Illegal Immigration

The Pronk Pops Show 881, April 26, 2017, Story 1: District Court Judge in 9th Circuit Commits Judicial Fraud Makes Up A Violation of Law — Trump Executive Order Requires Existing Federal Laws Passed By Congress Be Enforced — Videos — Story 2: Senator Ted Cruz Great Idea For Paying For The Wall — Videos — Story 3: Trump’s Latest Tax Proposal — Good But Not Great — Missed Opportunity To Transition From An Income Tax Based System To A Broad Based Consumption Tax — FairTax or Fair Tax Less — Forget The Republican Establishment Border Adjustment Tax — Videos

Posted on April 26, 2017. Filed under: American History, Banking System, Blogroll, Breaking News, Budgetary Policy, Business, College, Communications, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald Trump, Economics, Education, Elections, Foreign Policy, Free Trade, Government, Health Care Insurance, History, House of Representatives, Illegal Immigration, Illegal Immigration, Immigration, Law, Legal Immigration, Mexico, News, North Korea, Philosophy, Photos, Politics, Polls, President Trump, Radio, Raymond Thomas Pronk, Regulation, Rule of Law, Senate, Social Networking, Tax Policy, Taxation, Taxes, Ted Cruz, United States of America, United States Supreme Court, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 881: April 26, 2017 to be posted as soon as possible

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Image result for list of santuary citiesImage result for branco cartoons trump paying for the wallImage result for branco cartoons trump tax reform blueprint april 26, 2017

 

 

 

Story 1: District Court Judge in 9th Circuit Commits Judicial Fraud Makes Up A Violation of Law — Trump Executive Order Requires Existing Federal Laws Passed By Congress Be Enforced — Videos — 

Image result for list of santuary cities

Image result for Mexico Southern Border FenceImage result for list of santuary cities

Federal judge rules Trump cannot punish sanctuary cities by withholding funds

Sanctuary Cities, Fed Money, and 9th Circuit Judge Block!

CA Fed Judge: Pres Trump Can’t Punish Sanctuary Cities By Withholding Funds – Tucker Carlson

San Francisco sues over Trump’s executive order targeting sanctuary cities

Judge Blocks Attempts To Withhold Funding For Sanctuary Cities

9th Circuit Court “Going Bananas”

A Ruling About Nothing

by ANDREW C. MCCARTHY April 26, 2017 1:45 PM

A federal judge suspends Trump’s unenforced ban on funding for sanctuary cities.

A federal judge suspends Trump’s unenforced ban on funding for sanctuary cities. A showboating federal judge in San Francisco has issued an injunction against President Trump’s executive order cutting off federal funds from so-called sanctuary cities. The ruling distorts the E.O. beyond recognition, accusing the president of usurping legislative authority despite the order’s express adherence to “existing law.” Moreover, undeterred by the inconvenience that the order has not been enforced, the activist court — better to say, the fantasist court — dreams up harms that might befall San Francisco and Santa Clara, the sanctuary jurisdictions behind the suit, if it were enforced. The court thus flouts the standing doctrine, which limits judicial authority to actual controversies involving concrete, non-speculative harms.

Although he vents for 49 pages, Judge William H. Orrick III gives away the game early, on page 4. There, the Obama appointee explains that his ruling is about . . . nothing. That is, Orrick acknowledges that he is adopting the construction of the E.O. urged by the Trump Justice Department, which maintains that the order does nothing more than call for the enforcement of already existing law. Although that construction is completely consistent with the E.O. as written, Judge Orrick implausibly describes it as “implausible.”

That is, Orrick acknowledges that he is adopting the construction of the E.O. urged by the Trump Justice Department, which maintains that the order does nothing more than call for the enforcement of already existing law. Although that construction is completely consistent with the E.O. as written, Judge Orrick implausibly describes it as “implausible.”

Since Orrick ultimately agrees with the Trump Justice Department, and since no enforcement action has been taken based on the E.O., why not just dismiss the case? Why the judicial theatrics?

There appear to be two reasons.

The first is Orrick’s patent desire to embarrass the White House, which rolled out the E.O. with great fanfare. The court wants it understood that Trump is a pretender: For all the hullaballoo, the E.O. effectively did nothing. Indeed, Orrick rationalizes his repeated misreadings of what the order actually says by feigning disbelief that what it says could possibly be what it means. Were that the case, he suggests, there would have been no reason to issue the order in the first place.

Thus, taking a page from the activist left-wing judges who invalidated Trump’s “travel ban” orders, Orrick harps on stump speeches by Trump and other administration officials. One wonders how well Barack “If you like your plan, you can keep your plan” Obama would have fared under the judiciary’s new Trump Doctrine: The extravagant political rhetoric by which the incumbent president customarily sells his policies relieves a court of the obligation to grapple with the inevitably more modest legal text of the directives that follow.

Of course, the peer branches of government are supposed to presume each other’s good faith in the absence of a patent violation of the law. But let’s put aside the unseemliness of Orrick’s barely concealed contempt for a moment, because he is also wrong. The proper purpose of an executive order is to direct the operations of the executive branch within the proper bounds of the law. There is, therefore, nothing untoward about an E.O. that directs the president’s subordinates to take enforcement action within the confines of congressional statutes.

In fact, it is welcome.

It is the president’s burden to set federal law-enforcement priorities. After years of Obama’s lax enforcement of immigration law and apathy regarding sanctuary jurisdictions, an E.O. openly manifesting an intent to execute the laws vigorously can have a salutary effect. And indeed, indications are that the cumulative effect of Trump’s more zealous approach to enforcement, of which the sanctuary-city E.O. is just one component, has been a significant reduction in the number of aliens seeking to enter the U.S. illegally.

In any event, eight years of Obama’s phone and pen have made it easy to forget that the president is not supposed to make law, and thus that we should celebrate, not condemn, an E.O. that does not break new legal ground. Orrick, by contrast, proceeds from the flawed premise that if a president is issuing an E.O., it simply must be his purpose to usurp congressional authority. Then he censures Trump for a purported usurpation that is nothing more than a figment of his own very active imagination.

Orrick’s second reason for issuing his Ruling About Nothing is to rationalize what is essentially an advisory opinion. It holds — I know you’ll be shocked to hear this — that if Trump ever did try to cut off funds from sanctuary cities, it would be an epic violation of the Constitution. Given that courts are supposed to refrain from issuing advisory opinions, the Constitution is actually more aggrieved by Orrick than by Trump. * * *

In a nutshell, the court claims that the E.O. is presidential legislation, an unconstitutional violation of the separation of powers. Orrick insists that the E.O. directs the attorney general and the secretary of homeland security to cut off any federal funds that would otherwise go to states and municipalities if they “willfully refuse to comply” with a federal law (Section 1373 of Title 8) that calls for state and local cooperation in enforcing immigration law.

According to Judge Orrick, Trump’s E.O. is heedless of whether Congress has approved any terminations of state funding from federal programs it has enacted. In one of the opinion’s most disingenuous passages, Orrick asserts that the E.O. “directs the Attorney General and the [Homeland Security] Secretary to ensure that ‘sanctuary jurisdictions’ are ‘not eligible to receive’ federal grants.” (Emphasis in original.)

But this is just not true; Orrick has omitted key context from the relevant passage, which actually states that “the Attorney General and the Secretary, in their discretion and to the extent consistent with law, shall ensure that jurisdictions that willfully refuse to comply with 8 U.S.C. 1373 (sanctuary jurisdictions) are not eligible to receive Federal grants.” (Emphasis added.) In plain English, the president has expressly restricted his subordinates to the limits that Congress has enacted. Under Trump’s order, there can be no suspension or denial of funding from a federal program unless congressional statutes authorize it. The president is not engaged in an Obama-

Of course, the peer branches of government are supposed to presume each other’s good faith in the absence of a patent violation of the law. But let’s put aside the unseemliness of Orrick’s barely concealed contempt for a moment, because he is also wrong. The proper purpose of an executive order is to direct the operations of the executive branch within the proper bounds of the law. There is, therefore, nothing untoward about an E.O. that directs the president’s subordinates to take enforcement action within the confines of congressional statutes. In fact, it is welcome.

It is the president’s burden to set federal law-enforcement priorities. After years of Obama’s lax enforcement of immigration law and apathy regarding sanctuary jurisdictions, an E.O. openly manifesting an intent to execute the laws vigorously can have a salutary effect. And indeed, indications are that the cumulative effect of Trump’s more zealous approach to enforcement, of which the sanctuary-city E.O. is just one component, has been a significant reduction in the number of aliens seeking to enter the U.S. illegally. In any event, eight years of Obama’s phone and pen have made it easy to forget that the president is not supposed to make law, and thus that we should celebrate, not condemn, an E.O. that does not break new legal ground. Orrick, by contrast, proceeds from the flawed premise that if a president is issuing an E.O., it simply must be his purpose to usurp congressional authority. Then he censures Trump for a purported usurpation that is nothing more than a figment of his own very active imagination.

Orrick’s second reason for issuing his Ruling About Nothing is to rationalize what is essentially an advisory opinion. It holds — I know you’ll be shocked to hear this — that if Trump ever did try to cut off funds from sanctuary cities, it would be an epic violation of the Constitution. Given that courts are supposed to refrain from issuing advisory opinions, the Constitution is actually more aggrieved by Orrick than by Trump. * * *

In a nutshell, the court claims that the E.O. is presidential legislation, an unconstitutional violation of the separation of powers. Orrick insists that the E.O. directs the attorney general and the secretary of homeland security to cut off any federal funds that would otherwise go to states and municipalities if they “willfully refuse to comply” with a federal law (Section 1373 of Title 8) that calls for state and local cooperation in enforcing immigration law. According to Judge Orrick, Trump’s E.O. is heedless of whether Congress has approved any terminations of state funding from federal programs it has enacted. In one of the opinion’s most disingenuous passages, Orrick asserts that the E.O. “directs the Attorney General and the [Homeland Security] Secretary to ensure that ‘sanctuary jurisdictions’ are ‘not eligible to receive’ federal grants.” (Emphasis in original.)

But this is just not true; Orrick has omitted key context from the relevant passage, which actually states that “the Attorney General and the Secretary, in their discretion and to the extent consistent with law, shall ensure that jurisdictions that willfully refuse to comply with 8 U.S.C. 1373 (sanctuary jurisdictions) are not eligible to receive Federal grants.” (Emphasis added.)

In plain English, the president has expressly restricted his subordinates to the limits that Congress has enacted. Under Trump’s order, there can be no suspension or denial of funding from a federal program unless congressional statutes authorize it. The president is not engaged in an Obama-esque rewrite of federal law; he explicitly ordered his subordinates to follow federal law.

It is not enough to say Orrick mulishly ignores the clear text of the executive order. Again and again, Justice Department lawyers emphasized to the court that Trump’s order explicitly reaffirmed existing law. Orrick refused to listen because, well, what fun would that be? If the president is simply directing that the law be followed, there is no basis for a progressive judge to accuse him of violating the law.

Were he to concede that, how would Orrick then win this month’s Social Justice Warrior in a Robe Award for Telling Donald Trump What For? Orrick can’t confine himself to merely inventing a violation, either, because there is no basis for a lawsuit unless a violation results in real damages. So, the judge also has to fabricate some harm. This takes some doing since, in addition to merely directing that the law be enforced, the Trump administration has not actually taken any action against any sanctuary jurisdiction to this point.

No problem: Orrick theorizes that because San Francisco and Santa Clara receive lots of government funding, Trump’s order afflicts them with “pre-enforcement” anxiety. They quake in fear that their safety-net and services budgets will be slashed. Sanctuary cities? Maybe we should call them snowflake cities. As noted above, there is a transparent agenda behind Orrick’s sleight of hand. The judge is keen to warn the president that, if ever his administration were to deny funds to sanctuary cities, it would violate the Constitution. It is in connection with this advisory opinion that the judge makes the only point worthy of consideration — albeit not in the case before him. Here, it is useful to recall the Supreme Court’s first Obamacare ruling.

Sanctuary cities? Maybe we should call them snowflake cities.

As noted above, there is a transparent agenda behind Orrick’s sleight of hand. The judge is keen to warn the president that, if ever his administration were to deny funds to sanctuary cities, it would violate the Constitution. It is in connection with this advisory opinion that the judge makes the only point worthy of consideration — albeit not in the case before him. Here, it is useful to recall the Supreme Court’s first Obamacare ruling.

Sanctuary cities? Maybe we should call them snowflake cities. As noted above, there is a transparent agenda behind Orrick’s sleight of hand. The judge is keen to warn the president that, if ever his administration were to deny funds to sanctuary cities, it would violate the Constitution. It is in connection with this advisory opinion that the judge makes the only point worthy of consideration — albeit not in the case before him. Here, it is useful to recall the Supreme Court’s first Obamacare ruling.

As noted above, there is a transparent agenda behind Orrick’s sleight of hand. The judge is keen to warn the president that, if ever his administration were to deny funds to sanctuary cities, it would violate the Constitution. It is in connection with this advisory opinion that the judge makes the only point worthy of consideration — albeit not in the case before him. Here, it is useful to recall the Supreme Court’s first Obamacare ruling.

While conservatives inveighed against Chief Justice Roberts’s upholding of the individual mandate, the decision had a silver lining: The majority invalidated Obamacare’s Medicaid mandate, which required the states, as a condition of qualifying for federal Medicaid funding, to enforce the federal government’s generous new Medicaid qualifications. In our system, the states are sovereign — the federal government may not dictate to them in areas of traditional state regulation, nor may it conscript them to enforce federal law. The Supremes therefore explained that state agreements to accept federal funding in return for adopting federal standards (e.g., to accept highway funding in exchange for adopting the federally prescribed 55-mph speed limit) are like contracts. The state must agree to the federal government’s terms. Once such an agreement is reached, the feds may not unilaterally make material changes in the terms, nor may they use their superior bargaining position to extort a state into acceding to onerous new terms in order to get the federal money on which it has come to depend. Whether a particular case involves such an extortion, as opposed to a permissible nudge, depends on the facts. If the feds are too heavy-handed, they run the risk of violating the Tenth Amendment’s federalist division of powers.

Who knew federal judges in ur-statist San Francisco had become such federalists? Orrick contends that if Trump were to cut off funds from sanctuary cities for failure to assist federal immigration-enforcement officials, it would offend the Tenth Amendment. This is highly unlikely. First, let’s remember — though Orrick studiously forgets — that Trump’s order endorses only such stripping of funds as Congress has already approved. Thus, sanctuary jurisdictions would be ill-suited to claim that they’d been sandbagged.

Second, the money likely to be at issue would surely be nothing close to Medicaid funding. Finally, Trump would not be unilaterally rewriting an existing federal–state contract; he’d be calling for the states to follow federal laws that (a) were on the books when the states started taking federal money and (b) pertain to immigration, a legal realm in which the courts have held the federal government is supreme and the states subordinate. Still, all that said, whether any Trump-administration effort to cut off funding would run afoul of the Tenth Amendment would depend on such considerations as how much funding was actually cut; whether Congress had authorized the cut in designing the funding program; whether the funding was tightly related or unrelated to immigration enforcement; and how big a burden it would be for states to comply with federal demands. Those matters will be impossible to evaluate unless and until the administration actually directs a slashing of funds to a sanctuary jurisdiction. If that happens, there will almost certainly be no legal infirmity as long as Trump’s E.O. means what it says — namely, that any funding cuts must be consistent with existing federal law. But it hasn’t happened. And as long as it hasn’t happened, there is no basis for a court to involve itself, much less issue an anticipatory ruling. Such niceties matter only if you’re practicing law, though. Judge Orrick is practicing politics.

Thus, taking a page from the activist left-wing judges who invalidated Trump’s “travel ban” orders, Orrick harps on stump speeches by Trump and other administration officials. One wonders how well Barack “If you like your plan, you can keep your plan” Obama would have fared under the judiciary’s new Trump Doctrine: The extravagant political rhetoric by which the incumbent president customarily sells his policies relieves a court of the obligation to grapple with the inevitably more modest legal text of the directives that follow.

Here, it is useful to recall the Supreme Court’s first Obamacare ruling. While conservatives inveighed against Chief Justice Roberts’s upholding of the individual mandate, the decision had a silver lining: The majority invalidated Obamacare’s Medicaid mandate, which required the states, as a condition of qualifying for federal Medicaid funding, to enforce the federal government’s generous new Medicaid qualifications.

 

In our system, the states are sovereign — the federal government may not dictate to them in areas of traditional state regulation, nor may it conscript them to enforce federal law. The Supremes therefore explained that state agreements to accept federal funding in return for adopting federal standards (e.g., to accept highway funding in exchange for adopting the federally prescribed 55-mph speed limit) are like contracts. The state must agree to the federal government’s terms. Once such an agreement is reached, the feds may not unilaterally make material changes in the terms, nor may they use their superior bargaining position to extort a state into acceding to onerous new terms in order to get the federal money on which it has come to depend. Whether a particular case involves such an extortion, as opposed to a permissible nudge, depends on the facts. If the feds are too heavy-handed, they run the risk of violating the Tenth Amendment’s federalist division of powers.

Who knew federal judges in ur-statist San Francisco had become such federalists?

Orrick contends that if Trump were to cut off funds from sanctuary cities for failure to assist federal immigration-enforcement officials, it would offend the Tenth Amendment. This is highly unlikely. First, let’s remember — though Orrick studiously forgets — that Trump’s order endorses only such stripping of funds as Congress has already approved. Thus, sanctuary jurisdictions would be ill-suited to claim that they’d been sandbagged. Second, the money likely to be at issue would surely be nothing close to Medicaid funding. Finally, Trump would not be unilaterally rewriting an existing federal–state contract; he’d be calling for the states to follow federal laws that (a) were on the books when the states started taking federal money and (b) pertain to immigration, a legal realm in which the courts have held the federal government is supreme and the states subordinate.

Still, all that said, whether any Trump-administration effort to cut off funding would run afoul of the Tenth Amendment would depend on such considerations as how much funding was actually cut; whether Congress had authorized the cut in designing the funding program; whether the funding was tightly related or unrelated to immigration enforcement; and how big a burden it would be for states to comply with federal demands. Those matters will be impossible to evaluate unless and until the administration actually directs a slashing of funds to a sanctuary jurisdiction.

If that happens, there will almost certainly be no legal infirmity as long as Trump’s E.O. means what it says — namely, that any funding cuts must be consistent with existing federal law. But it hasn’t happened. And as long as it hasn’t happened, there is no basis for a court to involve itself, much less issue an anticipatory ruling.

Such niceties matter only if you’re practicing law, though. Judge Orrick is practicing politics.

 http://www.nationalreview.com/article/447058/trump-administration-sanctuary-city-executive-order-activist-liberal-judge-william-h-orrick

Story 2: Senator Ted Cruz Great Idea For Paying For The Wall — Videos —

Image result for senator cruz paying for wall with drug cartel money assets el chapoImage result for senator cruz paying for wall with drug cartel money assetsImage result for senator cruz paying for wall with drug cartel money assets el chapoImage result for senator cruz paying for wall with drug cartel money assetsImage result for senator cruz paying for wall with drug cartel money assets el chapoImage result for senator cruz paying for wall with drug cartel money assets el chapoImage result for United states / Mexico Southern Border Fence barrier or wallImage result for map of miles of United states / Mexico Southern Border Fence barrier or wallImage result for Mexico Southern Border FenceImage result for Mexico Southern Border FenceImage result for Mexico Southern Border FenceImage result for United states / Mexico Southern Border Fence barrier or wall

Is a wall an expensive, ineffective solution to border security?

How we can build Trump’s border wall

Is Trump’s Wall Possible?

Trump Maintains Mexico Will Pay for Border Wall

Donald Trump’s ‘Simple’ Response to How He Will Get Mexico To Pay for Wall

BREAKING: Trump’s ENTIRE Wall Just Got Paid For By ONE Person & You Won’t Believe Who!

Senator Ted Cruz Has a Great Plan to Pay for the Wall! Watch!

BREAKING Ted Cruz Teams With Trump, Figures Out PERFECT Way To Pay For Border Wall… – News

Inside the Homes of the Biggest Drug Kingpins

How El Chapo Became World’s Biggest Drug Lord

10 Massive TRUMP Walls That Already Exist

Sessions: Fed To Cut “Sanctuary Cities” Funding- Full Q & A

Mexico–United States barrier

From Wikipedia, the free encyclopedia

Border fence near El Paso, Texas

Border fence between San Diego‘s border patrol offices in California (left) and Tijuana, Mexico (right)

The Mexico–United States barrier is a series of walls and fences along the Mexico–United States border aimed at preventingillegal crossings from Mexico into the United States and vice versa.[1] The barrier is not one continuous structure, but a grouping of relatively short physical walls, secured in between with a “virtual fence” which includes a system of sensors and cameras monitored by the United States Border Patrol.[2] As of January 2009, U.S. Customs and Border Protection reported that it had more than 580 miles (930 km) of barriers in place.[3]The total length of the continental border is 1,989 miles (3,201 km).

Background

Two men scale the border fence into Mexico near Douglas, Arizona, in 2009

Two men scale the border fence into Mexico near Douglas, Arizona, in 2009

The barriers were built from 1994 as part of three larger “Operations” to taper transportation of illegal drugs manufactured in Latin America and immigration: Operation Gatekeeper in California, Operation Hold-the-Line[4] in Texas, and Operation Safeguard[5] in Arizona.

96.6 per cent of apprehensions by the Border Patrol in 2010 occurred at the southwest border.[6] The number of Border Patrol apprehensions declined 61% from 1,189,000 in 2005 to 723,840 in 2008 to 463,000 in 2010. The decrease in apprehensions may be due to a number of factors including changes in U.S. economic conditions and border enforcement efforts. Border apprehensions in 2010 were at their lowest level since 1972.[6] In March 2017 there were 17,000 apprehensions, which was the fifth month in a row of decline. In December 2016 apprehensions were at 58,478.[7]

The 1,954-mile (3,145 km) border between the United States and Mexico traverses a variety of terrains, including urban areas and deserts. The barrier is located on both urban and uninhabited sections of the border, areas where the most concentrated numbers of illegal crossings and drug trafficking have been observed in the past. These urban areas include San Diego, California and El Paso, Texas. As of August 29, 2008, the U.S. Department of Homeland Security had built 190 miles (310 km) of pedestrian border fence and 154.3 miles (248.3 km) of vehicle border fence, for a total of 344.3 miles (554.1 km) of fence. The completed fence is mainly in New Mexico, Arizona, and California, with construction underway in Texas.[8]

U.S. Customs and Border Protection reported that it had more than 580 miles (930 km) of fence in place by the second week of January 2009.[3] Work is still under way on fence segments in Texas and on the Border Infrastructure System in California.

The border fence is not one continuous structure and is actually a grouping of short physical walls that stop and start, secured in between with “virtual fence” which includes a system of sensors and cameras monitored by Border Patrol Agents.[2]

As a result of the effect of the barrier, there has been a marked increase in the number of people trying to illegally cross the Sonoran Desert and crossing over the Baboquivari Mountain in Arizona.[9] Such illegal immigrants must cross 50 miles (80 km) of inhospitable terrain to reach the first road, which is located in the Tohono O’odhamIndian Reservation.[9][10]

Status

Aerial view of El Paso, Texas and Ciudad Juárez, Chihuahua; the border can clearly be seen as it divides the two cities at night

Aerial view of El Paso, Texas (on the left) and Ciudad Juárez, Chihuahua (on the right), the border can clearly be seen as it divides the two cities at night

The wall in Tijuana, Mexico.

U.S. RepresentativeDuncan Hunter, a Republican from California and the then-chairman of the House Armed Services Committee, proposed a plan to the House on November 3, 2005 calling for the construction of a reinforced fence along the entire United States–Mexican border. This would also have included a 100-yard (91 m) border zone on the U.S. side. On December 15, 2005, Congressman Hunter’s amendment to the Border Protection, Anti-terrorism, and Illegal Immigration Control Act of 2005 (H.R. 4437) passed in the House. This plan called for mandatory fencing along 698 miles (1,123 km) of the 1,954-mile (3,145-km) border.[11] On May 17, 2006 the U.S. Senate proposed with Comprehensive Immigration Reform Act of 2006 (S. 2611) what could be 370 miles (600 km) of triple layered-fencing and a vehicle fence. Although that bill died in committee, eventually the Secure Fence Act of 2006 was passed by Congress and signed by President George W. Bush on October 26, 2006.[12]

The government of Mexico and ministers of several Latin American countries condemned the plans. Rick Perry, governor of Texas, also expressed his opposition saying that instead of closing the border it should be opened more and through technology support legal and safe migration.[13] The barrier expansion was also opposed by a unanimous vote of the Laredo, Texas City Council.[14] Laredo’s Mayor, Raul G. Salinas, was concerned about defending his town’s people by saying that the Bill which included miles of border wall would devastate Laredo. He stated “These are people that are sustaining our economy by forty percent, and I am gonna [sic] close the door on them and put [up] a wall? You don’t do that. It’s like a slap in the face.” He hoped that Congress would revise the Bill to better reflect the realities of life on the border.[15] There are no plans to build border fence in Laredo at this time.[citation needed]However, there is a large Border Patrol presence in Laredo.

Secure Fence Act

H.R. 6061, the “Secure Fence Act of 2006“, was introduced on September 13, 2006. It passed through the U.S. House of Representatives on September 14, 2006 with a vote of 283–138.

On September 29, 2006, by a vote of 80–19 the U.S. Senate confirmed H.R. 6061 authorizing, and partially funding the “possible” construction of 700 miles (1,125 km) of physical fence/barriers along the border. The very broad support implied that many assurances were been made by the Administration—to the Democrats, Mexico, and the pro “Comprehensive immigration reform” minority within the GOP—that Homeland Security would proceed very cautiously. Secretary of Homeland SecurityMichael Chertoff, announced that an eight-month test of the virtual fence he favored would precede any construction of a physical barrier.

On October 26, 2006, President George W. Bush signed H.R. 6061 which was voted upon and passed by the 109th Congress of the United States.[16] The signing of the bill came right after a CNN poll showed that most Americans “prefer the idea of more Border Patrol agents to a 700-mile (1,125-kilometer) fence.”[17] The Department of Homeland Security has a down payment of $1.2 billion marked for border security, but not specifically for the border fence.

As of January 2010, the fence project had been completed from San Diego, California to Yuma, Arizona.[dubious ] From there it continued into Texas and consisted of a fence that was 21 feet (6.4 m) tall and 6 feet (1.8 m) deep in the ground, cemented in a 3-foot (0.91 m)-wide trench with 5000 psi (345 bar; 352 kg/cm²) concrete. There were no fatalities during construction, but there were 4 serious injuries with multiple aggressive acts against building crews. There was one reported shooting with no injury to a crew member in Mexicali region. All fence sections are south of the All-American Canal, and have access roads giving border guards the ability to reach any point easily, including the dunes area where a border agent was killed 3 years before and is now sealed off.

The Republican Party’s 2012 platform stated that “The double-layered fencing on the border that was enacted by Congress in 2006, but never completed, must finally be built.”[18] The Secure Fence Act’s costs were estimated at $6 billion,[19] more than the Customs and Border Protection’s entire annual discretionary budget of $5.6 billion.[20] The Washington Office on Latin America noted on its Border Fact Check site in about the year 2013 that the cost of complying with the Secure Fence Act’s mandate was the reason it had not been completely fulfilled.[21]

Rethinking the expansion

In January 2007 incoming House Majority Leader Steny H. Hoyer (D-MD) announced that Congress would revisit the fence plan, with committee chairs holding up funding until a comprehensive border security plan was presented by the United States Department of Homeland Security. Then the Republican senators from Texas, John Cornyn and Kay Bailey Hutchison, advocated revising the plan, as well.[14]

The REAL ID Act, attached as a rider to a supplemental appropriations bill funding the wars in Iraq and Afghanistan, decreed, “Not withstanding any other provision of law, the Secretary of Homeland Security shall have the authority to waive all legal requirements such Secretary, in such Secretary’s sole discretion, determines necessary to ensure expeditious construction of the barriers and roads.” Secretary Chertoff used his new power to “waive in their entirety” the Endangered Species Act, the Migratory Bird Treaty Act, the National Environmental Policy Act, the Coastal Zone Management Act, the Clean Water Act, the Clean Air Act, and the National Historic Preservation Act to extend triple fencing through the Tijuana River National Estuarine Research Reserve near San Diego.[22] The Real ID Act further stipulates that the Secretary’s decisions are not subject to judicial review, and in December 2005 a federal judge dismissed legal challenges by the Sierra Club, the Audubon Society, and others to Chertoff’s decision.[citation needed]

Secretary Chertoff exercised his waiver authority on April 1, 2008. In June 2008, the U.S. Supreme Court declined to hear the appeal of a lower court ruling upholding the waiver authority in a case filed by the Sierra Club.[23] In September 2008 a federal district court judge in El Paso dismissed a similar lawsuit brought by El Paso County, Texas.[24]

By January 2009, U.S. Customs and Border Protection and Homeland Security had spent $40 million on environmental analysis and mitigation measures aimed at blunting any possible adverse impact that the fence might have on the environment. On January 16, 2009, DHS announced it was pledging an additional $50 million for that purpose, and signed an agreement with the U.S. Department of the Interior for utilization of the additional funding.[25]

Expansion freeze

On March 16, 2010, the Department of Homeland Security announced that there would be a halt to expand the “virtual fence” beyond two pilot projects in Arizona.[26]

Contractor Boeing Corporation had numerous delays and cost overruns. Boeing had initially used police dispatching software that was unable to process all of the information coming from the border. The $50 million of remaining funding would be used for mobile surveillance devices, sensors, and radios to patrol and protect the border. At the time, the Department of Homeland Security had spent $3.4 billion on border fences and had built 640 miles (1,030 km) of fences and barriers as part of the Secure Border Initiative.[26]

Local efforts

In response to a perceived lack of will on the part of the federal government to build a secure border fence, and a lack of state funds, Arizona officials plan to launch a website allowing donors to help fund a state border fence.[citation needed]

Piecemeal fencing has also been established. In 2005, under its president, Ramón H. Dovalina, Laredo Community College, located on the border, obtained a 10-foot fence built by the United States Marine Corps. The structure was not designed as a border barrier per se but was intended to divert smugglers and illegal immigrants to places where the authorities can halt entrance into the United States.[27]

Trump administration

Further information: Executive Order 13767

Donald Trump signing Executive Order 13767

Throughout his 2016 presidential campaign, Donald Trump called for the construction of a much larger and fortified wall along the Mexico–United States border, and claimed Mexico will pay for its construction, estimated at $8 to $12 billion, while others state there are enough uncertainties to drive up the cost between $15 to $25 billion.[28][29][30][31] In January 2017, Mexican President Enrique Peña Nieto said the country would not pay,[32][28] and later compared then President-elect Trump’s rhetoric to the former Dictator of Italy Benito Mussolini.[33] On January 25, 2017, the Trump administration signed a Border Security and Immigration Enforcement Improvements Executive Order, 13767 to commence the building of the border wall.[34]In response, Peña Nieto gave a national televised address confirming they would not pay, adding “Mexico doesn’t believe in walls”, and cancelled a scheduled meeting with Trump at the White House.[35][36]

In March 2017, President Donald Trump submitted a budget amendment for fiscal year (FY) 2017 that included an extra $3 billion for border security and immigration enforcement. Trump’s FY 2018 Budget Blueprint increases discretionary funds for the Department of Homeland Security (DHS) by $2.8 billion (to $44.1 billion). DHS would be the agency in charge of building the border wall.[7]

DHS Secretary John F. Kelly told the Senate Homeland Security and Governmental Affairs Committee during a hearing that the Budget Blueprint “includes $2.6 billion for high-priority border security technology and tactical infrastructure, including funding to plan, design and construct the border wall.” Specific details will come in mid-May 2017, he said.[7]

According to Homeland Preparedness News, “Former members of U.S. Customs and Border Protection downplayed the idea that a wall alone would be enough to strengthen the U.S. southern border in a Senate hearing on [April 4, 2017], framing it as part of a broader strategy.”[37]

One vocal critic of the wall is U.S. Senator Claire McCaskill (D-MO). She said during the hearing that while Americans want a secure border, she has “not met anyone that says the most effective way is to build a wall across the entirety of our southern border. The only one who keeps talking about that is President Trump.”[37]

Controversy

The barrier has been criticized for being easy to get around. Some methods include digging under it (sometimes using complex tunnel systems), climbing the fence (using wire cutters to remove barbed-wire) or locating and digging holes in vulnerable sections of the wall. Many Latin-Americans have also traveled by boat through the Gulf of Mexico or the Pacific Coast.

Divided land

Tribal lands of three indigenous nations would be divided by the proposed border fence.[38][39]

On January 27, 2008, a U.S. Native American human rights delegation, which included Margo Tamez (Lipan Apache-Jumano Apache) and Teresa Leal (Opata-Mayo) reported the removal of the official International Boundary obelisks of 1848 by the U.S. Department of Homeland Security in the Las Mariposas, Sonora-Arizona sector of the Mexico–U.S. border.[40][41] The obelisks were moved southward approximately 20 meters, onto the property of private landowners in Sonora, as part of the larger project of installing the 18-foot (5.5 m) steel barrier wall.[42]

The proposed route for the border fence would divide the campus of the University of Texas at Brownsville into two parts, according to Antonio N. Zavaleta, a vice president of the university.[43] There have been campus protests against the wall by students who feel it will harm their school.[2] In August 2008, UT-Brownsville reached an agreement with the U.S. Department of Homeland Security for the university to construct a portion of the fence across and adjacent to its property. The final agreement, which was filed in federal court on Aug 5 and formally signed by the Texas Southmost College Board of Trustees later that day, ended all court proceedings between UTB/TSC and DHS. On August 20, 2008, the university sent out a request for bids for the construction of a 10-foot (3.0 m) high barrier that incorporates technology security for its segment of the border fence project. The southern perimeter of the UTB/TSC campus will be part of a laboratory for testing new security technology and infrastructure combinations.[44] The border fence segment on the UTB campus was substantially completed by December 2008.[45]

Hidalgo County

In the spring of 2007 more than 25 landowners, including a corporation and a school district, from Hidalgo and Starr County in Texas refused border fence surveys, which would determine what land was eligible for building on, as an act of protest.[46]

In July 2008, Hidalgo County and Hidalgo County Drainage District No. 1 entered into an agreement with the U.S. Department of Homeland Security for the construction of a project that combines the border fence with a levee to control flooding along the Rio Grande. Construction of two of the Hidalgo County fence segments are under way; five more segments are scheduled to be built during the fall of 2008; the Hidalgo County section of the border fence will constitute 22 miles (35 km) of combined fence and levee.[47]

Mexico’s condemnations

Mexico-United States barrier at the pedestrian border crossing in Tijuana

Mexico-United States barrier at the pedestrian border crossing in Tijuana

In 2006, the Mexican government vigorously condemned the Secure Fence act of 2006. Mexico has also urged the U.S. to alter its plans for expanded fences along their shared border, saying that it would damage the environment and harm wildlife.[48]

In June 2007, it was announced that a section of the barrier had been mistakenly built from 1 to 6 feet (2 meters) inside Mexican territory. This will necessitate the section being moved at an estimated cost of over $3 million (U.S.).[49]

In 2012, then presidential candidate of Mexico Enrique Peña Nieto was campaigning in Tijuana at the Playas de Monumental, less than 600 yards (550 m) from the U.S.–Mexico border adjacent to Border Field State Park. In one of his speeches he criticized the U.S. government for building the barriers, and asked for them to be removed. Ultimately, he mocked Ronald Reagan’s “Tear down this wall!” speech from Berlin in 1987.[citation needed]

Migrant deaths

The Wall at the border of Tijuana, Mexico and San Diego. The crosses represent migrants who died in the crossing attempt. Some identified, some not. Surveillance tower in the background.

Between 1994 and 2007, there were around 5,000 Migrant deaths along the Mexico–United States border, according to a document created by the Human Rights National Commission of Mexico, also signed by the American Civil Liberties Union.[50] Between 43 and 61 people died trying to cross the Sonoran Desert from October 2003 to May 2004; three times that of the same period the previous year.[9] In October 2004 the Border Patrol announced that 325 people had died crossing the entire border during the previous 12 months.[51] Between 1998 and 2004, 1,954 persons are officially reported to have died along the US-Mexico border. Since 2004, the bodies of 1,086 migrants have been recovered in the southern Arizona desert.[52]

U.S. Border Patrol Tucson Sector reported on October 15, 2008 that its agents were able to save 443 undocumented immigrants from certain death after being abandoned by their smugglers, during FY 2008, while reducing the number of deaths by 17% from 202 in FY 2007 to 167 in FY 2008. Without the efforts of these agents, hundreds more could have died in the deserts of Arizona.[53] According to the same sector, border enhancements like the wall have allowed the Tucson Sector agents to reduce the number of apprehensions at the borders by 16% compared with fiscal year 2007.[54]

Environmental impact

"Wildlife-friendly" border wall in Brownsville, Texas, which would allow wildlife to cross the border. A young man climbs wall using horizontal beams for foot support.

“Wildlife-friendly” border wall in Brownsville, Texas, which would allow wildlife to cross the border. A young man climbs wall using horizontal beams for foot support.

In April 2008, the Department of Homeland Security announced plans to waive more than 30 environmental and cultural laws to speed construction of the barrier. Despite claims from then Homeland Security Chief Michael Chertoff that the department would minimize the construction’s impact on the environment, critics in Arizona and Texas asserted the fence endangered species and fragile ecosystems along the Rio Grande. Environmentalists expressed concern about butterfly migration corridors and the future of species of local wildcats, the ocelot, the jaguarundi, and the jaguar.[55]

U.S. Customs and Border Protection (CBP) conducted environmental reviews of each pedestrian and vehicle fence segment covered by the waiver, and published the results of this analysis in Environmental Stewardship Plans (ESPs).[56] Although not required by the waiver, CBP has conducted the same level of environmental analysis (in the ESPs) that would have been performed before the waiver (in the “normal” NEPA process) to evaluate potential impacts to sensitive resources in the areas where fence is being constructed.

ESPs completed by CBP contain extremely limited surveys of local wildlife. For example, the ESP for border fence built in the Del Rio Sector included a single survey for wildlife completed in November 2007, and only “3 invertebrates, 1 reptile species, 2 amphibian species, 1 mammal species, and 21 bird species were recorded.” The ESPs then dismiss the potential for most adverse effects on wildlife, based on sweeping generalizations and without any quantitative analysis of the risks posed by border barriers. Approximately 461 acres (187 ha) of vegetation will be cleared along the impact corridor. From the Rio Grande Valley ESP: “The impact corridor avoids known locations of individuals of Walker’s manioc and Zapata bladderpod, but approaches several known locations of Texas ayenia. For this reason, impacts on federally listed plants are anticipated to be short-term, moderate, and adverse.” This excerpt is typical of the ESPs in that the risk to endangered plants is deemed short-term without any quantitative population analysis.[citation needed]

By August 2008, more than 90 percent of the southern border in Arizona and New Mexico had been surveyed. In addition, 80 percent of the California/Mexico border has been surveyed.[8]

See also

https://en.wikipedia.org/wiki/Mexico%E2%80%93United_States_barrier

Story 3: Trump’s Latest Tax Proposal — Good But Not Great — Missed Opportunity To Transition From An Income Tax Based System To A Broad Based Consumption Tax — FairTax or Fair Tax Less — Forget The Republican Establishment Border Adjustment Tax — Videos 

Image result for trump new tax proposal

Image result for trump new tax plan list of highlights april 26, 2017

Image result for ficaq tax rates 2017 payroll taxes rates 2017 social security medicare disablility

Image result for ficaq tax rates 2017 payroll taxes rates 2017 social security medicare disablility

Image result for historical trends of Social Security, Medicare and Diability tax rates

Image result for trump new tax plan list of highlights april 26, 2017Image result for trump new tax plan april 26, 2017

solutions_2016_federal-budget-2

solutions_2016_federal-budget-1

solutions_2016_federal-budget-3

Image result for 2016 "Federal Spending by the Numbers"

U.S. Debt Clock

http://www.usdebtclock.org/

FNN: President Trump’s NEW Tax Plan REVEALED – FULL Press Conference feat. Mnuchin and Cohn

Mulvaney: Trump tax plan benefits middle class and ‘the places where they work’

President Trump’s tax reform plan sparks debate

Trump’s tax cuts won’t pay for themselves: David Stockman

Trump’s ‘Cut Rate’ Plan – Cuts 7 Brackets to 3, Reduce Rates For Corps – Stuart Varney

Trump Admin Unveils Plan To Overhaul The Tax Code – First 97 of 100 days

Trump announces tax plan coming Wednesday

Trump Tax Plan Cuts Top Rate to 35 PercentBreaking Tonight ,

President Trump Latest News Today 4/26/17 , White House news , trump tax plan

[ David Stockman ] — 26 April 2017 — Trump tax cuts, deficits and stimulus spending

Ep. 244: Trump Tax Cuts To Starve The Beast

The Lead with Jake Tapper April 26, 2017 – White House Reveals Plan for ‘Biggest Tax Cut in History’

FairTax: Fire Up Our Economic Engine (Official HD)

Freedom from the IRS! – FairTax Explained in Detail

Pence on the Fair Tax

#41 President Trump finds a Great tax system

#30 The FAIRtax and President Elect Trump

UNVEILED: TRUMP’S TAX PLAN

Trump calls for dramatic tax cuts for individuals and businesses

The Main Highlights In Trump’s Sweeping Tax Reform Proposal

Tyler Durden's picture

In brief, the tax reform was largely in line with what was leaked and what was expected. Small surprises: the tax bracket for high income earners was 2% more (at 35%) than what Trump campaigned on, and the standard deduction has been doubled so that no married couple pays tax on their first 24k earned, Citi notes.

As expected, no mention of border adjustment taxes. The plan also looks to repeal real estate taxes, alternative minimum tax and the death tax. Territorial taxes are also included. As we type, Mnuchin and Cohn are answering their last question.

Below is the actual tax from the White House:

2017 Tax Reform for Economic Growth and American Jobs

The Biggest Individual And Business Tax Cut in American History

Goals For Tax Reform

  • Grow the economy and create millions of jobs
  • Simplify our burdensome tax code
  • Provide tax relief to American families—especially middle-income families
  • Lower the business tax rate from one of the highest in the world to one of the lowest

Individual Reform

  • Tax relief for American families, especially middle-income families:
    • Reducing the 7 tax brackets to 3 tax brackets of to%, 25% and 35%
    • Doubling the standard deduction
    • Providing tax relief for families with child and dependent care expenses
  • Simplification:
    • Eliminate targeted tax breaks that mainly benefit the wealthiest taxpayers
    • Protect the home ownership and charitable gift tax deductions
    • Repeal the Alternative Minimum Tax
    • Repeal the death tax
  • Repeal the 3.8% Obamacare tax that hits small businesses and investment income

Business Reform

  • 15% business tax rate
  • Territorial tax system to level the playing field for American companies
  • One-time tax on trillions of dollars held overseas
  • Eliminate tax breaks for special interests

Process

Throughout the month of May, the Trump Administration will hold listening sessions with stakeholders to receive their input and will continue working with the House and Senate to develop the details of a plan that provides massive tax relief, creates jobs, and makes America more competitive—and can pass both chambers.

A few additional observations from Citi:

What didn’t Mnuchin or Cohn tell us, in addition to the details noted above:

  • Did not specify if the plan would be “revenue neutral,” which is needed to get permanent policy.
  • Mnuchin didn’t talk about how dynamic scoring could play a hand in implementation during the official press conference but he did touch on this in an earlier appearance for The Hill. Dynamic analysis accounts for the macroeconomic impacts of tax, spending, and regulatory policy, while dynamic scoring uses dynamic analysis in estimating the budgetary impact of proposed policy changes. Ultimately, the Trump Administration believes policies will generate growth above 3.0%YoY, which can pay for the plan. The challenge is that it has to sell this view to Congress.
  • Did not discuss border adjustment taxes (BAT) during the official conference but did brush on this during his appearance on The Hill.  Mnuchin said “we don’t think it works in its current form” but there will be ongoing discussions on this. Ryan also acknowledged the BAT needed work.

When asked by The Hill editor-in-chief as to whether or not he’s reached out to any centrist Democrats for input on the plan, Mnuchin declined to comment on the “specifics.” He “hopes Democrats won’t get in way.”

Ryan said several times Wednesday that Republicans plan to use reconciliation as a vehicle for tax reform. This point is very important but to illustrate this, one has to understand the reconciliation process.

The Center on Budget and Policy Priorities helps define it. Created by the Congressional Budget Act of 1974, reconciliation allows for expedited consideration of certain tax, spending, and debt limit legislation. In the Senate, reconciliation bills are approved with a simple majority of 51. To start the reconciliation process, the House and Senate must agree on a budget resolution that includes “reconciliation directives” for specified committees in the House and Senate. Those committees must report legislation by a certain date that does one or more of the following:

  • Increases or decreases spending (outlays) by specified amounts over a specified time;
  • Increases or decreases revenues by specified amounts over a specified time
  • Raises or lowers the public debt limit by a specified amount.

Republicans could pursue tax reform under the budget reconciliation process, meaning the Senate could pass bills related to the budget – but reconciliation requires the long-term savings. Post 10y, scoring has to indicate that the bill will be revenue neutral or revenue positive or it doesn’t work.

That looks to be exactly why Republicans wanted to prioritize healthcare reform: the Congressional Budget Office estimated the American Health Care Act would reduce federal deficits by USD337 billion over the next 10y. Given that tax reform estimates signal a revenue burden, various political analysts posit that Republicans have been looking to repeal Obamacare to pay for some parts of tax reform.

Without healthcare reform, Republicans could face challenges getting a revenue neutral, long-term tax reform.

  • The Tax Policy Center estimates Trump’s plan for a 15% corporate tax rate would decrease federal revenues by USD2.3tn between 2016 and 2026. Trump’s campaign tax plan for corporations and individuals could cause revenue to drop by roughly USD6tn between 2016 and 2026, according to the projections.
  • The Tax Policy Center is left-leaning but is being heard out. Even Senate Finance Chairman Orrin Hatch has said a 15% corporate tax would increase the deficit and if the overall plan doesn’t include border adjustment tax – or borrow funds via healthcare reform – Republicans will have to find revenue streams.

* * *

Some parting thoughts:: as Time’s Zeke Miller notes this Trump tax plan is the same as the one released last fall. “If his team has been working on it for the last 6mos, we didn’t see it 2day.”

Additionally, while the proposed tax plan does not raise taxes on hedge fund managers, as Trump vowed during his campaign, courtesy of the cut in LLC tax rates, it will likely lower the taxes many if not all HF managers pay.

And, of course, with the state deduction gone, it means that for many Americans the net effect will be to raise, not lower the amount of tax owed.

* * *

Of course the crucial question is – with The White House targeting deductions to help pay for tax plan (but mortgage/charitable are protected), how does this not blow up deficit?

Perhaps the most concerning aspect is the apparent expectations management that is being undertaken this morning:

The White House’s presentation will be “pretty broad in the principles,” said Marc Short, Trump’s director of legislative affairs.

In the coming weeks, Trump will solicit more ideas on how to improve it, Short said. The specifics should start to come this summer.

Short said the administration did not want to set a firm timeline, after demanding a quick House vote on a health care bill and watching it fail.

But, Short added, “I don’t see this sliding into 2018.”

The biggest question is – will this be enough to satisfy the market? For now the answer is no, because as Citi adds the market isn’t jumping around on this but there is a bid in US fixed income, taking USDJPY down towards 111.25. All in all, a classic buy the rumor, sell the news on an underdelivered (but fairly presented as such) “big announcement” from the Trump Administration.

http://www.zerohedge.com/news/2017-04-26/mnuchincohn-unveil-trumps-biggest-tax-cut-ever-tax-reform-plan-live-feed

The Internal Revenue Service has recently released new data on individual income taxes for calendar year 2014, showing the number of taxpayers, adjusted gross income, and income tax shares by income percentiles.[1]

The data demonstrates that the U.S. individual income tax continues to be very progressive, borne mainly by the highest income earners.

  • In 2014, 139.6 million taxpayers reported earning $9.71 trillion in adjusted gross income and paid $1.37 trillion in individual income taxes.
  • The share of income earned by the top 1 percent of taxpayers rose to 20.6 percent in 2014. Their share of federal individual income taxes also rose, to 39.5 percent.
  • In 2014, the top 50 percent of all taxpayers paid 97.3 percent of all individual income taxes while the bottom 50 percent paid the remaining 2.7 percent.
  • The top 1 percent paid a greater share of individual income taxes (39.5 percent) than the bottom 90 percent combined (29.1 percent).
  • The top 1 percent of taxpayers paid a 27.1 percent individual income tax rate, which is more than seven times higher than taxpayers in the bottom 50 percent (3.5 percent).

Reported Income and Taxes Paid Both Increased Significantly in 2014

Taxpayers reported $9.71 trillion in adjusted gross income (AGI) on 139.5 million tax returns in 2014. Total AGI grew by $675 billion from the previous year’s levels. There were 1.2 million more returns filed in 2014 than in 2013, meaning that average AGI rose by $4,252 per return, or 6.5 percent.

Meanwhile, taxpayers paid $1.37 trillion in individual income taxes in 2014, an 11.5 percent increase from taxes paid in the previous year. The average individual income tax rate for all taxpayers rose from 13.64 percent to 14.16 percent. Moreover, the average tax rate increased for all income groups, except for the top 0.1 percent of taxpayers, whose average rate decreased from 27.91 percent to 27.67 percent.

The most likely explanation behind the higher tax rates in 2014 is a phenomenon known as “real bracket creep.” [2] As incomes rise, households are pushed into higher tax brackets, and are subject to higher overall tax rates on their income. On the other hand, the likely reason why the top 0.1 percent of households saw a slightly lower tax rate in 2014 is because a higher portion of their income consisted of long-term capital gains, which are subject to lower tax rates.[3]

The share of income earned by the top 1 percent rose to 20.58 percent of total AGI, up from 19.04 percent in 2013. The share of the income tax burden for the top 1 percent also rose, from 37.80 percent in 2013 to 39.48 percent in 2014.

Top 1% Top 5% Top 10% Top 25% Top 50% Bottom 50% All Taxpayers
Table 1. Summary of Federal Income Tax Data, 2014
Number of Returns 1,395,620 6,978,102 13,956,203 34,890,509 69,781,017 69,781,017 139,562,034
Adjusted Gross Income ($ millions) $1,997,819 $3,490,867 $4,583,416 $6,690,287 $8,614,544 $1,094,119 $9,708,663
Share of Total Adjusted Gross Income 20.58% 35.96% 47.21% 68.91% 88.73% 11.27% 100.00%
Income Taxes Paid ($ millions) $542,640 $824,153 $974,124 $1,192,679 $1,336,637 $37,740 $1,374,379
Share of Total Income Taxes Paid 39.48% 59.97% 70.88% 86.78% 97.25% 2.75% 100.00%
Income Split Point $465,626 $188,996 $133,445 $77,714 $38,173
Average Tax Rate 27.16% 23.61% 21.25% 17.83% 15.52% 3.45% 14.16%
 Note: Does not include dependent filers

High-Income Americans Paid the Majority of Federal Taxes

In 2014, the bottom 50 percent of taxpayers (those with AGIs below $38,173) earned 11.27 percent of total AGI. This group of taxpayers paid approximately $38 billion in taxes, or 2.75 percent of all income taxes in 2014.

In contrast, the top 1 percent of all taxpayers (taxpayers with AGIs of $465,626 and above) earned 20.58 percent of all AGI in 2014, but paid 39.48 percent of all federal income taxes.

In 2014, the top 1 percent of taxpayers accounted for more income taxes paid than the bottom 90 percent combined. The top 1 percent of taxpayers paid $543 billion, or 39.48 percent of all income taxes, while the bottom 90 percent paid $400 billion, or 29.12 percent of all income taxes.

Figure 1.

High-Income Taxpayers Pay the Highest Average Tax Rates

The 2014 IRS data shows that taxpayers with higher incomes pay much higher average individual income tax rates than lower-income taxpayers.[4]

The bottom 50 percent of taxpayers (taxpayers with AGIs below $38,173) faced an average income tax rate of 3.45 percent. As household income increases, the IRS data shows that average income tax rates rise. For example, taxpayers with AGIs between the 10th and 5th percentile ($133,445 and $188,996) pay an average rate of 13.7 percent – almost four times the rate paid by those in the bottom 50 percent.

The top 1 percent of taxpayers (AGI of $465,626 and above) paid the highest effective income tax rate, at 27.2 percent, 7.9 times the rate faced by the bottom 50 percent of taxpayers.

Figure 2.

Taxpayers at the very top of the income distribution, the top 0.1 percent (with AGIs over $2.14 million), paid an even higher average tax rate, of 27.7 percent.

Appendix

Year Total Top 0.1% Top 1% Top
5%
Between
5% & 10%
Top 10% Between 10% & 25% Top 25% Between 25% & 50% Top 50% Bottom 50%
Table 2. Number of Federal Individual Income Tax Returns Filed 1980–2014 (Thousands)
Source: Internal Revenue Service.
1980 93,239 932 4,662 4,662 9,324 13,986 23,310 23,310 46,619 46,619
1981 94,587 946 4,729 4,729 9,459 14,188 23,647 23,647 47,293 47,293
1982 94,426 944 4,721 4,721 9,443 14,164 23,607 23,607 47,213 47,213
1983 95,331 953 4,767 4,767 9,533 14,300 23,833 23,833 47,665 47,665
1984 98,436 984 4,922 4,922 9,844 14,765 24,609 24,609 49,218 49,219
1985 100,625 1,006 5,031 5,031 10,063 15,094 25,156 25,156 50,313 50,313
1986 102,088 1,021 5,104 5,104 10,209 15,313 25,522 25,522 51,044 51,044
The Tax Reform Act of 1986 changed the definition of AGI, so data above and below this line not strictly comparable
1987 106,155 1,062 5,308 5,308 10,615 15,923 26,539 26,539 53,077 53,077
1988 108,873 1,089 5,444 5,444 10,887 16,331 27,218 27,218 54,436 54,436
1989 111,313 1,113 5,566 5,566 11,131 16,697 27,828 27,828 55,656 55,656
1990 112,812 1,128 5,641 5,641 11,281 16,922 28,203 28,203 56,406 56,406
1991 113,804 1,138 5,690 5,690 11,380 17,071 28,451 28,451 56,902 56,902
1992 112,653 1,127 5,633 5,633 11,265 16,898 28,163 28,163 56,326 56,326
1993 113,681 1,137 5,684 5,684 11,368 17,052 28,420 28,420 56,841 56,841
1994 114,990 1,150 5,749 5,749 11,499 17,248 28,747 28,747 57,495 57,495
1995 117,274 1,173 5,864 5,864 11,727 17,591 29,319 29,319 58,637 58,637
1996 119,442 1,194 5,972 5,972 11,944 17,916 29,860 29,860 59,721 59,721
1997 121,503 1,215 6,075 6,075 12,150 18,225 30,376 30,376 60,752 60,752
1998 123,776 1,238 6,189 6,189 12,378 18,566 30,944 30,944 61,888 61,888
1999 126,009 1,260 6,300 6,300 12,601 18,901 31,502 31,502 63,004 63,004
2000 128,227 1,282 6,411 6,411 12,823 19,234 32,057 32,057 64,114 64,114
The IRS changed methodology, so data above and below this line not strictly comparable
2001 119,371 119 1,194 5,969 5,969 11,937 17,906 29,843 29,843 59,685 59,685
2002 119,851 120 1,199 5,993 5,993 11,985 17,978 29,963 29,963 59,925 59,925
2003 120,759 121 1,208 6,038 6,038 12,076 18,114 30,190 30,190 60,379 60,379
2004 122,510 123 1,225 6,125 6,125 12,251 18,376 30,627 30,627 61,255 61,255
2005 124,673 125 1,247 6,234 6,234 12,467 18,701 31,168 31,168 62,337 62,337
2006 128,441 128 1,284 6,422 6,422 12,844 19,266 32,110 32,110 64,221 64,221
2007 132,655 133 1,327 6,633 6,633 13,265 19,898 33,164 33,164 66,327 66,327
2008 132,892 133 1,329 6,645 6,645 13,289 19,934 33,223 33,223 66,446 66,446
2009 132,620 133 1,326 6,631 6,631 13,262 19,893 33,155 33,155 66,310 66,310
2010 135,033 135 1,350 6,752 6,752 13,503 20,255 33,758 33,758 67,517 67,517
2011 136,586 137 1,366 6,829 6,829 13,659 20,488 34,146 34,146 68,293 68,293
2012 136,080 136 1,361 6,804 6,804 13,608 20,412 34,020 34,020 68,040 68,040
2013 138,313 138 1,383 6,916 6,916 13,831 20,747 34,578 34,578 69,157 69,157
2014 139,562 140 1,396 6,978 6,978 13,956 20,934 34,891 34,891 69,781 69,781
Year Total Top 0.1% Top 1% Top 5% Between 5% & 10% Top 10% Between 10% & 25% Top 25% Between 25% & 50% Top 50% Bottom 50%
Table 3. Adjusted Gross Income of Taxpayers in Various Income Brackets, 1980–2014 ($Billions)
Source: Internal Revenue Service.
1980 $1,627 $138 $342 $181 $523 $400 $922 $417 $1,339 $288
1981 $1,791 $149 $372 $201 $573 $442 $1,015 $458 $1,473 $318
1982 $1,876 $167 $398 $207 $605 $460 $1,065 $478 $1,544 $332
1983 $1,970 $183 $428 $217 $646 $481 $1,127 $498 $1,625 $344
1984 $2,173 $210 $482 $240 $723 $528 $1,251 $543 $1,794 $379
1985 $2,344 $235 $531 $260 $791 $567 $1,359 $580 $1,939 $405
1986 $2,524 $285 $608 $278 $887 $604 $1,490 $613 $2,104 $421
The Tax Reform Act of 1986 changed the definition of AGI, so data above and below this line not strictly comparable
1987 $2,814 $347 $722 $316 $1,038 $671 $1,709 $664 $2,374 $440
1988 $3,124 $474 $891 $342 $1,233 $718 $1,951 $707 $2,658 $466
1989 $3,299 $468 $918 $368 $1,287 $768 $2,054 $751 $2,805 $494
1990 $3,451 $483 $953 $385 $1,338 $806 $2,144 $788 $2,933 $519
1991 $3,516 $457 $943 $400 $1,343 $832 $2,175 $809 $2,984 $532
1992 $3,681 $524 $1,031 $413 $1,444 $856 $2,299 $832 $3,131 $549
1993 $3,776 $521 $1,048 $426 $1,474 $883 $2,358 $854 $3,212 $563
1994 $3,961 $547 $1,103 $449 $1,552 $929 $2,481 $890 $3,371 $590
1995 $4,245 $620 $1,223 $482 $1,705 $985 $2,690 $938 $3,628 $617
1996 $4,591 $737 $1,394 $515 $1,909 $1,043 $2,953 $992 $3,944 $646
1997 $5,023 $873 $1,597 $554 $2,151 $1,116 $3,268 $1,060 $4,328 $695
1998 $5,469 $1,010 $1,797 $597 $2,394 $1,196 $3,590 $1,132 $4,721 $748
1999 $5,909 $1,153 $2,012 $641 $2,653 $1,274 $3,927 $1,199 $5,126 $783
2000 $6,424 $1,337 $2,267 $688 $2,955 $1,358 $4,314 $1,276 $5,590 $834
The IRS changed methodology, so data above and below this line not strictly comparable
2001 $6,116 $492 $1,065 $1,934 $666 $2,600 $1,334 $3,933 $1,302 $5,235 $881
2002 $5,982 $421 $960 $1,812 $660 $2,472 $1,339 $3,812 $1,303 $5,115 $867
2003 $6,157 $466 $1,030 $1,908 $679 $2,587 $1,375 $3,962 $1,325 $5,287 $870
2004 $6,735 $615 $1,279 $2,243 $725 $2,968 $1,455 $4,423 $1,403 $5,826 $908
2005 $7,366 $784 $1,561 $2,623 $778 $3,401 $1,540 $4,940 $1,473 $6,413 $953
2006 $7,970 $895 $1,761 $2,918 $841 $3,760 $1,652 $5,412 $1,568 $6,980 $990
2007 $8,622 $1,030 $1,971 $3,223 $905 $4,128 $1,770 $5,898 $1,673 $7,571 $1,051
2008 $8,206 $826 $1,657 $2,868 $905 $3,773 $1,782 $5,555 $1,673 $7,228 $978
2009 $7,579 $602 $1,305 $2,439 $878 $3,317 $1,740 $5,058 $1,620 $6,678 $900
2010 $8,040 $743 $1,517 $2,716 $915 $3,631 $1,800 $5,431 $1,665 $7,096 $944
2011 $8,317 $737 $1,556 $2,819 $956 $3,775 $1,866 $5,641 $1,716 $7,357 $961
2012 $9,042 $1,017 $1,977 $3,331 $997 $4,328 $1,934 $6,262 $1,776 $8,038 $1,004
2013 $9,034 $816 $1,720 $3,109 $1,034 $4,143 $2,008 $6,152 $1,844 $7,996 $1,038
2014 $9,709 $986 $1,998 $3,491 $1,093 $4,583 $2,107 $6,690 $1,924 $8,615 $1,094
Year Total Top 0.1% Top 1% Top 5% Between 5% & 10% Top 10% Between 10% & 25% Top 25% Between 25% & 50% Top 50% Bottom 50%
Table 4. Total Income Tax after Credits, 1980–2014 ($Billions)
Source: Internal Revenue Service.
1980 $249 $47 $92 $31 $123 $59 $182 $50 $232 $18
1981 $282 $50 $99 $36 $135 $69 $204 $57 $261 $21
1982 $276 $53 $100 $34 $134 $66 $200 $56 $256 $20
1983 $272 $55 $101 $34 $135 $64 $199 $54 $252 $19
1984 $297 $63 $113 $37 $150 $68 $219 $57 $276 $22
1985 $322 $70 $125 $41 $166 $73 $238 $60 $299 $23
1986 $367 $94 $156 $44 $201 $78 $279 $64 $343 $24
The Tax Reform Act of 1986 changed the definition of AGI, so data above and below this line not strictly comparable
1987 $369 $92 $160 $46 $205 $79 $284 $63 $347 $22
1988 $413 $114 $188 $48 $236 $85 $321 $68 $389 $24
1989 $433 $109 $190 $51 $241 $93 $334 $73 $408 $25
1990 $447 $112 $195 $52 $248 $97 $344 $77 $421 $26
1991 $448 $111 $194 $56 $250 $96 $347 $77 $424 $25
1992 $476 $131 $218 $58 $276 $97 $374 $78 $452 $24
1993 $503 $146 $238 $60 $298 $101 $399 $80 $479 $24
1994 $535 $154 $254 $64 $318 $108 $425 $84 $509 $25
1995 $588 $178 $288 $70 $357 $115 $473 $88 $561 $27
1996 $658 $213 $335 $76 $411 $124 $535 $95 $630 $28
1997 $727 $241 $377 $82 $460 $134 $594 $102 $696 $31
1998 $788 $274 $425 $88 $513 $139 $652 $103 $755 $33
1999 $877 $317 $486 $97 $583 $150 $733 $109 $842 $35
2000 $981 $367 $554 $106 $660 $164 $824 $118 $942 $38
The IRS changed methodology, so data above and below this line not strictly comparable
2001 $885 $139 $294 $462 $101 $564 $158 $722 $120 $842 $43
2002 $794 $120 $263 $420 $93 $513 $143 $657 $104 $761 $33
2003 $746 $115 $251 $399 $85 $484 $133 $617 $98 $715 $30
2004 $829 $142 $301 $467 $91 $558 $137 $695 $102 $797 $32
2005 $932 $176 $361 $549 $98 $647 $145 $793 $106 $898 $33
2006 $1,020 $196 $402 $607 $108 $715 $157 $872 $113 $986 $35
2007 $1,112 $221 $443 $666 $117 $783 $170 $953 $122 $1,075 $37
2008 $1,029 $187 $386 $597 $115 $712 $168 $880 $117 $997 $32
2009 $863 $146 $314 $502 $101 $604 $146 $749 $93 $842 $21
2010 $949 $170 $355 $561 $110 $670 $156 $827 $100 $927 $22
2011 $1,043 $168 $366 $589 $123 $712 $181 $893 $120 $1,012 $30
2012 $1,185 $220 $451 $699 $133 $831 $193 $1,024 $128 $1,152 $33
2013 $1,232 $228 $466 $721 $139 $860 $203 $1,063 $135 $1,198 $34
2014 $1,374 $273 $543 $824 $150 $974 $219 $1,193 $144 $1,337 $38
Year Total Top 0.1% Top 1% Top 5% Between 5% & 10% Top 10% Between 10% & 25% Top 25% Between 25% & 50% Top 50% Bottom 50%
Table 5. Adjusted Gross Income Shares, 1980–2014 (percent of total AGI earned by each group)
Source: Internal Revenue Service.
1980 100% 8.46% 21.01% 11.12% 32.13% 24.57% 56.70% 25.62% 82.32% 17.68%
1981 100% 8.30% 20.78% 11.20% 31.98% 24.69% 56.67% 25.59% 82.25% 17.75%
1982 100% 8.91% 21.23% 11.03% 32.26% 24.53% 56.79% 25.50% 82.29% 17.71%
1983 100% 9.29% 21.74% 11.04% 32.78% 24.44% 57.22% 25.30% 82.52% 17.48%
1984 100% 9.66% 22.19% 11.06% 33.25% 24.31% 57.56% 25.00% 82.56% 17.44%
1985 100% 10.03% 22.67% 11.10% 33.77% 24.21% 57.97% 24.77% 82.74% 17.26%
1986 100% 11.30% 24.11% 11.02% 35.12% 23.92% 59.04% 24.30% 83.34% 16.66%
The Tax Reform Act of 1986 changed the definition of AGI, so data above and below this line not strictly comparable
1987 100% 12.32% 25.67% 11.23% 36.90% 23.85% 60.75% 23.62% 84.37% 15.63%
1988 100% 15.16% 28.51% 10.94% 39.45% 22.99% 62.44% 22.63% 85.07% 14.93%
1989 100% 14.19% 27.84% 11.16% 39.00% 23.28% 62.28% 22.76% 85.04% 14.96%
1990 100% 14.00% 27.62% 11.15% 38.77% 23.36% 62.13% 22.84% 84.97% 15.03%
1991 100% 12.99% 26.83% 11.37% 38.20% 23.65% 61.85% 23.01% 84.87% 15.13%
1992 100% 14.23% 28.01% 11.21% 39.23% 23.25% 62.47% 22.61% 85.08% 14.92%
1993 100% 13.79% 27.76% 11.29% 39.05% 23.40% 62.45% 22.63% 85.08% 14.92%
1994 100% 13.80% 27.85% 11.34% 39.19% 23.45% 62.64% 22.48% 85.11% 14.89%
1995 100% 14.60% 28.81% 11.35% 40.16% 23.21% 63.37% 22.09% 85.46% 14.54%
1996 100% 16.04% 30.36% 11.23% 41.59% 22.73% 64.32% 21.60% 85.92% 14.08%
1997 100% 17.38% 31.79% 11.03% 42.83% 22.22% 65.05% 21.11% 86.16% 13.84%
1998 100% 18.47% 32.85% 10.92% 43.77% 21.87% 65.63% 20.69% 86.33% 13.67%
1999 100% 19.51% 34.04% 10.85% 44.89% 21.57% 66.46% 20.29% 86.75% 13.25%
2000 100% 20.81% 35.30% 10.71% 46.01% 21.15% 67.15% 19.86% 87.01% 12.99%
The IRS changed methodology, so data above and below this line not strictly comparable
2001 100% 8.05% 17.41% 31.61% 10.89% 42.50% 21.80% 64.31% 21.29% 85.60% 14.40%
2002 100% 7.04% 16.05% 30.29% 11.04% 41.33% 22.39% 63.71% 21.79% 85.50% 14.50%
2003 100% 7.56% 16.73% 30.99% 11.03% 42.01% 22.33% 64.34% 21.52% 85.87% 14.13%
2004 100% 9.14% 18.99% 33.31% 10.77% 44.07% 21.60% 65.68% 20.83% 86.51% 13.49%
2005 100% 10.64% 21.19% 35.61% 10.56% 46.17% 20.90% 67.07% 19.99% 87.06% 12.94%
2006 100% 11.23% 22.10% 36.62% 10.56% 47.17% 20.73% 67.91% 19.68% 87.58% 12.42%
2007 100% 11.95% 22.86% 37.39% 10.49% 47.88% 20.53% 68.41% 19.40% 87.81% 12.19%
2008 100% 10.06% 20.19% 34.95% 11.03% 45.98% 21.71% 67.69% 20.39% 88.08% 11.92%
2009 100% 7.94% 17.21% 32.18% 11.59% 43.77% 22.96% 66.74% 21.38% 88.12% 11.88%
2010 100% 9.24% 18.87% 33.78% 11.38% 45.17% 22.38% 67.55% 20.71% 88.26% 11.74%
2011 100% 8.86% 18.70% 33.89% 11.50% 45.39% 22.43% 67.82% 20.63% 88.45% 11.55%
2012 100% 11.25% 21.86% 36.84% 11.03% 47.87% 21.39% 69.25% 19.64% 88.90% 11.10%
2013 100% 9.03% 19.04% 34.42% 11.45% 45.87% 22.23% 68.10% 20.41% 88.51% 11.49%
2014 100% 10.16% 20.58% 35.96% 11.25% 47.21% 21.70% 68.91% 19.82% 88.73% 11.27%
Year Total Top 0.1% Top 1% Top 5% Between 5% & 10% Top 10% Between 10% & 25% Top 25% Between 25% & 50% Top 50% Bottom 50%
Table 6. Total Income Tax Shares, 1980–2014 (percent of federal income tax paid by each group)
Source: Internal Revenue Service.
1980 100% 19.05% 36.84% 12.44% 49.28% 23.74% 73.02% 19.93% 92.95% 7.05%
1981 100% 17.58% 35.06% 12.90% 47.96% 24.33% 72.29% 20.26% 92.55% 7.45%
1982 100% 19.03% 36.13% 12.45% 48.59% 23.91% 72.50% 20.15% 92.65% 7.35%
1983 100% 20.32% 37.26% 12.44% 49.71% 23.39% 73.10% 19.73% 92.83% 7.17%
1984 100% 21.12% 37.98% 12.58% 50.56% 22.92% 73.49% 19.16% 92.65% 7.35%
1985 100% 21.81% 38.78% 12.67% 51.46% 22.60% 74.06% 18.77% 92.83% 7.17%
1986 100% 25.75% 42.57% 12.12% 54.69% 21.33% 76.02% 17.52% 93.54% 6.46%
The Tax Reform Act of 1986 changed the definition of AGI, so data above and below this line not strictly comparable
1987 100% 24.81% 43.26% 12.35% 55.61% 21.31% 76.92% 17.02% 93.93% 6.07%
1988 100% 27.58% 45.62% 11.66% 57.28% 20.57% 77.84% 16.44% 94.28% 5.72%
1989 100% 25.24% 43.94% 11.85% 55.78% 21.44% 77.22% 16.94% 94.17% 5.83%
1990 100% 25.13% 43.64% 11.73% 55.36% 21.66% 77.02% 17.16% 94.19% 5.81%
1991 100% 24.82% 43.38% 12.45% 55.82% 21.46% 77.29% 17.23% 94.52% 5.48%
1992 100% 27.54% 45.88% 12.12% 58.01% 20.47% 78.48% 16.46% 94.94% 5.06%
1993 100% 29.01% 47.36% 11.88% 59.24% 20.03% 79.27% 15.92% 95.19% 4.81%
1994 100% 28.86% 47.52% 11.93% 59.45% 20.10% 79.55% 15.68% 95.23% 4.77%
1995 100% 30.26% 48.91% 11.84% 60.75% 19.62% 80.36% 15.03% 95.39% 4.61%
1996 100% 32.31% 50.97% 11.54% 62.51% 18.80% 81.32% 14.36% 95.68% 4.32%
1997 100% 33.17% 51.87% 11.33% 63.20% 18.47% 81.67% 14.05% 95.72% 4.28%
1998 100% 34.75% 53.84% 11.20% 65.04% 17.65% 82.69% 13.10% 95.79% 4.21%
1999 100% 36.18% 55.45% 11.00% 66.45% 17.09% 83.54% 12.46% 96.00% 4.00%
2000 100% 37.42% 56.47% 10.86% 67.33% 16.68% 84.01% 12.08% 96.09% 3.91%
The IRS changed methodology, so data above and below this line not strictly comparable
2001 100% 15.68% 33.22% 52.24% 11.44% 63.68% 17.88% 81.56% 13.54% 95.10% 4.90%
2002 100% 15.09% 33.09% 52.86% 11.77% 64.63% 18.04% 82.67% 13.12% 95.79% 4.21%
2003 100% 15.37% 33.69% 53.54% 11.35% 64.89% 17.87% 82.76% 13.17% 95.93% 4.07%
2004 100% 17.12% 36.28% 56.35% 10.96% 67.30% 16.52% 83.82% 12.31% 96.13% 3.87%
2005 100% 18.91% 38.78% 58.93% 10.52% 69.46% 15.61% 85.07% 11.35% 96.41% 3.59%
2006 100% 19.24% 39.36% 59.49% 10.59% 70.08% 15.41% 85.49% 11.10% 96.59% 3.41%
2007 100% 19.84% 39.81% 59.90% 10.51% 70.41% 15.30% 85.71% 10.93% 96.64% 3.36%
2008 100% 18.20% 37.51% 58.06% 11.14% 69.20% 16.37% 85.57% 11.33% 96.90% 3.10%
2009 100% 16.91% 36.34% 58.17% 11.72% 69.89% 16.85% 86.74% 10.80% 97.54% 2.46%
2010 100% 17.88% 37.38% 59.07% 11.55% 70.62% 16.49% 87.11% 10.53% 97.64% 2.36%
2011 100% 16.14% 35.06% 56.49% 11.77% 68.26% 17.36% 85.62% 11.50% 97.11% 2.89%
2012 100% 18.60% 38.09% 58.95% 11.22% 70.17% 16.25% 86.42% 10.80% 97.22% 2.78%
2013 100% 18.48% 37.80% 58.55% 11.25% 69.80% 16.47% 86.27% 10.94% 97.22% 2.78%
2014 100% 19.85% 39.48% 59.97% 10.91% 70.88% 15.90% 86.78% 10.47% 97.25% 2.75%
Year Total Top 1% Top 5% Top 10% Top 25% Top 50%
Table 7. Dollar Cut-Off, 1980–2014 (Minimum AGI for Tax Returns to Fall into Various Percentiles; Thresholds Not Adjusted for Inflation)
1980 $80,580 $43,792 $35,070 $23,606 $12,936
1981 $85,428 $47,845 $38,283 $25,655 $14,000
1982 $89,388 $49,284 $39,676 $27,027 $14,539
1983 $93,512 $51,553 $41,222 $27,827 $15,044
1984 $100,889 $55,423 $43,956 $29,360 $15,998
1985 $108,134 $58,883 $46,322 $30,928 $16,688
1986 $118,818 $62,377 $48,656 $32,242 $17,302
The Tax Reform Act of 1986 changed the definition of AGI, so data above and below this line not strictly comparable
1987 $139,289 $68,414 $52,921 $33,983 $17,768
1988 $157,136 $72,735 $55,437 $35,398 $18,367
1989 $163,869 $76,933 $58,263 $36,839 $18,993
1990 $167,421 $79,064 $60,287 $38,080 $19,767
1991 $170,139 $81,720 $61,944 $38,929 $20,097
1992 $181,904 $85,103 $64,457 $40,378 $20,803
1993 $185,715 $87,386 $66,077 $41,210 $21,179
1994 $195,726 $91,226 $68,753 $42,742 $21,802
1995 $209,406 $96,221 $72,094 $44,207 $22,344
1996 $227,546 $101,141 $74,986 $45,757 $23,174
1997 $250,736 $108,048 $79,212 $48,173 $24,393
1998 $269,496 $114,729 $83,220 $50,607 $25,491
1999 $293,415 $120,846 $87,682 $52,965 $26,415
2000 $313,469 $128,336 $92,144 $55,225 $27,682
The IRS changed methodology, so data above and below this line not strictly comparable
2001 $1,393,718 $306,635 $132,082 $96,151 $59,026 $31,418
2002 $1,245,352 $296,194 $130,750 $95,699 $59,066 $31,299
2003 $1,317,088 $305,939 $133,741 $97,470 $59,896 $31,447
2004 $1,617,918 $339,993 $140,758 $101,838 $62,794 $32,622
2005 $1,938,175 $379,261 $149,216 $106,864 $64,821 $33,484
2006 $2,124,625 $402,603 $157,390 $112,016 $67,291 $34,417
2007 $2,251,017 $426,439 $164,883 $116,396 $69,559 $35,541
2008 $1,867,652 $392,513 $163,512 $116,813 $69,813 $35,340
2009 $1,469,393 $351,968 $157,342 $114,181 $68,216 $34,156
2010 $1,634,386 $369,691 $161,579 $116,623 $69,126 $34,338
2011 $1,717,675 $388,905 $167,728 $120,136 $70,492 $34,823
2012 $2,161,175 $434,682 $175,817 $125,195 $73,354 $36,055
2013 $1,860,848 $428,713 $179,760 $127,695 $74,955 $36,841
2014 $2,136,762 $465,626 $188,996 $133,445 $77,714 $38,173
Source: Internal Revenue Service.
Year Total Top 0.1% Top 1% Top 5% Between 5% & 10% Top 10% Between 10% & 25% Top 25% Between 25% & 50% Top 50% Bottom 50%
Table 8. Average Tax Rate, 1980–2014 (Percent of AGI Paid in Income Taxes)
Source: Internal Revenue Service.
1980 15.31% 34.47% 26.85% 17.13% 23.49% 14.80% 19.72% 11.91% 17.29% 6.10%
1981 15.76% 33.37% 26.59% 18.16% 23.64% 15.53% 20.11% 12.48% 17.73% 6.62%
1982 14.72% 31.43% 25.05% 16.61% 22.17% 14.35% 18.79% 11.63% 16.57% 6.10%
1983 13.79% 30.18% 23.64% 15.54% 20.91% 13.20% 17.62% 10.76% 15.52% 5.66%
1984 13.68% 29.92% 23.42% 15.57% 20.81% 12.90% 17.47% 10.48% 15.35% 5.77%
1985 13.73% 29.86% 23.50% 15.69% 20.93% 12.83% 17.55% 10.41% 15.41% 5.70%
1986 14.54% 33.13% 25.68% 15.99% 22.64% 12.97% 18.72% 10.48% 16.32% 5.63%
The Tax Reform Act of 1986 changed the definition of AGI, so data above and below this line not strictly comparable
1987 13.12% 26.41% 22.10% 14.43% 19.77% 11.71% 16.61% 9.45% 14.60% 5.09%
1988 13.21% 24.04% 21.14% 14.07% 19.18% 11.82% 16.47% 9.60% 14.64% 5.06%
1989 13.12% 23.34% 20.71% 13.93% 18.77% 12.08% 16.27% 9.77% 14.53% 5.11%
1990 12.95% 23.25% 20.46% 13.63% 18.50% 12.01% 16.06% 9.73% 14.36% 5.01%
1991 12.75% 24.37% 20.62% 13.96% 18.63% 11.57% 15.93% 9.55% 14.20% 4.62%
1992 12.94% 25.05% 21.19% 13.99% 19.13% 11.39% 16.25% 9.42% 14.44% 4.39%
1993 13.32% 28.01% 22.71% 14.01% 20.20% 11.40% 16.90% 9.37% 14.90% 4.29%
1994 13.50% 28.23% 23.04% 14.20% 20.48% 11.57% 17.15% 9.42% 15.11% 4.32%
1995 13.86% 28.73% 23.53% 14.46% 20.97% 11.71% 17.58% 9.43% 15.47% 4.39%
1996 14.34% 28.87% 24.07% 14.74% 21.55% 11.86% 18.12% 9.53% 15.96% 4.40%
1997 14.48% 27.64% 23.62% 14.87% 21.36% 12.04% 18.18% 9.63% 16.09% 4.48%
1998 14.42% 27.12% 23.63% 14.79% 21.42% 11.63% 18.16% 9.12% 16.00% 4.44%
1999 14.85% 27.53% 24.18% 15.06% 21.98% 11.76% 18.66% 9.12% 16.43% 4.48%
2000 15.26% 27.45% 24.42% 15.48% 22.34% 12.04% 19.09% 9.28% 16.86% 4.60%
The IRS changed methodology, so data above and below this line not strictly comparable
2001 14.47% 28.17% 27.60% 23.91% 15.20% 21.68% 11.87% 18.35% 9.20% 16.08% 4.92%
2002 13.28% 28.48% 27.37% 23.17% 14.15% 20.76% 10.70% 17.23% 8.00% 14.87% 3.86%
2003 12.11% 24.60% 24.38% 20.92% 12.46% 18.70% 9.69% 15.57% 7.41% 13.53% 3.49%
2004 12.31% 23.06% 23.52% 20.83% 12.53% 18.80% 9.41% 15.71% 7.27% 13.68% 3.53%
2005 12.65% 22.48% 23.15% 20.93% 12.61% 19.03% 9.45% 16.04% 7.18% 14.01% 3.51%
2006 12.80% 21.94% 22.80% 20.80% 12.84% 19.02% 9.52% 16.12% 7.22% 14.12% 3.51%
2007 12.90% 21.42% 22.46% 20.66% 12.92% 18.96% 9.61% 16.16% 7.27% 14.19% 3.56%
2008 12.54% 22.67% 23.29% 20.83% 12.66% 18.87% 9.45% 15.85% 6.97% 13.79% 3.26%
2009 11.39% 24.28% 24.05% 20.59% 11.53% 18.19% 8.36% 14.81% 5.76% 12.61% 2.35%
2010 11.81% 22.84% 23.39% 20.64% 11.98% 18.46% 8.70% 15.22% 6.01% 13.06% 2.37%
2011 12.54% 22.82% 23.50% 20.89% 12.83% 18.85% 9.70% 15.82% 6.98% 13.76% 3.13%
2012 13.11% 21.67% 22.83% 20.97% 13.33% 19.21% 9.96% 16.35% 7.21% 14.33% 3.28%
2013 13.64% 27.91% 27.08% 23.20% 13.40% 20.75% 10.11% 17.28% 7.31% 14.98% 3.30%
2014 14.16% 27.67% 27.16% 23.61% 13.73% 21.25% 10.37% 17.83% 7.48% 15.52% 3.45%
  1. For data prior to 2001, all tax returns that have a positive AGI are included, even those that do not have a positive income tax liability. For data from 2001 forward, returns with negative AGI are also included, but dependent returns are excluded.
  2. Income tax after credits (the measure of “income taxes paid” above) does not account for the refundable portion of EITC. If it were included, the tax share of the top income groups would be higher. The refundable portion is classified as a spending program by the Office of Management and Budget and therefore is not included by the IRS in these figures.
  3. The only tax analyzed here is the federal individual income tax, which is responsible for more than 25 percent of the nation’s taxes paid (at all levels of government). Federal income taxes are much more progressive than federal payroll taxes, which are responsible for about 20 percent of all taxes paid (at all levels of government), and are more progressive than most state and local taxes.
  4. AGI is a fairly narrow income concept and does not include income items like government transfers (except for the portion of Social Security benefits that is taxed), the value of employer-provided health insurance, underreported or unreported income (most notably that of sole proprietors), income derived from municipal bond interest, net imputed rental income, and others.
  5. The unit of analysis here is that of the tax return. In the figures prior to 2001, some dependent returns are included. Under other units of analysis (like the Treasury Department’s Family Economic Unit), these returns would likely be paired with parents’ returns.
  6. These figures represent the legal incidence of the income tax. Most distributional tables (such as those from CBO, Tax Policy Center, Citizens for Tax Justice, the Treasury Department, and JCT) assume that the entire economic incidence of personal income taxes falls on the income earner.

[1] Individual Income Tax Rates and Tax Shares, Internal Revenue Service Statistics of Income, http://www.irs.gov/uac/SOI-Tax-Stats-Individual-Income-Tax-Rates-and-Tax-Shares.

[2] See Congressional Budget Office, The Budget and Economic Outlook: 2017 to 2027, Jan. 2017, https://www.cbo.gov/sites/default/files/115th-congress-2017-2018/reports/52370-outlook.pdf.

[3] There is strong reason to believe that capital gains realizations were unusually depressed in 2013, due to the increase in the top capital gains tax rate from 15 percent to 23.8 percent. In 2013, capital gains accounted for 26.6 percent of the income of taxpayers with over $1 million in AGI received, compared to 31.7 percent in 2014 (these calculations apply for net capital gains reported on Schedule D). Table 1.4, Publication 1304, “Individual Income Tax Returns 2014,” Internal Revenue Service, https://www.irs.gov/uac/soi-tax-stats-individual-income-tax-returns-publication-1304-complete-report.

[4] Here, “average income tax rate” is defined as income taxes paid divided by adjusted gross income.


Download Summary of the Latest Federal Income Tax Data, 2016 Update (PDF) Download Summary of the Latest Federal Income Tax Data, 2016 Update (EXCEL)

https://taxfoundation.org/summary-latest-federal-income-tax-data-2016-update/

Federal Spending, Budget, and Debt

 

THE ISSUE


In 2015, the national debt reached $18.8 trillion and exceeded 100 percent of everything the economy produced in goods and services, as defined by gross domestic product (GDP). Publicly held debt (the debt borrowed in credit markets, excluding Social Security’s trust fund, for example) is alarmingly high at 74 percent of GDP. These high debt levels were last seen after the U.S. had engaged in wartime spending following World War II. However, if mandatory spending—especially health care spending—continues to grow faster than the economy, then the level of debt will grow even higher.

High federal debt puts the United States at risk for a number of harmful economic consequences, including slower economic growth, a weakened ability to respond to unexpected challenges, and possibly a debt-driven financial crisis. Furthermore, most of the debt issued is to pay for more consumption spending. Unlike spending on investments, consumption financed through debt will lower the standard of living for future generations.

Deficits fell in 2015 primarily because the economy is slowly improving, which brings in additional revenues and lowers spending on countercyclical programs like the Supplemental Nutrition Assistance Program (SNAP or food stamps). Also, discretionary spending caps implemented under the Budget Control Act of 2011 helped restrain the growth in spending. Finally, deficits during the recession were also partly driven by the stimulus bill and other temporary measures.

Lawmakers should not take this short-term and modest deficit improvement as a signal to grow complacent about reining in exploding spending. Deficits are on the rise again, beginning in 2016, and within a decade they are projected to exceed $1 trillion annually. The Congressional Budget Office projects that interest on the debt alone will exceed the nation’s defense budget (not including spending on war or other emergencies) before the end of the decade.

The nation’s long-term spending trajectory remains on a fiscal collision course. Total spending has exploded by 25 percent since 2004, even after inflation, and some programs have grown far more than that. Defense spending, however, is being cut. Social Security, Medicare, and Medicaid are so large and growing that they are on track to overwhelm the federal budget. These major entitlement programs, together with interest on the debt, are driving 85 percent of the projected growth in government spending over the next decade. The Affordable Care Act, or Obamacare, further adds to the problem, increasing entitlement spending by nearly $2 trillion in just 10 years. The long-term unfunded obligations in the nation’s major entitlement programs loom like an even darker cloud over the U.S. economy. Demographic and economic factors will combine to drive spending in Medicare, Medicaid (including Obamacare), and Social Security to unsustainable heights. The major entitlements and interest on the debt are on track to devour all tax revenues in fewer than 20 years.

solutions_2016_federal-budget-1

Over the 75-year long-term horizon, the combined unfunded obligations arising from promised benefits in Medicare and Social Security alone exceed $50 trillion. The federal unfunded obligations arising from Medicaid, and even from veterans’ benefits, are unknown but would likely add many trillions more to this figure. By some estimates, the U.S. federal government’s combined unfunded obligations already exceed $200 trillion in today’s dollars. Figures such as these are simply unfathomable.

While the Budget Control Act of 2011 and sequestration are modestly restraining the discretionary budget, Congress continues to fund too many programs that represent corporate welfare. Corporate welfare and crony capitalism waste taxpayer resources by spending resources taken for the public benefit on a narrower, well-connected interest group instead. Taxation creates economic distortions. Excess taxation, that goes beyond what is necessary to pay for constitutional government, needlessly wastes taxpayer and economic resources. Every dollar spent by the federal government for the benefit of a well-connected interest group is a dollar that is no longer available to American families and businesses to spend and invest to meet their own needs and wants. Corporate welfare spending is especially morally concerning when government spends resources that belong to the next generation of Americans to fund consumption spending today—or, in other words, when spending makes current Americans better off at the expense of future Americans.

solutions_2016_federal-budget-2

Moreover, mandatory or automatic spending—especially on entitlements—continues to grow nearly unabated. Without any changes, mandatory spending, including net interest, will consume three-fourths of the budget in just one decade.

If Washington fails to begin the important reform process, we could one day find ourselves teetering on the edge of a Greece-style meltdown. To forestall such an eventuality, lawmakers should eliminate waste, duplication, and inappropriate spending; privatize functions better left to the private sector; and leave areas best managed on the local level to states and localities. They should change the entitlement programs so that they become more affordable and help those with the greatest needs. Congress should also fully fund national defense—a core constitutional function of government. Lawmakers should build on the success of the Budget Control Act of 2011 by limiting all non-interest spending with a firm cap that targets those spending levels necessary to reach balance before the end of the decade.

It is not too late to solve the growing spending and debt crisis, but the clock is ticking.

 

RECOMMENDATIONS


Cut Spending Now and Enforce Spending Caps. Congress should cut non-defense discretionary spending, first by enforcing the Budget Control Act’s spending caps with sequestration. Next, Congress should eliminate federal spending for programs that are unneeded or can hardly be considered federal priorities and are more appropriate for state and local governments or the private sector, like federal energy subsidies and loan guarantees to businesses. Examples of areas where cuts can be made include:

  • TIGER grants (National Infrastructure Investment Grants);
  • The Market Access Program;
  • The New Starts Program;
  • The Technology Innovation Program; and
  • Department of Energy (DOE) loan programs and loan guarantees.

Reject Tax Hikes and Pursue Growth-Oriented Tax Reform. There is a growing consensus that a simpler, flatter tax code—one with fewer, lower marginal rates and only essential deductions—is one of the best ways to promote growth. Heritage analysts favor an even bolder approach with a single rate on spent income. In any case, as long as government must tax, it should do so with the least possible burden on and interference with free-market choices. Higher taxes on small businesses and on investment capital always weaken the economy. Revenue will grow when the economy grows, but higher spending and taxes will reduce growth. The most effective way to spur economic recovery is to increase the incentives that drive growth.

Reform Entitlements. Congress should begin by repealing Obamacare, which would add nearly $2 trillion to federal spending over the decade. The costs of Medicare, Medicaid, and Social Security are on course to overwhelm the federal budget. Every year of delay raises the cost of reform and gives near-retirees less time to adjust their retirement strategies. Lawmakers should restructure these programs by changing the incentives that drive their excessive spending. Then Congress should take these programs off autopilot and set a budget for each major entitlement with an obligation to adjust them as necessary to keep each program within budget and protected from insolvency.

Empower the States and the Private Sector. Since the beginning of the 20th century, the federal government’s domestic activities have expanded well beyond what the Founders envisioned, leading to ever more centralized government, smothering the creativity of states and localities, and pushing federal spending to its current unsustainable levels. Even when Washington allows states to administer the programs, it taxes families, subtracts a hefty administrative cost, and sends the remaining revenues back to state and local governments with specific rules dictating how they may and may not spend the money.

solutions_2016_federal-budget-3

Instead of performing many functions poorly, Congress should focus on the limited set of functions intrinsic to the federal government’s responsibilities. Most highway, education, justice, and economic development programs should be devolved to state and local governments, which have the flexibility to tailor local programs to local needs. Government ownership of business also crowds out private companies and encourages protected entities to take unnecessary risks. After promising profits, government-owned businesses frequently lose billions of dollars, leaving taxpayers to foot the bill. Any government function that can also be found in the yellow pages may be a candidate for privatization.

Reform the Federal Budget Process. The federal budget’s focus on just 10 years ahead diverts lawmakers from dealing with the mounting long-term challenges, such as retirement programs. Likewise, the lack of firm budget controls and enforcement procedures makes fiscal discipline easy to evade. Reforming the budget process is therefore an implicit part of reforming the budget itself. Congress should estimate and publish the projected cost over 75 years of any proposed policy or funding level for each significant federal program. Any major policy change should also be scored over this long-term horizon. In addition to calculating the costs of proposed congressional actions without regard to the economy’s response to those actions (known as “static” scoring), the government should require a parallel calculation that takes that response into account (known as “dynamic” scoring) to make more practical and useful fiscal information available to Congress when it decides whether to pursue certain actions.

Although Congress must make substantial cuts in current and future spending, it must not compromise its first constitutional responsibility: to ensure that national defense is fully funded to protect America and its interests at home and around the globe.

 

FACTS AND FIGURES


  • Government spending per household reached $29,867 in 2015 and is projected to rise by over 50 percent in only one decade to $48,088 per household in 2025.
  • No American family could spend and borrow as Congress does. If it could, a median-income family with $54,000 in yearly earnings would spend $61,000 in 2013, putting $7,000 on a credit card. This family’s total debt would already be over $300,000.
  • To set aside enough money today to pay the current debt and future unfunded costs just from Social Security and Medicare, each person in America today, including their children, would owe more than $210,000.
  • At $18.8 trillion, the national debt now amounts to $125,000 for every tax-filing household in America.

 

SELECTED ADDITIONAL RESOURCES


David S. Addington, “Federal Budget: What Congress Must Do to Control Spending and Create Jobs,” Heritage Foundation Issue Brief No. 3538, March 14, 2012.

Romina Boccia, “7 Priorities for the 2016 Congressional Budget Resolution,” Heritage Foundation Issue Brief No. 4635, March 11, 2015.

Romina Boccia, “Debt Limit: Options and the Way Forward,” Heritage Foundation Backgrounder No. 2844, September 18, 2013.

Romina Boccia, “How the United States’ High Debt Will Weaken the Economy and Hurt Americans,” Heritage Foundation Backgrounder No. 2768, February 12, 2013.

Romina Boccia, “A Scary Thought: Could America Become the Next Greece?” originally published in the National Interest, July 16, 2015.

John Gray, “The Appropriations Process: Spending Caps Explained,” Heritage Foundation Issue Brief No. 4434, July 20, 2015.

Paul Winfree, Romina Boccia, Curtis S. Dubay, and Michael Sargent, “Blueprint for Congressional Fiscal Action in the Remainder of 2015,” Heritage Foundation Backgrounder No. 3052, September 2, 2015.

http://solutions.heritage.org/the-economy/federal-spending-budget-and-debt/

A Blueprint for Balance: A Federal Budget for 2017

February 23, 2016 2 min read Download Report
The Heritage Foundation

Select a Section 1/0

The Blueprint for Balance provides detailed recommendations for the annual congressional budget. Congress needs to drive down spending – including through reform of entitlement programs – to a balanced budget, while maintaining a strong national defense, and without raising taxes.

While Congress cannot solve everything at once, it can and must take opportunities through the annual budget and appropriations process to make a down payment of putting the government’s finances back in order. They can do this by immediately reducing discretionary spending and taking meaningful steps to reduce mandatory spending by reforming those programs.

The Blueprint:

  • Balances the budget while reducing taxes. The Blueprint reaches primary balance (i.e., without including interest of the debt) within the first year and eliminates deficits by 2023 without counting any benefits from growing the economy (that would result in balance even sooner). The budget stays in surplus while allowing the nation to begin reducing the national debt. It does this while completely eliminating over $1.3 trillion in the tax revenues included in Obamacare.
  • Reforms Entitlement Programs. Entitlement spending is growing on autopilot, consuming more and more of the federal budget each year. Tens of trillions in unfunded obligations are threatening younger generations with massive tax increases and undue burdens of debt. This blueprint would: repeal Obamacare; modernize Medicare by transitioning to a premium-support system and making key reforms to meet  demographic, fiscal, and structural challenges;  cap the federal allotment for Medicaid and give states greater flexibility in designing benefits and administering the program;  and make common sense reforms to Social Security to ensure seniors are protected from poverty in retirement while accounting for increased life expectancy and reducing the growth in benefits.
  • Reduces the National Debt. The Blueprint would reduce debt held by the public by $9.3 trillion over the decade, when compared to current Congressional Budget Office projections. As a percentage of the economy, debt would fall from a projected 75.6% in 2016 to a more sustainable rate of 52.5% in 2026, and continue falling from there.
  • Responsibly Brings Spending Under Control. The federal government cannot continue to spend at a rate faster than the economy grows. Over the next decade, the Heritage budget would reduce the growth in spending to an average rate of 1.7% annually, well below the nearly 5% annual growth rate under CBO’s baseline projection.
  • Reigns in Interest Spending. Net interest spending is projected to quadruple over the next decade if no action is taken. By 2024 the nation would be spending more on interest payments on the debt than on national defense. By stabilizing the debt, this budget reins in the cost of servicing the debt, freeing up resources for other national priorities.
  • Fully Funds National Defense. The Blueprint prioritizes national defense capabilities by moving resources from less critical domestic programs to funding the federal government’s core constitutional role fully. With continued and rising tensions across all corners of the globe, fully funding national defense must be a top priority.
  • Provides the Framework for Budget Process Reform. The Blueprint takes immediate steps towards implementing change in the budget process. These include: enacting a statutory spending cap enforced by sequestration to curb excessive spending growth; moving  towards a balanced budget amendment to constrain future attempts at circumventing budget caps; eliminating the use of changes in mandatory programs (CHIMPs) as a tool to evade discretionary spending limits; stopping spending on unauthorized programs and reducing spending for those programs that Congress reauthorizes; putting government-sponsored enterprises (GSEs) on budget to accurately account for the budgetary impacts and risks of these programs; and implementing use fair-value accounting to more accurately report the risks Congress assumes and the subsidies it provides through federal credit programs, like student loans.

Authors

The Heritage Foundation

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 878-881

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 879, April 24, 2017, Story 1: The Elites vs. The People Not Nationalism vs. Internationalism — Decline and Fall Of The Socialist Welfare State — Videos — Story 2: President Trump’s Transparent Executive Orders — Videos

Posted on April 24, 2017. Filed under: American History, Banking System, Blogroll, Breaking News, Budgetary Policy, Coal, Communications, Congress, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Energy, European History, Federal Government, Fiscal Policy, France, Germany, Government, Government Dependency, Government Spending, Great Britain, Health Care, Health Care Insurance, History, House of Representatives, Illegal Immigration, Iran Nuclear Weapons Deal, IRS, Labor Economics, Law, Media, Medicare, Middle East, Monetary Policy, National Interest, Natural Gas, News, Obama, Oil, Philosophy, Photos, Politics, Polls, President Trump, Presidential Appointments, Public Sector Unions, Raymond Thomas Pronk, Regulation, Rule of Law, Scandals, Security, Senate, Social Networking, Social Security, Tax Policy, Taxation, Taxes, Terror, Terrorism, Trade Policy, Unemployment, Unions, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, Wall Street Journal, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

 

Image result for cartoons branco french elections round 1 April 23, 2017

 Image result for the political elitesImage result for cartoons trump executive orders

 

 

 

 

Story 1: The Elites vs. The People  Not Nationalism vs. Internationalism — Videos —

Image result for the ruling class angelo codevilla

Image result for the ruling class angelo codevilla

French election explained: Emmanuel Macron and Marine Le Pen go head to head

Nigel Farage on French election: Don’t write off Le Pen

[Video] Rush Limbaugh: French Election Mirrors U.S. 2016 Vote

As anti-establishment candidates advance, France’s political establishment unites against Le Pen

French election: What would Emmanuel Macron’s presidency mean for Britain? – BBC Newsnight

Published on Apr 24, 2017

Centrist Emmanuel Macron will face far-right leader Marine Le Pen in the second round of the French presidential election.To learn more about the presidential candidate, Evan Davis has met up with Benjamin Griveaux, Mr Macron’s campaign spokesman.

PODCAST: The French Election Results and Their Impact

Why the French Election Is Critical and What We Learn from Emmanuel Macron’s Movement Versus Party

Angelo Codevilla – Does America Have a Ruling Class?

The Revolution of America’s Regime

456. The Iron Fist of the Ruling Class | Angelo Codevilla

1. America’s Ruling Class

2. Has Homeland Security Been a Failure?

3. What’s Wrong with the CIA?

[youtube-https://www.youtube.com/watch?v=NC3eM4ZAYL4]

4. Are We Winning the “War on Terror”?

Who Are America’s Elites? – Ben Shapiro

Clinton’s ‘deplorable’ attack

Clinton ‘Basket of Deplorables’ Remark Draws Fire

Peter O’Toole – The Ruling Class

The Ruling Class (1972)

George Carlin – It’s a Big Club and You Ain’t In It! The American Dream

Image result for chart of parties in france 2017

Image result for chart of parties in france 2017

Official first round result

With 107 of 107 departements counted | At 17:58 CEST
Macron 24.01%
Le Pen 21.3%
Fillon 20.01%
Mélenchon 19.58%
Hamon 6.36%
Dupont-Aignan 4.7%
Lassalle 1.21%
Poutou 1.09%
Asselineau 0.92%
Arthaud 0.64%
Cheminade 0.18%

Marine Le Pen and Emmanuel Macron Advance

For the first time in modern French history, neither candidate is from a major party.

Emmanuel Macron casts his ballot in the first round of French presidential election at a polling station in Le Touquet, France on April 23, 2017.

Emmanuel Macron casts his ballot in the first round of French presidential election at a polling station in Le Touquet, France on April 23, 2017.Eric Feferberg / ReutersYASMEEN SERHANAPR 23, 2017

Macron and Le Pen’s strong showings Sunday, which saw an approximately 77 percent voter turnout (slightly lower than the 79 percent who voted in the first round in 2012), signaled a rebuke of the political establishment that has dominated French politics for decades. Macron launched his centrist party in August 2016 after he quit his role in President François Hollande’s Socialist government, and despite the party’s youth it boasts a quarter of a million members. Meanwhile, Le Pen’s FN secured the most votes it has ever received in its nearly half-century history, surpassing the 18-percent first-round finish it saw in 2012. 
Even Jean-Luc Mélenchon, the far-left candidate who ran under a movement called La France Insoumise, or “Unsubmissive France,” had his strongest performance to date. Though his last-minute surge in the polls wasn’t enough to propel him to the second round, he still managed to claim 19.5 percent of the vote, far surpassing the 11 percent he won during his first presidential bid in 2012.Republican candidate François Fillon also earned 19.5 percent of the vote, tying Mélenchon for third place. The center-right candidate and former prime minister enjoyed a comfortable lead early on in his campaign, but support wavered in January after his candidacy was embroiled by allegations he misused public funds to pay his wife, Penelope, and two of their children for parliamentary work they are alleged not to have performed. Fillon denied any wrongdoing, although the launch of a formal investigation into both him and his wife prompted several of his Republican allies to quit his campaign.Socialist candidate Benoît Hamon, who came in last of the main contenders with 6.2 percent of the vote, also suffered from fissures within his own party. Despite clinching a decisive victory during the January primary, Hamon failed to command the support of Socialist party leaders, many of whom, including former Prime Minister Manuel Valls, endorsed Macron instead. This, paired with the deeply unpopular presidency of Hollande and the competition of similarly far-left Mélenchon, made the ruling party’s poor showing all but certain. The results prompted the losing candidates to urge their supporters to back Macron. Hamon said there was a distinction between a political adversary and an “enemy of the Republic,” referring to Le Pen. Fillon warned that Le Pen would lead France to “ruin.”

 

The advancement of two non-traditional candidates will certainly have an impact on their ability to govern once they make it to the Élysée Palace. In the month following the presidential contest, French voters will return to the polls to elect members of the National Assembly, France’s lower but more powerful house of parliament. This election is particularly important because whoever becomes prime minister almost always comes from the party that controls the chamber and, at present, neither Le Pen’s FN (which claims two of the National Assembly’s 577 seats) or Macron’s En Marche (which claims none) are expected to command a majority. This makes cohabitation, in which the president must share power with the prime minister of a different party, almost certain. Though this power-sharing arrangement is not unprecedented in French political history, as Politico’s Pierre Briançon notes, it has never been a favorable one.

It reduces the head of state to a figurehead, akin to northern European monarchs or ceremonial presidents such as those of Germany or Italy. In those times, the prime minister holds most of the executive powers, save for those governing foreign policy and defense, which the constitution puts specifically in the president’s domain. …It has happened three times in postwar history — first from 1986 to 1988, when Socialist President François Mitterrand had to live with Jacques Chirac as prime minister. From 1993 to 1995, Mitterrand had to deal with another conservative premier, Édouard Balladur. And finally, from 1997 to 2002, President Chirac had to contend with Socialist Prime Minister Lionel Jospin.

Macron and Le Pen now have two weeks ahead of the runoff to court the voters who backed their former competitors, as well as the estimated one-third of French voters who are still undecided. From the recent terrorist attack in Paris to the country’s 10 percent unemployment rate, issues such as security and the economy will likely remain at the forefront of the contest.

https://www.theatlantic.com/news/archive/2017/04/french-election-results-first-round/523965/

Outsiders Emmanuel Macron and Marine Le Pen sweep to victory as France kicks out old guard: Europhile newcomer narrowly wins first vote to take on far-Right’s Madame Frexit for the presidency

  • Far-right leader Marine Le Pen and independent centrist Emmanuel Macron have made it to the second round 
  • 36.7million voted, a turnout of 78.2 per cent; Macron won 23.9 per cent of the vote, Le Pen 21.4 
  • Republican candidate Francois Fillon conceded after initial results showed he achieved 19.5 per cent of vote
  • Far-left leader Jean-Luc Melenchon refused to concede until final results of first-round vote announced
  • France’s Prime Minister, Bernard Cazeneuve, has called on voters to support Macron instead of Le Pen 
  • This is the first time in 60 years none of France’s mainstream parties have entered the second round
  • Riots broke out in Nantes and Paris’ Place de la Bastille – the birthplace of the French Revolution 

French voters turned their backs on the political establishment last night in round one of the presidential election.

Emmanuel Macron – an independent centrist – won first place ahead of National Front leader Marine Le Pen.

The result will have major implications for Britain and its departure from the EU.

Miss Le Pen wants to completely renegotiate France’s relationship with Brussels while Mr Macron wants closer links.

Scroll down for video 

Marine Le Pen

Emmanuel Macron

Marine Le Pen (left) and Emmanuel Macron (right) celebrated the initial results of the polls, which said they both made it to the second round of the election

Le Pen went to greet her supporters after the initial results and said: '‘This is a historic result. The French must take the step for this historic opportunity. This is the first step to drive the French [people] into the Elysee Palace'

Le Pen went to greet her supporters after the initial results and said: ”This is a historic result. The French must take the step for this historic opportunity. This is the first step to drive the French [people] into the Elysee Palace’

Supporters of Le Pen, leader of the French National Front, were seen waving their flags emblazoned with ‘Marine Presidente’ at her election headquarters in Henin-Beaumont, after the inital results were announced

Supporters of French centrist candidate Macron were also seen cheering in delight at the results and waving the French flag

Supporters of French centrist candidate Macron were also seen cheering in delight at the results and waving the French flag

Many people were seen hugging after initial results showed Macron winning 23.9 percent of the vote, beating France's two main parties

Many people were seen hugging after initial results showed Macron winning 23.9 percent of the vote, beating France’s two main parties

According to France’s Interior Ministry, 46 million people voted in the first stage of the elections which knocked the traditional Right and Left parties out of the running for the first time in 60 years.

With 97 per cent of the vote counted, Macron achieved 23.9 per cent, followed by Le Pen on 21.4. A total of 36.7million voted, a turnout of 78.2 per cent.

But it is thought that Le Pen’s chances of winning the second round are limited as supporters for Republican candidate Francois Fillon, who conceded but has gained 19.9 per cent of the votes, will support Macron.

However, far-left leader Jean-Luc Melenchon, who gained 19.6 per cent, refused to concede until the final results of first-round vote were announced. 

Macron took to the stage in Paris earlier, with his wife Brigitte, and urged national unity against Le Pen.

To chants of ‘Macron president!’ and ‘We’re going to win,’ Macron began his speech by paying tribute to his opponents, and praised his supporters for his lightning rise.

He said: ‘We have turned a page in French political history,’ and added he wants to gather ‘the largest possible’ support before May 7.

Macron acknowledged widespread anger at traditional parties and promised ‘new transformations’ in French politics.

At a rally last night, Le Pen told her supporters she is offering ‘the great alternative’ in the presidential race. 

Crowds celebrate as Macron & Le Pen expected go through to next round

She added: 'It is time to liberate the French people from the arrogant [political] elite.' Le Pen was later given a bunch of flowers

She added: ‘It is time to liberate the French people from the arrogant [political] elite.’ Le Pen was later given a bunch of flowers

Le Pen addresses supporters as she goes through to second round
She said: ‘This is a historic result. The French must take the step for this historic opportunity. This is the first step to drive the French [people] into the Elysee Palace.

‘It is time to liberate the French people from the arrogant [political] elite.’

Former favourite Fillon conceded and voiced his support for Macron after initial projections showed he and Melanchon got 19.5 per cent of the vote. 

Shortly afterwards, France’s Prime Minister, Bernard Cazeneuve, also called on voters to support Macron.

The outcome capped an extraordinary few months for a deeply divided France, which saw a campaign full of twists and turns and widespread anger at traditional parties.

It signals a stinging defeat for the Fillon and Socialist Benoit Hamon, meaning neither of France’s mainstream parties will be in the second round for the first time in 60 years.

Macron, a 39-year-old who had never before stood for election and only started his independent centrist movement 12 months ago, will be the overwhelming favourite to win the second round on May 7.

He served as an economy minister under President Francois Hollande, ran without the backing of an established party, forming his own called ‘En Marche!’.

His wife Brigitte is 25 years his senior and taught him at school.

Macron, a 39-year-old who had never before stood for election and only started his independent centrist movement, En Marche!, 12 months ago

Macron, a 39-year-old who had never before stood for election and only started his independent centrist movement, En Marche!, 12 months ago

Macron thanks supporters for campaign that changed French politics

He said he wants to gather 'the largest possible' support before the May 7 runoff. He praised his supporters for a campaign that 'changed the course of our country'

He said he wants to gather ‘the largest possible’ support before the May 7 runoff. He praised his supporters for a campaign that ‘changed the course of our country’

Macron acknowledged widespread anger at traditional parties and promised 'new transformations' in French politics

Macron acknowledged widespread anger at traditional parties and promised ‘new transformations’ in French politics

European Commission President Jean-Claude Juncker congratulated Macron on Sunday and wished the centrist well for the May 7 French presidential runoff against Le Pen.

‘Juncker congratulated Macron on his result in the first round and wished him all the best for the next round,’ Margaritis Schinas said on Twitter.

Underlining broad support for Macron among leaders of the European Union institutions in Brussels, EU foreign policy chief Federica Mogherini from the Italian centre-left added her congratulations to those of Juncker, a centre-right former prime minister of Luxembourg.

‘To see the flags of France and the EU hailing Emmanuel Macron’s result shows hope and the future of our generation,’ tweeted Mogherini, 43, after the 39-year-old Macron’s first-round victory speech to supporters was broadcast on television.

Last night he was congratulated by former Labour MP David Miliband and by former chancellor George Osborne.

Mr Miliband said: ‘Tremendous achievement by Emmanuel Macron. Bulwark against evil forces and tribune for modernization in France and Europe.’

Mr Osborne said: ‘Congratulations to my friend Emmanuel Macron. Proof you can win from the centre. At last the chance for the leadership that France needs.’

Fillon urges supporters to vote for Macron as he concedes

Despite his defeat, supporters for the election candidate far-left leader Jean-Luc Melenchon still cheered for him outside his election headquarters

Despite his defeat, supporters for the election candidate far-left leader Jean-Luc Melenchon still cheered for him outside his election headquarters

Anti-fascist activists clashed with riot police in Paris' Place de la Bastille - the birthplace of the French Revolution

Anti-fascist activists clashed with riot police in Paris’ Place de la Bastille – the birthplace of the French Revolution

Demonstrators in Nantes chanted anti-Le Pen slogans as they showed their opposition to the National Front leader

Demonstrators in Nantes chanted anti-Le Pen slogans as they showed their opposition to the National Front leader

The euro has jumped 2 per cent on Sunday night, to more than 85p ($1.09), after projections showed Macron and Le Pen would go head to head.

Macron has vowed to reinforce France’s commitment to the EU and euro.

Stock markets will next open in Asia before Europe starts trading on Monday morning.

But despite stock markets around the world improving significantly, investors fretted beforehand that another unforseen election outcome could upend the market. In addition, the  presidential race was plagued by controversy.

 Republican candidate Fillon, 63, is accused of embezzling state money by paying his British wife Penelope, 61, as his assistant – despite her allegedly carrying out no work.

Le Pen faces a fraud inquiry, with her chief of staff accused of misusing EU funds while Melenchon, 65, had vowed to pull his country out of Europe and get rid of the euro.

Earlier this evening, Le Pen had security authorities on high alert, with rioting expected across the country in protest due to her election success.

More than 50,000 police and gendarmes were deployed to the 66,000 polling stations for Sunday’s election, which comes after Thursday’s deadly attack on the Champs-Elysees in which a police officer and a gunman were slain.

However, initial election results triggered riots across the country, initially sparked in Paris’ Place du la Bastille, the birthplace of the French Revolution, tonight against the Le Pen’s National Front.

The crowds of young people, some from anarchist and anti-fascist groups, gathered in eastern Paris as results were coming in from Sunday’s first-round vote.

Police fired tear gas to disperse an increasingly rowdy crowd. Riot police surrounded the area.

Protesters have greeted several of Le Pen’s campaign events, angry at her anti-immigration policies and her party, which she has sought to detoxify after a past tainted by racism and anti-Semitism.

There were angry scenes in Nantes in western France, where anti-fascists took to the streets to protest

There were angry scenes in Nantes in western France, where anti-fascists took to the streets to protest

Ballot boxes in Le Port, on the French overseas island of La Reunion were seen locked after the polls closed earlier this evening

Ballot boxes in Le Port, on the French overseas island of La Reunion were seen locked after the polls closed earlier this evening

Two officials were seen tipping out the votes ready to count them ahead of the results, which are expected to be announced within the hour

Two officials were seen tipping out the votes ready to count them ahead of the results, which are expected to be announced within the hour

Le Pen has vowed to offer French voters a referendum to leave the EU and wants to leave the euro, known as Frexit.

Her father, the convicted racist and anti-Semite Jean-Marie Le Pen, won through to the second round of the 2002 presidential election but was then crushed by the conservative Jacques Chirac.

However she faces a similar prospect of defeat when she goes up against Macron in the second round of the next week.

He is widely expected to win the contest against Le Pen.

In France the election took place with the nation on high alert, with the vote taking place just three days after a police officer was gunned down by a Jihadi on the Champs-Elysees in Paris.

In Besancon, eastern France a stolen car was abandoned outside a polling station with the engine running.

A policeman secures the entrance of a polling station as people arrive to vote in the first round of 2017 French presidential election in Henin-Beaumont, France, April 23, 2017

A policeman secures the entrance of a polling station as people arrive to vote in the first round of 2017 French presidential election in Henin-Beaumont, France, April 23, 2017

Policemen stand near a polling station during the first round of 2017 French presidential election in Paris, France

Policemen stand near a polling station during the first round of 2017 French presidential election in Paris, France

Femen activists with masks, including one wearing a mask of Marine Le Pen, top left, are detained as they demonstrate in Henin-Beaumont, northern France, where far-right leader and presidential candidate Le Pen voted during the first round of the French presidential election

Femen activists with masks, including one wearing a mask of Marine Le Pen, top left, are detained as they demonstrate in Henin-Beaumont, northern France, where far-right leader and presidential candidate Le Pen voted during the first round of the French presidential election

Police found a hunting rifle inside the vehicle which had been disguised with stolen number plates.

In Rouen, Normandy, a gunman shot and wounded another man but the incident was classified as ‘non-terror related’.

Two other polling station, in Saint Omer, northern France, were evacuated because of a suspicious vehicle with Dutch number plates.

Ballots were cast in the wake of took place after a series of devastating terror attacks across France, but despite that armed police and soldiers are outlawed from protecting 67,000 French polling stations.

There had been a serious concern that groups including Islamic State would target the election.

However the 50,000 policemen and gendarmes that were only standby along with 7,000 soldiers were not required as the day went on.

The presidential poll is the first to be held during a state of emergency, put in place since the Paris attacks of November 2015.

A Femen activists wearing the mask of Marine le Pen is detained as they demonstrate in Henin Beaumont, northern France

A Femen activists wearing the mask of Marine le Pen is detained as they demonstrate in Henin Beaumont, northern France

TOPLESS demonstrators protests outside French polling station

Voters are choosing between 11 candidates in the most unpredictable contest in decades, and the poll conducted by RTBF suggests just that.

Topless demonstrators from the Femen activist group caused a commotion as they staged a stunt against Le Pen outside a polling station where the far-right presidential candidate was heading to vote.

Around six activists were detained Sunday morning after jumping out of an SUV limo wearing masks of Le Pen and United States President Donald Trump.

Police and security forces quickly forced them into police vans, confiscating their signs.

Le Pen voted at the station shortly after without further disruption.

After nine hours of voting, turnout was 69.4 percent, one of the highest levels in 40 years.

While down slightly on the same point in the 2012 election, an extra hour of voting in smaller towns was expected to take turnout to around 78 to 81 percent.

A Femen activist wearing the mask of U.S President Donald Trump is taken away from the scene near a scrum of photographers 

A Femen activist wearing the mask of U.S President Donald Trump is taken away from the scene near a scrum of photographers

People line up before casting their vote for the first-round presidential election at a polling station in Paris, Sunday, April 23, 2017

People line up before casting their vote for the first-round presidential election at a polling station in Paris, Sunday, April 23, 2017

Outgoing French president Francois Hollande casts his ballot at a polling station in Tulle

Outgoing French president Francois Hollande casts his ballot at a polling station in Tulle (left) as Marine Le Pen emerges from a booth (right)

Outgoing French president Francois Hollande picks up ballot papers before casting his vote at a polling station in Tulle, central France, on April 23, 2017, during the first round of the Presidential election

Outgoing French president Francois Hollande picks up ballot papers before casting his vote at a polling station in Tulle, central France, on April 23, 2017, during the first round of the Presidential election

Former French President and former Head of Les Republicains right wing Party Nicolas Sarkozy (centre) and his wife, the singer Carla Bruni Sarkozy (left) vote in the first round of the 2017 French Presidential Election at the Jean de la Fontaine High School in the 16th arrondissement on April 23, 2017 in Paris, France

Former French President and former Head of Les Republicains right wing Party Nicolas Sarkozy (centre) and his wife, the singer Carla Bruni Sarkozy (left) vote in the first round of the 2017 French Presidential Election at the Jean de la Fontaine High School in the 16th arrondissement on April 23, 2017 in Paris, France

Former French President and former Head of Les Republicains right wing Party Nicolas Sarkozy sweeps the curtain aside as he leaves a voting booth

Former French President and former Head of Les Republicains right wing Party Nicolas Sarkozy sweeps the curtain aside as he leaves a voting booth

Marine Le Pen was today poised for a historic breakthrough in France’s nail-biting presidential race

Marine Le Pen was today poised for a historic breakthrough in France’s nail-biting presidential race

Her campaign has been dominated by anti-Islam and anti-immigration rhetoric and critics said she has used the violence to stoke further hostility.

Defiant voters proclaimed the Paris terrorist attack would not alter their political loyalties in the French presidential elections today, although many feared a surge in support for the National Front.

As citizens flocked to polling stations across the country Parisians told how they would ‘vote with their hearts’ to reject extremist ideas, in the first round of voting to decide the new leader of France.

Mother-of-one Marie-Noelle Liesse told MailOnline she voted for independent centrist Emmanuel Macron to stop Marine Le Pen.

She said: ‘I voted with my heart to stop the extremists, the National Front, from getting into power.

‘The terrorist attack on the Champs Elysee has not affected the way I voted, but I fear it may have influenced some people.

‘I voted for Macron. I believe he is the right candidate to lead France.’

Mrs Liesse, 45, a communications executive, brought her five-year-old son Amant, to the polling station in the central Marais district of Paris.

Marine Le Pen casts her vote in the French presidential elections

French presidential election candidate for the far-right Front National (FN) party, Marine Le Pen casts her ballot in the first round of the French presidential elections in Henin-Beaumont, Northern France, shortly after the commotion

French presidential election candidate for the far-right Front National (FN) party, Marine Le Pen casts her ballot in the first round of the French presidential elections in Henin-Beaumont, Northern France, shortly after the commotion

Centrist candidate Emmanuel Macron waves supporters after casting his vote in the first round of the French presidential election, in le Touquet, northern France, Sunday April 23, 2017

Centrist candidate Emmanuel Macron waves supporters after casting his vote in the first round of the French presidential election, in le Touquet, northern France, Sunday April 23, 2017

People line up before casting their vote for the first-round presidential election at a polling station in Paris, Sunday, April 23, 2017

People line up before casting their vote for the first-round presidential election at a polling station in Paris, Sunday, April 23, 2017

Young professional couple Max Nivoix and Mariam Guedra voted for independent centrist Emmanuel Macron for said they feared the terrorist attack would galvanise support for Marine Le Pen’s National Front.

Mr Nivoix, 28, an industrial products buyer, told MailOnline: ‘I have voted for Macron. I think he is the best candidate to lead France.

‘The terrorist attack last week has not influenced the way I voted. But I fear that people outside of Paris will turn to Le Pen because of it.’

French nationals in the UK casting their votes

Among the 60,000 polling stations to open their doors was the French Consulate in South Kensington, where the bulk of the UK’s French nationals are expected to cast their votes.

According to figures from 2014, there are 400,000 French people living in London, which prompted Boris Johnson to call it France’s sixth biggest city.

At the end of 2013, the Foreign Ministry recorded 1.6million French expats living in the UK, according to The Independent.

Outside of the capital, there are polling stations in Ashford, Brighton, Belfast, Birmingham, Bristol, Leeds, Manchester, Aberdeen, Edinburgh and Glasgow.

 His partner Ms Guedra, 28, an engineer, added: ‘I voted for Emmanuel Macron too. He has the best policies for young people and for the time we live in now.

‘But we are both educated and from the city. I know that old people and people in the countryside are more in favour of Le Pen.’

Flight attendant Baptiste Laurent said he voted for communist-backed firebrand Jean-Luc Melonchon he feared National Front candidate Marine Le Pen could come top in the poll.

Mr Laurent, 39, told MailOnline: ‘I voted for Melonchon because I voted for what I believe in – a more equal society.

‘But I fear that Le Pen could be the biggest winner today.’

Mr Laurent came to the polling station with his 14-month-old daughter Romy.

A primary school teacher also backed communist-backed firebrand Jean-Luc Melonchon but feared a surge of support for Le Pen’s National Front.

Alexandre, 42, told MailOnline: ‘I voted for Melonchon because I support his programme and his socialist policies.

‘But Le Pen will do well in the polls today. She has a strong base of support. And after the terrorist attack she will get more votes. I think she will get through to the second round of voting.’

The second round of voting between the two front runners of today’s poll will take place on Sunday 7 May.

She is locked in a duel with centrist front-runner Emmanuel Macron, 39, a staunch defender of the single market who has told Theresa May he favours a ‘hard Brexit’.

If, as expected, Le Pen and Macron are successful in the first round of voting today, they will face each other in the run-off on May 7.

People line up to vote at a polling station in the first round of 2017 French presidential election in Vaulx-en-Velin, France, April 23, 2017

People line up to vote at a polling station in the first round of 2017 French presidential election in Vaulx-en-Velin, France, April 23, 2017

Brigitte Trogneux casts her ballot next to her husband, French presidential election candidate for the En Marche movement Emmanuel Macron during the first round of the Presidential election at a polling station in Le Touquet

Brigitte Trogneux casts her ballot next to her husband, French presidential election candidate for the En Marche movement Emmanuel Macron during the first round of the Presidential election at a polling station in Le Touquet

But analysts say the battle for the Élysée Palace is by no means a two-horse race.

Le Pen has moved from 22 per cent to 23 per cent in the latest opinion poll while her three rivals have all lost half a percentage point of support.

Macron dropped back to 24.5 per cent, while republican candidate François Fillon and leftist candidate Jean-Luc Mélenchon were back on 19 per cent.

The far-Right leader is confident her chances of winning the election’s first round have been strengthened by last week’s terrorist murder of a police officer on the Champs-Élysées

The far-Right leader is confident her chances of winning the election’s first round have been strengthened by last week’s terrorist murder of a police officer on the Champs-Élysées

Experts said a Le Pen victory in the first round could mean cheaper holidays for Brits heading to Europe.

Kathleen Brooks, of City Index Direct, said: ‘I think if Le Pen wins today by a wide enough margin, then the euro will fall significantly, possibly to the lowest levels we’ve seen this year. And a weak euro will initially be great for us as everything will be much cheaper in Europe.’

Le Pen’s father, the convicted racist Jean-Marie Le Pen, caused shockwaves around the world in 2002 when he came second in the first round. He then went on to lose to Jacques Chirac by a landslide of more than 80 per cent.

But Marine Le Pen is convinced she can go one better by positioning herself as the candidate who is toughest on terror.

She had pledged to ‘immediately reinstate border checks’, to expel foreigners and to ban all immigration, whether illegal or not. Supporters include Donald Trump who said the Paris attack would ‘have a big effect on the presidential election’ because the French people ‘will not take much more of this’.

But Prime Minister Cazeneuve accused Le Pen of ‘shamelessly seeking to exploit fear and emotion for exclusively political ends’. Mr Cazeneuve pointed out that Karim Cheurfi, the 39-year-old responsible for the murder of traffic officer Xavier Jugelé, 37, was a born and bred Frenchman.

Le Pen has called for negotiation with Brussels on a new EU, followed by a referendum; extremist mosques closed and priority to French nationals in social housing; and retirement age fixed at 60.

Macron forged a reputation with his ‘Macron Law’, a controversial reform bill that allowed shops to open more often on Sundays. On security, he has said France is paying for the intelligence jobs cuts made when Fillon was PM between 2007 and 2012.

http://www.dailymail.co.uk/news/article-4437156/Leading-candidates-cast-votes-French-election.html#ixzz4fEBy4Ooi

 

Is Macron the EU’s last best hope?

For the French establishment, Sunday’s presidential election came close to a near-death experience. As the Duke of Wellington said of Waterloo, it was a “damn near-run thing.”

Neither candidate of the two major parties that have ruled France since Charles De Gaulle even made it into the runoff, an astonishing repudiation of France’s national elite.

Marine Le Pen of the National Front ran second with 21.5 percent of the vote. Emmanuel Macron of the new party En Marche! won 23.8 percent.

Macron is a heavy favorite on May 7. The Republicans’ Francois Fillon, who got 20 percent, and the Socialists’ Benoit Hamon, who got less than 7 percent, both have urged their supporters to save France by backing Macron.

Ominously for U.S. ties, 61 percent of French voters chose Le Pen, Fillon or radical Socialist Jean-Luc Melenchon. All favor looser ties to America and repairing relations with Vladimir Putin’s Russia.

Le Pen has a mountain to climb to win, but she is clearly the favorite of the president of Russia, and perhaps of the president of the United States. Last week, Donald Trump volunteered:

“She’s the strongest on borders, and she’s the strongest on what’s been going on in France. … Whoever is the toughest on radical Islamic terrorism, and whoever is the toughest at the borders, will do well in the election.”

As an indicator of historic trends in France, Le Pen seems likely to win twice the 18 percent her father, Jean-Marie Le Pen, won in 2002, when he lost in the runoff to Jacques Chirac.

The campaign between now and May 7, however, could make the Trump-Clinton race look like an altarpiece of democratic decorum.

Not only are the differences between the candidates stark, Le Pen has every incentive to attack to solidify her base and lay down a predicate for the future failure of a Macron government.

And Macron is vulnerable. He won because he is fresh, young, 39, and appealed to French youth as the anti-Le Pen. A personification of Robert Redford in “The Candidate.”

But he has no established party behind him to take over the government, and he is an ex-Rothschild banker in a populist environment where bankers are as welcome as hedge-fund managers at a Bernie Sanders rally.

He is a pro-EU, open-borders transnationalist who welcomes new immigrants and suggests that acts of Islamist terrorism may be the price France must pay for a multi-ethnic and multicultural society.

Macron was for a year economic minister to President Francois Hollande who has presided over a 10 percent unemployment rate and a growth rate that is among the most anemic in the entire European Union.

Like the reporting you see here? Sign up for free news alerts from WND.com, America’s independent news network.

He is offering corporate tax cuts and a reduction in the size of a government that consumes 56 percent of GDP, and presents himself as the “president of patriots to face the threat of nationalists.”

His campaign is as much “us vs. them” as Le Pen’s.

And elite enthusiasm for Macron seems less rooted in any anticipation of future greatness than in the desperate hope he can save the French establishment from the dreaded prospect of Marine.

But if Macron is the present, who owns the future?

Across Europe, as in France, center-left and center-right parties that have been on the scene since World War II appear to be emptying out like dying churches. The enthusiasm and energy seem to be in the new parties of left and right, of secessionism and nationalism.

The problem for those who believe the populist movements of Europe have passed their apogee, with losses in Holland, Austria and, soon, France, that the fever has broken, is that the causes of the discontent that spawned these parties are growing stronger.

What are those causes?

A growing desire by peoples everywhere to reclaim their national sovereignty and identity, and remain who they are. And the threats to ethnic and national identity are not receding, but growing.

The tide of refugees from the Middle East and Africa has not abated. Weekly, we read of hundreds drowning in sunken boats that tried to reach Europe. Thousands make it. But the assimilation of Third World peoples in Europe is not proceeding. It seems to have halted.

Second-generation Muslims who have lived all their lives in Europe are turning up among the suicide bombers and terrorists.

Fifteen years ago, al-Qaida seemed confined to Afghanistan. Now it is all over the Middle East, as is ISIS, and calls for Islamists in Europe to murder Europeans inundate social media.

As the numbers of native-born Europeans begin to fall, with their anemic fertility rates, will the aging Europeans become more magnanimous toward destitute newcomers who do not speak the national language or assimilate into the national culture, but consume its benefits?

If a referendum were held across Europe today, asking whether the mass migrations from the former colonies of Africa and the Middle East have on balance made Europe a happier and better place to live in in recent decades, what would that secret ballot reveal?

Does Macron really represent the future of France, or is he perhaps one of the last men of yesterday?
 http://www.wnd.com/2017/04/is-macron-the-eus-last-best-hope/#e9TbxGcObXt9Bpu5.99

 

Story 2:  President Trump’s Transparent Executive Orders — Videos — 

Image result for list of trump executive ordersImage result for list of trump executive ordersImage result for list of trump executive ordersImage result for cartoons trump executive ordersImage result for list of trump executive orders

What Are Executive Orders?

President Trump Signs Financial Services Executive Orders

How Trump’s executive order begins to reform the H-1B visa program

Trump’s executive order to help the American worker

President Trump Signs Executive Orders Regarding Trade

What do all of President Trump’s executive orders mean?

[youtube-https://www.youtube.com/watch?v=ov2-KwmkMNQ]

The impact of President Trump’s executive actions

WATCH: President Trump Signs Executive EPA Orders (FNN)

Executive order (United States)

From Wikipedia, the free encyclopedia
“Executive order” redirects here. For other uses, see Executive order (disambiguation). Not to be confused with Presidential proclamation or Presidential memorandum.

Executive orders are orders issued by United States Presidents and directed towards officers and agencies of the Federal government of the United States. Executive orders have the full force of law, based on the authority derived from statute or the Constitution itself. The ability to make such orders is also based on express or implied Acts of Congress that delegate to the President some degree of discretionary power (delegated legislation).[1]

Like both legislative statutes and regulations promulgated by government agencies, executive orders are subject to judicial review and may be overturned if the orders lack support by statute or the Constitution.[2] Major policy initiatives require approval by the legislative branch, but executive orders have significant influence over the internal affairs of government, deciding how and to what degree legislation will be enforced, dealing with emergencies, waging wars, and in general fine-tuning policy choices in the implementation of broad statutes.

Basis in the United States Constitution

The United States Constitution does have a provision that explicitly permits the use of executive orders. The term executive power in Article II, Section 1, Clause 1 of the Constitution is not entirely clear. The term is mentioned as direction to “take Care that the Laws be faithfully executed” and is part of Article II, Section 3, Clause 5. The consequence of failing to comply possibly being removal from office.[3][4]

The U.S. Supreme Court has held[5] that all executive orders from the President of the United States must be supported by the Constitution, whether from a clause granting specific power, or by Congress delegating such to the executive branch.[6] Specifically, such orders must be rooted in Article II of the US Constitution or enacted by the congress in statutes. Attempts to block such orders have been successful at times when such orders exceeded the authority of the president or could be better handled through legislation.[7]

The Office of the Federal Register is responsible for assigning the executive order a sequential number after receipt of the signed original from the White House and printing the text of the executive order in the daily Federal Register and Title 3 of the Code of Federal Regulations.[8]

Other types of orders issued by “the Executive” are generally classified simply as administrative orders rather than executive orders.[9] These are typically the following:

Presidential directives are considered a form of executive order issued by the President of the United States with the advice and consent of a major agency or department found within the executive branch of government.[10]Some types of Presidential directives are the following:

History and use

With the exception of William Henry Harrison, all presidents beginning with George Washington in 1789 have issued orders that in general terms can be described as executive orders. Initially they took no set form. Consequently, such orders varied as to form and substance.[11]

The first executive order was issued by George Washington on June 8, 1789, addressed to the heads of the federal departments, instructing them “to impress me with a full, precise, and distinct general idea of the affairs of the United States” in their fields.[12]

The most famous executive order was by President Abraham Lincoln when he issued the Emancipation Proclamation on January 1, 1863. Political scientist Brian R. Dirck states:

The Emancipation Proclamation was an executive order, itself a rather unusual thing in those days. Executive orders are simply presidential directives issued to agents of the executive department by its boss.[13]

Until the early 1900s, executive orders went mostly unannounced and undocumented, seen only by the agencies to which they were directed. This changed when the Department of State instituted a numbering scheme in 1907, starting retroactively with United States Executive Order 1 issued on October 20, 1862, by President Abraham Lincoln.[14] The documents that later came to be known as “executive orders” apparently gained their name from this order issued by Lincoln, which was captioned “Executive Order Establishing a Provisional Court in Louisiana”.[9] This court functioned during the military occupation of Louisiana during the American Civil War, and Lincoln also used Executive Order 1 to appoint Charles A. Peabody as judge, and to designate the salaries of the court’s officers.[14]

President Truman’s Executive Order 10340 in Youngstown Sheet & Tube Co. v. Sawyer, 343 US 579 (1952) placed all steel mills in the country under federal control. This was found invalid because it attempted to make law, rather than clarify or act to further a law put forth by the Congress or the Constitution. Presidents since this decision have generally been careful to cite which specific laws they are acting under when issuing new executive orders. Likewise, when presidents believe their authority for issuing an executive order stems from within the powers outlined in the Constitution, the order will simply proclaim “under the authority vested in me by the Constitution” instead.

Wars have been fought upon executive order, including the 1999 Kosovo War during Bill Clinton‘s second term in office. However, all such wars have had authorizing resolutions from Congress. The extent to which the president may exercise military power independently of Congress and the scope of the War Powers Resolution remain unresolved constitutional issues, although all presidents since its passage have complied with the terms of the resolution while maintaining that they are not constitutionally required to do so.

President Truman issued 907 executive orders, with 1,081 orders by Theodore Roosevelt, 1,203 orders by Calvin Coolidge, and 1,803 orders by Woodrow Wilson. Franklin D. Roosevelt has the distinction of making a record 3,522 executive orders.

Franklin Roosevelt

Prior to 1932, uncontested executive orders had determined such issues as national mourning on the death of a president, and the lowering of flags to half-staff. President Franklin Roosevelt issued the first of his 3,522 executive orders on March 6, 1933, declaring a bank holiday, forbidding banks to release gold coin or bullion. Executive Order 6102 forbade the hoarding of gold coin, bullion and gold certificates. A further executive order required all newly mined domestic gold be delivered to the Treasury.[15]

By Executive Order 6581, the president created the Export-Import Bank of the United States. On March 7, 1934, he created the National Industrial Recovery Act (Executive Order 6632). On June 29, the president issued Executive Order 6763 “under the authority vested in me by the Constitution”, thereby creating the National Labor Relations Board.

In 1934, while Charles Evans Hughes was Chief Justice of the United States (in the time period known as the Hughes Court), the Court found that the National Industrial Recovery Act (NIRA) was unconstitutional. The president then issued Executive Order 7073 “by virtue of the authority vested in me under the said Emergency Relief Appropriation Act of 1935“, reestablishing the National Emergency Council to administer the functions of the NIRA in carrying out the provisions of the Emergency Relief Appropriations Act. On June 15, he issued Executive Order 7075, which terminated NIRA and replaced it with the Office of Administration of the National Recovery Administration.[16]

In the years that followed, President Roosevelt replaced the outgoing judges with those more in line with his views, ultimately appointing Hugo Black, Stanley Reed, Felix Frankfurter, William O. Douglas, Frank Murphy, Robert H. Jackson and James F. Byrnes to the Court. Historically, only George Washington had equal or greater influence over Supreme Court appointments, choosing all of its original members. Justices Frankfurter, Douglas, Black, and Jackson dramatically checked presidential power by invalidating the executive order at issue in The Steel Seizure Case (i.e., Executive Order 10340). In that case Roosevelt’s successor, President Truman, had ordered private steel production facilities seized in support of the Korean War effort, but the Court held the executive order was not within the power granted to the President by the Constitution.

Table of Presidents using Executive Orders

President Number
issued [15]
Starting with
E.O. number [15]
George Washington 8 n/a
John Adams 1 n/a
Thomas Jefferson 4 n/a
James Madison 1 n/a
James Monroe 1 n/a
John Quincy Adams 3 n/a
Andrew Jackson 12 n/a
Martin van Buren 10 n/a
William Henry Harrison 0 n/a
John Tyler 17 n/a
James K. Polk 18 n/a
Zachary Taylor 5 n/a
Millard Fillmore 12 n/a
Franklin Pierce 35 n/a
James Buchanan 16 n/a
Abraham Lincoln 48
Andrew Johnson 79
Ulysses S. Grant 217
Rutherford B. Hayes 92
James Garfield 6
Chester Arthur 96
Grover Cleveland (first term) 113
Benjamin Harrison 143
Grover Cleveland (second term) 140
William McKinley 185
Theodore Roosevelt 1,081
William Howard Taft 724
Woodrow Wilson 1,803
Warren G. Harding 522
Calvin Coolidge 1,203
Herbert Hoover 968 5075
Franklin D. Roosevelt (~3.05 terms) 3,522 6071
Harry S. Truman 907 9538
Dwight D. Eisenhower 484 10432
John F. Kennedy 214 10914
Lyndon B. Johnson 325 11128
Richard Nixon 346 11452
Gerald R. Ford 169 11798
Jimmy Carter 320 11967
Ronald Reagan 381 12287
George H. W. Bush 166 12668
Bill Clinton[17] 308 12834
George W. Bush[17] 291 13198
Barack Obama[17] 276 13489
Donald Trump (as of April 21, 2017) [18] 25 13765

https://en.wikipedia.org/wiki/Executive_order_(United_States)

Trump has already signed 66 executive actions — here’s what each one does

donald trumpPresident Donald Trump signs the executive order halting immigrants from some Muslim-majority countries from entering the US.Olivier Douliery-Pool/Getty Images

President Donald Trump’s first months in office have been filled with a flurry of action, and he’s just getting started.

The 45th president has signed 66 executive actions so far, with far-reaching effects on Americans’ lives.

There are technically three types of executive actions, which each have different authority and effects, with executive orders holding the most prestige:

  • Executive orders are assigned numbers and published in the federal register, similar to laws passed by Congress, and typically direct members of the executive branch to follow a new policy or directive. Trump has issued 24 orders.
  • Presidential memoranda do not have to be published or numbered (though they can be), and usually delegate tasks that Congress has already assigned the president to members of the executive branch. Trump has issued 22 memoranda.
  • Finally, while some proclamations — like President Abraham Lincoln’s emancipation proclamation — have carried enormous weight, most are ceremonial observances of federal holidays or awareness months. Trump has issued 20 proclamations.

Scholars have typically used the number of executive orders per term to measure how much presidents have exercised their power. George Washington only signed eight his entire time in office, according to the American Presidency Project, while FDR penned over 3,700.

In his two terms, President Barack Obama issued 277 executive orders, a total number on par with his modern predecessors, but the lowest per year average in 120 years. Trump, so far, has signed 24 executive orders in 89 days.

Here’s a quick guide to the executive actions Trump has made so far, what they do, and how Americans have reacted to them:

Executive Order, April 18: ‘Buy American, Hire American’

Executive Order, April 18: 'Buy American, Hire American'

President Donald Trump speaks at Snap-On Tools in Kenosha, Wisconsin on April 18, 2017.Associated Press/Kiichiro Sato

At a tools manufacturer in Wisconsin, Trump signed an order directing federal agencies to review and propose changes to the popular, but controversial H-1B visa program meant to attract skilled foreign labor.

Critics say it’s used by companies to hire cheap, foreign workers in place of Americans, while proponents — including many in the tech industry — say it provides much-needed skilled workers to sectors where companies have struggled to hire Americans.

Trump’s “Buy American, hire American” order also directs federal agencies to maximize the American products they purchase, particularly calling out “steel, iron, aluminum, and cement.”

Read the full text of the order here »

Presidential proclamation, April 14: National Park Week

Presidential proclamation, April 14: National Park Week

White House press secretary Sean Spicer gave Interior Secretary Ryan Zinke the first quarter check of Trump’s salary to the National Park Service as Tyrone Brandyburg, Harpers Ferry National Historical Park Superindendant, looked on during the daily press briefing at the White House on April 3, 2017.Mark Wilson/Getty Images

Trump designated April 15-23, 2017 as National Park Week, during which all 417 sites (59 official “parks”) across the country are free to enter, a move many past presidents have made as well.

The president also donated his first quarter salary to the National Park Service’s American Battlefield Protection Program. Critics were quick to point out that Trump’s $78,333.32 donation could hardly make up for the nearly $2 billion his federal budget proposes cutting from the Interior Department this year.

 

Presidential memorandum, April 12: Delegating terrorist report request

Presidential memorandum, April 12: Delegating terrorist report request

FBI Director James Comey testifies on Capitol Hill in Washington on Jan. 10, 2017, before the Senate Intelligence Committee hearing on Russian Intelligence Activities.AP Photo/Cliff Owen

The 2017 National Defense Authorization Act directs the president to review “known instances since 2011 in which a person has traveled or attempted to travel to a conflict zone in Iraq or Syria from the United States to join or provide material support or resources to a terrorist organization,” and submit a report to Congress.

Trump delegated this responsibility to FBI Director James Comey.

Read the full text of the memo here »

Presidential memorandum, April 11: Signing letter on including Montenegro in NATO

Presidential memorandum, April 11: Signing letter on including Montenegro in NATO

Montenegro’s PM Djukanovic attends a NATO foreign ministers meeting in Brussels.Thomson Reuters

At the end of March, the US Senate voted to include Montenegro’s in NATO, 97 to 2. While Trump called the alliance “obsolete” as recently as January, he said he no longer feels that way, and didn’t veto the small southern European country’s inclusion.

The president has called on members of NATO to pay their fair share, saying the US carries too much financial responsibility for the military stronghold. The addition of Montenegro is likely to irk Russia, however, as it means one more country looks to West instead of staying under the influence of the Kremlin.

Read the full text of the memo indicating Trump’s approval of the Senate’s vote here »

Presidential memorandum, April 8: Notifying Congress of the US Syria strike

Presidential memorandum, April 8: Notifying Congress of the US Syria strike

In this image from video provided by the U.S. Navy, the guided-missile destroyer USS Porter (DDG 78) launches a tomahawk land attack missile in the Mediterranean Sea, Friday, April 7, 2017.Mass Communication Specialist 3rd Class Ford Williams/U.S. Navy via AP

This memo formally informed Congress of Trump’s order to launch a salvo of 59 cruise missiles on Shayrat airfield and nearby military infrastructure controlled by Syrian President Bashar Assad on Friday, in response to a chemical attack that killed at least 80 people in the northwestern part of the country on Tuesday.

Some lawmakers slammed Trump for not getting congressional or UN approval before ordering the strike, as the president’s legal authority for doing so is unclear.

“I acted in the vital national security and foreign policy interests of the United States, pursuant to my constitutional authority to conduct foreign relations and as Commander in Chief and Chief Executive,” Trump said in the memo. “I am providing this report as part of my efforts to keep the Congress fully informed, consistent with the War Powers Resolution.”

Read the full text of the memo here »

5 presidential proclamations, April 3-7: Honoring and drawing awareness

5 presidential proclamations, April 3-7: Honoring and drawing awareness

John Glenn was the first US man to orbit the Earth as part of Project Mercury.NASA

Trump proclaimed various days and weeks in April were in honor of five different causes:

  1. April 2-8, 2017: National Crime Victims’ Rights Week
  2. Honoring the Memory of John Glenn
  3. April 7, 2017: Education and Sharing Day
  4. April 14, 2017: Pan American Day; April 9-15, 2017: Pan American Week
  5. April 9, 2017: National Former Prisoner of War Recognition Day

Read the full text of each proclamation in the links above.

 

Presidential memorandum, April 3: Principles for reforming the draft

Presidential memorandum, April 3: Principles for reforming the draft

The president’s son-in-law and top adviser Jared Kushner talks with Gen. Joseph F. Dunford Jr. during his visit to Iraq with the US military on April 4.Chairman of the Joint Chiefs of Staff/Flickr

The United States has had a volunteer-based military for over four decades, but nearly all American males still have to register for the draft when they turn 18.

In the 2017 National Defense Authorization Act, Congress called on the president to outline his principles for reforming the draft. So in his order, Trump told Congress that the US military should recruit a diverse pool of citizens, and offer them training opportunities that will benefit the armed forces as well as their future employment, in order to “prepare to mitigate an unpredictable global security and national emergency environment.”

Read the full text of the memo here »

2 Executive Orders, March 31: Lowering the trade deficit and collecting import duties

2 Executive Orders, March 31: Lowering the trade deficit and collecting import duties

Vice President Mike Pence tries to stop President Donald Trump as he leaves before signing executive orders regarding trade in the Oval Office on March 31, 2017.AP Photo/Andrew Harnik

Ahead of Trump’s first meeting with Chinese President Xi Jinping, he signed two orders focused on an issue he decried during the campaign: the US trade deficit.

The first order directs the executive branch to produce a country-by-country, product-by-product report on trade deficits in 90 days, in order to figure out how to reduce the $500 billion trade deficit the US had in 2016.

Business Insider’s Pedro Nicolaci da Costa wrote that the order’s plan for a “90-day ‘investigation’ into why the US had trade deficits with specific countries, [was] a quixotic exercise most economists say shows a deep lack of understanding of the workings of international trade.”

The second order seeks to strengthen the US response to its trade laws preventing counterfeit or illegal imports, citing “$2.3 billion in antidumping and countervailing duties” that the government hasn’t collected.

“On a typical day, CBP screens more than 74,000 truck, rail, and sea cargo containers at 328 U.S. ports of entry — with imported goods worth approximately $6.3 billion,” a Department of Homeland Security press release on the order wrote. “In Fiscal Year 2016, CBP seized more than 31,500 of counterfeit shipments and collected more $40 billion in duties, taxes, and fees, making CBP the U.S. government’s second largest source of revenue.”

Read the full text of the deficit order here »

And the full text of the antidumping order here »

Executive Orders, March 31 and February 9: Changing the DOJ order of succession

Executive Orders, March 31 and February 9: Changing the DOJ order of succession

Attorney General Jeff Sessions speaks after being sworn-in in the Oval Office of the White House on February 9, 2017.REUTERS/Kevin Lamarque

On February 9, Trump signed an order establishing a line of succession to lead the US Department of Justice if the attorney general, deputy attorney general, or associate attorney general die, resign, or are otherwise unable to carry on their duties. In order, the US Attorney for the Eastern District of Virginia, the US Attorney for the Northern District of Illinois, and then the US Attorney for the Western District of Missouri will be next in line.

The action reverses an order Obama signed days before leaving office. After Trump fired acting Attorney General Sally Yates for refusing to enforce his first travel ban, he appointed Dana Boente, US attorney for the Eastern District of Virginia, as acting attorney general in her place. This order elevates his position in the order of succession.

Read the full text of the first order here »

On March 31, Trump signed another order reversing this order. The new order of succession after the AG, deputy AG, and associate AG are as follows: US Attorney for the Eastern District of Virginia, US Attorney for the Eastern District of North Carolina, and then the US Attorney for the Northern District of Texas.

Since Attorney General Jeff Sessions recused himself from the DOJ probe into Trump’s associates contacts with Russian operatives, the order of succession will determine who will oversee that investigation. Trump will have to fill the North Carolina post soon, the Palmer Report points out, possibly allowing the president to influence who leads the Russia investigation.

Read the full text of the second order here »

6 presidential proclamations, March 31: Sexual assault awareness and others

6 presidential proclamations, March 31: Sexual assault awareness and others

Jessica Drake (R) was one of several women who accused Donald Trump of past sexual misconduct during the 2016 election.Reuters/Kevork Djansezian

Trump proclaimed April 2, 2017 World Autism Awareness Day, and that the month of April 2017 was in honor of five different causes:

  1. Cancer Control Month
  2. National Child Abuse Prevention Month
  3. National Sexual Assault Awareness and Prevention Month
  4. National Financial Capability Month
  5. National Donate Life Month

Many criticized Trump’s National Sexual Assault Awareness and Prevention Month, in particular, because multiple woman came forward during the campaign and accused Trump of sexual misconduct in the past. He also bragged on a 2005 tape that surfaced in October 2016that he could “grab” women “by the p—y” because “when you’re a star they let you do it.”

A very Ironic Trump Declares “National Sexual Assault Awareness and Prevention Month” http://www.motherjones.com/politics/2017/03/donald-trump-april-national-sexual-assault-awareness-month  via @MotherJones

Photo published for Trump Declares "National Sexual Assault Awareness and Prevention Month"

Trump Declares “National Sexual Assault Awareness and Prevention Month”

The president has been accused of assaulting more than 15 women.

motherjones.com

Trump’s defense of O’Reilly underscores how farcical his proclamation of National Sexual Assault Awareness and Prevention Month is.

Read the full text of each proclamation in the links above.

Executive Order, March 29: Combating the opioid crisis

Executive Order, March 29: Combating the opioid crisis

President Donald Trump shakes hands with New Jersey Gov. Chris Christie at a panel discussion on an opioid and drug abuse in the Roosevelt Room of the White House March 29, 2017 in Washington, DC.Shawn Thew-Pool/Getty Images

This order established the President’s Commission on Combating Drug Addiction and the Opioid Crisis. The commission, headed by New Jersey Gov. Chris Christie, is supposed to report to the president strategies to address the epidemic, which is now killing 30,000 Americans a year.

But many experts said the president’s action is “underwhelming.”

“These people don’t need another damn commission,” an anonymous former Obama administration official who worked on the issue told Politico. “We know what we need to do. … It’s not rocket science.” Business Insider’s Erin Brodwin outlined some strategies that scientists think will work.

Read the full text of the order here »

Executive Order, March 28: Dismantling Obama’s climate change protections

Executive Order, March 28: Dismantling Obama's climate change protections

President Donald Trump, accompanied by Environmental Protection Agency (EPA) Administrator Scott Pruitt, third from left, and Vice President Mike Pence, right, signs an Energy Independence Executive Order, Tuesday, March 28, 2017, at EPA headquarters in Washington with coal and oil executives.AP Photo/Pablo Martinez Monsivais

On the campaign trail, Trump vowed to bring back coal mining jobs and dismantle Obama’s environmental policy, declaring climate change a “hoax.” While coal jobs are unlikely to come back in droves, this executive order makes good on the second promise, directing federal agencies to rescind any existing regulations that “unduly burden the development of domestic energy resources.”

It also rescinds four of Obama’s executive actions, two of his reports, and tells the Environmental Protection Agency to review his landmark Clean Power Plan that would have capped power plant emissions. Since many of Obama’s actions were complex, however, it may take Trump a while to reverse them.

Democrats, environmentalists, and protesters demonstrating outside the White House after Trump signed the order decried the action, declaring it would lead to runaway climate change, while many Republican congressmen applauded the action for promoting energy independence.

Read the full text of the order here »

Executive Order, March 27: Revoking Obama’s fair pay and safe workplaces orders

Executive Order, March 27: Revoking Obama's fair pay and safe workplaces orders

President Barack Obama meets with then-President-elect Donald Trump in the Oval Office of the White House on November 10, 2016.REUTERS/Kevin Lamarque

In 2014, Obama signed an executive order requiring federal government contracts over $500,000 had to go to companies that hadn’t violated labor laws. He signed two more orders making minor clarifications to that original order later that year and in 2016.

Trump’s new order revoking those three orders, and directed federal agencies to review any procedural changes they made because of the orders. When companies bid for federal contracts, they’ll no longer have to disclose if they’ve violated the Fair Labor Standards Act, the Occupational Safety and Health Act, the Migrant and Seasonal Agricultural Worker
Protection Act, or the National Labor Relations Act.

Read the full text of the order here »

Presidential memorandum, March 27: Establishing the White House Office of American Innovation

Presidential memorandum, March 27: Establishing the White House Office of American Innovation

President Trump departs the White House in Washington with son-in-law and senior adviser Jared Kushner.Thomson Reuters

Trump established the White House Office of American Innovation, choosing his son-in-law and senior adviser Jared Kushner to lead it. The office will aim to overhaul government functions with ideas from industry.

Business titans Gary Cohn (National Economic Council director), Dina Powell (senior counselor to the president for economic initiatives and deputy national security adviser), Chris Liddell (assistant to the president for strategic initiatives), and Reed Cordish (assistant to the president for intragovernmental and technology initiatives) will also be on the team.

Read the full text of the memo here »

Presidential proclamation, March 24: Greek Independence Day

Presidential proclamation, March 24: Greek Independence Day

President Donald Trump speaks to guests during a Greek Independence Day celebration in the East Room of the White House, on March 24, 2017 in Washington, DC.Mark Wilson/Getty Images

Trump declared March 25, 2017, as Greek Independence Day.

“American patriots built our Republic on the ancient Greeks’ groundbreaking idea that the people should decide their political fates,” the president wrote in the proclamation.

Read the full text here »

2 presidential memoranda, March 23: Declaring an emergency in South Sudan

2 presidential memoranda, March 23: Declaring an emergency in South Sudan

The same day he signed these memoranda, Trump honked the horn of an 18-wheeler truck while meeting with truckers and CEOs on the South Lawn of the White House, Thursday, March 23, 2017.AP Photo/Andrew Harnik

Trump signed two memoranda declaring a national emergency in South Sudan, and notifying Congress that he did so, extending the emergency Obama declared in 2014. One million people there are on the brink of dying from a lack of food.

United Nations officials have called the famine in South Sudan, Nigeria, and Somalia the “world’s largest humanitarian crisis in 70 years.”

Office of Management and Budget Director Mick Mulvaney has said that the president’s proposed budget would “spend less money on people overseas and more money on people back home” and “absolutely” cut programs like those that would aid those starving in South Sudan.

Read the full text of the memos here and here »

Presidential memorandum, March 20: Delegating to Tillerson

Presidential memorandum, March 20: Delegating to Tillerson

President Donald Trump smiles at Secretary of State Rex Tillerson after he was sworn in in the Oval Office of the White House in Washington, Wednesday, Feb. 1, 2017.Associated Perss/Carolyn Kaster

Trump delegated presidential powers in the National Defense Authorization Act to Secretary of State Rex Tillerson. The law doles out funding “for military activities of the Department of Defense, for military construction, and for defense activities of the Department of Energy, to prescribe military personnel strengths.”

Read the full text of the memo here »

Presidential proclamation, March 17: National Poison Prevention Week

Presidential proclamation, March 17: National Poison Prevention Week

President Donald Trump departs the White House with his grandchildren Arabella and Joseph on March 3, 2017.Win McNamee/Getty Images

Trump proclaimed March 19 through March 25, 2017 National Poison Prevention Week in order to encourage Americans to safeguard their homes and protect children from ingesting common household items that may poison them.

Read the full text of the proclamation here »

Presidential memorandum, March 16: A letter to the House of Representatives outlining Trump’s proposed budget

Presidential memorandum, March 16: A letter to the House of Representatives outlining Trump's proposed budget

Winners and losers in Trump’s first budget.Mike Nudelman/Business Insider

Trump sent his first budget to the House of Representatives, requesting an additional $30 billion for the Department of Defense to fight ISIS and $3 billion for the Department of Homeland Security to protect the US border.

To offset the massive defense money, Trump proposes slashing funding for several key federal agencies, dropping budgets for the State Department and the Environmental Protection Agency by almost a third.

Several noteworthy Republican lawmakers signaled they didn’t approve of Trump’s first budget, and Democrats across the board decried the deep spending cuts.

Read the full text of the memorandum here »

Executive Order, March 13: Reorganizing the executive branch

Executive Order, March 13: Reorganizing the executive branch

President Donald Trump’s Cabinet gathers in the Oval Office on March 13, 2017.Donald Trump/Twitter

With the written aim of improving the efficiency of the federal government, Trump signed an order to shake up the executive branch, and “eliminate or reorganize unnecessary or redundant federal agencies” identified in a 180-day review.

It directs Office of Management and Budget Director Mick Mulvaney to review agency head’s proposed plans to reorganize or shrink their departments, and submit a plan to Trump by September 2017 outlining how to streamline the government.

Historians expressed skepticism that Trump would be able to effectively shrink the government, since many past presidents have tried and failed to do so. Critics argued that Trump could use the order to dismantle federal agencies that he or his Cabinet members don’t like.

Read the full text of the order here »

Presidential proclamation, March 6: National Consumer Protection Week

Presidential proclamation, March 6: National Consumer Protection Week

Pool/Getty Images

March 5 through March 11, 2017 was National Consumer Protection Week, Trump proclaimed, which “reminds us of the importance of empowering consumers by helping them to more capably identify and report cyber scams, monitor their online privacy and security, and make well-informed decisions.”

Read the full text of the proclamation here »

Executive Order, March 6: A new travel ban

Executive Order, March 6: A new travel ban

President Donald Trump signs a new temporary travel ban in the Oval Office on March 6, 2017.Sean Spicer/Twitter

Trump’s second go at his controversial travel order bans people from Sudan, Iran, Somalia, Yemen, Syria, and Libya from entering the US for 90 days, and bars all refugees from coming into the country for 120 days, starting March 16.

Existing visa holders will not be subjected to the ban, and religious minorities will no longer get preferential treatment — two details critics took particular issue with in the first ban. The new order removed Iraq from the list of countries, and changed excluding just Syrian refugees to preventing all refugees from entering the US.

Democrats denounced the new order, with Senate Minority Leader Chuck Schumer saying the “watered-down ban is still a ban,” and Democratic National Committee Chair Tom Perez saying “Trump’s obsession with religious discrimination is disgusting, un-American, and outright dangerous.”

Read the full text of the order here »

UPDATE 3/15: US District Judge Derrick Watson put an emergency halt on the revised travelban the day before it would have taken effect, after several states and refugee groups sued in court. Trump vowed to appeal the decision and take the order all the way to the Supreme Court if necessary.

Presidential Memorandum, March 6: Guidance for agencies to implement the new travel ban

Presidential Memorandum, March 6: Guidance for agencies to implement the new travel ban

Secretary of State Rex Tillerson, Attorney General Jeff Sessions, and Homeland Security Secretary John Kelly make statements on Trump’s new travel ban on March 6, 2017.AP Photo/Susan Walsh

This memo instructs the State Department, the Justice Department, and the Department of Homeland Security how to implement Trump’s new travel ban.

It directs the three department heads to enhance the vetting of visa applicants and other immigrants trying to enter the US as they see fit, to release how many visa applicants there were by country, and to submit a report in 180 days detailing the long-term costs of the United States Refugee Admissions Program.

Read the full text of the memorandum here »

3 Presidential proclamations, March 1: National months for women, the American Red Cross, and Irish-Americans

3 Presidential proclamations, March 1: National months for women, the American Red Cross, and Irish-Americans

Donald Trump signs bills to promote women in STEM.Zach Gibson/Getty Images

The president proclaimed March 2017 Women’s History Month, American Red Cross Month, and Irish-American Heritage Month.

Read the full text of the women’s history proclamation here »

And the Red Cross proclamation here »

And the Irish-American proclamation here »

Executive Order, February 28: Promoting Historically Black Colleges and Universities

Executive Order, February 28: Promoting Historically Black Colleges and Universities

Kellyanne Conway, counselor to the president, takes a photo of leaders from Historically Black Colleges and Universities and Trump in the Oval Office.Getty Images

This order established the White House Initiative on Historically Black Colleges and Universities, which will aim to increase private funding of these schools, encourage more students to attend them, and identify ways the executive branch can help these institutions succeed.

Students at some HBCU protested the meeting their leaders attended to witness Trump signing the order, expressing their disapproval of the president in general, and questioning whether the action was “truly a seat at the table” or merely “a photo op.”

Read the full text of the order here »

Executive Order, February 28: Reviewing the ‘Waters of the United States’ rule

Executive Order, February 28: Reviewing the 'Waters of the United States' rule

EPA Administrator Scott Pruitt holds up an EPA cap during his first address to the agency.AP Photo/Susan Walsh

The order directed federal agencies to revise the Clean Water Rule, a major regulation Obama issued in 2015 to clarify what areas are federally protected under the Clean Water Act.

Trump’s EPA Administrator Scott Pruitt called the rule “the greatest blow to private property rights the modern era has seen,” in 2015, and led a multi-state lawsuit against it while he was Oklahoma’s attorney general.

David J. Cooper, an ecologist at Colorado State University, cautioned that repealing the rule wouldn’t settle the confusion about what the federal government can protect under the Clean Water Act, or where.

Read the full text of the order here »

Executive Order, February 24: Enforcing regulatory reform

Executive Order, February 24: Enforcing regulatory reform

President Donald Trump meets with union leaders at the White House.Getty Images

This order creates Regulator Reform Officers within each federal agency who will comb through existing regulations and recommend which ones the administration should repeal. It directs the officers to focus on eliminating regulations that prevent job creation, are outdated, unnecessary, or cost too much.

The act doubles down on Trump’s plan to cut government regulations he says are hampering businesses, but opponents insist are necessary to protect people and the environment. Leaders of 137 nonprofit groups sent a letter to the White House on February 28 telling the president that “Americans did not vote to be exposed to more health, safety, environmental and financial dangers.”

Read the full text of the order here »

Executive Order, February 9: Combating criminal organizations

Executive Order, February 9: Combating criminal organizations

Recaptured drug lord Joaquin “El Chapo” Guzman is escorted by soldiers at the hangar belonging to the office of the Attorney General in Mexico City, Mexico on January 8, 2016.Reuters/Amanda Macias/Business Insider

The order is intended to “thwart” criminal organizations, including “criminal gangs, cartels, racketeering organizations, and other groups engaged in illicit activities.”

The action directs law enforcement to apprehend and prosecute citizens, and deport non-citizens involved in criminal activities including “the illegal smuggling and trafficking of humans, drugs or other substances, wildlife, and weapons,” “corruption, cybercrime, fraud, financial crimes, and intellectual-property theft,” and money laundering

The Secretary of State, Attorney General, Secretary of Homeland Security, and Director of National Intelligence will co-chair a Threat Mitigation Working Group that will identify ways that local, state, federal, and international law enforcement can work together in order to eradicate organized crime.

It also instructs the co-chairs to present the president with a report within 120 days outlining the penetration of criminal organizations into the United States, and recommendations for how to eradicate them.

Read the full text of the order here »

Executive Order, February 9: Reducing crime

Executive Order, February 9: Reducing crime

President Donald Trump speaks during a meeting with county sheriffs in the Roosevelt Room of the White House in Washington, Tuesday, Feb. 7, 2017.AP Photo/Evan Vucci

Following up on his promise to restore “law and order” in America, Trump signed an executive order intended to reduce violent crime in the US, and “comprehensively address illegal immigration, drug trafficking, and violent crime.”

The action directs Attorney General Jeff Sessions to assemble a task force in order to identify new strategies and laws to reduce crime, and to evaluate how well crime data is being collected and leveraged across the country.

Trump has come under fire recently for claiming the national murder rate was at an all-time high, when it has in fact dropped to one of the lowest rates ever, with 2015 merely experiencing a slight uptick from the previous year.

Read the full text of the order here »

Executive Order, February 9: Protecting law enforcement

Executive Order, February 9: Protecting law enforcement

Police break up skirmishes between demonstrators and supporters of then-Republican presidential candidate Donald Trump that broke out after it was announced the rally on March 11, 2016 in Chicago, Illinois would be postponed.Scott Olson/Getty Images

The order seeks to create new laws that will protect law enforcement, and increase the penalties for crimes committed against them.

It also directs the attorney general to review existing federal grant funding programs to law enforcement agencies, and recommend changes to the programs if they don’t adequately protect law enforcement.

The action is likely in response to multiple high-profile police killings over the past year, including a sniper attack that killed five Dallas police officers in July.

Read the full text of the order here »

Executive Order, February 3: Reviewing Wall Street regulations

Executive Order, February 3: Reviewing Wall Street regulations

President Donald Trump signs an executive order rolling back regulations from the 2010 Dodd-Frank law on Wall Street reform on Feb. 3, 2017 in the Oval Office.REUTERS/Kevin Lamarque

Trump signed two actions on Friday that could end up rewriting regulations in the financial industry that Obama and Congress put in place after the 2008 financial crisis.

The executive order sets “Core Principles” of financial regulation declaring that Trump’s administration seeks to empower Americans to make their own financial decisions, prevent taxpayer-funded bailouts, and reduce regulations on Wall Street so US companies can compete globally.

It also directs the Secretary of Treasury to review existing regulations on the financial system, determine whether the Core Principles are being met, and report back to the President in 120 days.

Experts worry that loosening regulations could roll back the Obama administration’s landmark consumer protection reform bill, Dodd-Frank, aimed at reducing risk in the financial system. Sen. Elizabeth Warren, the progressive darling from Massachusetts, led the charge decrying the actions.

Read the full text of the order here »

Presidential Memorandum, February 3: Reviewing the fiduciary duty rule

Presidential Memorandum, February 3: Reviewing the fiduciary duty rule

President Donald Trump signs an executive action in the White House.AP

The memorandum directs the Labor Secretary to review the “fiduciary rule,” another Obama-era law intended to protect Americans’ retirement money from conflicted advice from financial advisers that has long drawn rebuke from Wall Streeters and was scheduled to go into effect in April.

If the secretary finds the rule conflicts with the administration’s Core Principles, adversely affects the retirement industry, or causes increased litigation, then he should recommend revising or repealing the rule.

Democratic lawmakers and 38-million-member retiree nonprofit AARP came out against the action. Read more about Wall Street’s response to the memorandum here »

Read the full text of the memorandum here »

Presidential proclamation, February 2: American Heart Month

Presidential proclamation, February 2: American Heart Month

President Donald Trump and his wife Melania stand for the singing of the National Anthem during his inauguration ceremony at the Capitol on January 20, 2017.REUTERS/Carlos Barria

This ceremonial proclamation invited Americans to wear red on Friday, February 3, 2017 for National Wear Red Day, and followed Congress’ request in 1963 for presidents to annually declare February American Heart Month. The goal is to remember those who have died from heart disease and to improve its prevention, detection, and treatment.

Read the full text of the proclamation here »

Executive Order, January 30: For every new regulation proposed, repeal two existing ones

Executive Order, January 30: For every new regulation proposed, repeal two existing ones

President Donald Trump.Olivier Douliery-Pool/Getty Images

The order states that for every one regulation the executive branch proposes, two must be identified to repeal. It also caps the spending on new regulations for 2017 at $0.

Some environmental groups expressed concern that the order could undo regulations put in place to protect natural resources.

Read the full text here »

Executive Order, January 28: Drain the swamp

Executive Order, January 28: Drain the swamp

Trump’s Cabinet nominees.Skye Gould/Business Insider

The order requires appointees to every executive agency to sign an ethics pledge saying they will never lobby a foreign government and that they won’t do any other lobbying for five years after they leave government.

But it also loosened some ethics restrictions that Obama put in place, decreasing the number of years executive branch employees had to wait since they had last been lobbyists from two years to one.

Read the full text here »

Presidential Memorandum, January 28: Reorganizing the National and Homeland Security Councils

Presidential Memorandum, January 28: Reorganizing the National and Homeland Security Councils

Chief White House strategist Steve Bannon.AP Photo/Gerald Herbert

Trump removed the nation’s top military and intelligence advisers as regular attendees of the National Security Council’s Principals Committee, the interagency forum that deals with policy issues affecting national security.

The executive measure established Trump’s chief strategist, Steve Bannon, as a regular attendee, and disinvited the chairman of the Joint Chiefs of Staff and the Director of National Intelligence to attend only when necessary.

Top Republican lawmakers and national security experts roundly criticized the move, expressing their skepticism that Bannon should be present and alarm that the Joint Chiefs of Staff sometimes wouldn’t be.

Read the full text here »

Presidential Memorandum, January 28: Defeating ISIS

Presidential Memorandum, January 28: Defeating ISIS

Donald Trump at a rally with James Mattis, his pick for defense secretary.AP

Making a point to use the phrase “radical Islamic terrorism” (something Trump criticized Obama for on the campaign trail), Trump directed his administration “to develop a comprehensive plan to defeat ISIS,” drafted within 30 days.

Read the full text here »

Executive Order, January 27: Immigration ban

Executive Order, January 27: Immigration ban

Protesters assemble at John F. Kennedy International Airport in New York, Saturday, Jan. 28, 2017 after earlier in the day two Iraqi refugees were detained while trying to enter the country.Associated Press/Craig Ruttle

In Trump’s most controversial executive action yet, he temporarily barred people from majority-Muslim Iran, Iraq, Libya, Somalia, Sudan, and Yemen from entering the country for 90 days, and Syrians from entering until he decides otherwise.

Federal judges in several states declared the order unconstitutional, releasing hundreds of people who were stuck at US airports in limbo. The White House continues to defend the action, insisting it was “not about religion” but about “protecting our own citizens and border.”

Tens of thousands of people protested the action in cities and airports across the US, company executives came out against the order, and top Republicans split with their president to criticize Trump’s approach.

Read the full text here »

UPDATE: Since the Ninth Circuit Court of Appeals struck down this order on February 9, Trump issued a new order intended to replace this one on March 6.

Presidential Memorandum, January 27: ‘Rebuilding’ the military

Presidential Memorandum, January 27: 'Rebuilding' the military

Marine General James Mattis.US Marine Corps

This action directed Secretary of Defense James Mattis to conduct a readiness review of the US military and Ballistic Missile Defense System, and submit his recommendations to “rebuild” the armed forces.

Read the full text here »

Presidential proclamation, January 26: National School Choice Week

Presidential proclamation, January 26: National School Choice Week

Thousands rally in support of charter schools outside the Capitol in Albany, N.Y., on Tuesday, March 4, 2014.AP Images

Trump proclaimed January 22 through January 28, 2017 as National School Choice Week.

The ceremonial move aimed to encourage people to demand school-voucher programs and charter schools, of which Trump’s Secretary of Education nominee Betsy DeVos is a vocal supporter. Meanwhile, opponents argue that the programs weaken public schools and fund private schools at taxpayers’ expense.

Read the full text here »

Executive Order, January 25: Build the wall

Executive Order, January 25: Build the wall

Supporters of then-Republican presidential candidate Donald Trump chant, “Build that wall,” before a town hall meeting in Rothschild, Wis. on April 2, 2016.Associated Press/Charles Rex Arbogast

Trump outlined his intentions to build a wall along the US border with Mexico, one of his main campaign promises.

The order also directs the immediate detainment and deportation of illegal immigrants, and requires state and federal agencies tally up how much foreign aid they are sending to Mexico within 30 days, and tells the US Customs and Border Protection to hire 5,000 additional border patrol agents.

While Trump has claimed Mexico will pay for the wall, his administration has since softened this pledge, indicating US taxpayers may have to foot the bill, at least at first.

Read the full text here »

Executive Order, January 25: Cutting funding for sanctuary cities

Executive Order, January 25: Cutting funding for sanctuary cities

Lordes Reboyoso, right, yells at a rally outside of City Hall in San Francisco, Wednesday, Jan. 25, 2017.Associated Press/Jeff Chiu

Trump called “sanctuary cities” to comply with federal immigration law or have their federal funding pulled.

The order has prompted a mixture of resistance and support from local lawmakers and police departments in the sanctuary cities, which typically refuse to honor federal requests to detain people on suspicion of violating immigration law even if they were arrested on unrelated charges. The city of San Francisco is already suing Trump, claiming the order is unconstitutional.

Read the full text here »

Executive Order, January 24: Expediting environmental review for infrastructure projects

Executive Order, January 24: Expediting environmental review for infrastructure projects

Then Republican presidential candidate Donald Trump holds a campaign rally.Mark Lyons/Getty Images

The order allows governors or heads of federal agencies to request an infrastructure project be considered “high-priority” so it can be fast-tracked for environmental review.

Trump signed the order as a package infrastructure deal, along with three memoranda on oil pipelines.

Read the full text here »

3 Presidential Memoranda, January 24: Approving pipelines

3 Presidential Memoranda, January 24: Approving pipelines

President Donald Trump looks up while signing an executive action to advance construction of the Keystone XL pipeline at the White House in Washington January 24, 2017.Reuters/Kevin Lamarque

Trump signed three separate memoranda set to expand oil pipelines in the United States, a move immediately decried by Native American tribes, Democrats, and activists.

The first two direct agencies to immediately review and approve construction of the Dakota Access Pipeline and the Keystone XL Pipeline, and the third requires all pipeline materials be built in the US.

While pipeline proponents argue that they transport oil and gas more safely than trains or trucks can, environmentalists say pipelines threaten the contamination of drinking water.

Read the full text of all three memoranda here »

Presidential Memorandum, January 24: Reduce regulations for US manufacturing

Presidential Memorandum, January 24: Reduce regulations for US manufacturing

President-elect Donald Trump talks with workers during a visit to the Carrier factory on Dec. 1, 2016, in Indianapolis, Ind.AP Photo/Evan Vucci

Trump directed his Secretary of Commerce to review how federal regulations affect US manufacturers, with the goal of figuring out how to reduce them as much as possible.

Read the full text here »

Presidential Memorandum, January 23: Reinstating the ‘Mexico City policy’

Presidential Memorandum, January 23: Reinstating the 'Mexico City policy'

Hundreds of thousands of protesters march down Pennsylvania avenue during the Women’s March on Washington January 21, 2017 in Washington, DC to protest newly inaugurated President Donald Trump.Aaron P. Bernstein/Getty Image

The move reinstated a global gag rule that bans American non-governmental organizations working abroad from discussing abortion.

Democratic and Republican presidents have taken turns reinstating it and getting rid of it since Ronald Reagan created the gag order in 1984. The rule, while widely expected, dismayed women’s rights and reproductive health advocates, but encouraged antiabortion activists.

Read the full text here »

Presidential Memorandum, January 23: Hiring Freeze

Presidential Memorandum, January 23: Hiring Freeze

Andy Kiersz/Business Insider

Trump froze all hiring in the executive branch excluding the military, directing no vacancies be filled, in an effort to cut government spending and bloat.

Union leaders called the action “harmful and counterproductive,” saying it would “disrupt government programs and services that benefit everyone.”

Read the full text here »

UPDATE 4/12: The hiring freeze is lifted, but budget director Mick Mulvaney says many jobs will stay unfilled because the Trump administration wants to reduce the federal workforce. The AP reported that the federal government added 2,000 workers in February and January, despite the freeze.

Presidential Memorandum, January 23: Out of the TPP

Presidential Memorandum, January 23: Out of the TPP

A protester holds signs against the TPP during a rally in Lima, Peru.Esteban Felix/AP Photo

This action signaled Trump’s intent to withdraw from the Trans Pacific Partnership, a trade deal that would lower tariffs for 12 countries around the Pacific Rim, including Japan and Mexico but excluding China.

Results were mixed. Sen. Bernie Sanders said he was “glad the Trans-Pacific Partnership is dead and gone,” while Republican Sen. John McCain said withdrawing was a “serious mistake.”

Read the full text here »

Executive Order, January 20: Declaring Trump’s intention to repeal the Affordable Care Act

Executive Order, January 20: Declaring Trump's intention to repeal the Affordable Care Act

Then President-elect Donald Trump meets with Speaker of the House Paul Ryan of Wisconsin on Capitol Hill November 10, 2016.Reuters

One of Trump’s top campaign promises was to repeal and replace the Affordable Care Act, commonly called Obamacare.

His first official act in office was declaring his intention to do so. Congressional Republicans have been working to do just that since their term started January 3, though there was dissent among Republicans over whether or not to complete the repeal process before a replacement plan is finalized and strident Democratic resistance to any repeal of the ACA.

Read the full text here »

UPDATE 3/28: House Speaker Paul Ryan pulled the bill to repeal and replace the ACA, officially called the American Health Care Act, on March 24 after Republicans didn’t have enough votes to pass it. But some members of the GOP are still working on a way to dismantle Obamacare.

Presidential Memorandum, January 20: Reince’s regulatory freeze

Presidential Memorandum, January 20: Reince's regulatory freeze

President-elect Donald Trump and Republican National Committee Chairman Reince Priebus on election night.Mark Wilson/Getty Images

Trump’s Chief of Staff Reince Priebus signed this action, directing agency heads not to send new regulations to the Office of the Federal Register until the administration has leaders in place to approve them.

Obama’s Chief of Staff Rahm Emanuel signed a similar memorandum when he took office in 2009, but as Bloomberg notes, Priebus changed the language from a suggestion to a directive.

The action is partly carried out to make sure the new administration wants to implement any pending regulations the old one was considering. Environmentalists worried if this could mean Trump is about to undo many of Obama’s energy regulations.

http://www.businessinsider.com/trump-executive-orders-memorandum-proclamations-presidential-action-guide-2017-1/#presidential-memorandum-january-20-reinces-regulatory-freeze-50

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 878-879

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 871, April 11, 2017, Story 1: Trump Rattling Cages (Sending Messages) in Syria and North Korea (Democratic People’s Republic of Korea (DPRK)) — Training Exercise — Trump Neoconed — Videos — Story 2: Attorney General Sessions Enforces Immigration Law — The Trump Era — Videos

Posted on April 11, 2017. Filed under: American History, Breaking News, Business, Communications, Congress, Corruption, Countries, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Empires, Federal Government, Government, Health, History, Human, Illegal Immigration, Illegal Immigration, Immigration, Law, Legal Immigration, Life, Media, North Korea, Obama, Philosophy, Photos, Politics, President Trump, Progressives, Rand Paul, Rand Paul, Raymond Thomas Pronk, Regulation, Rule of Law, Scandals, Success, Syria, Taxation, Taxes, Terror, Terrorism, Trump Surveillance/Spying, Unemployment, United States of America, Videos, Violence, War, Weapons, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Story 1: Trump Rattling Cages (Sending Messages) in Syria and North Korea (Democratic People’s Republic of Korea (DPRK)) —  Training Exercise — Trump Neoconed — Videos —

Image result for pipelines in middle east existing and plannedImage result for map north and south korea missilesImage result for pipelines in syria iran to europeImage result for map north and south korea japan us navy warships april 2017

Image result for map north and south korea missiles

Image result for map north and south korea missiles

Image result for map north and south korea missiles

Image result for map north and south korea missiles

General James Mattis Delivers a THREAT at Defense Briefing at Pentagon on Russia, North Korea, China

What the Media Won’t Tell You about Syria

Alex Jones : We Must Stop Donald Trump and Globalists in Syria !

Rand Paul: Syria strikes ‘not in the national interest’

Ron Paul “Nobody’s Proven Anything About Who Gassed Whom!”

Congressman Ron Paul, MD – We’ve Been NeoConned

Rand Paul Says McCain Stupidity Hinders Political Solution in Syria

LIMBAUGH: Trump Voters Feel SHOCKED And BETRAYED After Syria Missile Strike

There’s No Such Thing As the Bad Guy

Keiser Report: What is Wrong with America? (E 1056)

Syria: Why Now, What’s the Strategy, What Are Critical Issues Before Us?

Ann Coulter’s take on Syria, Trump’s foreign policy

Unintended Consequences

Donald Trump, Commander in Chief

EXCLUSIVE: Michael Savage Begs Trump To Stop WWIII

Fears mount as the USS Carl Vinson heads does an about face

North Korea warns US over aircraft carrier deployment

united states SENDS warships To KOREA! TRUMP reacts to NORTH KOREA!

NORTH KOREA READY for UNITED STATES! SOUTH KOREA wants THEM OUT! BREAKING NEWS

Is North Korea next?

The U.S. vs. North Korea: Inside a Pentagon war game

The Real Doctor Evil: Kim Jong Il’s North Korea – Full Documentary

North Korea: The Great Illusion

Special report: North Korea: Credible threat?

Jack Posobiec: Will Trump Strike North Korea?

TRUMP sends HUGE message with USS GERALD R.FORD! after NORTH KOREA WARNS UNITED STATES

Alex Jones Breaks Down War Scenarios With China/North Korea! This Doesn’t End Well

Trump: We’ll solve North Korea ourselves

HE’S UNBELIEVABLE! MATTIS JUST SCARED KIM JONG UN TO DEATH WITH THESE 5 WORDS!

THIS CHANGES EVERYTHING! JAPAN IS CONSIDERING ULTIMATE ACT OF WAR AGAINST NORTH KOREA – THIS IS IT!

The Dangerous Tone of US Media and Revisionist History Towards Korea

Why Korea Split Into North and South Korea

Arirang Special M60Ep199 The Untold Story – “The Korean Empire”

 

North Korea state media warns of nuclear strike if provoked as U.S. warships approach

* North Korea media warns of nuclear strike on U.S. if provoked

* U.S. warships head for Korean peninsula

* Trump says North Korea “looking for trouble”

* Russia “really worried” about possible U.S. attack on North (Adds Trump Tweet)

By Sue-Lin Wong

PYONGYANG, April 11 (Reuters) – North Korean state media on Tuesday warned of a nuclear attack on the United States at any sign of U.S. aggression as a U.S. Navy strike group steamed towards the western Pacific.

U.S. President Donald Trump, who has urged China to do more to rein in its impoverished neighbour, said in a Tweet North Korea was “looking for trouble” and the United States would “solve the problem” with or without China’s help.

Tension has escalated sharply on the Korean peninsula with talk of military action by the United States gaining traction following its strikes last week against Syria and amid concerns the reclusive North may soon conduct a sixth nuclear test.

For more news videos visit Yahoo View, available now on iOS and Android.

North Korea’s official Rodong Sinmun newspaper said the country was prepared to respond to any aggression by the United States.

“Our revolutionary strong army is keenly watching every move by enemy elements with our nuclear sight focused on the U.S. invasionary bases not only in South Korea and the Pacific operation theatre but also in the U.S. mainland,” it said.

South Korean acting President Hwang Kyo-ahn warned of “greater provocations” by North Korea and ordered the military to intensify monitoring and to ensure close communication with the United States.

“It is possible the North may wage greater provocations such as a nuclear test timed with various anniversaries including the Supreme People’s Assembly,” said Hwang, acting leader since former president Park Geun-hye was removed amid a graft scandal.

Trump said in a Tweet a trade deal between China and the United States would be “far better for them if they solved the North Korea problem”.

“If China decides to help, that would be great,” he said. “If not, we will solve the problem without them!”

Trump and his Chinese counterpart, Xi Jinping, met in Florida last week and Trump pressed Xi to do more to rein in North Korea.

The North convened a Supreme People’s Assembly session on Tuesday, one of its twice-yearly sessions in which major appointments are announced and national policy goals are formally approved. It did not immediately release details.

But South Korean officials took pains to quell talk in social media of an impending security crisis or outbreak of war.

“We’d like to ask precaution so as not to get blinded by exaggerated assessment about the security situation on the Korean peninsula,” Defence Ministry spokesman Moon Sang-kyun said.

Saturday is the 105th anniversary of the birth of Kim Il Sung, the country’s founding father and grandfather of current ruler, Kim Jong Un.

A military parade is expected in the North’s capital, Pyongyang, to mark the day. North Korea often also marks important anniversaries with tests of its nuclear or missile capabilities in breach of U.N. Security Council resolutions.

Men and women in colourful outfits were singing and dancing on the streets of Pyongyang, illuminated by better lighting than that seen in previous years, apparently practising for the parade planned.

Syrian President Bashar al-Assad sent a message of congratulations to mark the event, lambasting “big powers” for their “expansionist” policy.

“The friendly two countries are celebrating this anniversary and, at the same time, conducting a war against big powers’ wild ambition to subject all countries to their expansionist and dominationist policy and deprive them of their rights to self-determination,” the North’s KCNA news agency quoted the message as saying.

The North’s foreign ministry, in a statement carried by KCNA, said the U.S. navy strike group’s approach showed America’s “reckless moves for invading had reached a serious phase”.

“We never beg for peace but we will take the toughest counteraction against the provocateurs in order to defend ourselves by powerful force of arms and keep to the road chosen by ourselves,” an unidentified ministry spokesman said.

North Korea and the rich, democratic South are technically still at war because their 1950-53 conflict ended in a truce, not a peace treaty. The North regularly threatens to destroy the South and its main ally, the United States.

http://finance.yahoo.com/news/north-korea-state-media-warns-100014004.html

Coming to Terms With the American Empire

APRIL 14, 2015 | 07:54 GMT

 

By George Friedman

“Empire” is a dirty word. Considering the behavior of many empires, that is not unreasonable. But empire is also simply a description of a condition, many times unplanned and rarely intended. It is a condition that arises from a massive imbalance of power. Indeed, the empires created on purpose, such as Napoleonic France and Nazi Germany, have rarely lasted. Most empires do not plan to become one. They become one and then realize what they are. Sometimes they do not realize what they are for a long time, and that failure to see reality can have massive consequences.

World War II and the Birth of an Empire

The United States became an empire in 1945. It is true that in the Spanish-American War, the United States intentionally took control of the Philippines and Cuba. It is also true that it began thinking of itself as an empire, but it really was not. Cuba and the Philippines were the fantasy of empire, and this illusion dissolved during World War I, the subsequent period of isolationism and the Great Depression.

The genuine American empire that emerged thereafter was a byproduct of other events. There was no great conspiracy. In some ways, the circumstances of its creation made it more powerful. The dynamic of World War II led to the collapse of the European Peninsula and its occupation by the Soviets and the Americans. The same dynamic led to the occupation of Japan and its direct governance by the United States as a de facto colony, with Gen. Douglas MacArthur as viceroy.

The United States found itself with an extraordinary empire, which it also intended to abandon. This was a genuine wish and not mere propaganda. First, the United States was the first anti-imperial project in modernity. It opposed empire in principle. More important, this empire was a drain on American resources and not a source of wealth. World War II had shattered both Japan and Western Europe. The United States gained little or no economic advantage in holding on to these countries. Finally, the United States ended World War II largely untouched by war and as perhaps one of the few countries that profited from it. The money was to be made in the United States, not in the empire. The troops and the generals wanted to go home.

But unlike after World War I, the Americans couldn’t let go. That earlier war ruined nearly all of the participants. No one had the energy to attempt hegemony. The United States was content to leave Europe to its own dynamics. World War II ended differently. The Soviet Union had been wrecked but nevertheless it remained powerful. It was a hegemon in the east, and absent the United States, it conceivably could dominate all of Europe. This represented a problem for Washington, since a genuinely united Europe — whether a voluntary and effective federation or dominated by a single country — had sufficient resources to challenge U.S. power.

The United States could not leave. It did not think of itself as overseeing an empire, and it certainly permitted more internal political autonomy than the Soviets did in their region. Yet, in addition to maintaining a military presence, the United States organized the European economy and created and participated in the European defense system. If the essence of sovereignty is the ability to decide whether or not to go to war, that power was not in London, Paris or Warsaw. It was in Moscow and Washington.

The organizing principle of American strategy was the idea of containment. Unable to invade the Soviet Union, Washington’s default strategy was to check it. U.S. influence spread through Europe to Iran. The Soviet strategy was to flank the containment system by supporting insurgencies and allied movements as far to the rear of the U.S. line as possible. The European empires were collapsing and fragmenting. The Soviets sought to create an alliance structure out of the remnants, and the Americans sought to counter them.

The Economics of Empire

One of the advantages of alliance with the Soviets, particularly for insurgent groups, was a generous supply of weapons. The advantage of alignment with the United States was belonging to a dynamic trade zone and having access to investment capital and technology. Some nations, such as South Korea, benefited extraordinarily from this. Others didn’t. Leaders in countries like Nicaragua felt they had more to gain from Soviet political and military support than in trade with the United States.

The United States was by far the largest economic power, with complete control of the sea, bases around the world, and a dynamic trade and investment system that benefitted countries that were strategically critical to the United States or at least able to take advantage of it. It was at this point, early in the Cold War, that the United States began behaving as an empire, even if not consciously.

The geography of the American empire was built partly on military relations but heavily on economic relations. At first these economic relations were fairly trivial to American business. But as the system matured, the value of investments soared along with the importance of imports, exports and labor markets. As in any genuinely successful empire, it did not begin with a grand design or even a dream of one. Strategic necessity created an economic reality in country after country until certain major industries became dependent on at least some countries. The obvious examples were Saudi Arabia or Venezuela, whose oil fueled American oil companies, and which therefore — quite apart from conventional strategic importance — became economically important. This eventually made them strategically important.

As an empire matures, its economic value increases, particularly when it is not coercing others. Coercion is expensive and undermines the worth of an empire. The ideal colony is one that is not at all a colony, but a nation that benefits from economic relations with both the imperial power and the rest of the empire. The primary military relationship ought to be either mutual dependence or, barring that, dependence of the vulnerable client state on the imperial power.

This is how the United States slipped into empire. First, it was overwhelmingly wealthy and powerful. Second, it faced a potential adversary capable of challenging it globally, in a large number of countries. Third, it used its economic advantage to induce at least some of these countries into economic, and therefore political and military, relationships. Fourth, these countries became significantly important to various sectors of the American economy.

Limits of the American Empire

The problem of the American Empire is the overhang of the Cold War. During this time, the United States expected to go to war with a coalition around it, but also to carry the main burden of war. When Operation Desert Storm erupted in 1991, the basic Cold War principle prevailed. There was a coalition with the United States at the center of it. After 9/11, the decision was made to fight in Afghanistan and Iraq with the core model in place. There was a coalition, but the central military force was American, and it was assumed that the economic benefits of relations with the United States would be self-evident. In many ways, the post-9/11 wars took their basic framework from World War II. Iraq War planners explicitly discussed the occupation of Germany and Japan.

No empire can endure by direct rule. The Nazis were perhaps the best example of this. They tried to govern Poland directly, captured Soviet territory, pushed aside Vichy to govern not half but all of France, and so on. The British, on the other hand, ruled India with a thin layer of officials and officers and a larger cadre of businessmen trying to make their fortunes. The British obviously did better. The Germans exhausted themselves not only by overreaching, but also by diverting troops and administrators to directly oversee some countries. The British could turn their empire into something extraordinarily important to the global system. The Germans broke themselves not only on their enemies, but on their conquests as well.

The United States emerged after 1992 as the only global balanced power. That is, it was the only nation that could deploy economic, political and military power on a global basis. The United States was and remains enormously powerful. However, this is very different from omnipotence. In hearing politicians debate Russia, Iran or Yemen, you get the sense that they feel that U.S. power has no limits. There are always limits, and empires survive by knowing and respecting them.

The primary limit of the American empire is the same as that of the British and Roman empires: demographic. In Eurasia — Asia and Europe together — the Americans are outnumbered from the moment they set foot on the ground. The U.S. military is built around force multipliers, weapons that can destroy the enemy before the enemy destroys the relatively small force deployed. Sometimes this strategy works. Over the long run, it cannot. The enemy can absorb attrition much better than the small American force can. This lesson was learned in Vietnam and reinforced in Iraq and Afghanistan. Iraq is a country of 25 million people. The Americans sent about 130,000 troops. Inevitably, the attrition rate overwhelmed the Americans. The myth that Americans have no stomach for war forgets that the United States fought in Vietnam for seven years and in Iraq for about the same length of time. The public can be quite patient. The mathematics of war is the issue. At a certain point, the rate of attrition is simply not worth the political ends.

The deployment of a main force into Eurasia is unsupportable except in specialized cases when overwhelming force can be bought to bear in a place where it is important to win. These occasions are typically few and far between. Otherwise, the only strategy is indirect warfare: shifting the burden of war to those who want to bear it or cannot avoid doing so. For the first years of World War II, indirect warfare was used to support the United Kingdom and the Soviet Union against Germany.

There are two varieties of indirect warfare. The first is supporting native forces whose interests are parallel. This was done in the early stages of Afghanistan. The second is maintaining the balance of power among nations. We are seeing this form in the Middle East as the United States moves between the four major regional powers — Iran, Saudi Arabia, Israel and Turkey — supporting one then another in a perpetual balancing act. In Iraq, U.S. fighters carry out air strikes in parallel with Iranian ground forces. In Yemen, the United States supports Saudi air strikes against the Houthis, who have received Iranian training.

This is the essence of empire. The British saying is that it has no permanent friends or permanent enemies, only permanent interests. That old cliche is, like most cliches, true. The United States is in the process of learning that lesson. In many ways the United States was more charming when it had clearly identified friends and enemies. But that is a luxury that empires cannot afford.

Building a System of Balance

We are now seeing the United States rebalance its strategy by learning to balance. A global power cannot afford to be directly involved in the number of conflicts that it will encounter around the world. It would be exhausted rapidly. Using various tools, it must create regional and global balances without usurping internal sovereignty. The trick is to create situations where other countries want to do what is in the U.S. interest.

This endeavor is difficult. The first step is to use economic incentives to shape other countries’ behavior. It isn’t the U.S. Department of Commerce but businesses that do this. The second is to provide economic aid to wavering countries. The third is to provide military aid. The fourth is to send advisers. The fifth is to send overwhelming force. The leap from the fourth level to the fifth is the hardest to master. Overwhelming force should almost never be used. But when advisers and aid do not solve a problem that must urgently be solved, then the only type of force that can be used is overwhelming force. Roman legions were used sparingly, but when they were used, they brought overwhelming power to bear.

The Responsibilities of Empire

I have been deliberately speaking of the United States as an empire, knowing that this term is jarring. Those who call the United States an empire usually mean that it is in some sense evil. Others will call it anything else if they can. But it is helpful to face the reality the United States is in. It is always useful to be honest, particularly with yourself. But more important, if the United States thinks of itself as an empire, then it will begin to learn the lessons of imperial power. Nothing is more harmful than an empire using its power carelessly.

It is true that the United States did not genuinely intend to be an empire. It is also true that its intentions do not matter one way or another. Circumstance, history and geopolitics have created an entity that, if it isn’t an empire, certainly looks like one. Empires can be far from oppressive. The Persians were quite liberal in their outlook. The American ideology and the American reality are not inherently incompatible. But two things must be faced: First, the United States cannot give away the power it has. There is no practical way to do that. Second, given the vastness of that power, it will be involved in conflicts whether it wants to or not. Empires are frequently feared, sometimes respected, but never loved by the rest of the world. And pretending that you aren’t an empire does not fool anyone.

The current balancing act in the Middle East represents a fundamental rebalancing of American strategy. It is still clumsy and poorly thought out, but it is happening. And for the rest of the world, the idea that the Americans are coming will become more and more rare. The United States will not intervene. It will manage the situation, sometimes to the benefit of one country and sometimes to another.

https://www.stratfor.com/weekly/coming-terms-american-empire

 

History of North Korea

From Wikipedia, the free encyclopedia
For history of Korea before its division, see History of Korea.
Part of a series on the
History of North Korea
Emblem of Emblem of North Korea
Soviet Civil Administration 1945–46
Provisional People’s Committee for North Korea 1946–48
Kim Il-sung’s rule 1948–94
Korean War 1950–53
Korean DMZ Conflict 1966–69
Juche 1972
Death and state funeral of Kim Il-sung 1994
Kim Jong-il’s rule 1994–2011
North Korean famine 1994–98
Songun 1998
Sunshine Policy 1998–2010
Six-party talks 2003
ROKS Cheonan sinking 2010
Death and state funeral of Kim Jong-il 2011
Kim Jong-un’s rule 2011–present
State Affairs Commission 2016
Flag of North Korea.svgNorth Korea portal

The history of North Korea began with the partition of Korea at the end of World War II in 1945, and the creation of the Communist-aligned Democratic People’s Republic of Korea (DPRK) headed by the former guerrilla leader, Kim Il-sung. In 1950 the Korean War broke out. After much destruction, the war ended with the status quo being restored. The DPRK had failed to unify Korea under its leadership, and the US-led United Nations force had failed to conquer North Korea. The peninsula was divided by the Korean Demilitarized Zone, and a US military force remained in South Korea.

Tension between the two sides continued. Kim Il-sung remained in power until his death in 1994. He developed a pervasive personality cult and steered the country on an independent course in accordance with the principle of Juche (or self-reliance). However, with natural disasters and the collapse of the Soviet Bloc in 1991, North Korea went into a severe economic crisis. Kim Il-sung’s son, Kim Jong-il, succeeded him, and was in turn succeeded by his son, Kim Jong-un. Amid international alarm, North Korea developed nuclear missiles.

Northern Korea before the division

From 1910 to the end of World War II, Korea was under Japanese rule. Most Koreans were peasants engaged in subsistence farming.[1] In the 1930s, Japan developed mines, hydro-electric dams, steel mills, and manufacturing plants in northern Korea and neighboring Manchuria.[2] The Korean industrial working class expanded rapidly, and many Koreans went to work in Manchuria.[3] As a result, 65% of Korea’s heavy industry was located in the north, but, due to the harshness of the terrain, only 37% of its agriculture.[4]

A Korean guerrilla movement emerged in the mountainous interior and in Manchuria, harassing the Japanese imperial authorities. One of the most prominent guerrilla leaders was the Communist Kim Il-sung.[5]

Northern Korea had very little exposure to modern, Western ideas.[6] One partial exception of this was the penetration of religion. Since the arrival of missionaries in the late nineteenth century, the northwest of Korea, and Pyongyang in particular, had been a stronghold of Christianity.[7]

Division of Korea

Main article: Division of Korea

At the Tehran Conference in November 1943 and the Yalta Conference in February 1945, the Soviet Union promised to join its allies in the Pacific War within three months of victory in Europe. On August 8, 1945, after three months to the day, the Soviet Union declared war on Japan.[8] Soviet troops advanced rapidly, and the US government became anxious that they would occupy the whole of Korea. On August 10, the US government decided to propose the 38th parallel as the dividing line between a Soviet occupation zone in the north and a US occupation zone in the south. The parallel was chosen as it would place the capital Seoul under American control.[9] The division placed sixteen million Koreans in the American zone and nine million in the Soviet zone.[10] To the surprise of the Americans, the Soviet Union immediately accepted the division. The agreement was incorporated into General Order No. 1 (approved on 17 August 1945) for the surrender of Japan.[11]

Soviet forces began amphibious landings in Korea by August 14 and rapidly took over the north-east of the country, and on August 16 they landed at Wonsan.[12] On August 24, the Red Army reached Pyongyang.[13] US forces did not arrive in the south until September 8.[10]

During August, People’s Committees sprang up across Korea, affiliated with the Committee for the Preparation of Korean Independence, which in September founded the People’s Republic of Korea. When Soviet troops entered Pyongyang, they found a local People’s Committee established there, led by veteran Christian nationalist Cho Man-sik.[14] Unlike their American counterparts, the Soviet authorities recognized and worked with the People’s Committees.[15][16] By some accounts, Cho Man-sik was the Soviet government’s first choice to lead North Korea.[17][18]

On September 19, Kim Il-sung and 36 other Korean Red Army officers arrived in Wonsan. They had fought the Japanese in Manchuria in the 1930s but had lived in the USSR and trained in the Red Army since 1941.[19] On October 14, Soviet authorities introduced Kim to the North Korean public as a guerrilla hero.[19]

In December 1945, at the Moscow Conference, the Soviet Union agreed to a US proposal for a trusteeship over Korea for up to five years in the lead-up to independence. Most Koreans demanded independence immediately, but Kim and the other Communists supported the trusteeship under pressure from the Soviet government. Cho Man-sik opposed the proposal at a public meeting on January 4, 1946, and disappeared into house arrest.[20][21] On February 8, 1946, the People’s Committees were reorganized as Interim People’s Committees dominated by Communists.[22] The new regime instituted popular policies of land redistribution, industry nationalization, labor law reform, and equality for women.[23]

Meanwhile, existing Communist groups were reconstituted as a party under Kim Il-sung’s leadership. On December 18, 1945, local Communist Party committees were combined into the North Korean Communist Party.[19] In August 1946, this party merged with the New People’s Party to form the Workers’ Party of North Korea. In December, a popular front led by the Workers Party dominated elections in the North.[22] In 1949, the Workers’ Party of North Korea merged with its southern counterpart to become the Workers’ Party of Korea with Kim as party chairman.[24]

Kim established the Korean People’s Army (KPA) aligned with the Communists, formed from a cadre of guerrillas and former soldiers who had gained combat experience in battles against the Japanese and later Nationalist Chinese troops. From their ranks, using Soviet advisers and equipment, Kim constructed a large army skilled in infiltration tactics and guerrilla warfare. Before the outbreak of the Korean War, Joseph Stalin equipped the KPA with modern medium tanks, trucks, artillery, and small arms. Kim also formed an air force, equipped at first with ex-Soviet propeller-driven fighter and attack aircraft. Later, North Korean pilot candidates were sent to the Soviet Union and China to train in MiG-15 jet aircraft at secret bases.[25]

In 1946, a sweeping series of laws transformed North Korea on Stalinist lines. The “land to the tiller” reform redistributed the bulk of agricultural land to the poor and landless peasant population, effectively breaking the power of the landed class.[26] This was followed by a “Labor Law”, a “Sexual Equality Law”, and a “Nationalisation of Industry, Transport, Communications and Banks Law”.[27]

Kim Il-sung with Kim Koo in 1948

As negotiations with the Soviet Union on the future of Korea failed to make progress, the US took the issue to the United Nations in September 1947. In response, the UN established the United Nations Temporary Commission on Korea to hold elections in Korea. The Soviet Union opposed this move. In the absence of Soviet co-operation, it was decided to hold UN-supervised elections in the south only.[28] In April 1948, a conference of organizations from the North and the South met in Pyongyang, but conference produced no results. The southern politicians Kim Koo and Kim Kyu-sik attended the conference and boycotted the elections in the South.[29] Both men were posthumously awarded the National Reunification Prize by North Korea.[30] The elections were held in South Korea on May 10, 1948. On August 15, the Republic of Korea formally came into existence.[31] A parallel process occurred in North Korea. A new Supreme People’s Assembly was elected in August 1948, and on September 3 a new constitution was promulgated. The Democratic People’s Republic of Korea (DPRK) was proclaimed on September 9, with Kim as premier.[32] On October 12, the Soviet Union declared that Kim’s regime was the only lawful government on the peninsula.[citation needed] On December 12, 1948, the United Nations General Assembly accepted the report of UNTCOK and declared the Republic of Korea to be the “only lawful government in Korea”.[31]

By 1949, North Korea was a full-fledged Communist state. All parties and mass organizations joined the Democratic Front for the Reunification of the Fatherland, ostensibly a popular front but in reality dominated by the Communists. The government moved rapidly to establish a political system that was partly styled on the Soviet system, with political power monopolised by the Worker’s Party of Korea (WPK).

The Korean War (1950-1953)

Main article: Korean War

The consolidation of Syngman Rhee‘s government in the South with American military support and the suppression of the October 1948 insurrection ended North Korean hopes that a revolution in the South could reunify Korea, and from early 1949 Kim Il-sung sought Soviet and Chinese support for a military campaign to reunify the country by force. The withdrawal of most U.S. forces from South Korea in June 1949 left the southern government defended only by a weak and inexperienced South Korean army. The southern régime also had to deal with a citizenry of uncertain loyalty. The North Korean army, by contrast, had benefited from the Soviet Union‘s WWII-era equipment, and had a core of hardened veterans who had fought either as anti-Japanese guerrillas or alongside the Chinese Communists.[33] In 1949 and 1950 Kim traveled to Moscow with the South Korean Communist leader Pak Hon-yong to raise support for a war of reunification.[34]

InitiallyJoseph Stalin rejected Kim Il-sung’s requests for permission to invade the South, but in late 1949 the Communist victory in China and the development of Soviet nuclear weapons made him re-consider Kim’s proposal. In January 1950, after China’s Mao Zedong indicated that the People’s Republic of China would send troops and other support to Kim, Stalin approved an invasion.[35] The Soviets provided limited support in the form of advisers who helped the North Koreans as they planned the operation, and Soviet military instructors to train some of the Korean units. However, from the very beginning Stalin made it clear that the Soviet Union would avoid a direct confrontation with the U.S. over Korea and would not commit ground forces even in case of major military crisis.[36] The stage was set for a civil war between the two rival régimes on the Korean peninsula.

For over a year before the outbreak of war, the two sides had engaged in a series of bloody clashes along the 38th parallel, especially in the Ongjin area on the west coast.[37] On June 25, 1950, claiming to be responding to a South Korean assault on Ongjin, the Northern forces launched an amphibious offensive all along the parallel.[38] Due to a combination of surprise and military superiority, the Northern forces quickly captured the capital Seoul, forcing Syngman Rhee and his government to flee. By mid-July North Korean troops had overwhelmed the South Korean and allied American units and forced them back to a defensive line in south-east South Korea known as the Pusan Perimeter. During its brief occupation of southern Korea, the DPRK regime initiated radical social change, which included the nationalisation of industry, land reform, and the restoration of the People’s Committees.[39]According to the captured US General William F. Dean, “the civilian attitude seemed to vary between enthusiasm and passive acceptance”.[40][41]

The United Nations condemned North Korea’s actions and approved an American-led intervention force to defend South Korea. In September, UN forces landed at Inchon and retook Seoul. Under the leadership of US General Douglas Macarthur, UN forces pushed north, reaching the Chinese border. According to Bruce Cumings, the North Korean forces were not routed, but managed a strategic retreat into the mountainous interior and into neighboring Manchuria.[42] Kim Il-sung’s government re-established itself in a stronghold in Chagang Province.[43] In late November, Chinese forces entered the war and pushed the UN forces back, retaking Pyongyang in December 1950 and Seoul in January 1951. According to Bruce Cumings, the Korean People’s Army played an equal part in this counterattack.[44] UN forces managed to retake Seoul for South Korea. The war essentially became a bloody stalemate for the next two years.

2012 rehearsal in Pyongyang for Victory Day, marking the end of the war

American bombing included the use of napalm against populated areas and the destruction of dams and dykes, which caused devastating floods.[45][46] China and North Korea also alleged the US was deploying biological weapons.[47] As a result of the bombing, almost every substantial building and much of the infrastructure in North Korea was destroyed.[48][49] The North Koreans responded by building homes, schools, hospitals, and factories underground.[50] Economic output in 1953 had fallen by 75-90% compared with 1949.[51]

While the bombing continued, armistice negotiations, that had commenced in July 1951, wore on. North Korea’s lead negotiator was General Nam Il. The Korean Armistice Agreement was signed on July 27, 1953. A ceasefire followed, but there was no peace treaty, and hostilities continued at a lower intensity.[52]

Postwar developments

Internal politics

Despite the failure of his attempt at unifying the nation under his rule, Kim Il-sung considered the war a victory in the sense that he remained in power. As a result, the North Korean media made the most of it by focusing entirely on the defeats suffered by the US and UN forces during the failed invasion of North Korea in late 1950. The armistice was celebrated in Pyongyang with a military parade in which Kim declared: “Despite their best efforts, the imperialist invaders were defeated with great loss in men and material.”[citation needed]

Kim began gradually consolidating his power. Up to this time, North Korean politics were represented by four factions: the Yan’an faction, made up of returnees from China; the “Soviet Koreans” who were ethnic Koreans from the USSR; native Korean communists led by Pak Hon-yong; and Kim’s Kapsan group who had fought guerrilla actions against Japan in the 1930s.[53][54]

When the Worker’s Party Central Committee plenum opened on 30 August 1953 Choe Chang-ik made a speech attacking Kim for concentrating the power of the party and the state in his own hands as well as criticising the party line on industrialisation which ignored widespread starvation among the North Korean people. However, Kim neutralised the attack on him by promising to moderate the regime, promises which were never kept. The majority in the Central Committee voted to support Kim and also voted in favour of expelling Choe and Pak Hon-yong from the Central Committee. Eleven of Kim’s opponents were convicted in a show trial. It is believed that all were executed. A major purge of the KWP followed, with members originating from South Korea being expelled.[55]

Pak Hon-yong, party vice chairman and Foreign Minister of the DPRK, was blamed for the failure of the southern population to support North Korea during the war, was dismissed from his positions in 1953, and was executed after a show-trial in 1955.[56][57] Most of the South Korean leftists and communist sympathizers who defected to the North in 1945–1953 were also accused of espionage and other crimes, and subsequently killed, imprisoned, or exiled to remote agricultural and mining villages. Potential rivals from other groups such as Kim Tu-bong were also purged.[citation needed]

The Party Congress in 1956 indicated the transformation that the party had undergone. Most members of other factions had lost their positions of influence. More than half the delegates had joined after 1950, most were under 40 years old, and most had limited formal education.[58]

In February 1956, Soviet leader Nikita Khrushchev made a sweeping denunciation of Stalin, which sent shock waves throughout the Communist world. Encouraged by this, members of the party leadership in North Korea began to criticize Kim’s dictatorial leadership, personality cult, and Stalinist economic policies. They were defeated by Kim at the August Plenum of the party.[59][60] By 1960, 70 per cent of the members of the 1956 Central Committee were no longer in politics.[61]

Kim Il-sung had initially been criticized by the Soviets during a previous 1955 visit to Moscow for practicing Stalinism and a cult of personality, which was already growing enormous. The Korean ambassador to the USSR, Li Sangjo, a member of the Yan’an faction, reported that it had become a criminal offense to so much as write on Kim’s picture in a newspaper and that he had been elevated to the status of Marx, Lenin, Mao, and Stalin in the communist pantheon. He also charged Kim with rewriting history to appear as if his guerrilla faction had single-handedly liberated Korea from the Japanese, completely ignoring the assistance of the Chinese Communist Party. In addition, Li stated that in the process of agricultural collectivization, grain was being forcibly confiscated from the peasants, leading to “at least 300 suicides” and that Kim made nearly all major policy decisions and appointments himself. Li reported that over 30,000 people were in prison for completely unjust and arbitrary reasons as trivial as not printing Kim Il-sung’s portrait on sufficient quality paper or using newspapers with his picture to wrap parcels. Grain confiscation and tax collection were also conducted forcibly with violence, beatings, and imprisonment.[62] During Kim Il-sung’s Moscow visit, the Soviets recommended that he discard the personality cult, adhere to the ideas of collective leadership, remove falsified history accounts from textbooks, and work towards improving the living standards of the Korean people, which remained poor and below prewar standards. Foodstuffs during the initial postwar period were rationed and extremely expensive, as were consumer items. By comparison, South Korea, which had less of an industrial base than the DPRK, had a better food supply and was also flooded with American goods although it should be noted that the overall destruction there during the war was smaller.[citation needed]

In late 1968, known military opponents of North Korea’s Juche ideology such as Kim Chang-bong (minister of National Security), Huh Bong-hak (chief of the Division for Southern Intelligence) and Lee Young-ho(commander in chief of the DPRK Navy) were purged as anti-party/counter-revolutionary elements, despite their credentials as anti-Japanese guerrilla fighters in the past.[55]

Kim’s personality cult was modeled on Stalinism and his regime originally acknowledged Stalin as the supreme leader. After Stalin’s death in 1953, however, Kim was described as the “Great Leader” or “Suryong”. As his personality cult grew, the doctrine of Juche (or self-reliance) began to displace Marxism–Leninism. At the same time the cult extended beyond Kim himself to include his family in a revolutionary blood line.[63] In 1972, to celebrate Kim Il-sung’s birthday, the Mansu Hill Grand Monument was unveiled, including a 22-meter bronze statue of him.[64]

International relations

Like Mao in China, Kim Il-sung refused to accept Nikita Khrushchev‘s denunciation of Stalin and continued to model his regime on Stalinist norms.[65][66] At the same time, he increasingly stressed Korean independence, as embodied in the concept of Juche.[67] Kim told Alexei Kosygin in 1965 that he was not anyone’s puppet and “We…implement the purest Marxism and condemn as false both the Chinese admixtures and the errors of the CPSU”.[68]

Relations with China had worsened during the war. Mao Zedong criticized Kim for having started the whole “idiotic war” and for being an incompetent military commander who should have been removed from power. PLA commander Peng Dehuai was equally contemptuous of Kim’s skills at waging war.[69]

By some analysis, Kim Il-sung remained in power partially because the Soviets turned their attention to the Hungarian Revolution of 1956 that fall.[70] The Soviets and Chinese were unable to stop the inevitable purge of Kim’s domestic opponents or his move towards a one-man Stalinist autocracy and relations with both countries deteriorated in the former’s case because of the elimination of the pro-Soviet Koreans and the latter because of the regime’s refusal to acknowledge Chinese assistance in either liberation from the Japanese or the war in 1950-53.[71]

Stalin continued to be honored in North Korea long after his death in 1953, and a street in Pyongyang bore his name until 1980. By contrast, neighboring Chinese leader Mao Zedong was mostly ignored and Kim Il-sung rejected most of his policies such as the Hundred Flowers Campaign and (later) the Cultural Revolution.[citation needed]

The captured USS Pueblo being visited by tourists in Pyongyang

Tensions between North and South escalated in the late 1960s with a series of low-level armed clashes known as the Korean DMZ Conflict. In 1966, Kim declared “liberation of the south” to be a “national duty”.[72] In 1968, North Korean commandos launched the Blue House Raid, an unsuccessful attempt to assassinate the South Korean President Park Chung-hee. Shortly after, the US spy ship Pueblo was captured by the North Korean navy.[73] The crew were held captive throughout the year despite American protests that the vessel was in international waters and finally released in December after a formal US apology was issued.[74] In April 1969 North Korea shot down an EC-121 aircraft, killing everyone on board. The Nixon administration found itself unable to react at all, since the US was heavily committed in Vietnam and had no troops to spare if the situation in Korea escalated. However, the Pueblo capture and EC-121 shootdown did not find approval in Moscow, as the Soviet Union did not want a second major war to erupt in Asia. China’s response to the USS Pueblo crisis is less clear.[75]

After Khrushchev was replaced by Leonid Brezhnev as Soviet Leader in 1964, and with the incentive of Soviet aid, North Korea strengthened its ties with the USSR. Kim condemned China’s Cultural Revolution as “unbelievable idiocy”. In turn, China’s Red Guards labelled him a “fat revisionist”.[76][77] But by 1970, most of the storm clouds of the Cultural Revolution had blown away and relations with China quickly returned to normal. Chinese premier Zhou Enlai visited Pyongyang that year and apologized for the attacks made on Kim by the Red Guards. At the same time, the Soviets were again criticized by both Chinese and North Korean officials for being too soft on the United States. The Cultural Revolution was now viewed in North Korea as an excellent idea and “completely correct”.

In 1972, the first formal summit meeting between Pyongyang and Seoul was held, but the cautious talks did not lead to a lasting change in the relationship.[78]

With the fall of South Vietnam to the North Vietnamese on April 30, 1975, Kim Il-sung began to feel that the US had shown its weakness and that reunification of Korea under his regime was finally possible. Kim visited Beijing in May 1975 in the hope of gaining political and military support for this plan to invade South Korea again, but Mao Zedong refused.[79] Despite public proclamations of support, Mao privately told Kim that China would be unable to assist North Korea this time because of the lingering after-effects of the Cultural Revolution throughout China, and also because Mao had recently decided to restore diplomatic relations with the US. Afterwards, Kim went home empty-handed.[80]

Meanwhile, North Korea emphasized its independent orientation by joining the Non-Aligned Movement in 1975.[81] It promoted Juche as a model for developing countries to follow.[82] It developed strong ties with the regimes of Bokassa in the Central African Republic, Macias Nguema in Equatorial Guinea, Idi Amin in Uganda, Pol Pot in Cambodia, Gaddafi in Libya, and Ceausescu in Romania.[83]

Economic development

Reconstruction of the country after the war proceeded with extensive Chinese and Soviet assistance.[84][85] Koreans with experience in Japanese industries also played a significant part.[86]Land was collectivized between 1953 and 1958. Resistance appears to have been minimal as landlords had been eliminated by the earlier reforms or during the war.[87]

Although developmental debates took place within the Workers’ Party of Korea in the 1950s, North Korea, like all the postwar communist states, undertook massive state investment in heavy industry, state infrastructure and military strength, neglecting the production of consumer goods.[71]

The first Three Year Plan (1954–1956) introduced the concept of Juche or self-reliance.[88] The first Five Year Plan (1957-1961) consolidated the collectivization of agriculture and initiated mass mobilizations campaigns: the Chollima Movement, the Chongsan-ni system in agriculture and the Taean Work System in industry.[88][89] The Chollima Movement was influenced by China’s Great Leap Forward, but did not have its disastrous results.[88]Industry was fully nationalized by 1959.[90] Taxation on agricultural income was abolished in 1966.[91]

North Korea was placed on a semi-war footing, with equal emphasis being given to the civilian and military economies. This was expressed in the 1962 Party Plenum by the slogan, “Arms in one hand and a hammer and sickle in the other!”[92] At a special party conference in 1966, members of the leadership who opposed the military build-up were removed.[93]

On the ruins left by the war, North Korea had built an industrialized command economy. Che Guevara, then a Cuban government minister, visited North Korea in 1960, and proclaimed it a model for Cuba to follow. In 1965, the British economist Joan Robinson described North Korea’s economic development as a “miracle”.[94][95] As late as the 1970s, its GDP per capita was estimated to be equivalent to South Korea’s.[96][97][98][99] By 1968, all homes had electricity, though the supply was unreliable.[100] By 1972, all children from age 5 to 16 were enrolled in school, and over 200 universities and specialized colleges had been established.[101][102] By the early 1980s, 60–70% of the population was urbanized.[103]

Decline and crisis

North Korean village in the Yalu River delta

In the 1970s, expansion of North Korea’s economy, with the accompanying rise in living standards, came to an end.[104] Compounding this was a decision to borrow foreign capital and invest heavily in military industries. North Korea’s desire to lessen its dependence on aid from China and the Soviet Union prompted the expansion of its military power, which had begun in the second half of the 1960s. The government believed such expenditures could be covered by foreign borrowing and increased sales of its mineral wealth in the international market. North Korea invested heavily in its mining industries and purchased a large quantity of mineral extraction infrastructure from abroad. It also purchased entire petrochemical, textile, concrete, steel, pulp and paper manufacturing plants from the developed capitalist world.[105] This included a Japanese-Danish venture that provided North Korea with the largest cement factory in the world.[106] However, following the world 1973 oil crisis, international prices for many of North Korea’s native minerals fell, leaving the country with large debts and an inability to pay them off and still provide a high level of social welfare to its people. North Korea began to default in 1974 and halted almost all repayments in 1985. As a result, it was unable to pay for Western technology.[107]

Worsening this already poor situation, the centrally planned economy, which emphasized heavy industry had reached the limits of its productive potential in North Korea. Juche’s repeated demands that North Koreans learn to build and innovate domestically had run its course as had the ability of North Koreans to keep technological pace with other industrialized nations. By the mid to late-1970s some parts of the capitalist world, including South Korea, were creating new industries based around computers, electronics, and other advanced technology in contrast to North Korea’s Stalinist economy of mining and steel production.[108] Migration to urban areas stalled.[109]

Despite the emerging economic problems, the regime invested heavily on prestigious projects, such as the Juche Tower, the Nampo Dam, and the Ryugyong Hotel. In 1989, as a response to the 1988 Seoul Olympics it held the 13th World Festival of Youth and Students in Pyongyang.[110][111] In fact, the grandiosity associated with the regime and its personality cult, as expressed in monuments, museums, and events, has been identified as a factor in the economic decline.[112]

In 1984 Kim visited Moscow during a grand tour of the USSR where he met Soviet leader Konstantin Chernenko. Kim also made public visits to East Germany, Czechoslovakia, Poland, Hungary, Romania, Bulgaria and Yugoslavia. Soviet involvement in the North Korean economy increased, until 1988 when bilateral trade peaked at US$2.8 billion.[113] In 1986, Kim met the incoming Soviet leader Mikhail Gorbachev and received a pledge of support.[114]

However, Gorbachev’s reforms and diplomatic initiatives, the Chinese economic reforms starting in 1979, and the collapse of the Eastern Bloc from 1989 to 1991 increased North Korea’s isolation.[115] The leadership in Pyongyang responded by proclaiming that the collapse of the Eastern Bloc demonstrated the correctness of the policy of Juche.[116]

The collapse of the Soviet Union in 1991 deprived North Korea of its main source of economic aid, leaving China as the isolated regime’s only major ally. Without Soviet aid, North Korea’s economy went into a free-fall. By this time in the early 1990s, Kim Jong-il was already conducting most of the day-to-day activities of running of the state. Meanwhile, international tensions were rising over North Korean’s quest for nuclear weapons. Former US president Jimmy Carter made a visit to Pyongyang in June 1994 in which he met with Kim and returned proclaiming that he had resolved the crisis.[117]

Succession by Kim Jong-il

Portraits of Kim Il-sung and his son and successor Kim Jong-il

Kim Il-sung died from a sudden heart attack on July 8, 1994, three weeks after the Carter visit. His son, Kim Jong-il, who had already assumed key positions in the government, succeeded as General-Secretary of the Korean Workers’ Party. At that time, North Korea had no secretary-general in the party nor a president. Minimal legal procedure that had been established was summarily ignored. Although a new constitution appeared to end the war-time political system, it did not completely terminate the transitional military rule. Rather it legitimized and institutionalized military rule by making the National Defense Commission (NDC) the most important state organization and its chairman the highest authority. After three years of consolidating his power, Kim Jong-il became Chairman of the NDC on October 8, 1997, a position described by the NDC as the nation’s “highest administrative authority,” and thus North Korea’s de facto head of state. His succession had been foreshadowed in 1980, when he was introduced to the public at the Sixth Party Congress.[118] In 1982, Kim Jong-il had established himself as a leading theoretician with the publication of On the Juche Idea.[119] In 1984, he had been officially confirmed as his father’s successor.[120]

Meanwhile, the economy was in steep decline. In 1990-1995, foreign trade was cut in half, with the loss of subsidized Soviet oil being particularly keenly felt. The crisis came to a head in 1995 with widespread flooding that destroyed crops and infrastructure, leading to a famine that lasted till 1998.[121] At the same time, there appeared to be little significant internal opposition to the regime. Indeed, a great many of the North Koreans fleeing to China because of famine still showed significant support for the government as well as pride in their homeland. Many of these people reportedly returned to North Korea after earning sufficient money.[122]

In 1998 the government announced a new policy called “Songun“, or “Military First”. This suggested that the Korean People’s Army was now more powerful than the Korean Workers’ Party.[123]

President Kim Dae-jung of South Korea actively attempted to reduce tensions between the two Koreas under the Sunshine Policy, but this produced few immediate results. Since the election of George W. Bush as the President of the United States in 2000, North Korea has faced renewed external pressure over its nuclear program, reducing the prospect of international economic assistance.

In 2002, Kim Jong-il declared that “money should be capable of measuring the worth of all commodities”, followed by some small market-oriented measures, and the creation of the Kaesong Industrial Region with transport links to South Korea was announced.[citation needed] Experiments are under way to allow factory managers to fire underperforming workers and give bonuses. China’s investments increased to $200 million in 2004.[citation needed]

On October 9, 2006, North Korea has announced that it had successfully detonated a nuclear device underground at 10:36 am local time without any radiation leak. An official at South Korea’s seismic monitoring center confirmed a magnitude-3.6 tremor felt at the time North Korea said it conducted the test was not a natural occurrence.[124]

Additionally, North Korea was running a missile development program. In 1998, North Korea tested a Taepondong-1 Space Launch Vehicle, which successfully launched but failed to reach orbit. On July 5, 2006, they tested a Taepodong-2 ICBM that reportedly could reach the west coast of the U.S. in the 2-stage version, or the entire U.S. with a third stage. However, the missile failed shortly after launch, so it is unknown what its exact capabilities are or how close North Korea is to perfecting the technology.

North Korea’s advancements in weapons technology appear to give them leverage in ongoing negotiations with the United Nations and other countries. On February 13, 2007, North Korea signed an agreement with South Korea, the United States, Russia, China, and Japan, which stipulated North Korea would shut down itsYongbyon nuclear reactor in exchange for economic and energy assistance. However, in 2009 the North continued its nuclear test program.

In 2010, the sinking of a South Korean naval ship, the Cheonan, reportedly by a North Korean torpedo, escalated tensions between North and South.

Current situation

A computer lab classroom in the Grand People’s Study House, Pyongyang, 2012

Kim Jong-Il died on December 17, 2011[125] and was quickly succeeded by his son, Kim Jong-un. Tensions between North Korea and other countries increased due to its rocket launches and nuclear bomb testing, and UN sanctions have been tightened.

In 2014, the United Nations Commission of Inquiry accused the government of crimes against humanity.[126]

In 2015, North Korea adopted Pyongyang Standard Time (UTC+08.30), reversing the change to Japan Standard Time (UTC+9.00) which had been imposed by the Japanese Empire. As a result, North Korea was in a different time zone from South Korea.[127]

The 7th Congress of the Workers’ Party of Korea was held in 2016, where Kim Jong-Un further consolidated his control and power within the Workers’ Party of Korea and country.

See also

https://en.wikipedia.org/wiki/History_of_North_Korea

 Story 2: Attorney General Sessions Enforces Immigration Law — Videos

Sessions Outlines Border Enforcement Plan

Arizona sheriff reacts to the illegal immigration crackdown

Watch: Attorney General Jeff Sessions speaks at U.S.-Mexico Border

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 870-871

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 853, March 8, 2017, Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus, Republican Study Committee and American People All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos -_

Posted on March 8, 2017. Filed under: Addiction, American History, Animal, Benghazi, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald Trump, Elections, Fast and Furious, Government, Government Dependency, Government Spending, Hate Speech, Health, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Iran Nuclear Weapons Deal, Islam, Law, Legal Immigration, Life, Lying, Medicare, Obama, Philosophy, Photos, Politics, Polls, Progressives, Rand Paul, Raymond Thomas Pronk, Religion, Scandals, Science, Security, Senate, Social Science, Social Security, Socials Security, Spying, Taxation, Taxes, Terror, Terrorism, Unemployment, Videos, Violence, War, Wealth, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 

Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus,  Republican Study Committee and American People  All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — 

Image result for cartoons on repeal and repace obamacare

Image result for cartoon branco republican repeal and replace obamacare

Image result for vault 7 cia

Image result for cartoons on obamacare

Conservative Freedom Caucus Torpedoes GOP Obamacare Replacement

MAJOR: Paul Ryan Introduces American Health Care Act, House GOP’s Obamacare Replacement

SABOTAGE! WHAT PAUL RYAN JUST DID TO TRUMPCARE PROVES HE’S A TRAITOR TO THE PRESIDENT

Speaker Paul Ryan: There isn’t chaos in GOP-led Congress

SEAN HANNITY INTERVIEWS TOM PRICE ABOUT TRUMP’S NEW HEALTHCARE PLAN – 3/7/17

Trump’s HHS Secretary On Obamacare Replacement Bill

Ingraham takes issue with GOP’s health care replacement bill

Herman Cain on Obamacare replacement bill: Consumers now back in charge

Laffer: Obamacare replacement bill worth 2,000-3,000 points on the Dow

President Trump Holds Meeting On Obamacare Replacement with House Deputy Whip Team 3/7/17

GOP releases Obamacare replacement details

York: Fate of GOP health care bill lies with Freedom Caucus

Republicans unveil Obamacare replacement

Trump backs healthcare tax credit amid conservative opposition

Sen. Rand Paul unveils ObamaCare replacement plan

Conservatives lash out at House GOP’s Obamacare replacement bill

March 7 at 3:01 PM
Influential conservative lawmakers and activist groups panned health-care legislation drafted by House Republican leaders Tuesday, throwing the GOP’s plan to undo the Affordable Care Act in serious doubt less than 24 hours after it was released.Those groups dubbed the House bill, backed by House Speaker Paul D. Ryan (R-Wis.), as “Obamacare Lite,” “RyanCare” or “RINOcare” — a reference to “Republican in name only,” a popular conservative epithet for establishment politicians.The Ryan-backed bill offers a more conservative vision for the nation’s health-care system, replacing federal insurance subsidies with a new form of individual tax credits and phasing out most of the ACA’s taxes. But key lawmakers and outside groups, who can rile up the party’s base against legislative plans, said the legislation does not go far enough in pulling back elements of President Barack Obama’s overhaul.“The House Republican proposal released last night not only accepts the flawed progressive premises of Obamacare but expands upon them,” Michael Needham, the head of Heritage Action for America, said in a statement Tuesday. “Congressional Republicans should fully repeal the failed law and begin a genuine effort to deliver on longstanding campaign promises that create a free market health care system.”Two other groups, FreedomWorks and the Club for Growth, decried the plans Tuesday as a betrayal of campaign promises.

A day after House Republicans released a plan to supplant the Affordable Care Act, Sen. Rand Paul (R-Ky.) outlined the issues he has with their proposal, indicating it might be unconstitutional. (Alice Li, Jayne Orenstein/The Washington Post)

“If this warmed-over substitute for government-run health care remains unchanged, the Club for Growth will key vote against it,” said the group’s president, David McIntosh, referring to a process in which lawmakers are graded on their votes, the better to use them as ammunition on the campaign trail.

The dilemma Republican congressional leaders face is, if they change the legislation to appease hard-line conservatives, they are likely to alienate more-moderate members who are wary of disrupting insurance markets and taking coverage away from those who gained it under the ACA.

The margin for dissent is slim: Assuming no Democrats break ranks to support the bill, for the overhaul to pass, Republicans can lose only 21 votes in the House and two votes in the Senate.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

Four key Republicans in the Senate have expressed worries about the plan’s possible impact on lower-income people who received Medicaid coverage through the ACA’s expansion of that program. The four senators are split on exactly what proposals would meet their standards, but none are likely to support the course of action favored by many conservatives — passing a 2015 bill that repealed key ACA provisions without immediately including replacement provisions.

There were some signs of hope for the House plan Tuesday. President Trump offered an early boost to GOP leaders with a morning tweet: “Our wonderful new Healthcare Bill is now out for review and negotiation. ObamaCare is a complete and total disaster — is imploding fast!”

Vice President Pence attended a Senate Republican policy luncheon Tuesday and, in a break with normal practice, joined Senate Majority Leader Mitch McConnell and other GOP leaders at a news conference afterward to defend the House approach as “the framework for reform.”

“We are certainly open to improvements and recommendations in the legislative process, but this is the bill, and the president supports the American Health Care Act,” he said. “We are looking forward to working very directly with leadership in the House and the Senate in the weeks ahead. We are very confident that the American Health Care Act, with their help, will be on the president’s desk.”

In another sign of the administration’s support, Health and Human Services Secretary Tom Price sent a letter Tuesday to the chairmen of the two House committees processing the legislation, calling it a “necessary and important first step toward fulfilling our promises to the American people.”

But Price, who authored a similar ACA replacement proposal when he served in the House, said that achieving all of Trump’s health-care goals “will require more than what is possible” in the current legislation, which is limited in its scope to take advantage of special budget rules allowing for easier Senate passage.

He specifically mentioned allowing insurance to be sold across state lines, pharmaceutical cost reductions and “medical legal reforms,” an apparent reference to long-standing GOP proposals to limit malpractice liability.

Senate Majority Leader Mitch McConnell (R-Ky.) offered measured support for the proposed legislation and said he would bring it to the Senate floor should it pass the House.

“I encourage every member to review [the legislation] because I hope to call it up when we receive it from the House,” McConnell said Tuesday on the Senate floor. “We’ve come a long way. We’ve got a lot further to go, but we’re making significant progress. Working arm in arm with the House and the new administration, we’re going to keep our promise to the American people.”

While some of the fiercest criticism came from hard-right activist groups that have dogged Republican congressional leaders for years, other more establishment-minded organs joined the chorus of dissent.

National Review published an editorial Tuesday that said the legislation was “a disappointment” and has “serious flaws even as a first step toward full repeal and replacement.”

Republicans, the influential conservative magazine said, “would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster,than trying and failing to enact a bill that they support only tepidly.”

Leaders involved in drafting the bills sought to defend their plan against the onslaught of criticism, describing it as the product of months of internal discussions and saying its details could still change.

“We now have a bill that’s available for all to read,” said Rep. Greg Walden (R-Ore.), chairman of the House Energy and Commerce Committee, which helped craft one of them, at a news conference Tuesday. “I’d encourage them to do it. I’d encourage them to look against their own bills and what they’ve supported in the past. And then let’s have a thoughtful legislative discussion.”

Rep. Kevin Brady (R-Tex.), chairman of the House Ways and Means Committee, which produced the other bill, said: “As Republicans, we have a choice. We can act now, or we can keep fiddling around and squander this opportunity to repeal Obamacare and begin a new chapter of freedom for the American people. House Republicans are choosing to act now.”

Still, agitation among conservatives was evident Monday night and poured into Tuesday.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

“Keep the ‘Cadillac’ tax in place? Keep Medicaid in place until 2020?” said Rep. Jim Jordan (R-Ohio), a co-founder of the House Freedom Caucus, referring to high-priced health-care plans. “We didn’t have Medicaid expansion in the bill we sent to President Obama, but we have it in the one we send to President Trump? That makes no sense to me.”

“Obamacare 2.0,” tweeted Rep. Justin Amash (R-Mich.), a libertarian who frequently breaks with GOP leadership.

Under two bills drafted by separate House committees, the government would no longer penalize Americans for failing to have health insurance but would try to encourage people to maintain coverage by allowing insurers to impose a 30 percent surcharge for those who do not have continuous coverage.

The legislation would preserve two of the most popular features of the 2010 health-care law, letting young adults stay on their parents’ health plans until age 26 and forbidding insurers to deny coverage or charge more to people with preexisting medical problems. It would also target Planned Parenthood, rendering the women’s health organization ineligible for Medicaid reimbursements or federal family -planning grants — a key priority for antiabortion groups.

Taken together, the bills introduced Monday represent the Republicans’ first attempt — and best shot to date, with an ally in the White House — to translate into action seven years of talking points about demolishing the ACA.

At the same time, major aspects of the House GOP plan reflect the treacherous terrain that Republicans face to win enough votes within their own conferences in the GOP-controlled House and Senate.

The bills must address concerns of both conservatives worried about the plan’s cost and the notion it might enshrine a new federal entitlement, as well as more moderate members who want to ensure that their constituents, including those who received coverage under the ACA’s Medicaid expansion, retain access to affordable health care.

The Freedom Caucus, a block of roughly 30 House hard-liners who criticized earlier versions of the bill, is set to meet Tuesday night to discuss the health-care bill and perhaps develop a list of demands to present to GOP leaders.

Members of the Republican Study Committee, a larger conservative group, were already critical of key elements of the plan. “This is a Republican welfare entitlement,” reads an RSC analysis distributed late Monday, addressing the inclusion of refundable tax credits in the plan.

With no Democrats expected to vote to pass the bill and four House GOP seats vacant, Republicans can afford to lose no more than 21 members in the lower chamber.

In recognition of the close vote that is expected, House Majority Whip Steve Scalise (R-La.) and several deputy whips are expected to visit the White House Tuesday afternoon to discuss the health-care bill with Trump administration officials.

On Tuesday morning, Trump signaled the work on the proposal was not completely finished, referring to selling insurance across state lines and saying that change would come in “phase 2 & 3 of healthcare rollout.” The president also said he was “working on new system where there will be competition in the Drug Industry” that will lead prices to “come way down.”

Conservative critics of the measure had noted the plan’s exclusion of selling insurance across state lines. “The problems with this bill are not just what’s in it, but also what’s missing,” said McIntosh.

Yet attacks from the right were not the only challenge facing Republican leaders.

Four key Republican senators, all from states that opted to expand Medicaid under the ACA, said they would oppose any new plan that would leave millions of Americans uninsured.

“We will not support a plan that does not include stability for Medicaid expansion populations or flexibility for states,” Sens. Rob Portman (Ohio), Shelley Moore Capito (W.Va.), Cory Gardner (Colo.) and Lisa Murkowski (Alaska) wrote in a letter to McConnell on Monday.

The plan from House Republicans would substantially redesign Medicaid with the goal of balancing the GOP’s antipathy toward the ACA’s expansion of the program against the concerns of a significant cadre of Republican governors — and the lawmakers from their states — who fear losing millions of dollars that the law has funneled to help insure low-income residents.

Democrats, meanwhile, have given no indication that they intend to work with Republicans, and top party leaders decried the GOP plan Monday as a betrayal of everyday Americans. “Trumpcare doesn’t replace the Affordable Care Act, it forces millions of Americans to pay more for less care,” said Senate Minority Leader Charles E. Schumer (D-N.Y.).

In particular, the plan to target Planned Parenthood has already generated fierce pushback from Democrats and doubts from some Republicans who have noted that federal funds are already barred from funding abortions and that Planned Parenthood provides routine medical care to millions of American women.

https://www.washingtonpost.com/powerpost/house-leaders-brace-for-the-task-ahead-selling-obamacare-lite/2017/03/07/ab2f721e-02e5-11e7-ad5b-d22680e18d10_story.html?utm_term=.b64bbc38491c

A Disappointing Start

by THE EDITORS March 7, 2017 12:45 PM We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to

We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to buy, and that their options should include low-premium coverage that protects them against the risk of major financial setbacks resulting from health care. The legislation released last night by House Republicans is, even on the most charitable reading, only a first step toward that goal.

It does not repeal all of Obamacare, leaving many of its regulations in place. The apparent rationale for this omission is that eliminating the regulations would subject the legislation to a fatal Senate filibuster. We have recommended that Republicans defang the regulations by replacing Obamacare’s subsidies with a simple new tax credit that people could use to buy insurance governed by a new, lighter regulatory regime. That way Obamacare’s regulations would stay on the books but no longer hinder consumer choice. But Republicans shrank from this option, too.

We disagree with this tactical decision, which places Senate parliamentary rules — or, rather, places guesses about how those rules would operate — ahead of good health policy and making good on longstanding party promises. It also seems to us that Republicans would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster, than trying and failing to enact a bill that they support only tepidly. That second outcome may now take place.

Moreover, the legislation has some serious flaws even as a first step toward full repeal and replacement. It eliminates Obamacare’s fines on people who go without insurance, but in their place creates a new surcharge for people who let their insurance lapse and then try to purchase a new policy. The goal is to keep healthy people from leaving the insurance rolls and thus destabilizing insurance markets.

The surcharge is a heavy-handed instrument: Insurers would be obligated to impose it regardless of their preferences. Yet the surcharge might not achieve its goal. A lot of healthy people might well decide to go without insurance and run the risk of paying a surcharge if they get sick later. The surcharge even undermines its own goal, since it would discourage healthy people who had already left the insurance rolls from getting back on them.

The bill has its good points. If the surcharge works, the deregulation in the bill would lower premiums. Many of Obamacare’s taxes would be repealed. Obamacare’s tax credits create high effective marginal tax rates for people in the lower middle class; the bill’s replacement tax credits would avoid this problem. Permissible contributions to and limits on health savings accounts would be loosened. Federal contributions to Medicaid would be capped, ending the perverse incentives that have for decades enabled the growth of the program. All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

 http://www.nationalreview.com/article/445558/obamacare-replacement-republican-plan-house-representatives-disappointing

Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos — 

Image result for vault 7 cia

Image result for vault 7 cia

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotes

Ari Fleischer on CIA leaks, wiretapping claims

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Wikileaks dumps information claiming proof of CIA hacking

What Pisses Me Off About Wikileaks Vault 7 Release

‘Cyber warfare is a new frontline’: CIA created malware designed to penetrate software – WikiLeaks

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

Wikileaks Vault 7: A Massive and Confusing Revelation

WikiLeaks UNLEASHES ‘Year Zero’ CIA Hacking Tools (Vault 7)

WIKILEAKS VAULT 7: The C.I.A. Is Listening Via Everything

Inside Vault 7: CIA Hacking Tools Published by Wikileaks

George Orwell 1984 Telescreen Exercise

Nineteen Eighty-Four (1984) – Last Scene

ANIMAL FARM – full movie

1984 George Orwell – Full Movie – Hollywood best Greatest blockbuster movie Film

Watch Nineteen Eighty Four Watch Movies Online Free

George Orwell: A Life in Pictures Full Documentary (High Quality)

A Final Warning from George Orwell

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Tyler Durden's picture

TwitterFacebookReddit

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights from the Vault 7 release so far:

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Snowden 2.0?

  • In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

CIA targets iPhones, Androids, smart TVs:

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain. Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.
  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.
  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

And some key sections from the FAQ:

  • What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
  • What is “Vault 7” “Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.
  • What is the total size of “Vault 7”? The series is the largest intelligence publication in history.
  • When was each part of “Vault 7” obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
  • Is each part of “Vault 7” from a different source? Details on the other parts will be available at the time of publication.
  • How did WikiLeaks obtain each part of “Vault 7”? Sources trust WikiLeaks to not reveal information that might help identify them.
  • Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.

* * *

PREVIOUSLY

As a reminder, last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

Wikileaks had previously announced that it would hold an 8am Eastern press conference, as part of the unveiling.

ANNOUNCE: WikiLeaks press conference in under five hours at 8am ET / 1pm UTC / 14:00 CET. Streamed live.

However, there appeared to have been some complications, with Wikileaks tweeting that “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans”

Press conf under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency (1/2)

Wikileaks then announced that “As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.”

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

In a separate tweet, Wikileaks has just released the passphrase to decrypt the torrent file: RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

As a result, since Assange appears to have been unable to launch his previously scheduled press conference, he has gone ahead and issued the press release on Vault 7 Part 1 “Year Zero, which is titled: Inside the CIA’s global hacking force:

Press Release

Vault 7: CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

* * *

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

WikiLeaks Posts Thousands of Purported CIA Cyberhacking Documents

Records show CIA able to spy on smartphones, internet TVs

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.PHOTO: LARRY DOWNING/REUTERS

WASHINGTON—WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.

The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.

WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.

A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

WikiLeaks said in its statement that it was not publishing such information as computer source code that could be used to replicate the tools it claims to have exposed. But the group left open the possibility of publishing those crucial details if “a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should [sic] analyzed, disarmed and published.”

Mr. Snowden said in a tweet Tuesday, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

WikiLeaks said the CIA recently “lost control” of the majority of its hacking arsenal. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The website put out what it called the first installment in a series of planned leaks on Tuesday, calling it “Year Zero.” It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Much of what WikiLeaks posted Tuesday appeared to be a kind of internal Wikipedia for U.S. cyber-warfare developers to collaborate, post and access information about available hacking tools. In many instances, WikiLeaks has redacted entries that appear to link to specific executable files. The documents show, for example, what capabilities exist to bypass antivirus software, with a different entry for each antivirus company.

The revelations are sure to fuel an ongoing debate over whether intelligence agencies that discover security flaws in popular technology should disclose them, so that the users can defend themselves from hackers, or keep that information secret for use in intelligence operations.

One document claims that the CIA has discovered numerous ways to hack into versions of Apple’s iOS, the mobile operating system used on iPhones. In general, hacking tools for the iPhone are considered especially valuable because the technology is so widely used, experts said. One particular hacking tool appears to remain on an iPhone even after it has been rebooted, which would make it particularly valuable to an intruder.

“These documents, which appear to be authentic, show that the intelligence community has deliberately maintained vulnerabilities in the most common devices used by hundreds of millions of people,” Ben Wizner, the director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union, said in a statement.

“Those vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world. The government has the capacity and obligation to help technology companies fix vulnerabilities as soon as they are discovered,” Mr. Wizner said.

This is the latest high-profile leak of information by WikiLeaks, which last fall published emails stolen from Mrs. Clinton’s campaign chairman, John Podesta. U.S. intelligence agencies concluded that Russian government hackers stole those emails and provided them to WikiLeaks.

WikiLeaks said the documents show the CIA’s ability to bypass the encryption of popular messenger applications, including WhatsApp, Signal, Telegram and Confide by hacking the smartphones they run on and collecting audio and message traffic before the applications encrypt the user’s texts.

The site said the documents also show how the CIA developed other mobile hacking technologies, including the ability to activate the camera and microphone of a target’s smartphone covertly and surreptitiously retrieve a target’s geolocation, audio and text communications.

WikiLeaks said one of the documents also shows how the CIA developed a program to hack internet-connected televisions in conjunction with British intelligence. The attacks can place Samsung smart TVs in a fake off mode, so the owner believes the television is switched off, while in reality it is functioning as a bug and recording conversations in the room, WikiLeaks said.

https://www.wsj.com/articles/wikileaks-posts-thousands-of-purported-cia-cyberhacking-documents-1488905823

WikiLeaks publishes massive trove of CIA spying files in ‘Vault 7’ release

Julian Assange claims that documents are the most comprehensive CIA release ever and are far larger than the Snowden files

The Independent Tech

WikiLeaks has published a huge trove of what appear to be CIA spying secrets.

The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for “the entire hacking capacity of the CIA”, Mr Assange claimed in a release, and the trove is just the first of a series of “Vault 7” leaks.

Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.

 In publishing the documents, WikiLeaks had ensured that the CIA had “lost control of its arsenal”, he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.

It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” the organisation said in a release.

The public files don’t include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing “armed” software “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published”, it said.

The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organisation.

“In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” a release read. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

It also redacts the details of some of the names, locations and targets that are identified in the documents.

The organisation had teased the release in advance with strange messages about the release being “Year Zero”, and references to “Vault 7”. It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.

http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html

WikiLeaks releases ‘entire hacking capacity of the CIA’

Gutfeld: ‘Day Without a Woman’ strike sends wrong message

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks. The CIA allegedly employs more than 5,000 people in its cyber spying operation and had produced more than 1,000 programs as of 2016.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence documents includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

WikiLeaks confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://wikileaks.org/ciav7p1 

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

CIA hackers celebrated what they saw as the financial largesse of Obama towards them with “Make It Rain” gifhttps://wikileaks.org/ciav7p1/cms/files/makeitrain.gif 

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

Digital rights non-profit Access Now said in a statement on Tuesday it was “fantasy to believe only the ‘good guys'” would be able to use the discovered vulnerabilities.

“Today, our digital security has been compromised because the CIA has been stockpiling vulnerabilities rather than working with companies to patch them,” Senior Legislative Manager Nathan White said.

The CIA allegedly also maintains a database of malware created in other nations — WikiLeaks specifically cites Russia — in order to disguise its own hacking attempts as the work of another group.

In what is described by WikiLeaks as “one of the most astounding intelligence own goals in living memory,” the CIA is said to have made most of its programs unclassified to avoid legal consequences for transmitting classified information through the Internet — a move that increased the risk of outside groups pirating the cyber spying tools.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem. https://twitter.com/wikileaks/status/839120909625606152 

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

One such former leaker, Edward Snowden, tweeted Tuesday afternoon about the WikiLeaks release.

“Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic,” wrote Snowden, who has been granted asylum in Russia as he seeks to avoid criminal prosecution in the U.S.

Some of the WikiLeaks files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html

Vault 7: CIA Hacking Tools Revealed

  • Releases
  • Documents

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includesnumerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-853

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 851, March 3, 2017, Story 1 : Trump Russian Connection: All Noise — No Evidence — Fake News Of Big Lie Media and Lying Lunatic Leftist Low Life Losers — It Is Not A One Variable World! — Videos — Story 2: Who Are Real Red Russian Agents of Influence? — Who Lost The Crimea To Russia? — Who Gave Iran A Pathway To Nuclear Weapons? — Obama and Jarrett — Videos — Story 3: Real News, Real Evidence, Real Crimes of Destruction of Government Document, Mishandling of Classified Documents, Perjury, Obstruction of Justice (Also By Department of Justice), Conspiracy, Public Corruption of Hillary Clinton — Awaiting Trump Telephone To Attorney General Jeff Session To Appoint Special Prosecutor — Videos

Posted on March 4, 2017. Filed under: Benghazi, Blogroll, Books, Breaking News, College, Communications, Congress, Constitutional Law, Corruption, Countries, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Elections, Employment, Fast and Furious, Fourth Amendment, Freedom of Speech, Hillary Clinton, House of Representatives, Human, Illegal Immigration, Impeachment, Iran Nuclear Weapons Deal, IRS, Law, Life, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Raymond Thomas Pronk, Resources, Russia, Second Amendment, Senate, Social Science, Taxation, Taxes, Terror, Terrorism, Unemployment, United States Constitution, United States of America, Videos, Violence, Wealth, Weapons, Weather | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Story 1 : Trump Russian Connection: All Noise — No Evidence — Fake News Of Big Lie Media and Lying Lunatic Leftist Low Life Losers — It Is Not A One Variable World! — Videos —

Image result for branco cartoons fake news

Image result for cartoons fake news

Image result for cartoons fake news
Image result for cartoons fake newsImage result for cartoons fake news

Image result for cartoons fake news

Image result for cartoons fake news

Image result for cartoons fake news

Attorney General Jeff Sessions press conference. Mar 2. 2017.

Sessions “I Did Not Have Communications With The Russians”

Spicer: “NOT ACCURATE!” “IT’S BS!” on Russia Scandal

How the Obama Palace Guard and Deep State Torpedoed Sessions to Dilute Trump’s Post-Address Euphoria

Donald trump fox news – “The Media Is Trump’s ENEMY!” Rush Limbaugh BACKS Donald Trump With Chris Wallace

Ted Cruz dismantles Jeff Sessions Russian ambassador fake new story

Tucker Carlson takes apart Democrat Sean Maloney on fake news Jeff Sessions Russia

Trump Russian Connection=Fake News

Truth Warriors vs. Mainstream Fake News | Limited Hangout Federalized Propaganda | NDAA Brainwashing

The Truth About Fake News | Russia Hacked U.S. Election For Donald Trump?

Rush Limbaugh: “The Media did not make Donald Trump, and they can’t destroy him”

Scott Adams on fake news, climate, and the Trump press ban

Rand Paul destroys MSNBC Chris Jansing on fake news Jeff Sessions Russia story

Who is Russian Ambassador Sergey Kislyak?

Sen. Franken Quizzes Jeff Sessions At Confirmation Hearing

Jeff Sessions explains meeting with Russian ambassador in interview with Tucker Carlson

‘Stirring up trouble’: US intelligence has no proof of anything – Ron Paul on ‘Russian hacking’

Krauthammer gives his take on AG Sessions’ recusal

Trey Gowdy on fake news Jeff Session Russia and Democrat Adam Schiff lying to press

ALL IN WITH CHRIS HAYES 3/2/17 Carter Page: ‘I don’t deny’ meeting with Russian ambassador

Former U.S. Ambassador To Russia Weighs In On Sergey Kislyak | Morning Joe | MSNBC

“Did Jeff Sessions Talk To Russia?” Sean Spicer Destroys ABC Reporter

Will The Neocons ‘Flynn’ Jeff Sessions?

Keiser Report: Fake News (E1005, ft. Alex Jones from Infowars)

Democrats & GOP War Hawks Align in Lunatic Russia Manipulation of American People

Published on Mar 3, 2017

Sources & Links Below, Click SHOW MORE:
Despite not producing ONE piece of tangible, objective evidence that Russia interfered with our elections, Democrats have aligned with Neo-conservative War Hawks to launch five investigation into Trump/Russia campaign connections. The Russia narrative has been one of the UGLIEST and most dishonest political manipulations in modern political history. Taking down Trump by promoting war and covering for their own corruption is traitorous behavior. Put quite plainly, this is lunatic.
Corporate Media’s FREE Campaign to Donald Trump:
https://www.nytimes.com/2016/03/16/up…
Pied Piper Email:
http://www.salon.com/2016/11/09/the-h…
Glenn Greenwald Five Points on Russia Article:
https://theintercept.com/2017/02/28/t…
Full Article on How No Real Case Has Been Made On Russia:
https://theintercept.com/2016/12/14/h…
https://t.co/sAwvNAtUh6
These are Sane Progressive Videos Covering the Russia Spin/Each has a LONG list of sources in description relevant to today’s content:
https://www.youtube.com/watch?v=Yh0EA…
On the Election Hacking & Dem Primary Fraud:
https://www.youtube.com/watch?v=nOpkN…
On John McCain & the Lie of Russia Hacking Grid:
https://www.youtube.com/watch?v=c9zwJ…
Michael Flynn Story:
https://www.youtube.com/watch?v=YsF-t…
On the Geo-Political Motivations of Russia Sanctions by Obama:
https://www.youtube.com/watch?v=ZRuFu…
On Hillary Clinton’s Russia Connections MUCH Deeper than Trumps:
https://www.youtube.com/watch?v=CbBxr…
Example of Absurdity of Russia Insanity, Russia was GOing to Frame Clinton for Election Fraud from Washington Post:
https://www.youtube.com/watch?v=K0kA2…
Russia Lies were Used to Unconstitutionally Place Elections Under Critical Infrastructure of Department of Homeland Security:
https://www.youtube.com/watch?v=FN-cY…

MUST WATCH NOW… Tucker Carlson Goes Thermonuclear On Rep Adam Schiff … Over Russian Hacking

Tucker Carlson DESTROYS Far Left Crank on Russian Hacking ‘Scandal’