Senate passes meaningless resolution to cancel Trump’s national emergency on border wall

Make sure to let us know what you think... we now have comments turned ON below the article!

President Donald Trump tried repeatedly to have Congress appropriate adequate funds for the construction of his famed wall at the U.S.–Mexico border, to no avail. Democrats left him little choice but to declare a national emergency and use his executive authority to shift previously appropriated funds around for that purpose.

Predictably, Democrats and establishment Republicans cried foul at the move — and now, the Senate has (for the second time in six months) voted on a resolution to end the national emergency.

Just like the first attempt, however, President Trump will likely veto this move and the national emergency will continue unabated.

Senatorial temper tantrum

Breitbart reported that the Senate bill, known as S.J. Res. 54, was sponsored by two Democrats and one Republican: Tom Udall and Jeanne Shaheen — two Democrats from New Mexico and New Hampshire, respectively — and Republican Susan Collins of Maine.

The resolution, which called for an immediate termination of the national emergency declared in February by Trump, passed the Senate on Wednesday by a vote of 54–41, with nearly a dozen Republicans joining their Democratic comrades to counter the president’s lawful effort at better securing the southern border.

Ostensibly at issue in the resolution was the Senate’s opposition to Trump using his emergency powers — legislatively delegated him by Congress — to shift unused military construction funds from projects that had been canceled or delayed by the Defense Department toward the border wall.

But in reality, the resolution was little more than a legislative temper tantrum by senators upset that Trump had found a way to sidestep their obstinate obstructionism and prevail in his quest for border wall funding. And the Dems even used Republicans’ support of the military as a bargaining chip.

Repeating the same “show vote”

“A vote for the president today is a vote in favor of cutting money for our military and slashing support for critical military projects in red states as well as blue,” Senate Minority Leader Chuck Schumer (D-NY) said on the Senate floor on Wednesday, according to Politico. “My Republican colleagues should vote to terminate the emergency declaration today on constitutional grounds.”

While Schumer’s faux appeal to military families and funding may have succeeded in convincing a handful of Republicans to stand in opposition to the president, Senate Majority Leader Mitch McConnell (R-KY) called out the whole ordeal for exactly what it was: a meaningless “show vote” that will inevitably be vetoed by the president.

“Still unwilling to work with the president and Republicans on a long-term bipartisan solution for border security, Senate Democrats are making us repeat the same show vote again,” McConnell said. “I would urge my colleagues to vote for border security.”

A fruitless effort

As McConnell pointed out, this vote, forced by Democrats, was done for show and is utterly meaningless in the big picture. Indeed, it never really had a chance to succeed at stopping the declared national emergency, given the likelihood of a veto and the fact that there is not a two-thirds majority that will vote to override a veto.

As he did in March when Schumer first pitched a fit, Trump will surely veto this resolution and send it back to the Senate, where it will simply wither away until it is possibly resurrected by Schumer in another six months to repeat this meaningless process all over again.

693 Responses

  1. Hi, I do believe this is an excellent blog. I stumbledupon it 😉 I may revisit once again since i have bookmarked it. Money and freedom is the greatest way to change, may you be rich and continue to guide other people.

  2. Next time I read a blog, Hopefully it doesn’t fail me as much as this particular one. I mean, I know it was my choice to read, but I really thought you would have something helpful to say. All I hear is a bunch of complaining about something you could possibly fix if you were not too busy searching for attention.

  3. I needed to thank you for this fantastic read!! I certainly
    loved every bit of it. I have you book-marked
    to look at new stuff you post…

  4. Wow that was odd. I just wrote an very long comment but after I clicked submit my comment
    didn’t appear. Grrrr… well I’m not writing all that over again. Anyways, just wanted to say great blog!

  5. Wow, marvelous blog structure! How lengthy have you been running a blog for?
    you made running a blog glance easy. The overall look of your
    web site is wonderful, as smartly as the content material![X-N-E-W-L-I-N-S-P-I-N-X]I simply
    couldn’t go away your web site prior to suggesting that I extremely loved the
    usual info a person provide on your visitors? Is gonna be again steadily
    in order to investigate cross-check new posts.

  6. Nice post. I was checking continuously this blog and I’m impressed!
    Very helpful info particularly the last part 🙂 I care for such info a lot.
    I was looking for this certain info for a long time.
    Thank you and best of luck.

  7. Hi there this is somewhat of off topic but I
    was wanting to know if blogs use WYSIWYG editors or if you have to manually code with HTML.
    I’m starting a blog soon but have no coding skills so
    I wanted to get advice from someone with experience. Any
    help would be enormously appreciated!

  8. You’re so interesting! I don’t think I have read anything like this before.
    So wonderful to find another person with genuine thoughts on this subject matter.
    Really.. many thanks for starting this up. This site is something that is needed on the web, someone with a bit of
    originality!

  9. Everything is very open with a very clear clarification of the challenges.
    It was definitely informative. Your site is very helpful.

    Many thanks for sharing!

  10. The person-interface is totally completely
    different from the opposite platforms we’ve talked
    about to this point, for e.g. first you make a deposit
    to the Bitcoin Fog deal with, the Bitcoins are then reflected in your
    account, and then you possibly can withdraw them manually.
    As in, you didn’t purchase your Bitcoins from an change which requires KYC, or
    you didn’t use PayPal/Cards to pay in your coins. As for the community confirmations, 6
    of them are needed earlier than your coins are combined, and for inactive accounts it’ll want an extra
    15 minute after the 6 confirmations for the transaction to be processed.

    BitBlender is a reasonably basic, easy-wanting Bitcoin mixer, it is also
    a “onion-only” mixer which means its clearnet URL
    is just for info and queries, to really provoke a mixing course of
    you’ll want to make use of the Tor model of the site. I consider that covers nearly every characteristic a Bitcoin mixer
    may comprise of, or we want concern ourselves
    with isn’t it?

  11. The man or feminine could be in a whole actual niche of the room, so you may be in a work to induce their Whatsapp chats with the gadget you’re attending to
    indicate up at later instances in enlargement. Spyic could furthermore be
    a right cited WhatsApp hacking gadget that’s been doing the rounds on apex media
    stores. Spyier is one of the best apps rounds which may hack WhatsApp with out jailbreak or
    root. Fairly plenty of the opposite apps need you to jailbreak or root the target software first.
    These apps are discreet, come up along with your money’s worth, and most significantly artwork successfully.

    As we stated prior, presently not all WhatsApp programmers by way of amount equipment are as usually as doable depending on. In reality, it might get you the WhatsApp messages of any cellphone even in case you might be in an entire extraordinary corner of the world.

  12. While making an attempt to hack a cellular phone, it is vital to contemplate the kind
    of smartphones vulnerable to these attacks. In this sort of hack, you
    possibly can management the settings of the machine and the
    person would haven’t any knowledge of this. It’s a must to
    send a text message stating “You are being hacked” on the goal cellphone at midnight.
    Then an utility is run on the cellphone to retrieve knowledge.

    They principally work by spoofing as a genuine cell tower after which intercept the
    indicators in the encircling area. These instruments are particularly
    for hacking cell phones secretly. A lot of the protocols which cellphones use aren’t completely safe-not to
    mention old! The apps on our smartphones have access to all the information on our telephones.
    As PCs don’t have SMS capabilities, these hacks are restricted to smartphones.
    IMSI catchers (International Cellular Subscriber Identifier) are also referred to as Stingray (a
    brand identify that manufactures hacking tools), Cell Site Simulator,
    and False Towers.

  13. It’s a good suggestion to reserve your brand’s handle on all social media channels, even in case you don’t plan to use them all immediately.
    However they need to maintain a superb relationship together with
    your company’s IT department to ensure advertising and IT work together to mitigate risk.
    That is the individual group members should turn to if they ever make a mistake on social that might expose the corporate to threat of any variety.
    You possibly can control access and permission, so each particular person will get
    only the entry they want. But it’s important to verify that you’re coping with
    the actual particular person reasonably than an imposter.
    However it’s essential not to ignore the accounts you don’t use yet, the ones you stopped using,
    or don’t use usually. That features the ones you utilize daily and those you’ve registered but never used at all.
    You need to use Hootsuite to give workers or contractors the
    power to draft messages.

  14. KidsGuard Professional for Android provides the function of monitoring
    the real-time location as properly because the historic
    location. Apart from the Telegram hacking and monitoring feature, KidsGuard Professional for Android will be
    even be used to learn Instagram messages, observe WhatsApp, Facebook, Snapchat, and other common social media
    apps. As soon as you do that, the goal gadget user’s Telegram will open on your system and once
    this is finished, all incoming and outgoing messages and different data shared on Telegram will be simply viewed by
    you. Step 2. Decide the nation from the drop-down menu and enter the goal device person’s telephone quantity
    which is linked to their Telegram account after which click on “Subsequent”.
    The hackers ran the rip-off final yr and were in a position to acquire subscriber addresses, cellphone
    numbers and IP addresses, according to the report.

    Baby hackers posing as legislation enforcement
    officials have been able to dupe Meta and Apple into handing
    over buyer information, in keeping with a brand new report.

  15. What makes this cell phone totally different
    from the remaining is that our monitoring software program has been embedded inside the phone and is at all times transmitting location knowledge.
    Our monitoring software takes the GPS signals and interprets them into actual life coordinates on a Google map.
    Our tracking software takes the GPS signals and translates them into
    real life coordinates on a map. The primary half is the Cellular phone with our Tracking Software program loaded
    onto it. Sure mobile phone features are dependent on the capabilities and settings
    of your service provider’s network. Always contact your service provider about characteristic availability and functionality.

    Guardian Angel Know-how keeps up with the latest cellular phone trends so
    as to supply phones your youngsters will truly want.
    Guardian Angel GPS cell telephones let parents remotely monitor
    youngsters’s and teens’ location and even automobile velocity by way of a web
    site.

  16. She was very a lot in shock and due to the enormous quantity of smoke pouring in through the vents she thought the automobile was
    going to blow up, however there was no getting her out, so I bought as a
    lot of myself as I could in by way of the busted-out window and held her.
    We dwell in such a busy, isolated society, there’s a lot loneliness and sorrow .
    If you’ve never heard of SparkPeople earlier
    than, or in the event you don’t spend time
    online, this ebook will ship all the things you need to discover
    this new way of thinking and to put it into follow.
    Changing your life in a vacuum could be very lonely; human beings
    are communal creatures who need each other. Or
    possibly you envision one thing extra particular, like our
    member who dreamed of becoming a police officer, but was so heavy he had trouble getting off of his couch.

  17. you are in reality a just right webmaster. The web site loading
    speed is amazing. It kind of feels that you are doing any unique trick.
    Also, The contents are masterwork. you have done a
    excellent activity in this topic!

Leave a Reply to watch free movies Cancel reply

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Popular