At a special party conference in 1966, members of the leadership who opposed the military build-up were removed.[93]

On the ruins left by the war, North Korea had built an industrialized command economy. Che Guevara, then a Cuban government minister, visited North Korea in 1960, and proclaimed it a model for Cuba to follow. In 1965, the British economist Joan Robinson described North Korea’s economic development as a “miracle”.[94][95] As late as the 1970s, its GDP per capita was estimated to be equivalent to South Korea’s.[96][97][98][99] By 1968, all homes had electricity, though the supply was unreliable.[100] By 1972, all children from age 5 to 16 were enrolled in school, and over 200 universities and specialized colleges had been established.[101][102] By the early 1980s, 60–70% of the population was urbanized.[103]

Decline and crisis

North Korean village in the Yalu River delta

In the 1970s, expansion of North Korea’s economy, with the accompanying rise in living standards, came to an end.[104] Compounding this was a decision to borrow foreign capital and invest heavily in military industries. North Korea’s desire to lessen its dependence on aid from China and the Soviet Union prompted the expansion of its military power, which had begun in the second half of the 1960s. The government believed such expenditures could be covered by foreign borrowing and increased sales of its mineral wealth in the international market. North Korea invested heavily in its mining industries and purchased a large quantity of mineral extraction infrastructure from abroad. It also purchased entire petrochemical, textile, concrete, steel, pulp and paper manufacturing plants from the developed capitalist world.[105] This included a Japanese-Danish venture that provided North Korea with the largest cement factory in the world.[106] However, following the world 1973 oil crisis, international prices for many of North Korea’s native minerals fell, leaving the country with large debts and an inability to pay them off and still provide a high level of social welfare to its people. North Korea began to default in 1974 and halted almost all repayments in 1985. As a result, it was unable to pay for Western technology.[107]

Worsening this already poor situation, the centrally planned economy, which emphasized heavy industry had reached the limits of its productive potential in North Korea. Juche’s repeated demands that North Koreans learn to build and innovate domestically had run its course as had the ability of North Koreans to keep technological pace with other industrialized nations. By the mid to late-1970s some parts of the capitalist world, including South Korea, were creating new industries based around computers, electronics, and other advanced technology in contrast to North Korea’s Stalinist economy of mining and steel production.[108] Migration to urban areas stalled.[109]

Despite the emerging economic problems, the regime invested heavily on prestigious projects, such as the Juche Tower, the Nampo Dam, and the Ryugyong Hotel. In 1989, as a response to the 1988 Seoul Olympics it held the 13th World Festival of Youth and Students in Pyongyang.[110][111] In fact, the grandiosity associated with the regime and its personality cult, as expressed in monuments, museums, and events, has been identified as a factor in the economic decline.[112]

In 1984 Kim visited Moscow during a grand tour of the USSR where he met Soviet leader Konstantin Chernenko. Kim also made public visits to East Germany, Czechoslovakia, Poland, Hungary, Romania, Bulgaria and Yugoslavia. Soviet involvement in the North Korean economy increased, until 1988 when bilateral trade peaked at US$2.8 billion.[113] In 1986, Kim met the incoming Soviet leader Mikhail Gorbachev and received a pledge of support.[114]

However, Gorbachev’s reforms and diplomatic initiatives, the Chinese economic reforms starting in 1979, and the collapse of the Eastern Bloc from 1989 to 1991 increased North Korea’s isolation.[115] The leadership in Pyongyang responded by proclaiming that the collapse of the Eastern Bloc demonstrated the correctness of the policy of Juche.[116]

The collapse of the Soviet Union in 1991 deprived North Korea of its main source of economic aid, leaving China as the isolated regime’s only major ally. Without Soviet aid, North Korea’s economy went into a free-fall. By this time in the early 1990s, Kim Jong-il was already conducting most of the day-to-day activities of running of the state. Meanwhile, international tensions were rising over North Korean’s quest for nuclear weapons. Former US president Jimmy Carter made a visit to Pyongyang in June 1994 in which he met with Kim and returned proclaiming that he had resolved the crisis.[117]

Succession by Kim Jong-il

Portraits of Kim Il-sung and his son and successor Kim Jong-il

Kim Il-sung died from a sudden heart attack on July 8, 1994, three weeks after the Carter visit. His son, Kim Jong-il, who had already assumed key positions in the government, succeeded as General-Secretary of the Korean Workers’ Party. At that time, North Korea had no secretary-general in the party nor a president. Minimal legal procedure that had been established was summarily ignored. Although a new constitution appeared to end the war-time political system, it did not completely terminate the transitional military rule. Rather it legitimized and institutionalized military rule by making the National Defense Commission (NDC) the most important state organization and its chairman the highest authority. After three years of consolidating his power, Kim Jong-il became Chairman of the NDC on October 8, 1997, a position described by the NDC as the nation’s “highest administrative authority,” and thus North Korea’s de facto head of state. His succession had been foreshadowed in 1980, when he was introduced to the public at the Sixth Party Congress.[118] In 1982, Kim Jong-il had established himself as a leading theoretician with the publication of On the Juche Idea.[119] In 1984, he had been officially confirmed as his father’s successor.[120]

Meanwhile, the economy was in steep decline. In 1990-1995, foreign trade was cut in half, with the loss of subsidized Soviet oil being particularly keenly felt. The crisis came to a head in 1995 with widespread flooding that destroyed crops and infrastructure, leading to a famine that lasted till 1998.[121] At the same time, there appeared to be little significant internal opposition to the regime. Indeed, a great many of the North Koreans fleeing to China because of famine still showed significant support for the government as well as pride in their homeland. Many of these people reportedly returned to North Korea after earning sufficient money.[122]

In 1998 the government announced a new policy called “Songun“, or “Military First”. This suggested that the Korean People’s Army was now more powerful than the Korean Workers’ Party.[123]

President Kim Dae-jung of South Korea actively attempted to reduce tensions between the two Koreas under the Sunshine Policy, but this produced few immediate results. Since the election of George W. Bush as the President of the United States in 2000, North Korea has faced renewed external pressure over its nuclear program, reducing the prospect of international economic assistance.

In 2002, Kim Jong-il declared that “money should be capable of measuring the worth of all commodities”, followed by some small market-oriented measures, and the creation of the Kaesong Industrial Region with transport links to South Korea was announced.[citation needed] Experiments are under way to allow factory managers to fire underperforming workers and give bonuses. China’s investments increased to $200 million in 2004.[citation needed]

On October 9, 2006, North Korea has announced that it had successfully detonated a nuclear device underground at 10:36 am local time without any radiation leak. An official at South Korea’s seismic monitoring center confirmed a magnitude-3.6 tremor felt at the time North Korea said it conducted the test was not a natural occurrence.[124]

Additionally, North Korea was running a missile development program. In 1998, North Korea tested a Taepondong-1 Space Launch Vehicle, which successfully launched but failed to reach orbit. On July 5, 2006, they tested a Taepodong-2 ICBM that reportedly could reach the west coast of the U.S. in the 2-stage version, or the entire U.S. with a third stage. However, the missile failed shortly after launch, so it is unknown what its exact capabilities are or how close North Korea is to perfecting the technology.

North Korea’s advancements in weapons technology appear to give them leverage in ongoing negotiations with the United Nations and other countries. On February 13, 2007, North Korea signed an agreement with South Korea, the United States, Russia, China, and Japan, which stipulated North Korea would shut down itsYongbyon nuclear reactor in exchange for economic and energy assistance. However, in 2009 the North continued its nuclear test program.

In 2010, the sinking of a South Korean naval ship, the Cheonan, reportedly by a North Korean torpedo, escalated tensions between North and South.

Current situation

A computer lab classroom in the Grand People’s Study House, Pyongyang, 2012

Kim Jong-Il died on December 17, 2011[125] and was quickly succeeded by his son, Kim Jong-un. Tensions between North Korea and other countries increased due to its rocket launches and nuclear bomb testing, and UN sanctions have been tightened.

In 2014, the United Nations Commission of Inquiry accused the government of crimes against humanity.[126]

In 2015, North Korea adopted Pyongyang Standard Time (UTC+08.30), reversing the change to Japan Standard Time (UTC+9.00) which had been imposed by the Japanese Empire. As a result, North Korea was in a different time zone from South Korea.[127]

The 7th Congress of the Workers’ Party of Korea was held in 2016, where Kim Jong-Un further consolidated his control and power within the Workers’ Party of Korea and country.

See also

https://en.wikipedia.org/wiki/History_of_North_Korea

 Story 2: Attorney General Sessions Enforces Immigration Law — Videos

Sessions Outlines Border Enforcement Plan

Arizona sheriff reacts to the illegal immigration crackdown

Watch: Attorney General Jeff Sessions speaks at U.S.-Mexico Border

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 870-871

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 869, April 7, 2017, Story 1: Trump Imperial Presidency of The American Empire –Trump Just Another Progressive Global Interventionist Not An American First Nationalist –Another Undeclared War — 59 Tomhawk Cruise Missiles Attack al Shayrat Airbase Destroying 6 Aircraft and One Runway — Videos — Story 2: What is Next? United States Led Coalition of Egypt, Jordan, Kurds, Saudi Arabia, and Turkey to Destroy Islamic State, Jabhat Al Nustra Front ( al-Qaeda’s Syrian affiliate), Radical Islamic Terrorist Jihadists in Syria, Hezbollah, and Bashar al-Assad Syrian Regime –Videos — Story 3: Supreme Court Justice Neil Gorsuch Confirmed 54 Yes — 45 No — Videos

Posted on April 7, 2017. Filed under: American History, Blogroll, Breaking News, Chemical Explosion, Congress, Countries, Donald J. Trump, Donald Trump, Egypt, European History, European Union, Foreign Policy, France, Government, Government Dependency, Government Spending, Great Britain, History, House of Representatives, Illegal Immigration, Immigration, Independence, Iraq, Islamic Republic of Iran, Islamic State, Israel, Israel, Italy, Jordan, Language, Libya, Lying, Middle East, Natural Gas, News, Oil, Philosophy, Photos, President Barack Obama, President Trump, Qatar, Radio, Rand Paul, Raymond Thomas Pronk, Resources, Rule of Law, Russia, Senate, Spying, Surveillance and Spying On American People, Syria, Technology, Terror, Terrorism, Turkey, United Kingdom, United States of America, Videos, Violence, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Image result for al-Shayrat air base

Image result for al-Shayrat air base

Image result for al-Shayrat air baseImage result for al-Shayrat air baseImage result for al sharat air field syria aerial viewImage result for al-Shayrat air baseImage result for al-Shayrat air baseImage result for number killed in syrian civil WARImage result for branco cartons trump war syriaImage result for branco cartons trump war syriaImage result for branco cartons trump war syria

Image result for branco cartons trump war syriaImage result for branco cartons trump war syriaImage result for al-Shayrat air baseImage result for al sharat air field syria aerial viewImage result for Syria Chemical AttackImage result for Syria Chemical Attack

Image result for Syria Chemical Attack

Image result for Syria Chemical AttackImage result for al-Nusra FrontImage result for al-Nusra Front chemical gas
Image result for al-Nusra Front

Image result for al-Nusra FrontImage result for al-Nusra FrontImage result for al-Nusra Front chemical gas

Image result for Syria Chemical Attack

Image result for Syria Chemical Attack

Image result for Syria Chemical AttackImage result for al-Nusra Front chemical gas

Image result for al-Nusra Front chemical gas

SYRIA FALSE FLAG LEADS TO WAR – Ron Paul

The world reacts to the strikes against Syria

Gen. Jack Keane reacts to US airstrikes in Syria

Mark Steyn: Trump hit a reset button for the world

President Trump’s Syria policy raises concerns

Sen. Paul: We didn’t have the debate, we simply went to war

A look at the intel that led to US strike on Syrian airbase

US Strikes Syria: Chemical attack not the first in Syrian civil war

Marco Rubio: President had legal, moral authority to attack

Israeli PM Netanyahu ‘fully supports’ US strike on Syria

President Trump Orders U.S. Airstrike on Syria

Trump turns on Assad: How will US strikes impact war in Syria? (part 1)

BREAKING! WE’RE AT WAR! TRUMP JUST LAUNCHED A MASSIVE STRIKE AGAINST SYRIA WW3 HAS BEGUN!!!

Issue Analysis: Trump, Assad, Syria, China, North Korea, UN Resolutions, Russia and What’s Next?

President Donald Trump Bombs Syria

Syria Chemical Attack: Push For Ousting Bashar al-Assad

Seymour Hersh: Obama “Cherry-Picked” Intelligence on Syrian Chemical Attack to Justify U.S. Strike

Global Empire – The World According to Seymour Hersh [Part Two]

Global Empire – The World According to Seymour Hersh [Part One]

Turkey’s interests in the Syrian civil war

Saudi Arabia’s role in the Syrian civil war

Why Do Saudi Arabia And Iran Hate Each Other?

TURKEY vs SYRIA Military Power Comparison | Turkish Army VS Syrian Arab Army | 2016

Image result for phosgene posters

Toxicity of Phosgene with Audio

FSA use poison gas on SAA and Syrian people supplied by Turkey

Phosgene Exposure

Gas warfare in the First World War

What is Sarin Gas?

Published on Sep 7, 2013

Hank discusses the chemistry of sarin, the nerve agent that killed more than 1400 people in a chemical weapons attack in Syria.

Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/artist/52/SciShow

AMERICA’S TOP GENERAL JUST GAVE TRUMP SOMETHING THAT WILL SCARE NORTH KOREA TO DEATH!

Published on Apr 7, 2017

Sub for more: http://nnn.is/the_new_media | Danny Gold for Liberty Writers reports, Anyone who has been watching the news recently is sure to have heard all about North Korea and their nukes. They also know President Donald Trump is NOT happy about it and he and Mattis are ready to STRIKE BACK!

 

Why did Donald Trump strike al-Shayrat air base?

An aerial view of the al-Shayrat Airfield near Homs, Syria, 07 October 2016
An aerial view of the al-Shayrat Airfield near Homs, Syria, 07 October 2016 CREDIT: US DEPARTMENT OF DEFENCE HANDUT

The strike on al-Shayrat air base near the western Syrian city of Homs was both a symbolic and a tactical one.

The airfield is not just a valuable military target, it is also the one from which the Syrian government launched its chemical attack on Tuesday.

Donald Trump had intended the raid as a direct retaliation. 

Shayrat is one of the largest and most active Syrian Air Force bases, which has served as the nerve centre of its missions against rebels in Homs, as well as Palmyra, where government forces have been battling Islamic State of Iraq and the Levant (Isil).

Watch | Donald Trump: Syria strike in ‘vital’ US interest

However, it is believed that the US gave advance warning of the missile strike to Russia, which gave the Syrian military some time to move most of its assets to another base.

The Russians, who intervened militarily on behalf of the Bashar al-Assad regime in October 2015, have aircraft stationed at bases across Syria and the US could not risk accidentally hitting one.

Russia reportedly reinforced the base and built additional runways before beefing up its operations there.

Maj Gen. Igor Konashenkov, Russian defense ministry spokesman, reported on Friday that only 23 of the 59 Tomahawk cruise missiles reached the air base.

The raid damaged one of its two runways, according to pictures shared on social media which also showed severe fire damage to other parts of the base.

Rami Adbulrahman, director of UK-based Syrian Observatory for Human Rights monitor said he was told 90 per cent of the base was destroyed and senior airforce commander, Brigadier Khalil Issa Ibrahim, was among the seven reported killed.

Before 2013 the base was used to store chemical weapons but nothing was targeted that could have contained them now.

It was believed there may have been sarin gas stored in one warehouse but that was avoided.

Maj Konashenkov said they destroyed six MiG-23 fighter jets of the Syrian air force which were under repairs, but did not damage other warplanes.

A former pilot who was stationed at Shayrat before he defected said Shayrat could hold up to 45 aircraft and that had they all been hit it would have had a major impact on the Syrian military’s strike capacity.

The mayor of Homs criticised the strikes, saying they only aided terrorists as the base was the main operations centre for carrying out strikes against Isil.

Fares Shehabi, an MP for Aleppo, posted on Twitter: “Trump attacked an airport solely dedicated to fighting ISIS in central Syria and providing aid to besieged civilians in Deir Ezzor.”

http://www.telegraph.co.uk/news/2017/04/07/did-donald-trump-strike-al-shayrat-air-base/

Jumping to conclusions; something is not adding up in Idlib chemical weapons attack

70

BEIRUT, LEBANON (4:47 P.M.) – At least 58 people were killed in a horrific gas attack in the Idlib Governorate this morning. However, even before investigations could be conducted and for evidence to emerge, Federica Mogherini, the Italian politician High Representative of the European Union (EU) for Foreign Affairs and Security Policy, condemned the Syrian government stating that the “Assad regime bears responsibility for ‘awful’ Syria ‘chemical’ attack.”

The immediate accusation from a high ranking EU official serves a dangerous precedent where public outcry can be made even before the truth surrounding the tragedy can emerge

Israeli President, Benjamin Netanyahu, joined in on the condemnation, as did Amnesty International.

Merely hours after the alleged chemical weapons attack in Khan Sheikhun, supposedly by the Syrian government, holes are beginning to emerge from opposition sources, discrediting the Al-Qaeda affiliated White Helmets claims.

For one, seen in the above picture, the White Helmets are handling the corpses of people without sufficient safety gear, most particularly with the masks mostly used , as well as no gloves. Although this may seem insignificant, understanding the nature of sarin gas that the opposition claim was used, only opens questions.

Within seconds of exposure to sarin, the affects of the gas begins to target the muscle and nervous system. There is an almost immediate release of the bowels and the bladder, and vomiting is induced. When sarin is used in a concentrated area, it has the likelihood of killing thousands of people. Yet, such a dangerous gas, and the White Helmets are treating bodies with little concern to their exposed skin. This has to raise questions.

It also raises the question why a “doctor” in a hospital full of victims of sarin gas has the time to tweet and make video calls. This will probably be dismissed and forgotten however.

Terrorist Mohammed Alloush is not a gas expert, he is just one of the participants in the crime https://twitter.com/maytham956/status/849235559117619201 

@maytham956 Hmm…’Patients are flooding in’ YET this ‘doctor’ (seems the main source of ‘gas attack’) has time to film, tweet and videocalls… pic.twitter.com/SfLOfjE2pG

View image on Twitter

It is known that about 250 people from Majdal and Khattab were kidnapped by Al-Qaeda terrorists last week. Local sources have claimed that many of those dead from the chemical weapons were those from Majdal and Khattab.

ALSO READ  In Video | ISIS Hunters secure gas fields in east Palmyra

This would suggest that on the eve of upcoming peace negotiations, terrorist forces have once again created a false flag scenario. This bares resemblance to the Ghouta chemical weapons attack in 2013 where the Syrian Army was accused of using the weapons of mass destruction on the day that United Nations Weapon’s Inspectors arrived in Damascus.

Later, in a separate chemical weapon usage allegation, Carla del Ponte, a UN weapons inspector said that there was no evidence that the government had committed the atrocity. This had however not stopped the calls for intervention against the Syrian government, a hope that the militant forces wished to eventuate from their use of chemical weapons against civilians in Khan-al-Assal.

Therefore, it is completely unsurprising that Orient TV has already prepared a “media campaign” to cover the Russian and Syrian airstrikes in Hama countryside against terrorist forces, with the allegations that the airforces have been using chemical weapons. And most telling, there announcement of covering the use of chemical weapons by the Syrian government, hours before this allegation even emerged…….. Seems like someone forgot to tell him that it would not occur for a few more hours before his tweet.

Orient TV reporter :
“tomorrow we are launching a media campaign to cover the airstrikes on Hama country side including the usage of CW”

Meanwhile, pick up  trucks have been photographed around bodies of those killed. Again, it must be questioned why there are people around sarin gas without any protective gear, and not affected at all when it can begin attacking the body within seconds? Also, the pick up trucks remain consistent to what local sources have said that many of those dead were kidnapped by Al-Qaeda terrorists from pro-government towns in rural Hama.

ALSO READ  Update from Syrian airbase targeted by US missiles

Also, what is brought into question is where the location of the hose is coming from in the below picture, a dugout carved into the rock. This also suggests that the location is at a White Helmets base where there are dug out hiding spots carved into the mountainside and where they have easy access to equipment, as highlighted by Twitter user Ian Grant.

In response to the allegations, the Syrian Arab Army soldiers in northern Hama denied the use of chemicals weapons today. This is consistent with the Russian Ministry of Defense who denied any involvement in the attack.

The army “has not and does not use them, not in the past and not in the future, because it does not have them in the first place,” a military source said.

And this of course begs the question. With the Syrian Army and its allies in a comfortable position in Syria, making advances across the country, and recovering lost points in rural Hama, why would they now resort to using chemical weapons? It is a very simple question with no clear answer. It defies any logic that on the eve of a Syria conference in Brussels and a week before peace negotiations are to resume, that the Syrian government would blatantly use chemical weapons. All evidence suggests this is another false chemical attack allegation made against the government as seen in the Khan-al-Assal 2013 attack where the terrorist groups hoped that former President Obama’s “red-line” would be crossed leading to US-intervention in Syria against the government.

Most telling however, is that most recent report shows that the government does not deny striking Khan Sheikhun. Al-Masdar’s Yusha Yuseef was informed by the Syrian Army that the air force targeted a missile factory in Khan Sheikoun, using Russian-manufactured Su-22 fighter jet to carry out the attack. Most importantly, the Su-22’s bombs are unique and cannot be filled with any chemical substances, which is different than bombs dropped from attack helicopters. Yuseef was then told that the Syrian Air Force did not know there were any chemical substances inside the missile factory in Khan Sheikhoun. It remains to be known whether there actually were chemicals in the missile factory targeted by the airstrikes, or whether the terrorist forces used gas on the kidnapped civilians from the pro-government towns and brought them in the lorry trucks to the site of the airstrikes. Whether they were gassed by the militant forces, or the airstrikes caused a chemical weapon factory to explode, the gruesome deaths of children, seen foaming in the mouth because of the gas, lays in the hands of the terrorists.

ALSO READ  Autopsies confirm Assad behind chemical attack in southern Idlib: Turkish state media

Therefore, it becomes evident that the area targeted was definitely a terrorist location, where it is known that the White Helmets share operation rooms with terrorist forces like Al-Qaeda as seen after the liberation of eastern Aleppo. Civilians and fighting forces, including Kurdish militias, have all claimed that militant groups that operate in Idlib, Hama and Aleppo countrysides, have used chemical weapons in the past. Therefore, before the war cries begin and the denouncement of the government from high officials in power positions begin, time must be given so that all evidence can emerge. However, this is an important factor that has never existed in the Syrian War, and the terrorist forces continue to hope that Western-intervention against the government will occur, at the cost of the lives of innocent civilians.

https://www.almasdarnews.com/article/jumping-conclusions-something-not-adding-idlib-chemical-weapons-attack/

The Western media refutes their  own lies.

Not only do they confirm that the Pentagon has been training the terrorists in the use of chemical weapons, they also acknowledge the existence of a not so secret “US-backed plan to launch a chemical weapon attack on Syria and blame it on Assad’s regime” 

London’s Daily Mail in a 2013 article confirmed the existence of an Anglo-American project endorsed by the White House (with the assistance of Qatar) to wage a chemical weapons attack on Syria and place the blame of Bashar Al Assad.

The following Mail Online article was published and subsequently removed. Note the contradictory discourse: “Obama issued warning to Syrian president Bashar al Assad”, “White House gave green light to chemical weapons attack”.

This Mail Online report published in January 2013 was subsequently removed from Mail Online. For further details click here

The Pentagon’s Training of  “Rebels” (aka Al Qaeda Terrorists) in the Use of Chemical Weapons

CNN accuses Bashar Al Assad of killing his own people while also acknowledging that the “rebels” are not only in possession of chemical weapons, but that these “moderate terrorists” affiliated with Al Nusra are trained in the use of chemical weapons by specialists on contract to the Pentagon.

In a twisted logic, the Pentagon’s mandate was to ensure that the rebels aligned with Al Qaeda would not acquire or use WMD, by actually training them in the use of chemical weapons (sounds contradictory):

“The training [in chemical weapons], which is taking place in Jordan and Turkey, involves how to monitor and secure stockpiles and handle weapons sites and materials, according to the sources. Some of the contractors are on the ground in Syria working with the rebels to monitor some of the sites, according to one of the officials.

The nationality of the trainers was not disclosed, though the officials cautioned against assuming all are American. (CNN, December 09, 2012, emphasis added)

screenshot of the CNN article, the original link has been redirected to CNN blogs,

The above report by CNN’s award winning journalist Elise Labott (relegated to the status a CNN blog), refutes CNN’s numerous accusations directed against Bashar Al Assad.

Who is doing the training of terrorists in the use of chemical weapons?  From the horse’s mouth: CNN

Sources: U.S. helping underwrite Syrian rebel training on securing chemical weapons

And these are the same terrorists (trained by the Pentagon) who are the alleged target of  Washington’s counterterrorism bombing campaign initiated by Obama in August 2014:

“The Pentagon scheme established in 2012 consisted in equipping and training Al Qaeda rebels in the use of chemical weapons, with the support of military contractors hired by the Pentagon, and then holding the Syrian government responsible  for using the WMD against the Syrian people.

What is unfolding is a diabolical scenario –which is an integral part of military planning– namely a situation where opposition terrorists advised by Western defense contractors are actually in possession of chemical weapons.

This is not a rebel training exercise in non-proliferation. While president Obama states that “you will be held accountable” if “you” (meaning the Syrian government) use chemical weapons, what is contemplated as part of this covert operation is the possession of chemical weapons by the US-NATO sponsored terrorists, namely “by our” Al Qaeda affiliated operatives, including the Al Nusra Front which constitutes the most effective Western financed and trained fighting group, largely integrated by foreign mercenaries. In a bitter twist, Jabhat al-Nusra, a US sponsored “intelligence asset”, was recently put on the State Department’s list of terrorist organizations.

The West claims that it is coming to the rescue of the Syrian people, whose lives are allegedly threatened by Bashar Al Assad. The truth of the matter is that the Western military alliance is not only supporting the terrorists, including the Al Nusra Front, it is also making chemical weapons available to its proxy “opposition” rebel forces.

The next phase of this diabolical scenario is that the chemical weapons in the hands of Al Qaeda operatives will be used against civilians, which could potentially lead an entire nation into a humanitarian disaster.

The broader issue is: who is a threat to the Syrian people? The Syrian government of Bashar al Assad or the US-NATO-Israel military alliance which is recruiting “opposition” terrorist forces, which are now being trained in the use of chemical weapons.” (Michel Chossudovsky, May 8, 2013, minor edit)

http://www.blacklistednews.com/Pentagon_Trained_Syria%E2%80%99s_Al_Qaeda_%E2%80%9CRebels%E2%80%9D_in_the_Use_of_Chemical_Weapons/57792/0/38/38/Y/M.html

4 DEADLIEST CHEMICAL WEAPONS

During the World War I, a new, deadly type of weapon was used for the first time; toxic gas. Considered uncivilised prior to the war, the development and military usage of poisonous gas grenades was soon called for by the demands of both sides to find a new way to overcome the stalemate of unforeseen trench warfare.

First used at the Second Battle of Ypres on 22 April 1915, cylinders filled with toxic gas soon became one of the most devastating and effective weapons used in the entire Great War, killing more than 90,000 soldiers and injuring about 1.25 million. In this article, we are going to explore the 4 of most deadly chemical weapons ever conceived, their history, usage, and effects on the human beings.

4.Mustard Gas(Yperite)

While Germans were releasing the mustard gas in year 1917 near the Belgian city of Ypres for the first time, chemist Frederic Guthrie was most likely turning in his grave. In year 1860, this British professor discovered the mustard gas, and also experienced its toxic effects first-hand for the first time. 57 years later, after its first military usage at Ypres, it got its infamous nickname, Yperite.

In the beginning, Germans planned to use the mustard gas only as a paralyzing agent. However, they soon found out, that when in sufficient concentrations, this gas could be easily lethal to the majority of the enemy soldiers.

https://i2.wp.com/upload.wikimedia.org/wikipedia/commons/d/dc/British_55th_Division_gas_casualties_10_April_1918.jpg

Soldiers after the mustard gas attack

Due to its dangerous properties, mustard gas soon became a popular chemical weapon, used in WWII, during the North Yemen Civil War, and even by Saddam Husein in year 1988. Even 150 years after its discovery, antidote is still to be discovered.

Pure mustard gas is colourless, oily liquid at room temperature. When used in its impure form, as warfare agent, it is usually green-brown in color and has an specific odor resembling mustard or garlic, hence the name. Yperite fumes are more than 6 times heavier than air, staying near the ground for several hours, effectively filling and contaminating enemy’s trenches, and killing everyone without proper protection.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/f/fd/155mmMustardGasShells.jpg

Mustard gas shells

Lethal dose for an adult man weighing 160 lbs is approximately 7,5 g of liquid mustard gas, when in contact with his skin for several minutes. However, when used in its gaseous form, lethality greatly depends on its concentration and on the length of exposure. Gas mask is usually not enough to be protected from this gas; it can easily penetrate the skin and kill the victim from inside. It easily passes through most of the clothes, shoes or other materials. For instance, standard rubber gloves could protect the skin for only about ten minutes.

4 or 6 hours after exposure, burning sensation appears in the affected areas, followed by reddening of the skin. After next 16 hours, large blisters appear on the affected skin, subsequently causing severe scarring and sometimes even necrosis. If the eyes were affected, temporary or permanent blindness typically occurs after few days.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/6/68/Mustard_gas_burns.jpg

Soldier with mustard gas burns

When inhaled, first symptoms start to manifest themselves after several hours, starting with chest pain, bloody coughing and vomiting, followed by muscle spasms. Death usually occurs within 3 days, caused either by lung edema or heart failure.

3.Phosgene

In year 1812, 22-year old British amateur chemist John Davy syntetized the phosgene gas for the first time. However, it didn’t contain any phosphorus, its name was derived from greek words phos(light) and gennesis(birth). John Davy probably assumed that his invention would be used in a more sensible way, however, on 9.th of December, 88 tons of phosgene were released during the trench warfare in France, killing 69 men and seriously injuring more then 1,200.

https://i2.wp.com/upload.wikimedia.org/wikipedia/commons/9/9d/Phosgene_poster_ww2.jpg

U.S. Army phosgene identification poster(WWII)

Germans were satisfied by the results, so they soon started using grenades filled by phosgene in combat. It accounts for more than 60% of all deaths caused by the chemical warfare during the First World War, more than chlorine and mustard gas combined.

During the Second World War, most soldiers were well-prepared for the possible use of this deadly gas, so the casualties were nowhere that high. However, phosgene-filled grenades used during the 1942 Battle of Kerch by Nazi Germany allegedly injured at least 10,000 Soviet soldiers.

https://i0.wp.com/upload.wikimedia.org/wikipedia/commons/b/ba/Nach_Gasangriff_1917.jpg

British casualties after German phosgene attack

Which deadly properties does this gas possess? At low temperatures, it is a colourless liquid. However, when heated to more than 8 degrees celsius, it evaporates quickly. Its odor has been often described by the survivors as pleasant, similar to newly mown hay or wet grass. After release, it contaminates the area for about 10 minutes, double the time in the winter. When compared to chlorine, phosgene has a major advantage; first symptoms start to manifest themselves after much longer time period, usually after more than five minutes, allowing more phosgene to be inhaled.

After one inhales high concentrations of this lethal gas, his chances of survival are very mild. After few minutes, he is likely to die of suffocation, because phosgene aggresively disrupts the blood-air barrier in the lungs.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/3/34/Australian_infantry_small_box_respirators_Ypres_1917.jpg

Australian soldiers wearing gas masks(WWI)

After inhaling less concentrated phosgene, you might be little bit better off. One hour after exposure, first symptoms include strong burning sensation in pharynx and trachea, severe headache and vomiting, followed by pulmonary edema(swelling and fluid buildup), which often leads to suffocation.

To this day, phosgene remains one of the most dangerous chemical weapons in the world. Although not as deadly as sarin or nerve gas, it is very easy to manufacture; no wonder it’s often used during terrorist attacks. Homemade phosgene grenade can be easily created by exposing a bottle of chloroform to UV-light source for a few days.

2.Sarin

If previous two chemicals weren’t dangerous enough, here comes the sarin, often known as the most powerful of all nerve agents.

Sarin was developed back in 1938 by a group of 4 German scientists, Scharder, Ambros, Rudiger and van der Linde, during their research of pesticides. During the WWII, this deadly gas was first used by the Nazi Germany in June 1942. At the end of the war, Germany allegedly possessed more than 10 tons of sarin.

https://i1.wp.com/blogs.reuters.com/great-debate/files/2013/04/japan-sarin1.jpg

Japanese firemen decontaminating the Tokyo subway after sarin attack

However, it is most famous for being used during the 1995 terrorist attack on the Tokio subway by a Japanese cult Aum Shinrikyo, killing 13 people and allegedly injuring more than 5,000. It was also used back in August 2013 by al-Assad’s forces in Ghouta, Syria, killing more than 1,700 people.

Sarin belongs to the group of nerve gasses, the deadliest of all toxic gasses used in chemical warfare. It is highly toxic; a single drop of sarin the size of the head of a pin is enough to kill an adult human. In addition, most of the victims usually die few minutes after contamination.

It usually enters the organism via respiration, but it can also penetrate the skin or be ingested. In home temperature, sarin is a colourless liquid without significant odor, similar to water. However, when exposed to higher temperatures, it starts to evaporate, being still odorless. After release, it often remains deadly for more than 24 hours.

https://i2.wp.com/asset0.cbsistatic.com/cnwk.1d/i/tim2/2013/08/30/762px-Demonstration_cluster_bomb_620x488.jpg

Missile filled with sarin containers

Immediately after exposure, first symptoms include strong headaches, increased salivation and lacrimation(secretion of tears), followed by gradual paralysis of the muscles. Death is caused by asphyxiation or heart failure.

According to some sources, Sarin is 500 times more deadly than kyanide, with its lethal dose being only about 800 micrograms. Only 5 tons of sarin, obiviously properly dosed, would be enough to wipe out entire humanity.

1.Agent Orange

This mixture of two herbicides, most famous for its usage in Vietnam War, is not a chemical weapon in the true sense of the word. It was discovered in year 1943 by American botanic Arthur Galston. In year 1951, further research started by the scientific team in the military base of Detrick, Maryland.

https://i0.wp.com/24.media.tumblr.com/270a4453b15492b15b6551f10388fef4/tumblr_mt92auzYjZ1s88ji3o1_1280.jpg

Barrel of ”Agent Orange”

During the War of Vietnam, it was widely used for deforestation of the large areas covered by thick jungle, to enable easier and more effective bombing of enemy bases and supply routes. Although designed as herbicide, the Agent Orange also contained large amounts of dioxin, a highly toxic compound, making it one of the most deadly chemical weapons ever deployed.

In years 1962-1971, military operation with codenames ”Ranch Hand” or ”Trail Dust” took place in Southern Vietnam. During this operation, jungles in the region were heavily showered by this herbicide, primarily in the areas of Mekong delta. Mixture was storaged in orange barrels, hence the name ”Agent Orange”. During the operation, more than 20 million gallons of this dangerous chemical were used, destroying large areas of jungle, contaminating air, water and food sources.

https://i2.wp.com/digitaljournalist.org/issue0401/images/griffiths/09.jpg

Vietnamese babies born with severe birth defects

In high concentrations, dioxin causes severe inflammation of skin, lungs and mucous tissues, sometimes resulting in chronic obstructive pulmonary disease, pulmonary edema, or even death, however, it also affects eyes, liver and kidneys. It is also highly effective carcinogen, known for causing laryngeal and lung cancer.

It is estimated, that the usage of Agent Orange during the Vietnam War led to more than 400,000 people being killed or maimed, and 500,000 children born with mild to severe birth defects as a result of contamination. Agent Orange alone killed 10 times more people than all other chemical weapons combined.

Tomahawk (missile)

From Wikipedia, the free encyclopedia
For the sounding rocket, see TE-416 Tomahawk.
Tomahawk
Tomahawk Block IV cruise missile -crop.jpg

A BGM-109 Tomahawk flying in November 2002
Type Long-range, all-weather, subsonic cruise missile
Place of origin United States
Service history
In service 1983–present
Used by United States Navy
Royal Navy
Production history
Manufacturer General Dynamics (initially)
Raytheon/McDonnell Douglas
Unit cost $250,000(FY2014)[1] (Block IV)
Specifications
Weight 2,900 lb (1,300 kg), 3,500 lb (1,600 kg) with booster
Length Without booster: 18 ft 3 in (5.56 m)

With booster: 20 ft 6 in (6.25 m)

Diameter 20.4 in (0.52 m)
Warhead Nuclear: W80 warhead (retired)[2]
Conventional: 1,000 pounds (450 kg) High explosive or Submunitions dispenser with BLU-97/B Combined Effects Bomb or PBXN
Detonation
mechanism
FMU-148 since TLAM Block III, others for special applications

Engine Williams International F107-WR-402turbofan
using TH-dimer fuel
and a solid-fuel rocket booster
Wingspan 8 ft 9 in (2.67 m)
Operational
range
Block II TLAM-A – 1,350 nmi (1,550 mi; 2,500 km) Block III TLAM-C, Block IV TLAM-E – 900 nmi (1,000 mi; 1,700 km)

Block III TLAM-D – 700 nmi (810 mi; 1,300 km)[3]

Speed Subsonic; about 550 mph (890 km/h)
Guidance
system
GPS, INS, TERCOM, DSMAC, active radar homing (RGM/UGM-109B)
Launch
platform
Vertical Launch System (VLS) and horizontal submarine torpedo tubes (known as TTL (torpedo tube launch))

The Tomahawk (US /ˈtɑːməhɔːk/ or UK /ˈtɒməhɔːk/) is a long-range, all-weather, subsonic cruise missile. Introduced by General Dynamics (now Boeing Defense, Space & Security)[4][5] in the 1970s, it was initially designed as a medium to long-range, low-altitude missile that could be launched from a surface platform. It has been improved several times, and after corporate divestitures and acquisitions, is now made by Raytheon. Some Tomahawks were also manufactured by McDonnell Douglas.

Description

The Tomahawk missile family consists of a number of subsonic, jet engine-powered missiles designed to attack a variety of surface targets. Although a number of launch platforms have been deployed or envisaged, only sea (both surface ship and submarine) launched variants are currently in service. Tomahawk has a modular design, allowing a wide variety of warhead, guidance, and range capabilities. The Tomahawk project was originally awarded to Applied Physics Laboratory in Laurel, Maryland by the US Navy. James H. Walker led a team of scientists to design and build this new long range missile. The original design, updated with advanced technology, is still used today.

The missile is named after the Tomahawk, a one-handed axe used as a tool and a weapon by pre-contact Native Americans in the United States.

Variants

There have been several variants of the BGM-109 Tomahawk employing various types of warheads.

  • BGM-109A Tomahawk Land Attack Nuclear (TLAM-N) – Not deployed.[6]
  • BGM-109A Tomahawk Land Attack Missile – Nuclear (TLAM-A) with a W80 thermonuclear weapon. Retired from service sometime between 2010 and 2013.[2]
  • RGM/UGM-109B Tomahawk Anti Ship Missile (TAS-M) – active radar homing anti-ship missile variant; withdrawn from service in the 1990s.
  • BGM-109C Tomahawk Land Attack Missile – Conventional (TLAM-C) with a unitary warhead. This was initially a modified Bullpup warhead.
  • BGM-109D Tomahawk Land Attack Missile – Dispenser (TLAM-D) with cluster munitions.
  • RGM/UGM-109E Tomahawk Land Attack Missile (TLAM Block IV) – improved version of the TLAM-C.
  • BGM-109G Ground Launched Cruise Missile (GLCM) – with a W84 nuclear warhead; withdrawn from service in 1991.
  • AGM-109H/L Medium Range Air to Surface Missile (MRASM) – a shorter range, turbojet powered ASM with cluster munitions ; never entered service, cost US$569,000 (1999).[7]

Ground-launched cruise missiles (GLCM) and their truck-like launch vehicles were employed at bases in Europe; they were withdrawn from service to comply with the 1987 Intermediate-Range Nuclear Forces Treaty. Many of the anti-ship versions were converted into TLAMs at the end of the Cold War. The Block III TLAMs that entered service in 1993 can fly farther and use Global Positioning System (GPS) receivers to strike more precisely. Block III TLAM-Cs retain the DSMAC II navigation system, allowing GPS only missions, which allow for rapid mission planning, with some reduced accuracy, DSMAC only missions, which take longer to plan but terminal accuracy is somewhat better, and GPS aided missions which combine both DSMAC II and GPS navigation which provides the greatest accuracy. Block IV TLAMs are completely redesigned with an improved turbofan engine. The F107-402 engine provided the new BLK III with a throttle control, allowing in-flight speed changes. This engine also provided better fuel economy. The Block IV TLAMs have enhanced deep-strike capabilities and are equipped with a real-time targeting system for striking fleeing targets. Additionally, the BLOCK IV missiles have the capabilities to be re-targeted inflight, and the ability to transmit, via satcom, an image immediately prior to impact to assist in determining if the missile was attacking the target and the likely damage from the attack.

Upgrades

UGM-109 Tomahawk missile detonates above a test target, 1986

A major improvement to the Tomahawk is network-centric warfare-capabilities, using data from multiple sensors (aircraft, UAVs, satellites, foot soldiers, tanks, ships) to find its target. It will also be able to send data from its sensors to these platforms. It will be a part of the networked force being implemented by the Pentagon.

Tomahawk Block III[7][6] introduced in 1993 added time-of-arrival control and navigation through Digital Scene Matching Area Correlator (DSMAC) and jam-resistant GPS, smaller, lighter WDU-36 warhead, engine improvements and extended missile’s range.

Tactical Tomahawk Weapons Control System (TTWCS)[8] takes advantage of a loitering feature in the missile’s flight path and allows commanders to redirect the missile to an alternative target, if required. It can be reprogrammed in-flight to attack predesignated targets with GPS coordinates stored in its memory or to any other GPS coordinates. Also, the missile can send data about its status back to the commander. It entered service with the US Navy in late 2004. The Tactical Tomahawk Weapons Control System (TTWCS) added the capability for limited mission planning on board the firing unit (FRU).

Tomahawk Block IV[9][10][11] introduced in 2006 adds the strike controller which can change the missile in flight to one of 15 preprogrammed alternate targets or redirect it to a new target. This targeting flexibility includes the capability to loiter over the battlefield awaiting a more critical target. The missile can also transmit battle damage indication imagery and missile health and status messages via the two-way satellite data link. Firing platforms now have the capability to plan and execute GPS-only missions. Block IV also has an improved anti-jam GPS receiver for enhanced mission performance. Block IV includes Tomahawk Weapons Control System (TTWCS), and Tomahawk Command and Control System (TC2S).

On 16 August 2010, the Navy completed the first live test of the Joint Multi-Effects Warhead System (JMEWS), a new warhead designed to give the Tomahawk the same blast-fragmentation capabilities while introducing enhanced penetration capabilities in a single warhead. In the static test, the warhead detonated and created a hole large enough for the follow-through element to completely penetrate the concrete target.[12] In February 2014, U.S. Central Command sponsored development and testing of the JMEWS, analyzing the ability of the programmable warhead to integrate onto the Block IV Tomahawk, giving the missile bunker buster effects to better penetrate hardened structures.[13]

In 2012, the USN studied applying Advanced Anti-Radiation Guided Missile (AARGM) technology into the Tactical Tomahawk.[14]

In 2014, Raytheon began testing Block IV improvements to attack sea and moving land targets.[15] The new passive radar seeker will pick up the electromagnetic radar signature of a target and follow it, and actively send out a signal to bounce off potential targets before impact to discriminate its legitimacy before impact.[13] Mounting the multi-mode sensor on the missile’s nose would remove fuel space, but company officials believe the Navy would be willing to give up space for the sensor’s new technologies.[16] The previous Tomahawk Anti-Ship Missile, retired over a decade earlier, was equipped with inertial guidance and the seeker of the Harpoon missile and there was concern with its ability to clearly discriminate between targets from a long distance, since at the time Navy sensors did not have as much range as the missile itself, which would be more reliable with the new seeker’s passive detection and active millimeter-wave radar.[17][18] Raytheon estimates adding the new seeker would cost $250,000 per missile.[19] Other upgrades include sea-skim mode[20] – low-altitude flight over water at high subsonic speeds. The first Block IV TLAMs modified with a maritime attack capability will enter service in 2018-2019.[21]

A supersonic version of the Tomahawk is under consideration for development with a ramjet to increase its speed to Mach 3. A limiting factor to this is the dimensions of shipboard launch tubes. Instead of modifying every ship able to carry cruise missiles, the ramjet-powered Tomahawk would still have to fit within a 21-inch diameter and 20-foot long tube.[16]

In October 2015, Raytheon announced the Tomahawk had demonstrated new capabilities in a test launch, using its onboard camera to take a reconnaissance photo and transmit it to fleet headquarters. It then entered a loitering pattern until given new targeting coordinates to strike.[22]

By January 2016, Los Alamos National Laboratory was working on a project to turn unburned fuel left over when a Tomahawk reaches its target into an additional explosive force. To do this, the missile’s JP-10 fuel is turned into a fuel air explosive to combine with oxygen in the air and burn rapidly. The thermobaric explosion of the burning fuel acts, in effect, as an additional warhead and can even be more powerful than the main warhead itself when there is sufficient fuel left in the case of a short range target.[11][23]

TACTOM(Tactical Tomahawk) is Tomahawk’s modernization program that will incorporate an all-weather-seeker[24] that will complement Tomahawk’s Synthetic Guidance Mode; which uses a high-throughput radio signal to update the missile in flight, giving it new target information as a maritime or land target moves.

Launch systems

Each missile is stored and launched from a pressurized canister[25] that protects it during transportation and storage, and also serves as a launch tube. These canisters were racked in armored box launchers (ABL), which were installed on the re-activated Iowa-class battleships USS Iowa, USS New Jersey, USS Missouri, and USS Wisconsin. The ABLs were also installed on eight Spruance-class destroyers, the four Virginia-class cruisers, and the USS Long Beach. These canisters are also in vertical launching systems (VLS) in other surface ships, capsule launch systems (CLS) in the later Los Angeles-class submarines, and in submarines’ torpedo tubes. All ABL equipped ships have been decommissioned.

For submarine-launched missiles (called UGM-109s), after being ejected by gas pressure (vertically via the VLS) or by water impulse (horizontally via the torpedo tube), the missile exits the water and a solid-fuel booster is ignited for the first few seconds of airborne flight until transition to cruise.

After achieving flight, the missile’s wings are unfolded for lift, the airscoop is exposed and the turbofan engine is employed for cruise flight. Over water, the Tomahawk uses inertial guidance or GPS to follow a preset course; once over land, the missile’s guidance system is aided by terrain contour matching (TERCOM). Terminal guidance is provided by the Digital Scene Matching Area Correlation (DSMAC) system or GPS, producing a claimed circular error probable of about 10 meters.

The Tomahawk Weapon System consists of the missile, Theater Mission Planning Center (TMPC)/Afloat Planning System, and either the Tomahawk Weapon Control System (on surface ships) or Combat Control System (for submarines).

Several versions of control systems have been used, including:

  • v2 TWCS – Tomahawk Weapon Control System (1983), also known as “green screens,” was based on an old tank computing system.
  • v3 ATWCS – Advanced Tomahawk Weapon Control System (1994), first Commercial Off the Shelf, uses HP-UX.
  • v4 TTWCS – Tactical Tomahawk Weapon Control System, (2003).
  • v5 TTWCS – Next Generation Tactical Tomahawk Weapon Control System. (2006)

Navigation and other details

The TLAM-D contains 166 sub-munitions in 24 canisters: 22 canisters of seven each, and two canisters of six each to conform to the dimensions of the airframe. The sub-munitions are the same type of Combined Effects Munition bomblet used in large quantities by the U.S. Air Force with the CBU-87 Combined Effects Munition. The sub-munitions canisters are dispensed two at a time, one per side. The missile can perform up to five separate target segments which enables it to attack multiple targets. However, in order to achieve a sufficient density of coverage typically all 24 canisters are dispensed sequentially from back to front.

TERCOM – Terrain Contour Matching. A digital representation of an area of terrain is mapped based on digital terrain elevation data or stereo imagery. This map is then inserted into a TLAM mission which is then loaded onto the missile. When the missile is in flight it compares the stored map data with radar altimeter data collected as the missile overflies the map. Based on comparison results the missile’s inertial navigation system is updated and the missile corrects its course. TERCOM was based on, and was a significant improvement on, “Fingerprint,” a technology developed in 1964 for the SLAM.[26]

On July 26, 2014 it was announced that 196 additional Block IV missiles had been purchased.[27]

DSMAC – Digital Scene Matching Area Correlation. A digitized image of an area is mapped and then inserted into a TLAM mission. During the flight the missile will verify that the images that it has stored correlates with the image it sees below itself. Based on comparison results the missile’s inertial navigation system is updated and the missile corrects its course.

  • Total program cost: $US 11,210,000,000[28]

Operational history

Remnants of a shot down Tomahawk from Operation Allied Force, showing the turbofan engine at the Museum of Aviation in Belgrade, Serbia

United States Navy

In the 1991 Gulf War, 288 Tomahawks were launched, 12 from submarines and 276 from surface ships.[29] The first salvo was fired by the Destroyer USS Paul F. Foster[30] on January 17, 1991. The attack submarines USS Pittsburgh and USS Louisville followed.

On 17 January 1993, 46 Tomahawks were fired at the Zafraniyah Nuclear Fabrication Facility outside Baghdad, in response to Iraq’s refusal to cooperate with UN disarmament inspectors. One missile crashed into the side of the Al Rasheed Hotel, killing two civilians.[31]

On 26 June 1993, 23 Tomahawks were fired at the Iraqi Intelligence Service’s command and control center.[32]

On 10 September 1995, the USS Normandy launched 13 Tomahawk missiles from the central Adriatic Sea against a key air defense radio relay tower in Bosnian Serb territory during Operation Deliberate Force.[33]

On 3 September 1996, 44 cruise missiles between UGM-109 and B-52 launched AGM-86s, were fired at air defence targets in Southern Iraq.[34][35]

On 20 August 1998, 79 Tomahawk missiles were fired simultaneously at two separate targets in Afghanistan and Sudan in retaliation for the bombings of American embassies by Al-Qaeda.[2]

On 16 December 1998, 415 Tomahawk missiles were fired at key Iraqi targets during Operation Desert Fox.[36]

In early 1999, 218 Tomahawk missiles were fired by US ships and a British submarine during Operation Allied Force against key targets in Serbia and Montenegro.[3]

In October 2001, approximately 50 Tomahawk missiles struck targets in Afghanistan in the opening hours of Operation Enduring Freedom.[4][37]

During the 2003 invasion of Iraq, more than 802 Tomahawk missiles were fired at key Iraqi targets.[38]

On 3 March 2008, two Tomahawk missiles were fired at a target in Somalia by a US vessel during the Dobley airstrike, reportedly in an attempt to kill Saleh Ali Saleh Nabhan, an al Qaeda militant.[39][40]

On 17 December 2009, two Tomahawk missiles were fired at targets in Yemen.[41] One of the targets was hit by a TLAM-D missile. The target was described as an ‘alleged Al-Qaeda training camp’ in al-Ma’jalah in al-Mahfad a region of the Abyan governorate of Yemen. Amnesty International reported that 55 people were killed in the attack, including 41 civilians (21 children, 14 women, and six men). The US and Yemen governments refused to confirm or deny involvement, but diplomatic cables released as part of United States diplomatic cables leak later confirmed the missile was fired by a US Navy ship.[42]

On 19 March 2011, 124 Tomahawk missiles[43] were fired by U.S. and British forces (112 US, 12 British)[44] against at least 20 Libyan targets around Tripoli and Misrata.[45] As of 22 March 2011, 159 UGM-109 were fired by US and UK ships against Libyan targets.[46]

On 23 September 2014, 47 Tomahawk missiles were fired by the United States from the USS Arleigh Burke and USS Philippine Sea, which were operating from international waters in the Red Sea and Persian Gulf, against ISIL targets in Syria in the vicinity of Raqqa, Deir ez-Zor, Al-Hasakah and Abu Kamal,[47] and against Khorasan group targets in Syria west of Aleppo.[48]

On 13 October 2016 five Tomahawk cruise missiles were launched by USS Nitze at three radar sites in Yemen held by Houthi rebels in response to anti-ship missiles fired at US Navy ships the day before.[49]

On 6 April 2017, 59 Tomahawk missiles were launched from the USS Ross (DDG-71) and USS Porter (DDG-78), targeting Shayrat, a military airfield near Homs, in Syria. The strike was in retaliation for the alleged use of chemical weapons by Syrian President Bashir Al-Assad. Initial reports indicate that the Syrian airbase was ‘almost completely destroyed’ after the US strike.[50]

As of 2015, the United States Navy has a stockpile of around 3,500 Tomahawk cruise missiles of all variants, with a combined worth of approximately US $2.6 billion.[51]

Royal Navy

In 1995 the US agreed to sell 65 Tomahawks to the UK for torpedo-launch from her nuclear attack submarines. The first missiles were acquired and test-fired in November 1998; all Royal Navy fleet submarines are now Tomahawk capable, including the new Astute-class.[52][53][54][55] The Kosovo War in 1999 saw the Swiftsure-class HMS Splendid become the first British submarine to fire the Tomahawk in combat. It has been reported that seventeen of the twenty Tomahawks fired by the British during that conflict hit their targets accurately;[citation needed] the UK subsequently bought 20 more Block III to replenish stocks.[56] The Royal Navy has since fired Tomahawks during the 2000s Afghanistan War, in Operation Telic as the British contribution to the 2003 Iraq War, and during Operation Ellamy in Libya in 2011.

In April 2004, the UK and US governments reached an agreement for the British to buy 64 of the new generation of Tomahawk missile—the Block IV or TacTom missile.[57] It entered service with the Royal Navy on 27 March 2008, three months ahead of schedule.[58] In July 2014 the US approved the sale to the UK of a further 65 submarine-launched Block IV’s at a cost of US$140m including spares and support;[59] as of 2011 the Block III missiles were on Britain’s books at £1.1m and the Block IV at £0.87m including VAT.[60]

The Sylver Vertical Launching System on the new Type 45 destroyer is claimed by its manufacturers to have the capability to fire the Tomahawk, although the A50 launcher carried by the Type 45 is too short for the weapon (the longer A70 silo would be required). Nevertheless, the Type 45 has been designed with weight and space margin for a strike-length Mk41 or Sylver A70 silo to be retrofitted, allowing Type 45 to use the TLAM Block IV if required. The new Type 26 frigates will have strike-length VLS tubes. SYLVER user France is developing MdCN, a version of the Storm Shadow/Scalp cruise missile that has a shorter range but a higher speed than Tomahawk and can be launched from the SYLVER system.

United States Air Force

The Air Force is a former operator of the nuclear-armed version of the Tomahawk, the BGM-109G Gryphon.

Other users

The Netherlands (2005) and Spain (2002 and 2005) were interested in acquiring the Tomahawk system, but the orders were later cancelled in 2007 and 2009 respectively.[61][62]

In 2009 the Congressional Commission on the Strategic Posture of the United States stated that Japan would be concerned if the TLAM-N were retired, but the government of Japan has denied that it had expressed any such view.[63]

It is believed that the SLCM version of the Popeye was developed by Israel after the US Clinton administration refused an Israeli request in 2000 to purchase Tomahawk SLCM’s because of international Missile Technology Control Regime proliferation rules.[64]

As of March 12, 2015 Poland has expressed interest in purchasing long-range Tomahawk missiles for its future submarines.[65]

Operators

Map with Tomahawk operators in blue

Current operators

See also

https://en.wikipedia.org/wiki/Tomahawk_(missile)

Story 2: What is Next?  United States Led Coalition of Egypt, Jordan, Kurds, Saudi Arabia, and Turkey to Destroy Islamic State, Jabhat Al Nustra Front ( al-Qaeda’s Syrian affiliate), Radical Islamic Terrorist Jihadists in Syria, Hezbollah, and Bashar al-Assad Syrian Regime –Videos — Military strike comes after Trump previously railed against Syria intervention

What comes next after Syria missile attack

Story 3: Supreme Court Justice Neil Gorsuch Confirmed 54 Yes — 45 Nos

Senate confirms Neil Gorsuch for Supreme Court (C-SPAN)

The Senate Goes “Nuclear”

Mike Pence Reads Final Vote Confirming Neil Gorsuch To Supreme Court | NBC News

Senate Democrats trigger “nuclear option” to curb filibusters

Harry Reid goes Nuclear Pushes Major Senate Filibuster Rules Change

 

Reid, Democrats trigger ‘nuclear’ option; eliminate most filibusters on nominees

The Senate goes nuclear

Embed Share

Play Video1:11
It’s more than just a rule change: The so-called “nuclear option” will fundamentally alter the way the Senate operates – for good.(Casey Capachi/(In Play))
November 21, 2013

Senate Democrats took the dramatic step Thursday of eliminating filibusters for most nominations by presidents, a power play they said was necessary to fix a broken system but one that Republicans said will only rupture it further.

Democrats used a rare parliamentary move to change the rules so that federal judicial nominees and executive-office appointments can advance to confirmation votes by a simple majority of senators, rather than the 60-vote supermajority that has been the standard for nearly four decades.

The immediate rationale for the move was to allow the confirmation of three picks by President Obama to the U.S. Court of Appeals for the District of Columbia Circuit — the most recent examples of what Democrats have long considered unreasonably partisan obstruction by Republicans.

In the long term, the rule change represents a substantial power shift in a chamber that for more than two centuries has prided itself on affording more rights to the minority party than any other legislative body in the world. Now, a president whose party holds the majority in the Senate is virtually assured of having his nominees approved, with far less opportunity for political obstruction.

The main combatants Thursday were the chamber’s two chiefs, Majority Leader Harry M. Reid (D-Nev.) and Minority Leader Mitch McConnell (R-Ky.), who have clashed for several years over Republican filibusters of Obama’s agenda and nominees.

Reid said the chamber “must evolve” beyond parliamentary roadblocks. “The American people believe the Senate is broken, and I believe the American people are right,” he said, adding: “It’s time to get the Senate working again.”

McConnell linked the rule change to the methods used to approve Obama’s health-care law solely with Democratic votes. The normally reserved GOP leader paced at his desk during his speech, often turning his back to Democrats to address only his fellow Republicans.

“It’s a sad day in the history of the Senate,” McConnell told reporters, calling the move a Democratic “power grab.”

The clash ended with a vote nearly as partisan as the times — 52 to 48, with all but three Democrats backing the move and every Republican opposing it.

The vote was the culmination of more than 25 years of feuding over nominations, beginning with President Ronald Reagan’s choices for the Supreme Court and including Obama’s picks for obscure federal regulatory agencies. Each side in Thursday’s debate cited its own statistics to state its case.

Democrats said the attempted filibusters of Chuck Hagel during his confirmation hearing to become defense secretary, a first for any nominee to lead the Pentagon — as well as a blockade of picks to head the National Labor Relations Board and the Consumer Financial Protection Bureau — exceeded anything Democrats did when they were in the minority. In addition, Democrats charged that Republicans didn’t even have substantive objections to the D.C. Circuit nominees they filibustered.

After the vote, Obama told reporters at the White House that Republicans had turned nomination fights into a “reckless and relentless tool” to grind the gears of government to a halt and noted that “neither party has been blameless for these tactics.” However, he said, “today’s pattern of obstruction . . . just isn’t normal; it’s not what our founders envisioned.”

Republicans countered that they had confirmed 99 percent of Obama’s judicial selections. McConnell accused Democrats of eyeing the D.C. Circuit in an effort to stack the court, which reviews many cases related to federal laws and regulations, to tilt its balance in a liberal direction.

What made the day so historic for senators, former senators and the small collection of parliamentary experts in Washington was the simple majority vote used to execute the changes — a tactic so extreme it is known as the “nuclear option.”

Previous majorities had threatened to upend filibuster rules in this manner, but relying on a simple majority vote had been used only for relatively minor procedural changes to how amendments were handled, never to eliminate the super­majority requirement altogether. Before Thursday, the standard precedent was that major rule changes needed a two-thirds majority. The change was so significant that Reid and his leadership team held a victory party with liberal activists afterward in a room just off the Senate floor.

Republicans said the way Democrats upended the rules will result in fallout for years. “It’s another raw exercise of political power to permit the majority to do anything it wants whenever it wants to do it,” Sen. Lamar Alexander (Tenn.), the GOP’s parliamentary expert, told reporters.

Republicans vowed to reciprocate if they reclaim the majority.

“Democrats won’t be in power in perpetuity,” said Sen. Richard C. Shelby (Ala.), a 27-year member. “This is a mistake — a big one for the long run. Maybe not for the short run. Short-term gains, but I think it changes the Senate tremendously in a bad way.”

After the vote, Reid told reporters that his views on the issue had evolved — from eight years ago, when Republicans held the majority and he led the fight to protect the filibuster. He acknowledged that he wouldn’t mind seeing the supermajority requirement abolished for everything but that there were not enough votes in his caucus to support such a move.

Reid first faced pressure on this issue from junior Democrats four years ago, particularly Sen. Jeff Merkley, a former speaker of the Oregon state House, who became the point person for growing the anti-filibuster movement. But Reid repeatedly rejected their effort as too radical.

Even if Republicans want to do away with the filibuster someday, Reid said, Thursday’s move was worth it because the current climate had become too hostile to get anything significant done. Reid said he faced a choice: “Continue like we are or have democracy?”

The rule change does not apply to Supreme Court nominations or to legislation.

Individual senators will still be able to seize the floor for marathon speeches opposing nominees, as Sen. Rand Paul (R-Ky.) did in a nearly 13-hour session in March against the nomination of John Brennan as CIA director. But once such speeches end, the majority will be able to confirm nominees without needing bipartisan support.

With the Senate majority very much up for grabs in midterm elections next year, Democrats placed a big bet on maintaining control of the chamber. GOP leaders have suggested that, if given the Senate majority back, they might further strip filibuster rules so they could dismantle Obama’s landmark domestic achievement, the Affordable Care Act, on a simple majority vote.

In his remarks, McConnell finally turned to Democrats and said that a majority of them had never served in the minority and then lectured the longtime members who knew what it was like to be on the other side.

“The solution to this problem is at the ballot box,” he said. “We look forward to having a great election in 2014.”

https://www.washingtonpost.com/politics/senate-poised-to-limit-filibusters-in-party-line-vote-that-would-alter-centuries-of-precedent/2013/11/21/d065cfe8-52b6-11e3-9fe0-fd2ca728e67c_story.html?utm_term=.5bf7f548abcf

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 866, April 3, 2017, Breaking News — Story 1: Obamagate Surveillance/Spying Scandal Spreading — Abuse of Power By Former National Security Adviser Susan Rice — Requested Revealing or Unmasking of American Citizen Identities Including Trump and Trump Campaign and Transition Teams For 7 Months (July 2016 – January 2017) — The Smoking Gun — What Did President Obama Know and When Did He Know It? — Videos — Story 2: Lying Lunatic Left Democratic National Committee Chair Tom Perez Cracks up — Trump Didn’t Win Election — Videos —

Posted on April 3, 2017. Filed under: American History, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Elections, Foreign Policy, Freedom of Speech, Government, Government Spending, High Crimes, Hillary Clinton, History, House of Representatives, Human, Illegal Immigration, Immigration, Language, Law, Legal Immigration, Life, News, Obama, Politics, Polls, President Barack Obama, President Trump, Presidential Appointments, Progressives, Radio, Raymond Thomas Pronk, Scandals, Senate, Trump Surveillance/Spying, United States of America, Videos | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Breaking News — Story 1: Obamagate Surveillance/Spying Scandal Spreading — Abuse of Power By Former National Security Adviser Susan Rice — Requested Revealing or Unmasking of American Citizen Identities Including Trump and Trump Campaign and Transition Teams For 7 Months (July 2016 – January 2017) — The Smoking Gun — Videos — 

Image result for obama surveillance scandalImage result for obama surveillance scandal
Image result for dnc chair tom perez cartoonsImage result for dnc chair tom perez cartoons
Image result for obama surveillance scandalImage result for cartoons obama surveillance scandalImage result for cartoons obama surveillance scandalImage result for cartoons obama surveillance scandalImage result for cartoons obama surveillance scandal

Rice asked for Trump transition associates to be unmasked

Where does the Susan Rice story go from here?

Hume talks Supreme Court fight, Susan Rice revelations

Jennings: New surveillance details are ‘political bombshell’

Report: Obama adviser Susan Rice sought to unmask Trump associates

Susan Rice Requested Intel to Unmask Names of Trump Transition Officials

Obama’s SPY Susan Rice CAUGHT SPYING ON TRUMP and Trump’s Team said Rush Limbaugh

Furious AG Sessions: we will convict some people to make the leaking stop

Susan Rice Unmasked Trump Team, 1566

Published on Apr 3, 2017

This video is about Susan Rice Unmasked Trump Team, 1566

President Obama’s National Security Advisor, Susan Rice, deliberately unmasked President-Elect Donald Trump, and other incoming Trump officials, according to reporter Michael Chernovich.
Furthermore, Chernovich learned that New York Times reporter Maggie Haberman has had this story for at least 48 hours, and has chosen to sit on it in an effort to protect the reputation of Obama.
According to Chernovich:
“The White House Counsel’s office identified Rice as the person responsible for the unmasking after examining Rice’s document log requests.”
“The reports Rice requested to see are kept under tightly-controlled conditions. Each person must log her name before being granted access to them.”
According to Chernovich two other people close to Obama had authorization to unmask the names of Americans as well: CIA Director John Brennan and then-Attorney General Loretta Lynch.
Yesterday, Fox News announced that House Intelligence Committee Chairman Devin Nunes, R-Calif, knew who unmasked General Michael Flynn, saying that the person was:
“… very well known, very high up, very senior in the intelligence world.”
I had speculated that that person may have been Jeh Johnson, the former Director of Homeland Security. We will see in the morning if the Fox report confirms that it was indeed Susan Rice.
If it was Rice, that puts the source of this felonious conduct right at the door of former President Obama.

Susan Rice On Unmasking Of Trump Team, ‘I Know Nothing’

Multiple Felonies Committed By Obama Admin. Obama Surveillance on Trump.

Obama Official Admits They Were Surveilling Trump & His Team, Unmasking Names & Leaking Intel

Team Obama Gets Caught Committing Political Espionage, Spying on Trump & His Team

Susan Rice Reportedly “Unmasked” Trump in Incidental Data Collection

Trump Proven 100% Right about Obama Admin “Wiretapping”(Surveilling) Him & His Team

 Donald Trump’s Administration was Wiretapped | Rand Paul

Susan Rice, Ben Rhodes, John Brennan are suspects: James Comey Intelligence Hearing @ congressRand Paul Calls For Susan Rice To Testify On Unmasking Trump Officials

Susan Rice requested to unmask names of Trump transition officials, sources say

Multiple sources tell Fox News that Susan Rice, former national security adviser under then-President Barack Obama, requested to unmask the names of Trump transition officials caught up in surveillance.

The unmasked names, of people associated with Donald Trump, were then sent to all those at the National Security Council, some at the Defense Department, then-Director of National Intelligence James Clapper and then-CIA Director John Brennan – essentially, the officials at the top, including former Rice deputy Ben Rhodes.

The names were part of incidental electronic surveillance of candidate and President-elect Trump and people close to him, including family members, for up to a year before he took office.

It was not clear how Rice knew to ask for the names to be unmasked, but the question was being posed by the sources late Monday.

Such amazing reporting on unmasking and the crooked scheme against us by @foxandfriends. “Spied on before nomination.” The real story.

“What I know is this …  If the intelligence community professionals decide that there’s some value, national security, foreign policy or otherwise in unmasking someone, they will grant those requests,” former Obama State Department spokeswoman and Fox News contributor Marie Harf told Fox News’ Martha MacCallum on “The First 100 Days. “And we have seen no evidence … that there was partisan political notice behind this and we can’t say that unless there’s actual evidence to back that up.”

White House Press Secretary Sean Spicer, asked about the revelations at Monday’s briefing, declined to comment specifically on what role Rice may have played or officials’ motives.

“I’m not going to comment on this any further until [congressional] committees have come to a conclusion,” he said, while contrasting the media’s alleged “lack” of interest in these revelations with the intense coverage of suspected Trump-Russia links.

When names of Americans are incidentally collected, they are supposed to be masked, meaning the name or names are redacted from reports – whether it is international or domestic collection, unless it is an issue of national security, crime or if their security is threatened in any way. There are loopholes and ways to unmask through backchannels, but Americans are supposed to be protected from incidental collection. Sources told Fox News that in this case, they were not.

This comes in the wake of Evelyn Farkas’ television interview last month in which the former Obama deputy secretary of defense said in part: “I was urging my former colleagues and, frankly speaking, the people on the Hill – it was more actually aimed at telling the Hill people, get as much information as you can, get as much intelligence as you can, before President Obama leaves the administration.”

Meanwhile, Fox News also is told that House Intelligence Committee Chairman Devin Nunes knew about unmasking and leaking back in January, well before President Trump’s tweet in March alleging wiretapping.

Nunes has faced criticism from Democrats for viewing pertinent documents on White House grounds and announcing their contents to the press. But sources said “the intelligence agencies slow-rolled Nunes. He could have seen the logs at other places besides the White House SCIF [secure facility], but it had already been a few weeks. So he went to the White House because he could protect his sources and he could get to the logs.”

As the Obama administration left office, it also approved new rules that gave the NSA much broader powers by relaxing the rules about sharing intercepted personal communications and the ability to share those with 16 other intelligence agencies.

Rice is no stranger to controversy. As the U.S. Ambassador to the UN, she appeared on several Sunday news shows to defend the adminstration’s later debunked claim that the Sept. 11, 2012 attacks on a U.S. consulate in Libya was triggered by an Internet video.

Rice also told ABC News in 2014 that Army Sgt. Bowe Bergdahl “served the United States with honor and distinction” and that he “wasn’t simply a hostage; he was an American prisoner of war captured on the battlefield.”

Bergdahl is currently facing court-martial on charges of desertion and misbehavior before the enemy for allegedly walking off his post in Afghanistan.

http://www.foxnews.com/politics/2017/04/03/susan-rice-requested-to-unmask-names-trump-transition-officials-sources-say.html

JULIEGRACE BRUFKE,  Capitol Hill Reporter

GOP Kentucky Sen. Rand Paul said he believes former National Security Advisor Susan Rice should testify before Congress on her request to unmask the names of Trump transition officials collected during routine intelligence-gathering operations.

Paul argued the situation should not be downplayed, saying reforms need to be made to prevent individuals from being blackmailed on personal aspects of their lives through unmasking. He noted there was nothing stopping the former administration from looking through Trump officials and national security advisors’ conversations during the transition window.

“If it is allowed, we shouldn’t be allowing it, but I don’t think should just discount how big a deal it is that Susan Rice was looking at these,” he told reporters Monday. “And she needs to be asked, ‘Did President Obama ask her to do this? Was this a directive from President Obama?  I think she should testify under oath on this.”

Paul said he has long thought there are too many people with the ability to unmask individuals.

“The law says you can’t reverse target people, but how would you know that once you get inside the brain and the people that are unmasking people,” Paul continued. “So, what if I decided to unmask and I’m there and I only unmask the conversations of my Democrat opponents — shouldn’t there be more restrictions for unmasking people in the political process?”

He said he believes there should be two individuals at the top of the agency to allow for identities to be unmasked. Paul noted the process is indiscriminate, noting the United States previously captured every phone call in Italy for a month.

“Basically there’s no Fourth Amendment when you use these kinds of things, you go with a lower standard because we’ve got to protect the country and we don’t care about spying on foreigners,” he said, adding there are said to be millions of Americans caught up in the country’s foreign targeting.

Paul said the president did not bring up the matter on their golf trip Sunday, but he voiced his opinion on the matter.

http://dailycaller.com/2017/04/03/rand-paul-calls-for-susan-rice-to-testify-on-unmasking-trump-officials/#ixzz4dDyYjidj

Top Obama Adviser Sought Names of Trump Associates in Intel

By Eli Lake

APRIL 3, 2017 10:13 AM EDT

White House lawyers last month learned that the former national security adviser Susan Rice requested the identities of U.S. persons in raw intelligence reports on dozens of occasions that connect to the Donald Trump transition and campaign, according to U.S. officials familiar with the matter.

The pattern of Rice’s requests was discovered in a National Security Council review of the government’s policy on “unmasking” the identities of individuals in the U.S. who are not targets of electronic eavesdropping, but whose communications are collected incidentally. Normally those names are redacted from summaries of monitored conversations and appear in reports as something like “U.S. Person One.”

The National Security Council’s senior director for intelligence, Ezra Cohen-Watnick, was conducting the review, according to two U.S. officials who spoke with Bloomberg View on the condition of anonymity because they were not authorized to discuss it publicly. In February Cohen-Watnick discovered Rice’s multiple requests to unmask U.S. persons in intelligence reports that related to Trump transition activities. He brought this to the attention of the White House General Counsel’s office, who reviewed more of Rice’s requests and instructed him to end his own research into the unmasking policy.

The intelligence reports were summaries of monitored conversations — primarily between foreign officials discussing the Trump transition, but also in some cases direct contact between members of the Trump team and monitored foreign officials. One U.S. official familiar with the reports said they contained valuable political information on the Trump transition such as whom the Trump team was meeting, the views of Trump associates on foreign policy matters and plans for the incoming administration.

Rice did not respond to an email seeking comment on Monday morning. Her role in requesting the identities of Trump transition officials adds an important element to the dueling investigations surrounding the Trump White House since the president’s inauguration.

Both the House and Senate intelligence committees are probing any ties between Trump associates and a Russian influence operation against Hillary Clinton during the election. The chairman of the House intelligence committee, Representative Devin Nunes, is also investigating how the Obama White House kept tabs on the Trump transition after the election through unmasking the names of Trump associates incidentally collected in government eavesdropping of foreign officials.

Rice herself has not spoken directly on the issue of unmasking. Last month when she was asked on the “PBS NewsHour” about reports that Trump transition officials, including Trump himself, were swept up in incidental intelligence collection, Rice said: “I know nothing about this,” adding, “I was surprised to see reports from Chairman Nunes on that account today.”

Rice’s requests to unmask the names of Trump transition officials do not vindicate Trump’s own tweets from March 4 in which he accused Obama of illegally tapping Trump Tower. There remains no evidence to support that claim.

But Rice’s multiple requests to learn the identities of Trump officials discussed in intelligence reports during the transition period does highlight a longstanding concern for civil liberties advocates about U.S. surveillance programs. The standard for senior officials to learn the names of U.S. persons incidentally collected is that it must have some foreign intelligence value, a standard that can apply to almost anything. This suggests Rice’s unmasking requests were likely within the law.

The news about Rice also sheds light on the strange behavior of Nunes in the last two weeks. It emerged last week that he traveled to the White House last month, the night before he made an explosive allegation about Trump transition officials caught up in incidental surveillance. At the time he said he needed to go to the White House because the reports were only on a database for the executive branch. It now appears that he needed to view computer systems within the National Security Council that would include the logs of Rice’s requests to unmask U.S. persons.

The ranking Democrat on the committee Nunes chairs, Representative Adam Schiff, viewed these reports on Friday. In comments to the press over the weekend he declined to discuss the contents of these reports, but also said it was highly unusual for the reports to be shown only to Nunes and not himself and other members of the committee.

Indeed, much about this is highly unusual: if not how the surveillance was collected, then certainly how and why it was disseminated.

https://www.bloomberg.com/view/articles/2017-04-03/top-obama-adviser-sought-names-of-trump-associates-in-intel

White House logs indicate Susan Rice consumed unmasked intel on Trump associates

by Sara Carter and John Solomon

Computer logs that former President Obama’s team left behind in the White House indicate his national security adviser Susan Rice accessed numerous intelligence reports during Obama’s last seven months in office that contained National Security Agency intercepts involving Donald Trump and his associates, Circa has learned.

Intelligence sources said the logs discovered by National Security Council staff suggested Rice’s interest in the NSA materials, some of which included unmasked Americans’ identities, appeared to begin last July around the time Trump secured the GOP nomination and accelerated after Trump’s election in November launched a transition that continued through January.

The exact national security justifications for Rice accessing the reports isn’t clear and may require additional documentation that the House and Senate intelligence committees have requested from the NSA, America’s lead agency in spying on foreign powers.

Rice has not returned repeated calls for comment from Circa. But in an interview with PBS recently, she said she had no idea what House Intelligence Committee chairman Devin Nunes was talking about when he said Obama officials were monitoring Trump associates after the election.

Both the Republican chairman and Democratic vice chairman of the Housing Intelligence Committee have been shown the documents discovered by the NSC over the last 10 days.

But Circa reported last week that Obama opened the door for his political aides like Rice to more easily gain access to unmasked Americans’ names in NSA intercepts through a series of rule changes beginning in 2011.

http://circa.com/politics/accountability/white-house-logs-indicate-susan-rice-consumed-unmasked-intel-on-trump-associates

Obama adviser Ben Rhodes claims Obama didn’t spy on Americans — instantly receives brutal fact check

Chris Enloe

President Donald Trump took to Twitter early on Saturday to bash NBC News anchor Chuck Todd for reporting on the investigation into alleged collusion between Trump’s campaign and Russia instead of focusing on “Obama surveillance.”

Trump tweeted:

When will Sleepy Eyes Chuck Todd and @NBCNews start talking about the Obama SURVEILLANCE SCANDAL and stop with the Fake Trump/Russia story?

But Ben Rhodes, who served as a senior national security adviser for former President Barack Obama, took issue with Trump’s claim that the Obama administration surveyed him.

“There is no Obama SURVEILLANCE SCANDAL even when you capitalize the words,” he tweeted at Trump.

However, Twitter was quick to hit back at Rhodes, given the Obama administration’s record of surveillance — which isn’t the best. Under Obama’s leadership, domestic spying became a key issue after they were caught spying on journalists from the Associated Press and Fox News correspondent James Rosen.

The Obama administration was even forced to weather a massive NSA spying scandal after NSA contractor Edward Snowden leaked thousands of NSA documents, which revealed government collection programs like PRISM.

Needless to say, no one was buying Rhodes’ lies.

http://www.theblaze.com/news/2017/04/01/obama-adviser-ben-rhodes-claims-obama-didnt-spy-on-americans-instantly-receives-brutal-fact-check/

Global surveillance disclosures (2013–present)

From Wikipedia, the free encyclopedia
“Global surveillance disclosures” redirects here. For disclosures published before those of Edward Snowden, see Global surveillance disclosures (1970–2013).

Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners’ global surveillance[1] of foreign nationals and US citizens. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States.[2] In addition to a trove of US federal documents, Snowden’s cache reportedly contains thousands of Australian, British and Canadian intelligence files that he had accessed via the exclusive “Five Eyes” network. In June 2013, the first of Snowden’s documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention.[3] The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times (United States), the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L’espresso (Italy), NRC Handelsblad (the Netherlands), Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).[4]

These media reports have shed light on the implications of several secret treaties signed by members of the UKUSA community in their efforts to implement global surveillance. For example, Der Spiegel revealed how the German Bundesnachrichtendienst (BND) transfers “massive amounts of intercepted data to the NSA”,[5] while Swedish Television revealed the National Defence Radio Establishment (FRA) provided the NSA with data from its cable collection, under a secret treaty signed in 1954 for bilateral cooperation on surveillance.[6]Other security and intelligence agencies involved in the practice of global surveillance include those in Australia (ASD), Britain (GCHQ), Canada (CSEC), Denmark (PET), France (DGSE), Germany (BND), Italy (AISE), the Netherlands (AIVD), Norway (NIS), Spain (CNI), Switzerland (NDB), Singapore (SID) as well as Israel (ISNU), which receives raw, unfiltered data of US citizens that is shared by the NSA.[7][8][9][10][11][12][13][14]

On June 14, 2013, United States prosecutorscharged Edward Snowden with espionage and theft of government property.[15] In late July 2013, he was granted a one-year temporary asylum by the Russian government,[16] contributing to a deterioration of Russia–United States relations.[17][18] On August 6, 2013, US President Barack Obama made a public appearance on national television where he told Americans that “We don’t have a domestic spying program” and that “There is no spying on Americans”.[19] Towards the end of October 2013, the British Prime Minister David Cameron warned The Guardiannot to publish any more leaks, or it will receive a DA-Notice.[20] In November 2013, a criminal investigation of the disclosure was being undertaken by Britain’s Metropolitan Police Service.[21] In December 2013, The Guardian editor Alan Rusbridger said: “We have published I think 26 documents so far out of the 58,000 we’ve seen.”[22]

The extent to which the media reports have responsibly informed the public is disputed. In January 2014, Obama said that “the sensational way in which these disclosures have come out has often shed more heat than light”[23] and critics such as Sean Wilentz have noted that many of the Snowden documents released do not concern domestic surveillance.[24] In its first assessment of these disclosures, the Pentagon concluded that Snowden committed the biggest “theft” of U.S. secrets in the history of the United States.[25] Sir David Omand, a former director of GCHQ, described Snowden’s disclosure as the “most catastrophic loss to British intelligence ever”.[26]

Background

Barton Gellman, a Pulitzer Prize–winning journalist who led The Washington Posts coverage of Snowden’s disclosures, summarized the leaks as follows:

“Taken together, the revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations.”

The disclosure revealed specific details of the NSA’s close cooperation with U.S. federal agencies such as the Federal Bureau of Investigation (FBI)[28][29] and the Central Intelligence Agency (CIA)[30][31] in addition to the agency’s previously undisclosed financial payments to numerous commercial partners and telecommunications companies,[32][33][34] as well as its previously undisclosed relationships with international partners such as Britain,[35][36] France[12][37] Germany,[5][38] and its secret treaties with foreign governments that were recently established for sharing intercepted data of each other’s citizens.[7][39][40][41] The disclosures were made public over the course of several months since June 2013, by the press in several nations from the trove leaked by the former NSA contractor Edward J. Snowden,[42] who obtained the trove while working for Booz Allen Hamilton.[2]

George Brandis, the current Attorney-General of Australia, asserted that Snowden’s disclosure is the “most serious setback for Western intelligence since the Second World War.”[43]

Global surveillance

Main article: Global surveillance

As of December 2013, global surveillance programs include:

Global surveillance programs
Program International contributors and/or partners Commercial partners
United StatesPRISM
United StatesXKeyscore
United KingdomTempora
United KingdomMUSCULAR
GermanyProject 6
Stateroom
Lustre

The NSA was also getting data directly from telecommunications companies codenamed Artifice, Lithium, Serenade, SteelKnight, and X. The real identities of the companies behind these codenames were not included in the Snowden document dump because they were protected as Exceptionally Controlled Information which prevents wide circulation even to those (like Snowden) who otherwise have the necessary security clearance.[65][66]

Disclosures

Although the exact size of Snowden’s disclosure remains unknown, the following estimates have been put up by various government officials:

As a contractor of the NSA, Snowden was granted access to U.S. government documents along with top secret documents of several allied governments, via the exclusive Five Eyes network.[69] Snowden claims that he is currently not in physical possession of any of these documents, after having surrendered all copies to the journalists he met in Hong Kong.[70]

According to his lawyer, Snowden has pledged not to release any documents while in Russia, leaving the responsibility for further disclosures solely to journalists.[71] As of 2014, the following news outlets have accessed some of the documents provided by Snowden: Australian Broadcasting Corporation, Canadian Broadcasting Corporation, Channel 4, Der Spiegel, El Pais, El Mundo, L’espresso, Le Monde, NBC, NRC Handelsblad, Dagbladet, O Globo, South China Morning Post, Süddeutsche Zeitung, Sveriges Television, The Guardian, The New York Times, and The Washington Post.

Historical context

In the 1970s, NSA analyst Perry Fellwock (under the pseudonym “Winslow Peck”) revealed the existence of the UKUSA Agreement, which forms the basis of the ECHELON network, whose existence was revealed in 1988 by Lockheed employee Margaret Newsham.[72][73] Months before the September 11 attacks and during its aftermath, further details of the global surveillance apparatus were provided by various individuals such as the former MI5 official David Shayler and the journalist James Bamford,[74][75] who were followed by:

In the aftermath of Snowden’s revelations, The Pentagon concluded that Snowden committed the biggest theft of U.S. secrets in the history of the United States.[25] In Australia, the coalition government described the leaks as the most damaging blow dealt to Australian intelligence in history.[43] Sir David Omand, a former director of GCHQ, described Snowden’s disclosure as the “most catastrophic loss to British intelligence ever”.[26]

Timeline

The Mira hotel in Hong Kong, where Edward Snowden hosted his first meeting with Glenn Greenwald, Laura Poitras, and journalist Ewen MacAskill of The Guardian[86]

In April 2012, NSA contractor Edward Snowden began downloading documents.[87] That year, Snowden had made his first contact with journalist Glenn Greenwald of The Guardian and he contacted documentary filmmaker Laura Poitras in January 2013.[88][89]

2013

May

In May 2013, Snowden went on temporary leave from his position at the NSA, citing the pretext of receiving treatment for his epilepsy. Towards the end of May, he traveled to Hong Kong.[90][91] Greenwald, Poitras and the Guardian’s defence and intelligence correspondent Ewen MacAskill flew to Hong Kong to meet Snowden.

June

After the U.S.-based editor of The Guardian, Janine Gibson, held several meetings in New York City, it was decided that Greenwald, Poitras and the Guardians defence and intelligence correspondent Ewen MacAskill would fly to Hong Kong to meet Snowden. On June 5, in the first media report based on the leaked material,[92]The Guardian exposed a top secret court order showing that the NSA had collected phone records from over 120 million Verizon subscribers.[93] Under the order, the numbers of both parties on a call, as well as the location data, unique identifiers, time of call, and duration of call were handed over to the FBI, which turned over the records to the NSA.[93] According to The Wall Street Journal, the Verizon order is part of a controversial data program, which seeks to stockpile records on all calls made in the U.S., but does not collect information directly from T-Mobile US and Verizon Wireless, in part because of their foreign ownership ties.[94]

On June 6, 2013, the second media disclosure, the revelation of the PRISM surveillance program (which collects the e-mail, voice, text and video chats of foreigners and an unknown number of Americans from Microsoft, Google, Facebook, Yahoo, Apple and other tech giants),[95][96][97][98] was published simultaneously by The Guardian and The Washington Post.[86][99]

Slide from a 2008 NSA presentation about XKeyscore, showing a worldmap with the locations of XKeyscore servers

Der Spiegel revealed NSA spying on multiple diplomatic missions of the European Union (EU) and the United Nations Headquarters in New York.[100][101] During specific episodes within a four-year period, the NSA hacked several Chinese mobile-phone companies,[102] the Chinese University of Hong Kong and Tsinghua University in Beijing,[103] and the Asian fiber-optic network operator Pacnet.[104] Only Australia, Canada, New Zealand and the UK are explicitly exempted from NSA attacks, whose main target in the EU is Germany.[105] A method of bugging encrypted fax machines used at an EU embassy is codenamed Dropmire.[106]

During the 2009 G-20 London summit, the British intelligence agency Government Communications Headquarters (GCHQ) intercepted the communications of foreign diplomats.[107] In addition, GCHQ has been intercepting and storing mass quantities of fiber-optic traffic via Tempora.[108] Two principal components of Tempora are called “Mastering the Internet” (MTI) and “Global Telecoms Exploitation“.[109] The data is preserved for three days while metadata is kept for thirty days.[110] Data collected by GCHQ under Tempora is shared with the National Security Agency (NSA) of the United States.[109]

From 2001 to 2011, the NSA collected vast amounts of metadata records detailing the email and internet usage of Americans via Stellar Wind,[111] which was later terminated due to operational and resource constraints. It was subsequently replaced by newer surveillance programs such as ShellTrumpet, which “processed its one trillionth metadata record” by the end of December 2012.[112]

The NSA follows specific procedures to target non-U.S. persons[113] and to minimize data collection from U.S. persons.[114] These court-approved policies allow the NSA to:[115][116]

  • keep data that could potentially contain details of U.S. persons for up to five years;
  • retain and make use of “inadvertently acquired” domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted, or are believed to contain any information relevant to cybersecurity;
  • preserve “foreign intelligence information” contained within attorney–client communications; and
  • access the content of communications gathered from “U.S. based machine[s]” or phone numbers in order to establish if targets are located in the U.S., for the purposes of ceasing further surveillance.

According to Boundless Informant, over 97 billion pieces of intelligence were collected over a 30-day period ending in March 2013. Out of all 97 billion sets of information, about 3 billion data sets originated from U.S. computer networks[117] and around 500 million metadata records were collected from German networks.[118]

In August 2013, it was revealed that the Bundesnachrichtendienst (BND) of Germany transfers massive amounts of metadata records to the NSA.[119]

Der Spiegel disclosed that Germany is the most targeted country of the 27 members of the European Union due to the NSA systematic monitoring and storage of Germany’s telephone and Internet connection data. According to the magazine the NSA stores data from around half a billion communications connections in Germany each month. This data includes telephone calls, emails, mobile-phone text messages and chat transcripts.[120]

On June 11, 2013, The Guardian published a snapshot of the NSA’s global map of electronic data collection for the month of March 2013. Known as the Boundless Informant, the program is used by the NSA to track the amount of data being analyzed over a specific period of time. The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Outside the Middle East, only China, Germany, India, Kenya, Colombia, the United Kingdom, and the United States are colored orange or yellow

July[edit]

The NSA gained massive amounts of information captured from the monitored data traffic in Europe. For example, in December 2013, the NSA gathered on an average day metadata from some 15 million telephone connections and 10 million Internet datasets. The NSA also monitored the European Commission in Brussels and monitored EU diplomatic Facilities in Washington and at the United Nations by placing bugs in offices as well as infiltrating computer networks.[121]

The U.S. government made as part of its UPSTREAM data collection program deals with companies to ensure that it had access to and hence the capability to surveil undersea fiber-optic cables which deliver e-mails, Web pages, other electronic communications and phone calls from one continent to another at the speed of light.[122][123]

According to the Brazilian newspaper O Globo, the NSA spied on millions of emails and calls of Brazilian citizens,[124][125] while Australia and New Zealand have been involved in the joint operation of the NSA’s global analytical system XKeyscore.[126][127] Among the numerous allied facilities contributing to XKeyscore are four installations in Australia and one in New Zealand:

O Globo released an NSA document titled “Primary FORNSAT Collection Operations“, which revealed the specific locations and codenames of the FORNSAT intercept stations in 2002.[128]

According to Edward Snowden, the NSA has established secret intelligence partnerships with many Western governments.[127] The Foreign Affairs Directorate (FAD) of the NSA is responsible for these partnerships, which, according to Snowden, are organized such that foreign governments can “insulate their political leaders” from public outrage in the event that these global surveillance partnerships are leaked.[129]

In an interview published by Der Spiegel, Snowden accused the NSA of being “in bed together with the Germans”.[130] The NSA granted the German intelligence agencies BND (foreign intelligence) and BfV (domestic intelligence) access to its controversial XKeyscore system.[131] In return, the BND turned over copies of two systems named Mira4 and Veras, reported to exceed the NSA’s SIGINT capabilities in certain areas.[5] Every day, massive amounts of metadata records are collected by the BND and transferred to the NSA via the Bad Aibling Station near Munich, Germany.[5] In December 2012 alone, the BND handed over 500 million metadata records to the NSA.[132][133]

In a document dated January 2013, the NSA acknowledged the efforts of the BND to undermine privacy laws:

“The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing”.[133]

According to an NSA document dated April 2013, Germany has now become the NSA’s “most prolific partner”.[133] Under a section of a separate document leaked by Snowden titled “Success Stories”, the NSA acknowledged the efforts of the German government to expand the BND’s international data sharing with partners:

“The German government modifies its interpretation of the G-10 privacy law … to afford the BND more flexibility in sharing protected information with foreign partners.”[50]

In addition, the German government was well aware of the PRISM surveillance program long before Edward Snowden made details public. According to Angela Merkel’s spokesman Steffen Seibert, there are two separate PRISM programs – one is used by the NSA and the other is used by NATO forces in Afghanistan.[134] The two programs are “not identical”.[134]

The Guardian revealed further details of the NSA’s XKeyscore tool, which allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals without prior authorization.[135][136][137] Microsoft “developed a surveillance capability to deal” with the interception of encrypted chats on Outlook.com, within five months after the service went into testing. NSA had access to Outlook.com emails because “Prism collects this data prior to encryption.”[47]

In addition, Microsoft worked with the FBI to enable the NSA to gain access to its cloud storage service SkyDrive. An internal NSA document dating from August 3, 2012 described the PRISM surveillance program as a “team sport“.[47]

Even if there is no reason to suspect U.S. citizens of wrongdoing, the CIA‘s National Counterterrorism Center is allowed to examine federal government files for possible criminal behavior. Previously the NTC was barred to do so, unless a person was a terror suspect or related to an investigation.[138]

Snowden also confirmed that Stuxnet was cooperatively developed by the United States and Israel.[139] In a report unrelated to Edward Snowden, the French newspaper Le Monde revealed that France’s DGSE was also undertaking mass surveillance, which it described as “illegal and outside any serious control”.[140][141]

August

Documents leaked by Edward Snowden that were seen by Süddeutsche Zeitung (SZ) and Norddeutscher Rundfunk revealed that several telecom operators have played a key role in helping the British intelligence agency Government Communications Headquarters (GCHQ) tap into worldwide fiber-optic communications. The telecom operators are:

Each of them were assigned a particular area of the international fiber-optic network for which they were individually responsible. The following networks have been infiltrated by GCHQ: TAT-14 (Europe-USA), Atlantic Crossing 1 (Europe-USA), Circe South (France-UK), Circe North (The Netherlands-UK), Flag Atlantic-1, Flag Europa-Asia, SEA-ME-WE 3 (Southeast Asia-Middle East-Western Europe), SEA-ME-WE 4 (Southeast Asia-Middle East-Western Europe), Solas (Ireland-UK), UK-France 3, UK-Netherlands 14, ULYSSES (Europe-UK), Yellow (UK-USA) and Pan European Crossing.[143]

Telecommunication companies who participated were “forced” to do so and had “no choice in the matter”.[143] Some of the companies were subsequently paid by GCHQ for their participation in the infiltration of the cables.[143]According to the SZ, GCHQ has access to the majority of internet and telephone communications flowing throughout Europe, can listen to phone calls, read emails and text messages, see which websites internet users from all around the world are visiting. It can also retain and analyse nearly the entire European internet traffic.[143]

GCHQ is collecting all data transmitted to and from the United Kingdom and Northern Europe via the undersea fibre optic telecommunications cable SEA-ME-WE 3. The Security and Intelligence Division (SID) of Singapore co-operates with Australia in accessing and sharing communications carried by the SEA-ME-WE-3 cable. The Australian Signals Directorate (ASD) is also in a partnership with British, American and Singaporean intelligence agencies to tap undersea fibre optic telecommunications cables that link Asia, the Middle East and Europe and carry much of Australia’s international phone and internet traffic.[144]

The U.S. runs a top-secret surveillance program known as the Special Collection Service (SCS), which is based in over 80 U.S. consulates and embassies worldwide.[145][146] The NSA hacked the United Nations’ video conferencing system in Summer 2012 in violation of a UN agreement.[145][146]

The NSA is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, but also searching the contents of vast amounts of e-mail and text communications into and out of the country by Americans who mention information about foreigners under surveillance.[147] It also spied on the Al Jazeera and gained access to its internal communications systems.[148]

The NSA has built a surveillance network that has the capacity to reach roughly 75% of all U.S. Internet traffic.[149][150][151] U.S. Law-enforcement agencies use tools used by computer hackers to gather information on suspects.[152][153] An internal NSA audit from May 2012 identified 2776 incidents i.e. violations of the rules or court orders for surveillance of Americans and foreign targets in the U.S. in the period from April 2011 through March 2012, while U.S. officials stressed that any mistakes are not intentional.[154][155][156][157][158][159][160]

The FISA Court that is supposed to provide critical oversight of the U.S. government’s vast spying programs has limited ability to do so and it must trust the government to report when it improperly spies on Americans.[161] A legal opinion declassified on August 21, 2013, revealed that the NSA intercepted for three years as many as 56,000 electronic communications a year of Americans not suspected of having links to terrorism, before FISA court that oversees surveillance found the operation unconstitutional in 2011.[162][163][164][165][166] Under the Corporate Partner Access project, major U.S. telecommunications providers receive hundreds of millions of dollars each year from the NSA.[167] Voluntary cooperation between the NSA and the providers of global communications took off during the 1970s under the cover name BLARNEY.[167]

A letter drafted by the Obama administration specifically to inform Congress of the government’s mass collection of Americans’ telephone communications data was withheld from lawmakers by leaders of the House Intelligence Committee in the months before a key vote affecting the future of the program.[168][169]

The NSA paid GCHQ over £100 Million between 2009 and 2012, in exchange for these funds GCHQ “must pull its weight and be seen to pull its weight.” Documents referenced in the article explain that the weaker British laws regarding spying are “a selling point” for the NSA. GCHQ is also developing the technology to “exploit any mobile phone at any time.”[170] The NSA has under a legal authority a secret backdoor into its databases gathered from large Internet companies enabling it to search for U.S. citizens’ email and phone calls without a warrant.[171][172]

The Privacy and Civil Liberties Oversight Board urged the U.S. intelligence chiefs to draft stronger US surveillance guidelines on domestic spying after finding that several of those guidelines have not been updated up to 30 years.[173][174] U.S. intelligence analysts have deliberately broken rules designed to prevent them from spying on Americans by choosing to ignore so-called “minimisation procedures” aimed at protecting privacy[175][176] and used the NSA’s agency’s enormous eavesdropping power to spy on love interests.[177]

After the U.S. Foreign Secret Intelligence Court ruled in October 2011 that some of the NSA’s activities were unconstitutional, the agency paid millions of dollars to major internet companies to cover extra costs incurred in their involvement with the PRISM surveillance program.[178]

Mastering the Internet” (MTI) is part of the Interception Modernisation Programme (IMP) of the British government that involves the insertion of thousands of DPI (deep packet inspection) “black boxes” at various internet service providers, as revealed by the British media in 2009.[179]

In 2013, it was further revealed that the NSA had made a £17.2 million financial contribution to the project, which is capable of vacuuming signals from up to 200 fibre-optic cables at all physical points of entry into Great Britain.[180]

September

The Guardian and The New York Times reported on secret documents leaked by Snowden showing that the NSA has been in “collaboration with technology companies” as part of “an aggressive, multipronged effort” to weaken the encryption used in commercial software, and GCHQ has a team dedicated to cracking “Hotmail, Google, Yahoo and Facebook” traffic.[181][182][183][184][185][186]

Germany’s domestic security agency Bundesverfassungsschutz (BfV) systematically transfers the personal data of German residents to the NSA, CIA and seven other members of the United States Intelligence Community, in exchange for information and espionage software.[187][188][189] Israel, Sweden and Italy are also cooperating with American and British intelligence agencies. Under a secret treaty codenamed “Lustre“, French intelligence agencies transferred millions of metadata records to the NSA.[63][64][190][191]

The Obama Administration secretly won permission from the Foreign Intelligence Surveillance Court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases. The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act. Under that law, the target must be a foreigner “reasonably believed” to be outside the United States, and the court must approve the targeting procedures in an order good for one year. But a warrant for each target would thus no longer be required. That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists, spies or “foreign powers.” The FISC extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years with an extension possible for foreign intelligence or counterintelligence purposes. Both measures were done without public debate or any specific authority from Congress.[192]

A special branch of the NSA called “Follow the Money” (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA’s own financial databank “Tracfin”.[193] The NSA monitored the communications of Brazil’s president Dilma Rousseff and her top aides.[194] The agency also spied on Brazil’s oil firm Petrobras as well as French diplomats, and gained access to the private network of the Ministry of Foreign Affairs of France and the SWIFT network.[195]

In the United States, the NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information.[196] The NSA routinely shares raw intelligence data with Israel without first sifting it to remove information about U.S. citizens.[7][197]

In an effort codenamed GENIE, computer specialists can control foreign computer networks using “covert implants,” a form of remotely transmitted malware on tens of thousands of devices annually.[198][199][200][201] As worldwide sales of smartphones began exceeding those of feature phones, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone combines a myriad of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords.[202]

An internal NSA report from 2010 stated that the spread of the smartphone has been occurring “extremely rapidly”—developments that “certainly complicate traditional target analysis.”[202] According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and operating systems, including Apple Inc.‘s iPhone and iOS operating system, as well as Google‘s Android mobile operating system.[202] Similarly, Britain’s GCHQ assigned a team to study and crack the BlackBerry.[202]

An NSA presentation called “Your target is using a BlackBerry? Now what?” shows an intercepted Mexican government e-mail.

Under the heading “iPhone capability”, the document notes that there are smaller NSA programs, known as “scripts”, that can perform surveillance on 38 different features of the iOS 3 and iOS 4 operating systems. These include the mapping feature, voicemail and photos, as well as Google Earth, Facebook and Yahoo! Messenger.[202]

On September 9, 2013, an internal NSA presentation on iPhone Location Services was published by Der Spiegel. One slide shows scenes from Apple’s 1984-themed television commercial alongside the words “Who knew in 1984…”; another shows Steve Jobs holding an iPhone, with the text “…that this would be big brother…”; and a third shows happy consumers with their iPhones, completing the question with “…and the zombies would be paying customers?”[203]

October

On October 4, 2013, The Washington Post and The Guardian jointly reported that the NSA and GCHQ had made repeated attempts to spy on anonymous Internet users who have been communicating in secret via the anonymity network Tor. Several of these surveillance operations involved the implantation of malicious code into the computers of Tor users who visit particular websites. The NSA and GCHQ had partly succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. The government agencies were also able to uncover the identity of some anonymous Internet users.[204][205][206][207][208][209][210][211][212]

The Communications Security Establishment Canada (CSEC) has been using a program called Olympia to map the communications of Brazil’s Mines and Energy Ministry by targeting the metadata of phone calls and emails to and from the ministry.[213][214]

The Australian Federal Government knew about the PRISM surveillance program months before Edward Snowden made details public.[215][216]

The NSA gathered hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world. The agency did not target individuals. Instead it collected contact lists in large numbers that amount to a sizable fraction of the world’s e-mail and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and to map relationships within a much smaller universe of foreign intelligence targets.[217][218][219][220]

The NSA monitored the public email account of former Mexican president Felipe Calderón (thus gaining access to the communications of high-ranking cabinet members), the emails of several high-ranking members of Mexico’s security forces and text and the mobile phone communication of current Mexican president Enrique Peña Nieto.[221][222] The NSA tries to gather cellular and landline phone numbers—often obtained from American diplomats—for as many foreign officials as possible. The contents of the phone calls are stored in computer databases that can regularly be searched using keywords.[223][224]

The NSA has been monitoring telephone conversations of 35 world leaders.[225] The U.S. government’s first public acknowledgment that it tapped the phones of world leaders was reported on October 28, 2013, by the Wall Street Journal after an internal U.S. government review turned up NSA monitoring of some 35 world leaders.[226]GCHQ has tried to keep its mass surveillance program a secret because it feared a “damaging public debate” on the scale of its activities which could lead to legal challenges against them.[227]

The Guardian revealed that the NSA had been monitoring telephone conversations of 35 world leaders after being given the numbers by an official in another U.S. government department. A confidential memo revealed that the NSA encouraged senior officials in such Departments as the White House, State and The Pentagon, to share their “Rolodexes” so the agency could add the telephone numbers of leading foreign politicians to their surveillance systems. Reacting to the news, German leader Angela Merkel, arriving in Brussels for an EU summit, accused the U.S. of a breach of trust, saying: “We need to have trust in our allies and partners, and this must now be established once again. I repeat that spying among friends is not at all acceptable against anyone, and that goes for every citizen in Germany.”[225] The NSA collected in 2010 data on ordinary Americans’ cellphone locations, but later discontinued it because it had no “operational value.”[228]

Under Britain’s MUSCULAR programme, the NSA and GCHQ have secretly broken into the main communications links that connect Yahoo and Googledata centers around the world and thereby gained the ability to collect metadata and content at will from hundreds of millions of user accounts.[229][230][231][232][233]

The mobile phone of German Chancellor Angela Merkel might have been tapped by U.S. intelligence.[234][235][236][237][238][239][240] According to the Spiegel this monitoring goes back to 2002[241][242][243] and ended in the summer of 2013,[226] while The New York Times reported that Germany has evidence that the NSA’s surveillance of Merkel began during George W. Bush‘s tenure.[244] After learning from Der Spiegel magazine that the NSA has been listening in to her personal mobile phone, Merkel compared the snooping practices of the NSA with those of the Stasi.[245] It was reported in March 2014, by Der Spiegel that Merkel had also been placed on an NSA surveillance list alongside 122 other world leaders.[246]

On October 31, 2013, Hans-Christian Ströbele, a member of the German Bundestag, met Snowden in Moscow and revealed the former intelligence contractor’s readiness to brief the German government on NSA spying.[247]

A highly sensitive signals intelligence collection program known as Stateroom involves the interception of radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the Five Eyes (Australia, Britain, Canada, New Zealand, United States) in numerous locations around the world. The program conducted at U.S. diplomatic missions is run in concert by the U.S. intelligence agencies NSA and CIA in a joint venture group called “Special Collection Service” (SCS), whose members work undercover in shielded areas of the American Embassies and Consulates, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. The SCS for example used the American Embassy near the Brandenburg Gate in Berlin to monitor communications in Germany’s government district with its parliament and the seat of the government.[240][248][249][250]

Under the Stateroom surveillance programme, Australia operates clandestine surveillance facilities to intercept phone calls and data across much of Asia.[249][251]

In France, the NSA targeted people belonging to the worlds of business, politics or French state administration. The NSA monitored and recorded the content of telephone communications and the history of the connections of each target i.e. the metadata.[252][253] The actual surveillance operation was performed by French intelligence agencies on behalf of the NSA.[63][254] The cooperation between France and the NSA was confirmed by the Director of the NSA, Keith B. Alexander, who asserted that foreign intelligence services collected phone records in “war zones” and “other areas outside their borders” and provided them to the NSA.[255]

The French newspaper Le Monde also disclosed new PRISM and Upstream slides (See Page 4, 7 and 8) coming from the “PRISM/US-984XN Overview” presentation.[256]

In Spain, the NSA intercepted the telephone conversations, text messages and emails of millions of Spaniards, and spied on members of the Spanish government.[257] Between December 10, 2012 and January 8, 2013, the NSA collected metadata on 60 million telephone calls in Spain.[258]

According to documents leaked by Snowden, the surveillance of Spanish citizens was jointly conducted by the NSA and the intelligence agencies of Spain.[259][260]

On October 4, 2013, The Washington Post published a powerpoint presentation leaked by Snowden, showing how the NSA had compromised the Tor encrypted network that is being employed by hundreds of thousands of people to circumvent “nation state internet policies”. By secretly exploiting a JavaScriptplug-in, the NSA was able to uncover the identities of various anonymous Internet users such as dissidents, terrorists, and other targets

November

The New York Times reported that the NSA carries out an eavesdropping effort, dubbed Operation Dreadnought, against the Iranian leader Ayatollah Ali Khamenei. During his 2009 visit to Iranian Kurdistan, the agency collaborated with GCHQ and the U.S.’s National Geospatial-Intelligence Agency, collecting radio transmissions between aircraft and airports, examining Khamenei’s convoy with satellite imagery, and enumerating military radar stations. According to the story, an objective of the operation is “communications fingerprinting”: the ability to distinguish Khamenei’s communications from those of other people in Iran.[261]

The same story revealed an operation code-named Ironavenger, in which the NSA intercepted e-mails sent between a country allied with the United States and the government of “an adversary”. The ally was conducting a spear-phishing attack: its e-mails contained malware. The NSA gathered documents and login credentials belonging to the enemy country, along with knowledge of the ally’s capabilities for attacking computers.[261]

According to the British newspaper The Independent, the British intelligence agency GCHQ maintains a listening post on the roof of the British Embassy in Berlin that is capable of intercepting mobile phone calls, wi-fi data and long-distance communications all over the German capital, including adjacent government buildings such as the Reichstag (seat of the German parliament) and the Chancellery (seat of Germany’s head of government) clustered around the Brandenburg Gate.[262]

Operating under the code-name “Quantum Insert”, GCHQ set up a fake website masquerading as LinkedIn, a social website used for professional networking, as part of its efforts to install surveillance software on the computers of the telecommunications operator Belgacom.[263][264][265] In addition, the headquarters of the oil cartel OPEC were infiltrated by GCHQ as well as the NSA, which bugged the computers of nine OPEC employees and monitored the General Secretary of OPEC.[263]

For more than three years GCHQ has been using an automated monitoring system code-named “Royal Concierge” to infiltrate the reservation systems of at least 350 upscale hotels in many different parts of the world in order to target, search and analyze reservations to detect diplomats and government officials.[266] First tested in 2010, the aim of the “Royal Concierge” is to track down the travel plans of diplomats, and it is often supplemented with surveillance methods related to human intelligence (HUMINT). Other covert operations include the wiretapping of room telephones and fax machines used in targeted hotels as well as the monitoring of computers hooked up to the hotel network.[266]

In November 2013, the Australian Broadcasting Corporation and The Guardian revealed that the Australian Signals Directorate (DSD) had attempted to listen to the private phone calls of the president of Indonesia and his wife. The Indonesian foreign minister, Marty Natalegawa, confirmed that he and the president had contacted the ambassador in Canberra. Natalegawa said any tapping of Indonesian politicians’ personal phones “violates every single decent and legal instrument I can think of—national in Indonesia, national in Australia, international as well”.[267]

Other high-ranking Indonesian politicians targeted by the DSD include:

Carrying the title “3G impact and update”, a classified presentation leaked by Snowden revealed the attempts of the ASD/DSD to keep up to pace with the rollout of 3G technology in Indonesia and across Southeast Asia. The ASD/DSD motto placed at the bottom of each page reads: “Reveal their secrets—protect our own.”[268]

Under a secret deal approved by British intelligence officials, the NSA has been storing and analyzing the internet and email records of UK citizens since 2007. The NSA also proposed in 2005 a procedure for spying on the citizens of the UK and other Five-Eyes nations alliance, even where the partner government has explicitly denied the U.S. permission to do so. Under the proposal, partner countries must neither be informed about this particular type of surveillance, nor the procedure of doing so.[39]

Towards the end of November, The New York Times released an internal NSA report outlining the agency’s efforts to expand its surveillance abilities.