Computer

The Pronk Pops Show 925, Story 1: Republicans Rush To Pass Repeal and Replace Obamacare Before August Recess with Pence, Cruz and McConnell Leading The Way — Videos — Story 2: Total Repeal of Obamacare Requires Total Repeal of All Obamacare Regulations Including Requiring Guaranteed Issue In Individual Health Insurance Market For Those With Preexisting Conditions, Community Rating Premiums and 10 Essential Health Care Benefits as Well As Repeal of The Individual and Employer Mandates and All Obamacare-Related Taxes– Address Individuals With Preexisting Conditions by State Special Risk Pools Insurance Coverage With State Subsidies Only and No Federal Subsidies — Otherwise Guaranteed Failure Just Like Obamacare Due To Adverse Selection — Leading To Single Government Payer Health Care System — Total Repeal of Obamacare Now Or Replace Your Representative and Senators Both Democrat and Republican Next November — It’s Now Or Never (O Sole Mio) — Videos

Posted on July 10, 2017. Filed under: American History, Biology, Blogroll, Breaking News, Communications, Computer, Congress, Countries, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Employment, Freedom of Speech, Government, Government Spending, Health Care, Health Care Insurance, History, House of Representatives, Human, Insurance, Investments, Language, Law, Life, Media, Medical, Medicine, Mike Pence, National Interest, News, People, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Rand Paul, Rand Paul, Raymond Thomas Pronk, Rule of Law, Science, Security, Senate, Success, Taxation, Taxes, Ted Cruz, Ted Cruz, United States of America, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for individual health insurance market and pre-existing conditions and cost of

Image result for individual health insurance market and pre-existing conditions and cost ofImage result for most common pre-existing conditions in the united States

Image result for most common pre-existing conditions in the united States

Image result for individual health insurance market and pre-existing conditions and cost of

Image result for individual health insurance market and pre-existing conditions and cost of

Image result for difference between group and individual health care insurance

 

Image result for individual health insurance market and pre-existing conditions and cost of

Image result for who is covered under obamacare

 

 

Story 1: Republicans Rush To Pass Repeal and Replace Obamacare Before August Recess with Pence, Cruz and McConnell Leading The Way — Videos —

Ronald Reagan speaks out on Socialized Medicine – Audio

Is the GOP plan to replace ObamaCare dead?

Vice President Pence ‘s Obamacare Listening Session with Ohio Small Business Owners

Trump’s push to replace Obamacare in trouble as Congress returns from recess

Sen. Cruz on ‘Face the Nation’ – July 9, 2017

Sen Mike Lee on the push to repeal ObamaCare

Lawmakers respond to Senate health care proposal

Sen. Rand Paul: Senate health care bill needs more Obamacare ‘repeal’

Sen. Rand Paul: We shouldn’t try to fix government intervention with more intervention. – 6/22/17

I won’t vote to keep ObamaCare: Rand Paul

Coolidge: The Best President You Don’t Know

Amity Shlaes on Coolidge’s life, ideas, and success in bringing about low taxes and small government

Uncommon Knowledge: The Great Depression with Amity Shlaes

Amity Shlaes: Calvin Coolidge, Better Than Reagan?

Archie Bunker on Democrats

 

Trump prods Congress to pass stalled healthcare overhaul

By Susan Cornwell and Ian Simpson | WASHINGTON

President Donald Trump on Monday prodded the Republican-led U.S. Congress to pass major healthcare legislation but huge obstacles remained, with a senior lawmaker saying the Senate was unlikely to take up the stalled bill until next week.

The House of Representatives approved its healthcare bill in May but the Senate’s version appeared to be in growing trouble as lawmakers returned to Washington from a week-long recess.

“I cannot imagine that Congress would dare to leave Washington without a beautiful new HealthCare bill fully approved and ready to go!” Trump wrote on Twitter, referring to the seven-year Republican quest to dismantle Democratic former President Barack Obama’s signature legislative achievement.

Lawmakers are set to take another recess from the end of July until Sept. 5.

Repealing and replacing the Affordable Care Act, dubbed Obamacare, was a central campaign pledge for the Republican president. But Senate Republican leaders have faced a revolt within their ranks, with moderate senators uneasy about the millions of Americans forecast to lose their medical insurance under the legislation and hard-line conservatives saying it leaves too much of Obamacare intact.

They were struggling to find a compromise that could attract the 50 votes needed for passage in a chamber Republicans control by a 52-48 margin, with Vice President Mike Pence casting a potential tie-breaking vote in the face of unified Democratic opposition.

No. 2 Senate Republican John Cornyn said Republicans could release an updated draft of their bill by the end of the week and told Fox News that senators could vote as early as Tuesday or Wednesday of next week.

 
U.S. President Donald Trump waves as walks on the South Lawn of the White House upon his return to Washington, U.S., from the G20 Summit in Hamburg, July 8, 2017. REUTERS/Yuri Gripas
“We’re going to continue to talk and listen and exchange ideas on how we can continue to make improvements,” Cornyn said on the Senate floor.

Also speaking on the Senate floor, Majority Leader Mitch McConnell gave no timetable for the bill. McConnell signaled his determination to keep working and said mere legislative “band-aids” would not suffice.

Senate Democratic leader Chuck Schumer said he had written to McConnell urging a bipartisan effort to stabilize the health insurance market, noting that McConnell had been quoted recently as saying Congress would need to shore up that market if lawmakers fail to repeal Obamacare.

The U.S. Centers for Medicare and Medicaid Services issued data on Monday showing a 38 percent decrease in applications by insurers to sell health plans in the Obamacare individual market in 2018 compared to this year. The agency said insurers continue to flee the exchanges, the online marketplace for health insurance set up under Obamacare.

MORE AMERICANS UNINSURED

With uncertainty hanging over the healthcare system, the percentage of U.S. adults without health insurance grew in the April-May-June period to 11.7 percent, up from 11.3 percent in the first quarter of 2017, according to Gallup-Sharecare Well-Being Index figures released on Monday. That translates into nearly 2 million more Americans who have become uninsured.

Scores of protesters voiced opposition to the legislation outside the Republican National Committee headquarters and at the offices of some Republican lawmakers including House of Representatives Speaker Paul Ryan, chanting slogans including “Trumpcare kills” and “Healthcare is a human right.”

U.S. Capitol Police said in a statement 80 people were arrested at 13 locations in House and Senate office buildings after they refused “to cease and desist with their unlawful demonstration activities.”

Republicans criticize Obamacare as a costly government intrusion into the healthcare system. Democrats call the Republican legislation a giveaway to the rich that would hurt millions of the most vulnerable Americans.

The Senate legislation would phase out the Obamacare expansion of the Medicaid health insurance program for the poor and disabled, sharply cut federal Medicaid spending beginning in 2025, repeal most of Obamacare’s taxes, end a penalty on Americans who do not obtain insurance and overhaul Obamacare’s subsidies to help people buy insurance with tax credits.

Leerink Partners analyst Ana Gupte said investors remained in a “wait-and-see” mode regarding the Senate legislation.

(For a graphic on who’s covered under Medicaid, click bit.ly/2u3O2Mu)

(Additional reporting by Susan Heavey, Eric Beech and Doina Chiacu; Writing by Will Dunham; Editing by Tom Brown)

http://www.reuters.com/article/us-usa-politics-healthcare-idUSKBN19V0YP

 

The Health 202: Cruz picks government health care subsidies as lesser of two evils

 July 10 at 9:03 AM
THE PROGNOSIS

Even conservatives acknowledge that the sickest Americans need help in paying their own steep insurance costs. In an ironic twist, some would rather have the government make up the difference rather than spreading expenses among the healthy.

Health insurance markets are so complicated, and the policy around them is so complex and intertwined, that politicians don’t always land ideologically on the issue where you’d think. Just look at how GOP Sen. Ted Cruz of Texas is trying to change the Obamacare overhaul that Senate Republicans will try to pass in the next three weeks before August recess. The former presidential candidate last week touted his ideas and on the Sunday shows yesterday, my colleague Sean Sullivan reports.

Cruz’s so-called “Consumer Freedom Amendment” — which conservatives have been rallying around as the revision they most want — would essentially free the healthiest Americans from covering the costs of the sickest Americans. But the sick would be even more heavily reliant on federal assistance as a result.

“You would likely see some market segmentation” Cruz told Vox last month. “But the exchanges have very significant federal subsidies, whether under the tax credits or under the stabilization funds.”

The Cruz amendment, which is being scored by the Congressional Budget Office as one of several potential changes to the Senate health-care bill, would result in segmenting the individual insurance market into two groups, experts say. Under it, insurers could sell cheaper, stripped-down plans free of Obamacare coverage requirements like essential health benefits or even a guarantee of coverage. These sparser plans would appeal to the healthiest Americans, who would gladly exchange fewer benefits for lower monthly premiums.

But insurers would also have to sell one ACA-compliant plan. The sickest patients would flock to these more expansive and expensive plans because they need more care and medications covered on a day-to-day basis. As a result, premiums for people with expensive and serious medical conditions like diabetes or cancer would skyrocket because all those with such serious conditions would be pooled together.

“The question is, would there be a premium spiral on the ACA-complaint market?” said Cori Uccello, a senior health fellow with the American Academy of Actuaries. “Can they ever price those premiums adequately if it’s just going to be the sickest people in there?”

It’s true that government subsidies — which under the Senate plan would be available to those earning up to 350 percent of the federal poverty level — would be even more crucial in order for these sicker Americans to afford the cost of their coverage, as would an extra infusion of federal “stabilization” money for states to cover their steep expenses.

Cruz hasn’t laid out all the details of how his amendment would work, nor is it even certain Senate Majority Leader Mitch McConnell (R-Ky.) will accept it as part of his health-care bill. But should it be adopted, and the Senate bill ultimately made law, the Cruz amendment would significantly shift how the individual insurance market operates.

But in Cruz’s mind, it would solve one of the biggest problems with Obamacare: that it robs the healthy to pay for the sick. He’s spent the last week pitching it as the legislative solution for passing the Senate bill.

“I think really the consumer freedom option is the key to bringing Republicans together and getting this repeal passed,” Cruz said on ABC yesterday.

Of course, everyone paying into the system for those who most need care is the way insurance is fundamentally supposed to work. The ACA requires insurers to offer a wider ranger of benefits in plans sold to everyone regardless of their health status. But to Cruz and his compatriots, requiring healthier people to buy cushier plans than they want or need is an abridgment of personal freedom and oversteps federal regulatory authority. So they’re more worried at the moment about rolling back more ACA regulations and less worried about federal spending.

“I think for conservatives it’s become a question of picking their poison,” Larry Levitt, president of the Kaiser Family Foundation, told me. “Is it government spending, or regulation? It’s almost like with this amendment, Sen. Cruz is acknowledging the need for a government entitlement program.”

Conservative groups that want a much fuller Obamacare repeal than the Senate bill provides have been jumping on the Cruz bandwagon, including Club for Growth, FreedomWorks and Tea Party Patriots.

.@SenTedCruz@SenMikeLee ‘Consumer Choice’ amendment, aka individual Obamacare Opt Out, is real step toward . We Support it!

From Tea Party Patriots founder Jenny Beth Martin:

If the Senate adopts the Cruz-Lee Amdt to the health care bill, @TPPatriots will be more likely to support the bill http://www.teapartypatriots.org/news/tea-party-patriots-signals-support-for-cruz-lee-amendment-to-senate-health-care-bill/ 

Photo published for Tea Party Patriots Signals Support for Cruz-Lee Amendment to Senate Health Care Bill

Tea Party Patriots Signals Support for Cruz-Lee Amendment to Senate Health Care Bill

Atlanta, GA – Tea Party Patriots President and co-founder Jenny Beth Martin released the following statement today regarding the amendment to the Senate health care bill offered by Senators Ted Cruz…

teapartypatriots.org

On the flip side, the Cruz amendment could help kill the Senate health-care bill in the end because it’s prompting fears among moderates (whose votes are also needed to pass the legislation) that patients with preexisting conditions could be harmed.

“I think that reopens an issue that I can’t support, that it would make it too difficult for people with preexisting conditions to get coverage,” Sen. Shelley Moore Capito (R-W.Va.) told the Charleston Gazette-Mail.

Cruz has said the Senate bill’s $100 billion stabilization fund for states could help cover costs for the resulting pricier coverage for those with preexisting conditions under his amendment. And to parry concerns about the increased federal spending, which to some is more than ironic coming from Cruz? The  talking point Capitol Hill aides and conservative wonks are adopting: Directly subsidizing costs for those with preexisting conditions is a more “honest” approach by the government than forcing healthy people to indirectly pay for their care by buying comprehensive coverage.

“If you’re going to have a subsidy, have it come directly from the taxpayer and call it a subsidy rather than try to dragoon people to do the government’s work,” said Chris Jacobs, a former GOP Hill staffer and founder of Juniper Research Group.

“It’s more honest and fair to have the government than to have healthy, middle-class families pay for it,” Conn Carroll, a spokesman for Sen. Mike Lee (R-Utah) said.

A co-sponsor of Cruz’s amendment, Lee is insisting it be added to the Senate bill before he’ll vote for it. Sens. Rand Paul of Kentucky and Ron Johnson of Wisconsin have sent similar signals. And remember — if more than two Republicans defect, the measure would be sunk in the Senate and the GOP effort to repeal-and-replace Obamacare would most likely meet a bitter end.

Some exciting news over at The Daily 202 from my colleague James Hohmann, whose newsletter makes its debut on Amazon Echo devices and Google Home as a flash briefing called “The Daily 202’s Big Idea.” Every morning, you can listen to James analyze one of the day’s most important political stories, along with three headlines you need to know. To learn how to add The Daily 202’s Big Idea to your flash briefings on your Echo device or Google Home, visit this page. You can also get the briefing on Apple Podcasts or wherever you get your podcasts.

https://www.washingtonpost.com/news/powerpost/paloma/the-health-202/2017/07/10/the-health-202-cruz-picks-government-health-care-subsidies-as-lesser-of-two-evils/59611958e9b69b7071abcae4/?utm_term=.7137a797b4cf

GOP, White House Plot ‘Urgent Blitz’ For Repeal Votes | The Last Word | MSNBC

Story 2: Total Repeal of Obamacare Requires Total Repeal of All Obamacare Regulations Including Requiring Guaranteed Issue In Individual Health Insurance Market For Those With Preexisting Conditions, Community Rating Premiums and 10 Essential Health Care Benefits as Well As Repeal of The Individual and Employer Mandates and All Obamacare-Related Taxes– Address Individuals With Preexisting Conditions by State Special Risk Pools Insurance Coverage With State Subsidies Only and No Federal Subsidies — Otherwise Guaranteed Failure Just Like Obamacare Due To Adverse Selection — Leading To Single Government Payer Health Care System — Total Repeal of Obamacare Now Or Replace Your Representative and Senators Both Democrat and Republican Next November — It’s Now Or Never (O Sole Mio) — Videos

Rush Limbaugh Podcast 7/11/17 – Exclusive: Vice President Mike Pence Calls the Show

AHCA Myth No. 1: People with Pre-existing Conditions Will Lose Coverage

Fox News host says coverage for preexisting conditions is a ‘luxury’

Dr. Siegel breaks down the pre-existing conditions challenge

The Pre-Existing Condition Scam

Should pre-existing conditions be left to the states?

Debate over pre-existing conditions stalling health-care reform?

Obamacare Replacement, Hill’s Blame Game, Prince Phil Says No Mas and the World Slides Into Insanity

Molyneux and Schiff For Liberty – Discrimination and Pre-Existing Conditions in Health Insurance

ObamaCare Revealed – Pre-Existing Conditions Coverage

Why Exactly Trump’s Healthcare Plan Failed

We Now Have Proof Obamacare Was Designed to Fail… and Here’s Why

Why Is Healthcare So Expensive?

Single-Payer Health Care: America Already Has It

Big Government Kills Small Businesses

Are You on the Wrong Side of History?

Socialism Makes People Selfish

Democratic Socialism is Still Socialism

Elvis – It’s Now Or Never (O Sole Mio)

 

 

It’s Now or Never
It’s now or never,
Come hold me tight
Kiss me my darling,
Be mine tonight
Tomorrow will be too late,
It’s now or never
My love won’t wait.
When I first saw you
With your smile so tender
My heart was captured,
My soul surrendered
I’d spend a lifetime
Waiting for the right time
Now that your near
The time is here at last.
It’s now or never,
Come hold me tight
Kiss me my darling,
Be mine tonight
Tomorrow will be too late,
It’s now or never
My love won’t wait.
Just like a willow,
We would cry an ocean
If we lost true love
And sweet

 

FACT VERSUS FEAR: THE AHCA AND PRE-EXISTING CONDITIONS

On May 4, 2017, the House of Representatives passed the American Health Care Act (AHCA), a bill to repeal and replace many provisions of the Affordable Care Act (ACA). Immediately following the vote, misinformation about the bill began spreading like wildfire, stoking fears and outrage. The issue which seems to be getting the most attention is the potential impact this legislation could have on people with pre-existing conditions. However, as the legislation now moves to the Senate for further consideration and amendment, it is important that all stakeholders be well informed, and understand what the legislation actually says and who may realistically be impacted by any possible changes to current law.

  • The number of people in the U.S. with a condition that would likely qualify as pre-existing is not easily known, primarily because there is not a specific, pre-determined list of conditions. Estimates vary depending on how one defines “pre-existing.”
  • Even the range included in a recent report from the Department of Health and Human Services varied by a margin of more than 2:1, from between 61 million to 133 million people.[1] That said, it is likely that approximately as many as a quarter of Americans, and possibly more, have a pre-existing health condition, making it understandable why some are concerned.
  • As the AHCA is currently written, the only people who could be charged a premium based on their health status are those with a pre-existing condition who are not enrolled in a large group health plan, are also living in a state that obtains a waiver, and have let their insurance lapse in the past year for 63 days or more. In this case, the increased premium would only be allowed for one year. Further, no one may be denied insurance because of a pre-existing condition.

Background

Before passage of the ACA, most laws pertaining to the regulation of the individual health insurance market were passed at the state level and could vary widely from one state to another. The McCarran-Ferguson Act of 1945 provided states primary responsibility for regulating the business of insurance.

The Employee Retirement Income Security Act of 1974 (ERISA) imposed federal standards on certain types and with respect to certain provisions of large group (employer-sponsored) health plans, some of which supersede state law.[2] Among the provisions included in ERISA is a requirement that plans be offered on a guaranteed-issue basis, meaning that insurers are prohibited from denying coverage to the group based on medical claims history; though, the policy may be medically underwritten, meaning the premiums are based on the insured’s health status.

In 1996, the Health Insurance Portability and Accountability Act (HIPAA) was passed and imposed additional federal health insurance standards across the individual, small group, and large group markets. In response to concerns of “job-lock”—the fear that leaving a job could result in the inability to regain health insurance if an individual had a pre-existing condition—HIPAA required all states to guarantee renewability of health insurance coverage to anyone who had creditable coverage for the past 18 months, with no more than a 63-day gap in coverage during that time.[3] However, while insurers were required to renew an individual’s policy from one year to the next, they were still not prohibited from medically underwriting individuals. Thus, some individuals found that while a plan was still technically available to them, the premium may have effectively priced them out of the market. Even those without a pre-existing condition may have found the cost of insurance to be significantly higher without the added employer contribution and tax advantage that such plans receive, which could make maintaining coverage, and HIPAA eligibility, more difficult.

Very few states previously had guarantee issue or renewability requirements or other protections for individuals not covered by HIPAA.[4] Most states permitted insurers to impose pre-existing condition exclusions, in which a pre-existing condition could be used to deny coverage altogether, or would not be covered by an individual’s new insurance policy for at least a certain amount of time, if not indefinitely. Varying “look-back” periods were also prevalent, which regulated the amount of time during which the insurer may check an individual’s claims history to make such a determination.

Current Law

The ACA attempted to mitigate these issues by imposing federal guaranteed issue requirements paired with community rating, which prohibits medical underwriting, across all health insurance markets. For many, these protections became the most important provisions of the ACA. However, there are economic consequences associated with such protections; primarily, higher average premiums in the individual market and increased spending by federal taxpayers. Multiple risk mitigation programs were included in order to help subsidize the cost of insuring high-risk, high-cost individuals, but the funding has not been sufficient. Insurers continue to lose money in the individual market, despite tens of billions of dollars in federal payments each year. In fact, many insurers have found the markets to be so unprofitable due to the many enhanced regulations, that they have decided they can no longer participate in the individual market in many states.[5]

The AHCA

The AHCA, passed by the House of Representatives on May 4, would repeal and replace many provisions of the ACA. One of the ACA’s most well-known provisions, the individual mandate which requires everyone to obtain health insurance, would be repealed (practically speaking, though not technically) and replaced with a continuous coverage provision.[6] These two policies are similar. The individual mandate imposes an annual penalty for not being insured equal to the greater of $695 per adult or 2.5 percent of household income.[7] The continuous coverage provision in this legislation would, instead of federally mandating that everyone buy insurance, incentivize individuals to remain insured by allowing for the imposition of a 30 percent premium surcharge for one year on individuals who signed up for coverage if they were uninsured for more than two months in the previous year.[8] After paying the surcharge for one year, individuals would return to paying regular community-rated premiums.

One provision that would not be repealed is the federal guaranteed issue requirement; insurers in every state would still be prohibited from denying insurance coverage to anyone on the basis of a pre-existing condition. In no circumstance would this protection be denied, though it seems much confusion surrounding this protection has stemmed from the adoption of several amendments to the underlying legislation.

The first relevant amendment is one that was negotiated by Rep. Mark Meadows (R-NC), on behalf of the Freedom Caucus. This amendment includes a provision pertaining to the “essential health benefits” established by the ACA—ten categories of care which are now required to be covered under every health insurance plan. The amendment would permit states, rather than the federal government, to define the EHB standards for themselves beginning in 2018.[9] However, this provision was ultimately struck.

A second amendment was offered by Rep. Tom MacArthur (R-NJ) to address concerns that states would drastically reduce benefit requirements. The MacArthur amendment reinstates the federal EHB standards, but would allow states to apply for waivers to a number of provisions, under certain conditions. Waivers would be permitted for the following: beginning in 2018, a change in age-rating restrictions (which determine how much more an insurer may charge an older person relative to a younger person); beginning in 2019, changes to the community rating provisions, which prohibit insurers from medically underwriting individuals; and, beginning in 2020, changes to the federal EHB standards, permitting states to set their own.

Any state seeking to obtain a community rating waiver must first have in place a program to help high-risk individuals enroll in coverage or a program providing incentives to insurers to enter the market and stabilize premiums, or an invisible risk-sharing program, as defined by the Schweikert/Palmer amendment.[10] All of these programs would be at least partially funded by the $138 billion provided over the next ten years by the Patient and State Stability Fund created by AHCA. The state must also specify how the waiver it is requesting would assist in: reducing average premiums in the state, increasing the number insured, stabilizing the health insurance market, stabilizing premiums for people with pre-existing conditions, or increasing plan choice in the state. If a state demonstrates it has met these conditions and obtains such a waiver, then it may permit insurers to waive the community rating protections, though only for individuals who have not maintained continuous coverage (save for the 63-day allowance) seeking to enroll in coverage in the individual and small group markets. In other words, individuals who would otherwise face a 30 percent surcharge as a result of not maintaining continuous coverage, would instead be medically underwritten for one year. However, under no circumstance may the gender rating protections be waived; insurers would continue to be prohibited from charging different rates based on whether an individual is a male or female.

Thus, the only people who could be charged a premium based on their health status are those with a pre-existing condition, not enrolled in a large group health plan, living in a state that obtains a waiver, who have let their insurance lapse in the past year for 63 days or more, and then only for one year. All others would continue to be protected by the community rating provisions currently in place under the ACA. Further, no one could be denied coverage because of the existence of a pre-existing condition, or even face a lock-out period.

Conclusion

The AHCA would not provide for the return to the status quo prior to the ACA. It is unlikely that many Americans will be impacted by the provisions of the MacArthur amendment. Finally, the AHCA must still be passed by the Senate and is likely to undergo significant reforms before it does, in which case, the legislation would again have to be passed by the House.

 

[1] https://aspe.hhs.gov/system/files/pdf/255396/Pre-ExistingConditions.pdf

[2] https://www.nahu.org/consumer/GroupInsurance.cfm

[3] There are some exceptions to the guaranteed renewability requirements.

[4] http://www.ncsl.org/research/health/individual-health-insurance-in-the-states.aspx

[5] http://kff.org/health-reform/issue-brief/2017-premium-changes-and-insurer-participation-in-the-affordable-care-acts-health-insurance-marketplaces/

[6] Technically, the mandate would not be repealed because legislative rules prohibit such a change through the reconciliation process, but the applicable penalty would be set to $0, rendering the mandate moot.

[7] https://www.healthcare.gov/fees/fee-for-not-being-covered/

[8] The continuous coverage provisions which match the 63-day rule of the HIPAA requirements.

[9] https://rules.house.gov/sites/republicans.rules.house.gov/files/115/policymngr-amdt.pdf

[10] https://rules.house.gov/sites/republicans.rules.house.gov/files/115/AHCA/Palmer-Schweikert%20Amendment.pdf

Read more: https://www.americanactionforum.org/insight/fact-versus-fear-ahca-pre-existing-conditions/#ixzz4mSiu1KRn
Follow us: @AAF on Twitter

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

 

 

Advertisements
Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 893, May 15, 2017, Story 1: World Wide Ransom Ware Demands Spreading To Over 150 Countries — Huge Hacker Holdup Using Exploit of Security Flaw In Microsoft XP Operating System — Used Code Developed By U.S. National Security Agency (NSA) — Running Sacred — Crying — It’s Over — Videos — Story 2: American People Demand Congress Appoint Special Prosecutor — Investigate Obama’s Administration Use of Intelligence Community (NSA, CIA, FBI, …) Warrantless Surveillance of Both Democrat and Republican Presidential Candidates — The Use Intelligence Information For Political Purposes Is A Felony! — Videos

Posted on May 15, 2017. Filed under: American History, Applications, Blogroll, Breaking News, Computer, Computers, Corruption, Crime, Donald J. Trump, Donald Trump, Hardware, History, Human, Law, Life, Media, Networking, Privacy, Raymond Thomas Pronk, Science, Security, Servers, Social Science, Software, Wealth, Wisdom | Tags: , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Image result for cartoons ransom ware attack

Image result for obamagate surveillance of presidential candidates susan rice

Image result for cartoons branco susan rice trump

 

Story 1: Huge Hacker Holdup — Cyber extortion Attack — NSA Ransom War — Running Sacred — Crying — It’s Over — VideosImage result for ransome ware attackImage result for bitcoinImage result for cartoons ransom ware attackImage result for ransome ware attack list of countries and companies

Image result for ransome ware attack list of countries and companies
Image result for ransome ware attack list of countries and companies
Image result for ransome ware attack list of countries and companiesImage result for ransome ware attack list of countries and companies

 

 

Image result for cartoons ransom ware attack

Image result for cartoons ransom ware attack

Image result for 12 May 2017 ransome ware attack list of countries and companies

 New version of ransomware worm expected

Cyber Attack: Ransomware causing chaos globally – BBC News

Ransomware virus ‘WannaCry’ plagues 100k computers across 99 countries

Ransomware attack takes down LA hospital for hours

WannaCry Ransomware Hits Hospitals

WannaCry Ransomware Used In Global Attacks!

WATCH: Ransomware cyberattack targets Windows users around the world

BREAKING***100 Countries Massive Global Ransomware Attack Used NSA Hacking Tool

What is ransomware and how can I protect myself?

How Ransomware Locks Your PC & Holds Your Data Hostage

Massive Ransomware Outbreak Thanks to NSA – WannaCry Worm Spreading Fast

Ransomware As Fast As Possible

The Truth About Ransomware – Webinar

What is Ransomware, How it Works and What You Can Do to Stay Protected

NSA Whistleblower Bill Binney on Tucker Carlson 03.24.2017

NSA Whistleblower William Binney: The Future of FREEDOM

ROY ORBISON – CRYING – LIVE 1988

Roy Orbison – “Running Scared” from Black and White Night

Roy Orbison – Crying (Monument Concert 1965)

Roy Orbison – It’s Over (Monument Concert 1965)

Roy Orbison – “It’s Over” from Black and White Night

Worldwide ransomware attacks: What we know so far

May 15, 2017
AUTHOR: LILY HAY NEWMAN. SECURITY

HOW AN ACCIDENTAL ‘KILL SWITCH’ SLOWED FRIDAY’S MASSIVE RANSOMWARE ATTACK

Cybersecurity Experts’ First Task: Find Out How Virus Spread

Investigators think a computer outlet that isn’t supposed to be connected to the internet was a possible vector for WannaCry

The virus, dubbed WannaCry, is a two-part virus. One part is ransomware, which locks computer files and demands online payment to unlock them. The other part spreads it.

The virus, dubbed WannaCry, is a two-part virus. One part is ransomware, which locks computer files and demands online payment to unlock them. The other part spreads it. PHOTO: RITCHIE B. TONGO/EUROPEAN PRESSPHOTO AGENCY

Government investigators and private cybersecurity firms are trying to find out how a virus managed to spread around the globe over the weekend, which would give them their best chance to identify the mastermind behind the cyberattacks.

Investigators have already ruled out phishing—tricking someone into opening a seemingly legitimate email attachment that actually contains the virus—as a possible tactic. One of their hypotheses centers on something called port 445, an outlet that isn’t supposed to be connected to the internet.

The race is on to identify patient zero, or the first known infection of the virus, to find clues that could lead back to the hacker.

The attacks appear to have largely abated Monday, despite fears that a new workweek would trigger a second wave. Cybersecurity experts see fewer infections compared with Friday, when the onslaught started.

“We think the initial fire is put out,” said Rob Holmes, vice president of products at Proofpoint, a Silicon Valley company with virus sensors at major corporations and telecom companies.

The virus, dubbed WannaCry, is a two-part virus. One part is ransomware, which locks computer files and demands online payment to unlock them. The other part is a “spreader,” which transmits WannaCry to all other computers on a network. It attacks machines running Microsoft Corp.’s Windows systems that don’t have up-to-date security patches.

Mr. Holmes said 95% of ransomware attacks use the relatively unsophisticated technique of phishing.

A European Union cybersecurity agency published a report Monday, which said early indications pointed to emails containing WannaCry-infected Microsoft Office documents as the attacker’s weapon. But it quickly amended the report, saying phishing probably wasn’t involved.

If it had been a phishing attack, organizations would have found the offending email by now and described it to the public, cybersecurity experts said.

Now there are two main hypotheses as to how WannaCry could have wormed its way into a computer. One theory centers on port 445.

Imagine a network of 100 computers. These computers communicate with each other through digital roads. One of the roads is port 445, and it is usually reserved for Windows-running computers to transfer files to each other, or to send stuff to the printer, said Becky Pinkard, a vice president at cybersecurity firm Digital Shadows.

Authorities know WannaCry spread itself within a network using the port 445 roads. But how did it get there in the first place? Port 445 roads connect computers within a network, but it was thought to be walled off from the internet and outside world. Now investigators are trying to determine whether port 445’s wall has a hole that WannaCry wiggled through.

“Most researchers tend to believe at the moment that it spreads initially through vulnerable computers exposing port 445 on the internet,” the updated EU agency report said.

There is another theory. Ms. Pinkard said an employee could have taken an office-issued laptop to a coffee shop or hotel and logged onto the venue’s unsecure internet network. If that laptop doesn’t have the antivirus protections that networks at big organizations typically have, a hacker could’ve slipped WannaCry onto the device. When the employee brings the laptop back to the office and connects it to the network, bam: WannaCry spreads itself via port 445.

Companies can protect laptops from this with commercially available protection software, Ms. Pinkard said.

If researchers can find the original WannaCry victim, they might be able to trace the signature of the attacker who delivered the virus via an internet-protocol address, or IP address. “If I were law enforcement, I would be working to find who was the very first company impacted,” Ms. Pinkard said. “I would knock at the door and be asking, ‘Can I look at your logs?’ ”

The problem is that the IP address could lead to another IP address, which would lead to another IP address, and so on. “It’s a very slow and painful process,” Ms. Pinkard said.

Cybersecurity experts said that, even though some of the world’s smartest minds are on the case, it could take months or years to find the mastermind—if they find the attacker at all.

A parallel hunt would be following the money. WannaCry asked for ransom to be delivered via a digital currency called bitcoin. About 124 payments totaling about $34,000, or a little less than $300 each, went to the attacker as of Sunday afternoon, said bitcoin-analytics-firm Chainalysis. Every bitcoin transaction is recorded on an online ledger. But finding out the individual behind each transaction is difficult because users’ identities are well encrypted.

“There’s going to be a paper trail,” said Brian Knight, a George Mason University specialist in financial technology. “Whether it can be deciphered is a separate question.”

https://www.wsj.com/articles/cybersecurity-experts-first-task-find-out-how-virus-spread-1494868250

The cyberattacks started Friday and spread rapidly around the globe using a security flaw in Microsoft’s Windows XP operating system

The cyberattacks started Friday and spread rapidly around the globe using a security flaw in Microsoft’s Windows XP operating system

 Security agencies are hunting for those behind a crippling cyberattack which has so far hit hundreds of thousands of computers worldwide, including at government agencies, factories and health services.

Here is what we know so far about the cyber ransom attacks:

– What happened? –

The cyberattacks started Friday and spread rapidly around the globe using a security flaw in Microsoft’s Windows XP operating system, an older version that is no longer given mainstream tech support by the US giant.

The so-called WannaCry ransomware locks access to user files and in an on-screen message demands payment of $300 (275 euros) in the virtual currency Bitcoin in order to decrypt the files.

Victims have been advised by security experts not to pay up.

The attack is unique, according to policing agency Europol, because it combines ransomware with a worm function, meaning once one machine is infected, the entire internal network is scanned and other vulnerable machines are infected.

– Who has been affected? –

Europol chief Rob Wainwright said computer systems in more than 150 countries were hit, with the majority of organisations affected over the weekend in Europe.

But as Asia woke up to the working week on Monday, leading Chinese security-software provider Qihoo 360 said “hundreds of thousands” of computers in the country were hit at nearly 30,000 institutions including government agencies.

In Japan, a spokesman for Hitachi said the conglomerate discovered problems on Monday morning and its computer networks were “unstable”.

Other high-profile victims include hospitals in Britain, the Spanish telecoms giant Telefonica, French carmaker Renault, US package delivery company FedEx, Russia’s interior ministry and the German rail operator Deutsche Bahn.

– Where did the malware come from? –

Brad Smith, Microsoft’s president and chief legal officer, said in a blog post Sunday that the culprits used a code developed by the US National Security Agency.

It was leaked as part of a document dump, according to researchers at the Moscow-based computer security firm Kaspersky Lab.

Smith warned governments against stockpiling such vulnerabilities and said instead they should report them to manufacturers — not sell, store or exploit them, lest they fall into the wrong hands.

“An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen,” Smith wrote.

“The governments of the world should treat this attack as a wake up call.”

– Who was behind the attack? –

Europol said on Monday it was continuing to hunt for the culprits behind the unprecedented attack.

The agency’s senior spokesman Jan Op Gen Oorth said it was still “a bit early too say who is behind it, but we are working on a decrypting tool”.

Experts think it unlikely to have been one person, with criminally minded cyber crime syndicates nowadays going underground and using ever more sophisticated encryption to hide their activities.

– How can people protect their computers? –

Microsoft took the unusual step of reissuing security patches first made available in March for Windows XP and other older versions of its operating system.

Kaspersky said it was seeking to develop a decryption tool “as soon as possible”.

Europol said European companies and governments had heeded warnings and as a result avoided further fallout from the ransomware.

“It seems that a lot of internet security guys over the weekend did their homework and ran the security software updates,” Jan Op Gen Oorth told AFP.

https://www.yahoo.com/tech/worldwide-ransomware-cyberattacks-know-152751340.html

Dozens of countries hit by huge cyberextortion attack

NEW YORK (AP) — Dozens of countries were hit with a huge cyberextortion attack Friday that locked up computers and held users’ files for ransom at a multitude of hospitals, companies and government agencies.

It was believed to the biggest attack of its kind ever recorded.

The malicious software behind the onslaught appeared to exploit a vulnerability in Microsoft Windows that was supposedly identified by the National Security Agency for its own intelligence-gathering purposes and was later leaked to the internet.

Britain’s national health service fell victim, its hospitals forced to close wards and emergency rooms and turn away patients. Russia appeared to be the hardest hit, according to security experts, with the country’s Interior Ministry confirming it was struck.

All told, several cybersecurity firms said they had identified the malicious software, which so far has been responsible for tens of thousands of attacks, in more than 60 countries. That includes the United States, although its effects there didn’t appear to be widespread, at least initially.

The attack infected computers with what is known as “ransomware” — software that locks up the user’s data and flashes a message demanding payment to release it. In the U.S., FedEx reported that its Windows computers were “experiencing interference” from malware, but wouldn’t say if it had been hit by ransomware.

Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, called the attack “the biggest ransomware outbreak in history.”

Security experts said the attack appeared to be caused by a self-replicating piece of software that enters companies and organizations when employees click on email attachments, then spreads quickly internally from computer to computer when employees share documents and other files.

Its ransom demands start at $300 and increase after two hours to $400, $500 and then $600, said Kurt Baumgartner, a security researcher at Kaspersky Lab. Affected users can restore their files from backups, if they have them, or pay the ransom; otherwise they risk losing their data entirely.

Chris Wysopal of the software security firm Veracode said criminal organizations were probably behind the attack, given how quickly the malware spread.

“For so many organizations in the same day to be hit, this is unprecedented,” he said.

The security holes it exploits were disclosed several weeks ago by TheShadowBrokers, a mysterious group that has published what it says are hacking tools used by the NSA as part of its intelligence-gathering.

Shortly after that disclosure, Microsoft announced that it had already issued software “patches” for those holes. But many companies and individuals haven’t installed the fixes yet or are using older versions of Windows that Microsoft no longer supports and didn’t fix.

By Kaspersky Lab’s count, the malware struck at least 74 countries. In addition to Russia, the biggest targets appeared to be Ukraine and India, nations where it is common to find older, unpatched versions of Windows in use, according to the security firm.

Hospitals across Britain found themselves without access to their computers or phone systems. Many canceled all routine procedures and asked patients not to come to the hospital unless it was an emergency. Doctors’ practices and pharmacies reported similar problems.

Patrick Ward, a 47-year-old sales director, said his heart operation, scheduled for Friday, was canceled at St. Bartholomew’s Hospital in London.

Tom Griffiths, who was at the hospital for chemotherapy, said several cancer patients had to be sent home because their records or bloodwork couldn’t be accessed.

“Both staff and patients were frankly pretty appalled that somebody, whoever they are, for commercial gain or otherwise, would attack a health care organization,” he said. “It’s stressful enough for someone going through recovery or treatment for cancer.”

British Prime Minister Theresa May said there was no evidence patient data had been compromised and added that the attack had not specifically targeted the National Health Service.

“It’s an international attack and a number of countries and organizations have been affected,” she said.

Spain, meanwhile, took steps to protect critical infrastructure in response to the attack. Authorities said they were communicating with more than 100 energy, transportation, telecommunications and financial services providers about the attack.

Spain’s Telefonica, a global broadband and telecommunications company, was among the companies hit.

Ransomware attacks are on the rise around the world. In 2016, Hollywood Presbyterian Medical Center in California said it had paid a $17,000 ransom to regain control of its computers from hackers.

Krishna Chinthapalli, a doctor at Britain’s National Hospital for Neurology & Neurosurgery who wrote a paper on cybersecurity for the British Medical Journal, warned that British hospitals’ old operating systems and confidential patient information made them an ideal target for blackmailers.

He said many NHS hospitals in Britain use Windows XP software, introduced in 2001, and as government funding for the health service has been squeezed, “IT budgets are often one of the first ones to be reduced.”

“Looking at the trends, it was going to happen,” he said. “I did not expect an attack on this scale. That was a shock.

https://apnews.com/e8402f2faf934f7ab5419d4961d3dafe/Global-extortion-cyberattack-hits-dozens-of-nations

Global ‘WannaCry’ ransomware cyberattack seeks cash for data

LONDON (AP) — A global “ransomware” cyberattack, unprecedented in scale, had technicians scrambling to restore Britain’s crippled hospital network Saturday and secure the computers that run factories, banks, government agencies and transport systems in many other nations.

The worldwide effort to extort cash from computer users spread so widely that Microsoft quickly changed its policy, making security fixes available for free for the older Windows systems still used by millions of individuals and smaller businesses.

A malware tracking map showed “WannaCry” infections popping up around the world. Britain canceled or delayed treatments for thousands of patients, even people with cancer. Train systems were hit in Germany and Russia, and phone companies in Madrid and Moscow. Renault’s futuristic assembly line in Slovenia, where rows of robots weld car bodies together, was stopped cold.

In Brazil, the social security system had to disconnect its computers and cancel public access. The state-owned oil company Petrobras and Brazil’s Foreign Ministry also disconnected computers as a precautionary measure, and court systems went down, too.

Britain’s home secretary said one in five of 248 National Health Service groups had been hit. Home Secretary Amber Rudd said all but six of the NHS trusts back to normal Saturday.

The U.K.’s National Cyber Security Center was “working round the clock” to restore vital health services, while urging people to update security software fixes, run anti-virus software and back up their data elsewhere.

Who perpetrated this wave of attacks remains unknown. Two security firms — Kaspersky Lab and Avast — said they identified the malicious software in more than 70 countries. Both said Russia was hit hardest.

These hackers “have caused enormous amounts of disruption— probably the biggest ransomware cyberattack in history,” said Graham Cluley, a veteran of the anti-virus industry in Oxford, England.

And all this may be just a taste of what’s coming, another cyber security expert warned.

Computer users worldwide — and everyone else who depends on them — should assume that the next big “ransomware” attack has already been launched, and just hasn’t manifested itself yet, Ori Eisen, who founded the Trusona cybersecurity firm in Scottsdale, Arizona, told The Associated Press.

The attack held hospitals and other entities hostage by freezing computers, encrypting data and demanding money through online bitcoin payments. But it appears to be “low-level” stuff, Eisen said Saturday, given the amount of ransom demanded — $300 at first, rising to $600 before it destroys files hours later.

He said the same thing could be done to crucial infrastructure, like nuclear power plants, dams or railway systems.

“This is child’s play, what happened. This is not the serious stuff yet. What if the same thing happened to 10 nuclear power plants, and they would shut down all the electricity to the grid? What if the same exact thing happened to a water dam or to a bridge?” he asked.

“Today, it happened to 10,000 computers,” Eisen said. “There’s no barrier to do it tomorrow to 100 million computers.”

This is already believed to be the biggest online extortion attack ever recorded, disrupting services in nations as diverse as the U.S., Ukraine, Brazil, Spain and India. Europol, the European Union’s police agency, said the onslaught was at “an unprecedented level and will require a complex international investigation to identify the culprits.”

In Russia, government agencies insisted that all attacks had been resolved. Russian Interior Ministry, which runs the national police, said the problem had been “localized” with no information compromised. Russia’s health ministry said its attacks were “effectively repelled.”

The ransomware exploits a vulnerability in Microsoft Windows that was purportedly identified by the U.S. National Security Agency for its own intelligence-gathering purposes. Hackers said they stole the tools from the NSA and dumped them on the internet.

It could have been much worse if not for a young cybersecurity researcher who helped to halt its spread by accidentally activating a so-called “kill switch” in the malicious software.

The 22-year-old Britain-based researcher, identified online only as MalwareTech, explained Saturday that he spotted a hidden web address in the “WannaCrypt” code and made it official by registering its domain name. That inexpensive move redirected the attacks to MalwareTech’s server, which operates as a “sinkhole” to keep malware from escaping.

“Because WannaCrypt used a single hardcoded domain, my registration of it caused all infections globally to believe they were inside a sandbox … thus we initially unintentionally prevented the spread,” the researcher said, humbly and anonymously, in his blog post.

His move may have saved governments and companies millions of dollars and slowed the outbreak before U.S.-based computers were more widely infected.

Indeed, while FedEx Corp. reported that its Windows computers were “experiencing interference” from malware — it wouldn’t say if it had been hit by the ransomware — other impacts in the U.S. were not readily apparent on Saturday.

That said, the threat hasn’t disappeared, the MalwareTech researcher said.

“One thing that is very important to note is our sinkholing only stops this sample and there is nothing stopping them removing the domain check and trying again, so it’s incredibly important that any unpatched systems are patched as quickly as possible,” he warned.

The kill switch also couldn’t help those already infected. Short of paying, options for these individuals and companies are usually limited to recovering data files from a backup, if available, or living without them.

Security experts said it appeared to be caused by a self-replicating piece of software that enters companies when employees click on email attachments, then spreads quickly as employees share documents.

The security holes it exploits were disclosed weeks ago by TheShadowBrokers, a mysterious hacking group. Microsoft swiftly released software “patches” to fix those holes, but many users still haven’t installed updates or still use older versions of Windows.

Microsoft had made fixes for older systems, such as 2001′s Windows XP, available only to mostly larger organizations, including Britain’s National Health Service, that paid extra for extended technical support. In light of Friday’s attacks, Microsoft announced that it’s making the fixes free to all.

Cluley said “There’s clearly some culpability on the part of the U.S. intelligence services. Because they could have done something ages ago to get this problem fixed, and they didn’t do it.”

“It’s very, very difficult these days, with encryption, to spy on people,” Cluley added. “But I don’t think that those concerns should hide the fact that ALL of us need to be protected … We’re living an online life, and we all deserve security there.”

https://apnews.com/770946e7df454d2e9acda3bdbd3ed425/Unprecedented-global-‘ransomware’-attack-seeks-cash-for-data

Ransomware

From Wikipedia, the free encyclopedia

Ransomware is a type of malicious software designed to block access to a computer system or data until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them.[1] The ransomware may also encrypt the computer’s Master File Table (MFT)[2][3] or the entire hard drive.[4] Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files[5] since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.

While initially popular in Russia, the use of ransomware scams has grown internationally;[6][7][8] in June 2013, security software vendor McAfee released data showing that it had collected over 250,000 unique samples of ransomware in the first quarter of 2013, more than double the number it had obtained in the first quarter of 2012.[9] Wide-ranging attacks involving encryption-based ransomware began to increase through Trojans such as CryptoLocker, which had procured an estimated US$3 million before it was taken down by authorities,[10] and CryptoWall, which was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over $18m by June 2015.[11]

Operation

Typically, modern ransomware uses encryption to deny users’ access to their files. The software encrypts the victim’s files using a symmetric cipher with a randomly generated key, and then deletes the key, leaving only a version of it made inaccessible to the victim using public key cryptography. Only the attacker can then decrypt the symmetric key needed to restore the files.[12]

The symmetric key is randomly generated and will not assist other victims. At no point is the attacker’s private key exposed to victims and the victim need only send a very small ciphertext (the encrypted symmetric-cipher key) to the attacker.

Ransomware attacks are typically carried out using a Trojan, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program then runs a payload, which locks the system in some fashion, or claims to lock the system but does not (e.g., a scareware program). Payloads may display a fake warning purportedly by an entity such as a law enforcement agency, falsely claiming that the system has been used for illegal activities, contains content such as pornography and “pirated” media.[13][14][15]

Some payloads consist simply of an application designed to lock or restrict the system until payment is made, typically by setting the Windows Shell to itself,[16] or even modifying the master boot record and/or partition table to prevent the operating system from booting until it is repaired.[17] The most sophisticated payloads encrypt files, with many using strong encryption to encrypt the victim’s files in such a way that only the malware author has the needed decryption key.[12][18][19]

Payment is virtually always the goal, and the victim is coerced into paying for the ransomware to be removed—which may or may not actually occur—either by supplying a program that can decrypt the files, or by sending an unlock code that undoes the payload’s changes. A key element in making ransomware work for the attacker is a convenient payment system that is hard to trace. A range of such payment methods have been used, including wire transfers, premium-rate text messages,[20] pre-paid voucher services such as Paysafecard,[6][21][22] and the digital currency Bitcoin.[23][24][25] A 2016 census commissioned by Citrix revealed that larger business are holding bitcoin as contingency plans.[26]

History

Encrypting ransomware

The first known malware extortion attack, the “AIDS Trojan” written by Joseph Popp in 1989, had a design failure so severe it was not necessary to pay the extortionist at all. Its payload hid the files on the hard drive and encrypted only their names, and displayed a message claiming that the user’s license to use a certain piece of software had expired. The user was asked to pay US$189 to “PC Cyborg Corporation” in order to obtain a repair tool even though the decryption key could be extracted from the code of the Trojan. The Trojan was also known as “PC Cyborg”. Popp was declared mentally unfit to stand trial for his actions, but he promised to donate the profits from the malware to fund AIDS research.[27]

The notion of using public key cryptography for ransom attacks was introduced in 1996 by Adam L. Young and Moti Yung. Young and Yung critiqued the failed AIDS Information Trojan that relied on symmetric cryptography alone, the fatal flaw being that the decryption key could be extracted from the Trojan, and implemented an experimental proof-of-concept cryptovirus on a Macintosh SE/30 that used RSA and the Tiny Encryption Algorithm (TEA) to hybrid encrypt the victim’s data. Since public key crypto is used, the cryptovirus only contains the encryption key. The attacker keeps the corresponding private decryption key private. Young and Yung’s original experimental cryptovirus had the victim send the asymmetric ciphertext to the attacker who deciphers it and returns the symmetric decryption key it contains to the victim for a fee. Long before electronic money existed Young and Yung proposed that electronic money could be extorted through encryption as well, stating that “the virus writer can effectively hold all of the money ransom until half of it is given to him. Even if the e-money was previously encrypted by the user, it is of no use to the user if it gets encrypted by a cryptovirus”.[12] They referred to these attacks as being “cryptoviral extortion”, an overt attack that is part of a larger class of attacks in a field called cryptovirology, which encompasses both overt and covert attacks.[12]

Examples of extortionate ransomware became prominent in May 2005.[28] By mid-2006, Trojans such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive began utilizing more sophisticated RSA encryption schemes, with ever-increasing key-sizes. Gpcode.AG, which was detected in June 2006, was encrypted with a 660-bit RSA public key.[29] In June 2008, a variant known as Gpcode.AK was detected. Using a 1024-bit RSA key, it was believed large enough to be computationally infeasible to break without a concerted distributed effort.[30][31][32][33]

Encrypting ransomware returned to prominence in late 2013 with the propagation of CryptoLocker—using the Bitcoin digital currency platform to collect ransom money. In December 2013, ZDNet estimated based on Bitcoin transaction information that between 15 October and 18 December, the operators of CryptoLocker had procured about US$27 million from infected users.[34] The CryptoLocker technique was widely copied in the months following, including CryptoLocker 2.0 (though not to be related to CryptoLocker), CryptoDefense (which initially contained a major design flaw that stored the private key on the infected system in a user-retrievable location, due to its use of Windows’ built-in encryption APIs),[24][35][36][37] and the August 2014 discovery of a Trojan specifically targeting network-attached storage devices produced by Synology.[38] In January 2015, it was reported that ransomware-styled attacks have occurred against individual websites via hacking, and through ransomware designed to target Linux-based web servers.[39][40][41]

Some ransomware strains have used proxies tied to Tor hidden services to connect to their command and control servers, increasing the difficulty of tracing the exact location of the criminals.[42][43] Furthermore, dark web vendors have increasingly started to offer the technology as a service.[43][44][45]

Symantec has classified ransomware to be the most dangerous cyber threat.[46]

Non-encrypting ransomware

In August 2010, Russian authorities arrested nine individuals connected to a ransomware Trojan known as WinLock. Unlike the previous Gpcode Trojan, WinLock did not use encryption. Instead, WinLock trivially restricted access to the system by displaying pornographic images, and asked users to send a premium-rate SMS (costing around US$10) to receive a code that could be used to unlock their machines. The scam hit numerous users across Russia and neighboring countries—reportedly earning the group over US$16 million.[15][47]

In 2011, a ransomware Trojan surfaced that imitated the Windows Product Activation notice, and informed users that a system’s Windows installation had to be re-activated due to “[being a] victim of fraud”. An online activation option was offered (like the actual Windows activation process), but was unavailable, requiring the user to call one of six international numbers to input a 6-digit code. While the malware claimed that this call would be free, it was routed through a rogue operator in a country with high international phone rates, who placed the call on hold, causing the user to incur large international long distance charges.[13]

In February 2013, a ransomware Trojan based on the Stamp.EK exploit kit surfaced; the malware was distributed via sites hosted on the project hosting services SourceForge and GitHub that claimed to offer “fake nude pics” of celebrities.[48] In July 2013, an OS X-specific ransomware Trojan surfaced, which displays a web page that accuses the user of downloading pornography. Unlike its Windows-based counterparts, it does not block the entire computer, but simply exploits the behavior of the web browser itself to frustrate attempts to close the page through normal means.[49]

In July 2013, a 21-year-old man from Virginia, whose computer coincidentally did contain pornographic photographs of underaged girls with whom he had conducted sexualized communications, turned himself in to police after receiving and being deceived by ransomware purporting to be an FBI message accusing him of possessing child pornography. An investigation discovered the incriminating files, and the man was charged with child sexual abuse and possession of child pornography.[50]

Leakware (also called Doxware)

The converse of ransomware is a cryptovirology attack that threatens to publish stolen information from the victim’s computer system rather than deny the victim access to it.[51] In a leakware attack, malware exfiltrates sensitive host data either to the attacker or alternatively, to remote instances of the malware, and the attacker threatens to publish the victim’s data unless a ransom is paid. The attack was presented at West Point in 2003 and was summarized in the book Malicious Cryptography as follows, “The attack differs from the extortion attack in the following way. In the extortion attack, the victim is denied access to its own valuable information and has to pay to get it back, where in the attack that is presented here the victim retains access to the information but its disclosure is at the discretion of the computer virus”.[52] The attack is rooted in game theory and was originally dubbed “non-zero sum games and survivable malware”. The attack can yield monetary gain in cases where the malware acquires access to information that may damage the victim user or organization, e.g., reputational damage that could result from publishing proof that the attack itself was a success.

Mobile ransomware

With the increased popularity of ransomware on PC platforms, ransomware targeting mobile operating systems have also proliferated. Typically, mobile ransomware payloads are blockers, as there is little incentive to encrypt data since it can be easily restored via online synchronization.[53] Mobile ransomware typically targets the Android platform, as it allows applications to be installed from third-party sources.[53][54] The payload is typically distributed as an APK file installed by an unsuspecting user; it may attempt to display a blocking message over top of all other applications,[54] while another used a form of clickjacking to cause the user to give it “device administrator” privileges to achieve deeper access to the system.[55]

Different tactics have been used on iOS devices, such as exploiting iCloud accounts and using the Find My iPhone system to lock access to the device.[56] On iOS 10.3, Apple patched a bug in the handling of JavaScript pop-up windows in Safari that had been exploited by ransomware websites.[57]

Notable examples

Reveton

A Reveton payload, fraudulently claiming that the user must pay a fine to the Metropolitan Police Service

In 2012, a major ransomware Trojan known as Reveton began to spread. Based on the Citadel Trojan (which itself, is based on the Zeus Trojan), its payload displays a warning purportedly from a law enforcement agency claiming that the computer has been used for illegal activities, such as downloading unlicensed software or child pornography. Due to this behaviour, it is commonly referred to as the “Police Trojan”.[58][59][60] The warning informs the user that to unlock their system, they would have to pay a fine using a voucher from an anonymous prepaid cash service such as Ukash or Paysafecard. To increase the illusion that the computer is being tracked by law enforcement, the screen also displays the computer’s IP address, while some versions display footage from a victim’s webcam to give the illusion that the user is being recorded.[6][61]

Reveton initially began spreading in various European countries in early 2012.[6] Variants were localized with templates branded with the logos of different law enforcement organizations based on the user’s country; for example, variants used in the United Kingdom contained the branding of organizations such as the Metropolitan Police Service and the Police National E-Crime Unit. Another version contained the logo of the royalty collection society PRS for Music, which specifically accused the user of illegally downloading music.[62] In a statement warning the public about the malware, the Metropolitan Police clarified that they would never lock a computer in such a way as part of an investigation.[6][14]

In May 2012, Trend Micro threat researchers discovered templates for variations for the United States and Canada, suggesting that its authors may have been planning to target users in North America.[63] By August 2012, a new variant of Reveton began to spread in the United States, claiming to require the payment of a $200 fine to the FBI using a MoneyPak card.[7][8][61]In February 2013, a Russian citizen was arrested in Dubai by Spanish authorities for his connection to a crime ring that had been using Reveton; ten other individuals were arrested on money laundering charges.[64] In August 2014, Avast Software reported that it had found new variants of Reveton that also distribute password stealing malware as part of its payload.[65]

CryptoLocker

Encrypting ransomware reappeared in September 2013 with a Trojan known as CryptoLocker, which generated a 2048-bit RSA key pair and uploaded in turn to a command-and-control server, and used to encrypt files using a whitelist of specific file extensions. The malware threatened to delete the private key if a payment of Bitcoin or a pre-paid cash voucher was not made within 3 days of the infection. Due to the extremely large key size it uses, analysts and those affected by the Trojan considered CryptoLocker extremely difficult to repair.[23][66][67][68]Even after the deadline passed, the private key could still be obtained using an online tool, but the price would increase to 10 BTC—which cost approximately US$2300 as of November 2013.[69][70]

CryptoLocker was isolated by the seizure of the Gameover ZeuS botnet as part of Operation Tovar, as officially announced by the U.S. Department of Justice on 2 June 2014. The Department of Justice also publicly issued an indictment against the Russian hacker Evgeniy Bogachev for his alleged involvement in the botnet.[71][72] It was estimated that at least US$3 million was extorted with the malware before the shutdown.[10]

CryptoLocker.F and TorrentLocker

In September 2014, a wave of ransomware Trojans surfaced that first targeted users in Australia, under the names CryptoWall and CryptoLocker (which is, as with CryptoLocker 2.0, unrelated to the original CryptoLocker). The Trojans spread via fraudulent e-mails claiming to be failed parcel delivery notices from Australia Post; to evade detection by automatic e-mail scanners that follow all links on a page to scan for malware, this variant was designed to require users to visit a web page and enter a CAPTCHA code before the payload is actually downloaded, preventing such automated processes from being able to scan the payload. Symantec determined that these new variants, which it identified as CryptoLocker.F, were again, unrelated to the original CryptoLocker due to differences in their operation.[73][74] A notable victim of the Trojans was the Australian Broadcasting Corporation; live programming on its television news channel ABC News 24 was disrupted for half an hour and shifted to Melbourne studios due to a CryptoWall infection on computers at its Sydney studio.[75][76][77]

Another Trojan in this wave, TorrentLocker, initially contained a design flaw comparable to CryptoDefense; it used the same keystream for every infected computer, making the encryption trivial to overcome. However, this flaw was later fixed.[35] By late-November 2014, it was estimated that over 9,000 users had been infected by TorrentLocker in Australia alone, trailing only Turkey with 11,700 infections.[78]

CryptoWall

Another major ransomware Trojan targeting Windows, CryptoWall, first appeared in 2014. One strain of CryptoWall was distributed as part of a malvertising campaign on the Zedo ad network in late-September 2014 that targeted several major websites; the ads redirected to rogue websites that used browser plugin exploits to download the payload. A Barracuda Networks researcher also noted that the payload was signed with a digital signature in an effort to appear trustworthy to security software.[79] CryptoWall 3.0 used a payload written in JavaScript as part of an email attachment, which downloads executables disguised as JPG images. To further evade detection, the malware creates new instances of explorer.exe and svchost.exe to communicate with its servers. When encrypting files, the malware also deletes volume shadow copies, and installs spyware that steals passwords and Bitcoin wallets.[80]

The FBI reported in June 2015 that nearly 1,000 victims had contacted the bureau’s Internet Crime Complaint Center to report CryptoWall infections, and estimated losses of at least $18 million.[11]

The most recent version, CryptoWall 4.0, enhanced its code to avoid antivirus detection, and encrypts not only the data in files but also the file names.[81]

Fusob

Fusob is one of the major mobile ransomware families. Between April 2015 and March 2016, about 56 percent of accounted mobile ransomwares was Fusob.[82]

Like a typical mobile ransomware, it employs scare tactics to extort people to pay a ransom.[83] The program pretends to be an accusatory authority, demanding the victim to pay a fine from $100 to $200 USD or otherwise face a fictitious charge. Rather surprisingly, Fusob suggests using iTunes gift cards for payment. Also, a timer clicking down on the screen adds to the users’ anxiety as well.

In order to infect devices, Fusob masquerades as a pornographic video player. Thus, victims, thinking it is harmless, unwittingly download Fusob.[84]

When Fusob is installed, it first checks the language used in the device. If it uses Russian or certain Eastern European languages, Fusob does nothing. Otherwise, it proceeds on to lock the device and demand ransom. Among victims, about 40% of them are in Germany with the United Kingdom and the United States following with 14.5% and 11.4% respectively.

Fusob has lots in common with Small, which is another major family of mobile ransomware. They represented over 93% of mobile ransomwares between 2015 and 2016.

WannaCry

In May 2017, the WannaCry ransomware attack spread though the Internet, using an exploit vector that Microsoft had issued a “Critical” patch for (MS17-010) two months before on March 14, 2017. The ransomware attack infected over 75,000 users in over 99 countries, using 20 different languages to demand money from users. The attack affected Telefónica and several other large companies in Spain, as well as parts of the British National Health Service (NHS),[85] FedEx, Deutsche Bahn, as well as the Russian Interior Ministry and Russian telecom MegaFon.[86]

Mitigation

As with other forms of malware, security software might not detect a ransomware payload, or, especially in the case of encrypting payloads, only after encryption is under way or complete, particularly if a new version unknown to the protective software is distributed.[87] If an attack is suspected or detected in its early stages, it takes some time for encryption to take place; immediate removal of the malware (a relatively simple process) before it has completed would stop further damage to data, without salvaging any already lost.[88][89]

Alternately, new categories of security software, specifically deception technology, can detect ransomware without using a signature-based approach. Deception technology utilizes fake SMB shares which surround real IT assets. These fake SMB data shares deceive ransomware, tie the ransomware up encrypting these false SMB data shares, alert and notify cyber security teams which can then shut down the attack and return the organization to normal operations. There are multiple vendors[90] that support this capability with multiple announcements in 2016.[91]

Security experts have suggested precautionary measures for dealing with ransomware. Using software or other security policies to block known payloads from launching will help to prevent infection, but will not protect against all attacks. Keeping “offline” backups of data stored in locations inaccessible to the infected computer, such as external storage drives, prevents them from being accessed by the ransomware, thus accelerating data restoration.[23][92]

There are a number of tools intended specifically to decrypt files locked by ransomware, although successful recovery may not be possible.[2][93] If the same encryption key is used for all files, decryption tools use files for which there are both uncorrupted backups (plaintext in the jargon of cryptanalysis) and encrypted copies; recovery of the key, if it is possible, may take several days.[94]

See also

References

WannaCry ransomware attack

From Wikipedia, the free encyclopedia
WannaCry ransomware attack
Wana Decrypt0r screenshot.png

Screenshot of the ransom note left on an infected system
Date 12 May 2017 (ongoing)
Location Worldwide
Also known as WannaCrypt, WanaCrypt0r
Type Cyber-attack
Theme Ransomware encrypting hard disk with $300 demand
Cause EternalBlue exploit
Participants Unknown
Outcome More than 230,000 computers infected[1]

WannaCry, also known by the names WannaCrypt,[2] WanaCrypt0r 2.0,[3] Wanna Decryptor[4] and other similar names, is a ransomware program targeting Microsoft Windows. In May 2017, a large cyber-attack using it was launched, infecting over 230,000 computers in 99 countries, demanding ransom payments in bitcoin in 28 languages. The attack has been described by Europol as unprecedented in scale.[5]

The attack affected Telefónica and several other large companies in Spain, as well as parts of Britain’s National Health Service (NHS),[6] FedEx and Deutsche Bahn.[7][8][9] Other targets in at least 99 countries were also reported to have been attacked around the same time.[10][11]

WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency[12][13] to attack computers running Microsoft Windows operating systems.[3][14] Although a patch to remove the underlying vulnerability had been issued on 14 March 2017,[15] delays in applying security updates left some users and organisations vulnerable.[16] Microsoft has taken the unusual step of releasing updates for the unsupported Windows XP and Windows Server 2003 and patches for Windows 8 operating systems.[2][17]

A kill switch has been found in the code, which prevents new infections. This has been activated by researchers and should slow or stop the spread. However, different versions of the attack may be released and all vulnerable systems still have an urgent need to be patched.

Background

The purported infection vector, EternalBlue, was released by the hacker group The Shadow Brokers on 14 April 2017,[18][19] along with other tools apparently leaked from Equation Group, which is believed to be part of the United States National Security Agency.[20][21]

EternalBlue exploits vulnerability MS17-010[15] in Microsoft‘s implementation of the Server Message Block (SMB) protocol. Microsoft had released a “Critical” advisory, along with an update patch to plug the vulnerability a month before, on 14 March 2017.[15] This patch only fixed Windows Vista and later operating systems but not the older Windows XP.

Countries initially affected[22]

On 12 May 2017, WannaCry began affecting computers worldwide.[23] After gaining access to the computers, via local area network (LAN), an email attachment, or drive-by download, the ransomware encrypts the computer’s hard disk drive,[24][25] then attempts to exploit the SMB vulnerability to spread to random computers on the Internet,[26] and “laterally” between computers on the same LAN.[27] As with other modern ransomware, the payload displays a message informing the user that files have been encrypted, and demands a payment of $300 in bitcoin within three days.

The Windows vulnerability is not a zero-day flaw, but one for which Microsoft had made available a security patch on 14 March 2017,[15] nearly two months before the attack. The patch was to the Server Message Block (SMB) protocol used by Windows.[28] Organizations that lacked this security patch were affected for this reason, although there is so far no evidence that any were specifically targeted by the ransomware developers.[28] Any organization still running the older Windows XP[29] were at particularly high risk because until 13 May,[2] no security patches had been released since April 2014.[30] Following the attack, Microsoft released a security patch for Windows XP.[2]

According to Wired, affected systems will also have had the DOUBLEPULSAR backdoor installed; this will also need to be removed when systems are cleaned up.[31]

Impact

The ransomware campaign was unprecedented in scale according to Europol.[5] The attack affected many NHS hospitals in the UK.[32] On 12 May, some NHS services had to turn away non-critical emergencies, and some ambulances were diverted.[7][33] In 2016, thousands of computers in 42 separate NHS trusts in England were reported to be still running Windows XP.[29]Nissan Motor Manufacturing UK in Tyne and Wear, one of Europe‘s most productive car manufacturing plants, halted production after the ransomware infected some of their systems. Renault also stopped production at several sites in an attempt to stop the spread of the ransomware.[34][35]

List of affected organizations

Response

Several hours after the initial release of the ransomware on 12 May 2017, a “kill switch” hardcoded into the malware was discovered. This allowed the spread of the initial infection to be halted by registering a domain name.[52] However, the kill switch appears to be a coding mistake on the part of the criminals, and variants without the kill switch are expected to be created.[53][54]

Reactions

Upon learning about the impact on the NHS, Edward Snowden said that if the NSA “had privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, [the attack] may not have happened”.[55]

British Prime Minister Theresa May said of the ransomware, “This is not targeted at the NHS. It is an international attack. A number of countries and organizations have been affected.”[56]

Microsoft has created security patches for its now-unsupported versions of Windows, including Windows XP, Windows 8 and Windows Server 2003.[57]

See also

___

Story 2: American People Demand Congress Appoint Special Prosecutor — Investigate Obama’s Administration Use of Intelligence Community  (NSA, CIA, FBI, …) Warrantless Surveillance of Both Democrat and Republican Presidential Candidates — The Use Intelligence Information For Political Purposes Is A Felony! — Videos

Were senators under surveillance by Obama administration?

Obama Might have Spied on Rand Paul and Other Republicans

Tucker Carlson : Did Obama Admin Spy On President Trump’s Team “Compelling Evidence Revealed”

Trump slams Susan Rice over refusal to testify

What is the status of the Susan Rice investigation?

Sen Rand Paul Destroys Morning Joe Panel Over Trump Spying Allegations

Dr. Gorka: Susan Rice controversy more than ‘just smoke’

David Bossie: These are criminal acts by Susan Rice

Where does the Susan Rice story go from here?

Byron York reacts to Clapper denying wiretap of Trump

White House asks Congress to investigate Obama 5 Mar 2017

White House Asks Congress To Investigate Wiretap Claim – America’s Newsroom

Multiple Felonies Committed By Obama Admin. Obama Surveillance on Trump.

Obama stopped FBI from revealing russia probe, so surveillance of Trump could continue in 2016/2017

Surveillance Confirmed Of President Trump. Obama spied on Trump. where is the arrest?

FIRING: HERRIDGE FINDS NAIL IN COMEY COFFIN

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-893

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 832, February 6, 2017, Story 1: Climate Gate 2: National Oceanic and Atmospheric Administration (NOAA) Exaggerated Global Warming Duping Nations To Waste Billions — Government Funded Junk Science Wasted American People’s Tax Payments — Videos — Story 2: President Trump Did Not Fall For Fraud of Global Warming — Wants Clean Air and Water — Videos

Posted on February 6, 2017. Filed under: American History, Biology, Blogroll, Breaking News, Bribery, Business, Chemistry, Climate Change, Communications, Computer, Computers, Congress, Corruption, Crime, Culture, Disasters, Energy, European History, Free Trade, Freedom of Speech, Geology, History, House of Representatives, Investments, Law, News, Philosophy, Photos, Politics, Science, Security, Senate, Software, United States of America, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017 

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017 

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10,  2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

Story 1: Climate Gate 2: National Oceanic and Atmospheric Administration (NOAA) Exaggerated Global Warming Duping Nations To Waste Billions — Corrupt Government Funded Junk Science Wasted American People’s Tax Payments — Videos

Image result for cartoons climate gate 2

Image result for cartoons climate gate 2

Image result for cartoons climate gate 2

ClimateGate 2.0: World Leaders Duped Into Investing Billions Over Manipulated Global Warming Data

Climate Fraud – NOAA’s Global Temperature Dataset

ClimateGate 2 NOAA Whistleblower Claims World Leaders Fooled By Fake Global Warming Data

EXPOSED Govt Climate Change Data 100% Fabricated by NOAA YouTube

John Christy on The Economics and Politics of Climate Change

John Christy on The Economics and Politics of Climate Change

Mark Steyn – The Fraudulent Hockey Stick – 10th ICCC

NOAA CLIMATE HOAXERS EXPOSED BY WHISTLEBLOWERS

Globale Climate HOAX-Global Climate Change Scam -Proof-

Climate Change: What Do Scientists Say?

What They Haven’t Told You about Climate Change

Climate Change: What’s So Alarming?

The Truth about CO2

The Paris Climate Agreement Won’t Change the Climate

Do 97% of Climate Scientists Really Agree?

Dr. Roy Spencer debunks the 97% IPCC Climate Global Warming Consensus

Professor Bob Carter – The Faux “97% Consensus” – 10th ICCC

MIT Professor Richard Lindzen On the Corruption of Climate Science

MIT Climatologist Richard Lindzen on the Politics of Global Warming

Nobel Laureate in Physics; “Global Warming is Pseudoscience”

Freeman Dyson on the Global Warming Hysteria April, 2015

What’s the Real Agenda Behind Climate Change Alarmism?

Climate Change in 12 Minutes – The Skeptic’s Case

Dr David Evans: Global Warming is Manmade? (1 of 2)

Dr David Evans: Global Warming is Manmade? (2 of 2)

Global Warming Skeptic Bell: CO2 Hoax Biggest Climate Change Lie

How the Global Warming Scare Began

George Carlin on Global Warming

Climategate 2: Heating data exaggerated by NOAA

Another Climategate? Now a whistleblower says the world’s leading source of climate data  exaggerated global warming to influence the historic Paris Agreement on climate change.

The NOAA allegedly fiddled data to falsely claim there was no ‘pause’ or ‘slowdown’ in global warming since 1998.

David Rose of the Mail on Sunday:

A high-level whistleblower has told this newspaper that America’s National Oceanic and Atmospheric Administration (NOAA) breached its own rules on scientific integrity when it published the sensational but flawed report, aimed at making the maximum possible impact on world leaders including Barack Obama and David Cameron at the UN climate conference in Paris in 2015.

The report claimed that the ‘pause’ or ‘slowdown’ in global warming in the period since 1998 – revealed by UN scientists in 2013 – never existed, and that world temperatures had been rising faster than scientists expected. Launched by NOAA with a public relations fanfare, it was splashed across the world’s media, and cited repeatedly by politicians and policy makers.

But the whistleblower, Dr John Bates, a top NOAA scientist with an impeccable reputation, has shown The Mail on Sunday irrefutable evidence that the paper was based on misleading, ‘unverified’ data.

It was never subjected to NOAA’s rigorous internal evaluation process – which Dr Bates devised…

In an exclusive interview, Dr Bates accused the lead author of the paper, Thomas Karl, who was until last year director of the NOAA section that produces climate data – the National Centers for Environmental Information (NCEI) – of ‘insisting on decisions and scientific choices that maximised warming and minimised documentation… in an effort to discredit the notion of a global warming pause, rushed so that he could time publication to influence national and international deliberations on climate policy’.

Dr Bates was one of two Principal Scientists at NCEI, based in Asheville, North Carolina.

Official delegations from America, Britain and the EU were strongly influenced by the flawed NOAA study as they hammered out the Paris Agreement – and committed advanced nations to sweeping reductions in their use of fossil fuel and to spending £80 billion every year on new, climate-related aid projects…

NOAA’s 2015 ‘Pausebuster’ paper was based on two new temperature sets of data – one containing measurements of temperatures at the planet’s surface on land, the other at the surface of the seas.

Both datasets were flawed. This newspaper has learnt that NOAA has now decided that the sea dataset will have to be replaced and substantially revised just 18 months after it was issued, because it used unreliable methods which overstated the speed of warming. The revised data will show both lower temperatures and a slower rate in the recent warming trend.

The land temperature dataset used by the study was afflicted by devastating bugs in its software that rendered its findings ‘unstable’… A final, approved version has still not been issued…

The sea dataset used by Thomas Karl and his colleagues – known as Extended Reconstructed Sea Surface Temperatures version 4, or ERSSTv4, tripled the warming trend over the sea during the years 2000 to 2014 from just 0.036C per decade – as stated in version 3 – to 0.099C per decade. Individual measurements in some parts of the globe had increased by about 0.1C and this resulted in the dramatic increase of the overall global trend published by the Pausebuster paper. But Dr Bates said this increase in temperatures was achieved by dubious means. Its key error was an upwards ‘adjustment’ of readings from fixed and floating buoys, which are generally reliable, to bring them into line with readings from a much more doubtful source – water taken in by ships. This, Dr Bates explained, has long been known to be questionable: ships are themselves sources of heat, readings will vary from ship to ship, and the depth of water intake will vary according to how heavily a ship is laden – so affecting temperature readings.Dr Bates said: ‘They had good data from buoys. And they threw it out and “corrected” it by using the bad data from ships. You never change good data to agree with bad, but that’s what they did – so as to make it look as if the sea was warmer.’

ERSSTv4 ‘adjusted’ buoy readings up by 0.12C. It also ignored data from satellites that measure the temperature of the lower atmosphere, which are also considered reliable…

NOAA not only failed, but it effectively mounted a cover-up when challenged over its data. After the paper was published, the US House of Representatives Science Committee launched an inquiry into its Pausebuster claims. NOAA refused to comply with subpoenas demanding internal emails from the committee chairman, the Texas Republican Lamar Smith, and falsely claimed that no one had raised concerns about the paper internally.

There is too much money and pride invested in the global warming scare for us to trust the institutions promoting it. But the dud predictions alone should warn you that many of the “experts” are guilty of gross exaggerations, to say the very least.

(Thanks to many readers.)

http://www.heraldsun.com.au/blogs/andrew-bolt/climategate-2-heating-data-exaggerated-by-noaa/news-story/5081f9858ca53e43b9431fca453b4d54

Exposed: How world leaders were duped into investing billions over manipulated global warming data

  • The Mail on Sunday can reveal a landmark paper exaggerated global warming
  • It was rushed through and timed to influence the Paris agreement on climate change
  • America’s National Oceanic and Atmospheric Administration broke its own rules
  • The report claimed the pause in global warming never existed, but it was based on misleading, ‘unverified’ data

Data Science,Climate and satellites Consultant John J Bates, who blew the whistle to the Mail on Sunday

Data Science,Climate and satellites Consultant John J Bates, who blew the whistle to the Mail on Sunday

The Mail on Sunday today reveals astonishing evidence that the organisation that is the world’s leading source of climate data rushed to publish a landmark paper that exaggerated global warming and was timed to influence the historic Paris Agreement on climate change.

A high-level whistleblower has told this newspaper that America’s National Oceanic and Atmospheric Administration (NOAA) breached its own rules on scientific integrity when it published the sensational but flawed report, aimed at making the maximum possible impact on world leaders including Barack Obama and David Cameron at the UN climate conference in Paris in 2015.

The report claimed that the ‘pause’ or ‘slowdown’ in global warming in the period since 1998 – revealed by UN scientists in 2013 – never existed, and that world temperatures had been rising faster than scientists expected. Launched by NOAA with a public relations fanfare, it was splashed across the world’s media, and cited repeatedly by politicians and policy makers.

But the whistleblower, Dr John Bates, a top NOAA scientist with an impeccable reputation, has shown The Mail on Sunday irrefutable evidence that the paper was based on misleading, ‘unverified’ data.

It was never subjected to NOAA’s rigorous internal evaluation process – which Dr Bates devised.

His vehement objections to the publication of the faulty data were overridden by his NOAA superiors in what he describes as a ‘blatant attempt to intensify the impact’ of what became known as the Pausebuster paper.

His disclosures are likely to stiffen President Trump’s determination to enact his pledges to reverse his predecessor’s ‘green’ policies, and to withdraw from the Paris deal – so triggering an intense political row.

Canadian Prime Minister Justin Trudeau, Microsoft CEO Bill Gates, US President Barack Obama, French President Francois Hollande and Indian Prime Minister Narendra Modi at the world climate change conference

Canadian Prime Minister Justin Trudeau, Microsoft CEO Bill Gates, US President Barack Obama, French President Francois Hollande and Indian Prime Minister Narendra Modi at the world climate change conference

The PM, the Prince and 'the pause': David Cameron and Prince Charles attended the historic 2015 Paris climate change conference with 150 world leaders. Cameron committed Britain to an EU-Wide emission cut as a result. And Charles, writing in this paper last month, stated there was no pause in global warming, influenced by the flawed NOAA paper that made this claim

The PM, the Prince and ‘the pause’: David Cameron and Prince Charles attended the historic 2015 Paris climate change conference with 150 world leaders. Cameron committed Britain to an EU-Wide emission cut as a result. And Charles, writing in this paper last month, stated there was no pause in global warming, influenced by the flawed NOAA paper that made this claim

In an exclusive interview, Dr Bates accused the lead author of the paper, Thomas Karl, who was until last year director of the NOAA section that produces climate data – the National Centers for Environmental Information (NCEI) – of ‘insisting on decisions and scientific choices that maximised warming and minimised documentation… in an effort to discredit the notion of a global warming pause, rushed so that he could time publication to influence national and international deliberations on climate policy’.

Dr Bates was one of two Principal Scientists at NCEI, based in Asheville, North Carolina.

A blatant attempt to intensify paper’s impact

Official delegations from America, Britain and the EU were strongly influenced by the flawed NOAA study as they hammered out the Paris Agreement – and committed advanced nations to sweeping reductions in their use of fossil fuel and to spending £80 billion every year on new, climate-related aid projects.

The scandal has disturbing echoes of the ‘Climategate’ affair which broke shortly before the UN climate summit in 2009, when the leak of thousands of emails between climate scientists suggested they had manipulated and hidden data. Some were British experts at the influential Climatic Research Unit at the University of East Anglia.

LED TO THESE GREEN COMMITMENTS

Data published by NOAA, the world’s top climate data agency, claimed global warming was worse than previously thought. The information was published to coincide with the Paris climate change conference in 2015, where world leaders agreed that…

$100bn be given every year in extra ‘climate-related’ aid to the developing world by rich nations

2 degrees C be set as the limit for maximum temperature rise above pre-industrial times

40% of CO2 emissions would be cut across the EU by 2030

£320bn… what the UK’s pledges will cost our economy by 2030

NOAA’s 2015 ‘Pausebuster’ paper was based on two new temperature sets of data – one containing measurements of temperatures at the planet’s surface on land, the other at the surface of the seas.

Both datasets were flawed. This newspaper has learnt that NOAA has now decided that the sea dataset will have to be replaced and substantially revised just 18 months after it was issued, because it used unreliable methods which overstated the speed of warming. The revised data will show both lower temperatures and a slower rate in the recent warming trend.

The land temperature dataset used by the study was afflicted by devastating bugs in its software that rendered its findings ‘unstable’.

The paper relied on a preliminary, ‘alpha’ version of the data which was never approved or verified.

A final, approved version has still not been issued. None of the data on which the paper was based was properly ‘archived’ – a mandatory requirement meant to ensure that raw data and the software used to process it is accessible to other scientists, so they can verify NOAA results.

Dr Bates retired from NOAA at the end of last year after a 40-year career in meteorology and climate science. As recently as 2014, the Obama administration awarded him a special gold medal for his work in setting new, supposedly binding standards ‘to produce and preserve climate data records’.

Yet when it came to the paper timed to influence the Paris conference, Dr Bates said, these standards were flagrantly ignored.

The paper was published in June 2015 by the journal Science. Entitled ‘Possible artifacts of data biases in the recent global surface warming hiatus’, the document said the widely reported ‘pause’ or ‘slowdown’ was a myth.

Less than two years earlier, a blockbuster report from the UN Intergovernmental Panel on Climate Change (IPCC), which drew on the work of hundreds of scientists around the world, had found ‘a much smaller increasing trend over the past 15 years 1998-2012 than over the past 30 to 60 years’. Explaining the pause became a key issue for climate science. It was seized on by global warming sceptics, because the level of CO2 in the atmosphere had continued to rise.

WHY OBAMA’S GREEN GURU WILL MAKE TRUMP SEE RED

NOAA’s climate boss Thomas Karl, below left, had a hotline to the White House, through his long association with President Obama’s science adviser, John Holdren.

Karl’s ‘Pausebuster’ paper was hugely influential in dictating the world agreement in Paris and sweeping US emissions cuts. President Trump, above right, has pledged to scrap both policies – triggering furious claims by Democrats he is a climate ‘denier’ and ‘anti-science’.

Thanks to today’s MoS story, NOAA is set to face an inquiry by the Republican-led House science committee.

Some scientists argued that the existence of the pause meant the world’s climate is less sensitive to greenhouse gases than previously thought, so that future warming would be slower. One of them, Professor Judith Curry, then head of climate science at the Georgia Institute of Technology, said it suggested that computer models used to project future warming were ‘running too hot’.

However, the Pausebuster paper said while the rate of global warming from 1950 to 1999 was 0.113C per decade, the rate from 2000 to 2014 was actually higher, at 0.116C per decade. The IPCC’s claim about the pause, it concluded, ‘was no longer valid’.

The impact was huge and lasting. On publication day, the BBC said the pause in global warming was ‘an illusion caused by inaccurate data’.

One American magazine described the paper as a ‘science bomb’ dropped on sceptics.

Its impact could be seen in this newspaper last month when, writing to launch his Ladybird book about climate change, Prince Charles stated baldly: ‘There isn’t a pause… it is hard to reject the facts on the basis of the evidence.’

Data changed to make the sea appear warmer

The sea dataset used by Thomas Karl and his colleagues – known as Extended Reconstructed Sea Surface Temperatures version 4, or ERSSTv4, tripled the warming trend over the sea during the years 2000 to 2014 from just 0.036C per decade – as stated in version 3 – to 0.099C per decade. Individual measurements in some parts of the globe had increased by about 0.1C and this resulted in the dramatic increase of the overall global trend published by the Pausebuster paper. But Dr Bates said this increase in temperatures was achieved by dubious means. Its key error was an upwards ‘adjustment’ of readings from fixed and floating buoys, which are generally reliable, to bring them into line with readings from a much more doubtful source – water taken in by ships. This, Dr Bates explained, has long been known to be questionable: ships are themselves sources of heat, readings will vary from ship to ship, and the depth of water intake will vary according to how heavily a ship is laden – so affecting temperature readings.

Dr Bates said: ‘They had good data from buoys. And they threw it out and “corrected” it by using the bad data from ships. You never change good data to agree with bad, but that’s what they did – so as to make it look as if the sea was warmer.’

ERSSTv4 ‘adjusted’ buoy readings up by 0.12C. It also ignored data from satellites that measure the temperature of the lower atmosphere, which are also considered reliable. Dr Bates said he gave the paper’s co-authors ‘a hard time’ about this, ‘and they never really justified what they were doing.’

Now, some of those same authors have produced the pending, revised new version of the sea dataset – ERSSTv5. A draft of a document that explains the methods used to generate version 5, and which has been seen by this newspaper, indicates the new version will reverse the flaws in version 4, changing the buoy adjustments and including some satellite data and measurements from a special high-tech floating buoy network known as Argo. As a result, it is certain to show reductions in both absolute temperatures and recent global warming.

The second dataset used by the Pausebuster paper was a new version of NOAA’s land records, known as the Global Historical Climatology Network (GHCN), an analysis over time of temperature readings from about 4,000 weather stations spread across the globe.

The unstable land readings: Scientists at NOAA used land temperature data from 4,000 weather stations (pictured, one in Montana, USA). But the software used to process the figures was bug-ridden and unstable. NOAA also used 'unverified' data that was not tested or approved. This data as merged with unreliable sea surface temperatures

The unstable land readings: Scientists at NOAA used land temperature data from 4,000 weather stations (pictured, one in Montana, USA). But the software used to process the figures was bug-ridden and unstable. NOAA also used ‘unverified’ data that was not tested or approved. This data as merged with unreliable sea surface temperatures

The 'adjusted' sea readings: Average sea surface temperatures are calculated using data from weather buoys (pictured). But NOAA ‘adjusted’ these figures upwards to fit with data taken from ships – which is notoriously unreliable. This exaggerated the warming rate, allowing NOAA to claim in the paper dubbed the ‘Pausebuster’ that there was no ‘pause’

The ‘adjusted’ sea readings: Average sea surface temperatures are calculated using data from weather buoys (pictured). But NOAA ‘adjusted’ these figures upwards to fit with data taken from ships – which is notoriously unreliable. This exaggerated the warming rate, allowing NOAA to claim in the paper dubbed the ‘Pausebuster’ that there was no ‘pause’

This new version found past temperatures had been cooler than previously thought, and recent ones higher – so that the warming trend looked steeper. For the period 2000 to 2014, the paper increased the rate of warming on land from 0.15C to 0.164C per decade.

In the weeks after the Pausebuster paper was published, Dr Bates conducted a one-man investigation into this. His findings were extraordinary. Not only had Mr Karl and his colleagues failed to follow any of the formal procedures required to approve and archive their data, they had used a ‘highly experimental early run’ of a programme that tried to combine two previously separate sets of records.

This had undergone the critical process known as ‘pairwise homogeneity adjustment’, a method of spotting ‘rogue’ readings from individual weather stations by comparing them with others nearby.

However, this process requires extensive, careful checking which was only just beginning, so that the data was not ready for operational use. Now, more than two years after the Pausebuster paper was submitted to Science, the new version of GHCN is still undergoing testing.

Moreover, the GHCN software was afflicted by serious bugs. They caused it to become so ‘unstable’ that every time the raw temperature readings were run through the computer, it gave different results. The new, bug-free version of GHCN has still not been approved and issued. It is, Dr Bates said, ‘significantly different’ from that used by Mr Karl and his co-authors.

Dr Bates revealed that the failure to archive and make available fully documented data not only violated NOAA rules, but also those set down by Science. Before he retired last year, he continued to raise the issue internally. Then came the final bombshell. Dr Bates said: ‘I learned that the computer used to process the software had suffered a complete failure.’

The reason for the failure is unknown, but it means the Pausebuster paper can never be replicated or verified by other scientists.

The flawed conclusions of the Pausebuster paper were widely discussed by delegates at the Paris climate change conference. Mr Karl had a longstanding relationship with President Obama’s chief science adviser, John Holdren, giving him a hotline to the White House.

The red line shows the current NOAA world temperature graph - elevated in recent years due to the ‘adjusted’ sea data. The blue line is the Met Office's independent HadCRUT4 record. Although they are offset in temperature by 0.12°C due to different analysis techniques, they reveal that NOAA has been adjusted and so shows a steeper recent warming trend.

The red line shows the current NOAA world temperature graph – elevated in recent years due to the ‘adjusted’ sea data. The blue line is the Met Office’s independent HadCRUT4 record. Although they are offset in temperature by 0.12°C due to different analysis techniques, they reveal that NOAA has been adjusted and so shows a steeper recent warming trend.

They were forced to correct it: 18 months after the ‘Pausebuster’ paper was published in time for the 2015 Paris climate change conference, NOAA’s flawed sea temperature dataset is to be replaced. The new version will remedy its failings, and use data from both buoys and satellites (pictured) – which some say is the best data of all. The new version will show both lower temperatures and a lower warming trend since 2000

They were forced to correct it: 18 months after the ‘Pausebuster’ paper was published in time for the 2015 Paris climate change conference, NOAA’s flawed sea temperature dataset is to be replaced. The new version will remedy its failings, and use data from both buoys and satellites (pictured) – which some say is the best data of all. The new version will show both lower temperatures and a lower warming trend since 2000

Mr Holdren was also a strong advocate of robust measures to curb emissions. Britain’s then Prime Minister David Cameron claimed at the conference that ‘97 per cent of scientists say climate change is urgent and man-made and must be addressed’ and called for ‘a binding legal mechanism’ to ensure the world got no more than 2C warmer than in pre-industrial times.

President Obama stressed his Clean Power Plan at the conference, which mandates American power stations to make big emissions cuts.

President Trump has since pledged he will scrap it, and to withdraw from the Paris Agreement.

Whatever takes its place, said Dr Bates, ‘there needs to be a fundamental change to the way NOAA deals with data so that people can check and validate scientific results. I’m hoping that this will be a wake-up call to the climate science community – a signal that we have to put in place processes to make sure this kind of crap doesn’t happen again.

‘I want to address the systemic problems. I don’t care whether modifications to the datasets make temperatures go up or down. But I want the observations to speak for themselves, and for that, there needs to be a new emphasis that ethical standards must be maintained.’

He said he decided to speak out after seeing reports in papers including the Washington Post and Forbes magazine claiming that scientists feared the Trump administration would fail to maintain and preserve NOAA’s climate records.

Dr Bates said: ‘How ironic it is that there is now this idea that Trump is going to trash climate data, when key decisions were earlier taken by someone whose responsibility it was to maintain its integrity – and failed.’

NOAA not only failed, but it effectively mounted a cover-up when challenged over its data. After the paper was published, the US House of Representatives Science Committee launched an inquiry into its Pausebuster claims. NOAA refused to comply with subpoenas demanding internal emails from the committee chairman, the Texas Republican Lamar Smith, and falsely claimed that no one had raised concerns about the paper internally.

Last night Mr Smith thanked Dr Bates ‘for courageously stepping forward to tell the truth about NOAA’s senior officials playing fast and loose with the data in order to meet a politically predetermined conclusion’. He added: ‘The Karl study used flawed data, was rushed to publication in an effort to support the President’s climate change agenda, and ignored NOAA’s own standards for scientific study.’

Professor Curry, now the president of the Climate Forecast Applications Network, said last night: ‘Large adjustments to the raw data, and substantial changes in successive dataset versions, imply substantial uncertainties.’

It was time, she said, that politicians and policymakers took these uncertainties on board.

Last night Mr Karl admitted the data had not been archived when the paper was published. Asked why he had not waited, he said: ‘John Bates is talking about a formal process that takes a long time.’ He denied he was rushing to get the paper out in time for Paris, saying: ‘There was no discussion about Paris.’

They played fast and loose with the figures

He also admitted that the final, approved and ‘operational’ edition of the GHCN land data would be ‘different’ from that used in the paper’.

As for the ERSSTv4 sea dataset, he claimed it was other records – such as the UK Met Office’s – which were wrong, because they understated global warming and were ‘biased too low’. Jeremy Berg, Science’s editor-in-chief, said: ‘Dr Bates raises some serious concerns. After the results of any appropriate investigations… we will consider our options.’ He said that ‘could include retracting that paper’.NOAA declined to comment.

It’s not the first time we’ve exposed dodgy climate data, which is why we’ve dubbed it: Climate Gate 2

Helena Christensen addresses demonstrators in the center of Copenhagen on climate change

Helena Christensen addresses demonstrators in the center of Copenhagen on climate change

Dr John Bates’s disclosures about the manipulation of data behind the ‘Pausebuster’ paper is the biggest scientific scandal since ‘Climategate’ in 2009 when, as this paper reported, thousands of leaked emails revealed scientists were trying to block access to data, and using a ‘trick’ to conceal embarrassing flaws in their claims about global warming.

Both scandals suggest a lack of transparency and, according to Dr Bates, a failure to observe proper ethical standards.

Because of NOAA ’s failure to ‘archive’ data used in the paper, its results can never be verified.

Like Climategate, this scandal is likely to reverberate around the world, and reignite some of science’s most hotly contested debates.

Blowing up the graph show is disappears in 1961 artfully hidden behind the other colours
The reason? Because this is what it shows after 1961, a dramatic decline in global temperatures

Left, blowing up the graph show is disappears in 1961 artfully hidden behind the other colours. Right, the reason? Because this is what it shows after 1961, a dramatic decline in global temperatures

Has there been an unexpected pause in global warming? If so, is the world less sensitive to carbon dioxide than climate computer models suggest?

And does this mean that truly dangerous global warming is less imminent, and that politicians’ repeated calls for immediate ‘urgent action’ to curb emissions are exaggerated?

http://www.dailymail.co.uk/sciencetech/article-4192182/World-leaders-duped-manipulated-global-warming-data.html#ixzz4XxmGV4sY

 

Story 2: President Trump Did Not Fall For Fraud of Global Warming — Wants Clean Air and Water — Videos

Donald Trump on Climate Change

Donald Trump is not a believer in global warming

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 827-831

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 792, November 8, 2016, Story 1:  It’s All Over Now — You Can’t Always Get What You Want and  — You Get What You Need– A Leader: President Elect Donald J. Trump — We Are The Champions — Another One Bites the Dust — Americans Love a Winner — Videos

Posted on November 8, 2016. Filed under: 2016 Presidential Candidates, American History, Art, Benghazi, Blogroll, Breaking News, Budgetary Policy, Business, College, Communications, Computer, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Empires, Employment, Fast and Furious, Fiscal Policy, Government, Government Spending, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Illegal Immigration, Illegal Immigration, Immigration, Iran Nuclear Weapons Deal, IRS, Law, Legal Immigration, Life, Media, Movies, Music, News, Obama, Philosophy, Photos, Politics, Polls, Progressives, Raymond Thomas Pronk, Scandals, Science, Senate, Success, Tax Policy, Terror, Terrorism, Unemployment, United States of America, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

Pronk Pops Show 787: October 31, 2016

Pronk Pops Show 786: October 28, 2016

Pronk Pops Show 785: October 27, 2016

Pronk Pops Show 784: October 26, 2016 

Pronk Pops Show 783: October 25, 2016

Pronk Pops Show 782: October 24, 2016

Pronk Pops Show 781: October 21, 2016

Pronk Pops Show 780: October 20, 2016

Pronk Pops Show 779: October 19, 2016

Pronk Pops Show 778: October 18, 2016

Pronk Pops Show 777: October 17, 2016

Pronk Pops Show 776: October 14, 2016

Pronk Pops Show 775: October 13, 2016

Pronk Pops Show 774: October 12, 2016

Pronk Pops Show 773: October 11, 2016

Pronk Pops Show 772: October 10, 2016

Pronk Pops Show 771: October 7, 2016

Pronk Pops Show 770: October 6, 2016

Pronk Pops Show 769: October 5, 2016 

Pronk Pops Show 768: October 3, 2016

Pronk Pops Show 767: September 30, 2016

Pronk Pops Show 766: September 29, 2016

Pronk Pops Show 765: September 28, 2016

Pronk Pops Show 764: September 27, 2016

Pronk Pops Show 763: September 26, 2016

Pronk Pops Show 762: September 23, 2016

Pronk Pops Show 761: September 22, 2016

Pronk Pops Show 760: September 21, 2016

Pronk Pops Show 759: September 20, 2016

Pronk Pops Show 758: September 19, 2016

Pronk Pops Show 757: September 16, 2016

Pronk Pops Show 756: September 15, 2016

Pronk Pops Show 755: September 14, 2016

Pronk Pops Show 754: September 13, 2016

Pronk Pops Show 753: September 12, 2016

Pronk Pops Show 752: September 9, 2016

Pronk Pops Show 751: September 8, 2016

Pronk Pops Show 750: September 7, 2016

Pronk Pops Show 749: September 2, 2016

Pronk Pops Show 748: September 1, 2016

Pronk Pops Show 747: August 31, 2016

Pronk Pops Show 746: August 30, 2016

Pronk Pops Show 745: August 29, 2016

Pronk Pops Show 744: August 26, 2016

Pronk Pops Show 743: August 25, 2016

Pronk Pops Show 742: August 24, 2016

Pronk Pops Show 741: August 23, 2016

Pronk Pops Show 740: August 22, 2016

Pronk Pops Show 739: August 18, 2016

Pronk Pops Show 738: August 17, 2016

Pronk Pops Show 737: August 16, 2016

Pronk Pops Show 736: August 15, 2016

Pronk Pops Show 735: August 12, 2016

Pronk Pops Show 734: August 11, 2016

Pronk Pops Show 733: August 9, 2016

Pronk Pops Show 732: August 8, 2016

Pronk Pops Show 731: August 4, 2016

Pronk Pops Show 730: August 3, 2016

Pronk Pops Show 729: August 1, 2016

Story 1:  It’s All Over Now — You Can’t Always Get What You Want and  — You Get What You Need– A Leader:  President Elect Donald J. Trump — We Are The Champions — Another One Bites the Dust — Americans Love a Winner — Videos

Image result for images donald trump and freddie mercury we are the championsImage result for images donald trump you get what you need

Image result for cartoons wins is president of united states

Image result for cartoons on trump victory president elect

Image result for cartoons trump wins

Image result for cartoons president trump

Image result for cartoons president trump

Image result for cartoons wins is president of united statesImage result for trump victory speechImage result for trump victory speechImage result for trump victory speechImage result for trump victory speechImage result for trump victory speech

The Green Papers: 2016 General Election

Donald John Trump, Sr. 290 59,587,143 47.51% American Independent,
Conservative,
Republican
51 (538) 538
Hillary Diane Rodham Clinton 228 59,790,479 47.67% Democratic,
Democratic-Farmer Labor,
Democratic-Nonpartisan League,
Women’s Equality,
Working Families
51 (538) 538

Gary Earl Johnson 4,048,436 3.23% (party left blank on ballot),
Independence,
Independent,
Libertarian
51 (538) 538

Jill E. Stein 1,208,917 0.96% By Petition,
D.C. Statehood Green,
Green,
Green Independent,
Green-Rainbow,
Independent,
Mountain,
Pacific Green,
Progressive,
Unaffiliated,
Write-in
45 (480) 3 (42) 522

    • 82 parties (or designations) running candidates for the Presidency

(Candidates may run under the banner of multiple parties. Hence, the number of parties may be greater than the number of candidates.)

Donald Trump’s acceptance speech after winning the 2016 Presidential election

Hillary Clinton FULL Concession Speech | Election 2016

LIVESTREAM: Election 2016 FULL Results Donald Trump WINS Florida, North Carolina, Ohio

LIVE Stream: Donald J. Trump Victory Party 11/8/16

Donald Trump wins Ohio, CNN projects

Donald Trump FULL SPEECH at FINAL Rally With Mike Pence

Queen – We Are The Champions (Official Video)

QUEEN LYRICS

“We Are The Champions”

I’ve paid my dues
Time after time.
I’ve done my sentence
But committed no crime.
And bad mistakes ‒
I’ve made a few.
I’ve had my share of sand kicked in my face
But I’ve come through.

(And I need just go on and on, and on, and on)

We are the champions, my friends,
And we’ll keep on fighting ’til the end.
We are the champions.
We are the champions.
No time for losers
‘Cause we are the champions of the world.

I’ve taken my bows
And my curtain calls.
You brought me fame and fortune, and everything that goes with it.
I thank you all.
But it’s been no bed of roses,
No pleasure cruise.
I consider it a challenge before the whole human race,
And I ain’t gonna lose.

(And I need just go on and on, and on, and on)

We are the champions, my friends,
And we’ll keep on fighting ’til the end.
We are the champions.
We are the champions.
No time for losers
‘Cause we are the champions of the world.

We are the champions, my friends,
And we’ll keep on fighting ’til the end.
We are the champions.
We are the champions.
No time for losers
‘Cause we are the champions.

Queen – Another One Bites the Dust (Official Video)

Another One Bites the Dust

Queen

Steve walks warily down the street,
With the brim pulled way down low
Ain’t no sound but the sound of his feet,
Machine guns ready to go
Are you ready,
Are you ready for this
Are you hanging on the edge of your seat
Out of the doorway the bullets rip
To the sound of the beat
Another one bites the dust
Another one bites the dust
And another one gone, and another one gone
Another one bites the dust
Hey, I’m gonna get you too
Another one bites the dust
How do you think I’m going to get along,
Without you, when you’re gone
You took me for everything that I had,
And kicked me out on my own
Are you happy, are you satisfied
How long can you stand the heat
Out of the doorway the bullets rip
To the sound of the beat
Another one bites the dust
Another one bites the dust
And another one gone, and another one gone
Another one bites the dust
Hey, I’m gonna get you too
Another one bites the dust
Another one bites the dust
Another one bites the dust
Another one bites the dust
Another one bites the dust
There are plenty of ways you can hurt a man
And bring him to the ground
You can beat him
You can cheat him
You can treat him bad and leave him
When he’s down
But I’m ready, yes I’m ready for you
I’m standing on my own two feet
Out of the doorway the bullets rip
Repeating the sound of the beat
Another one bites the dust
Another one bites the dust
And another one gone, and another one gone
Another one bites the dust
Hey, I’m gonna get you too
Another one bites the dust

Americans Love a Winner

The Rolling Stones – You Can’t Always Get What You Want (TV Show ’69)

The Rolling Stones – You Can’t Always Get What You Want (Live) – OFFICIAL

Rolling Stones – It’s All Over Now (stereo)

The Rolling Stones – Ruby Tuesday (Live) – Official 1991

The Beatles – I’m a Loser

Janis Joplin – Cry Baby (Live)

Queen’s Brian May Does Not Approve of Donald Trump’s Use of “We Are the Champions”

Queen's Brian May Does Not Approve of Donald Trump's Use of

In what some would consider some truly horrifying News of the World, Donald Trump celebrated winning the last wave of U.S. Republican primaries last night (June 7) by walking into a speech backed by Queen’s iconic victory anthem, “We Are the Champions.” Trouble is, the nomination has yet to be fully clinched — not to mention the fact that Queen are kind of bummed about having their old tune dragged into Trump’s campaign.

The musical moment happened last night at New York’s Trump National Golf Club, where the presumptive nominee thanked primary voters who pushed him to the top in New Jersey, New Mexico, South Dakota, Montana and California. Shortly after Trump was accompanied by Queen’s recording of “We Are the Champions,” from 1977’s News of the World, guitarist Brian May made an announcement through his personal webpage that he definitely didn’t give Drumpf the thumbs up to blast the track.

“I’ve had an avalanche of complaints – some of which you can see in our ‘Letters’ page – about Donald Trump using our ‘We Are The Champions’ track as his ‘theme’ song on USA TV,” May wrote.

May added that he was speaking for himself, not the rest of the surviving members of Queen, but further noted that the outfit have long distanced themselves from contributing music to political campaigns. Long story short, Trump shouldn’t have used the late Freddie Mercury’s rally cry on the epic anthem to boost his own cause.

“This is not an official Queen statement, but I can confirm that permission to use the track was neither sought nor given. We are taking advice on what steps we can take to ensure this use does not continue. Regardless of our views on Mr Trump’s platform, it has always been against our policy to allow Queen music to be used as a political campaigning tool. Our music embodies our own dreams and beliefs, but it is for all who care to listen and enjoy.”

Trump has been blasted for using songs without permission before. Last year, R.E.M. told the potential-POTUS to stop using their music in his “moronic charade of a campaign,” while Neil Young had also been involved in a back-and-forth beef over Trump using his “Rockin’ in the Free World.” They later reconciled, with Young allowing Trump to use the tune, despite being at odds with his personal politics.

http://exclaim.ca/music/article/queens_brian_may_doesnt_endorse_donald_trumps_use_of_we_are_the_champions

Rock Legends Pull the Plug on Trump Using ‘We Are The Champions’

 Brian May and Donald Trump

Brian May and Donald Trump | Photo: AFP-Reuters

Published 9 June 2016
Queen joins a long list of artists who have refused to allow Trump to use their music, including the Rolling Stones, Neil Young, R. E. M. and Adele.

The iconic British rock group Queen is trying to stop Donald Trump from using their hit song “We Are The Champions,” lead guitarist Brian May revealed Thursday

RELATED:
Adele is Really, Really Mad at Donald Trump and Here’s Why

The rock star said property tycoon Trump, the presumptive Republican nominee in the U.S. presidential elections, was using the song without permission.

May, 68, said he had received an “avalanche of complaints” about Trump using the anthem during a speech he gave Tuesday.

“Permission to use the track was neither sought nor given. We are taking advice on what steps we can take to ensure this use does not continue,” May wrote on his website.

“It has always been against our policy to allow Queen music to be used as a political campaigning tool.

“Our music embodies our own dreams and beliefs, but it is for all who care to listen and enjoy.”

“We Are The Champions” was written by the group’s late lead singer Freddie Mercury in 1977 and is an enduring celebratory anthem heard at sports events.


Queen join a long list of artists who have refused to allow Trump to use their music, including the Rolling Stones, Neil Young, R. E. M. and Adele.

REM’s Michael Stipe said, “Go fuck yourselves, the lot of you — you sad, attention-grabbing, power-hungry little men. Do not use our music or my voice for your moronic charade of a campaign,” after Trump played “It’s the End of the World as We Know It (and I Feel Fine)” at a rally.

Lawyers for Aerosmith singer Steven Tyler sent a cease and desist letter to Trump’s campaign, saying that his use of the song “Dream On” gives “the false impression that he is connected with, or endorses Mr. Trump’s presidential bid.”

http://www.telesurtv.net/english/news/Rock-Legends-Pull-the-Plug-on-Trump-Using-We-Are-The-Champions-20160609-0049.html

Donald Trump plays ‘You Can’t Always Get What You Want’ after RNC speech

Donald Trump closed the longest GOP presidential acceptance speech in recent times with the Rolling Stones’ “You Can’t Always Get What You Want.”

Trump has featured the track during his campaign, even drawing the ire of the Rolling Stones earlier this year. “The Rolling Stones have never given permission to the Trump campaign to use their songs and have requested that they cease all use immediately,” a spokesperson for the band said in a statement.

Those words, nor the irony of playing “You Can’t Always Get What You Want” during a Republican National Convention that was often quite divided – on Wednesday, for example, Sen. Ted Cruz (R-Texas) refused to endorse Trump from the stage and was summarily booed – was not lost on viewers. Social media exploded after Trump’s speech as the song played, with many mocking the Republican presidential nominee for the song choice.

http://www.ew.com/article/2016/07/22/donald-trump-you-cant-always-get-what-you-want

Several years ago, Rolling Stones’ frontman Mick Jagger disclosed his feelings about then-candidate Mick Romney on an Saturday Night Live episode. Jagger’s approval rating for Romney was a zero.

Adele’s staff recently pushed back when “Rolling in the Deep” and “Skyfall” were used without permission. When Neil Young complained about “Rockin’ in the Free World” being played at a GOP campaign, Trump shot back calling Young a phoney, as the rocker had asked for money to finance a music project. But apparently, raising funds and supporting a candidate are two separate issues for Neil, according to Time.

“I had gone to Donald’s office and asked him to finance my company. He wasn’t running for president at the time. And I thought maybe trying to rescue the art form of recorded sound would be a great thing for his legacy … So I thought I had a shot. It didn’t work out. But he was very gracious.”

The Republican candidate has also used songs by Elton John, added the Daily Beast. His publicist clarified the iconic Elton’s stance on the issue, but the musician clarified that it was nothing personal. He said he met Trump, who was nice to him, but said their political views greatly differ. John explained that he’s far from being a Republican and made a suggestion.

“Why not ask Ted f***ing Nugent? Or one of those f***king country stars? They’ll do it for you.

 http://www.inquisitr.com/2788458/rolling-stones-message-to-donald-trump-you-cant-always-get-what-you-want/#8XolCKDgFgje8AXd.99

 

Why Pollsters Disagree

A Commentary by Fran Coombs

The ultimate outsider is challenging the ultimate insider, and it’s driving the pollsters crazy.

Democrat Hillary Clinton – first lady of both the state of Arkansas and the United States, U.S. senator from New York, secretary of State and a regular in the global halls of power for more than 20 years. She knows what to say and how to say it. While many question what she has accomplished in any of those positions, there’s no doubt that she’s been there and done things. She represents the status quo, and for many Americans, there is comfort in that.

Republican Donald Trump – brash, brusque billionaire businessman from New York City, used to having his way and paying for it. He says what’s on his mind, often to the despair of his political advisors but to the delight of a usually hostile media. Trump thinks America’s going to hell and is ready to upset the applecart to turn things around. His outbursts – indeed, his entire candidacy – defy conventional political wisdom and have put him at odds with the leadership of his own party who question what he really has in mind. But he has millions of loyal followers across party lines that he has dubbed “a movement.”

Throw in allegations that Clinton is a liar and has mishandled classified information and charges that Trump, too, is a liar and a sexual harasser, and you have the most volatile presidential election in decades.

The polling industry is already struggling with the death of the landline telephone and trying to find new ways to compensate for that loss to achieve demographically balanced voter samples. Along comes the craziest election most of us have ever seen.

Consider that just a month ago, many pollsters were saying the election was already over and that Clinton had won. The three daily tracking polls – the Los Angeles Times, IBD/TIPP and Rasmussen Reports – consistently have shown a much tighter race. We’re the ones who add new voters to the existing mix every day and don’t just swoop in for a two- or three-day sample. But many in the media – perhaps most prominently the New York Times – began preparing for a second Clinton administration as if the voters had already spoken.

Yet despite the release of a damning 11-year-old video showing Trump making uncomfortably graphic comments about women, the race began tightening again, even among the pollsters who had previously declared it over. Then in mid-October, the FBI announced it was reopening the investigation of Clinton’s handling of classified information while secretary of State, and the race really began to close. One major pollster went from showing Clinton with a 12-point lead to a two-point race in just over a week. [The FBI on Sunday closed that case again, choosing to bring no charges against Clinton.]

At the same time, polling in the so-called battleground states was and continues to be all over the place. It’s not uncommon to see Clinton up by seven in a state in one poll, while another pollster shows Trump up by four in the same state. The Real Clear Politics averages meld all this together, but unlike in so many other years, there hasn’t been any consistent pattern among pollsters in most states for weeks.

What makes pollsters come up with different results? We can’t explain the formulas they use, but at Rasmussen Reports our demographics are based on historical trends in previous presidential elections, analysis of the new data we collect (we hear from 10,000 new likely U.S. voters every month) and our own political intuition.

With these factors, Rasmussen Reports’ final White House Watch daily tracking poll released yesterday showed Clinton with a 45% to 43% lead, with a +/- 2.5% margin of error.

Just a slight difference in any of these factors, though, explains the differences in polls. Using the same numbers, for example, if we create a model that shows slightly more GOP turnout among men and older voters, with two percent more whites voting Republican, it’s Trump 45%, Clinton 44%.

Those same numbers crunched through a model that shows a few more younger voters and more women turning out for the Democrats despite slightly less white turnout for Clinton still pushes her to a four-point lead.

Same numbers, slightly different formula, different results. It also highlights why turnout of their key demographic groups is so important to both major parties.

Then there’s the potential silent factor: Are voters even telling pollsters the truth? Seventeen percent (17%) of Likely Republican Voters are less likely this year to let others know how they intend to vote compared to previous presidential campaigns. Ten percent (10%) of Likely Democratic Voters say they are less likely to tell.

Make America Great Again vs. stay the course that President Obama has set. Today’s the showdown.

Fran Coombs is the managing editor of Rasmussen Reports.

http://www.rasmussenreports.com/public_content/politics/commentary_by_fran_coombs/why_pollsters_disagree

2016 US election results
Updated Nov 9, 2016 4:31 PM CST
Donald Trump won the presidency
Electoral vote
Popular vote
Clinton

228

Trump

279

59,795,906 votes59,589,136 votes

270 to win

 

Won

Leads

Swing states
All states
Clinton
Trump
Alabama

9 electoral votes
35%
718,084
63%
1,306,925
Alaska

3 electoral votes
38%
92,013
53%
129,786
Arizona

11 electoral votes
45%
888,374
50%
972,900
Arkansas

6 electoral votes
34%
378,729
60%
677,904
California

55 electoral votes
61%
5,481,885
33%
2,965,704
Colorado

9 electoral votes
47%
1,126,384
45%
1,075,770
Connecticut

7 electoral votes
54%
823,360
42%
637,919
Delaware

3 electoral votes
53%
235,581
42%
185,103
District of Columbia

3 electoral votes
93%
260,223
4%
11,553
Florida

29 electoral votes
48%
4,485,745
49%
4,605,515
Georgia

16 electoral votes
46%
1,837,300
51%
2,068,623
Hawaii

4 electoral votes
62%
266,827
30%
128,815
Idaho

4 electoral votes
28%
189,677
59%
407,199
Illinois

20 electoral votes
55%
2,977,498
39%
2,118,179
Indiana

11 electoral votes
38%
1,029,197
57%
1,555,020
Iowa

6 electoral votes
42%
650,790
52%
798,923
Kansas

6 electoral votes
36%
414,788
57%
656,009
Kentucky

8 electoral votes
33%
628,834
63%
1,202,942
Louisiana

8 electoral votes
38%
779,535
58%
1,178,004
Maine

4 electoral votes
48%
352,485
45%
332,591
Maryland

10 electoral votes
61%
1,497,951
35%
873,646
Massachusetts

11 electoral votes
61%
1,964,433
34%
1,082,521
Michigan

16 electoral votes
47%
2,267,373
48%
2,279,210
Minnesota

10 electoral votes
47%
1,363,755
45%
1,321,014
Mississippi

6 electoral votes
40%
462,250
58%
677,782
Missouri

10 electoral votes
38%
1,054,889
57%
1,585,753
Montana

3 electoral votes
36%
174,249
57%
273,696
Nebraska

5 electoral votes
34%
273,858
60%
485,819
Nevada

6 electoral votes
48%
537,753
46%
511,319
New Hampshire

4 electoral votes
48%
346,816
47%
345,379
New Jersey

14 electoral votes
55%
1,979,768
42%
1,516,915
New Mexico

5 electoral votes
48%
380,724
40%
315,875
New York

29 electoral votes
59%
4,143,541
37%
2,637,678
North Carolina

15 electoral votes
47%
2,162,074
51%
2,339,603
North Dakota

3 electoral votes
28%
93,526
64%
216,133
Ohio

18 electoral votes
44%
2,317,001
52%
2,771,984
Oklahoma

7 electoral votes
29%
419,788
65%
947,934
Oregon

7 electoral votes
52%
919,591
41%
725,090
Pennsylvania

20 electoral votes
48%
2,844,705
49%
2,912,941
Rhode Island

4 electoral votes
55%
225,445
40%
165,810
South Carolina

9 electoral votes
41%
849,469
55%
1,143,611
South Dakota

3 electoral votes
32%
117,442
62%
227,701
Tennessee

11 electoral votes
35%
867,110
61%
1,517,402
Texas

38 electoral votes
43%
3,852,923
53%
4,677,115
Utah

6 electoral votes
28%
222,858
47%
375,006
Vermont

3 electoral votes
61%
178,072
33%
95,027
Virginia

13 electoral votes
50%
1,916,845
45%
1,731,155
Washington

12 electoral votes
56%
1,118,772
38%
750,719
West Virginia

5 electoral votes
26%
187,457
69%
486,198
Wisconsin

10 electoral votes
47%
1,382,210
48%
1,409,467
Wyoming

3 electoral votes
22%
55,949
70%
174,248
Election insights
Check back for new insights as results are updated
Clinton won more counties whereless than 50% of the population is white
83.8%
Clinton
16.2%
Trump
Clinton won more counties where at least 45% of the population is African American
85.0%
Clinton
15.0%
Trump
Donald Trump won Wisconsin, which Mitt Romney lost in 2012
Donald Trump won Pennsylvania, which Mitt Romney lost in 2012
Donald Trump won Iowa, whichMitt Romney lost in 2012
Donald Trump won Florida, which Mitt Romney lost in 2012
Donald Trump won Ohio, whichMitt Romney lost in 2012
Sources: AP, Learn More

US election results: The maps and analysis that explain Donald Trump’s shock victory to become President

US election live results and maps
US election live results and maps in the race between Donald Trump and Hillary Clinton

Donald Trump has pledged to be a president “for all Americans” after being elected the 45th President of the United States, capturing crucial victories over Hillary Clinton in a remarkable show of strength.

The president-elect addressed supporters at his victory party in New York City after his Democratic rival Hillary Clinton called him to concede.

While Clinton had a higher share of the popular vote than Trump, the Republican was able to take a series of key battleground states including Florida, Ohio and North Carolina, before stunningly carrying Pennsylvania, a state that had not backed a Republican for president since 1988.

The celebrity businessman clinched victory after capturing Wisconsin’s 10 electoral votes, putting him over the 270 threshold that a candidate needed to secure to become President.

Mr Trump will govern with a Congress fully under Republican control. The GOP fended off a Democratic challenge in the Senate and the party also extended its grip on the House.

Donald Trump’s road to the White HousePlay!03:17

Presidential results maps

The electoral map is important. Each state is worth a certain number of electoral college votes, so it was essential that Trump and Clinton built a coalition of states to reach the magic number of 270.

A series of close Trump wins in crucial states in Florida, Ohio and North Carolina meant that he was able to gain the number of electoral votes he needed.

Our chart below sizes each state by their number of electoral college votes, showing how the big states have the power to tilt the election.

The key states in the election

Swing states with a lot of electoral votes to distribute, such as Florida and Ohio, have been targetted a lot by Clinton and Trump in recent weeks. How they end up voting would have a lot of influence on the final result.

States like Arizona, Florida, North Carolina, Ohio and Virginia have the power to swing the election. All but one of these five crucial states went to Trump.

  • 03:13HOW HILLARY CLINTON LOST THE US PRESIDENTIAL ELECTION
  • 02:00HOW THE WORLD REACTED TO DONALD TRUMP’S PRESIDENTIAL WIN
  • 13:27WATCH: HILLARY CLINTON’S CONCESSION 

Demographics were thought to be of importance here. Before electoral day, polling revealed a country divided down demographic lines. A country where men and whites tend to back Trump, while women and ethnic minorities flock to the Democrat’s candidate.

These demographic splits did come to light to a certain extent, but a key part in Clinton’s failure to claim certain states was the fact that ethnic minorities and women didn’t back her in the numbers initially expected.

Trump has triumphed in Ohio. This reliable bellwether state is worth a very handy 18 electoral college votes but it’s claim to fame is that it is the only one to have backed the successful presidential candidate in every election since 1964.

As such its result is seen as being very significant when determining the outcome of the race nationwide, with polling in Ohio was showing Trump marginally ahead of Clinton at the start of November. Situated on the Great Lakes, it is the seventh most populous state in the country.

Minority ethnic voters hold less sway here, with 83 per cent of the population being white according to the 2010 census compared to 72 per cent across the US as a whole.

Trump has won Florida’s vote for the 2016 presidency, marginally ahead of Clinton. Florida has been one of the hardest to call swing states in this election with the margins between the two candidates in recent polling being too close to call.

A week before the big day, polls were showing that Trump had taken a slight lead in the battle to take the state’s 29 electoral college votes. Florida is at once the oldest and one of the most racially diverse in America, and its voting in the past five presidential races has followed the result of the country as a whole.

Both candidates have had multiple campaign stops here in recent weeks. The state played a pivotal role in the 2000 election, when out of more than 5.8 million votes Bush beat Gore by 537 votes to claim all of its electoral college votes.

Clinton has triumphed in Virginia. Although not quite the boost that a state the size of Florida would give, Virginia’s 13 electoral college votes will be very handy addition for Clinton. Prior to Obama’s victory in 2008, Virginia had been a red state for the past forty years.

Nowadays, one in five of its people are black or African American, part of an increasingly moderate population based in its urban areas.

This shifting of demographics meant that the state was expected to stay Democrat this time around, with polls showing Clinton eight points clear of Trump at the end of October. Situated on the Atlantic coast, Virginia was the first colonial possession established in British America.

North Carolina’s voters have chosen Trump as their preferred presidential candidate. This result will be a blow for Clinton as North Carolina has been one of the toughest states to call in this election. Its 15 electoral college votes means that it is a valuable prize in the race to that all important 270 mark.

North Carolina was highly coveted this year with the candidates making multiple campaign stops there in the fortnight leading up to election day.

While Obama won it in 2008 with the assistance of demographic shifts and liberal urban areas, Romney managed to claim it for the Republicans in 2012 – the only swing state Obama lost in the last presidential election. This southeastern state is the ninth most populous in America and has a lower white population, at 64 per cent, than the average state.

Which states did Trump swing from Obama?

There are at least five states that swung from Obama in 2012 to Trump in 2016: Florida, Ohio, Wisconsin, Pennsylvania and Iowa. All of these were essential battlegrounds that both candidates canvassed hard.

Trump’s biggest victories

Trump’s most emphatic victory has come in the state of Wyoming where he won 174,248 votes – a 70.1 per cent share.

With most votes already counted Trump looks to have secured the votes of at least three in five voters in 10 states while Clinton can only boast the same vote share in five.

Congressional elections

The Senate and the House of Representatives, the two chambers that comprise America’s legislature, also have elections. Both of these chambers were in Republican hands prior to voting.

Senators are being elected in 34 states with the Republicans having a strong chance of holding onto their majority in the chamber.

The Republicans are on course to hold onto the Senate with a slightly reduced majority.

The House of Representatives is held more firmly in Republican hands with their majority of 59 looking very difficult to overturn even if Clinton had had a good day.

All 435 seats in the House were up for re-election with many having already called the result in favour of the republicans.

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or Download Shows 713-719

Listen To Pronk Pops Podcast or Download Shows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 590, December 10, 2015, Story 1: Majority of American People Support Trumps Temporary Ban on Muslims — Trump Takes Out Big Media and Leadership of Big Government Democratic and Republican Parties — Political Elitist Establishment (PEEs) Panic! — Trump/Cruz Republican Ticket Will Win By A Landside Running The Table — PEEs Wet Their Pants — Conservative Republicans in Whitehouse — Videos

Posted on December 10, 2015. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Banking System, Ben Carson, Benghazi, Blogroll, Bombs, Breaking News, Bribery, Budgetary Policy, Business, Chemistry, Coal, Coal, Communications, Computer, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Defense Spending, Donald J. Trump, Donald Trump, Donald Trump, Drugs, Economics, Education, Egypt, Elections, Employment, Energy, Environment, European History, Fiscal Policy, Food, Foreign Policy, France, Free Trade, Geology, Government, Government Spending, Great Britain, Health, Health Care, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Illegal Drugs, Illegal Immigration, Illegal Immigration, Immigration, Impeachment, Independence, Insurance, Investments, Iraq, Islamic Republic of Iran, Islamic State, Israel, Israel, Italy, Jeb Bush, Jordan, Labor Economics, Law, Legal Drugs, Legal Immigration, Marco Rubio, Media, Medicare, Middle East, Monetary Policy, Natural Gas, Natural Gas, News, Nuclear, Obama, Oil, Oil, Philosophy, Photos, Pistols, Politics, Polls, President Barack Obama, Prime Minister, Progressives, Qatar, Radio, Rand Paul, Rand Paul, Raymond Thomas Pronk, Republican Candidates For President 2016, Resources, Rifles, Scandals, Science, Second Amendment, Security, Senate, Social Networking, Social Science, Social Security, Solar, Success, Tax Policy, Taxation, Taxes, Technology, Ted Cruz, Ted Cruz, Terror, Terrorism, Trade Policy, Turkey, Unemployment, United States Constitution, United States of America, Videos, Violence, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 590: December 10, 2015

Pronk Pops Show 589: December 9, 2015 

Pronk Pops Show 588: December 7, 2015 

Pronk Pops Show 587: December 4, 2015 

Pronk Pops Show 586: December 3, 2015 

Pronk Pops Show 585: December 2, 2015 

Pronk Pops Show 584: December 1, 2015 

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 583, November 30, 2015, Story 1: World Wide Watermelon Wacko Wealth Wringers — aka Lying Lunatic Left — Protocol Predators Prowl Paris — Climate Changes Cooling Continues — The Ultimate Resource The Human Mind Will Innovate, Invent, and Invest Toward World Peace and Prosperity — Bill Gates Right On Research and Development and Wrong on Warming — Videos

Posted on November 30, 2015. Filed under: American History, Biology, Blogroll, Breaking News, Budgetary Policy, Business, Chemistry, Coal, Coal, Communications, Computer, Congress, Corruption, Economics, Education, Empires, Employment, Energy, Eugenics, European History, Federal Government, Fiscal Policy, Food, Foreign Policy, Geology, Government, Government Spending, Health, History, Investments, Law, Media, Medical, Natural Gas, Natural Gas, News, Nuclear, Oil, Oil, Philosophy, Photos, Politics, Polls, Pro Life, Progressives, Radio, Rand Paul, Raymond Thomas Pronk, Religion, Resources, Scandals, Science, Solar, Success, Tax Policy, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 490, June 22, 2015, Story 1: Is Pope Francis The First Watermelon Pope? – Green On The Outside, Red On The Inside — Trying To Convert Catholics To The Religion of Anti-Scientists Alarmist Socialists — Skeptical Capitalist Heretics Unite — Pope Francis Wrong On Science, Wrong On Economics, Not An Authority — Good Intentions Are Not Enough — Videos

Posted on June 22, 2015. Filed under: American History, Banking System, Biology, Blogroll, Breaking News, Business, Chemistry, Climate Change, Coal, Communications, Computer, Corruption, Economics, Education, Employment, Energy, Environment, Fiscal Policy, Foreign Policy, Geology, Government, Government Spending, History, Housing, Media, Natural Gas, Nuclear, Oil, Philosophy, Photos, Politics, Polls, Radio, Raymond Thomas Pronk, Resources, Scandals, Science, Security, Solar, Success, Taxation, Taxes, Videos, Violence, Wealth, Wisdom | Tags: , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 490 June 22, 2015

Pronk Pops Show 489 June 19, 2015

Pronk Pops Show 488 June 18, 2015

Pronk Pops Show 487 June 17, 2015

Pronk Pops Show 486 June 16, 2015

Pronk Pops Show 485 June 15, 2015

Pronk Pops Show 484 June 12, 2015

Pronk Pops Show 483 June 11, 2015

Pronk Pops Show 482 June 10, 2015

Pronk Pops Show 481 June 9, 2015

Pronk Pops Show 480 June 8, 2015

Pronk Pops Show 479 June 5, 2015

Pronk Pops Show 478 June 4, 2015

Pronk Pops Show 477 June 3, 2015 

Pronk Pops Show 476 June 2, 2015

Pronk Pops Show 475 June 1, 2015

Pronk Pops Show 474 May 29, 2015

Pronk Pops Show 473 May 28, 2015

Pronk Pops Show 472 May 27, 2015

Pronk Pops Show 471 May 26, 2015

Pronk Pops Show 470 May 22, 2015

Pronk Pops Show 469 May 21, 2015

Pronk Pops Show 468 May 20, 2015 

Pronk Pops Show 467 May 19, 2015

Pronk Pops Show 466 May 18, 2015

Pronk Pops Show 465 May 15, 2015

Pronk Pops Show 464 May 14, 2015

Pronk Pops Show 463 May 13, 2015

Pronk Pops Show 462 May 8, 2015

Pronk Pops Show 461 May 7, 2015

Pronk Pops Show 460 May 6, 2015

Pronk Pops Show 459 May 4, 2015 

Pronk Pops Show 458 May 1, 2015 

Pronk Pops Show 457 April 30, 2015 

Pronk Pops Show 456: April 29, 2015 

Pronk Pops Show 455: April 28, 2015

Pronk Pops Show 454: April 27, 2015

Pronk Pops Show 453: April 24, 2015

Pronk Pops Show 452: April 23, 2015 

Pronk Pops Show 451: April 22, 2015

Pronk Pops Show 450: April 21, 2015

Pronk Pops Show 449: April 20, 2015

Pronk Pops Show 448: April 17, 2015

Pronk Pops Show 447: April 16, 2015

Pronk Pops Show 446: April 15, 2015

Pronk Pops Show 445: April 14, 2015

Pronk Pops Show 444: April 13, 2015

Pronk Pops Show 443: April 9, 2015

Pronk Pops Show 442: April 8, 2015

Pronk Pops Show 441: April 6, 2015

Pronk Pops Show 440: April 2, 2015

Pronk Pops Show 439: April 1, 2015

Pronk Pops Show 438: March 31, 2015

Pronk Pops Show 437: March 30, 2015 

Pronk Pops Show 436: March 27, 2015 

Pronk Pops Show 435: March 26, 2015

Pronk Pops Show 434: March 25, 2015

Pronk Pops Show 433: March 24, 2015

Pronk Pops Show 432: March 23, 2015

Pronk Pops Show 431: March 20, 2015

Pronk Pops Show 430: March 19, 2015

Pronk Pops Show 429: March 18, 2015

Pronk Pops Show 428: March 17, 2015 

Pronk Pops Show 427: March 16, 2015

Pronk Pops Show 426: March 6, 2015

Pronk Pops Show 425: March 4, 2015

Pronk Pops Show 424: March 2, 2015

Story 1: Is Pope Francis The First Watermelon Pope? – Green On The Outside, Red On The Inside — Trying To Convert Catholics To The Religion of Anti-Scientists Alarmist Socialists — Skeptical Capitalist Heretics Unite — Pope Francis Wrong On Science, Wrong On Economics, Not An Authority — Good Intentions Are Not Enough — Videos

Galileo – “Faith can never conflict with reason” –

~Pope John Paul II – November 4, 1992

climatefactorsCO2andTemp600millionyrstopresentgeocraftDansgaard-Temperature2hansen-1988-a-b-c-scenariosclimate change failco2_800kclimate-reconstructions-1-million-yearsicecore_recordsgreenlandice_fig5

Pope Francis: “Bold Cultural Revolution” Needed to Save Planet from Climate Change & Consumerism

Did Pope Francis go too far on global warming?

Pope Francis’ stand on climate change

Cardinal Suggests Rush Limbaugh Doesn’t Understand What Pope Is Saying On Environment

60 Minutes on Pope Francis (Why the Pope is unlike any pontiff of modern times)

Socialism vs Capitalism: Milton Friedman

Milton Friedman – Is Capitalism Humane? (Lecture)

Murray Rothbard: Free Markets Again?

Pope Francis Gets Owned by Alex Jones

Pope Francis Now The New Face of Climate Change

Rush Limbaugh, Fox Host Attack The Pope

Global Warming: A Religion of Anti-Science – Journalist James Delingpole

ManBearPig, Climategate and Watermelons: A conversation with author James Delingpole

Climate Change in 12 Minutes The Skeptic s Case By Dr. David M.W. Evans

Freeman Dyson

Freeman Dyson on the Global Warming Hysteria April, 2015

Freeman Dyson: A Global Warming Heretic & Denier

“…Professor Fred Singer presents the Report “Nature, not Human Activity, Rules the Climate by the Nongovernmental International Panel on Climate Change”‘(NIPCC) at CFACT’s International Climate Eco-Summit (I.C.E.), held on December 11, 2009 at the Center for Political Studies, Copenhagen, Denmark. …”

Richard Lindzen

Interview with Professor Richard Lindzen

The experts explain the global warming myth: Richard Lindzen

Richard Lindzen at International Conference on Climate Change

Richard Lindzen, Ph.D. Lecture Deconstructs Global Warming Hysteria (High Quality Version)

Roy Spencer

Global Warming / Climate Change Hoax – Dr. Roy Spencer (1)

Why Climate Models Are Wrong

Dr Roy Spencer on Global Warming Part 1 of 6

Dr Roy Spencer on Global Warming Part 2 of 6

Dr Roy Spencer on Global Warming Part 3 of 6

Dr Roy Spencer on Global Warming Part 4 of 6

Dr Roy Spencer on Global Warming Part 5 of 6

Dr Roy Spencer on Global Warming Part 6 of 6

Fred Singer

Global Warming Debate – Dr. Fred Singer (1 of 2)

Global Warming Debate – Dr. Fred Singer (2 of 2)

Professor Fred Singer on Climate Change pt 1

Professor Fred Singer on Climate Change pt 2

Unstoppable Solar Cycles

Prof. Fred Singer on Climate Change – CFACT (1 of 5)

Prof. Fred Singer on Climate Change – CFACT (2 of 5)

Prof. Fred Singer on Climate Change – CFACT (3 of 5)

Prof. Fred Singer on Climate Change – CFACT (4 of 5)

Prof. Fred Singer on Climate Change – CFACT (5 of 5)

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY 4 /14- Intelligence Squared U.S.

Climategate: What They Aren’t Telling You!

The 97% Consensus? Global Warming Unmasked!

And yet it moves.

~Galileo Galilei

Galileo’s Battle for the Heavens 1

Galileo’s Battle for the Heavens 2

Galileo’s Battle for the Heavens 12

Nova Galileo’s Battle For The Heavens

The Current Pope’s Advisor On Climate Change (Really?)

Prof. Hans Joachim Schellnhuber, Climate change: state of play

UC San Diego Professor Advises Pope on Climate Change

How climate-change doubters lost a papal fight

By Anthony Faiola and Chris Mooney

Pope Francis was about to take a major step backing the science behind ­human-driven global warming, and Philippe de Larminat was determined to change his mind.

A French doubter who authored a book arguing that solar activity — not greenhouse gases — was driving global warming, de Larminat sought a spot at a climate summit in April sponsored by the Vatican’s Pontifical Academy of Sciences. Nobel laureates would be there. So would U.N. Secretary General Ban Ki-moon, U.S. economist Jeffrey Sachs and others calling for dramatic steps to curb carbon emissions.

After securing a high-level meeting at the Vatican, he was told that, space permitting, he could join. He bought a plane ticket from Paris to Rome. But five days before the April 28 summit, de Larminat said, he received an e-mail saying there was no space left. It came after other scientists — as well as the powerful Vatican bureaucrat in charge of the academy — insisted he had no business being there.

“They did not want to hear an off note,” de Larminat said.

The incident highlights how climate-change doubters tried and failed to alter the landmark papal document unveiled last week — one that saw the leader of 1 billion Catholics fuse faith and reason and come to the conclusion that “denial” is wrong.

It marked the latest blow for those seeking to stop the reform-minded train that has become Francis’s papacy. It is one that has reinvigorated liberal Catholics even as it has sowed the seeds of resentment and dissent inside and outside the Vatican’s ancient walls.

Yet the battle lost over climate change also suggests how hard it may be for critics to blunt the power of a man who has become something of a juggernaut in an institution where change tends to unfold over decades, even centuries. More than anything, to those who doubt the human impact of global warming, the position staked out by Francis in his papal document, known as an encyclical, means a major defeat.

“This was their Waterloo,” said Kert Davies, executive director of the Climate Investigations Center, who has been tracking ­climate-change deniers for years. “They wanted the encyclical not to happen. And it happened.”

Growth in the Internet of Things promises to transform life, work and industry.READ MORE

Papal advisers say Francis signaled his intent to draft a major document on the environment soon after assuming the throne of St. Peter in March 2013. His interest in the topic dates to his days as a bishop in Buenos Aires, where Francis, officials say, was struck by the effects of floods and unsanitary conditions on Argentine shantytowns known as “misery villages.”

In January, Francis officially announced his goal of drafting the encyclical — saying after an official visit to the Philippines that he wanted to make a “contribution” to the debate ahead of a major U.N. summit on climate change in Paris in December.

But several efforts by those skeptical of the scientific consensus on climate change to influence the document appear to have come considerably later — in April — and, maybe, too late.

In late April, the Chicago-based Heartland Institute, a free-market group that serves as a hub of skepticism regarding the science of human-caused global warming, sent a delegation to the Vatican. As a Heartland news release put it, they hoped “to inform Pope Francis of the truth about climate science: There is no global warming crisis!”

It was meant to coincide with the same April meeting that de Larminat was trying to attend. Heartland’s activists were not part of the invited contingent, either, Heartland communications director Jim Lakely said.

“It was a side event,” he said. “We were outside the walls of the Vatican. We were at a hotel — literally, I could throw a football into St. Peter’s Square.”

Seven scientists and other experts gave speeches at the Heartland event, raising doubts about various aspects of the scientific consensus on climate change, even as several also urged the pope not to take sides in the debate. It’s impossible to know how that influenced those in the Vatican working on the pope’s document — which one Vatican official said was at “an advanced stage.” But Lakely said his group did not see much of its argument reflected in the final document.

“We all want the poor to live better lives, but we just don’t think the solution to that is to restrict the use of fossil fuels, because we don’t think CO2 is causing a climate crisis,” Lakely said. “So if that’s our message in a sentence, that message was not reflected in the encyclical, so there you go.”

http://www.washingtonpost.com/world/europe/how-climate-change-doubters-lost-a-papal-fight/2015/06/20/86af3182-15ce-11e5-8457-4b431bf7ed4c_story.html

Read Pope Francis’s full document on Climate Change

n the 192-page paper released Thursday, the pope lays out the argument for a new partnership between science and religion to combat human-driven climate change — a position bringing him immediately into conflict with skeptics, whom he chides for their “denial.” And you can also read 10 key excerpts from Pope Francis’s encyclical on the environment.

http://www.washingtonpost.com/news/acts-of-faith/wp/2015/06/18/read-pope-franciss-full-document-on-climate-change/

Pope Francis, in Sweeping Encyclical, Calls for Swift Action on Climate Change

In his encyclical, read by a nun at the Vatican on Thursday, Francis focused on the harm climate change poses to the poor. CreditMax Rossi/Reuters

Francis has made it clear that he hopes the encyclical will influence energy and economic policy and stir a global movement. He calls on ordinary people to press politicians for change. Catholic bishops and priests around the world are expected to discuss the encyclical in services on Sunday. But Francis is also reaching for a wider audience, asking in the document “to address every person living on this planet.”

Even before the encyclical, the pope’s stance against environmental destruction and his demand for global action had already thrilled many scientists. Advocates of policies to combat climate change have said they hoped that Francis could lend a “moral dimension” to the debate.

“Within the scientific community, there is almost a code of honor that you will never transgress the red line between pure analysis and moral issues,” said Hans Joachim Schellnhuber, founder and chairman of the Potsdam Institute for Climate Impact Research. “But we are now in a situation where we have to think about the consequences of our insight for society.”

Francis has been sharply criticized by those who question or deny the established science of human-caused climate change, and also by some conservative Roman Catholics, who see the encyclical as an attack on capitalism and as political meddling.

Graphic: On Planet in Distress, a Papal Call to Action

Governments are now developing domestic climate-change plans to prepare for aUnited Nations summit meeting on the issue in Paris in December. The meeting’s goal is to achieve a sweeping accord in which every nation would commit to new policies to limit greenhouse-gas emissions. Many governments have yet to present plans, including major emitters like Brazil, which has a large Catholic population. The encyclical is seen as an unsubtle nudge for action.

“It gives a lot of cover to political and economic leaders in those countries, as they make decisions on climate change policy,” said Timothy Wirth, vice chairman of the United Nations Foundation.

Catholic theologians say the overarching theme of the encyclical is “integral ecology,” which links care for the environment with a notion already well developed in Catholic teaching: that economic development, to be morally good and just, must take into account people’s need for things like freedom, education and meaningful work.

“The basic idea is, in order to love God, you have to love your fellow human beings, and you have to love and care for the rest of creation,” said Vincent Miller, who holds a chair in Catholic theology and culture at the University of Dayton, a Catholic college in Ohio. “It gives Francis a very traditional basis to argue for the inclusion of environmental concern at the center of Christian faith.”

Photo

Metropolitan of Pergamon John Zizioulas, left, and Cardinal Peter Turkson presented the 184-page papal encyclical on Thursday.CreditAndrew Medichini/Associated Press

He added: “Critics will say the church can’t teach policy, the church can’t teach politics. And Francis is saying, ‘No, these things are at the core of the church’s teaching.’ ”

Francis tapped a wide variety of sources in his encyclical, partly to underscore the universality of his message. He cites passages from his two papal predecessors, John Paul II and Benedict XVI, and draws prominently from a religious ally, Patriarch Bartholomew I of Constantinople, leader of the Eastern Orthodox Church. He also cites a ninth-century Sufi mystic, Ali al-Khawas.

“This is not a correct interpretation of the Bible as understood by the Church,” Francis writes. The Bible teaches human beings to “till and keep” the garden of the world, he says. “ ‘Tilling’ refers to cultivating, plowing or working, while ‘keeping’ means caring, protecting, overseeing and preserving.”

His most stinging rebuke is a broad critique of profit-seeking and the undue influence of technology on society. He praises achievements in medicine, science and engineering, but says that “our immense technological development has not been accompanied by a development in human responsibility, values and conscience.”

Central to Francis’ theme is the link between poverty and the planet’s fragility. The pope rejects the belief that technology and “current economics” will solve environmental problems, or “that the problems of global hunger and poverty will be resolved simply by market growth.”

“A huge indictment I see in this encyclical is that people have lost their sense of ultimate and proper goals of technology and economics,” said Christiana Z. Peppard, an assistant professor of theology, science and ethics at Fordham University in New York. “We are focused on short-term, consumerist patterns.”

Encyclicals are letters to the clergy and laity of the church that are considered authoritative. Catholics are expected to try to sincerely embrace their teachings. But more specific assertions in them can be categorized as “prudential judgments,” a phrase that some critics have invoked to reject Francis’ positions on issues like climate change or economic inequality.

Many conservatives will be pleased with the encyclical’s strong criticism of abortion, and its dismissal of arguments that population control can be an answer to poverty. However, Francis sharply criticizes the trading of carbon credits — a market-based system central to the European Union’s climate policy — and says it “may simply become a ploy which permits maintaining the excessive consumption of some countries and sectors.”

Above all, Francis frames the encyclical as a call to action. He praises young people for being ready for change, and said “enforceable international agreements are urgently needed.” He cites Benedict in saying that advanced societies “must be prepared to encourage more sober lifestyles, while reducing their energy consumption and improving its efficiency.”

“All is not lost,” he writes. “Human beings, while capable of the worst, are also capable of rising above themselves, choosing again what is good, and making a new start.”

http://www.nytimes.com/2015/06/19/world/europe/pope-francis-in-sweeping-encyclical-calls-for-swift-action-on-climate-change.html?_r=0

The Scientific Pantheist Who Advises Pope Francis

The scientist who influenced Laudato Si, and who serves at the Vatican’s science office, seems to believe in Gaia, but not in God.

By ILLIAM M BRIGGS Published on June 22, 2015

1.4K432641
William M Briggs

St. Francis of Assisi’s hymn Laudato Si’ spoke of “Brothers” Sun and Fire and “Sisters” Moon and Water, using these colorful phrases figuratively, as a way of praising God’s creation. These sentimental words so touched Pope Francis that he named his encyclical after this canticle (repeated in paragraph 87 of the Holy Father’s letter).

Neither Pope Francis nor St. Francis took the words literally, of course. Neither believed that fire was alive and could be talked to or reasoned with or, worse, worshiped. Strange, then, that a self-professed atheist and scientific advisor to the Vatican named Hans Schellnhuber appears to believe in a Mother Earth.

Gaia

The Gaia Principle, first advanced by chemist James Lovelock (who has lately had second thoughts) and microbiologist Lynn Margulis in the 1970s, says that all life interacts with the Earth, and the Earth with all life, to form a giant self-regulating, living system.

This goes far beyond the fact that the Earth’s climate system has feedbacks, which are at the very center of the debate over climate change. In the Gaia Principle, Mother Earth is alive, and even, some think, aware in some ill-defined, mystical way. The Earth knows man and his activities and, frankly, isn’t too happy with him.

This is what we might call “scientific pantheism,” a kind that appeals to atheistic scientists. It is an updated version of the pagan belief that the universe itself is God, that the Earth is at least semi-divine — a real Brother Sun and Sister Water! Mother Earth is immanent in creation and not transcendent, like the Christian God.

What’s this have to do with Schellnhuber? In the 1999 Nature paper “‘Earth system’ analysis and the second Copernican revolution,” he said:

Ecosphere science is therefore coming of age, lending respectability to its romantic companion, Gaia theory, as pioneered by Lovelock and Margulis. This hotly debated ‘geophysiological’ approach to Earth-system analysis argues that the biosphere contributes in an almost cognizant way to self-regulating feedback mechanisms that have kept the Earth’s surface environment stable and habitable for life.

Geo-physiological, in case you missed it. Cognizant, in black and white. So dedicated is Schellnhuber to this belief that he says “the Gaia approach may even include the influence of biospheric activities on the Earth’s plate-tectonic processes.”  Not the other way around, mind you, where continental drift and earthquakes effects life, but where life effects earthquakes.

He elaborates:

Although effects such as the glaciations may still be interpreted as over-reactions to small disturbances — a kind of cathartic geophysiological fever — the main events, resulting in accelerated maturation by shock treatment, indicate that Gaia faces a powerful antagonist. Rampino has proposed personifying this opposition as Shiva, the Hindu god of destruction.

Mother Earth gets the flu and instead of white blood cells and a rise in temperature to fend off the infection, it sends white ice and a decrease in temperatures. How? Geophysiologically! I remind the reader that our author, writing in one of the world’s most prominent science journals, does not use these propositions metaphorically. He proposes them as actual mechanisms.

Schellnhuber echoes the theme of a cognizant, i.e. self-aware, planet in another (co-authored) 2004 paper in Nature 2004, “Climbing the co-evolution ladder,” suggesting again that mankind is an infection, saying that mankind “perturbs … the global ‘metabolism’” of the planet.

Tipping Points

Schellnhuber, a one-time quantum physicist who turned his attention to Mother Earth late in his career, was also co-author of a 2009 Proceedings of the National Academy of Sciences paper “Imprecise probability assessment of tipping points in the climate system,” which asked select scientists their gut assessment about the arrival of various “tipping points.” Tipping points are a theme of Schellnhuber’s research (see inter alia this and this).

Tipping points are supposed moments when some doom which might have been avoided if some action had been taken, is no longer possible to avoid and will arrive no matter what. Tipping points have come and gone in climate forecasts for decades now. The promised dooms never arrive but the false prophets never quit.  Their intent is less to forecast than to induce something short of panic in order to plead for political intervention. When the old tipping point is past, theorists just change the date, issue new warnings and hope no one will notice.

One of the tipping points Schellnhuber asked about was the melting of the Greenland ice sheet, depending on what the temperature did. All of the selected experts (who answered the questions in 2004 and 2005) gave moderate (~15-25%) to quite high probabilities (50-80%) for this event to have occurred by 2015. The ice did not melt.

Schellnhuber Michelangelo Gaia

Schellnhuber presented more tipping points to the Pontifical Academy of Sciences in 2014 in the co-authored paper, “Climate-System Tipping Points and Extreme Weather Events.” In that paper, Schellnhuber has a “scientific” graph with Michelangelo’s Sistine Chapel Adam “flicking” a planet earth over a methane tipping point, such that the earth would roll down into a fiery pit labeled the “Warming Abyss.” Hell on earth.

The Problem of People

Schellnhuber is most famous for predicting that the “carrying capacity” of the earth is “below” 1 billion people. When confronted with this, he called those who quoted him “liars.” But he then repeated the same claim, saying, “All I said was that if we had unlimited global warming of eight degrees warming, maybe the carrying capacity of the earth would go down to just 1 billion, and then the discussion would be settled.”  And he has often said that this temperature tipping point would be reached — unless “actions” were taken.

The man is suspicious of people. In that same interview he said, “If you want to reduce human population, there are wonderful means: Improve the education of girls and young women.” Since young women already know where babies come from, and since this knowledge tends neither to increase nor decrease population, the “education” he has in mind must be facts about how to avoid the consequences of sex. Austin Ruse discovered a 2009 talk in which Schellnhuber said the earth “will explode” due to resource depletion once the population reaches 9 billion, a number that the UN projects in 2050. Presumably he wants earth to avoid that fate, so he mustsupport the population control that Pope Francis so clearly repudiated in his encyclical.

Bad Religion

Confirmation bias happens when a scientist manipulates an experiment so that he gets the outcome he hoped he would get. When Schellnhuber invites only believers in tipping-points-of-doom to characterize their guesses of this doom, his view that the doom is real will be confirmed. And when he publishes a paper that says, “Scientists say world is doomed” the public and politicians believe it. Scientists skeptical of the doom are dismissed because they are skeptics. This isn’t good science. It’s really bad religion, and a pagan one at that.

Global warming research is characterized by an insider’s club. If you believe, you’re in. If you doubt, you’re out. This is also so at the Pontifical Academies of Science where Schellnhuber was appointed by Bishop Marcelo Sanchez Sorondo. The bishop locked scientists with contrary views out of the process, scientists he has repeatedly dismissed as “funded by the oil industry.” Given this, how likely is it that the Holy Father was fully aware of the views of the chief scientist who advised him?

https://stream.org/scientific-pantheist-who-advises-pope-francis/

Background Articles and Videos

An Honest IPCC Scientist Tackles ‘ClimateGate’

Nongovernmental International Panel on Climate Change

“…On June 2, as Congress debated global warming legislation that would raise energy costs to consumers by hundreds of billions of dollars, the Nongovernmental International Panel on Climate Change (NIPCC) released an 880-page book challenging the scientific basis of concerns that global warming is either man-made or would have harmful effects.

In “Climate Change Reconsidered: The 2009 Report of the Nongovernmental International Panel on Climate Change (NIPCC),” coauthors Dr. S. Fred Singer and Dr. Craig Idso and 35 contributors and reviewers present an authoritative and detailed rebuttal of the findings of the United Nations’ Intergovernmental Panel on Climate Change (IPCC), on which the Obama Administration and Democrats in Congress rely for their regulatory proposals.

The scholarship in this book demonstrates overwhelming scientific support for the position that the warming of the twentieth century was moderate and not unprecedented, that its impact on human health and wildlife was positive, and that carbon dioxide probably is not the driving factor behind climate change.

The authors cite thousands of peer-reviewed research papers and books that were ignored by the IPCC, plus additional scientific research that became available after the IPCC’s self-imposed deadline of May 2006.

The Nongovernmental International Panel on Climate Change (NIPCC) is an international panel of nongovernment scientists and scholars who have come together to understand the causes and consequences of climate change. Because it is not a government agency, and because its members are not predisposed to believe climate change is caused by human greenhouse gas emissions, NIPCC is able to offer an independent “second opinion” of the evidence reviewed by the Intergovernmental Panel on Climate Change (IPCC). …”

http://www.climatechangereconsidered.org/

Related Posts On Pronk Palisades

Global Warming/Climate Change

Richard Lindzen, Roy Spencer, and Fred Singer On The Climate and Global Warming Alarmists and Junk Science Computer Models –Videos

Al Gore Global Warming Hot Head Says The Artic Ice Cap Will Disappear In 5-10-15 Years–Volcanoe Gate–Eruptions Melt Ice and Increase Carbon Dioxide!–Videos

Climategate–The Political Scam, Investment Fraud, and Science Scandal of The Century Exposed–The Progressive Radical Socialist’s Big Lie And Con That Man Is The Cause Of Global Warming Was In Fact Nothing More Than Politicians, Investment Bankers, and Government Scientists Creating Climate Crisis!–

Glenn Beck, John Bolton, and Lord Christopher Monckton On Copenhagen 2009 Treaty, Climate Change and World Government–Videos

Lord Christopher Monckton–Climate Change–Treaty–Videos

“We Can Reverse Climate Change”–President Barack Obama–Liar or Fool–Or Both–You Be The Judge!

John Holdren–Science Czar–Videos

John Holdren: Global Warming: What Do We Know and Should Do–Videos

The Obama Depression Has Arrived: 15,000,000 to 25,000,000 Unemployed Americans–Stimulus Package and Bailouts A Failure–400,000 Leave Labor Force In July!

Facing Fundamental Facts

Gore Grilled & Gingrich Gouged–American People Oppose Massive Carbon Cap and Trade Tax Increase–Videos

National Center for Policy Analysis–A Global Warming Primer

Global Warming is The Greatest Hoax, Scam and Disinformation Campaign in History

Global Warming Videos

Global Warming Books

Global Warming Sites

The Heidelberg Appeal: Beware of False Gods and Prophets

Cap and Trade

Global Warming Is Caused By Man: The Arrogance of Man–The Wrath Of Mother Nature–

Al Gore Global Warming Hot Head Says The Artic Ice Cap Will Disappear In 5-10-15 Years–Volcanoe Gate–Eruptions Melt Ice and Increase Carbon Dioxide!–Videos

Climategate–A Political Scam, Investment Fraud, and Science Scandal of The Century Exposed–The Progressive Radical Socialist’s Big Lie And Con That Man Is The Cause Of Global Warming Was In Fact Nothing More Than Politicians, Investment Bankers, and Government Scientists Creating Climate Crisis!–

Glenn Beck, John Bolton, and Lord Christopher Monckton On Copenhagen 2009 Treaty, Climate Change and World Government–Videos

Lord Christopher Monckton–Climate Change–Treaty–Videos

“We Can Reverse Climate Change”–President Barack Obama–Liar or Fool–Or Both–You Be The Judge!

Time To Sound The Alarm: Call Your Representative and Senators–Cap and Trade Bill to be Voted in U.S. House on Friday–Kill The Cap and Trade Energy Tax Today! UPDATED

Green Government Gestapo Goons: Global Warming Police Force Invades Your Home And Living in Your Home May Be A Crime!

White House Memo: Carbon Dioxide Is Not A Pollutant and A Cap And Trade Program (Carbon Dioxide Tax) Serious Economic Impact –The Smoking Gun Video!

Save Your Job and Life–Abolish The Environmental Protection Agency!

President Obama–Killer of The American Dream and Market Capitalism–Stop The Radical Socialists Before They Kill You!

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY DEBATE–Videos

Facing Fundamental Facts

Let Them Eat Cake Act: American Elites Killing and Starving The American People

Clinton’s Cap and Trade Tax on The American People for Consuming Electricity and Driving Cars, SUVs and Trucks!

The Heidelberg Appeal: Beware of False Gods and Prophets

Saving The World: The Importance of Getting The Priorities Right

Collectivism: Socialism, Communism, Progressivism and Fascism

The Battle For The World Economy–Videos

Walter Block–Videos

Thomas DiLorenzo–The Economic Model of the Fascist State–Videos

G. William Domhoff: Who Runs America–Videos

Jonah Goldberg–Liberal Fascism–Videos

Paul Edward Gottfried–Fascism, Anti-Fascism, and the Welfare State–Videos

G. Edward Griffin- On Individualism vs. Collectivism–Videos

George Gerald Reisman–Why Nazism Was Socialism and Why Socialism Is Totalitarian–Videos

Today’s Progressives–Obama’s Radical Socialist Democratic Party

It Is Official–America On The Obama Road To Fascism–Thomas Sowell!

President Obama and His Keynesian Spending Cult of The Fascist Democrat Radicals–FDRs

The Racist Test for Judge Sonya Sotomayor and President Obama–Racism Unmasked!

Calling and Raising The Stakes for Race Card Players–Obama and Sotomayor

George Soros: Government Interventionist and Global Socialist–Obama’s Puppeter Master–Videos

George Soros: Barack Obama’s Money Man and Agenda Puppeter

The Cloward-Piven Strategy Of The Progressive Radical Socialists: Wrecking The U.S. Economy By Massive Government Dependence, Spending, Deficits, Debts, Taxes And Regulations!

The Cloward-Piven Strategy Of The Progressive Radical Socialists: Wrecking The U.S. Economy By Massive Government Dependence!

President Barack Obama’s Role Model–President Franklin D. Roosevelt–The Worse President For The U.S. and World Economies and The American People–With The Same Results–High Unemployment Rates–Over 25 Million American Citizens Seeking Full Time Jobs Today–Worse Than The Over 13 Million Seeking Jobs During The Worse of The Great Depression!

Progressives

Progressive Radical Socialist Health Care Plan Written In Prison By Convicted Felon Richard Creamer!

Obamanomics–New Deal Progressive Radical Socialist Interventionism

Eugenics, Planned Parenthood, Population Control, and Designer Babies–Videos

The Great Depression and the Current Recession–Robert Higgs–Videos

The Obama Depression: Lessons Learned–Deja Vu!

Lord Christopher Monckton–Climate Change–Treaty–Videos

Progressive Radical Socialist Canned Criticism of American People: Danger, Profits, and Wrong Thinking

The Battle For The World Economy–Videos

Broom Budget Busting Bums: Replace The Entire Congress–Tea Party Express and Patriots–United We Stand!

Obama’s Civilian National Security Force–Youth Corp Wave–Friendly Fascism Faces–Cons–Crooks–Communists–Communities–Corps!

Obama’s Hidden Agenda and Covert Cadre of Marxists, Communists, Progressives, Radicals, Socialists–Far Left Democrats Destroying Capitalism and The American Republic

Yuri Bezmenov On KGB Soviet Propaganda and Subversion–Videos

The Bloody History of Communism–Videos

Obama Youth–Civilian National Security Force–National Socialism–Hitler Youth–Brownshirts– Redux?–Collectivism!

American Progressive Liberal Fascism–The Wave of The Future Or Back To Past Mistakes?

Today’s Progressives–Obama’s Radical Socialist Democratic Party

President Obama–Killer of The American Dream and Market Capitalism–Stop The Radical Socialists Before They Kill You!

The Progressive Radical Socialist Family Tree–ACORN & AmeriCorps–Time To Chop It Down

It Is Official–America On The Obama Road To Fascism–Thomas Sowell!

President Obama and His Keynesian Spending Cult of The Fascist Democrat Radicals–FDRs

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 490-

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 396, January 13, 2014, Story 1: Obama Proposed New Cybersecurity Law — Unsecured Government Computers and Sites Are The Real Problem — Videos

Posted on January 13, 2015. Filed under: Airlines, American History, Applications, Banking System, Benghazi, Blogroll, Bombs, Business, Communications, Computer, Computers, Consitutional Law, Constitutional Law, Corruption, Crime, Cruise Missiles, Culture, Drones, Economics, Education, Employment, European History, Federal Government, Fiscal Policy, Foreign Policy, Government, Government Dependency, Government Spending, Hardware, Highway, History, Homicide, Insurance, Investments, IRS, Islam, Law, Media, MIssiles, National Security Agency, Obama, Philosophy, Photos, Pistols, Politics, Radio, Railroads, Regulation, Religion, Resources, Rifles, Scandals, Science, Security, Social Networking, Social Science, Software, Space, Success, Technology, Terror, Terrorism, Transportation, United States Constitution, Videos, Violence, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 396: January 13, 2015

Pronk Pops Show 395: January 12, 2015

Pronk Pops Show 394: January 7, 2015

Pronk Pops Show 393: January 5, 2015

Pronk Pops Show 392: December 19, 2014

Pronk Pops Show 391: December 18, 2014

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Story 1: Obama Proposed New Cyber security Law — Unsecured Government Computers and Sites Are The Real Problem — Videos

Obama renews push for cybersecurity law

ISIS #CyberCalipHATE Attack Hacked USA Military Central Command website

Obama Signs Five ‘Cybersecurity’ Measures Into Law!

10 Cyber Security Facts

 

Carlos Creus Moreira TV Interview Bloomberg London on the State of Cybersecurity

Carlos Creus Moreira, Founder CEO WISeKey Interviewed by Swiss TV

 

The State of Cyber Security 2011 – Presented by Sophos and the National Cyber Security Alliance

Uploaded on Nov 14, 2011

The latest trends in cyber crime, what you can do to protect yourself, and how the government can work with the private sector to help share information. Speakers include Michael Kaiser of NCSA, Chester Wisniewski of Sophos Inc and Rob Strayer of the Bipartisan Policy Center.

 

SECURING CYBERSPACE – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts

“In this interconnected, digital world, there are going to be opportunities for hackers to engage in cyber assaults both in the private sector and the public sector.  Now, our first order of business is making sure that we do everything to harden sites and prevent those kinds of attacks from taking place…But even as we get better, the hackers are going to get better, too.  Some of them are going to be state actors; some of them are going to be non-state actors.  All of them are going to be sophisticated and many of them can do some damage.

This is part of the reason why it’s going to be so important for Congress to work with us and get an actual bill passed that allows for the kind of information-sharing we need.  Because if we don’t put in place the kind of architecture that can prevent these attacks from taking place, this is not just going to be affecting movies, this is going to be affecting our entire economy in ways that are extraordinarily significant.”

 – President Obama, December 19, 2014.

 

Since the start of his Administration, when he issued the Cyberspace Policy Review — the first top-to-bottom, Administration-wide review of cybersecurity — President Obama has led efforts to better prepare our government, our economy, and our nation as a whole for the growing cyber threats we face.

That’s why in 2011 he issued his Cybersecurity Legislative Proposal, calling on Congress to take urgent action to give the private sector and government the tools they need to combat cyber threats at home and abroad.  It’s why he issued the International Strategy for Cyberspace to make clear to nations abroad the foreign policy priority cybersecurity issues have become.  And when Congress failed to pass comprehensive cybersecurity legislation, the Administration pressed forward, issuing an Executive Order to protect critical infrastructure by establishing baseline cybersecurity standards that we developed collaboratively with industry.

Today, at a time when public and private networks are facing an unprecedented threat from rogue hackers as well as organized crime and even state actors, the President is unveiling the next steps in his plan to defend the nation’s systems.  These include a new legislative proposal, building on important work in Congress, to solve the challenges of information sharing that can cripple response to a cyberattack.  They also include revisions to those provisions of our 2011 legislative proposal on which Congress has yet to take action, and along with them, the President is extending an invitation to work in a bipartisan, bicameral manner to advance this urgent priority for the American people.

Specifically, today’s announcements include:

Cybersecurity Legislative Proposal

Enabling Cybersecurity Information Sharing: The Administration’s updated proposal promotes better cybersecurity information sharing between the private sector and government, and it enhances collaboration and information sharing amongst the private sector.  Specifically, the proposal encourages the private sector to share appropriate cyber threat information with the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC), which will then share it in as close to real-time as practicable with relevant federal agencies and with private sector-developed and operated Information Sharing and Analysis Organizations (ISAOs) by providing targeted liability protection for companies that share information with these entities.

The legislation also encourages the formation of these private-sector led Information Sharing and Analysis Organizations.  The Administration’s proposal would also safeguard Americans’ personal privacy by requiring private entities to comply with certain privacy restrictions such as removing unnecessary personal information and taking measures to protect any personal information that must be shared in order to qualify for liability protection.  The proposal further requires the Department of Homeland Security and the Attorney General, in consultation with the Privacy and Civil Liberties Oversight Board and others, to develop receipt, retention, use, and disclosure guidelines for the federal government.  Finally, the Administration intends this proposal to complement and not to limit existing effective relationships between government and the private sector.  These existing relationships between law enforcement and other federal agencies are critical to the cybersecurity mission.

Modernizing Law Enforcement Authorities to Combat Cyber Crime: Law enforcement must have appropriate tools to investigate, disrupt and prosecute cyber crime.  The Administration’s proposal contains provisions that would allow for the prosecution of the sale of botnets, would criminalize the overseas sale of stolen U.S. financial information like credit card and bank account numbers, would expand federal law enforcement authority to deter the sale of spyware used to stalk or commit ID theft, and would give courts the authority to shut down botnets engaged in distributed denial of service attacks and other criminal activity.  It also reaffirms important components of 2011 proposals to update the Racketeering Influenced and Corrupt Organizations Act (RICO), a key piece of law used to prosecute organized crime, so that it applies to cybercrimes, clarifies the penalties for computer crimes, and makes sure these penalties are in line with other similar non-cyber crimes.  Finally, the proposal modernizes the Computer Fraud and Abuse Act by ensuring that insignificant conduct does not fall within the scope of the statute, while making clear that it can be used to prosecute insiders who abuse their ability to access information to use it for their own purposes.

National Data Breach Reporting: As announced yesterday, the Administration has also updated its proposal on security breach reporting.  State laws have helped consumers protect themselves against identity theft while also encouraging business to improve cybersecurity, helping to stem the tide of identity theft. These laws require businesses that have suffered an intrusion to notify consumers if consumers’ personal information has been compromised.  The Administration’s updated proposal helps business and consumers by simplifying and standardizing the existing patchwork of 46 state laws (plus the District of Columbia and several territories) that contain these requirements into one federal statute, and puts in place a single clear and timely notice requirement to ensure that companies notify their employees and customers about security breaches.

White House Summit on Cybersecurity and Consumer Protection

On February 13, 2015, the White House will host a Summit on Cybersecurity and Consumer Protection at Stanford University, to help shape public and private sector efforts to protect American consumers and companies from growing threats to consumers and commercial networks.

The Summit will bring together major stakeholders on cybersecurity and consumer financial protection issues – including senior leaders from the White House and across the federal government; CEOs from a wide range of industries including the financial services industry, technology and communications companies; computer security companies and the retail industry; as well as law enforcement officials, consumer advocates, technical experts, and students.  Topics at the Summit will include increasing public-private partnerships and cybersecurity information sharing, creating and promoting improved cybersecurity practices and technologies, and improving adoption and use of more secure payment technologies.

The Summit is also the next step in the President’s BuySecure Initiative, which was launched in November 2014, and will help advance national efforts the government has led over the last two years with executive orders on consumer financial protection and critical infrastructure cybersecurity. Through keynote speeches, panel discussions, and small group workshops, participants will build on efforts in the public and private sectors to further improve cybersecurity practices at a wide range of companies.

Grants to Historically Black Colleges for Cybersecurity Education

As the President stated in Executive Order 13532, “Promoting Excellence, Innovation, and Sustainability at Historically Black Colleges and Universities” in February 2010, historically black colleges and universities (HBCUs) have made historic and ongoing contributions to the general welfare and prosperity of our country.  Established by visionary leaders, America’s HBCUs, for over 150 years, have produced many of the Nation’s leaders in business, government, academia, and the military, and have provided generations of American men and women with hope and educational opportunity. Recognizing that HBCUs serve as engines of opportunity, innovation, and economic growth, Vice President Biden will travel to Norfolk, VA on Thursday to announce that the Department of Energy will provide $25 million in grants over the next five years to support a cybersecurity education consortium consisting of 13 HBCUs and two national labs.

This program, part of the President’s jobs-driven training initiative, will help to fill the growing demand for skilled cybersecurity professionals in the U.S. job market at the same time that it helps to grow the science, technology, engineering, and mathematics (STEM) curricula for HBCUs. The participating schools include two-year colleges, four-year colleges, and research institutions in seven states, plus the Virgin Islands.

http://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislat

 

Obama says hacks show need for cybersecurity law

President Barack Obama said Tuesday the cyber attacks against Sony and the Pentagon’s Central Command highlight the need for toughened laws on cybersecurity.

Obama made the comment as the White House unveiled a proposal to revive cybersecurity legislation stalled over the past few years.

“With the Sony attack that took place, with the Twitter account that was hacked by Islamist jihadist sympathizers yesterday, it just goes to show how much more work we need to do — both public and private sector — to strengthen our cybersecurity,” the president said at a meeting with congressional leaders.

Obama said he had spoken to the Republican leaders of the House and Senate and “I think we agreed that this is an area where we can work hard together, get some legislation done and make sure that we are much more effective in protecting the American people from these kinds of cyberattacks.”

The proposal unveiled Tuesday would allow increased sharing of information on cyber threats from the private sector with protection from liability. The measure also would criminalize the sale of stolen financial data, and require companies to notify consumers about data breaches.

A White House statement said the updated proposal “promotes better cybersecurity information sharing between the private sector and government, and it enhances collaboration and information sharing amongst the private sector.”

The plan also “would allow for the prosecution of the sale of botnets, would criminalize the overseas sale of stolen US financial information like credit card and bank account numbers, would expand federal law enforcement authority to deter the sale of spyware used to stalk or commit ID theft, and would give courts the authority to shut down botnets engaged in distributed denial of service attacks and other criminal activity,” the statement said.

The proposal would shield companies from liability if they share information about cyber threats with the Department of Homeland Security, which has been setting up special units for threat analysis and sharing.

Obama was expected to make comments on the initiative later Tuesday at the National Cybersecurity and Communications Integration Center.

Obama has pressed for cybersecurity legislation to allow the private sector to share data on threats without fear of liability for any adverse consequences from the disclosures.

Earlier efforts on cybersecurity legislation have stalled amid opposition from civil libertarians who feared it could allow too much government snooping and conservatives who argued it would create a new bureaucracy.

However, concerns have been heightened by the hacking of Sony Pictures and massive data breaches affecting retailers including Target and Home Depot.

On Monday, the US Central Command suspended its Twitter page after a group declaring sympathy for Islamic State jihadists hacked its social media accounts and posted internal documents.

http://news.yahoo.com/white-house-renews-bid-cybersecurity-law-155403546.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 391-396

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...