Happy Constitution Day, Every Day?

Appreciate Checks and Balances on Constitution Day

This Constitution Day marks 229 years since the Framers signed the U.S. Constitution following more than four months of debate, votes, and revisions in Philadelphia.

The Constitution deserves celebration.

Civil rights enshrined in the Bill of Rights ensure numerous freedoms absent in other parts of the world. We are not kidnapped and detained without cause. We are free to practice our faith, and wear religious garments as suits our conscience. And we are free to group together and participate in political debate.

But we often overlook the benefit of a checked and balanced government. The Constitution prescribed a three-branched government to ensure that no faction could unaccountably overstep its authority. As children learn, the legislative branch makes law, taxes, and spends (Article I), the executive branch enforces law (Article II), and the judicial branch resolves cases and controversies before it (Article III).

For most of the our history, the Constitution has limited the federal government’s capacity to create law, tax, regulate, and criminalize. The three branches have the power to check each other, and the ballot box ultimately holds politicians accountable.

But the Framers could not foresee the emergence of the regulatory state, which has effectively become the fourth branch of U.S. government.

Congress abdicated its lawmaking powers to literally countless agencies from the New Deal era to the present day. Agency bureaucrats can and do generate regulations autonomously. In 1946, Congress passed the Administrative Procedures Act, which prescribed the “notice-and-comment” process to constrain agency rulemaking, but this is a poor substitute for the accountable and divided government framed by the Constitution. While the public may comment on proposed regulations before enactment, regulators may ignore opposition to costly new rules, or even fabricate public support in favor of regulation.

Agencies increasingly avoid notice-and-comment rulemaking altogether using what Clyde Wayne Crews calls “regulatory dark matter”: industry guidance, opinions, and interpretations. Because many agencies have enforcement power, guidance and opinion letters—even blog posts—may effectively impose new requirements and certainly new compliance costs of businesses. Through new “interpretations,” agencies take advantage of the deference courts give them. Interpretations can effectively announce new rules by decree, as when the Department of Labor unexpectedly decided that a 1938 law makes certain independent contractors into employees.

Some agencies have also become adept at usurping legislative and judicial powers by settling lawsuits with non-government organizations, which creates de facto law without formal rulemaking or appropriation. For example, the EPA currently hopes to expand its authority by imposing clean fuel standards on Volkswagen to settle unrelated diesel fraud claims. The EPA has a track record of setting policy though settled litigation.

While the three canonical branches of government counterbalance each other, the “fourth branch” simply accumulates regulations and dark matter rules over time. Layers accumulate like debris in a neglected gutter. Regulations fossilize over time, as once-burdensome rules become the expectations of industry, deterring competition and hindering innovation. Volumes of code can block the flow of economic development indefinitely.

But there is hope: the Framer’s original design is still intact. Congress and the President can scrape off regulatory debris, banish regulatory dark matter, and prevent more from accumulating.

It would be a fitting tribute to the Constitution.

House Office Report on Edward Snowden

Edward Snowden, Defending His Patriotism, Says Disclosures Helped Privacy

In this file photo, American whistleblower Edward Snowden delivers remarks via video link from Moscow to attendees at a discussion regarding an International Treaty on the Right to Privacy, Protection Against Improper Surveillance and Protection of Whistleblowers in New York City on Sept. 24, 2015. © REUTERS/Andrew Kelly

In this file photo, American whistleblower Edward Snowden delivers remarks via video link from Moscow to attendees at a discussion regarding an International Treaty on the Right to Privacy, Protection Against Improper Surveillance and Protection of Whistleblowers in New York City on Sept. 24, 2015.  More here.

Executive Summary of Review of the Unauthorized Disclosures of Former National Security Agency Contractor Edward Snowden

UNCLASSIFIED

In June 2013, former National Security Agency (NSA) contractor Edward Snowden

perpetrated the largest and most damaging Public release of classified information in U.S.

intelligence history. In August 2014, the Chairman and Ranking Member of the House

Permanent Select Committee on Intelligence (HPSCI) directed Committee staff to carry out a

comprehensive review of the unauthorized disclosures. The aim of the review was to allow the

Committee to explain to other Members of Congress-and, where possible, the American

people-how this breach occurred, what the U.S. Government knows about the man who

committed it, and whether the security shortfalls it highlighted had been remedied.

Over the next two years, Committee staffrequested hundreds ofdocuments from the

Intelligence Community (IC), participated in dozens ofbriefings and meetings with IC

personnel, conducted several interviews with key individuals with knowledge of Snowden’s

background and actions, and traveled to NSA Hawaii to visit Snowden’s last two work locations.

The review focused on Snowden’s background, how he was able to remove more than 1.5

million classifled documents from secure NSA networks, what the 1.5 million documents

contained, and the damage their removal caused to national security.

The Committee’s review was careful not to disturb any criminal investigation or future

prosecution of Snowden, who has remained in Russia since he fled there on June 23, 2013.

Accordingly, the Committee did not interview individuals whom the Depatment of Justice

identified as possible witnesses at Snowden’s trial, including Snowden himself, nor did the

Committee request any matters that may have occurred before a grand jury. Instead, the IC

provided the Committee with access to other individuals who possessed substantively similar

knowledge as the possible witnesses. Similarly, rather than interview Snowden’s NSA

coworkers and supervisors directly, Committee staffinterviewed IC personnel who had reviewed

reports o finterviews with Snowden’s co-workers and supervisors. The Committee remains

hopeful that Snowden will retum to the United States to face justice.

The bulk of the Committee’s 36-page review, which includes 230 footnotes, must remain

classified to avoid causing further harm to national security; however, the Committee has made

a number of unclassified findings. These findings demonstrate that the public narrative

popularized by Snowden and his allies is rife with falsehoods, exaggerations, and crucial

omissions, a pattem that began befiore he stole 1.5 million sensitive documents.

First, Snowden caused tremendous damage to national security, and the vast

majority of the documents he stole have nothing to do with programs impacting individual

privacy interests-they instead pertain to military, defense? and intelligence programs of

great interest to America,s adversaries. A review ofthe materials Snowden compromised

makes clear that he handed over secrets that protect American troops overseas and secrets that

provide vital defienses against terrorists and nation-states. Some of Snowden’s disclosures

exacerbated and accelerated existing trends that diminished the IC’s capabilities to collect

against legitimate foreign intelligence targets, while others resulted in the loss of intelligence

streams that had saved American lives. Snowden insists he has not shared the full cache of 1.5

million classified documents with anyone; however, in June 2016, the deputy chairman of the

Russian parliaments defense and security committee publicly conceded that “Snowden did

share intelligence” with his govemment. Additionally, although Snowden’s professed objective

may have been to inform the general public, the infiormation he released is also available to

Russian, Chinese, Iranian, and North Korean govemment intelligence services; any terrorist

with Internet access; and many others who wish to do harm to the United States.

The full scope ofthe damage inflicted by Snowden remains unknown. Over the past

three years, the IC and the Department ofDefiense (DOD) have carried out separate

reviews with differing methodologies-fthe damage Snowden caused. Out of an abundance of

caution, DOD reviewed all 1.5 million documents Snowden removed. The IC, by contrast, has

carried out a damage assessment fior only a small subset ofthe documents. The Committee is

concerned that the IC does not plan to assess the damage ofthe vast majority of documents

Snowden removed. Nevertheless, even by a conservative estimate, the U.S. Govemment has

spent hundreds of millions of dollars, and will eventually spend billions, to attempt to mitigate

the damage Snowden caused. These dollars would have been better spent on combating

America’s adversaries in an increasingly dangerous world.

Second, Snowden was not a whistleblower. Under the law, publicly revealing

classifled information does not qualify someone as a whistleblower. However, disclosing

classified information that Shows fraud, Waste, Abuse, Or Other illegal activity to the

appropriate law enforcement or oversight personnel-including to Congressuloes make someone

a whistleblower and affords them with critical protections. Contrary to his public claims that he

notified numerous NSA officials about what he believed to be illegal intelligence collection, the

Committee found no evidence that Snowden took any official effort to express concems about

U.S. intelligence activities-legal, moral, or otherwise-to any oversight officials Within the

U.S. Govemment, despite numerous avenues for him to do so. Snowden was aware of these

avenues. His only attempt to contact an NSA attomey revolved around a question about the

legal precedence ofexecutive orders, and his only contact to the Central Intelligence Agency

(CIA) Inspector General (IG) revolved around his disagreements with his managers about

training and retention ofinfiormation technology specialists.

Despite Snowden’s later public claim that he would have faced retribution for voicing

concems about intelligence activities, the Committee found that laws and regulations in effect at

the time of Snowden’s actions afforded him protection. The Committee routinely receives

disclosures from IC contractors pursuant to the Intelligence Community Whistleblower

Protection Act of 1998 (IC WPA). If Snowden had been worried about possible retaliation for

voicing concerns about NSA activities, he could have made a disclosure to the Committee. He

did not. Nor did Snowden remain in the United States to flee the legal consequences of his

actions, contrary to the tradition of civil disobedience he professes to embrace. Instead, he fled

to China and Russia, two countries whose governments place scant value on their citizens’

privacy or civil liberties-and whose intelligence services aggressively collect information on

both the United States and their own citizens.

To gather the files he took with him when he left the country for Hong Kong, Snowden

infringed on the privacy of thousands of govemment employees and contractors. He obtained

his colleagues, security credentials through misleading means, abused his access as a systems

administrator to search his co-workers, personal drives, and removed the personally

identifiable information of thousands of IC employees and contractors. From Hong Kong he

went to Russia, where he remains a guest of the Kremlin to this day.

It is also not clear Snowden understood the numerous privacy protections that govern the

activities of the IC. He failed basic annual training for NSA employees on Section 702 of the

Foreign Intelligence Surveillance Act (FISA) and complained the training was rigged to be

overly difficult. This training included explanations of the privacy protections related to the

PRISM program that Snowden would later disclose.

Third, two weeks before Snowden began mass downloads of classified documents,

he was reprimanded after engaging in a workplace spat with NSA managers. Snowden was

repeatedly counseled by his managers regarding his behavior at work. For example, in June

2012, Snowden became involved in a fiery e-mail argument With a Supervisor about how

computer updates should be managed. Snowden added an NSA senior executive several levels

above the supervisor to the e-mail thread, an action that earned him a swift reprimand from his

contracting officer for failing to follow the proper protocol for raising grievances through the

chain of command. Two weeks later, Snowden began his mass downloads of classified

information from NSA networks. Despite Snowden’s later claim that the March 2013

congressional testimony of Director of National Intelligence James Clapper was a “breaking

point” for him, these mass downloads predated Director Clapper’s testimony by eight months.

Fourth, Snowden was, and remains) a serial exaggerator and fabricator. A close

review of Snowden’s official employment records and submissions reveals a pattern of

intentional lying. He claimed to have left Army basic training because of broken legs when in

fact he washed out because of shin splints. He claimed to have obtained a high school degree

equivalent when in fact he never did. He claimed to have worked for the CIA as a “senior

advisor,” which was a gross exaggeration of his entry-level duties as a computer technician. He

also doctored his performance evaluations and obtained new positions at NSA by exaggerating

his resume and stealing the answers to an employment test. In May 2013, Snowden informed

his supervisor that he would be out of the office receive treatment for worsening epilepsy. In

reality, he was on his way to Hong Kong with stolen secrets.

Finally, the Committee remains concerned that more than three years after the start

of the unauthorized disclosures, NSA, and the IC as a whole, have not done enough to

minimize the risk of another massive unauthorized disclosure. Although it is impossible to

reduce the chance of another Snowden to zero, more work can and should be done to improve

the security of the people and computer networks that keep America’s most closely held secrets.

For instance, a recent DOD Inspector General report directed by the Committee found that NSA

has yet to effectively implement its post-Snowden security improvements. The Committee has

taken actions to improve IC information security in the Intelligence Authorization Acts for

Fiscal Years 2014, 2015, 2016, and 2017, and looks forward to working with the IC to continue

to improve security.

Did Jeh Johnson Pay $500,000 to Head DHS?

Was it one of the Islamic organizations supportive of Barack Obama that funneled the money for Jeh Johnson to pass on to the DNC that allowed Jeh Johnson to assume his Secretary role at DHS? There is no proof, but the question needs to be asked. Mr. Johnson was invited and accepted a role in a recent ISNA Convention directly after the DNC convention.

Click here for the video. Also mentioned in this event were Jesse Jackson and Senator Dick Durbin. This is not the first rodeo for Jeh Johnson when it comes to solidarity with Islamic groups as noted here, where he spoke at the All Dulles Area Muslim Society (ADAMS) Center. As a reminder, the ADAMS Center:

MIM: Mohammed Magid’s failure to condemn the attacks on America could be because his boss and benefactor, ADAMS chairman Ahmed Tontonji is:

“… an Iraqi-born citizen of the kingdom of Saudi Arabia and a key target of Operation Green Quest. Totonji was also named as a defendant in a $1 trillion lawsuit filed by more than 600 relatives of people who died in the 9/11 attacks
He acted as a co-founder and officer of the Saudi-founded/Saudi-funded (and now defunct) SAAR Trust. Additionally, he served as Vice President of the Safa Group and the International Institute for Islamic Thought (IIIT).Officials have linked the non-profit IIIT to Osama bin Laden and al-Qaeda (…)

***

CJR: The Executives of the ADAMS Center are very closely aligned with CAIR National.  CAIR Executives often flip flop and join one another’s terrorist supporting organization.  The ADAMS Center and CAIR National have previously been investigated and/or raided by the FBI.  Why would the FBI recruit from Islamic terror organzations for sensitive positions, such as FBI Special Agents and FBI Analysts.  The positions require a Top Secret clearance.

The answer is there is no good reason to recruit from terrorist organizations and supporters of terrorist.  FBI Special Agent Amylynn Errera, Washington Field Office sent the email to Farooq Syed, ADAMS Center.  Farooq then forwarded the email about FBI positions to members of their internal group of supporters.  I was provided a copy by a source.
The FBI sends these job opening to Islamic terror supporters, yet I would make a multi-million dollar bet that no one from the Tea Party, ACT For America, and dozens of other conservative groups are provided an up front notice of sensitive job positions in the FBI.  There are good people within the FBI, but the majority are not properly trained in regards to Islamic terrorism issues.  Then there are some who knowingly have relationships with organizations that pose a threat to our national security.
The ADAMS Center has previously been raided for their support of terrorism (RAID ON ADAMS CENTER).  I encourage readers to contact Special Agent Amylynn Errera and ask her why Islamic terror supporters (per the FBI’s own allegations) are being recruited for TOP SECRET positions within the FBI.  Her contact information is at the bottom of the email she sent to the ADAMS Center. More here.

**** 

In terms of the Counterjihad movement, the corruption of the American administration creates several problems.  If high posts are for sale, they might not be occupied by the best people.  Worse, though, they might be bought by the wrong people.  The sale of high offices allows a means of influence on our government that is not accountable to the people, especially given that it was handled secretly — and by a political party, not a formal branch of government.

For example, consider the case of Department of Homeland Security czar Jeh Johnson.  Johnson is a career public servant.  Yet he was able to come up with over half a million dollars in cash to donate to the DNC — and then “feigned disbelief” when he got the job of leading the Homeland Security agency.

How has he used this post?  Oddly enough, we were just talking about that the other day.  Johnson decided to appear at the conference of a known Muslim Brotherhood front organization, while “fully aware” of its terrorist ties.

As CJ first reported Sunday, ISNA had been considered off-limits to such high-level appearances since the U.S. Justice Department in 2008 designated the group as an unindicted co-conspirator in the largest terrorist financing case in U.S. history and a front organization for the radical Egypt-based Muslim Brotherhood.

Johnson’s spokesman Neema Hakim told CJ that, despite ISNA’s terrorist ties and radical background, Johnson agreed to appear at the event because he considered it an “opportunity” to conduct outreach with the American Muslim community.

“DHS and the secretary are fully aware of past evidence and allegations concerning ISNA and carefully considered them before accepting ISNA’s invitation,” Hakim said.

While there, he shared a stage with a Holocaust denier and a known leader of the Muslim Brotherhood.

Nor was this the only occasion on which he has made moves amenable to the Brotherhood. In June, he testified before Congress admitting that his agency had scrubbed references to Islam from counter-terror materials that they produced.  He claimed to have “no idea”how that happened.

Earlier in June, Johnson downplayed the role of a radical Islamist community in the Pulse nightclub shootings.  He said that shooter Omar Mateen “was ‘self-radicalized’ without any religious, ideological or operational support from friends, family or others in the Muslim community.” Yet it turned out that Mateen had ties to a known radical imam, one who had served as a bodyguard for the “blind sheikh” who carried out the first World Trade Center attacks.  Perhaps it was worth considering that Mateen might have targeted the gay nightclub in part because of the harsh language his mentor used towards “f****ts” in America, and Islam’s duty towards them?

To be clear, we at CounterJihad have no idea where Jeh Johnson got all that money.  We have no evidence establishing a causal relationship between the inexplicably large donation from a career public servant and his subsequent support of Brotherhood outlets, or the Brotherhood’s agenda.  We cannot even be certain that the documents establishing the donation are themselves fully genuine.  We have to be suspicious of them at first face, given that they passed through the hands of pro-Russian actors. More details here.

UNGA: Challenges Transcend Borders and National Sovereignties

Anyone remember Brexit? People across the globe are speaking out and the vote in Britain to get out of a union and regain sovereignty is a message. It is not being heard and such is the case at the United Nations General Assembly.

Borderless….policy by global leaders is promoting this, while citizens are demanding otherwise. Have you taken a moment to look at our domestic universities where classes are filled with foreign students? Have you look at how intertwined governments are with each other’s economies? When one government financially aides another to keep it from a tailspin, major strings are attached and ethical behavior and compliance with law is dismissed.

Have you seen this hashtag? #UN4RefugeesMigrants   It is the newest in vogue talking point and condition globally. To view how borderless the West is becoming, click here to see the topics of discussions planned at the United Nations.

The newest mission is to control the oceans and John Kerry is leading the way. Who owns those oceans and the sea life?

Related reading: John Kerry expresses hope over ‘life and death issue’ of oceans

The Secretary of State sees the future of the seas as a global threat equal to world conflicts.

So, back to the United Nations and how the above and much more are being covered and delivered. Chilling conditions as noted below:

President Obama is hosting the Leaders’ Summit on Refugees, alongside co-hosts Canada, Ethiopia, Germany, Jordan, Mexico and Sweden, which will appeal to governments to pledge significant new commitments on refugees. While the Leaders’ Summit will focus on refugees, not migrants, the General Assembly High-Level Summit will address large movements of both. See the full program here.

Then we have Europe:

The European Union at the United Nations

“Stronger partnerships are the building blocks of our foreign policy. All today’s challenges
transcend borders and national sovereignties. None of us, alone, can carry the weight of the
world on its shoulders.”

High Representative/ Vice-President Federica Mogherini at the UN Security Council 6 June 2016

The EU’s commitment to effective multilateralism, with the UN at its core, is a central element of its external action. The Lisbon Treaty provides that “The Union … shall promote multilateral solutions to common problems, in particular in the framework of the United Nations.” (Article 21-1 TEU) and that “The Union …shall work for a high degree of cooperation in all fields of international relations, in order to (…) preserve peace, prevent conflicts and strengthen international security, in accordance with the purposes and principles of the United Nations Charter.” (Art. 21-2)

Multilateralism is also one of the core principles and priorities in the new EU Global Strategy for Foreign and Security Policy. To respond successfully to global crises, threats and challenges, the international community needs an efficient multilateral system, founded on universal rules and values. The United Nations is both: a key EU partner and an indispensable global forum for tackling global challenges, within the overall framework of the 2030 Agenda and its 17 Sustainable Development Goals. The EU thus works closely both with the UN and in the UN.

Without global norms and the means to enforce them, peace and security, prosperity and democracy – our vital interests – are at risk. Guided by the values on which it is founded, the EU is committed to a global order based on international law, including the principles of the UN Charter. The EU will strive for a strong UN as the bedrock of the multilateral rules-based order, and develop globally coordinated responses with international and regional organisations, states and non-state actors.”

– EU Global Strategy for Foreign and Security Policy –

 

Working closely with the UN Secretariat and the various UN Agencies, Funds and Programmes, the EU has established a strong relationship with the UN. Cooperation takes place across a broad range of areas: development, human rights, climate change, peace building, crisis management, disarmament and non-proliferation, humanitarian assistance, fighting corruption and crime, addressing global health concerns, managing migratory flows and labour issues.

The UN General Assembly is the main deliberative, policymaking and representative organ of the UN. The added value of the EU is to coordinate among its 28 Member States to present a unified position.

In 2011, the UN General Assembly adopted Resolution A/65/276 upgrading the observer status allow the EU to present common positions, make interventions, present proposals and participate in the general debate each September. As an observer with enhanced status, enabling EU representatives to speak on behalf of the EU and its member states in the UN. Since then it is also the President of the European Council who delivers the EU statement in the General debate, and no longer the rotating Presidency, bringing EU representation in New York in line with Lisbon Treaty provisions. The EU has obtained a special “full participant” status in a number of important UN conferences.

The Council of the European Union adopted the EU priorities at the United Nations at the 71st United Nations General Assembly on 18 July 2016. The coming year will be focused on consolidation and implementation of the agreements reached in the past year. These include the 2030 agenda for sustainable development, the Addis Ababa action agenda of the third international conference on financing for development and the Paris climate agreement.

The EU coordinates its voting within the General Assembly’s six main committees and other bodies and agencies such as the Economic and Social Council. To this end, more than 1300 internal EU coordination meetings are held at the UN in New York alone to develop a common EU stance and speak with one voice. Article 34 of the EU Treaty also stipulates that EU members on the Security Council must act in concert and foster the interests of the EU. In 2015, the EU delivered more than 220 statements at the UN in New York, including 31 at the Security Council.

Global Security Provider

The EU has a wide range of tools available to prevent and solve crises in close cooperation with international and regional partners. For this reason, the High Representative provides regular updates to theSecurity Council and the EU is often invited to address issues of common concern, such as the fight against terrorism. Regular UN Security Council meetings on UN-EU cooperation in maintaining international peace and security are testimony to the importance both place on it.

“In our conflictual world, where power is scattered and diffuse, global peace and security only stands a chance if our nations and our regions are united. Our European Union will always come back to the United Nations, to the core of the international multilateral system, to the stubborn idea of a cooperative world order.”

HRVP briefing to UNSC 6 June 2016

The Security Council endorsed the relationship with the EU in 2014 when it adopted a presidential statement on cooperation between the EU and the UN.

Major contributor

Collectively, the EU and its Member States are the single largest financial contributor to the UN system. The sum of the contributions of the 28 EU Member States amounts to 30.38% of the UN regular budget and 33.17% of the UN peacekeeping budgets. In addition, the EU and its Member States also provide about one-half of all the voluntary contributions to UN funds and programmes. The European Commission alone contributed more than $1.5 billion to support UN external assistance programmes and projects in 2014. The European Union and its Member States retained their place as the world’s largest aid donor in 2014, according to OECD figures. In 2014, EuropeAid’s financial contributions to the UN exceeded €983 million, with the most funding going to UNDP (40%), UNICEF (18%), FAO (12%), UNRWA (10%), and WFP (8%). In 2015, ECHO (European Commission Humanitarian Aid and Civil Protection) provided €514 million (an increase from €452 in 2014) to UN agencies, funds and programmes, including €207 million to WFP, €127 million to UNHCR and €108 million to UNICEF.

UN Reform and Increased Efficiency

Effective multilateralism requires an effective United Nations at its core. The EU supports the reform of the UN system, including its bodies and organs, to ensure it is fit to address the complex, multi-sectoral challenges we face today. This should include comprehensive reform of the UN Security Council as well as revitalisation of the work of the General Assembly. The EU supports the notion that the United Nations must be ‘fit for purpose’ as well as increasingly effective and efficient, including to support successful implementation of the 2030 Agenda.

Who is Stopping the Giveaway of the Internet?

Stop Obama’s Internet giveaway

Ending ICANN could lead to censorship

By Jenny Beth Martin – – Wednesday, September 14, 2016

WashingtonTimes: The development and maintenance of the open Internet has been one of the greatest boons to the enhancement of free speech and free commerce since time began. But if the Obama Administration has its way, both will be threatened in the very near future – unless Congress acts by the end of this month to block the Obama Internet Give-Away. Will it?

Russia, China and Iran don’t have a First Amendment, and their governments regularly clamp down on free speech. So why would we want to end American protection of the open Internet and transfer it to Moscow, Beijing and Tehran instead?

On Oct. 1, the Obama administration plans to end the U.S. Government contract with the Internet Corporation for Assigned Names and Numbers, or ICANN. Doing so would kick off a transition that could irreparably harm the open Internet, leading to censorship abroad that could, quite realistically, lead to censorship right here in the United States. Under this transition of Internet oversight, China, Russia and Iran, which have all demonstrated their contempt for Internet freedom by blocking websites and restricting Internet access to their own citizens, would be newly empowered to block specific websites from users all over the world, including in the United States.

Let’s back up.

The Internet was originally launched as a project of the U.S. Defense Department’s Advanced Research Projects Agency (ARPA) in the 1960s. Then, in the 1980s, access to ARPANET was expanded courtesy of U.S. taxpayer-funded grants via the National Science Foundation, and, eventually, the Internet as we know it was developed.

So U.S. taxpayers paid for the creation, and development, and maintenance of the Internet. It is, in a very real sense, American property.

Article IV of the U.S. Constitution reads in part: “The Congress shall have Power to dispose of and make all needful Rules and Regulations respecting the Territory or other Property belonging to the United States …”

So under what authority, exactly, does President Obama claim the authority to make a decision on the disposition of a U.S. property – to wit, the Internet – without explicit permission from Congress?

Perhaps as important a question to ask is, where in the world are congressional leaders on this, and why are they not screaming bloody murder about yet another executive overreach by this overreach-hungry president?

Enter Texas Sen. Ted Cruz, who has introduced S. 3034, the Protecting Internet Freedom Act. Rep. Sean Duffy of Wisconsin has introduced a companion bill, H.R. 5418, in the House. The bills would simply prohibit the Commerce Department from moving forward on its plan unless it first wins congressional approval.

Similar legislation blocking the transfer of domain registration authority has been included in the government’s annual funding bills for the last few years. The current prohibition expires on Sept. 30. If that prohibition – embodied nicely in the Cruz-Duffy legislation – is not enacted again before Oct. 1, the administration believes it can do whatever it wants.

Cruz believes otherwise, and will be chairing a hearing of his Senate Judiciary Committee Subcommittee on Oversight, Agency Action, Federal Rights and Federal Courts on Wednesday morning to examine the subject further. The hearing, entitled “Protecting Internet Freedom: Implications of Ending U.S. Oversight of the Internet,” will begin at 10 AM.

Moreover, Cruz wants to add the provisions of his bill to the upcoming Continuing Resolution, the one piece of legislation Congress must pass and send to the president before September 30. That’s a smart play on his part.

And it would be a smart play on the part of Senate Majority Leader Mitch McConnell and House Speaker Paul Ryan to agree to add it. They’re already going to have a tough enough time winning votes for passage from among the more conservative elements of their respective GOP caucuses; adding the Cruz-Duffy provision blocking the proposed Obama Internet Give-Away would add a sweetener that could woo enough conservatives to allow the measures to pass without the leaders’ having to move left in search of Democrat votes.

And would Harry Reid or Barack Obama be so determined to give away U.S. control over the Internet that they’d be willing to shut down the government to get their way? Is that a fight either one of them would want to play out in public just five weeks before a crucial election?

Most importantly, though, Ryan and McConnell should move on the Cruz-Duffy legislation simply because it’s the right thing to do.

 

The Internet was conceived, built, developed, and grown to fruition long before Barack Obama became president. It was done at the hands of U.S. scientists and engineers, working with funds taken from U.S. taxpayers. The Internet is U.S. property. President Obama has no authority to give it away without explicit authority granted him by the U.S. Congress.

Sen. Cruz and Rep. Duffy understand that. Do leader McConnell and Speaker Ryan?