It’s Your Money and the Democrats Don’t Care

Do you know how legislative bills begin and then what happens? Do you know what they may cost the taxpayers?

Sponsors of 700 bills in Congress didn’t put price tags on their proposals

Almost half of the bills introduced in the last Congress authorized spending tax dollars, but not specifically how many dollars. Instead, the proposals simply provided that “such sums as necessary” should be spent.All 20 congressmen who most frequently used the “such sums as necessary” formulation are liberals and among the most ardent proponents of expanding the federal government. House Republicans were advised by their leaders not to use the phrase, but some of them ignored the advice.Vermont Sen. Bernie Sanders, a self-proclaimed “Democratic socialist,” led the list as the sponsor of 19 such bills.

His 10 Million Solar Roofs Act of 2014, for example, would require “the Department of Energy (DOE) to establish a program to provide rebates for the purchase and installation of photovoltaic systems with the goal to install 10 million systems.”

The Sanders bill provided specific instructions for what the government would need to do, and the cost of the solar panels would be known to his staff. The goal of the bill — increasing alternative energy sources — has significant public support. But Sanders didn’t include how much his proposal would cost, thus depriving his congressional colleagues and taxpayers of the means to weigh benefits versus costs.Nowhere in the bill is there a cost figure. It simply says “there are authorized to be appropriated such sums as are necessary to carry out this Act.”Florida Democrat Rep. Alan Grayson’s Fiscal Sanity Act for Appropriations bill is another whose cost is simply as much “as necessary.”

“It shows they aren’t serious fiscal stewards — they aren’t concerned with how much it costs, often-times. If they were, they could write in offsets saying ‘this fund over here will be decreased by the amount necessary,’” said Demian Brady, who tracks individual congressmen’s spending propensities for the National Taxpayers Union.

“It could also be a way to avoid accountability. If they did say $20 million for a gun buyback program, media and everyone would say she wants to spend $20 million. If you leave it blank, it’s a shield you can hide behind, even if they know how much it’s going to cost,” he said.  Some were token efforts that sponsors never expected to go anywhere — they were introduced only so their sponsors could tell campaign backers that they tried. But occasionally those proposals wind up becoming policy anyway.“They say, ‘we didn’t bother to get an estimate because we didn’t expect it to go anywhere,’ but then soon we’ll find it as part of bigger legislation,” Brady said.When Rep. Maxine Waters wanted a “minority diabetes initiative,” the California Democrat didn’t care how much it cost, and didn’t attempt to measure it, craft a budget estimate or find a way to fund it. Instead, she asked colleagues to essentially vote for a blank check.

Pennsylvania Democratic Sen. Bob Casey’s Caregiver Corps Act of 2014 would require the Department of Health and Human Services to “contract with a nonprofit” and “[a]llows the Secretary to award grants for the operation of local Corps programs.”Yet there is no mention of cost anywhere. At the very end of the description of the proposed program, it says simply, “There is authorized to be appropriated to carry out this section, such sums as may be necessary.”“It’s very bad practice to put these things in place because they also lead to bloated appropriations. The authorizers have kind of punted,” said a senior Senate Republican aide. “We’d like to have all the authorizers be more accountable to things.”

Congress must first pass a bill “authorizing” money to be spent, and then another, separate appropriation bill officially funds it — generally one of a few major bills passed by the appropriations committee.

The handful of powerful congressional “appropriators” who meet in back rooms and until recently were able to dole out earmarks as favors have been the subject of significant ire as poster children for what is wrong with Washington.

But when lawmakers write bills that “authorize” funding without specifying amounts, they are ceding authority to the appropriations committees, who will have to fill in an amount, even though they’re much less acquainted with the purpose.

The Examiner analyzed legislation from the two-year congressional session that ended last month. Dollar amounts — or lack thereof — were extracted from the bill text by the Cato Institute as part of the libertarian think tank’s Deepbills project.

One reason for the Democratic dominance of the “such sums as necessary” list is that Democrats introduce more bills in general than Republicans. But another is that House Republican leadership cautioned its members not to use “such sums as necessary” at the beginning of last Congress, as one of nine “legislative protocols.” “Any bill or joint resolution authorizing discretionary appropriations shall specify the actual amount of funds being authorized,” the protocol says. “This protocol is designed to improve transparency and accountability in the authorization of discretionary programs.”

But it only discourages, not forbids, House Republicans from using the technique. The House Select Committee on Benghazi, formed to investigate Hillary Clinton’s State Department, was funded by “such sums as necessary,” leading Democrats opposed to the investigation to protest that it is irresponsible to allocate open-ended amounts of money with no end date.

And it doesn’t bind senators, who lead the list in bills introduced.

Sanders and Sen. Bob Menendez, D-NJ. the most frequent users, didn’t respond to the Examiner’s requests for comment.

WRITING THE MOST BLANK CHECKS

Name Bills
Sen. Bernard Sanders (I-VT) 19
Sen. Robert Menendez (D-NJ) 14
Sen. Tom Harkin (D-IA) 13
Sen. Mark Begich (D-AK) 13
Sen. Patty Murray (D-WA) 11
Sen. Richard Blumenthal (D-CT) 10
Sen. Tom Udall (D-NM) 10
Sen. Al Franken (D-MN) 10
Rep. Sheila Jackson Lee (D-TX) 9
Sen. Ron Wyden (D-OR)

But Barack Obama does not care either. His budget was presented last week and has zero chance of advancing with good reason.  Obama’s Budget Hikes Taxes by $1.6 Trillion   In his budget, Obama also proposes that over the next 10 years, tax cuts of $349 billion be accompanied by tax increases of $1.9 trillion, for a net 10-year tax increase of $1.6 trillion. 

The president’s budget would repeal, let expire or limit:

  • the Lifetime Learning Credit;
  • the student loan interest deduction (for new borrowers);
  • Coverdell accounts; and
  • 529 education savings plans.

The president’s budget would:

  • triple the maximum Child and Dependent Care Tax Credit (CDCTC);
  • expand the American Opportunity Tax Credit;
  • create an auto-enroll IRA for workers without an employer-based retirement plans (with an option to opt out);
  • create a new second earner credit of up to $500 for families where both spouses work; and
  • expand the Earned Income Tax Credit (EITC) for workers without children and for non-custodial parents.

The president’s budget would raise taxes in many ways. For example, it would:

  • increase the capital gains and dividend tax rate to 28 percent (inclusive of the net investment income tax);
  • end stepped-up basis by treating bequests and gifts as realization events that would trigger tax liability for capital gains;
  • raise estate and gift taxes;
  • limit the value of itemized deductions to 28 percent;
  • create an additional alternative minimum tax designed to ensure certain high income taxpayer pay at least 30 percent of income —after charitable contributions—in taxes;
  • impose a 19 percent on the foreign earnings of U.S. companies;
  • raise tobacco taxes; and
  • impose a tax on the debt of financial institutions.

In addition, Obama’s budget increases the corporate welfare provided through the tax code, with substantially higher subsidies for alternative energy and politically favored infrastructure.

The budget does contain a constructive provision that would permanently extend section 179 expensing allowing small business to deduct up to $1 million of capital expenses.

 

White House Invited Muslim Brotherhood Policy



A ROUND TABLE DISCUSSION WITH “THE STOP QATAR NOW COALITION”

Who Are the Muslim Brotherhood-Linked Leaders Obama Met?


The Stop Qatar Now Coalition of good Patriots have spent weeks gathering evidence, documents and performed interviews to bring to publication the facts on the Muslim Brotherhood penetration into the American culture against the will and knowledge of Americans and the U.S. Constitution…

BROADTCAST LIVE WORLDWIDE:  THURSDAYS – 9:00PM (eastern) / 6:00pm (pacific) on WDFP – Restoring America Radio , Red State Talk Radio, American Agenda, Nightside Radio Studios, and on Freedom In America Radio

Uncovering the AUMF Against Islamic State

There is zero strategy in the Authorization of Military Force the White House sent electronically to Congress today. At the core of this feeble document is all deference to Iran and the building issues with Russia. Yet the most unspoken issue is Barack Obama taking a swipe at GW Bush.

Ralph Peters told Fox News this morning that Obama’s war authorization reads as if it were written by a nervous lawyer, not a bold Commander in Chief. He said there are so many caveats in it that you’d think it was a Hollywood contract negotiation.

As far as the ‘no enduring troops’ phrase, Peters says that’s simply a swipe at George W. Bush. He says this White House can’t get over the fact that Bush ever existed and it’s a dig at the occupation of Iraq.

The AUMF notably allows Obama to employ U.S. ground troops against ISIS, but with the proviso that such operations not be “enduring.” The three-year limitation comes alongside the repeal of the 2002 authorization to use force in Iraq, but the AUMF notably leaves intact the 2001 authorization to use military force against al Qaeda — the resolution the Obama administration is relying on to conduct its war on ISIS now.

The Obama administration’s draft language and transmittal letter, obtained from congressional sources, appears below:

 

TO THE CONGRESS OF THE UNITED STATES:

The so-called Islamic State of Iraq and the Levant (ISIL) poses a threat to the people and stability of Iraq, Syria, and the broader Middle East, and to U.S. national security. It threatens American personnel and facilities located in the region and is responsible for the deaths of U.S. citizens James Foley, Steven Sotloff, Abdul-Rahman Peter Kassig, and Kayla Mueller. If left unchecked, ISIL will pose a threat beyond the Middle East, including to the United States homeland.

I have directed a comprehensive and sustained strategy to degrade and defeat ISIL. As part of this strategy, U.S. military forces are conducting a systematic campaign of airstrikes against ISIL in Iraq and Syria. Although existing statutes provide me with the authority I need to take these actions, I have repeatedly expressed my commitment to working with the Congress to pass a bipartisan authorization for the use of military force (AUMF) against ISIL. Consistent with this commitment, I am submitting a draft AUMF that would authorize the continued use of military force to degrade and defeat ISIL.

My Administration’s draft AUMF would not authorize long-term, large-scale ground combat operations like those our Nation conducted in Iraq and Afghanistan. Local forces, rather than U.S. military forces, should be deployed to conduct such operations. The authorization I propose would provide the flexibility to conduct ground combat operations in other, more limited circumstances, such as rescue operations involving

U.S. or coalition personnel or the use of special operations forces to take military action against ISIL leadership. It would also authorize the use of U.S. forces in situations where ground combat operations are not expected or intended, such as intelligence collection and sharing, missions to enable kinetic strikes, or the provision of operational planning and other forms of advice and assistance to partner forces.

Although my proposed AUMF does not address the 2001 AUMF, I remain committed to working with the Congress and the American people to refine, and ultimately repeal, the 2001 AUMF.

Enacting an AUMF that is specific to the threat posed by ISIL could serve as a model for how we can work together to tailor the authorities granted by the 2001 AUMF.

I can think of no better way for the Congress to join me in supporting our Nation’s security than by enacting this legislation, which would show the world we are united in our resolve to counter the threat posed by ISIL.

The White House,

JOINT RESOLUTION

To authorize the limited use of the United States Armed Forces against the Islamic State of Iraq and the Levant.

***

Whereas the terrorist organization that has referred to itself as the Islamic State of Iraq and the Levant and various other names (in this resolution referred to as ‘”ISIL’”) poses a grave threat to the people and territorial integrity of Iraq and Syria, regional stability, and the national security interests of the United States and its allies and partners;

Whereas ISIL holds significant territory in Iraq and Syria and has stated its intention to seize more territory and demonstrated the capability to do so;

Whereas ISIL leaders have stated that they intend to conduct terrorist attacks internationally, including against the United States, its citizens, and interests;

Whereas ISIL has committed despicable acts of violence and mass executions against Muslims, regardless of sect, who do not subscribe to ISIL’s depraved, violent, and oppressive ideology;

Whereas ISIL has threatened genocide and committed vicious acts of violence against religious and ethnic minority groups, including Iraqi Christian, Yezidi, and Turkmen populations;

Whereas ISIL has targeted innocent women and girls with horrific acts of violence, including abduction, enslavement, torture, rape, and forced marriage; Whereas ISIL is responsible for the deaths of innocent United States citizens, including James Foley, Steven Sotloff, Abdul-Rahman Peter Kassig, and Kayla Mueller;

Whereas the United States is working with regional and global allies and partners to degrade and defeat ISIL, to cut off its funding, to stop the flow of foreign fighters to its ranks, and to support local communities as they reject ISIL;

Whereas the announcement of the anti-ISIL Coalition on September 5, 2014, during the NATO Summit in Wales, stated that ISIL poses a serious threat and should be countered by a broad international coalition;

Whereas the United States calls on its allies and partners, particularly in the Middle East and North Africa that have not already done so to join and participate in the anti-ISIL Coalition;

Whereas the United States has taken military action against ISIL in accordance with its inherent right of individual and collective self-defense;

Whereas President Obama has repeatedly expressed his commitment to working with Congress to pass a bipartisan authorization for the use of military force for the anti-ISIL military campaign;

and Whereas President Obama has made clear that in this campaign it is more effective to use our unique capabilities in support of partners on the ground instead of large-scale deployments of U.S. ground forces:

Now, therefore, be it Resolved by the Senate and House of Representatives of the United States of America in Congress assembled, That

SECTION 1. SHORT TITLE.

This joint resolution may be cited as the “Authorization for Use of Military Force against the Islamic State of Iraq and the Levant.”

SEC. 2. AUTHORIZATION FOR USE OF UNITED STATES ARMED FORCES.

(a) AUTHORIZATION.—The President is authorized, subject to the limitations in subsection (c), to use the Armed Forces of the United States as the President determines to be necessary and appropriate against ISIL or associated persons or forces as defined in section 5.

(b) WAR POWERS RESOLUTION REQUIREMENTS.— (1) SPECIFIC STATUTORY AUTHORIZATION.—Consistent with section 8(a)(1) of the War Powers Resolution (50 U.S.C. 1547(a)(1)), Congress declares that this section is intended to constitute specific statutory authorization within the meaning of section 5(b) of the War Powers Resolution (50 U.S.C. 1544(b)). (2) APPLICABILITY OF OTHER REQUIREMENTS.—Nothing in this resolution supersedes any requirement of the War Powers Resolution (50 U.S.C. 1541 et seq.).

(c) LIMITATIONS.— The authority granted in subsection (a) does not authorize the use of the United States Armed Forces in enduring offensive ground combat operations.

SEC. 3. DURATION OF THIS AUTHORIZATION. This authorization for the use of military force shall terminate three years after the date of the enactment of this joint resolution, unless reauthorized.

SEC. 4. REPORTS.

The President shall report to Congress at least once every six months on specific actions taken pursuant to this authorization.

SEC. 5. ASSOCIATED PERSONS OR FORCES DEFINED.

In this joint resolution, the term ‘‘associated persons or forces’’ means individuals and organizations fighting for, on behalf of, or alongside ISIL or any closely-related successor entity in hostilities against the United States or its coalition partners.

SEC. 6. REPEAL OF AUTHORIZATION FOR USE OF MILITARY FORCE AGAINST IRAQ. The Authorization for Use of Military Force Against Iraq Resolution of 2002 (Public Law 107– 243; 116 Stat. 1498; 50 U.S.C. 1541 note) is hereby repealed.

But what about Libya, Afghanistan or Pakistan?

The Islamic State has expanded its presence in the failed state of Libya, and if not confronted, the terror group may be able to gain strategic territory in its quest to form an Islamic Caliphate, according to the Washington Institute’s Andrew Engel. While the United States and its allies are focused on Syria and Iraq, IS (commonly referred to as ISIL or ISIS) has its eyes beyond that fight.

The report, titled The Islamic State’s Expansion in Libya, says Libya’s ex-ambassador to the Emirates Aref Ali Nayed is worried that if Washington does not act, IS will use Libya to threaten Europe. The IS has increased its physical and media presence in the last three months. A local terrorist organization, the Islamic Youth Shura Council (IYSC), has pledged its loyalty to IS.

“ISIS leader Abu Bakr al-Baghdadi recognized the Libyan ‘provinces’ of Barqa (Cyrenaica), Tripolitania, and Fezzan as belonging to his self-styled ‘caliphate,’” Engel said.

Adding to concerns, IS is winning the battle to be the dominant terrorist group in the region, just as it is in Iraq and Syria. Al-Barqawi has said that the terrorist organization would like to remove the borders of North African countries Tunisia, Libya, and Egypt to form a province similar to the one they are building in Syria and Iraq, which they call the “Euphrates Province.”

Have You Met Christiana?

  • She is a member of the Carbon Finance Advisory Panel
  • She is an Advisory Committee Member of Green Cross International, founded by Pres. Gorbachev
  • She is an invited member of the Clinton Global Initiative
  • She is a member of the Global Roundtable on Climate Change led by Jeffrey Sachs at Columbia University
  • She is a technical advisor to the Prototype Carbon Fund at the World Bank
  • She was personally trained by Al Gore to deliver his presentation of ‘An Inconvenient Truth’
  • She is the Executive Secretary of the United Nations Framework Convention on Climate Change
  • She even blogs at the UNFCCC

Are you beginning to see a crusader here because there is notoriety and money and power involved? Wonder how many times she has visited the White House…

UN Climate Chief: We Are Remaking The World Economy

The United Nation’s climate chief says that reordering the global economy to fight climate change is the “most difficult” task the international body has ever undertaken.

“This is probably the most difficult task we have ever given ourselves, which is to intentionally transform the economic development model, for the first time in human history,” Christiana Figueres, who heads up the U.N.’s Framework Convention on Climate Change, told reporters.

“This is the first time in the history of mankind that we are setting ourselves the task of intentionally, within a defined period of time, to change the economic development model that has been reigning for the, at least, 150 years, since the industrial revolution,” Figueres said.

Figueres’s remarks come ahead of a meeting in Geneva next week where delegates will pour over draft treaty texts that the U.N. hopes countries will agree to in December. She doesn’t expect global warming to be solved by one treaty, but was optimistic in will be solved in the coming years. “That will not happen overnight and it will not happen at a single conference on climate change, be it COP 15, 21, 40 – you choose the number,” she said. “It just does not occur like that. It is a process, because of the depth of the transformation.”

The climate chief even held up President Obama as a shining example of steps countries can take to tackle global warming.

“The international community is quite grateful for the fact that in his second term, President Obama has turned his attention quite clearly and quite decisively to climate change,” Figueres told reporters.

“He has not only spoken about his commitment both to his national agenda on climate change, but also to the international process, and has been quite clear in his political leadership,” Figueres said, touting the EPA’s success cutting carbon dioxide emissions from power plants.

The EPA will finalize rules to cut carbon emissions from new and existing power plants this summer. Critics of these rules say they will hurt the economy through job losses and higher energy prices. Supporters, however, say it will spur green energy development and set an example for other countries to follow.

Obama’s 2016 budget proposal boosts EPA funding to help it finalize emissions rules for power plants. The budget would also give the EPA $4 billion to reward states that reduce emissions even more than federal mandates require.

Figueres also cheered Obama’s agreement with China to reduce carbon emissions by 2030 and to give the U.N.’s climate fund a $3 billion boost.

“So for all of these reasons, certainly a very welcome leadership from the United States as a single nation,” Figueres said. “Countries can attain a certain level of emission reductions on their own, but they can do much more if they collaborate with each other, in particular with certain specific sectors.”

But while Figueres seems rosy about a deal, there are already signs of countries backing away from a tough international climate treaty.

France’s foreign minister, Laurent Fabius, told an audience at an event in New Delhi, India that a climate treaty should not hurt national economic growth. “An agreement that would leave some countries to consider their growth hampered by its provisions will not be accepted,” Fabius said. *** If you can stand this nonsense and fleecing of policy and global threats, you can read more here about Christiana. One more thing, controlling climate change brings gender equality….really?

 

Cyber-attacks surging in Utah

NSA facility is likely cause….

SALT LAKE CITY — Utah state officials have seen what they describe as a sharp uptick in attempts to hack into state computers in the last two years, and they think it related to the NSA data center south of Salt Lake City.

The increase began in early 2013 as international attention focused on the NSA’s $1.7 billion warehouse to store massive amounts of information gathered secretly from phone calls and emails.

“In the cyber world, that’s a big deal,” Utah Public Safety Commissioner Keith Squires told a state legislative committee this week.

While most of the attempts are likely innocuous, cyber experts say it is possible low-level hackers, “hactivists” unhappy with the NSA’s tactics, and some foreign criminal groups might erroneously think the state systems are linked to the NSA.

“Maybe these hackers are thinking: ‘If we can attack state systems, we can get info that NSA isn’t releasing,” said Richard Forno, director of the University of Maryland, Baltimore County’s, graduate cybersecurity program.

The state tracks the attempts with an automated system it purchased after a breach of health care information in 2012. The system detects, stops and counts the attempts to get into the computers, Squires said.

With that new equipment in place in January 2013, the state was seeing an average of 50,000 a day with spikes up to 20 million, Squires told The Associated Press. In February 2013, the number rose to an average of 75 million attacks a day, with up to 500 million on some days.

Attacks include direct attacks on websites, emails fishing for passwords, and something called “port scans,” where people probe a computer looking for weak spots.

The NSA didn’t immediately have any comment about the attacks.

Tim Junio, a cybersecurity researcher at Stanford University, said what officials refer to as “attacks” are likely just “noise from low-tech people rather than concerted efforts for meaningful foreign intelligence collection.”

But both Forno and Junio agree the NSA data center could draw the attention of hackers who think they can target state-run utilities that power the center. Being able to disrupt an NSA operation in any way would bring international notoriety to a foreign state or criminal group, Junio said.

State officials acknowledge that part of the increase is driven by an overall rise in hacking across the country. Hackers’ motivations vary, and it was impossible to determine what might be behind the activity in Utah.

Some steal personal information, like customer lists, to commit identity theft. Some take control of email servers to steal messages, send unwanted advertising or disguise the origin of their communications. Some steal corporate or government secrets from email or cloud servers, or use unlocked file servers as digital “dead drops” for their hacking tools, pirated movies, stolen files and more.

For hackers seeking notoriety, the NSA would be a prized target because it employs the world’s best hackers and routinely gives advice about how to keep computers safe from online criminals.

*** How much more do you really need to know?

In the 10 years since the Pew Research Center and Elon University’s Imagining the Internet Center first asked experts about the future of cyber attacks in 2004 a lot has happened:
 Some suspect the Russian government of attacking or encouraging organized crime assaults on official websites in the nation of Georgia during military struggles in 2008 that resulted in a Russian invasion of Georgia.
 In 2009-2010, suspicions arose that a sophisticated government-created computer worm called “Stuxnet” was loosed in order to disable Iranian nuclear plant centrifuges that could be used for making weapons-grade enriched uranium. Unnamed sources and speculators argued that the governments of the United States and Israel might have designed and spread the worm.
 The American Defense Department has created a Cyber Command structure that builds Internet-enabled defensive and offensive cyber strategies as an integral part of war planning and war making.
 In May, five Chinese military officials were indicted in Western Pennsylvania for computer hacking, espionage and other offenses that were aimed at six US victims, including nuclear power plants, metals and solar products industries. The indictment comes after several years of revelations that Chinese military and other agents have broken into computers at major US corporations and media companies in a bid to steal trade secrets and learn what stories journalists were working on.
 In October, Russian hackers were purportedly discovered to be exploiting a flaw in Microsoft Windows to spy on NATO, the Ukrainian government, and Western businesses.
 The respected Ponemon Institute reported in September that 43% of firms in the United States had experienced a data breach in the past year. Retail breaches, in particular, had grown in size in virulence in the previous year. One of the most chilling breaches was discovered in July at JPMorgan Chase & Co., compromised. Obama Administration  officials have wondered if the breach was in retaliation by the Putin regime in Russia over events in Ukraine.
 Among the types of exploits of individuals in evidence today are stolen national ID numbers, pilfered passwords and payment information, erased online identities, espionage tools that record all online conversations and keystrokes, and even hacks of driverless cars.
 Days before this report was published, Apple’s iCloud cloud-based data storage system was the target of a so-called “man-in-the-middle” attack in China that was aimed at stealing users’ passwords and spying on their account activities. Some activists and security experts said they suspected the Chinese government had mounted the attack, perhaps because the iPhone 6 had just become available in the country. Others thouThe threat of cyber attacks on government agencies, businesses, non-profits, and individual users is so pervasive and worrisome that this month (October 2014) is National Cyber Security Awareness Month.
To explore the future of cyber attacks we canvassed thousands of experts and Internet builders to share their predictions. We call this a canvassing because it is not a representative, randomized survey. Its findings emerge from an “opt in” invitation to experts, many of whom play active roles in Internet evolution as technology builders, researchers, managers, policymakers, marketers, and analysts. We also invited comments from those who have made insightful predictions to our previous queries about the future of the Internet.