Animal

The Pronk Pops Show 1119, August 2, 2018, Story 1: President Trump Rising In Polls Hits 50 Percent Approval for Job Performance — Party Affiliation of Voters — Independents 41 Percent — Democrats 30 Percent and Republican 26 Percent — Videos — Story 2: Third Quarter 2018 Real Gross Domestic Product (GDP) Could Hit 5 Percent — Advance Estimate Released on October 26 — Videos — Story 3: Number of Americans on Food Stamps or Supplemental Nutrition Assistance Program (SNAP) Declining As Budgets Decline –Food in A Box — Less Money More Food — Videos — Story 4: Obesity Expanding In America — Fat Ass Americans — Pandemic — Keeping America Fat — Promises Kept — Videos

Posted on August 3, 2018. Filed under: American History, Animal, Banking System, Beef, Blogroll, Bread, Breaking News, Budgetary Policy, Business, Cartoons, Cereal, Clinton Obama Democrat Criminal Conspiracy, Communications, Congress, Corruption, Countries, Crime, Culture, Diet, Diets, Disasters, Donald J. Trump, Donald J. Trump, Donald Trump, Eating, Economics, Empires, Employment, Exercise, Fiscal Policy, Food, Food, Government Dependency, Government Spending, Health, Health Care, Health Care Insurance, History, House of Representatives, Human, Human Behavior, Independence, Investments, IRS, Labor Economics, Life, Media, Medical, Milk, Monetary Policy, National Interest, Networking, News, Nutrition, Obesity, Overweight, People, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Radio, Raymond Thomas Pronk, Robert S. Mueller III, Rule of Law, Scandals, Science, Security, Senate, Spying, Success, Supplemental Nutrition Assistance Program (SNAP_, Surveillance and Spying On American People, Surveillance/Spying, Tax Policy, Taxation, Taxes, Technology, Trade Policy, United States of America, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 

 

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1119, August 2, 2018

Pronk Pops Show 1118, August 1, 2018

Pronk Pops Show 1117, July 31, 2018

Pronk Pops Show 1116, July 30, 2018

Pronk Pops Show 1115, July 26, 2018

Pronk Pops Show 1114, July 25, 2018

Pronk Pops Show 1113, July 24, 2018

Pronk Pops Show 1112, July 23, 2018

Pronk Pops Show 1111, July 19, 2018

Pronk Pops Show 1110, July 18, 2018

Pronk Pops Show 1109, July 17, 2018

Pronk Pops Show 1108, July 16, 2018

Pronk Pops Show 1107, July 12, 2018

Pronk Pops Show 1106, July 11, 2018

Pronk Pops Show 1105, July 10, 2018

Pronk Pops Show 1104, July 9, 2018

Pronk Pops Show 1103, July 5, 2018

Pronk Pops Show 1102, JUly 3, 2018

Pronk Pops Show 1101, July 2, 2018

Pronk Pops Show 1100, June 28, 2018

Pronk Pops Show 1099, June 26, 2018

Pronk Pops Show 1098, June 25, 2018 

Pronk Pops Show 1097, June 21, 2018

Pronk Pops Show 1096, June 20, 2018

Pronk Pops Show 1095, June 19, 2018

Pronk Pops Show 1094, June 18, 2018

Pronk Pops Show 1093, June 14, 2018

Pronk Pops Show 1092, June 13, 2018

Pronk Pops Show 1091, June 12, 2018

Pronk Pops Show 1090, June 11, 2018

Pronk Pops Show 1089, June 7, 2018

Pronk Pops Show 1088, June 6, 2018 

Pronk Pops Show 1087, June 4, 2018

Pronk Pops Show 1086, May 31, 2018

Pronk Pops Show 1085, May 30, 2018

Pronk Pops Show 1084, May 29, 2018

Pronk Pops Show 1083, May 24, 2018

Pronk Pops Show 1082, May 23, 2018

Pronk Pops Show 1081, May 22, 2018

Pronk Pops Show 1080, May 21, 2018

Pronk Pops Show 1079, May 17, 2018

Pronk Pops Show 1078, May 16, 2018

Pronk Pops Show 1077, May 15, 2018

Pronk Pops Show 1076, May 14, 2018

Pronk Pops Show 1075, May 10, 2018

Pronk Pops Show 1073, May 8, 2018

Pronk Pops Show 1072, May 7, 2018

Pronk Pops Show 1071, May 4, 2018

Pronk Pops Show 1070, May 3, 2018

Pronk Pops Show 1069, May 2, 2018

See the source imageSee the source image

See the source imageSee the source image

 

Story 1: President Trump Rising In Polls Hits 50 Percent Approval for Job Performance — Party Affiliation of Voters: Independents 41 Percent — Democrats 30 Percent and Republican 26 Percent — Videos —

 

Daily Presidential Tracking Poll

The Rasmussen Reports daily Presidential Tracking Poll for Thursday shows that 50% of Likely U.S. Voters approve of President Trump’s job performance. Forty-nine percent (49%) disapprove.

The latest figures include 35% who Strongly Approve of the way Trump is performing and 41% who Strongly Disapprove. This gives him a Presidential Approval Index rating of -6. (see trends).

Regular updates are posted Monday through Friday at 9:30 a.m. Eastern (sign up for free daily email update).

Rasmussen Reports invites you to be a part of our first-ever Citizen-Sourced National Midterm Election Polling Project.Learn more about how you can contribute.

Now that Gallup has quit the field, Rasmussen Reports is the only nationally recognized public opinion firm that still tracks President Trump’s job approval ratings on a daily basis. If your organization is interested in a weekly or longer sponsorship of Rasmussen Reports’ Daily Presidential Tracking Poll, please send e-mail to  beth@rasmussenreports.com .

President Trump in a tweet yesterday reiterated that the Justice Department should end the Special Counsel’s investigation into whether there were “links and/or coordination” between the Russian Government and his 2016 campaign.

Stemming from that investigation, the trial of former Trump campaign manager and business associate Paul Manafort enters its third day in U.S. District Court in Alexandria, Virginia. Will the trial lead to criminal charges against the president? We’ll tell you at 10:30 what voters say.

Nearly half of voters don’t believe Special Counsel Robert Mueller’s probe is worth what it has spent (more than $22 million as of July, according to one report) investigating allegations of Russian collusion in the 2016 election, and few believe the outcome will benefit the United States.  

Vice President Mike Pence yesterday led a ceremony in Honolulu to receive the remains of U.S. servicemen killed during the Korean War. Their return resulted from President Trump’s June summit in Singapore with North Korean dictator Kim Jong Un.

Voters are only slightly more positive about the president’s dealings with North Korea but are cautiously optimistic about the denuclearization deal Trump and Kim have signed. As is often the case, however, partisan affiliation makes a huge difference in perceptions.

While his daily approval rating is 50% today, President Trump has earned a monthly job approval of 46% in July.

Democrats continue to lead over Republicans on the latest Rasmussen Reports Generic Congressional Ballot.

20-Jan-1729-Mar-1705-Jun-1711-Aug-1718-Oct-1729-Dec-1709-Mar-1816-May-1802-Aug-180%10%20%30%40%50%60%70%80%www.RasmussenReports.comTotal Approve (Trump)Total Approve (Obama)

It has been almost two years since Trump was elected president, but for a third of voters, the 2016 presidential election has had long-lasting negative effects on relationships with family and friends. Most voters also think Americans are less tolerant of each other’s political opinions these days.

Several U.S. Democratic gubernatorial and senatorial candidates have been stumping for single-payer healthcare as part of their 2018 midterm election platforms. Voters are now closely divided on whether the federal government should provide healthcare for everyone even though most believe their personal taxes will increase as a result.

While most voters continue to give the health care they receive a positive rating, few hold the nation’s health care system in high regard.

 

-620-Jan-1729-Mar-1705-Jun-1711-Aug-1718-Oct-1729-Dec-1709-Mar-1816-May-1802-Aug-1810%20%30%40%50%60%www.RasmussenReports.comStrongly DisapproveStrongly Approve

Some readers wonder how we come up with our job approval ratings for the president since they often don’t show as dramatic a change as some other pollsters do. It depends on how you ask the question and whom you ask.

To get a sense of longer-term job approval trends for the president, Rasmussen Reports compiles our tracking data on a full month-by-month basis.

Rasmussen Reports has been a pioneer in the use of automated telephone polling techniques, but many other firms still utilize their own operator-assisted technology (see methodology).

Daily tracking results are collected via telephone surveys of 500 likely voters per night and reported on a three-day rolling average basis. To reach those who have abandoned traditional landline telephones, Rasmussen Reports uses an online survey tool to interview randomly selected participants from a demographically diverse panel. The margin of sampling error for the full sample of 1,500 Likely Voters is +/- 2.5 percentage points with a 95% level of confidence. Results are also compiled on a full-week basis and crosstabs for full-week results are available for Platinum Members.

 

Trump got a dynamite GDP number last quarter — and early signs point to the next one being even better

trump thumbs upReuters
  • President Donald Trump took a victory lap Friday after second quarter GDP came in at 4.1%, the strongest since the third quarter of 2014.
  • Trump said the GDP reading proved that his policies were working and that the country was on track to fulfill his promise of sustained 4% annual GDP growth.
  • Many economists doubted the strong growth would continue, since transitory factors help boost the second quarter number.
  • But early estimates for third quarter GDP look potentially even stronger.

President Donald Trump took a victory lap Friday after the release of a strong second-quarter GDP number, and early signs point to the celebration continuing in the third quarter.

The 4.1% second-quarter reading was the highest since 2014, as both the White House and GOP pointed to the growth as proof that Trump’s policies were boosting the US economy. The president also touted the number as proof the economy could achieve his promise of annual GDP growth over 4%, a claim of which almost all economists were skeptical .

While Friday’s release was substantial, many economists pointed to short-term factors that could fade in future quarters — like a huge boost in soybean exports ahead of Trump’s tariffs and fiscal stimulus from the federal budget.

But early indications from third-quarter economic data show that Trump may have reason to boast about the third quarter, too.

The Atlanta Federal Reserve’s GDPNow measure, which uses available data to predict the current quarter’s GDP growth, stands at 5% as of Thursday — up slightly from an initial estimate of 4.7%.

The estimate has a strong track record of prediction. But GDPNow isn’t perfect, especially so early in a quarter, and it is subject to updates as more data emerges.

But Neil Dutta, head of US economics at research firm Renaissance Macro, pointed to data that shows the strong initial reading from the Atlanta Fed is likely to hold up.

While Dutta said it’s “unlikely that we’ll get 5% for the third quarter,” the economist noted that the average move for the GDPNow reading over the course of a quarter since its inception is a 0.6-percentage point drop. Given the initial reading, that would put the final third quarter GDPNow estimate at 4.1%, which would be on par second quarter and one of the highest post-recession readings.

Screen Shot 2018 08 02 at 2.23.43 PMRenaissance Macro Research
  • The biggest downward move in the GDPNow’s estimate over the course of a quarter was 2.2 percentage points, per Dutta’s breakdown, which would still leave GDP growth at a respectable 2.5%.
  • On the other end, the largest upward move was 1.5 percentage points, so an equal move from this quarter’s reading would put the third quarter at 6.5%. That would be the highest quarterly GDP print since the third quarter of 2003.

“Anything in that range is consistent with strong, above-trend growth and would be a reasonably solid number coming after a 4% GDP print,” Dutta said.

In the second quarter, the 4.1% GDP reading was also above the Atlanta Fed’s final estimate of 3.8%.

Trump, for his part, is already banking on a big third-quarter reading, which is set to be released October 26.

“I happen to think we’re going to do extraordinarily well in our next report,” Trump said at the press conference Friday.

https://www.businessinsider.com/trump-gdp-growth-q3-third-quarter-strong-2018-8

Story 3: Less Than 40 Million Americans on Food Stamps or Supplemental Nutrition Assistance Program (SNAP) and Declining As U.S. Federal Budget For SNAP Cut — Trump Proposed America’s Harvest Box — Less Money More Food — People Want Choice Not Preselected Boxes of Food –Little Boxes — Walk Off The Earth — Videos

See the source imageSee the source image

Little Boxes – Walk off the Earth

The history of food stamps

SNAP, Food Stamps, Obesity, and Behavioral Economics

The Supplemental Nutrition Assistance Program (SNAP)

Donald Trump’s Budget Declares War on Hungry Children and Families w/ the ‘American Harvest Box’

Republicans Put Rural Poor SNAP In Crosshairs

How Trump’s ‘food box’ proposal could affect families in Wisconsin

Bay Area families worry about the future of SNAP benefits after President Trump proposes cuts

SNAP EBT Food Stamps CUT! true or not true REPLACED By Food Delivery! DO SOME RESEARCH FOR U

Concerns White House Proposal To Food Stamp Program

Food stamp changes worrying business owner

Food Stamp Cuts Will Affect You Whether You Get Them Or Not

President Donald Trump Wants To Cut SNAP And Give Poor Boxes Of Food | AM Joy | MSNBC

Trump Wants To Replace Food Stamps With Food Boxes

Trump Wants To Send People On SNAP Cheap Food Boxes

Trump To Cut Half Of Food Stamps (SNAP) And Replace Them With “America’s Harvest Box” (REACTION)

Look What Trump Just Did To Food Stamps—Millions Of Freeloaders Enraged

Little Boxes – Walk off the Earth

 

Overview

Last Published: 08/01/2018

The Program Data site provides selected statistical information on activity in all major Food and Nutrition Service Programs (FNS). These include the Supplemental Nutrition Assistance Program (SNAP); the Special Supplemental Nutrition Program for Women, Infants and Children (WIC); Child Nutrition Programs (National School Lunch, School Breakfast, Child and Adult Care, Summer Food Service and Special Milk); and Food Distribution Programs (Schools, Emergency Food Assistance, Indian Reservations, Commodity Supplemental, Nutrition for the Elderly, and Charitable Institutions).

Four types of tables are provided: historical summaries, annual state level data for selected elements, monthly national level data for major programs, and the latest available month for state-level participation in major programs. The summaries begin with 1969, the year that FNS was established to administer the Department of Agriculture’s nutrition assistance programs. Data are provided by federal fiscal year rather than calendar or school year. This includes the months of October through September (prior to FY 1977, it covered July through June). Annual state-level tables include data for the five most recent complete years (2013-2017). The latest month for state-level activity is April 2018. Data are as of July 06, 2018; FY 2017 and 2018 numbers are preliminary and are subject to significant revision.

If you need additional information or have any questions, please e-mail us. The following program area pages provide detailed program explanations and information: SNAPChild NutritionWIC and Food Distribution.

Food Stamp Cuts Could Hurt Thousands of Service Members

Posted By  on Thu, Jul 5, 2018 at 3:02 pm

screen_shot_2018-05-29_at_5.12.17_pm.png

Military service members are among the millions of Americans who would be affected by proposed budget cuts to federal food stamps, also known as the Supplemental Nutrition Assistance Program (SNAP).

In February, President Donald Trump released a fiscal-year 2019 budget proposal that included a new approach to the program that “combines traditional SNAP benefits with 100-percent American grown foods provided directly to households.” The change would cut SNAP funding by $213 billion dollars over 10 years.

According to a 2016 report from the US Government Accountability Office (GAO), approximately 23,000 active duty military service members were SNAP recipients in 2013.

Brenda Farrell, director of defense capabilities and management at GAO, oversaw development of the report.

“Don’t assume that service members don’t need help,” Farrell said. “We all know that over the years the pay has increased and bonuses have been there to attract the right people, but you still have pockets where the need is still there.”

The San Antonio Food Bank provides food for 58,000 people a week, and one in seven active or former military service members use similar services across the U.S., according to food bank President and CEO Eric Cooper. 

“We know from our work that many active enlisted servicemen and women call our center,” Cooper said. “Sometimes they might not want to share with people they are closest to that they are in need, so they reach out to the food bank as a neutral place so they don’t have to ask for help from those who are closest to them.”

According to Cooper, the House proposal increases some barriers and the program’s cost while cutting some benefits for low-income families.

“Our current farm bill has a strong nutrition title,” Cooper said. “It’s not perfect, but it helps to ensure that 42 million Americans have access to good nutrition. … It just never seems to make sense to me that we would increase cost and bureaucracy while decreasing services and benefits to someone in need.”

The San Antonio Food Bank and its partner agencies have been discussing how to move forward if the budget cuts are approved, Cooper said, but their ability to meet people’s needs is heavily dependent on farmers, donors and food industry partners.

“If the proposed SNAP cuts go through, it will literally take food off the table,” Cooper said. “For that need to be met, we feel that we will see longer lines at our food pantries and the demand for services will be even greater for us at the San Antonio Food Bank.”

Cooper said there are some challenges unique to service members that frequently result in them turning to the food-stamp program. Often they have children and a spouse who’s unable to build a career due to the constant mobility of active-duty life. The military’s Basic Allowance for Housing (BAH) benefit can also present a challenge since it can make a person ineligible for food-stamp assistance.

San Antonio’s Director of Military Affairs Juan Ayala said there has been a shift in the people who volunteer for service.

“If you take a look at the average service member that joins today, a lot of them are married and have dependent children,” Ayala said. “That is different than when I came into the Marine Corps in 1976, when almost everybody that came in was single. … Less than one percent of the population in the United States think about joining the military, and a small number actually join so sometimes the pool for recruiting is challenging so sometimes we get older recruits.”

Ayala said lower-ranking service members are the most likely to need food assistance services because they make the lowest salaries, and with a familythey could easily become eligible for SNAP.

Lower ranking troops stationed in high cost areas such as California and Washington D.C. will be the most directly affected by the SNAP budget cuts, according to Ayala.

“It is going to affect those that are in uniform, a lot of those that are deployed and can’t get a second job,” Ayala said. “If you’re in uniform performing a service to the country I think that it should be taken into consideration — for anybody that really deserves [SNAP] and really needs it — but especially for the troops.”

Trump’s ‘Harvest Box’ Isn’t Viable in SNAP Overhaul, Officials Say

Image
People paid for fresh produce using federal assistance at a farmers market in Lake Orion, Mich., in 2013.CreditLauren Abdel-Razzaq/The Detroit News, via Associated Press

WASHINGTON — The Supplemental Nutrition Assistance Program offers about 46 million low-income Americans both sustenance and economic choice by providing an allowance to buy the fruit, meat, fresh vegetables, soda, ice cream and kind of bread they want to eat.

But on Monday, the Trump administration sprung a surprise: Under a proposal in the president’s budget many participants in the program would be given half their benefits in the form of a “Harvest Box” full of food preselected for nutritional value and economic benefit to American farmers. The cache of cheaper peanut butter, canned goods, pasta, cereal, “shelf stable” milk and other products would now be selected by the federal government, not by the people actually eating it.

The proposal seemed like a radical overhaul of the country’s core food assistance program — once called food stamps but now commonly known as SNAP. The idea was to shave about $21 billion a year from the federal deficit over the next 10 years. But the reaction was immediate, and largely negative.

Democrats claimed the plan shackled the poor while business groups, led by big food retailers, would stand to lose billions of dollars in lost SNAP business. The head of one trade association typically supportive of President Trump’s economic policies accused the administration of reneging on its pledge to cut “red tape and regulations.”

Instead, the idea, according to two administration officials who worked on the proposal, was a political gambit by fiscal hawks in the administration aimed at outraging liberals and stirring up members of the president’s own party working on the latest version of the farm bill. The move, they said, was intended to lay down a marker that the administration is serious about pressing for about $85 billion in other cuts to food assistance programs that will be achieved, in part, by imposing strict new work requirements on recipients.

“I don’t think there’s really any support for their box plan. And, I worry that it’s a distraction from the budget’s proposal to cut SNAP by some 30 percent. That’s the real battle,” said Stacy Dean, vice president for food assistance policy at the Center on Budget and Policy Priorities, a progressive Washington think tank. “The dangers are these other proposals to cut benefits. But all anyone is talking about today are the boxes.”

Senator Debbie Stabenow, the ranking Democrat on the agriculture committee, doubted the motives behind the plan.

“This isn’t a serious proposal and is clearly meant to be a distraction,” Ms. Stabenow said.

Agriculture Secretary Sonny Perdue stealthily pitched the idea over the last few weeks to the White House’s Domestic Policy Council as a novel way to reach the administration’s self-imposed goal of slashing federal food assistance programs by $214 billion over the next decade. It was quickly embraced by Mr. Mulvaney, a fiscal hawk who is seeking to steer a debate increasingly dominated by free-spending Republicans and Mr. Trump, who has insisted on major budget increases for the Pentagon and Homeland Security.

Neither man had any illusions that the plan would be immediately embraced by congressional Republicans, who were not given advance notice of the proposal, the officials said.

That the food-box approach has been tried only in small demonstration projects and never been seriously discussed during dozens of congressional hearings on the SNAP program in recent years did not stop administration officials from putting the force of Mr. Trump’s presidency behind it.

The budget documents released on Monday omitted other important details, including the real costs of creating a nationwide distribution network for the boxes, especially in rural areas hard hit by the economic downturn and the opioid crisis.

“We have had like 25 hearings on SNAP. The witness list was controlled by Republicans and this idea was never, ever broached,” said Representative Jim McGovern of Massachusetts, ranking Democrat on the House subcommittee that oversees federal food assistance programs. “I think it’s dead on arrival — I hope it is — but either way it’s a cruel joke. My God, these people are awful. In addition to being totally misinformed on policy, they are really just not nice people.”

In a statement, Mr. Perdue defended the proposal as humane and cost effective, saying his plan offered the “same level of food value” provided by the SNAP program, which replaced the food stamp program in the late 1990s.

He described the boxes as “a bold, innovative approach to providing nutritious food to people who need assistance feeding themselves and their families — and all of it is grown by American farmers and producers.”

Still, the idea landed with a thud. It was quickly dismissed by two Republican committee chairmen, Senator Pat Roberts of Kansas, who leads the Senate agriculture committee, and his counterpart in the House, Representative K. Michael Conaway of Texas.

 

Mr. Conaway is drafting a farm bill that is expected to slash billions in spending in the SNAP program through the tightening of some eligibility requirements. Mr. Roberts is overseeing an effort to craft a version of the bill that is expected to include fewer cuts in hopes of gaining the bipartisan support needed to push the measure through the Senate.

SNAP, like many other safety net programs, is designed to expand during hard economic times and contract when the economy improves. Nonetheless, the program’s rolls have remained at historically elevated levels, reaching a peak of 47.8 million recipients in 2012 before edging down to 45.6 million last year, according to federal estimates.

Mr. Perdue, in particular, has been outspoken in his call to reduce its rolls, criticizing what he calls a culture of dependency among SNAP recipients.

But Mr. McGovern said the administration was painting “a distorted picture” of the poor and ignoring the fact that most SNAP recipients are employed and more than a quarter are disabled and unable to seek work.

“They have to stop playing to the cheap seats,” he said. “The majority of people in the program are children and seniors and people working in jobs that pay too little to feed their families.”

Supplemental Nutrition Assistance Program (SNAP)

Am I Eligible for SNAP?

Last Published: 06/27/2018

To get SNAP benefits, you must apply in the State in which you currently live and you must meet certain requirements, including resource and income limits, which are described on this page. SNAP income and resource limits are updated annually. The information on this page is for October 1, 2017, through September 30, 2018.

There are special SNAP rules for households with elderly or disabled members.

Frequently Asked Questions

Am I eligible for SNAP?

Your household must meet certain requirements to be eligible for SNAP and receive benefits. If your State agency determines that you are eligible to receive SNAP benefits, you will receive benefits back to the date you submitted your application.

To see if you might be eligible for Supplemental Nutrition Assistance Program (SNAP) benefits, visit our pre-screening tool.

Note: The FNS SNAP pre-screening eligibility tool is an interactive site with general information about eligibility requirements and how benefits are determined. Sharing your information in that form does not mean you filed an application for benefits. You will still need to submit an application through your State SNAP agency or local SNAP office.

How do I apply for SNAP?

You must apply for SNAP in the State where you currently live. Because each State has a different application form and process, a member of your household must contact your State agency directly to apply.

You can contact your State agency by visiting your local SNAP office, visiting your State agency’s website, or calling your State’s toll-free SNAP Information hotline. Some States have online applications that can be completed from the State agency website.

Where can I get my State information?

If you are unable to go to your local SNAP office or do not have access to the internet, you may have another person act as an authorized representative by applying and being interviewed on your behalf. You must designate the authorized representative in writing.

Note: Please contact your SNAP State agency directly to apply and to request information about the status of your application. FNS does not process applications or have access to case information.

What happens when I apply for SNAP?

In most cases, once you submit your application, your State agency or local SNAP office will process it and send you a notice telling you whether or not you are eligible for benefits within 30 days.

During the 30 days, you will need to complete an eligibility interview and give proof (verification) of the information you provided. The interview is typically completed over the telephone or in-person. If you are found eligible, you will receive benefits based on the date you submitted your application.

You may be eligible to receive SNAP benefits within 7 days of your application date if you meet additional requirements. For example, if your household has less than $100 in liquid resources and $150 in monthly gross income, or if your household’s combined monthly gross income and liquid resources are less than what you pay each month for rent or mortgage and utilities expenses. Contact your State agency for additional details.

How do I receive SNAP benefits?

If you are found eligible, you will receive SNAP benefits on an Electronic Benefit Transfer (EBT) card, which works like a debit card. Benefits are automatically loaded into your account each month. You can use your EBT card to buy groceries at authorized food stores and retailers.

How long will I receive SNAP?

If you are found eligible, you will receive a notice that tells you how long you will receive SNAP benefits for; this is called your certification period. Before your certification period ends, you will receive another notice that says you must recertify to continue receiving benefits. Your local SNAP office will provide you with information about how to recertify.

Who is in a SNAP household?

Everyone who lives together and purchases and prepares meals together is grouped together as one SNAP household.

Some people who live together, such as spouses and most children under age 22, are included in the same SNAP household, even if they purchase and prepare meals separately.

If a person is 60 years of age or older and unable to purchase and prepare meals separately because of a permanent disability, the person and the person’s spouse may be a separate SNAP household if the others they live with do not have very much income (no more than 165 percent of the poverty level).

Normally you are not eligible for SNAP benefits if an institution gives you most of your meals. There are exceptions for elderly persons and disabled persons.

What resources can I have (and still get SNAP benefits)?

Resources

Households may have $2,250 in countable resources (such as cash or money in a bank account) or $3,500 in countable resources if at least one member of the household is age 60 or older, or is disabled.

However, certain resources are NOT counted when determining eligibility for SNAP:

  • A home and lot;
  • Resources of people who receive Supplemental Security Income (SSI);
  • Resources of people who receive Temporary Assistance for Needy Families (TANF; also known as welfare); and
  • Most retirement and pension plans (withdrawals from these accounts may count as either income or resources depending on how often they occur).

Vehicles

Vehicles count as a resource for SNAP purposes. States determine how vehicles may count toward household resources.

Licensed vehicles are NOT counted if they are:

  • Used for income-producing purposes (e.g., taxi, truck or delivery vehicle);
  • Annually producing income consistent with their fair market value;
  • Needed for long distance travel for work (other than daily commute);
  • Used as the home;
  • Needed to transport a physically disabled household member;
  • Needed to carry most of the household’s fuel or water; or
  • If the sale of the vehicle would result in less than $1500.

For non-excluded licensed vehicles, the fair market value over $4,650 counts as a resource.

Licensed vehicles are also subject to an equity test, which is the fair market value less any amount owed on the vehicle. The following vehicles are excluded from the equity test:

  • One vehicle per adult household member; and
  • Any other vehicle used by a household member under 18 to drive to work, school, job training, or to look for work.

For vehicles with both a fair market value over $4,650 and an equity value, the greater of the two amounts is counted as a resource.

Additionally, the equity value of unlicensed vehicles generally counts as a resource, with some exceptions.

What are the SNAP income limits?

In most cases, your household must meet both the gross and net income limits described below or you are not eligible for SNAP and cannot receive benefits.

Gross income means a household’s total, non-excluded income, before any deductions have been made.

Net income means gross income minus allowable deductions.

A household with an elderly or disabled person only has to meet the net income limit, as described on the elderly and disabled page.

If all members of your household are receiving Temporary Assistance for Needy Families (TANF), Supplemental Security Income (SSI), or in some places other general assistance, your household may be deemed “categorically eligible” for SNAP because you have already been determined eligible for another means-tested program.

The information provided in the table below applies to households in the 48 contiguous States and the District of Columbia that apply for SNAP between October 1, 2017, through September 30, 2018.

Table 1: SNAP Income Eligibility Limits – October 1, 2017, through September 30, 2018

Household Size Gross monthly income

(130 percent of poverty)

Net monthly income

(100 percent of poverty)

1 $1,307 $ 1,005
2 $1,760 $1,354
3 $2,213 $1,702
4 $2,665 $2,050
5 $3,118 $2,399
6 $3,571 $2,747
7 $4,024 $3,095
8 $4,477 $3,444
Each additional member +$453 +$349

* SNAP gross and net income limits are higher in Alaska and Hawaii.

What deductions are allowed in SNAP?

The following deductions are allowed for SNAP:

  • A 20-percent deduction from earned income.
  • A standard deduction of $160 for household sizes of 1 to 3 people and $170 for a household size of 4 (higher for some larger households and for households in Alaska, Hawaii, and Guam).
  • A dependent care deduction when needed for work, training, or education.
  • Medical expenses for elderly or disabled members that are more than $35 for the month if they are not paid by insurance or someone else. This is described on the elderly and disabled page.
  • In some States, legally owed child support payments.
  • In some States, a standard shelter deduction for homeless households of $143.
  • Excess shelter costs as described below.

SNAP Excess Shelter Costs Deduction

The shelter deduction is for shelter costs that are more than half of the household’s income after other deductions.

Allowable shelter costs include:

  • Fuel to heat and cook with.
  • Electricity.
  • Water.
  • The basic fee for one telephone.
  • Rent or mortgage payments and interest.
  • Taxes on the home.

Some States allow a set amount for utility costs instead of actual costs.

The amount of the shelter deduction is capped at (or limited to) $535 unless one person in the household is elderly or disabled. The limit is higher in Alaska, Hawaii, and Guam. For a household with an elderly or disabled member all shelter costs over half of the household’s income may be deducted.

Table 2: How to Calculate SNAP Gross Income

Gross Income Calculation Example
Determine household size . . . 4 people with no elderly or disabled members.
Add gross monthly income . . . $1,500 earned income + $550 social security =  $2,050 gross income.
If gross monthly income is less than the limit for household size, determine net income. $2,050 is less than the $2,665 allowed for a 4-person household, so determine net income.

 

Table 3: How to Calculate SNAP Net Income

Net Income Calculation Example
Subtract 20% earned income deduction . . . $2,050 gross income

 

$1,500 earned income x 20% = $300. $2,050 – $300 = $1,750

Subtract standard deduction . . . $1,750 – $170 standard deduction for a 4-person household = $1,580
Subtract dependent care deduction  . . . $1,580 – $361 dependent care = $1,219
Subtract child support deduction . . . 0
Subtract medical costs over $35 for elderly and disabled . . . 0
Excess shelter deduction . . .
Determine half of adjusted income . . . $1,219 adjusted income/2 = $609.50
Determine if shelter costs are more than half of adjusted income . . . $700 total shelter – $609 (half of income) = $90 excess shelter cost
Subtract excess amount, but not more than the limit, from adjusted income . . . $1,219 – $90.50 = $1,128.50 Net monthly income
Apply the net income test . . . Since the net monthly income is less than $2,050 allowed for 4-person household, the household has met the income test.

How much could I receive in SNAP benefits?

The total amount of SNAP benefits your household gets each month is called an allotment.

Because SNAP households are expected to spend about 30 percent of their own resources on food, your allotment is calculated by multiplying your household’s net monthly income by 0.3, and subtracting the result from the maximum monthly allotment for your household size.

Table 4: SNAP Maximum Monthly Allotment Based on Household Size

People in Household Maximum Monthly Allotment
1 $   192
2 $   352
3 $   504
4 $   640
5 $   760
6 $   913
7 $ 1,009
8 $ 1,153
Each additional person $ 144

Note: The allotments described here are for households in the 48 contiguous States and the District of Columbia. The allotments are different in Alaska, Hawaii, Guam, and the U.S. Virgin Islands.

Table 5: Example of SNAP Benefit Calculation

Benefit Calculation Example
Multiply net income by 30%…  (Round up) $1,128.50 net monthly income  x 0.3 = 338.55 (round up to $339)
Subtract 30% of net income from the maximum allotment for the household size… $640 maximum allotment for 4-person household – $339 (30% of   net income) = $301, SNAP Allotment for a full month

What are the SNAP work requirements?

In general, people must meet work requirements to be eligible for SNAP. These work requirements include:

  • Registering for work;
  • Not voluntarily quitting a job or reducing hours;
  • Taking a job if offered; and
  • Participating in employment and training programs, if assigned by the State.

Failure to comply with these requirements can result in disqualification from the Program.

In addition, able bodied adults without dependents are required to work or participate in a work program for at least 20 hours per week in order to receive SNAP benefits for more than 3 months in a 36-month period.

Some special groups may not be subject to these requirements including:

  • Children;
  • Seniors;
  • Pregnant women; and
  • People who are exempt for physical or mental health reasons.

Are non-citizens eligible for SNAP?

SNAP eligibility has never been extended to undocumented non-citizens. Specific requirements for non-citizens who may be eligible have changed substantially over the years and become more complicated in certain areas. The Food and Nutrition Act of 2008 limits eligibility for SNAP benefits to U.S. citizens and certain lawfully present non-citizens.

Generally, to qualify for SNAP, non-citizens must meet one of the following criteria:

  • Have lived in the United States for at least 5 years.
  • Be receiving disability-related assistance or benefits.
  • Be children under 18.

Additionally, these individuals must also satisfy other SNAP eligibility requirements such as income and resource limits in order to qualify for benefits.

If certain members of a household are ineligible for SNAP, State agencies must still determine eligibility for SNAP for any remaining household members who are seeking assistance.

For additional information see: SNAP Policy on Non-Citizen Eligibility and SNAP Guidance on Non-Citizen Eligibility.

What if I disagree with a decision made on my SNAP case?

If you disagree with a decision in your case, you may request a fair hearing with an official who is required by law to review the facts of your case in a fair and objective manner.

Note: You must request a fair hearing within 90 days of the day your local SNAP office made the decision in your case that you disagree with.

You can request a fair hearing over the phone, in writing, or in person at the local SNAP office.

Although a fair hearing cannot change the laws or regulations governing SNAP, it can ensure that decisions on your case have been made correctly.

Nondiscrimination in SNAP

SNAP benefits are available to all eligible households regardless of race, sex, religious creed, national origin, or political beliefs.

The USDA prohibits discrimination in all its programs and activities on the basis of race, color, national origin, gender, religion, age, disability, political beliefs, sexual orientation, or marital and family status. (Not all prohibited bases apply to all programs.) Persons with disabilities who require alternative means for communication of program information (Braille, large print, audiotape, etc.) should contact USDA’s TARGET Center at (202) 720-2600 (voice and TDD).

To file a complaint of discrimination, write USDA, Director, Office of Civil Rights, Room 326- W, Whitten Building, 14th and Independence Avenue, SW, Washington, D.C. 20250-9410 or call (202) 720-5964 (voice and TDD). USDA is an equal opportunity provider and employer.

Where can I get additional information about SNAP?

For additional information about SNAP in your State, to file an application for SNAP benefits, or to get information about your SNAP case, you must contact your local SNAP office.  Where Can I Get My State Information?

https://www.fns.usda.gov/snap/eligibility

Supplemental Nutrition Assistance Program

From Wikipedia, the free encyclopedia

Jump to navigationJump to search

SNAP logo

The Supplemental Nutrition Assistance Program (SNAP),[1] formerly known as the Food Stamp Program, provides food-purchasing assistance for low- and no-income people living in the United States. It is a federal aidprogram, administered by the U.S. Department of Agriculture, under the Food and Nutrition Service (FNS), though benefits are distributed by each U.S. state‘s Division of Social Services or Children and Family Services.

SNAP benefits cost $70.9 billion in fiscal year 2016 and supplied roughly 44.2 million Americans (14% of the population)[2] with an average of $125.51 for each person per month in food assistance. Beneficiaries and costs increased sharply with the Great Recession, peaked in 2013 and have declined through 2016 as the economy recovered.[3] It is the largest nutrition program of the 15 administered by FNS and is a component of the federal social safety netfor low-income Americans.[4]

The amount of SNAP benefits received by a household depends on the household’s size, income, and expenses. For most of its history, the program used paper-denominated “stamps” or coupons – worth US$1 (brown), $5 (blue), and $10 (green) – bound into booklets of various denominations, to be torn out individually and used in single-use exchange. Because of their 1:1 value ratio with actual currency, the coupons were printed by the Bureau of Engraving and Printing. Their rectangular shape resembled a U.S. dollar bill (although about one-half the size), including intaglio printing on high-quality paper with watermarks. In the late 1990s, the Food Stamp Program was revamped, with some states phasing out actual stamps in favor of a specialized debit card system known as Electronic Benefit Transfer (EBT), provided by private contractors. EBT has been implemented in all states since June 2004. Each month, SNAP food stamp benefits are directly deposited into the household’s EBT card account. Households may use EBT to pay for food at supermarkets, convenience stores, and other food retailers, including certain farmers’ markets.[5]

History

First Food Stamp Program (FSP) (May 16, 1939 – Spring 1943)[edit]

An effort to manage agricultural surpluses, the first food stamps came off the presses April 20, 1939.
Orange stamps were good for any grocery item the purchaser chose, except drugs, liquor and items consumed on the premises.
Blue stamps bought only surplus foods—dairy products, eggs, citrus fruits, prunes and fresh vegetables.

The idea for the first food stamp program has been credited to various people, most notably U.S. Secretary of Agriculture Henry Wallace and the program’s first administrator, Milo Perkins.[6] Of the program, Perkins said, “We got a picture of a gorge, with farm surpluses on one cliff and under-nourished city folks with outstretched hands on the other. We set out to find a practical way to build a bridge across that chasm.”[7] The program operated by permitting people on relief to buy orange stamps equal to their normal food expenditures; for every $1 of orange stamps purchased, 50 cents’ worth of blue stamps were received. Orange stamps could be used to buy any food; blue stamps could be used only to buy food determined by the department to be surplus.

Over the course of nearly four years, the first FSP reached approximately 20 million people in nearly half of the counties in the U.S., at a total cost of $262 million. At its peak, the program assisted an estimated four million people. The first recipient was Mabel McFiggin of Rochester, New York; the first retailer to redeem the stamps was Joseph Mutolo; and the first retailer caught violating program rules was Nick Salzano in October 1939. The program ended when the conditions that brought the program into being—unmarketable food surpluses and widespread unemployment—ceased to exist.[8]

Pilot Food Stamp Program (1961–1964)

The 18 years between the end of the first FSP and the inception of the next were filled with studies, reports, and legislative proposals. Prominent U.S. Senators actively associated with attempts to enact a food stamp program during this period included George AikenRobert M. La Follette, Jr.Hubert HumphreyEstes Kefauver, and Stuart Symington. From 1954 on, U.S. Representative Leonor Sullivan strove to pass food-stamp-program legislation.

On September 21, 1959, P.L. 86-341 authorized the Secretary of Agriculture to operate a food-stamp system through January 31, 1962. The Eisenhower Administration never used the authority. However, in fulfillment of a campaign promise made in West Virginia, President John F. Kennedy‘s first Executive Order called for expanded food distribution and, on February 2, 1961, he announced that food stamp pilot programs would be initiated. The pilot programs would retain the requirement that the food stamps be purchased, but eliminated the concept of special stamps for surplus foods. A Department spokesman indicated the emphasis would be on increasing the consumption of perishables.

Of the program, U.S. Representative Leonor K. Sullivan of Missouri asserted, “…the Department of Agriculture seemed bent on outlining a possible food stamp plan of such scope and magnitude, involving some 25 million persons, as to make the whole idea seem ridiculous and tear food stamp plans to smithereens.”[9][10]

Food Stamp Act of 1964

The Food Stamp Act of 1964 appropriated $75 million to 350,000 individuals in 40 counties and three cities. The measure drew overwhelming support from House Democrats, 90 percent from urban areas, 96 percent from the suburbs, and 87 percent from rural areas. Republican lawmakers opposed the initial measure: only 12 percent of urban Republicans, 11 percent from the suburbs, and 5 percent from rural areas voted affirmatively. President Lyndon B. Johnson hailed food stamps as “a realistic and responsible step toward the fuller and wiser use of an agricultural abundance”.[11]

Rooted in congressional logrolling, the act was part of a larger appropriation that raised price supports for cotton and wheat. Rural lawmakers supported the program so that their urban colleagues would not dismantle farm subsidies. Food stamps, along with MedicaidHead Start, and the Job Corps were foremost among the growing anti-poverty programs.

President Johnson called for a permanent food-stamp program on January 31, 1964, as part of his “War on Poverty” platform introduced at the State of the Union a few weeks earlier. Agriculture Secretary Orville Freemansubmitted the legislation on April 17, 1964. The bill eventually passed by Congress was H.R. 10222, introduced by Congresswoman Sullivan. One of the members on the House Committee on Agriculture who voted against the FSP in Committee was then Representative Bob Dole.

As a Senator, Dole became a staunch supporter of the program, after he worked with George McGovern to produce a bipartisan solution to two of the main problems associated with food stamps: cumbersome purchase requirements and lax eligibility standards. Dole told Congress regarding the new provisions, “I am confident that this bill eliminates the greedy and feeds the needy.”[citation needed] The law was intended to strengthen the agricultural economy and provide improved levels of nutrition among low-income households; however, the practical purpose was to bring the pilot FSP under congressional control and to enact the regulations into law.

The major provisions were:

  • The State Plan of Operation requirement and development of eligibility standards by States;
  • They required that the recipients should purchase their food stamps, while paying the average money spent on food then receiving an amount of food stamps representing an opportunity more nearly to obtain a low-cost nutritionally adequate diet;
  • The eligibility for purchase with food stamps of all items intended for human consumption except alcoholic beverages and imported foods (the House version would have prohibited the purchase of soft drinks, luxury foods, and luxury frozen foods);
  • Prohibitions against discrimination on basis of race, religious creed, national origin, or political beliefs;
  • The division of responsibilities between States (certification and issuance) and the Federal Government (funding of benefits and authorization of retailers and wholesalers), with shared responsibility for funding costs of administration; and
  • Appropriations for the first year limited to $75 million; for the second year, to $100 million; and, for the third year, to $200 million.

The Agriculture Department estimated that participation in a national FSP would eventually reach 4 million, at a cost of $360 million annually, far below the actual numbers.

Program expansion: participation milestones in the 1960s and early 1970s

In April 1965, participation topped half a million. (Actual participation was 561,261 people.) Participation topped 1 million in March 1966, 2 million in October 1967, 3 million in February 1969, 4 million in February 1970, 5 million one month later in March 1970, 6 million two months later in May 1970, 10 million in February 1971, and 15 million in October 1974. Rapid increases in participation during this period were primarily due to geographic expansion.

Major legislative changes (early 1970s)

The early 1970s were a period of growth in participation, concern about the cost of providing food stamp benefits, and questions about administration, primarily timely certification. During this time, the issue was framed that would dominate food stamp legislation ever after: how to balance program access with program accountability. Three major pieces of legislation shaped this period, leading up to massive reform to follow:

P.L. 91-671 (January 11, 1971) established uniform national standards of eligibility and work requirements; required that allotments be equivalent to the cost of a nutritionally adequate diet; limited households’ purchase requirements to 30 percent of their income; instituted an outreach requirement; authorized the Agriculture Department to pay 62.5 percent of specific administrative costs incurred by States; expanded the FSP to GuamPuerto Rico, and the Virgin Islands of the United States; and provided $1.75 billion appropriations for Fiscal Year 1971.

Agriculture and Consumer Protection Act of 1973 (P.L. 93-86, August 10, 1973) required States to expand the program to every political jurisdiction before July 1, 1974; expanded the program to drug addicts and alcoholics in treatment and rehabilitation centers; established semi-annual allotment adjustments, bi-monthly issuance, and Supplemental Security Income (SSI) “cash-out” (which gave the option to states to issue Food Stamp benefits to SSI recipients in the form of their estimated cash value consolidated within the SSI grant, in order to reduce administrative costs); introduced statutory complexity in the income definition (by including in-kind payments and providing an accompanying exception); and required the Department to establish temporary eligibility standards for disasters.

P.L. 93-347 (July 12, 1974) authorized the Department to pay 50 percent of all states’ costs for administering the program and established the requirement for efficient and effective administration by the States.

1974 nationwide program

In accordance with P.L. 93-86, the FSP began operating nationwide on July 1, 1974. (The program was not fully implemented in Puerto Rico until November 1, 1974.) Participation for July 1974 was almost 14 million.

Eligible access to Supplemental Security Income beneficiaries[edit]

Once a person is a beneficiary of the Supplemental Security Income (SSI) Program he (or she) may be automatically eligible for Food Stamps depending on his (or her) state’s laws. How much money in food stamps they receive also varies by state. Supplemental Security Income was created in 1974.[12]

Food Stamp Act of 1977

Both the outgoing Republican Administration and the new Democratic Administration offered Congress proposed legislation to reform the FSP in 1977. The Republican bill stressed targeting benefits to the neediest, simplifying administration, and tightening controls on the program; the Democratic bill focused on increasing access to those most in need and simplifying and streamlining a complicated and cumbersome process that delayed benefit delivery as well as reducing errors, and curbing abuse. The chief force for the Democratic Administration was Robert Greenstein, Administrator of the Food and Nutrition Service (FNS).

In Congress, major players were Senators George McGovernJacob Javits, Humphrey, and Dole and Congressmen Foley and Richmond. Amid all the themes, the one that became the rallying cry for FSP reform was “EPR”—eliminate the purchase requirement—because of the barrier to participation the purchase requirement represented.[citation needed] The bill that became the law (S. 275) did eliminate the purchase requirement. It also:[citation needed]

  • eliminated categorical eligibility;
  • established statutory income eligibility guidelines at the poverty line;
  • established 10 categories of excluded income;
  • reduced the number of deductions used to calculate net income and established a standard deduction to take the place of eliminated deductions;
  • raised the general resource limit to $1,750;
  • established the fair market value (FMV) test for evaluating vehicles as resources;
  • penalized households whose heads voluntarily quit jobs;
  • restricted eligibility for students and aliens;
  • eliminated the requirement that households must have cooking facilities;
  • replaced store due bills with cash change up to 99 cents;
  • established the principle that stores must sell a substantial amount of staple foods if they are to be authorized;
  • established the ground rules for Indian Tribal Organization administration of the FSP on reservations; and
  • introduced demonstration project authority.

In addition to EPR, the Food Stamp Act of 1977 included several access provisions:[citation needed]

  • using mail, telephone, or home visits for certification;
  • requirements for outreach, bilingual personnel and materials, and nutrition education materials;
  • recipients’ right to submit applications the first day they attempt to do so;
  • 30-day processing standard and inception of the concept of expedited service;
  • SSI joint processing and coordination with Aid to Families with Dependent Children (AFDC), the major cash welfare program;
  • notice, recertification, and retroactive benefit protections; and
  • a requirement for States to develop a disaster plan.

The integrity provisions of the new program included fraud disqualifications, enhanced Federal funding for States’ anti-fraud activities, and financial incentives for low error rates.

The House Report for the 1977 legislation points out that the changes in the Food Stamp Program are needed without reference to upcoming welfare reform since “the path to welfare reform is, indeed, rocky….”[citation needed]

EPR was implemented January 1, 1979. Participation that month increased 1.5 million over the preceding month.

Cutbacks of the early 1980s[

The large and expensive FSP proved to be a favorite subject of close scrutiny from both the Executive Branch and Congress in the early 1980s. Major legislation in 1981 and 1982 enacted cutbacks including:

  • addition of a gross income eligibility test in addition to the net income test for most households;
  • temporary freeze on adjustments of the shelter deduction cap and the standard deduction and constraints on future adjustments;
  • annual adjustments in food stamp allotments rather than semi-annual;
  • consideration of non-elderly parents who live with their children and non-elderly siblings who live together as one household;
  • required periodic reporting and retrospective budgeting;
  • prohibition against using Federal funds for outreach;
  • replacing the FSP in Puerto Rico with a block grant for nutrition assistance;
  • counting retirement accounts as resources;
  • state option to require job search of applicants as well as participants; and
  • increased disqualification periods for voluntary quitters.

Electronic Benefits Transfer (EBT) began in ReadingPennsylvania, in 1984.

Mid-to-late 1980s

Recognition of the severe domestic hunger problem in the latter half of the 1980s led to incremental expansions of the FSP in 1985 and 1987, such as elimination of sales tax on food stamp purchases, reinstitution of categorical eligibility, increased resource limit for most households ($2,000), eligibility for the homeless, and expanded nutrition education. The Hunger Prevention Act of 1988 and the Mickey Leland Memorial Domestic Hunger Relief Act in 1990 foretold the improvements that would be coming. The 1988 and 1990 legislation accomplished the following:

  • increasing benefits by applying a multiplication factor to Thrifty Food Plan costs;
  • making outreach an optional activity for States;
  • excluding advance earned income tax credits as income;
  • simplifying procedures for calculating medical deductions;
  • instituting periodic adjustments of the minimum benefit;
  • authorizing nutrition education grants;
  • establishing severe penalties for violations by individuals or participating firms; and
  • establishing EBT as an issuance alternative.

Throughout this era, significant players were principally various committee chairmen: Congressmen Leland, Hall, Foley, Leon Panetta, and, de la Garza and Senator Patrick Leahy.

1993 Mickey Leland Childhood Hunger Relief Act

By 1993, major changes in food stamp benefits had arrived. The final legislation provided for $2.8 billion in benefit increases over Fiscal Years 1984-1988. Leon Panetta, in his new role as OMB Director, played a major role as did Senator Leahy. Substantive changes included:

  • eliminating the shelter deduction cap beginning January 1, 1997;
  • providing a deduction for legally binding child support payments made to nonhousehold members;
  • raising the cap on the dependent care deduction from $160 to $200 for children under 2 years old and $175 for all other dependents;
  • improving employment and training (E&T) dependent care reimbursements;
  • increasing the FMV test for vehicles to $4,550 on September 1, 1994 and $4,600 on October 1, 1995, then annually adjusting the value from $5,000 on October 1, 1996;
  • mandating asset accumulation demonstration projects; and
  • simplifying the household definition.

Later participation milestones

In December 1979, participation finally surpassed 20 million. In March 1994, participation hit a new high of 28 million.

1996 welfare reform and subsequent amendments

The mid-1990s was a period of welfare reform. Prior to 1996, the rules for the cash welfare program, Aid to Families with Dependent Children (AFDC), were waived for many states. With the enactment of the 1996 welfare reform act, called the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 (PRWORA), AFDC, an entitlement program, was replaced that with a new block grant to states called Temporary Assistance to Needy Families (TANF).

Although the Food Stamp Program was reauthorized in the 1996 Farm Bill, the 1996 welfare reform made several changes to the program, including:

  • eliminating eligibility to food stamps of most legal immigrants who had been in the country less than five years;
  • placing a time limit on food stamp receipt of three out of 36 months for Able-bodied Adults Without Dependents (ABAWDs), who are not working at least 20 hours a week or participating in a work program;
  • reducing the maximum allotments to 100 percent of the change in the Thrifty Food Plan (TFP) from 103 percent of the change in the TFP;
  • freezing the standard deduction, the vehicle limit, and the minimum benefit;
  • setting the shelter cap at graduated specified levels up to $300 by fiscal year 2001, and allowing states to mandate the use of the standard utility allowance;
  • revising provisions for disqualification, including comparable disqualification with other means-tested programs; and
  • requiring states to implement EBT before October 1, 2002.

As a result of all these changes, “participation rates plummeted” in the late 1990s, according to Slate online magazine.[13][quantify]

The Balanced Budget Act of 1997 (BBA) and the Agricultural Research, Education and Extension Act of 1998 (AREERA) made some changes to these provisions, most significantly:

  • using additional Employment and Training (E&T) funds to providing work program opportunities for able-bodied adults without dependents;
  • allowing states to exempt up to 15 percent of the able-bodied adults without dependents who would otherwise be ineligible;
  • restoring eligibility for certain elderly, disabled, and minor immigrants who resided in the United States when the 1996 welfare reform act was enacted; and
  • cutting administrative funding for states to account for certain administrative costs that previously had been allocated to the AFDC program and now were required to be allocated to the Food Stamp Program.

The fiscal year 2001 agriculture appropriations bill included two significant changes. The legislation increased the excess shelter cap to $340 in fiscal year 2001 and then indexed the cap to changes in the Consumer Price Index for All Consumers each year beginning in fiscal year 2002. The legislation also allowed states to use the vehicle limit they use in a TANF assistance program, if it would be result in a lower attribution of resources for the household.

Electronic Benefits Transfer

In the late 1990s, the Food Stamp Program was revamped, with some states phasing out actual stamps in favor of a specialized debit card system known as Electronic Benefit Transfer (EBT), provided by private contractors. Many states merged the use of the EBT card for public welfare programs as well, such as cash assistance. The move was designed to save the government money by not printing the coupons, make benefits available immediately instead of requiring the recipient to wait for mailing or picking up the booklets in person, and reduce theft and diversion.[5]

Renaming the Food Stamp Program

The 2008 farm bill renamed the Food Stamp Program as the Supplemental Nutrition Assistance Program (beginning October 2008) and replaced all references to “stamp” or “coupon” in federal law with “card” or “EBT.”[14][15]

Temporary benefits increase from April 2009 to November 2013

SNAP benefits temporarily increased with the passage of the American Recovery and Reinvestment Act of 2009 (ARRA), a federal stimulus package to help Americans affected by the Great Recession of 2007.[16] Beginning in April 2009 and continuing through the expansion’s expiration on November 1, 2013, the ARRA appropriated $45.2 billion to increase monthly benefit levels to an average of $133.[16][17] This amounted to a 13.6 percent funding increase for SNAP recipients.[17]

This temporary expansion expired on November 1, 2013, resulting in a relative benefit decrease for SNAP households; on average, benefits decreased by 5 percent.[16] According to a Center on Budget and Policy Priorities report, the maximum monthly benefit for a family of four dropped from $668 to $632, while the maximum monthly benefit for an individual dropped from $200 to $189.[16]

Corporate influence and support

In June 2014, Mother Jones reported that “Overall, 18 percent of all food benefits money is spent at Walmart,” and that Walmart had submitted a statement to the U.S. Securities and Exchange Commission stating,

Our business operations are subject to numerous risks, factors, and uncertainties, domestically and internationally, which are outside our control. These factors include… changes in the amount of payments made under the Supplemental Nutrition Assistance Plan and other public assistance plans, [and] changes in the eligibility requirements of public assistance plans.[18]

Companies that have lobbied on behalf of SNAP include PepsiCoCoca-Cola, and the grocery chain KrogerKraft Foods, which receives “One-sixth [of its] revenues … from food stamp purchases” also opposes food stamp cuts.[18]

Eligibility

Because SNAP is a means-tested program, recipients must meet all eligibility criteria in order to receive benefits. There are income and resource requirements for SNAP, as well as specific requirements for immigrants, elderly persons and persons with disabilities.[19][20]

Income requirements

For income, individuals and households may qualify for benefits if they earn a gross monthly income that is 130% (or less) of the federal poverty level for a specific household size. For example: the SNAP-eligible gross monthly income is $1,245 or less for an individual. For a household of 4, the SNAP eligible gross monthly income is $2,552 or less. Gross monthly income is the amount an individual makes each month before any deductions, i.e. taxes, insurance, pensions, etc.[19]

Resource requirements

There is also a resource requirement for SNAP, although eligibility requirements vary slightly from state to state. Generally speaking, households may have up to $2,250 in a bank account or other countable sources. If at least one person is age 60 or older and/or has disabilities, households may have $3,500 in countable resources.[19]

Housing expenditure

The lack of affordable housing in urban areas means that money that could have been spent on food is spent on housing expenses. Housing is generally considered affordable when it costs 30% or less of total household income; rising housing costs have made this ideal difficult to attain.

This is especially true in New York City, where 28% of rent stabilized tenants spend more than half their income on rent.[21] Among lower income families the percentage is much higher. According to an estimate by the Community Service Society, 65% of New York City families living below the federal poverty line are paying more than half of their income toward rent.[22]

The current eligibility criteria attempt to address this, by including a deduction for “excess shelter costs”. This applies only to households that spend more than half of their net income on rent. For the purpose of this calculation, a household’s net income is obtained by subtracting certain deductions from their gross (before deductions) income. If the household’s total expenditures on rent exceed 50% of that net income, then the net income is further reduced by the amount of rent that exceeds 50% of net income. For 2007, this deduction can be no more than $417, except in households that include an elderly or disabled person.[23] Deductions include:

  1. a standard deduction that is subtracted from income for all recipients,
  2. an earned income deduction reflecting taxes and work expenses,
  3. a deduction for dependent care expenses related to work or training (up to certain limits),
  4. a deduction for child support payments,
  5. a deduction for medical expenses above a set amount per month (only available to elderly and disabled recipients), and
  6. a deduction for excessively high shelter expenses.[24]

The adjusted net income, including the deduction for excess shelter costs, is used to determine whether a household is eligible for food stamps.

Immigrant status and eligibility

The 2002 Farm Bill restores SNAP eligibility to most legal immigrants that:

  • Have lived in the country for 5 years; or
  • Are receiving disability-related assistance or benefits; or
  • Have children under 18

Certain non-citizens, such as those admitted for humanitarian reasons and those admitted for permanent residence, may also be eligible for SNAP. Eligible household members can get SNAP benefits even if there are other members of the household that are not eligible.[19]

Applying for SNAP benefits

To apply for SNAP benefits, an applicant must first fill out a program application and return it to the state or local SNAP office. Each state has a different application, which is usually available online. There is more information about various state applications processes, including locations of SNAP offices in various state, displayed on an interactive Outreach Map found on the FNS website.[25] Individuals who believe they may be eligible for SNAP benefits may use the Food and Nutrition Services’ SNAP Screening Tool, which can help gauge eligibility.

Eligible food items under SNAP

As per USDA rules, households can use SNAP benefits to purchase:

  • Foods for the household to eat, such as:
    • fruits and vegetables;
    • breads and cereals;
    • dairy products;
    • meats, fish and;
    • poultry
  • Plants and seeds which are fit for household consumption.

Additionally, restaurants operating in certain areas may be permitted to accept SNAP benefits from eligible candidates like elderly, homeless or disabled people in return for affordable meals.

However, the USDA clearly mentions that households cannot use SNAP benefits to purchase the following:

  • Wine, beer, liquor, cigarettes or tobacco
  • Certain nonfood items like:
    • soaps, paper products, deodorant
    • household supplies, and
    • pet foods
  • Hot foods
  • Food items that are consumable in the store
  • Vitamins and medicines[26]

Soft drinks, candy, cookies, snack crackers, and ice cream are classified as food items and are therefore eligible items. Seafood, steak, and bakery cakes are also food items and are therefore eligible items.[26]

Energy drinks which have a nutrition facts label are eligible foods, but energy drinks which have a supplement facts label are classified by the FDA as supplements, and are therefore not eligible.[26]

Live animals and birds may not be purchased; but live fish and shellfish are eligible foods.[26] Pumpkins are eligible, but inedible gourds and solely ornamental pumpkins are not.[26]

Gift baskets containing both food and non-food items “are not eligible for purchase with SNAP benefits if the value of the non-food items exceeds 50 percent of the purchase price. Items such as birthday and other special occasion cakes are eligible as long as the value of non-edible decorations does not exceed 50 percent of the price.”[26]

State options

States are allowed under federal law to administer SNAP in different ways. As of April 2015, the USDA had published eleven periodic State Options Reports outlining variations in how states have administered the program.[27] The USDA’s most recent State Options Report, published in April 2015, summarizes:

SNAP’s statutes, regulations, and waivers provide State agencies with various policy options. State agencies use this flexibility to adapt their programs to meet the needs of eligible, low‐income people in their States. Modernization and technology have provided States with new opportunities and options in administering the program. Certain options may facilitate program design goals, such as removing or reducing barriers to access for low-income families and individuals, or providing better support for those working or looking for work. This flexibility helps States better target benefits to those most in need, streamline program administration and field operations, and coordinate SNAP activities with those of other programs.[28]

Some areas of differences among states include: when and how frequently SNAP recipients must report household circumstances; on whether the state agency acts on all reported changes or only some changes; whether the state uses a simplified method for determining the cost of doing business in cases where an applicant is self-employed; and whether legally obligated child support payments made to non-household members are counted as an income exclusion rather than a deduction.[28]

State agencies also have an option to call their program SNAP; whether to continue to refer to their program under its former name, the Food Stamp Program; or whether to choose an alternate name.[28] Among the 50 states plus the District of Columbia, 32 call their program SNAP; five continue to call the program the Food Stamp Program; and 16 have adopted their own name.[28] For example, California calls its SNAP implementation “CalFresh“, while Arizona calls its program “Nutrition Assistance”.[28]

States and counties with highest use of SNAP per capita

According to January 2015 figures reported by the Census Bureau and USDA and compiled by USA Today, the states and district with the most food stamp recipients per capita are:[29]

State % of population
receiving
SNAP benefits
District of Columbia 22%
Mississippi 21%
New Mexico 22%
West Virginia 20%
Oregon 20%
Tennessee 20%
Louisiana 19%

According to June 2009 figures reported by the state agencies, the USDA, and Census Bureau, and compiled by the New York Times, the individual counties with the highest levels of SNAP usage were:

County (or equivalent) % of population
receiving
SNAP benefits
Kusilvak Census Area, Alaska 49%
Owsley County, Kentucky 49%
Oglala Lakota County, South Dakota 49%
Pemiscot County, Missouri 47%
Todd County, South Dakota 46%
Sioux County, North Dakota 45%
Dunklin County, Missouri 44%
East Carroll Parish, Louisiana 43%
Humphreys County, Mississippi 43%
Wolfe County, Kentucky 42%
Perry County, Alabama 41%
Phillips County, Arkansas 39%
Rolette County, North Dakota 39%
Ripley County, Missouri 39%
Ziebach County, South Dakota 39%

Impact

During the recession of 2008, SNAP participation hit an all-time high. Arguing in support for SNAP, the Food Research and Action Center argued that “putting more resources quickly into the hands of the people most likely to turn around and spend it can both boost the economy and cushion the hardships on vulnerable people who face a constant struggle against hunger.[30] Researchers have found that every $1 that is spent from SNAP results in $1.73 of economic activity. In California, the cost-benefit ratio is even higher: for every $1 spent from SNAP between $3.67 to $8.34 is saved in health care costs.[31][32][33] The Congressional Budget Office also rated an increase in SNAP benefits as one of the two most cost-effective of all spending and tax options it examined for boosting growth and jobs in a weak economy.[33]

Participants

A summary statistical report indicated that an average of 44.2 million people used the program in FY 2016, down from 45.8 million in 2015 and below the 2013 peak of 47.6 million.[34] SNAP is able to support 75% of those eligible for the program. Nearly 72 percent of SNAP participants are in families with children; more than one-quarter of participants are in households with seniors or people with disabilities.[35]

As of 2013, more than 15% of the U.S. population receive food assistance, and more than 20% in GeorgiaKentuckyLouisianaNew MexicoOregon and Tennessee. Washington D.C. was the highest share of the population to receive food assistance at over 23%.[36]

Average number of persons participating in the SNAP, 2000–2016. The number of participants increased due to the Great Recession, peaking in 2013, and has since fallen.

According to the United States Department of Agriculture (based on a study of data gathered in Fiscal Year 2010), statistics for the food stamp program are as follows:[37]

  • 49% of all participant households have children (17 or younger), and 55% of those are single-parent households.
  • 15% of all participant households have elderly (age 60 or over) members.
  • 20% of all participant households have non-elderly disabled members.
  • The average gross monthly income per food stamp household is $731; The average net income is $336.
  • 37% of participants are White, 22% are African-American, 10% are Hispanic, 2% are Asian, 4% are Native American, and 19% are of unknown race or ethnicity.[37]

Costs

Total program costs from 2000 to 2016. The amount increased sharply after 2008 due to the Great Recession, and has fallen since 2013 as the economy recovers.

SNAP benefits cost since the 1960s

Amounts paid to program beneficiaries rose from $28.6 billion in 2005 to $76.1 billion in 2013, falling back to $66.6 billion by 2016. This increase was due to the high unemployment rate (leading to higher SNAP participation) and the increased benefit per person with the passing of ARRA. SNAP average monthly benefits increased from $96.18 per person to $133.08 per person. Other program costs, which include the Federal share of State administrative expenses, Nutrition Education, and Employment and Training, amounted to roughly $3.7 million in 2013.[5] There were cuts into the program’s budget introduced in 2014 that were estimated to save $8.6 billion over 10 years. Some of the states are looking for measures within the states to balance the cuts, so they would not affect the recipients of the federal aid program.[38]

Food security and insecurity

While SNAP participants and other low-income nonparticipants spend similar amounts on food spending, SNAP participants tend to still experience greater food insecurity than nonparticipants. This is believed to be a reflection of the welfare of individuals who take the time to apply for SNAP benefits rather than the shortcomings of SNAP. Households facing the greatest hardships are the most likely to bear the burden of applying for program benefits.[39]Therefore, SNAP participants tend to be, on average, less food secure than other low-income nonparticipants.[39]

Self-selection by more food-needy households into SNAP makes it difficult to observe positive effects on food security from survey data.[40] Statistical models that control for this endogeneity suggest that SNAP receipt reduces the likelihood of being food insecure and very food insecure by roughly 30 percent and 20 percent, respectively.[41]

Poverty

Because SNAP is a means-tested entitlement program, participation rates are closely related to the number of individuals living in poverty in a given period. In periods of economic recession, SNAP enrollment tends to increase and in periods of prosperity, SNAP participation tends to be lower.[39] Unemployment is therefore also related to SNAP participation. However, ERS data shows that poverty and SNAP participation levels have continued to rise following the 2008 recession, even though unemployment rates have leveled off. Poverty levels are the strongest correlates for program participation.

A 2016 study found that SNAP benefits lead to greater expenditures on housing, transportation, and education by beneficiaries.[42]

SNAP is closely related to poverty and unemployment

Income maintenance

The purpose of the Food Stamp Program as laid out in its implementation was to assist low-income households in obtaining adequate and nutritious diets. According to Peter H. Rossi, a sociologist whose work involved evaluation of social programs, “the program rests on the assumption that households with restricted incomes may skimp on food purchases and live on diets that are inadequate in quantity and quality, or, alternatively skimp on other necessities to maintain an adequate diet”.[43] Food stamps, as many like Rossi, MacDonald, and Eisinger contend, are used not only for increasing food but also as income maintenance. Income maintenance is money that households are able to spend on other things because they no longer have to spend it on food. According to various studies shown by Rossi, because of income maintenance only about $0.17–$0.47 more is being spent on food for every food stamp dollar than was spent prior to individuals receiving food stamps.[44]

Diet quality

Studies are inconclusive as to whether SNAP has a direct effect on the nutritional quality of food choices made by participants. Unlike other federal programs that provide food subsidies, i.e. the Supplemental Nutrition Assistance Program for Women, Infants and Children (WIC), SNAP does not have nutritional standards for purchases. Critics of the program suggest that this lack of structure represents a missed opportunity for public health advancement and cost containment.[45][46] In April 2013, the USDA research body, the Economic Research Service (ERS), published a study that examined diet quality in SNAP participants compared to low-income nonparticipants. The study revealed a difference in diet quality between SNAP participants and low-income nonparticipants, finding that SNAP participants score slightly lower on the Healthy Eating Index[47] (HEI) than nonparticipants. The study also concluded that SNAP increases the likelihood that participants will consume whole fruit by 23 percentage points. However, the analysis also suggests that SNAP participation decreases participants’ intake of dark green and orange vegetables by a modest amount.[48]

A 2016 study found no evidence that SNAP increased expenditures on tobacco by beneficiaries.[42]

Macroeconomic effect

The USDA’s Economic Research Service explains: “SNAP is a counter-cyclical government assistance program—it provides assistance to more low-income households during an economic downturn or recession and to fewer households during an economic expansion. The rise in SNAP participation during an economic downturn results in greater SNAP expenditures which, in turn, stimulate the economy.”[49]

In 2011, Secretary of Agriculture Tom Vilsack gave a statement regarding SNAP benefits: “Every dollar of SNAP benefits generates $1.84 in the economy in terms of economic activity.”[50] Vilsack’s estimate was based on a 2002 USDA study which found that “ultimately, the additional $5 billion of FSP (Food Stamp Program) expenditures triggered an increase in total economic activity (production, sales, and value of shipments) of $9.2 billion and an increase in jobs of 82,100,” or $1.84 stimulus for every dollar spent.[51]

A January 2008 report by Moody’s Analytics chief economist Mark Zandi analyzed measures of the Economic Stimulus Act of 2008 and found that in a weak economy, every $1 in SNAP expenditures generates $1.73 in real GDP increase, making it the most effective stimulus among all the provisions of the act, including both tax cuts and spending increases.[52][53]

A 2010 report by Kenneth Hanson published by the USDA’s Economic Research Service estimated that a $1 billion increase in SNAP expenditures increases economic activity (GDP) by $1.79 billion (i.e., the GDP multiplier is 1.79).[54] The same report also estimated that the “preferred jobs impact … are the 8,900 full-time equivalent jobs plus self-employed or the 9,800 full-time and part-time jobs plus self-employed from $1 billion of SNAP benefits.”[54]

Local economic effects

In March 2013, the Washington Post reported that one-third of Woonsocket, Rhode Island‘s population used food stamps, putting local merchants on a “boom or bust” cycle each month when EBT payments were deposited. The Post stated that “a federal program that began as a last resort for a few million hungry people has grown into an economic lifeline for entire towns.”[55] And this growth “has been especially swift in once-prosperous places hit by the housing bust”.[56]

In addition to local town merchants, national retailers are starting to take in an increasing large percentage of SNAP benefits. For example, “Walmart estimates it takes in about 18% of total U.S. outlays on food stamps.”[57]

Fraud and abuse

In March 2012, the USDA published its fifth report in a series of periodic analyses to estimate the extent of trafficking in SNAP; that is, selling or otherwise converting SNAP benefits for cash payouts. Although trafficking does not directly increase costs to the Federal Government,[58][59][60] it diverts benefits from their intended purpose of helping low-income families access a nutritious diet. Also trafficking may indirectly increase costs by encouraging participants to stay in the program longer than intended, or by incentivizing new participants seeking to profit from trafficking. The FNS aggressively acts to control trafficking by using SNAP purchase data to identify suspicious transaction patterns, conducting undercover investigations, and collaborating with other investigative agencies.

Trafficking diverted an estimated one cent of each SNAP dollar ($330 million annually) from SNAP benefits between 2006 and 2008. Trafficking has declined over time from nearly 4 percent in the 1990s. About 8.2 percent of all stores trafficked from 2006 to 2008 compared to the 10.5 percent of SNAP authorized stores involved in trafficking in 2011.[61] A variety of store characteristics and settings were related to the level of trafficking. Although large stores accounted for 87.3 percent of all SNAP redemptions, they only accounted for about 5.4 percent of trafficking redemptions. Trafficking was much less likely to occur among publicly owned than privately owned stores and was much less likely among stores in areas with less poverty rather than more. The total annual value of trafficked benefits increased at about the same rate as overall program growth. The current estimate of total SNAP dollars trafficked is higher than observed in the previous 2002–2005 period. This increase is consistent, however, with the almost 37 percent growths in average annual SNAP benefits from the 2002–2005 study periods to the most recent one. The methodology used to generate these estimates has known limitations. However, given variable data and resources, it is the most practical approach available to FNS. Further improvements to SNAP trafficking estimates would require new resources to assess the prevalence of trafficking among a random sample of stores.[62]

The USDA report released in August 2013 says the dollar value of trafficking increased to 1.3 percent, up from 1 percent in the USDA’s 2006–2008 survey,[61] and “About 18 percent of those stores classified as convenience stores or small groceries were estimated to have trafficked. For larger stores (supermarkets and large groceries), only 0.32 percent were estimated to have trafficked. In terms of redemptions, about 17 percent of small groceries redemptions and 14 percent of convenience store redemptions were estimated to have been trafficked. This compares with a rate of 0.2 percent for large stores.”[63]

The USDA, in December 2011, announced new policies to attempt to curb waste, fraud, and abuse. These changes will include stiffer penalties for retailers who are caught participating in illegal or fraudulent activities.[64] “The department is proposing increasing penalties for retailers and providing states with access to large federal databases they would be required to use to verify information from applicants. SNAP benefit fraud, generally in the form of store employees buying EBT cards from recipients is widespread in urban areas, with one in seven corner stores engaging in such behavior, according to a recent government estimate. There are in excess of 200,000 stores, and we have 100 agents spread across the country. Some do undercover work, but the principal way we track fraud is through analyzing electronic transactions” for suspicious patterns, USDA Under Secretary Kevin Concannon told The Washington Times.[65] Also, states will be given additional guidance that will help develop a tighter policy for those seeking to effectively investigate fraud and clarifying the definition of trafficking.

According to the Government Accountability Office, at a 2009 count, there was a payment error rate of 4.36% of SNAP benefits down from 9.86% in 1999.[66] A 2003 analysis found that two-thirds of all improper payments were the fault of the caseworker, not the participant.[66] There are also instances of fraud involving exchange of SNAP benefits for cash and/or for items not eligible for purchase with EBT cards.[67] In 2011, the Michigan program raised eligibility requirements for full-time college students, to save taxpayer money and to end student use of monthly SNAP benefits.[68]

In Maine, incidents of recycling fraud have occurred in the past where individuals once committed fraud by using their EBT cards to buy canned or bottled beverages (requiring a deposit to be paid at the point of purchase for each beverage container), dump the contents out so the empty beverage container could be returned for deposit redemption, and thereby, allowed these individuals to eventually purchase non-EBT authorized products with cash from the beverage container deposits.[69]

The State of Utah developed a system called “eFind” to monitor, evaluate and cross-examine qualifying and reporting data of recipients assets. Utah’s eFind system is a “back end”, web-based system that gathers, filters, and organizes information from various federal, state, and local databases. The data in eFind is used to help state eligibility workers determine applicants’ eligibility for public assistance programs, including Medicaid, CHIP, the Supplemental Nutrition Assistance Program (SNAP), Temporary Assistance for Needy Families (TANF), and child care assistance.[70] When information is changed in one database, the reported changes become available to other departments utilizing the system. This system was developed with federal funds and it is available to other states free of charge.

The USDA only reports direct fraud and trafficking in benefits, which was officially estimated at $858 million in 2012. The Cato Institute reports that there was another $2.2 billion in erroneous payouts in 2009.[citation needed] Cato also reported that the erroneous payout rate dropped significantly from 5.6 percent in 2007 to 3.8 percent in 2011.[citation needed]

Role of SNAP in healthy diets

Background[edit]

The 2008 Farm Bill authorized $20 million to be spent on pilot projects to determine whether incentives provided to SNAP recipients at the point-of-sale would increase the purchase of fruits, vegetables, or other healthful foods.[71] Fifteen states expressed interest in having the pilot program and, ultimately, five states submitted applications to be considered for HIP. Hampden County, Massachusetts was selected as the Healthy Incentives Pilot (HIP) site. HIP is designed to take place from August 2010 to April 2013 with the actual operation phase of the pilot program scheduled to last 15 months, from November 2011 to January 2013.[72]

HIP offers select SNAP recipients a 30% subsidy on produce, which is credited to the participant’s EBT card, for 15 months. 7,500 households will participate HIP and an equal number will not; the differences between the two groups will be analyzed to see the effects of the program.[73] Produce, under the HIP, is defined as fresh, frozen, canned, or dried fruits and vegetables that do not have any added sugar, salt, fat, or oil.

Administrative responsibility[edit]

The Massachusetts Department of Transitional Assistance (DTA) is the state agency responsible for SNAP. DTA has recruited retailers to take part in HIP and sell more produce, planned for the EBT system change with the state EBT vendor, and hired six new staff members dedicated to HIP. DTA has agreed to provide FNS with monthly reports, data collection and evaluation.

Proposals to restrict “junk food” or “luxury items”

Periodically, proposals have been raised to restrict SNAP benefits from being used to purchase various categories or types of food which have been criticized as “junk food” or “luxury items”. However, Congress and the Department of Agriculture have repeatedly rejected such proposals on both administrative burden and personal freedom grounds. The Food and Nutrition Service noted in 2007 that no federal standards exist to determine which foods should be considered “healthy” or not, that “vegetables, fruits, grain products, meat and meat alternatives account for nearly three-quarters of the money value of food used by food stamp households” and that “food stamp recipients are no more likely to consume soft drinks than are higher-income individuals, and are less likely to consume sweets and salty snacks.”[74] Thomas Farley and Russell Sykes argued that the USDA should reconsider the possibility of restricting “junk food” purchases with SNAP in order to encourage healthy eating, along with incentivizing the purchase of healthy items through a credit or rebate program that makes foods such as fresh vegetables and meats cheaper. They also noted that many urban food stores do a poor job of stocking healthy foods and instead favor high-profit processed items.[75]

See also

General:

References

https://en.wikipedia.org/wiki/Supplemental_Nutrition_Assistance_Program

Story 4: Obesity Expanding In America — Fat Ass Americans — Pandemic — Keeping America Fat — Promises Kept — Videos

See the source image

See the source image

The Complete Skinny on Obesity

Adult Obesity Facts

Obesity is common, serious and costly

  • The prevalence of obesity was 39.8% and affected about 93.3 million of U.S. adults in 2015-2016. [Read CDC National Center for Health Statistics (NCHS) data brief PDF-603KB]
  • Obesity-related conditions include heart disease, stroke, type 2 diabetes and certain types of cancer, some of the leading causes of preventable death. [Read guidelines]
  • The estimated annual medical cost of obesity in the U.S. was $147 billion in 2008 U.S. dollars; the medical cost for people who have obesity was $1,429 higher than those of normal weight. [Read paper]

Obesity affects some groups more than others

[Read CDC National Center for Health Statistics (NCHS) data brief [PDF-603KB]]

  • Hispanics (47.0%) and non-Hispanic blacks (46.8%) had the highest age-adjusted prevalence of obesity, followed by non-Hispanic whites (37.9%) and non-Hispanic Asians (12.7%).
  • The prevalence of obesity was 35.7% among young adults age 20–39 years, 42.8% among middle-aged adults age 40-59 years, and 41.0% among older adults age 60 and over.

Obesity and socioeconomic status

[Read the Morbidity and Mortality Weekly Report (MMWR)]

The association between obesity and income or educational level is complex and differs by sex, and race/ethnicity.

  • Overall, men and women with college degrees had lower obesity prevalence compared with those with less education.
  • By race/ethnicity, the same obesity and education pattern was seen among non-Hispanic white, non-Hispanic black, and Hispanic women, and also among non-Hispanic white men, although the differences were not all statistically significant. Although the difference was not statistically significant among non-Hispanic black men, obesity prevalence increased with educational attainment. Among non-Hispanic Asian women and men and Hispanic men there were no differences in obesity prevalence by education level.
  • Among men, obesity prevalence was lower in the lowest and highest income groups compared with the middle income group. This pattern was seen among non-Hispanic white and Hispanic men. Obesity prevalence was higher in the highest income group than in the lowest income group among non-Hispanic black men.
  • Among women, obesity prevalence was lower in the highest income group than in the middle and lowest income groups. This pattern was observed among non-Hispanic white, non-Hispanic Asian, and Hispanic women. Among non-Hispanic black women, there was no difference in obesity prevalence by income.

Top of Page

Related Links

  • Obesity Prevalence Maps
    State-specific data on adult obesity prevalence using self-reported information from the Behavioral Risk Factor Surveillance System (BRFSS) shows that obesity prevalence remains high in the United States.

https://www.cdc.gov/obesity/data/adult.html

Story 4: Obesity Expanding In America — Fat Ass Americans — Pandemic — Keeping America Fat — Promises Kept — Videos

See the source image

See the source image

See the source image

See the source image

Gary Taubes on How Big Government Made Us Fat

The Complete Skinny on Obesity

Sweet Revenge Turning the Tables on Processed Food (no vegetarian/vegan propaganda)

My Big Fat Body Full Documentary YouTube

The Weight of the Nation: Poverty and Obesity (HBO Docs)

The Weight of the Nation: Part 1 – Consequences (HBO Docs)

The Weight of the Nation: Part 2 – Choices (HBO Docs)

The Weight of the Nation: Part 3 – Children in Crisis (HBO Docs)

 

Our Fat Pets

Sixty percent of cats tip the scales at unhealthy weights, slightly more than the 56 percent of dogs. It’s not good for them.

Image
CreditiStock

By Susan Jenks

Like most cats, Max had a swagger in his walk. But because he was slightly overweight, the 15-year-old Maine coon began having trouble “jumping up on things,” his owner says, the extra pounds worsening his arthritis.

So his owner, Jaime Wilson, decided her pet needed to go on a diet — barely two tablespoons of dry food in the morning and again at night, along with a larger portion of canned wet food once a day and a supervised exercise program that included treadmill work and running through stationary poles.

“He was ravenous all the time,” his owner concedes. But after six months, “he’s very sleek and thin,” says Mrs. Wilson, who works at the University of Florida’s Small Animal Hospital in Gainesville, Fla. “Not having the extra pounds has been great for his joints.”

The Association for Pet Obesity Prevention estimates that in the United States, veterinarians now classify more than 100 million dogs and cats as overweight or obese, up from 80 million five years ago. Sixty percent of cats tip the scales at unhealthy weights, slightly more than the 56 percent of dogs.

ADVERTISEMENT

Worse yet, many pet owners fail to recognize the potential severity of the problem, finding their pets’ weight gain of little concern or even “cute,” says Dr. Justin Schmalberg, service chief of integrative medicine at the University of Florida’s College of Veterinary Medicine in Gainesville. And show animals, often held up as exemplary models, he says, sometimes tend toward the pudgy side.

“In part, it’s an issue of perception,” Dr. Schmalberg says. “Generally, the public is more tolerant of obese animals than they are of thin ones. There’s not as much stigma with animals being overweight as with people.”

Obesity and the inflammatory effects of excess fat can bring a host of health problems. Max’s six-month journey to a healthier weight reduced his risk for insulin-dependent diabetes, the most common health problem veterinarians see in overweight or obese cats. Overweight dogs rarely develop this form of diabetes, veterinarians say, though large breeds often face joint injuries from excess weight, while smaller ones can have breathing difficulties if airways collapse.

Along with diabetes and arthritis, extra heft puts pets at increased risk for liver and kidney diseases, high blood pressure, heart failure and even some cancers. And at least one widely cited study in Labrador retrievers found that even moderately overweight dogs have shorter life spans than their lean counterparts.

Veterinarians assess a pet’s overall body health using a system similar to the body mass index, or B.M.I., used in people. Emaciated dogs or cats get the lowest score on a nine-point scale, obese ones the highest, with a desirable weight usually in the four to five range, says Dr. Deborah Linder, head of Tufts University’s obesity clinic for animals in Boston. An animal at six is considered clinically overweight, with a score of seven or more, obese.

Veterinarians also complete a physical exam to assess obesity, feeling over the rib cage by the animal’s armpit, “where tissue should be no thicker than the back of your hand,” Dr. Linder says. Another sign of healthy girth, she says, is a tuck in the belly, similar to an “hourglass figure.”

Image

Although some pets are genetically vulnerable to unwanted pounds, others may have diseases like hyperthyroidism or Cushing’s disease, in which the adrenal glands pump out too much of a stress hormone, stimulating appetite. Once these conditions are ruled out, veterinarians say, aging itself poses an ongoing risk as metabolism slows — the pet version of middle-age spread.

Neutering or spaying also decreases an animal’s energy needs by a third, Dr. Schmalberg says, so “calories in, calories out,” takes on greater importance in maintaining a pet’s proper weight.

Researchers have recently identified another risk factor for pet obesity: rapid growth in early life, though the reasons for this remain poorly understood. “Dogs and cats that grow quickly are highly likely to become obese later in life,” says Dr. Alex German, a professor at the University of Liverpool in England.

But veterinarians single out overfeeding as the greatest contributor to pet obesity. Giving pets easy access to food around the house, or “free feeding,” can quickly add unwanted pounds, they say, as can an overindulgence in high-calorie treats. Throw small children into the household mix with “sneak feeding” and the situation becomes worse, says Dr. Sarah Nord, a staff veterinarian at Trupanion, a Seattle-based pet insurer. “It’s definitely not uncommon,” she says with a laugh.

Whether pets, like some owners, “stress eat” is difficult to measure. “In my experience, when animals are stressed, they tend to go off feeding,” Dr. Nord says. “But we don’t know.”

https://www.nytimes.com/2018/08/02/well/fat-pets-dog-cat-health.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1112-1119

Listen To Pronk Pops Podcast or Download Shows 1101-1111

Listen To Pronk Pops Podcast or Download Shows 1091-1100

Listen To Pronk Pops Podcast or Download Shows 1082-1090

Listen To Pronk Pops Podcast or Download Shows 1073-1081

Listen To Pronk Pops Podcast or Download Shows 1066-1073

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Advertisements
Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 921, June 29, 2017, Part 1 –Story 1: Majority of American People Want and Deserve A Big, Bold, Bipartisan Tax Reform Cut — The Time Is Now For The Fair Tax Less Version of The FairTax — Trump Should Embrace Real Tax Reform By Becoming Champion of Fair Tax Less If He Wants A Booming Economy Growing At 5% Plus — No Guts — No Glory — Just Do It By Labor Day September 4, 2017 — Make America Great Again — What Good is Dreaming It If You Don’t Actually Do It! — Videos

Posted on June 30, 2017. Filed under: American History, Animal, Banking System, Blogroll, Breaking News, Budgetary Policy, Congress, Constitutional Law, Corruption, Countries, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Employment, Fiscal Policy, Government, Government Spending, History, House of Representatives, Human, Labor Economics, Law, Life, Media, National Interest, News, People, Philosophy, Photos, Politics, Polls, Progressives, Raymond Thomas Pronk, Regulation, Rule of Law, Senate, Tax Policy, Taxation, Taxes, Technology, United States of America, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for cartoons trump tax plan

Image result for fairtax

Image result for cartoons trump tax plan

The Pronk Pops Show 921, June 29, 2017, Part 1 –Story 1: Majority of American People Want and Deserve A Big, Bold, Bipartisan Tax Reform Cut — The Time Is Now For The Fair Tax Less Version of The FairTax — Trump Should Embrace Real Tax Reform By Becoming Champion of Fair Tax Less If He Wants A Booming Economy Growing At 5% Plus — No Guts — No Glory — Just Do It By Labor Day September 4, 2017 — Make America Great Again — What Good is Dreaming It If You Don’t Actually Do It! — Videos

Image result for fairtaxImage result for fair tax nation
Image result for border adjustment tax a bad idea

Corporations paying fewer taxes

Image result for payroll taxes in 2016 social security and medicare disability

Image result for payroll taxes in 2016 social security and medicare disability

Image result for payroll taxes in 2016

Wealthy pay more in taxes than poor

Image result for president trump for fair tax

Trump vs. OECD on tax reform

Watters visits Trump’s alma mater to talk tax reform

Rep. Meadows: Tax reform, health care and infrastructure get done by September

Speaker Ryan Guarantees That Congress Will Get Tax Reform Done In 2017

Speaker Paul Ryan Full Speech on Tax Reform 6-20-17

Ron Paul on Paul Ryan’s tax reform plan

How Trump’s tax reform plan will impact the economy

Donald Trump: Simplify the Tax Code

Donald Trump: I pay as little as possible in taxes

Grover Norquist on Speaker Ryan’s tax reform timeline

Grover Norquist: Expect dramatic tax cuts from Trump

The Pledge: Grover Norquist’s hold on the GOP

FairTax: Fire Up Our Economic Engine (Official HD)

Pence on the Fair Tax

Freedom from the IRS! – FairTax Explained in Details

Millionaire confidence plunges on Trump’s tax reform delays

What’s Up With Trump’s Tax Reform? Myths vs. Facts

The FairTax: It’s Time

Dan Mitchell explains the fair tax

Six Reasons Why the Capital Gains Tax Should Be Abolished

Is America’s Tax System Fair?

Sen. Moran Discusses FairTax Legislation on U.S. Senate Floor

Milton Friedman – Why Tax Reform Is Impossible

Milton Friedman – Is tax reform possible?

What’s Killing the American Dream?

Robert Wolf: Border adjustment not going to happen

Is Donald Trump serious about tax reform?

Sean Spicer: Trump wants to get tax reform right

Will tax reform really happen by August?

Dan Mitchell Discussing GOP Tax Plan and Corporate Rate Reduction

What Tax Reform Could Look Like Under Donald Trump | Squawk Box | CNBC

#Eakinomics – 4 Key Questions on Dynamic Scoring

What is Dynamic Scoring?

Trump Pushes ‘Major Border Tax’ to Keep Jobs in U.S.

Ryan Unexpectedly Joins Forces With Bannon on Border Tax

Kudlow: Freedom Caucus & Trump’s base is opposed to Border Adjustment Tax

Sen. Perdue: Border Adjustment Tax would “shutdown economic growth”

Sen. Tom Cotton: “I have serious concerns” w/ Border Adjustment Tax

Americans Need a Progressive Consumption Tax

Sen. Strange: “I would not” vote for a Border Adjustment Tax

CNBC: Steve Forbes on Border Adjustment Tax – “Don’t Do It” 2.8.17

Meg Whitman: Border Adjustment Tax Will Not Create Jobs | CNBC

Art Laffer: Border tax is a major mistake

Border Tax Fight Is Economists Vs. Everybody Else | Squawk Box | CNBC

Dan Mitchell Discussing GOP Tax Plan and Corporate Rate Reduction

What is a Border Adjustment?

Border Tax: What You Need to Know

Will a border adjustment tax help American businesses?

Will a border adjustment tax kill free trade?

Border adjustment tax political suicide?

Fox Pol:l 73% Want Tax Reform This Year – Cavuto

Could the border tax debate stall tax reform?

Is A Border Adjustment Tax A Good Idea?

Border Adjustment Tax: Trump’s MAGA Ace

President Donald Trump Begins First Week By Meeting With Top Business Leaders | NBC News

Dan Mitchell Fretting about GOP Border-Adjustable Tax Plan

Paul Ryan on why he’s confident about tax reform

1/26/17 Border Adjustment Taxes, Tax Reform & Trade: Panel 1

1/26/17 Border Adjustment Taxes, Tax Reform and Trade: Panel 2 Part 2

Border Tax Adjustment and Corporate Tax Reforms: Panel 1

Border Tax Adjustment and Corporate Tax Reforms: Panel 2

Breaking Down The Republican Plan For A Border Tax | CNBC

McConnell Seeks Revenue-Neutral Tax Reform This Congress

Mnuchin: Three percent growth achievable with tax reform

Can Congress get tax reform done?

Rep. Reed: Tax reform will get done this year

Sen. Shelby Says Fundamental Tax Reform Good for Economy

Harvard Professor: Trump’s Border Tax ‘Misunderstood’

Making Sense Of The 20 Percent Tax Proposal | Morning Joe | MSNBC

Proposed Tax Package A Dramatic Cut Even With A Border Tax?

Treasury Secretary Steve Mnuchin On Tax Reform, Growth, Border Tax, China (Full) | Squawk Box | CNBC

Wilbur Ross On Border Tax: Something Will Be Found To Fill Trillion-Dollar Hole | Squawk Box | CNBC

Honda “Impossible Dream” Commercial

Honda Advert: Impossible Dream II 2010

Lyrics
To dream the impossible dream
To fight the unbeatable foe
To bear with unbearable sorrow
To run where the brave dare not go
To right the unrightable wrong
To love pure and chaste from afar
To try when your arms are too weary
To reach the unreachable star
This is my quest, to follow that star,
No matter how hopeless, no matter how far
To fight for the right without question or cause
To be willing to march into hell for a heavenly cause
And I know if I’ll only be true to this glorious quest
That my heart will lie peaceful and calm when I’m laid to my rest
And the world will be better for this
That one man scorned and covered with scars
Still strove with his last ounce of courage
To fight the unbeatable foe, to reach the unreachable star
Songwriters: Joe Darion / Mitchell Leigh
The Impossible Dream lyrics © Helena Music Company

 

Taxes May Be Certain, but Tax Reform Is Not

Taxes May Be Certain, but Tax Reform Is Not
by V. Lance Tarrance

Donald Trump is a man who throws down gauntlets, and he threw down several big ones during his campaign for president — confronting the status quos on immigration, onhealthcare and on taxes, to name a few. He is now pursuing bold policy changes on each. But it could be Trump’s action on taxes that matters most to whether the stock market continues to ride high, GDP growth returns to a healthy 3% and, therefore, whether his presidency is judged well in posterity.

News about taxes has been relatively slow thus far in Trump’s administration. Judicial blowback against his immigration policies and Congressional blowback on healthcare reform have received far more attention than the general tax-plan principles he announced in April. Still, achieving detailed tax reform may prove even more difficult than his other policy struggles once the wheels start turning.

Before making tax reform a year-end goal, Treasury Secretary Steven Mnuchin initially said he hoped to complete tax reform by August. Senate Majority Leader Mitch McConnell reacted by saying that tax reform is a “very complicated subject” and harder to do now than the last time Congress achieved it in 1986. And passing the 1986 tax reform legislation was no easy task — it required winning the support of a Democratic House and a Republican president, and took nearly two years of intense negotiations. Alluding more cynically to the significant political obstacles that often impede changing the tax code, former House Speaker John Boehner said the passing of a tax code overhaul is “just a bunch of happy talk.”

Now, however, current Speaker Paul Ryan is also pushing for tax reform by the end of 2017, making these obstacles appear a little less daunting than if the administration were going it alone.

Aside from whether tax experts and Washington politicians are willing to upend the tax code, it is important to note where the American people stand on the need for action on taxes. It must be remembered that taxpayers may dislike the current tax system but not be convinced that Congress and the Trump administration will make it any better — change could be worse. Without a strong push from the American people, Trump’s tax reform might not materialize.

During the 2016 presidential campaign, Gallup tested several of candidate Trump’s tax proposals.

  • He advocated eliminating most federal income tax deductions and loopholes for the very rich, and Gallup found 63% of American adults favoring this with just 17% opposed.
  • His proposal to simplify the federal tax code — reducing the current seven tax brackets to four — was also popular, with 47% agreeing and only 12% disagreeing.
  • Trump’s plan to eliminate the estate tax paid when someone dies garnered considerably more agreement than disagreement from Americans, 54% to 19%. Notably, this is an issue that Congress and the wider public have considered in the recent past, and public sentiment on the issue today is in line with past Gallup polls on this issue, such as when it asked about keeping the estate tax from increasing in 2010.

More recently, in March 2017, Americans viewed President Trump’s general plan to “significantly cut federal income taxes for the middle class” positively: 61% agreed with the plan (with no mention of Trump in the question), 26% disagreed and 13% had no opinion. Trump’s proposal to lower corporate tax rates, however, elicited a split decision, with 38% reacting positively, 43% negatively and the potentially decisive 19% “no opinion” group apparently needing more information.

These findings suggest Americans could respond favorably to many of the specific elements of Trump’s ultimate tax plan, provided they make it into whatever legislation Congress winds up debating. For example, in spite of closing tax loopholes that favor the rich, the plan is expected to end up cutting taxes on the wealthy, not raising them. But as long as the plan also cuts taxes on the middle class, that fact alone is unlikely to sink it with Americans. Bush’s across-the-board tax cuts in 2001, which more Americans at the time said were a “good thing” than a “bad thing,” are a perfect illustration of this.

Whether Americans feel a sense of urgency about enacting tax reform is another matter.

In April 2017, Gallup found that Americans’ concern about their own federal tax burden had actually cooled somewhat, as barely half (51%) felt their taxes were “too high,” down from 57% in 2016. By contrast, in June 1985, the year before the revolutionary Tax Reform Act of 1986 went into effect, 63% of Americans said their taxes were too high.

While public demand for lowering taxes may have waned, it is not gone. Public concern about taxes fell the most over the past year among Republicans — a familiar political pattern given the partisan shift in presidential power. With a Republican in the White House, the Republican rank and file are less likely to say anything negative about the government, including about taxes. Still, 62% of Republicans call their taxes too high, as do 52% of independents and 39% of Democrats.

The implication? While not as intense as Congressional leaders may have expected, public demand for tax reform is still there, especially among the Republicans who may matter most to GOP lawmakers.

Common Ground Exists on Tax Reform

As the U.S. Congress is about to start its summer recess, tax reform remains ill defined by the administration, and negotiations over sub-issues like the border adjustment tax have stalled any pivot to immediate tax legislation. More importantly, there seems to be no bipartisan support this time, while there was under Reagan in 1986. Granted, this may seem like less of an issue now, as Republicans today control both the legislative and executive branches of the federal government. But real tax reform always makes for winners and losers, and it is problematic for only one party to pass new reforms. One need only look at the electoral consequences that Democrats have repeatedly suffered since 2010, the year they passed major healthcare reform legislation on party-line votes, to understand the danger Republicans could face if they pursue tax reform alone.

To make tax reform possible from a bipartisan standpoint, Congress needs to make sure the bill can be branded a “middle-class winner.” As noted previously, Americans favor tax cuts for the middle class, and as the following table shows, Republicans and Democrats are also more likely to believe middle-income people are currently paying too much in taxes than to say they are paying their fair share or paying too little.

Both Party Groups Tend to Believe Middle-Income Americans Pay Too Much in Federal Taxes
Republican/Lean Republican Democrat/Lean Democratic
% %
Too much 51 49
Fair share 40 43
Too little 5 7
No opinion 4 1
GALLUP, APRIL 5-9, 2017

To ensure tax reform enjoys at least some bipartisan support, Democrats will need a win during negotiations, meaning taxes would likely need to be raised on the nation’s wealthier class of citizens. Republicans are split on the issue of the fairness of taxes paid by upper-income people, but Democrats are in solid agreement that they pay too little.

Parties Diverge on Perceptions of What Upper-Income Americans Pay in Federal Taxes
Republican/Lean Republican Democrat/Lean Democratic
% %
Too much 18 4
Fair share 38 13
Too little 40 82
No opinion 4 1
GALLUP, APRIL 5-9, 2017

Bottom Line

With the Trump administration wanting tax reform before the end of 2017, Ryan is now promising to put it on the front burner. However, even Republican leaders’ enthusiasm for tax reform may not be enough to overcome the triad of legislative challenges that exist: the slimness of the Republican majorities in the U.S. House and Senate, the lack of bipartisanship in Washington and the power of special interest groups in Washington, D.C., to protect their vested interests. This is why comprehensive tax reform is historically so rare.

One thing working in Republicans’ favor is that a majority of Americans support tax relief for the middle class, and members of both major parties tend to believe middle-class taxes are too high. If the bill can be positioned strongly as middle-class tax relief, its chances for success will be higher.

http://www.gallup.com/opinion/polling-matters/213239/taxes-may-certain-tax-reform-not.aspx

The Fair Tax — A Tax System that Americans Rightfully Deserve

  • 04/22/2016
  • FAIRtax 
  • by: Rep. John Ratcliffe (TX-4)
The Fair Tax — A Tax System that Americans Rightfully Deserve

At more than 73,000 pages, it’s no wonder our country’s tax code spells headache for millions of hardworking Americans across the country. This bloated document, riddled with complicated loopholes, is anything but navigable for working-class people who can’t afford to hire accountants, lawyers or tax professionals. Yet like clockwork every spring, Americans throw away countless time and treasure in an attempt to properly comply with the process of giving their hard-earned money to the federal government.

The rigors of compliance aside, our tax code penalizes economic growth and American competitiveness. By imposing some of the highest corporate tax rates in the industrialized world, American business are incentivized to entertain corporate inversions, and leave trillions of dollars of cash abroad where it can’t be invested in American growth. While the well-to-do and well-connected may be able to navigate this byzantine world, taxpayers across the country and throughout the 18 counties in Texas I represent are frustrated, and rightfully so. The American people deserve better.

Frustration with the IRS reached new levels in 2013 when revelations surfaced that the agency was targeting conservative groups. When Congress launched investigations, IRS Commissioner John Koskinen repeatedly obstructed justice by refusing to testify and failing to produce up to 24,000 emails relevant to the investigations. This is simply unacceptable.

To make matters worse, the IRS experienced a cyber-attack in 2015 that left more than 700,000 taxpayer accounts vulnerable. And according to a GAO report released just last month, the IRS has improved only marginally since that time in regard to its data security. Taxpayers should not be subject to the political whims of unelected bureaucrats who refuse to follow the law and falsify facts before Congress, all the while placing their personal financial data at risk.

As a staunch fiscal conservative, I’ve been vocal and outspoken about the need for a fairer, flatter tax code – one that doesn’t stifle growth or punish economic success. After all, Ronald Reagan famously said that the role of government should be to fostereconomic growth, not smother it. That’s why I’ve joined more than 70 of my colleagues in cosponsoring legislation that would eliminate all individual and corporate income taxes – the FairTax Act of 2015 (H.R. 25).

The FairTax Act, introduced by Rep. Rob Woodall (GA-7), eliminates all personal, corporate, gift and estate taxes and replaces them with a simple, point-of-sale consumption tax. Beyond this, it completely abolishes the IRS and all of the bureaucratic red tape and corporate cronyism that comes with it – and remains revenue neutral in the process.

The FairTax Act combats the corruption and inefficiency of the IRS, and instead promotes American growth and investment. I’m proud to be a cosponsor of this key piece of legislation, because it recognizes that more freedom and less government is the formula for economic success. It’s this model that’s allowed Texas to lead the nation in job growth since 2008, and it’s about time for Washington to get an overdue dose of these commonsense, Texas economic values. The FairTax Act will do just that, and I urge my colleagues to support it.

Congressman John Ratcliffe represents Texas’ 4th district, serving the outer eastern suburbs of the Dallas-Fort Worth Metroplexsince 2015.  He is a member of the Judiciary Committee as well as the House Homeland Security Committee, serving as Chairman of its Cybersecurity, Infrastructure Protection, and Security Technologies Subcommittee.  Prior to Congress, he served as Mayor of Heath, Texas.  In addition, during the George W. Bush Administration, he was appointed to multiple posts, including U.S. Attorney and Chief of Anti-Terrorism and National Security for the Eastern District of Texas.

Your Money, Your Decision

The current federal income tax system is clearly broken — unfair, overly complex, and almost impossible for most Americans to understand. But there is a reasonable, nonpartisan alternative before Congress that is both fair and easy to understand. A system that allows you to keep your whole paycheck and only pay taxes on what you spend.

The FairTax is a national sales tax that treats every person equally and allows American businesses to thrive, while generating the same tax revenue as the current four-million-word-plus tax code. Under the FairTax, every person living in the United States pays a sales tax on purchases of new goods and services, excluding necessities due to the prebate. The FairTax rate after necessities is 23% compared to combining the 15% income tax bracket with the 7.65% of employee payroll taxes under the current system — both of which will be eliminated!

Important to note: the FairTax is the only tax plan currently being proposed that includes the removal of the payroll tax.

Keep Your Paycheck

For the first time in recent history, American workers will get to keep every dime they earn; including what would have been paid in federal income taxes and payroll taxes. You will get an instant raise in your pay!

Social Security & Medicare Funding

Benefits will not change. The FairTax actually puts these programs on a more solid funding foundation. Instead of being funded by taxes on workers’ wages, which is a small pool, they’ll be funded by taxes on overall consumption by all residents. Learn More .

Get a Tax Refund in Advance on Purchases of Basic Necessities

The FairTax provides a progressive program called a prebate. This gives every legal resident household an “advance refund” at the beginning of each month so that purchases made up to the poverty level are tax-free. The prebate prevents an unfair burden on low-income families. Learn more .

Pay Tax on Only What You Spend

Be in control of your financial destiny. You alone can control your tax burden. If you’re thrifty, you’ll pay lower taxes than somebody who is not. Most importantly, you’ll be taxed fairly. Learn moreabout what is taxed.

Everyone Pays Their Fair Share

Tax evasion and the underground economy cost each taxpayer an additional $2,500 every year! But by taxing new products and services consumed, the FairTax puts everyone in the country at the same level at the cash register. Further, only legal residents are eligible for the prebate. Learn more .

The IRS is No Longer Needed

No more complicated tax forms, individual audits, or intrusive federal bureaucracy. Retailers will collect the FairTax just as they do now with state sales taxes. All money will be collected and remitted to the U.S. Treasury, and both the retailers and states will be paid a fee for their collection service. Learn More

Summer looms with GOP stuck on health care, budget, taxes

The Capitol in Washington is quiet after lawmakers departed the for the Independence Day recess, Friday, June 30, 2017. The Republican leadership in the Senate decided this week to delay a vote on their…

WASHINGTON (AP) — Republicans are stuck on health care, can’t pass a budget, and hopes for a big, bipartisan infrastructure package are fizzling. Overhauling the tax code looks more and more like a distant dream.

The GOP-led Congress has yet to salt away a single major legislative accomplishment for President Donald Trump — and a summer of drift may lead to a logistical nightmare this fall.

Instead, Trump’s allies appear both divided and indecisive, unable to deliver on his agenda while letting other must-do congressional business — chiefly their core responsibilities of passing a budget and spending bills, and keeping the government solvent — slide onto an already daunting fall agenda that is looking more and more like it’ll be a train wreck.

Friday brought more bad news for Speaker Paul Ryan, R-Wis., and other House leaders as 20 GOP moderates signaled a revolt on the budget, penning a letter to Ryan announcing their opposition to an emerging plan to force cuts to government agencies and benefit programs such as food stamps. The letter, authored by Rep. Charlie Dent, R-Pa., warned that without an agreement with Democrats on increasing agency spending, moderates will be “reticent to support any budget.”

“It’s looking like they’re very disorganized. They got obviously a lot of conflict over spending preferences and it’s not just a two-way conflict,” said top House Budget Committee Democrat John Yarmuth of Kentucky. “It’s just a tough Rubik’s Cube they’re trying to solve.”

So it’s not just the Senate effort to repeal and replace Democrat Barack Obama’s health care law that’s foundering. The annual congressional budget measure — a prerequisite to this fall’s hoped-for tax effort — is languishing as well, as are the 12 annual spending bills that typically consume weeks of House floor time each summer.

But GOP leaders say all is going well. Ryan told a Wisconsin radio host on Thursday that “it’s the most productive Congress since the mid-’80s” and issued a news release Friday titled “Despite What You May Hear, We Are Getting Things Done.” The release cites a bipartisan Department of Veterans Affairs accountability measure and 14 bills repealing Obama-era regulations as Congress’ top achievements.

“It would be hard to fault the average American for thinking all that’s going on in Washington these days is high-drama hearings and partisan sniping,” Ryan said. “But amid the countdown clocks and cable news chatter, something important is happening: Congress is getting things done to help improve people’s lives.”

In the first year of a presidency, the annual August congressional recess is a traditional point to take stock. By that point, Obama had signed an economic recovery bill and President George W. Bush had won his landmark tax cuts, while President Bill Clinton was celebrating a hard-fought budget package.

Trump has no comparable successes to trumpet — but his allies in Congress say they’re not worried.

“We laid out an agenda in November and December, and we’re needing to get there,” said House Rules Committee Chairman Pete Sessions, R-Texas. “And we can effectively get there. The questions that confound us are those that we can answer ourselves. And we will.”

And as Republicans are stalled on health care, the budget and infrastructure, there are several other problems that need to be taken care of, including increasing the nation’s borrowing authority, preventing a government shutdown, and lifting budget “caps” that are hobbling efforts to beef up the military.

Unlike health care, the debt limit and a deal to fix the spending caps — a leftover from a failed 2011 budget deal — can only be resolved with Democratic help. However, they promise to consume political capital and valuable time and energy, and there’s no political pay-off, other than forestalling disaster.

First, Congress is off on vacation to return in July for a three-week session. Then comes the traditional monthlong August recess.

After Labor Day comes a four-week sprint to October and the deadline to avert a government shutdown with a temporary spending bill — and to forestall a disastrous default on U.S. obligations by lifting the debt limit, which is a politically toxic vote for many Republicans.

Sentiment is building among some lawmakers to shorten the recess to make progress on the unfinished work that is piling up. On Friday, 10 GOP senators, led by David Perdue of Georgia, sent Majority Leader Mitch McConnell, R-Ky., a letter citing delays on health care, the budget, a stopgap spending bill and the debt limit as reasons to consider canceling some or all of the recess.

“If we successfully navigate those priorities, we can finally get to our once in a generation opportunity on tax reform,” the letter said. “Growing the economy, repairing our infrastructure, and rebuilding our military are all dependent on accomplishing the tasks before us.”

http://wtop.com/government/2017/06/summer-looms-with-gop-stuck-on-health-care-budget-taxes/

APRIL 13, 2016

High-income Americans pay most income taxes, but enough to be ‘fair’?

Corporations paying fewer taxes

Tax-deadline season isn’t many people’s favorite time of the year, but most Americans are OK with the amount of tax they pay. It’s what other people pay, or don’t pay, that bothers them.

Just over half (54%) of Americans surveyed in fall by Pew Research Center said they pay about the right amount in taxes considering what they get from the federal government, versus 40% who said they pay more than their fair share. But in a separate 2015 surveyby the Center, some six-in-ten Americans said they were bothered a lot by the feeling that “some wealthy people” and “some corporations” don’t pay their fair share.

It’s true that corporations are funding a smaller share of overall government operations than they used to. In fiscal 2015, the federal government collected $343.8 billion from corporate income taxes, or 10.6% of its total revenue. Back in the 1950s, corporate income tax generated between a quarter and a third of federal revenues (though payroll taxes have grown considerably over that period).

Nor have corporate tax receipts kept pace with the overall growth of the U.S. economy. Inflation-adjusted gross domestic product has risen 153% since 1980, while inflation-adjusted corporate tax receipts were 115% higher in fiscal 2015 than in fiscal 1980, according to the Bureau of Economic Analysis. There have been a lot of ups and downs over that period, as corporate tax receipts tend to rise during expansions and drop off in recessions. In fiscal 2007, for instance, corporate taxes hit $370.2 billion (in current dollars), only to plunge to $138.2 billion in 2009 as businesses felt the impact of the Great Recession.

Corporations also employ battalions of tax lawyers to find ways to reduce their tax bills, from running income through subsidiaries in low-tax foreign countries to moving overseas entirely, in what’s known as a corporate inversion (a practice the Treasury Department has moved to discourage).

But in Tax Land, the line between corporations and people can be fuzzy. While most major corporations (“C corporations” in tax lingo) pay according to the corporate tax laws, many other kinds of businesses – sole proprietorships, partnerships and closely held “S corporations” – fall under the individual income tax code, because their profits and losses are passed through to individuals. And by design, wealthier Americans pay most of the nation’s total individual income taxes.

Wealthy pay more in taxes than poorIn 2014, people with adjusted gross income, or AGI, above $250,000 paid just over half (51.6%) of all individual income taxes, though they accounted for only 2.7% of all returns filed, according to our analysis of preliminary IRS data. Their average tax rate (total taxes paid divided by cumulative AGI) was 25.7%. By contrast, people with incomes of less than $50,000 accounted for 62.3% of all individual returns filed, but they paid just 5.7% of total taxes. Their average tax rate was 4.3%.

The relative tax burdens borne by different income groups changes over time, due both to economic conditions and the constantly shifting provisions of tax law. For example, using more comprehensive IRS data covering tax years 2000 through 2011, we found that people who made between $100,000 and $200,000 paid 23.8% of the total tax liability in 2011, up from 18.8% in 2000. Filers in the $50,000-to-$75,000 group, on the other hand, paid 12% of the total liability in 2000 but only 9.1% in 2011. (The tax liability figures include a few taxes, such as self-employment tax and the “nanny tax,” that people typically pay along with their income taxes.)

All told, individual income taxes accounted for a little less than half (47.4%) of government revenue, a share that’s been roughly constant since World War II. The federal government collected $1.54 trillion from individual income taxes in fiscal 2015, making it the national government’s single-biggest revenue source. (Other sources of federal revenue include corporate income taxes, the payroll taxes that fund Social Security and Medicare, excise taxes such as those on gasoline and cigarettes, estate taxes, customs duties and payments from the Federal Reserve.) Until the 1940s, when the income tax was expanded to help fund the war effort, generally only the very wealthy paid it.

Since the 1970s, the segment of federal revenues that has grown the most is the payroll tax – those line items on your pay stub that go to pay for Social Security and Medicare. For most people, in fact, payroll taxes take a bigger bite out of their paycheck than federal income tax. Why? The 6.2% Social Security withholding tax only applies to wages up to $118,500. For example, a worker earning $40,000 will pay $2,480 (6.2%) in Social Security tax, but an executive earning $400,000 will pay $7,347 (6.2% of $118,500), for an effective rate of just 1.8%. By contrast, the 1.45% Medicare tax has no upper limit, and in fact high earners pay an extra 0.9%.

All but the top-earning 20% of American families pay more in payroll taxes than in federal income taxes, according to a Treasury Department analysis.

Still, that analysis confirms that, after all federal taxes are factored in, the U.S. tax system as a whole is progressive. The top 0.1% of families pay the equivalent of 39.2% and the bottom 20% have negative tax rates (that is, they get more money back from the government in the form of refundable tax credits than they pay in taxes).

Of course, people can and will differ on whether any of this constitutes a “fair” tax system. Depending on their politics and personal situations, some would argue for a more steeply progressive structure, others for a flatter one. Finding the right balance can be challenging to the point of impossibility: As Jean-Baptiste Colbert, Louis XIV’s finance minister, is said to have remarked: “The art of taxation consists in so plucking the goose as to obtain the largest possible amount of feathers with the smallest possible amount of hissing.”

Note: This is an update of an earlier post published March 24, 2015.

http://www.pewresearch.org/fact-tank/2016/04/13/high-income-americans-pay-most-income-taxes-but-enough-to-be-fair/

Summary of the Latest Federal Income Tax Data, 2016 Update

February 1, 2017

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 916-921

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 853, March 8, 2017, Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus, Republican Study Committee and American People All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos -_

Posted on March 8, 2017. Filed under: Addiction, American History, Animal, Benghazi, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald Trump, Elections, Fast and Furious, Government, Government Dependency, Government Spending, Hate Speech, Health, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Iran Nuclear Weapons Deal, Islam, Law, Legal Immigration, Life, Lying, Medicare, Obama, Philosophy, Photos, Politics, Polls, Progressives, Rand Paul, Raymond Thomas Pronk, Religion, Scandals, Science, Security, Senate, Social Science, Social Security, Socials Security, Spying, Taxation, Taxes, Terror, Terrorism, Unemployment, Videos, Violence, War, Wealth, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 

Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus,  Republican Study Committee and American People  All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — 

Image result for cartoons on repeal and repace obamacare

Image result for cartoon branco republican repeal and replace obamacare

Image result for vault 7 cia

Image result for cartoons on obamacare

Conservative Freedom Caucus Torpedoes GOP Obamacare Replacement

MAJOR: Paul Ryan Introduces American Health Care Act, House GOP’s Obamacare Replacement

SABOTAGE! WHAT PAUL RYAN JUST DID TO TRUMPCARE PROVES HE’S A TRAITOR TO THE PRESIDENT

Speaker Paul Ryan: There isn’t chaos in GOP-led Congress

SEAN HANNITY INTERVIEWS TOM PRICE ABOUT TRUMP’S NEW HEALTHCARE PLAN – 3/7/17

Trump’s HHS Secretary On Obamacare Replacement Bill

Ingraham takes issue with GOP’s health care replacement bill

Herman Cain on Obamacare replacement bill: Consumers now back in charge

Laffer: Obamacare replacement bill worth 2,000-3,000 points on the Dow

President Trump Holds Meeting On Obamacare Replacement with House Deputy Whip Team 3/7/17

GOP releases Obamacare replacement details

York: Fate of GOP health care bill lies with Freedom Caucus

Republicans unveil Obamacare replacement

Trump backs healthcare tax credit amid conservative opposition

Sen. Rand Paul unveils ObamaCare replacement plan

Conservatives lash out at House GOP’s Obamacare replacement bill

March 7 at 3:01 PM
Influential conservative lawmakers and activist groups panned health-care legislation drafted by House Republican leaders Tuesday, throwing the GOP’s plan to undo the Affordable Care Act in serious doubt less than 24 hours after it was released.Those groups dubbed the House bill, backed by House Speaker Paul D. Ryan (R-Wis.), as “Obamacare Lite,” “RyanCare” or “RINOcare” — a reference to “Republican in name only,” a popular conservative epithet for establishment politicians.The Ryan-backed bill offers a more conservative vision for the nation’s health-care system, replacing federal insurance subsidies with a new form of individual tax credits and phasing out most of the ACA’s taxes. But key lawmakers and outside groups, who can rile up the party’s base against legislative plans, said the legislation does not go far enough in pulling back elements of President Barack Obama’s overhaul.“The House Republican proposal released last night not only accepts the flawed progressive premises of Obamacare but expands upon them,” Michael Needham, the head of Heritage Action for America, said in a statement Tuesday. “Congressional Republicans should fully repeal the failed law and begin a genuine effort to deliver on longstanding campaign promises that create a free market health care system.”Two other groups, FreedomWorks and the Club for Growth, decried the plans Tuesday as a betrayal of campaign promises.

A day after House Republicans released a plan to supplant the Affordable Care Act, Sen. Rand Paul (R-Ky.) outlined the issues he has with their proposal, indicating it might be unconstitutional. (Alice Li, Jayne Orenstein/The Washington Post)

“If this warmed-over substitute for government-run health care remains unchanged, the Club for Growth will key vote against it,” said the group’s president, David McIntosh, referring to a process in which lawmakers are graded on their votes, the better to use them as ammunition on the campaign trail.

The dilemma Republican congressional leaders face is, if they change the legislation to appease hard-line conservatives, they are likely to alienate more-moderate members who are wary of disrupting insurance markets and taking coverage away from those who gained it under the ACA.

The margin for dissent is slim: Assuming no Democrats break ranks to support the bill, for the overhaul to pass, Republicans can lose only 21 votes in the House and two votes in the Senate.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

Four key Republicans in the Senate have expressed worries about the plan’s possible impact on lower-income people who received Medicaid coverage through the ACA’s expansion of that program. The four senators are split on exactly what proposals would meet their standards, but none are likely to support the course of action favored by many conservatives — passing a 2015 bill that repealed key ACA provisions without immediately including replacement provisions.

There were some signs of hope for the House plan Tuesday. President Trump offered an early boost to GOP leaders with a morning tweet: “Our wonderful new Healthcare Bill is now out for review and negotiation. ObamaCare is a complete and total disaster — is imploding fast!”

Vice President Pence attended a Senate Republican policy luncheon Tuesday and, in a break with normal practice, joined Senate Majority Leader Mitch McConnell and other GOP leaders at a news conference afterward to defend the House approach as “the framework for reform.”

“We are certainly open to improvements and recommendations in the legislative process, but this is the bill, and the president supports the American Health Care Act,” he said. “We are looking forward to working very directly with leadership in the House and the Senate in the weeks ahead. We are very confident that the American Health Care Act, with their help, will be on the president’s desk.”

In another sign of the administration’s support, Health and Human Services Secretary Tom Price sent a letter Tuesday to the chairmen of the two House committees processing the legislation, calling it a “necessary and important first step toward fulfilling our promises to the American people.”

But Price, who authored a similar ACA replacement proposal when he served in the House, said that achieving all of Trump’s health-care goals “will require more than what is possible” in the current legislation, which is limited in its scope to take advantage of special budget rules allowing for easier Senate passage.

He specifically mentioned allowing insurance to be sold across state lines, pharmaceutical cost reductions and “medical legal reforms,” an apparent reference to long-standing GOP proposals to limit malpractice liability.

Senate Majority Leader Mitch McConnell (R-Ky.) offered measured support for the proposed legislation and said he would bring it to the Senate floor should it pass the House.

“I encourage every member to review [the legislation] because I hope to call it up when we receive it from the House,” McConnell said Tuesday on the Senate floor. “We’ve come a long way. We’ve got a lot further to go, but we’re making significant progress. Working arm in arm with the House and the new administration, we’re going to keep our promise to the American people.”

While some of the fiercest criticism came from hard-right activist groups that have dogged Republican congressional leaders for years, other more establishment-minded organs joined the chorus of dissent.

National Review published an editorial Tuesday that said the legislation was “a disappointment” and has “serious flaws even as a first step toward full repeal and replacement.”

Republicans, the influential conservative magazine said, “would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster,than trying and failing to enact a bill that they support only tepidly.”

Leaders involved in drafting the bills sought to defend their plan against the onslaught of criticism, describing it as the product of months of internal discussions and saying its details could still change.

“We now have a bill that’s available for all to read,” said Rep. Greg Walden (R-Ore.), chairman of the House Energy and Commerce Committee, which helped craft one of them, at a news conference Tuesday. “I’d encourage them to do it. I’d encourage them to look against their own bills and what they’ve supported in the past. And then let’s have a thoughtful legislative discussion.”

Rep. Kevin Brady (R-Tex.), chairman of the House Ways and Means Committee, which produced the other bill, said: “As Republicans, we have a choice. We can act now, or we can keep fiddling around and squander this opportunity to repeal Obamacare and begin a new chapter of freedom for the American people. House Republicans are choosing to act now.”

Still, agitation among conservatives was evident Monday night and poured into Tuesday.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

“Keep the ‘Cadillac’ tax in place? Keep Medicaid in place until 2020?” said Rep. Jim Jordan (R-Ohio), a co-founder of the House Freedom Caucus, referring to high-priced health-care plans. “We didn’t have Medicaid expansion in the bill we sent to President Obama, but we have it in the one we send to President Trump? That makes no sense to me.”

“Obamacare 2.0,” tweeted Rep. Justin Amash (R-Mich.), a libertarian who frequently breaks with GOP leadership.

Under two bills drafted by separate House committees, the government would no longer penalize Americans for failing to have health insurance but would try to encourage people to maintain coverage by allowing insurers to impose a 30 percent surcharge for those who do not have continuous coverage.

The legislation would preserve two of the most popular features of the 2010 health-care law, letting young adults stay on their parents’ health plans until age 26 and forbidding insurers to deny coverage or charge more to people with preexisting medical problems. It would also target Planned Parenthood, rendering the women’s health organization ineligible for Medicaid reimbursements or federal family -planning grants — a key priority for antiabortion groups.

Taken together, the bills introduced Monday represent the Republicans’ first attempt — and best shot to date, with an ally in the White House — to translate into action seven years of talking points about demolishing the ACA.

At the same time, major aspects of the House GOP plan reflect the treacherous terrain that Republicans face to win enough votes within their own conferences in the GOP-controlled House and Senate.

The bills must address concerns of both conservatives worried about the plan’s cost and the notion it might enshrine a new federal entitlement, as well as more moderate members who want to ensure that their constituents, including those who received coverage under the ACA’s Medicaid expansion, retain access to affordable health care.

The Freedom Caucus, a block of roughly 30 House hard-liners who criticized earlier versions of the bill, is set to meet Tuesday night to discuss the health-care bill and perhaps develop a list of demands to present to GOP leaders.

Members of the Republican Study Committee, a larger conservative group, were already critical of key elements of the plan. “This is a Republican welfare entitlement,” reads an RSC analysis distributed late Monday, addressing the inclusion of refundable tax credits in the plan.

With no Democrats expected to vote to pass the bill and four House GOP seats vacant, Republicans can afford to lose no more than 21 members in the lower chamber.

In recognition of the close vote that is expected, House Majority Whip Steve Scalise (R-La.) and several deputy whips are expected to visit the White House Tuesday afternoon to discuss the health-care bill with Trump administration officials.

On Tuesday morning, Trump signaled the work on the proposal was not completely finished, referring to selling insurance across state lines and saying that change would come in “phase 2 & 3 of healthcare rollout.” The president also said he was “working on new system where there will be competition in the Drug Industry” that will lead prices to “come way down.”

Conservative critics of the measure had noted the plan’s exclusion of selling insurance across state lines. “The problems with this bill are not just what’s in it, but also what’s missing,” said McIntosh.

Yet attacks from the right were not the only challenge facing Republican leaders.

Four key Republican senators, all from states that opted to expand Medicaid under the ACA, said they would oppose any new plan that would leave millions of Americans uninsured.

“We will not support a plan that does not include stability for Medicaid expansion populations or flexibility for states,” Sens. Rob Portman (Ohio), Shelley Moore Capito (W.Va.), Cory Gardner (Colo.) and Lisa Murkowski (Alaska) wrote in a letter to McConnell on Monday.

The plan from House Republicans would substantially redesign Medicaid with the goal of balancing the GOP’s antipathy toward the ACA’s expansion of the program against the concerns of a significant cadre of Republican governors — and the lawmakers from their states — who fear losing millions of dollars that the law has funneled to help insure low-income residents.

Democrats, meanwhile, have given no indication that they intend to work with Republicans, and top party leaders decried the GOP plan Monday as a betrayal of everyday Americans. “Trumpcare doesn’t replace the Affordable Care Act, it forces millions of Americans to pay more for less care,” said Senate Minority Leader Charles E. Schumer (D-N.Y.).

In particular, the plan to target Planned Parenthood has already generated fierce pushback from Democrats and doubts from some Republicans who have noted that federal funds are already barred from funding abortions and that Planned Parenthood provides routine medical care to millions of American women.

https://www.washingtonpost.com/powerpost/house-leaders-brace-for-the-task-ahead-selling-obamacare-lite/2017/03/07/ab2f721e-02e5-11e7-ad5b-d22680e18d10_story.html?utm_term=.b64bbc38491c

A Disappointing Start

by THE EDITORS March 7, 2017 12:45 PM We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to

We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to buy, and that their options should include low-premium coverage that protects them against the risk of major financial setbacks resulting from health care. The legislation released last night by House Republicans is, even on the most charitable reading, only a first step toward that goal.

It does not repeal all of Obamacare, leaving many of its regulations in place. The apparent rationale for this omission is that eliminating the regulations would subject the legislation to a fatal Senate filibuster. We have recommended that Republicans defang the regulations by replacing Obamacare’s subsidies with a simple new tax credit that people could use to buy insurance governed by a new, lighter regulatory regime. That way Obamacare’s regulations would stay on the books but no longer hinder consumer choice. But Republicans shrank from this option, too.

We disagree with this tactical decision, which places Senate parliamentary rules — or, rather, places guesses about how those rules would operate — ahead of good health policy and making good on longstanding party promises. It also seems to us that Republicans would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster, than trying and failing to enact a bill that they support only tepidly. That second outcome may now take place.

Moreover, the legislation has some serious flaws even as a first step toward full repeal and replacement. It eliminates Obamacare’s fines on people who go without insurance, but in their place creates a new surcharge for people who let their insurance lapse and then try to purchase a new policy. The goal is to keep healthy people from leaving the insurance rolls and thus destabilizing insurance markets.

The surcharge is a heavy-handed instrument: Insurers would be obligated to impose it regardless of their preferences. Yet the surcharge might not achieve its goal. A lot of healthy people might well decide to go without insurance and run the risk of paying a surcharge if they get sick later. The surcharge even undermines its own goal, since it would discourage healthy people who had already left the insurance rolls from getting back on them.

The bill has its good points. If the surcharge works, the deregulation in the bill would lower premiums. Many of Obamacare’s taxes would be repealed. Obamacare’s tax credits create high effective marginal tax rates for people in the lower middle class; the bill’s replacement tax credits would avoid this problem. Permissible contributions to and limits on health savings accounts would be loosened. Federal contributions to Medicaid would be capped, ending the perverse incentives that have for decades enabled the growth of the program. All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

 http://www.nationalreview.com/article/445558/obamacare-replacement-republican-plan-house-representatives-disappointing

Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos — 

Image result for vault 7 cia

Image result for vault 7 cia

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotes

Ari Fleischer on CIA leaks, wiretapping claims

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Wikileaks dumps information claiming proof of CIA hacking

What Pisses Me Off About Wikileaks Vault 7 Release

‘Cyber warfare is a new frontline’: CIA created malware designed to penetrate software – WikiLeaks

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

Wikileaks Vault 7: A Massive and Confusing Revelation

WikiLeaks UNLEASHES ‘Year Zero’ CIA Hacking Tools (Vault 7)

WIKILEAKS VAULT 7: The C.I.A. Is Listening Via Everything

Inside Vault 7: CIA Hacking Tools Published by Wikileaks

George Orwell 1984 Telescreen Exercise

Nineteen Eighty-Four (1984) – Last Scene

ANIMAL FARM – full movie

1984 George Orwell – Full Movie – Hollywood best Greatest blockbuster movie Film

Watch Nineteen Eighty Four Watch Movies Online Free

George Orwell: A Life in Pictures Full Documentary (High Quality)

A Final Warning from George Orwell

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Tyler Durden's picture

TwitterFacebookReddit

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights from the Vault 7 release so far:

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Snowden 2.0?

  • In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

CIA targets iPhones, Androids, smart TVs:

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain. Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.
  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.
  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

And some key sections from the FAQ:

  • What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
  • What is “Vault 7” “Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.
  • What is the total size of “Vault 7”? The series is the largest intelligence publication in history.
  • When was each part of “Vault 7” obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
  • Is each part of “Vault 7” from a different source? Details on the other parts will be available at the time of publication.
  • How did WikiLeaks obtain each part of “Vault 7”? Sources trust WikiLeaks to not reveal information that might help identify them.
  • Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.

* * *

PREVIOUSLY

As a reminder, last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

Wikileaks had previously announced that it would hold an 8am Eastern press conference, as part of the unveiling.

ANNOUNCE: WikiLeaks press conference in under five hours at 8am ET / 1pm UTC / 14:00 CET. Streamed live.

However, there appeared to have been some complications, with Wikileaks tweeting that “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans”

Press conf under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency (1/2)

Wikileaks then announced that “As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.”

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

In a separate tweet, Wikileaks has just released the passphrase to decrypt the torrent file: RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

As a result, since Assange appears to have been unable to launch his previously scheduled press conference, he has gone ahead and issued the press release on Vault 7 Part 1 “Year Zero, which is titled: Inside the CIA’s global hacking force:

Press Release

Vault 7: CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

* * *

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

WikiLeaks Posts Thousands of Purported CIA Cyberhacking Documents

Records show CIA able to spy on smartphones, internet TVs

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.PHOTO: LARRY DOWNING/REUTERS

WASHINGTON—WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.

The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.

WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.

A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

WikiLeaks said in its statement that it was not publishing such information as computer source code that could be used to replicate the tools it claims to have exposed. But the group left open the possibility of publishing those crucial details if “a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should [sic] analyzed, disarmed and published.”

Mr. Snowden said in a tweet Tuesday, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

WikiLeaks said the CIA recently “lost control” of the majority of its hacking arsenal. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The website put out what it called the first installment in a series of planned leaks on Tuesday, calling it “Year Zero.” It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Much of what WikiLeaks posted Tuesday appeared to be a kind of internal Wikipedia for U.S. cyber-warfare developers to collaborate, post and access information about available hacking tools. In many instances, WikiLeaks has redacted entries that appear to link to specific executable files. The documents show, for example, what capabilities exist to bypass antivirus software, with a different entry for each antivirus company.

The revelations are sure to fuel an ongoing debate over whether intelligence agencies that discover security flaws in popular technology should disclose them, so that the users can defend themselves from hackers, or keep that information secret for use in intelligence operations.

One document claims that the CIA has discovered numerous ways to hack into versions of Apple’s iOS, the mobile operating system used on iPhones. In general, hacking tools for the iPhone are considered especially valuable because the technology is so widely used, experts said. One particular hacking tool appears to remain on an iPhone even after it has been rebooted, which would make it particularly valuable to an intruder.

“These documents, which appear to be authentic, show that the intelligence community has deliberately maintained vulnerabilities in the most common devices used by hundreds of millions of people,” Ben Wizner, the director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union, said in a statement.

“Those vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world. The government has the capacity and obligation to help technology companies fix vulnerabilities as soon as they are discovered,” Mr. Wizner said.

This is the latest high-profile leak of information by WikiLeaks, which last fall published emails stolen from Mrs. Clinton’s campaign chairman, John Podesta. U.S. intelligence agencies concluded that Russian government hackers stole those emails and provided them to WikiLeaks.

WikiLeaks said the documents show the CIA’s ability to bypass the encryption of popular messenger applications, including WhatsApp, Signal, Telegram and Confide by hacking the smartphones they run on and collecting audio and message traffic before the applications encrypt the user’s texts.

The site said the documents also show how the CIA developed other mobile hacking technologies, including the ability to activate the camera and microphone of a target’s smartphone covertly and surreptitiously retrieve a target’s geolocation, audio and text communications.

WikiLeaks said one of the documents also shows how the CIA developed a program to hack internet-connected televisions in conjunction with British intelligence. The attacks can place Samsung smart TVs in a fake off mode, so the owner believes the television is switched off, while in reality it is functioning as a bug and recording conversations in the room, WikiLeaks said.

https://www.wsj.com/articles/wikileaks-posts-thousands-of-purported-cia-cyberhacking-documents-1488905823

WikiLeaks publishes massive trove of CIA spying files in ‘Vault 7’ release

Julian Assange claims that documents are the most comprehensive CIA release ever and are far larger than the Snowden files

The Independent Tech

WikiLeaks has published a huge trove of what appear to be CIA spying secrets.

The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for “the entire hacking capacity of the CIA”, Mr Assange claimed in a release, and the trove is just the first of a series of “Vault 7” leaks.

Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.

 In publishing the documents, WikiLeaks had ensured that the CIA had “lost control of its arsenal”, he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.

It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” the organisation said in a release.

The public files don’t include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing “armed” software “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published”, it said.

The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organisation.

“In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” a release read. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

It also redacts the details of some of the names, locations and targets that are identified in the documents.

The organisation had teased the release in advance with strange messages about the release being “Year Zero”, and references to “Vault 7”. It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.

http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html

WikiLeaks releases ‘entire hacking capacity of the CIA’

Gutfeld: ‘Day Without a Woman’ strike sends wrong message

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks. The CIA allegedly employs more than 5,000 people in its cyber spying operation and had produced more than 1,000 programs as of 2016.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence documents includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

WikiLeaks confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://wikileaks.org/ciav7p1 

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

CIA hackers celebrated what they saw as the financial largesse of Obama towards them with “Make It Rain” gifhttps://wikileaks.org/ciav7p1/cms/files/makeitrain.gif 

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

Digital rights non-profit Access Now said in a statement on Tuesday it was “fantasy to believe only the ‘good guys'” would be able to use the discovered vulnerabilities.

“Today, our digital security has been compromised because the CIA has been stockpiling vulnerabilities rather than working with companies to patch them,” Senior Legislative Manager Nathan White said.

The CIA allegedly also maintains a database of malware created in other nations — WikiLeaks specifically cites Russia — in order to disguise its own hacking attempts as the work of another group.

In what is described by WikiLeaks as “one of the most astounding intelligence own goals in living memory,” the CIA is said to have made most of its programs unclassified to avoid legal consequences for transmitting classified information through the Internet — a move that increased the risk of outside groups pirating the cyber spying tools.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem. https://twitter.com/wikileaks/status/839120909625606152 

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

One such former leaker, Edward Snowden, tweeted Tuesday afternoon about the WikiLeaks release.

“Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic,” wrote Snowden, who has been granted asylum in Russia as he seeks to avoid criminal prosecution in the U.S.

Some of the WikiLeaks files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html

Vault 7: CIA Hacking Tools Revealed

  • Releases
  • Documents

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includesnumerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-853

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 689, May 31, 2016, Story 1: Human Life First, Animal Life Second — Save The Human, Save The Human and Gorilla, Save The Gorilla, Let God Decide — Black Genocide. Story 2: Trump Attacks Media That Support Clinton — Big Lie Media — Sleeze Bags — Videos

Posted on May 31, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, Animal, Banking System, Blogroll, Breaking News, Budgetary Policy, Business, Congress, Countries, Donald J. Trump, Donald Trump, Economics, Education, Elections, Employment, Fiscal Policy, House of Representatives, Human, Labor Economics, Life, Monetary Policy, News, Obama, Philosophy, Photos, Plant, Politics, Progressives, Senate, Tax Policy, Taxation, Taxes, Terror, Terrorism, Trade Policy, Unemployment, United States of America, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 689: May 31, 2016

Pronk Pops Show 688: May 27, 2016

Pronk Pops Show 687: May 26, 2016

Pronk Pops Show 686: May 25, 2016

Pronk Pops Show 685: May 24, 2016

Pronk Pops Show 684: May 23, 2016

Pronk Pops Show 683: May 20, 2016

Pronk Pops Show 682: May 19, 2016

Pronk Pops Show 681: May 17, 2016

Pronk Pops Show 680: May 16, 2016

Pronk Pops Show 679: May 13, 2016

Pronk Pops Show 678: May 12, 2016

Pronk Pops Show 677: May 11, 2016

Pronk Pops Show 676: May 10, 2016

Pronk Pops Show 675: May 9, 2016

Pronk Pops Show 674: May 6, 2016

Pronk Pops Show 673: May 5, 2016

Pronk Pops Show 672: May 4, 2016

Pronk Pops Show 671: May 3, 2016

Pronk Pops Show 670: May 2, 2016

Pronk Pops Show 669: April 29, 2016

Pronk Pops Show 668: April 28, 2016

Pronk Pops Show 667: April 27, 2016

Pronk Pops Show 666: April 26, 2016

Pronk Pops Show 665: April 25, 2016

Pronk Pops Show 664: April 24, 2016

Pronk Pops Show 663: April 21, 2016

Pronk Pops Show 662: April 20, 2016

Pronk Pops Show 661: April 19, 2016

Pronk Pops Show 660: April 18, 2016

Pronk Pops Show 659: April 15, 2016

Pronk Pops Show 658: April 14, 2016

Pronk Pops Show 657: April 13, 2016

Pronk Pops Show 656: April 12, 2016

Pronk Pops Show 655: April 11, 2016

Pronk Pops Show 654: April 8, 2016

Pronk Pops Show 653: April 7, 2016

Pronk Pops Show 652: April 6, 2016

Pronk Pops Show 651: April 4, 2016

Pronk Pops Show 650: April 1, 2016

Pronk Pops Show 649: March 31, 2016

Pronk Pops Show 648: March 30, 2016

Pronk Pops Show 647: March 29, 2016

Pronk Pops Show 646: March 28, 2016

Pronk Pops Show 645: March 24, 2016

Pronk Pops Show 644: March 23, 2016

Pronk Pops Show 643: March 22, 2016

Pronk Pops Show 642: March 21, 2016

Pronk Pops Show 641: March 11, 2016

Pronk Pops Show 640: March 10, 2016

Pronk Pops Show 639: March 9, 2016

Pronk Pops Show 638: March 8, 2016

Pronk Pops Show 637: March 7, 2016

Pronk Pops Show 636: March 4, 2016

Pronk Pops Show 635: March 3, 2016

Pronk Pops Show 634: March 2, 2016

Pronk Pops Show 633: March 1, 2016

Pronk Pops Show 632: February 29, 2016

Pronk Pops Show 631: February 25, 2016

Pronk Pops Show 630: February 24, 2016

Pronk Pops Show 629: February 22, 2016

Pronk Pops Show 628: February 19, 2016

Pronk Pops Show 627: February 18, 2016

Pronk Pops Show 626: February 17, 2016

Pronk Pops Show 625: February 16, 2016

Pronk Pops Show 624: February 15, 2016

Pronk Pops Show 623: February 12, 2016

Pronk Pops Show 622: February 11, 2016

Pronk Pops Show 621: February 10, 2016

Pronk Pops Show 620: February 9, 2016

Pronk Pops Show 619: February 8, 2016

Pronk Pops Show 618: February 5, 2016

Pronk Pops Show 617: February 4, 2016

Pronk Pops Show 616: February 3, 2016

Pronk Pops Show 615: February 1, 2016

Story 1: Human Life First, Animal Life Second — Save The Human, Save The Human and Gorilla, Save The Gorilla, Let God Decide — Black Genocide.  Story 2: Trump Attacks Media That Support Clinton — Big Lie Media — Sleeze Bags — Videos

Story 1

harambecincinnatizooMAIN-gorilla-world-map-Cincinnati-Zoo

Zoo-Gorilla-ChildHT_gorilla_zoo_as

VID-Harambe-a-male-silverback-gorillaVID-Harambe-a-male-silverback-gorilla-at-Cincinnati-Zoo (1)

VID-Harambe-a-male-silverback-gorilla-at-Cincinnati-Zoo

people protestrest in peacerememberin loving memoryflowerschild and statue636001363053931578-APTOPIX-Zoo-Gorilla-Child-Hurtmohter10_Int_350_abortion_facts-4abortion-is-americas-silent-holocaust-pro-life-choice-roe-v-wadeabortion and blacksblackblacklivesmatterDREAM-IS-DEAD-BlackHistoryMonthMost-dangerous-place-for-a-black-baby-is-in-the-wombNUMBER-ONE-KILLER-2013-FBabortions-in-americaslavery vs abortionhowcandreamsurvive

Child falls into gorilla pit at Cincinnati Zoo: timeline leading to Harambe’s death – Tomo News

Four Year Old Boy Falls Into Gorilla Pit At The Cincinnati Zoo!! (Part 1)

Gorilla drags child through enclosure in Cincinnati

4 Year Old Boy FALLS Into Enclosure At Cincinnati Zoo Gorilla Shot and Killed (VIDEO)

MAAFA 21 [A documentary on eugenics and genocide]

Black Genocide: The Democrats Institutionalized Racism

Dr King Speaks Out On The Genocide Of Black America

Story 2

Donald Trump attacks the press

Trump, Clinton getting fair and balanced media coverage?

“I’m Going To Continue To Attack The Press!” Donald Trump Press Conference On Donations To Veterans

Full Interview Donald Trump Targets Democratic States, Trump Promises Fox News 2016 Part 2

Wall Street Journal Bret Stephens – Trump Must Lose So Badly That GOP Voters Learn Their Lesson

Limbaugh: Bret Stephens of WSJ really hates Trump, really loves open borders

At Least $1.9 Million In Donations Trump Collected For Vets Was Sent Last Week

Donald Trump reads a list of donations he says were made to veterans groups following a fundraiser he held in Iowa back in January.

Donald Trump reads a list of donations he says were made to veterans groups following a fundraiser he held in Iowa back in January.

Richard Drew/AP

This post was updated at 5:30 p.m. EDT.

At least $1.9 million of the donations to veterans groups that presumptive Republican presidential nominee Donald Trump reported on Tuesday came in last week, after Trump began responding to intense media scrutiny of his earlier claims about raising in excess of $6 million for veterans. Trump said on Tuesday that his efforts raised a total of $5.6 million.

NPR reached out to all 41 of the groups Trump listed as receiving donations. Of those, 31 responded. One group, the Navy SEAL Foundation, said it does not disclose details of its donations. The other 30 confirmed the amounts Trump reported Tuesday, accounting for $4.27 million of the $5.6 million total.

The donations came in from a combination of sources, including the Donald J. Trump Foundation, various groups and individuals who cited Trump’s efforts along with their donations, and Trump himself.

The candidate gave a $1 million check to the Marine Corps-Law Enforcement Foundation on May 24, as questions from the Washington Post and other news outlets about Trump’s prior claims regarding these donations accelerated.

Prior to Tuesday, only about $4 million of the fund had been accounted for as paid to veterans charities and service organizations through reporting by various news organizations, chiefly the Post.

Trump engaged in a social media battle over the issue with that publication, saying he is being attacked for trying do to something for veterans, always adding that raising millions of dollars was something he didn’t have to do. “I have never received such bad publicity for doing such a good job,” Trump complained.

Tuesday, in his most combative news conference yet, in a campaign where he has set a new standard for a contentious relationship with the news media, Trump finally addressed the matter before reporters.

Speaking at his namesake Trump Tower in New York City, he continued to attack journalists for even asking questions about where the money went.

Trump grudgingly released the list of organizations that he says got the money. He predicted the $5.6 million total that he cited will continue to grow, to eventually top the $6 million figure he claimed back at the event where he first solicited donations to veterans, in Des Moines, Iowa, on Jan. 28.

A list of veterans groups Donald Trump says received donations due to his fundraising efforts.

A list of veterans groups Donald Trump says received donations due to his fundraising efforts.

Donald J. Trump For President Inc.

Here’s the full list.

But Trump continued to attack the press for asking for accountability about the money.

He called reporters “extremely dishonest,” “sleazy,” “biased,” “nasty,” “not good people” and more.

He added, “The press should be ashamed of themselves. On behalf of the vets they should be ashamed of themselves.”

Trump also asserted that all of the money had gone to the groups, and that “zero dollars” went to administrative costs.

Finally, he offered reasons for the delay in releasing the list of recipients. Trump said organizations needed to be vetted to ensure their legitimacy and their nonprofit status. “We needed to vet the vets.” Plus, he insisted that he wanted to do all of this privately, that he “didn’t want credit.” One reporter asked, if Trump didn’t want credit, then why repeatedly remind people at events and on television that he’d raised $6 million for veterans? Isn’t that “taking credit” the reporter added? Trump responded, “It’s not.”

One shouted question was, “Don’t you believe you should be accountable?” Trump responded, “I’m totally accountable. But I didn’t want credit for it.”

At another point Trump said simply, “I don’t think it’s anybody’s business if I want to send money to the vets.”

He was asked why he resents the mere act of verifying the contributions. Trump said, “Because I wanted to make this out of the goodness of my heart. I didn’t want to do this where the press was involved.”

And, from a Fox News journalist, “Is asking a question an attack?”

Trump shot back, “From the political press it is, I see the stories they write.”

It went on like this for 40 minutes. Reporters probing and pushing for information. Trump making no attempt to hide his contempt for them. One questioner wondered if this is what it would be like when a President Trump meets with the White House Press Corps.

The candidate shot back, “Yes, it is.”

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 685-689

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or DownloadShows 599-607

Listen To Pronk Pops Podcast or DownloadShows 590-598

Listen To Pronk Pops Podcast or DownloadShows 585- 589

Listen To Pronk Pops Podcast or DownloadShows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...