Diasters

Drone Warfare — Videos

Posted on August 2, 2014. Filed under: American History, Blogroll, Bomb, Books, Communications, Computers, Constitution, Crime, Crisis, Data, Diasters, Documentary, Drones, Drug Cartels, Federal Communications Commission, Federal Government, Films, Foreign Policy, Freedom, Friends, Genocide, government, government spending, Heroes, history, Homicide, Islam, Language, Law, liberty, Life, Links, media, Missiles, National Security Agency (NSA_, Natural Gas, Oil, People, Philosophy, Photos, Politics, Press, Psychology, Radio, Radio, Rants, Raves, Resources, Security, Strategy, Talk Radio, Technology, Terrorism, Transportation, Video, War, Weapons | Tags: , , , , , , , , , , , |

Obama defends US drone attacks

Peter Singer: Drone Warfare

The Morality of Drone Warfare

DRONE WARS, PART ONE: THE DRONE LANDSCAPE

DRONE WARS, PART TWO: THE DRONE ECONOMY

DRONE WARS, PART THREE: THE DRONE MORALITY

Drone Boom Why Drones Aren’t Just for Dropping Bombs Anymore

Drone Laws Restrict Civilian UAV’s but allow Government

Rise of the Drones(full documentary)HD

RISE OF THE DRONES – NOVA (full documentary)

The Costs of Drone Warfare – Documentary

Richard Clarke – U.S. Drone Program Under Obama “Got Out of Hand”

EVERYONE needs to see this! Drone Strikes

Top 10 Drones in the world

ex CEO Colin Guinn is ALIVE, Files legal Injunction against DJI Innovations

Related Posts On Pronk Palisades

Obama On War, Peace and Drones To Kill Radical Islamic Jihad Terrorists — National Defense University Speech, May 23, 2013 — Videos

Obama’s Kill List–Drones–Remotely Piloted Aircraft–RPAs–Killing Machines–We Don’t Torture Terrorists–We Kill Americans, Civilians and Children in Undeclared Wars–Obama is Judge, Jury, and Executioner–Hope, Change, and Murder, Inc.–The Mass Murderer In The White House–Videos

NSA–Now Spying on Americans: Big Brother Government Spying On Americans–Progressives Minding Your Business Without Warrants–Remotely Piloted Aircraft a.k.a.Drones–Foreign Intelligence Surveillance Act (FISA)–Cyber Intelligence Sharing and Protection Act (CISA)–Videos

Read Full Post | Make a Comment ( None so far )

George J. Borjas — Heaven’s Door: Immigration Policy and The American Economy — Videos

Posted on July 22, 2014. Filed under: American History, Blogroll, College, Communications, Data, Demographics, Diasters, Economics, Education, Federal Government, Federal Government Budget, Fiscal Policy, Freedom, government, government spending, history, History of Economic Thought, Illegal, Immigration, Investments, Language, Law, Legal, liberty, Life, Literacy, Macroeconomics, media, Microeconomics, People, Philosophy, Photos, Politics, Rants, Raves, Regulations, Talk Radio, Tax Policy, Technology, Unemployment, Video, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , |

george_borjas

George J. Borjas: Costs of Immigration – Economics Roundtable

The Implications of Economics for Immigration Policy

The 2012 Richard Grandin Shepherd Lecture in Economics at Kenyon College by George Borjas

.@fordschool – Immigration, Public Policy, and the Skills Debate Panel

 

 

George J. Borjas

From Wikipedia, the free encyclopedia
George J. Borjas
Born Jorge Jesus Borjas
October 15, 1950 (age 63)
Havana, Cuba
Residence Lexington, Massachusetts
Citizenship American
Fields Economist
Institutions Harvard Kennedy School
Alma mater St. Peter’s College
Columbia University
Known for research on immigration

George Jesus Borjas (born Jorge Jesus Borjas; October 15, 1950)[1] is an American economist and the Robert W. Scrivner Professor of Economics and Social Policy at the Harvard Kennedy School.[2] He is most well known for his advocacy of reducing the rates of immigration to the United States.

Personal life and education

Borjas was born in Havana, Cuba on October 15, 1950. He migrated to the United States in October, 1962 with his mother. He graduated with a B.S. in economics and mathematics from St. Peter’s College in 1971. He then completed his M.A. in economics from Columbia University in 1974. He completed his M.Phil and Ph.D. in economics from Columbia in 1975 for thesis titled Job Investment, Labor Mobility and Earnings.[3]

He is married and has three children.[3]

Academic career

Borjas became an assistant professor of economics at Queens College, City University of New York from 1975 to 1977. He was a post-doctoral fellow at the Department of Economics, University of Chicago from 1977 to 1978. He was also a Senior Research Analyst, National Bureau of Economic Research from 1972 to 1978.[3]

He joined the faculty at the University of California, Santa Barbara in 1980 and remained there for ten years. He then became a professor at the University of California, San Diego from 1990 to 1995. He joined the faculty at Harvard University in 1995.[3]

Work

Borjas was called ‘America’s leading immigration economist’ by BusinessWeek and The Wall Street Journal. He is an influential figure in the debate on immigration and his research on the economic impact of immigration plays a central role in the debate over immigration policy in the United States.[1]

He has written many books and has published more than 100 articles in books and scholarly journals, including the American Economic Review, the Journal of Political Economy, and the Quarterly Journal of Economics.[2] His most recent book is Immigration Economics (Cambridge, MA: Harvard University Press, 2014).

Honors

Borjas was listed in Who’s Who in the World, Who’s Who in America, Who’s Who in Finance and Industry and Who’s Who in Economics. He was elected a fellow of the Econometric Society in 1998 and a fellow of the Society of Labor Economists in 2004. He was also a member of the Council of Economic Advisors for the Governor of California from 1993 to 1998, of the National Academy of Sciences Panel on the Demographic and Economic Impact of Immigration from 1995 to 1997, and chaired the National Science Foundation’s Committee of Visitors for the Economics Program in 1996.[2]

In 2011 he was named co-winner of the IZA Prize in Labor Economics.[4]

Books

The following are the books published by Borjas.

  • Wage Policy in the Federal Bureaucracy (American Enterprise Institute, 1980)
  • Friends or Strangers: The Impact of Immigrants on the U.S. Economy (Basic Books, 1990)
  • Labor Economics (McGraw-Hill, 1996; 2nd Edition, 2000, 3rd edition, 2005, 4th edition, 2008, 5th edition, 2010,)
  • Heaven’s Door: Immigration Policy and the American Economy (Princeton University Press, 1999)

References

  1. Davis, Bob (April 26, 1996). “Despite His Heritage, Prominent Economist Backs Immigration Cut”. The Wall Street Journal. Retrieved 2008-06-30.[dead link]
  2. “Biography of George J. Borjas”. Harvard University. Retrieved 2008-06-30.[dead link]
  3. “Curriculum Vitae of George J. Borjas” (pdf). Harvard University. Retrieved 2008-06-30.
  4. George Borjas Named Co-Winner of 2011 IZA Prize in Labor Economics Harvard Kennedy School, July 21, 2011. Retrieved December 1, 2012

External links

Read Full Post | Make a Comment ( None so far )

Peter Brimelow — Alien Nation: Common Sense About America’s Immigration Disaster — Videos

Posted on July 21, 2014. Filed under: American History, Blogroll, Books, British History, Business, Catholic Church, Communications, Computers, Demographics, Diasters, Economics, Employment, Family, Federal Government, Foreign Policy, Freedom, Friends, government spending, history, Illegal, Immigration, IRS, Islam, Language, Law, Legal, liberty, Life, Links, Literacy, media, Medicine, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Politics, Press, Psychology, Public Sector, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Shite, Strategy, Sunni, Talk Radio, Taxes, Technology, Terrorism, Unemployment, Unions, Video, War, Water, Wealth, Weather, Welfare, Wisdom | Tags: , , , , , , , |

aliennation

peter_brimelow

VDARE.com

What Price Mass Immigration – Peter Brimelow Introduction

 

Peter Brimelow of VDare on How Republican Party Has to be More White

Alien Nation: America’s Immigration Disaster

Mr. Brimelow discussed his book Alien Nation: Common Sense About America’s Immigration Disaster, published by Random House. The book focuses on U.S. immigration policy and cycles of control on immigration. Mr. Brimelow argues that legislation passed in 1965 has resulted in negative trends in immigration to the United States, including an influx of immigrants from a very few countries that he says are engulfing America. The author says that the latest immigration wave consists of immigrants who are less educated, less skilled, and less likely to share American ideals, which he argues is a detriment to American culture.

Peter Brimelow Reflects on Immigration in America, Post-Alien Nation

Michael Coren Interviews Peter Brimelow

Peter Brimelow, Immigration Road to Hell

Peter Brimelow speaks CPAC 2012

Inequality and Immigration (1 of 3)

Inequality and Immigration (2 of 3)

Inequality & Immigration (3 of 3)

Peter Brimelow On Western Culture At The Thomas Jefferson Club

The Libertarian Case Against Open Immigration | Peter Brimelow

Related Articles and Videos

George J. Borjas: Costs of Immigration – Economics Roundtable

 

Read Full Post | Make a Comment ( None so far )

Breaking News: Malaysian Airline Flight MH 17 Shot Down by Surface To Air Missile — 280 Passengers and 15 Crew Dead — Videos

Posted on July 17, 2014. Filed under: American History, Blogroll, British History, Communications, Computers, Diasters, Economics, Education, Foreign Policy, Language, Law, Links, media, People, Philosophy, Photos, Politics, Rants, Raves, Resources, Technology, Video, War, Weapons | Tags: , , , , , , , |

 

 

 

Ukraine Adviser: Malaysian Airlines Jet Shot Down By Missile Near Ukraine-Russia Border

this_image_of_the_passenger_plane_crash_was_posted_on_twitter_Master

 

Mayalsia Airlines Flight crashes in Ukraine

Ukraine-says-Malaysian-airliner-shot-down-295-dead

1405616690787_wps_8_plane_crash_Graphic

207cc_-_Malaysia_Airlines_Boeing_777-2H6ER

malaysiaairlinesboeing777-200

Russia Syrian GameBUK-MISSILE-570

 

airliner_shot_down

airliner_shot_down_2

MH17 crash

Buk-M2 SAM In Action

Malaysian Ailrner Shot Down Over Ukraine – 295 Dead

UPDATE Missile downs Malaysia Airlines MH17

Malaysia Plane crash Malaysia Airlines plane crash mh17 explode over Ukraine TRAGEDY

Malaysia Airlines flight crashes in Ukraine | BREAKING NEWS – 17 JULY 2014

Malaysian Airlines plane crash: passenger jet shot down over Ukraine, 295 dead

[y0utube=http://www.youtube.com/watch?v=k1iPi9wfc5Q]

Malaysia Airlines Plane Crash in Ukraine MH17 Flight Shot Down (17 July 2014)

Here’s The Rocket That Shot Down A Malaysian Airlines Flight

Malaysia Plane shot down over Ukraine Malaysia Plane crash video 295 dead 17 07 2014

All 295 Passengers confirmed Dead of Malaysia Airliner MH17 that shot down in eastern Ukraine

Malaysia Plane Crash: Obama Speech About Plane Shot Down | Malaysia Airlines Crash

Malaysian Airplane Shot Down over Ukraine 295 people on board Airplane Shot Down Malaysia

Malaysia Airlines Plane Shot Down And Crashes in Ukraine | VIDEO

Malaysia Airlines Passenger Jet Shot Down Over Ukraine, 295 Dead – Actual Images

BREAKING: Malaysia Plane Crash Malaysia Airlines | Plane Shot Down And Killed 280 People | VIDEO

Marketing video Russian Air Defense Systems S-400, Buk M2 and Tor M2 shooting at US Air Force

US Concludes Malaysian Airline was Shot Down, Both Russia and Ukraine Deny Involvment

US Concludes Malaysian Airline was Shot Down, Both Russia and Ukraine Deny Involvment
One radar system saw a surface-to-air missile system turn on and track an aircraft right before the plane went down Thursday, according to the official. Photo:mashable.com

The United States has concluded the Malaysian airline was shot down, a senior U.S. official told CNN’s Barbara Starr. They are analyzing the trajectory of the missile to try to learn where the attack came from.

“[US intelligence has] another asset that gives them a heat signature, an infrared heat signature that tells them there was a massive event … they put both of these pieces of information together and concluded that the plane was shot down,” Starr said.

One radar system saw a surface-to-air missile system turn on and track an aircraft right before the plane went down Thursday, according to the official. A second system saw a heat signature at the time the airliner was hit, the official said.

US intelligence is reportedly still working to determine the exact location from which the missile was fired, and whether it was on the Russian or the Ukrainian side of the border.

The UN Security Council plans to hold an emergency meeting over the shooting down of Malaysian airliner in Ukraine, and the deteriorating situation in the country. The meeting was called in by the UK, Itar-tass reports.

NATO’s chief Anders Fogh Rasmussen has also urged an immediate international investigation into the crash of the Malaysia Airlines MH17 plane in Eastern Ukraine, RIA-Novosti news agency reports.

“No surface-to-air systems are involved in the military operation against separatists in the east, and the plane was out of reach of other Ukrainian air defence forces,” the statement from Ukraine’s Defence Ministry added.

Yet, The Ukrainian military reportedly deployed a battery of Buk surface-to-air missile systems, capable of bringing down high-flying jets, to the Donetsk region the day before the Malaysian passenger plane crashed in the area.

Itar-Tass and Interfax news agencies are citing a source familiar with the issue, who said that another battery of Buk systems is currently being prepared for shipment to Donetsk region from the Ukrainian city of Kharkov.

Meanwhile, Ukraine’s state security chief accused two Russian military intelligence officers of involvement in the downing of a Malaysian passenger plane on Thursday. The SBU chief Valentin Nalivaychenko added they must be punished for their “crime.” The Ukrainian official said he based his allegation on intercepts of phone conversations between the two officers.

The purported telephone intercepts have been posted to YouTube (Russian), as have past recordings of alleged conversations between rebels, some of whom are accused of being agents with Russian agents.

In the recordings, men nicknamed “Demon”, “Mayor,” and “Grek” panic and curse as they realize they’ve shot down a passenger plane and killed civilians, describing to each other the “bodies of women and children”.

The authenticity of the recordings, however, cannot be confirmed.

IHS Jane’s Defense analyst, Nick de Larrinaga, shared the belief that the self-defense forces lack the capability to bring the Malaysian plane down.

“At normal cruising altitude a civilian passenger aircraft would be out of the range of the sort of manned portable air (defense) systems that we have seen proliferate in rebel hands in east Ukraine,” he said in a statement.

But the aircraft would be within range of Buk or other medium-range surface-to-air missile systems, he stressed.

“Both Russia and Ukraine have such SAM systems in their inventories,” the expert added.

It seems unlikely that the self-defense forces could’ve used Buk surface-to-air missile systems to down the Malaysian plane, retired Brig. Gen. Kevin Ryan, the director of the Defense and Intelligence Project at the Belfer Center for Science and International Affairs, said.

“It takes a lot of training and a lot of coordination to fire one of these and hit something,” he told CNN. “This is not the kind of weapon a couple of guys are going to pull out of a garage and fire.”

According to Ryan, if the plane was really taken down then it was done by a professional military force.

http://www.independent.mk/articles/7367/US+Concludes+Malaysian+Airline+was+Shot+Down,+Both+Russia+and+Ukraine+Deny+Involvment

Ukraine Adviser: Malaysian Airlines Jet Shot Down By Missile Near Ukraine-Russia Border

A picture taken on July 17, 2014 shows wreckage of the Malaysian Airliner carrying 295 people from Amsterdam to Kuala Lumpur after it crashed, near the town of Shaktarsk, in rebel-held east Ukraine. (credit: DOMINIQUE FAGET/AFP/Getty Images)

A picture taken on July 17, 2014 shows wreckage of the Malaysian Airliner carrying 295 people from Amsterdam to Kuala Lumpur after it crashed, near the town of Shaktarsk, in rebel-held east Ukraine. (credit: DOMINIQUE FAGET/AFP/Getty Images)

Ukraine said a Malaysia Airlines passenger plane carrying 295 people was shot down Thursday as it flew over the country, and both the government and the pro-Russia separatists fighting in the region denied any responsibility for downing the plane.

As plumes of black smoke rose up near a rebel-held village of Grabovo in eastern Ukraine, an Associated Press journalist counted at least 22 bodies at the crash site 40 kilometers (25 miles) from the Russian border.

Photos: Crash Scene in Ukraine

Anton Gerashenko, an adviser to Ukraine’s interior minister, said on his Facebook page the plane was flying at an altitude of 10,000 meters (33,000 feet). He also said it was hit by a missile fired from a Buk launcher, which can fire missiles up to an altitude of 22,000 meters (72,000 feet).

A similar launcher was seen by Associated Press journalists near the eastern Ukrainian town of Snizhne earlier Thursday.

Malaysia Airlines confirmed that it received notification from Ukrainian aviation authorities that it had lost contact with flight MH17 at 1415 GMT some 30 kilometers (20 miles) from Tamak waypoint, approximately 50 km (30 miles) from the Russia-Ukraine border.

It said the plane had 280 passengers and 15 crew aboard a Boeing 777 that left Amsterdam at 12.15 p.m. and was to arrive at Kuala Lumpur International Airport at 6.10 a.m. Friday.

CBS News had yet to confirm if the Boeing 777 was shot down.

RELATED: Stay up-to-date with our Live Blog

Interfax reports that the Ukrainian Interior Ministry says that everyone on board was killed. The Interior Ministry claims that 23 Americans were killed in the crash, according to Interfax. The State Department is looking into whether Americans were on the flight.

A source told Interfax that the plane “began to drop, afterwards it was found burning on the ground on Ukrainian territory.”

Reuters reports that body parts have been scattered seven miles within the crash site, an indication that the plane came apart mid-air. A Ukrainian Emergency Ministry official told Reuters that first responders have found at least 100 bodies.

Ukrainian pro-separatists have denied responsibility for the Malaysian Airlines civilian jet crash as Ukrainian President Petro Poroshenko says his country’s military did not shoot down the plane.

“We do not exclude that this plane was shot down, and we stress that the Armed Forces of Ukraine did not take action against any airborne targets,” Poroshenko stated.

Poroshenko said “we are sure that those who are guilty in this tragedy will be held responsible.”

According to Interfax, Poroshenko called it a “terrorist act.”

The Ukrainian Foreign Ministry claims in a statement obtained by CBS News that Russia is complicit, if not responsible, for the downing of the plane.

“The plane was shot down, because the Russian air defense systems was affording protection to Russian mercenaries and terrorists in this area,” the statement read.

Dmitry Peskov, spokesman for Russian President Vladimir Putin, told The Guardian that allegations that Russia was behind the crash was just sheer “stupidity.”

CBS News reports that President Barack Obama has been briefed on the crash. Obama has instructed his team to be in touch with Ukrainian authorities.

“The world is watching reports of a downed passenger jet at the Russia-Ukraine border and it looks like it might be a terrible tragedy,” Obama said during an event held in Wilmington, Del., adding that the U.S. is working on confirming if Americans were on the flight.

During a phone call with Obama Thursday morning to express his dissatisfaction to the latest economic sanctions, Russian President Vladimir Putin brought up that there were early reports of a downed Malaysian Airlines jet in Ukraine, CBS News reports.

The Federal Aviation Administration tells CBS News that the agency prohibited U.S. carriers from flying through this region.

It was the second time that a Malaysia Airlines plane was lost in less than six months. Malaysia Airlines Flight 370 disappeared in March while en route from Kuala Lumpur to Beijing. It has not been found, but the search has been concentrated in the Indian Ocean far west of Australia.

Malaysian Defense Minister Hishamuddin Hussein said on Twitter there’s no confirmation that Thursday’s plane was shot down. He said he has instructed the country’s military to check and get confirmation.

The Donetsk region government said Thursday’s plane crashed near a village called Grabovo, which it said is currently under the control of armed pro-Russian separatists. The region where the flight was lost has seen severe fighting between Ukrainian forces and pro-Russia separatist rebels in recent days.

A launcher similar to the Buk missile system was seen by Associated Press journalists near the eastern Ukrainian town of Snizhne, which is held by pro-Russia rebels, earlier Thursday.

On Wednesday evening, a Ukrainian fighter jet was shot down by an air-to-air missile from a Russian plane, Ukrainian authorities said Thursday, adding to what Kiev says is mounting evidence that Moscow is directly supporting the separatist insurgents in eastern Ukraine. Security Council spokesman Andrei Lysenko said the pilot of the Sukhoi-25 jet hit by the air-to-air missile was forced to bail after his jet was shot down.

Pro-Russia rebels, meanwhile, claimed responsibility for strikes Wednesday on two Ukrainian Sukhoi-25 jets. The Ukrainian Defense Ministry said the second jet was hit by a portable surface-to-air missile, but added the pilot was unscathed and managed to land his plane safely

Moscow denies Western charges that is supporting the separatists or sowing unrest in its neighbor. The Russian Defense Ministry couldn’t be reached for comment Thursday about the Ukrainian jet and Russia’s foreign ministry didn’t respond to multiple requests for comment.

Earlier this week, Ukraine said a military transport plane was shot down Monday by a missile fired from Russian territory.

The Malaysia Airlines plane is a Boeing 777-200ER, which was delivered to Malaysia Airlines on July 30, 1997, according to Flightglobal’s Ascend Online Fleets, which sells and tracks information about aircraft. It has more than 43,000 hours of flight time and 6,950 takeoffs and landings.

If the plane was shot down, it would be the fourth commercial airliner to face such a fate. The previous three were:

- April 20, 1978: Korean Airlines Flight 902, which diverted from its planned course on a flight from Paris to Seoul and strayed over the Soviet Union. After being fired upon by an interceptor aircraft, the crew made a forced landing at night on the surface of a frozen lake. Two of the 97 passengers were killed by the hostile fire.

- Sept. 1, 1983: Korean Air Lines Flight 007 shot down by at least one Soviet air-to-air missile after the 747 had strayed into Soviet airspace. All 240 passengers and 29 crew were killed.

- July 3, 1988: Iran Air Flight 655 Aircraft was shot down by a surface to air missile from the American naval vessel U.S.S. Vincennes. All 16 crew and 274 passengers were killed

Read Full Post | Make a Comment ( None so far )

State and Central Banking: Killing and Fleecing The People Massively — Financing War — Videos

Posted on June 18, 2014. Filed under: American History, Banking, Blogroll, Communications, Constitution, Diasters, Economics, Education, Employment, Faith, Family, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, Genocide, government, government spending, history, History of Economic Thought, Investments, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, Microeconomics, Monetary Policy, Money, People, Philosophy, Rants, Raves, Regulations, Resources, Tax Policy, Taxes, Technology, Unemployment, Video, War, Wealth, Weapons, Welfare, Wisdom | Tags: , , , , , |

lew_rockwell

lew_rockwell

Mises

War and the Fed | Lew Rockwell

Lew Rockwell explains how the Federal Reserve Enables War, Empire, and Destroys the Middle Class

Economics and Moral Courage | Llewellyn H. Rockwell, Jr.

The Misesian Vision | Llewellyn H. Rockwell, Jr.

Read Full Post | Make a Comment ( None so far )

Producers vs. Moochers: Obama’s Execution of The Cloward-Piven Strategy: Food Stamps, Medicaid, Welfare, Disability Benefits, Earned Income Credits, Obamacare, Student Loans, Veterans Administration, Open Borders, Massive Deficits and Debts, Unsustainable Unfunded Liabilities, High Unemployment Rates — Legal Status — Amnesty — Citizenship for 30-50 Million Illegal Aliens — Overloading The Welfare System — Democratic Progressive Party Tyranny — Obama’s Unconstrained Utopian Vision– Videos

Posted on June 12, 2014. Filed under: American History, Blogroll, Communications, Crisis, Diasters, Economics, Employment, Faith, Family, Federal Government, Federal Government Budget, Fiscal Policy, Food, Freedom, Friends, government spending, Health Care, history, Inflation, liberty, Life, Literacy, media, Obamacare, People, Philosophy, Politics, Public Sector, Rants, Raves, Resources, Strategy, Talk Radio, Tax Policy, Taxes, Terrorism, Unions, Video, Welfare | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 276: June 10, 2014

Pronk Pops Show 275: June 9, 2014

Pronk Pops Show 274: June 6, 2014

Pronk Pops Show 273: June 5, 2014

Pronk Pops Show 272: June 4, 2014

Pronk Pops Show 271: June 2, 2014

Pronk Pops Show 270: May 30, 2014 

Pronk Pops Show 269: May 29, 2014

Pronk Pops Show 268: May 28, 2014

Pronk Pops Show 267: May 27, 2014

Pronk Pops Show 266: May 23, 2014

Pronk Pops Show 265: May 22, 2014

Pronk Pops Show 264: May 21, 2014

Pronk Pops Show 263: May 20, 2014

Pronk Pops Show 262: May 16, 2014

Pronk Pops Show 261: May 15, 2014

Pronk Pops Show 260: May 14, 2014

Pronk Pops Show 259: May 13, 2014

Pronk Pops Show 258: May 9, 2014

Pronk Pops Show 257: May 8, 2014

Pronk Pops Show 256: May 5, 2014

Pronk Pops Show 255: May 2, 2014

Pronk Pops Show 254: May 1, 2014

Pronk Pops Show 253: April 30, 2014

Pronk Pops Show 252: April 29, 2014

Pronk Pops Show 251: April 28, 2014

Pronk Pops Show 250: April 25, 2014

Pronk Pops Show 249: April 24, 2014

Pronk Pops Show 248: April 22, 2014

Pronk Pops Show 247: April 21, 2014

Pronk Pops Show 246: April 17, 2014

Pronk Pops Show 245: April 16, 2014

Pronk Pops Show 244: April 15, 2014

Pronk Pops Show 243: April 14, 2014

Pronk Pops Show 242: April 11, 2014

Pronk Pops Show 241: April 10, 2014

Pronk Pops Show 240: April 9, 2014

Pronk Pops Show 239: April 8, 2014

Pronk Pops Show 238: April 7, 2014

Pronk Pops Show 237: April 4, 2014

Pronk Pops Show 236: April 3, 2014

Pronk Pops Show 235: March 31, 2014

Pronk Pops Show 234: March 28, 2014

Pronk Pops Show 233: March 27, 2014

Pronk Pops Show 232: March 26, 2014

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

 Story 1:Producers vs. Moochers:  Obama’s Execution of The Cloward-Piven Strategy: Food Stamps, Medicaid, Welfare, Disability Benefits, Earned Income Credits, Obamacare, Student Loans, Veterans Administration, Open Borders, Massive Deficits and Debts, Unsustainable Unfunded Liabilities,   High Unemployment Rates — Legal Status — Amnesty — Citizenship for 30-50 Million Illegal Aliens — Overloading The Welfare System — Democratic Progressive Party Tyranny — Obama’s Unconstrained Utopian Vision– Videos

cloward-piven

cloward-and-piven

Cloward-Piven

org_chart_howard_piveni

rules-for-radicals

obama-read

obama_rules_radicals

rules_radicals

barack-meme-generator-using-cloward-piven-usa-will-be-bankrupt-and-ripe-for-communist-revolutionrules-for-radicals (1)

the-cloward-piven-model-spendgali-politics

Saul Alinsky’s 12 Rules for Radicals

Here is the complete list from Alinsky.

* RULE 1: “Power is not only what you have, but what the enemy thinks you have.” Power is derived from 2 main sources – money and people. “Have-Nots” must build power from flesh and blood. (These are two things of which there is a plentiful supply. Government and corporations always have a difficult time appealing to people, and usually do so almost exclusively with economic arguments.)
* RULE 2: “Never go outside the expertise of your people.” It results in confusion, fear and retreat. Feeling secure adds to the backbone of anyone. (Organizations under attack wonder why radicals don’t address the “real” issues. This is why. They avoid things with which they have no knowledge.)
* RULE 3: “Whenever possible, go outside the expertise of the enemy.” Look for ways to increase insecurity, anxiety and uncertainty. (This happens all the time. Watch how many organizations under attack are blind-sided by seemingly irrelevant arguments that they are then forced to address.)
* RULE 4: “Make the enemy live up to its own book of rules.” If the rule is that every letter gets a reply, send 30,000 letters. You can kill them with this because no one can possibly obey all of their own rules. (This is a serious rule. The besieged entity’s very credibility and reputation is at stake, because if activists catch it lying or not living up to its commitments, they can continue to chip away at the damage.)
* RULE 5: “Ridicule is man’s most potent weapon.” There is no defense. It’s irrational. It’s infuriating. It also works as a key pressure point to force the enemy into concessions. (Pretty crude, rude and mean, huh? They want to create anger and fear.)
* RULE 6: “A good tactic is one your people enjoy.” They’ll keep doing it without urging and come back to do more. They’re doing their thing, and will even suggest better ones. (Radical activists, in this sense, are no different that any other human being. We all avoid “un-fun” activities, and but we revel at and enjoy the ones that work and bring results.)
* RULE 7: “A tactic that drags on too long becomes a drag.” Don’t become old news. (Even radical activists get bored. So to keep them excited and involved, organizers are constantly coming up with new tactics.)
* RULE 8: “Keep the pressure on. Never let up.” Keep trying new things to keep the opposition off balance. As the opposition masters one approach, hit them from the flank with something new. (Attack, attack, attack from all sides, never giving the reeling organization a chance to rest, regroup, recover and re-strategize.)
* RULE 9: “The threat is usually more terrifying than the thing itself.” Imagination and ego can dream up many more consequences than any activist. (Perception is reality. Large organizations always prepare a worst-case scenario, something that may be furthest from the activists’ minds. The upshot is that the organization will expend enormous time and energy, creating in its own collective mind the direst of conclusions. The possibilities can easily poison the mind and result in demoralization.)
* RULE 10: “If you push a negative hard enough, it will push through and become a positive.” Violence from the other side can win the public to your side because the public sympathizes with the underdog. (Unions used this tactic. Peaceful [albeit loud] demonstrations during the heyday of unions in the early to mid-20th Century incurred management’s wrath, often in the form of violence that eventually brought public sympathy to their side.)
* RULE 11: “The price of a successful attack is a constructive alternative.” Never let the enemy score points because you’re caught without a solution to the problem. (Old saw: If you’re not part of the solution, you’re part of the problem. Activist organizations have an agenda, and their strategy is to hold a place at the table, to be given a forum to wield their power. So, they have to have a compromise solution.)
* RULE 12: Pick the target, freeze it, personalize it, and polarize it.” Cut off the support network and isolate the target from sympathy. Go after people and not institutions; people hurt faster than institutions. (This is cruel, but very effective. Direct, personalized criticism and ridicule works.)

dependencyrulers

cycle of government dependency

John Stossel – A Nation Of Moochers

John Stossel – Serious Crony Capitalism

How Crony Capitalism Corrupts the Free Market | David Stockman

David Stockman on TARP, the Fed, Ron Paul and Reagan [FULL VERSION]

The Forgotten Cause of Sound Money | David Stockman

Carmen Reinhart on Financial Crisis and Fiscal Policy

Kenneth Rogoff – Why Austerity is right & Growth is critical (19.12.12)

Record Number Of Americans Receiving Disability Benefits – Stuart Varney – America’s Newsroom

Number Of People On Food Stamps Up 70% Since 2008 – America’s News HQ

Economics 101-The Dangers Of Government Dependency

Opinion: The Government Dependency Trap

Land of The Freebies, Home of the Enslaved

Is Government Dependence the New American Way – Working Doesn’t Pay

Welfare fraud investigation

Mark Levin: The Cloward Piven & Obama strategy

Matthew Vadum on Glenn Beck Program, May 28, 2009 (replayed June 4, 2009)

Glenn Beck Learns About Cloward-Piven Strategy of Orchestrated Crisis

The Cloward/Piven Strategy 1

The Cloward/Piven Strategy 2

The Cloward/Piven Strategy 3

The Cloward/Piven Strategy 4

The Cloward/Piven Strategy 5

The Cloward/Piven Strategy 6

Frances Fox Piven’s opinion of Glenn Beck

Professor Frances Fox Piven on Glenn Beck targeting her

Saul Alinsky speaking at UCLA 1/17/1969

Alinsky for Dummies (Mr. Joseph A. Morris – Acton Institute)

02-05-13 Macro Analytics – The Cloward Piven Strategy

What In The World Is Cloward-PIven (and is it working?)

The End of America….The Cloward-Piven Strategy

complete cloward piven strategy project

Cloward Piven Strategy

Fall 2010 Marc Sumerlin Lecture Series Featuring Prof. Carmen Reinhart

MILTON FRIEDMAN-what alinsky never told obama..

Milton Friedman Versus A Socialist

Thomas Sowell – Frances Fox Piven vs. Milton Friedman

Obama’s Vision for America by Thomas Sowell!

Thomas Sowell and a Conflict of Visions

Blues Brothers – Minnie the Moocher (Cab Calloway)

 

Barack Obama and the Strategy of Manufactured Crisis

America waits with bated breath while Washington struggles to bring the U.S. economy back from the brink of disaster. But many of those same politicians caused the crisis, and if left to their own devices will do so again.

Despite the mass media news blackout, a series of books, talk radio and the blogosphere have managed to expose Barack Obama’s connections to his radical mentors — Weather Underground bombers William Ayers and Bernardine Dohrn, Communist Party member Frank Marshall Davis and others. David Horowitz and his Discover the Networks.org have also contributed a wealth of information and have noted Obama’s radical connections since the beginning.
Yet, no one to my knowledge has yet connected all the dots between Barack Obama and the Radical Left. When seen together, the influences on Obama’s life comprise a who’s who of the radical leftist movement, and it becomes painfully apparent that not only is Obama a willing participant in that movement, he has spent most of his adult life deeply immersed in it.
But even this doesn’t fully describe the extreme nature of this candidate. He can be tied directly to a malevolent overarching strategy that has motivated many, if not all, of the most destructive radical leftist organizations in the United States since the 1960s.
The Cloward-Piven Strategy of Orchestrated Crisis
In an earlier post, I noted the liberal record of unmitigated legislative disasters, the latest of which is now being played out in the financial markets before our eyes. Before the 1994 Republican takeover, Democrats had sixty years of virtually unbroken power in Congress – with substantial majorities most of the time. Can a group of smart people, studying issue after issue for years on end, with virtually unlimited resources at their command, not come up with a single policy that works? Why are they chronically incapable?
Why?
One of two things must be true. Either the Democrats are unfathomable idiots, who ignorantly pursue ever more destructive policies despite decades of contrary evidence, or they understand the consequences of their actions and relentlessly carry on anyway because they somehow benefit.
I submit to you they understand the consequences. For many it is simply a practical matter of eliciting votes from a targeted constituency at taxpayer expense; we lose a little, they gain a lot, and the politician keeps his job. But for others, the goal is more malevolent – the failure is deliberate. Don’t laugh. This method not only has its proponents, it has a name: the Cloward-Piven Strategy. It describes their agenda, tactics, and long-term strategy.
The Strategy was first elucidated in the May 2, 1966 issue of The Nation magazine by a pair of radical socialist Columbia University professors, Richard Andrew Cloward and Frances Fox Piven. David Horowitz summarizes it as:
The strategy of forcing political change through orchestrated crisis. The “Cloward-Piven Strategy” seeks to hasten the fall of capitalism by overloading the government bureaucracy with a flood of impossible demands, thus pushing society into crisis and economic collapse.
Cloward and Piven were inspired by radical organizer [and Hillary Clinton mentor] Saul Alinsky:
“Make the enemy live up to their (sic) own book of rules,” Alinsky wrote in his 1989 book Rules for Radicals. When pressed to honor every word of every law and statute, every Judeo-Christian moral tenet, and every implicit promise of the liberal social contract, human agencies inevitably fall short. The system’s failure to “live up” to its rule book can then be used to discredit it altogether, and to replace the capitalist “rule book” with a socialist one. (Courtesy Discover the Networks.org)
Newsmax rounds out the picture:
Their strategy to create political, financial, and social chaos that would result in revolution blended Alinsky concepts with their more aggressive efforts at bringing about a change in U.S. government. To achieve their revolutionary change, Cloward and Piven sought to use a cadre of aggressive organizers assisted by friendly news media to force a re-distribution of the nation’s wealth.
In their Nation article, Cloward and Piven were specific about the kind of “crisis” they were trying to create:
By crisis, we mean a publicly visible disruption in some institutional sphere. Crisis can occur spontaneously (e.g., riots) or as the intended result of tactics of demonstration and protest which either generate institutional disruption or bring unrecognized disruption to public attention.
No matter where the strategy is implemented, it shares the following features:
  1. The offensive organizes previously unorganized groups eligible for government benefits but not currently receiving all they can.
  2. The offensive seeks to identify new beneficiaries and/or create new benefits.
  3. The overarching aim is always to impose new stresses on target systems, with the ultimate goal of forcing their collapse.
Capitalizing on the racial unrest of the 1960s, Cloward and Piven saw the welfare system as their first target. They enlisted radical black activist George Wiley, who created the National Welfare Reform Organization (NWRO) to implement the strategy. Wiley hired militant foot soldiers to storm welfare offices around the country, violently demanding their “rights.” According to a City Journal article bySol Stern, welfare rolls increased from 4.3 million to 10.8 million by the mid-1970s as a result, and in New York City, where the strategy had been particularly successful, “one person was on the welfare rolls… for every two working in the city’s private economy.”
According to another City Journal article titled “Compassion Gone Mad“:
The movement’s impact on New York City was jolting: welfare caseloads, already climbing 12 percent a year in the early sixties, rose by 50 percent during Lindsay’s first two years; spending doubled… The city had 150,000 welfare cases in 1960; a decade later it had 1.5 million.  
The vast expansion of welfare in New York City that came of the NWRO’s Cloward-Piven tactics sent the city into bankruptcy in 1975. Rudy Giuliani citedCloward and Piven by name as being responsible for “an effort at economic sabotage.” He also credited Cloward-Piven with changing the cultural attitude toward welfare from that of a temporary expedient to a lifetime entitlement, an attitude which in-and-of-itself has caused perhaps the greatest damage of all.
Cloward and Piven looked at this strategy as a gold mine of opportunity. Within the newly organized groups, each offensive would find an ample pool of foot soldier recruits willing to advance its radical agenda at little or no pay, and expand its base of reliable voters, legal or otherwise. The radicals’ threatening tactics also would accrue an intimidating reputation, providing a wealth of opportunities for extorting monetary and other concessions from the target organizations. In the meantime, successful offensives would create an ever increasing drag on society. As they gleefully observed:
Moreover, this kind of mass influence is cumulative because benefits are continuous. Once eligibility for basic food and rent grants is established, the drain on local resources persists indefinitely.
The next time you drive through one of the many blighted neighborhoods in our cities, or read of the astronomical crime, drug addiction, and out-of-wedlock birth rates, or consider the failed schools, strapped police and fire resources of every major city, remember Cloward and Piven’s thrill that “…the drain on local resources persists indefinitely.”
ACORN, the new tip of the Cloward-Piven spear
In 1970, one of George Wiley’s protégés, Wade Rathke — like Bill Ayers, a member of the radical Students for a Democratic Society (SDS) — was sent to found the Arkansas Community Organizations for Reform Now. While NWRO had made a good start, it alone couldn’t accomplish the Cloward-Piven goals. Rathke’s group broadened the offensive to include a wide array of low income “rights.” Shortly thereafter they changed “Arkansas” to “Association of” andACORN went nationwide.
Today ACORN is involved in a wide array of activities, including housing, voting rights, illegal immigration and other issues. According to ACORN’s website: “ACORN is the nation’s largest grassroots community organization of low-and moderate-income people with over 400,000 member families organized into more than 1,200 neighborhood chapters in 110 cities across the country,” It is perhaps the largest radical group in the U.S. and has been cited for widespread criminal activity on many fronts.
Voting
On voting rights, ACORN and its voter mobilization subsidiary, Project Vote, have been involved nationwide in efforts to grant felons the vote and lobbied heavily for the Motor Voter Act of 1993, a law allowing people to register at motor vehicle departments, schools, libraries and other public places. That law had been sought by Cloward and Piven since the early1980s and they were present, standing behind President Clinton at the signing ceremony.
ACORN’s voter rights tactics follow the Cloward-Piven Strategy:
  • 1. Register as many Democrat voters as possible, legal or otherwise and help them vote, multiple times if possible.
  • 2. Overwhelm the system with fraudulent registrations using multiple entries of the same name, names of deceased, random names from the phone book, even contrived names.
  • 3. Make the system difficult to police by lobbying for minimal identification standards.
In this effort, ACORN sets up registration sites all over the country and has beenfrequently cited for turning in fraudulent registrations, as well as destroying republican applications. In the 2004-2006 election cycles alone, ACORN was accused of widespread voter fraud in 12 states. It may have swung the election for one state governor.
ACORN’s website brags: “Since 2004, ACORN has helped more than 1.7 million low- and moderate-income and minority citizens apply to register to vote.” Project vote boasts 4 million. I wonder how many of them are dead? For the 2008 cycle, ACORN and Project Vote have pulled out all the stops. Given their furious nationwide effort, it is not inconceivable that this presidential race could be decided by fraudulent votes alone.
Barack Obama ran ACORN’s Project Vote in Chicago and his highly successful voter registration drive was credited with getting the disgraced former Senator Carol Moseley-Braun elected. Newsmax reiterates Cloward and Piven’s aspirations for ACORN’s voter registration efforts:
By advocating massive, no-holds-barred voter registration campaigns, they [Cloward & Piven] sought a Democratic administration in Washington, D.C. that would re-distribute the nation’s wealth and lead to a totalitarian socialist state.
Illegal Immigration
As I have written elsewhere, the Radical Left’s offensive to promote illegal immigration is “Cloward-Piven on steroids.” ACORN is at the forefront of this movement as well, and was a leading organization among a broad coalition of radical groups, including Soros’ Open Society Institute, the Service Employees International Union (ACORN founder Wade Rathke also runs a SEIU chapter), and others, that became the Coalition for Comprehensive Immigration Reform. CCIR fortunately failed to gain passage for the 2007 illegal immigrant amnesty bill, but its goals have not changed.
The burden of illegal immigration on our already overstressed welfare system has been widely documented. Some towns in California have even been taken over byillegal immigrant drug cartels. The disease, crime and overcrowding brought by illegal immigrants places a heavy burden on every segment of society and every level of government, threatening to split this country apart at the seams. In the meantime, radical leftist efforts to grant illegal immigrants citizenship guarantee a huge pool of new democrat voters. With little border control, terrorists can also filter in.
Obama aided ACORN as their lead attorney in a successful suit he broughtagainst the Illinois state government to implement the Motor Voter law there. The law had been resisted by Republican Governor Jim Edgars, who feared the law was an opening to widespread vote fraud.
His fears were warranted as the Motor Voter law has since been cited as a major opportunity for vote fraud, especially for illegal immigrants, even terrorists.According to the Wall Street JournalAfter 9/11, the Justice Department found that eight of the 19 hijackers were registered to vote…”
ACORN’s dual offensives on voting and illegal immigration are handy complements. Both swell the voter rolls with reliable democrats while assaulting the country ACORN seeks to destroy with overwhelming new problems.
Mortgage Crisis
And now we have the mortgage crisis, which has sent a shock wave through Wall Street and panicked world financial markets like no other since the stock market crash of 1929. But this is a problem created in Washington long ago.  It originated with the Community Reinvestment Act (CRA), signed into law in 1977 by President Jimmy Carter. The CRA was Carter’s answer to a grassroots activist movement started in Chicago, and forced banks to make loans to low income, high risk customers. PhD economist and former Texas Senator Phil Gramm has called it: “a vast extortion scheme against the nation’s banks.”
ACORN aggressively sought to expand loans to low income groups using the CRA as a whip. Economist Stan Leibowitz wrote in the New York Post:
In the 1980s, groups such as the activists at ACORN began pushing charges of “redlining”-claims that banks discriminated against minorities in mortgage lending. In 1989, sympathetic members of Congress got the Home Mortgage Disclosure Act amended to force banks to collect racial data on mortgage applicants; this allowed various studies to be ginned up that seemed to validate the original accusation.
In fact, minority mortgage applications were rejected more frequently than other applications-but the overwhelming reason wasn’t racial discrimination, but simply that minorities tend to have weaker finances.
ACORN showed its colors again in 1991, by taking over the House Banking Committee room for two days to protest efforts to scale back the CRA.Obama represented ACORN in the Buycks-Roberson v. Citibank Fed. Sav. Bank, 1994 suit against redlining.  Most significant of all, ACORN was the driving force behind a 1995 regulatory revision pushed through by the Clinton Administration that greatly expanded the CRA and laid the groundwork for the Fannie Mae, Freddie Mac borne financial crisis we now confront. Barack Obama was the attorney representing ACORN in this effort. With this new authority, ACORN used its subsidiary, ACORN Housing, to promote subprime loans more aggressively.
As a New York Post article describes it:
A 1995 strengthening of the Community Reinvestment Act required banks to find ways to provide mortgages to their poorer communities. It also let community activists intervene at yearly bank reviews, shaking the banks down for large pots of money.
Banks that got poor reviews were punished; some saw their merger plans frustrated; others faced direct legal challenges by the Justice Department.
Flexible lending programs expanded even though they had higher default rates than loans with traditional standards. On the Web, you can still find CRA loans available via ACORN with “100 percent financing . . . no credit scores . . . undocumented income . . . even if you don’t report it on your tax returns.” Credit counseling is required, of course.
Ironically, an enthusiastic Fannie Mae Foundation report singled out one paragon of nondiscriminatory lending, which worked with community activists and followed “the most flexible underwriting criteria permitted.” That lender’s $1 billion commitment to low-income loans in 1992 had grown to $80 billion by 1999and $600 billion by early 2003.
The lender they were speaking of was Countrywide, which specialized in subprime lending and had a working relationship with ACORN.
The revisions also allowed for the first time the securitization of CRA-regulated loans containing subprime mortgages. The changes came as radical “housing rights” groups led by ACORN lobbied for such loans. ACORN at the time was represented by a young public-interest lawyer in Chicago by the name of Barack Obama. (Emphasis, mine.)
Since these loans were to be underwritten by the government sponsored Fannie Mae and Freddie Mac, the implicit government guarantee of those loans absolved lenders, mortgage bundlers and investors of any concern over the obvious risk. As Bloomberg reported: “It is a classic case of socializing the risk while privatizing the profit.”
And if you think Washington policy makers cared about ACORN’s negative influence, think again. Before this whole mess came down, a Democrat-sponsored bill on the table would have created an “Affordable Housing Trust Fund,” granting ACORN access to approximately $500 million in Fannie Mae and Freddie Mac revenues with little or no oversight.
Even now, unbelievably — on the brink of national disaster — Democrats have insisted ACORN benefit from bailout negotiations! Senator Lindsay Graham reported last night (9/25/08) in an interview with Greta Van Susteren of On the Record that Democrats want 20 percent of the bailout money to go to ACORN!
This entire fiasco represents perhaps the pinnacle of ACORN’s efforts to advance the Cloward-Piven Strategy and is a stark demonstration of the power they wield in Washington.
Enter Barack Obama
In attempting to capture the significance of Barack Obama’s Radical Left connections and his relation to the Cloward Piven strategy, I constructed following flow chart. It is by no means complete. There are simply too many radical individuals and organizations to include them all here. But these are perhaps the most significant.

Cloward Piven Strategy

The chart puts Barack Obama at the epicenter of an incestuous stew of American radical leftism. Not only are his connections significant, they practically define who he is. Taken together, they constitute a who’s who of the American radical left, and guiding all is the Cloward-Piven strategy.

Conspicuous in their absence are any connections at all with any other group, moderate, or even mildly leftist. 
They are all radicals, firmly bedded in the anti-American, communist, socialist, radical leftist mesh.
Saul Alinsky
Most people are unaware that Barack Obama received his training in “community organizing” from Saul Alinsky’s Industrial Areas Foundation. But he did. In and of itself that marks his heritage and training as that of a radical activist. One really needs go no further. But we have.
Bill Ayers
Obama objects to being associated with SDS bomber Bill Ayers, claiming he is being smeared with “guilt by association.” But they worked together at theWoods Fund. The Wall Street Journal added substantially to our knowledge by describing in great detail Obama’s work over five years with SDS bomber Bill Ayers on the board of a non-profit, the Chicago Annenberg Challenge, to push a radical agenda on public school children. As Stanley Kurtz states:
“…the issue here isn’t guilt by association; it’s guilt by participation. As CAC chairman, Mr. Obama was lending moral and financial support to Mr. Ayers and his radical circle. That is a story even if Mr. Ayers had never planted a single bomb 40 years ago.”
Also included in the mix is Theresa Heinz Kerry’s favorite charity, the Tides Foundation. A partial list of Tides grants tells you all you need to know: ACLU, ACORN, Center for American Progress, Center for Constitutional Rights (a communist front,) CAIR, Earth Justice, Institute for Policy Studies (KGB spy nest), National Lawyers Guild (oldest communist front in U.S.), People for the Ethical Treatment of Animals (PETA), and practically every other radical group there is. ACORN’s Wade Rathke runs a Tides subsidiary, the Tides Center.
Carl Davidson and the New Party
We have heard about Bomber Bill, but we hear little about fellow SDS memberCarl Davidson. According to Discover the Networks, Davidson was an early supporter of Barack Obama and a prominent member of Chicago’s New Party, a synthesis of CPUSA members, Socialists, ACORN veterans and other radicals. Obama sought and received the New Party’s endorsement, and they assisted with his campaign. The New Party also developed a strong relationship with ACORN. As an excellent article on the New Party observes: “Barack Obama knew what he was getting into and remains an ideal New Party candidate.”
George Soros
The chart also suggests the reason for George Soros’ fervent support of Obama. The President of his Open Society Institute is Aryeh Neier, founder of the radical Students for a Democratic Society (SDS). As mentioned above, three other former SDS members had extensive contact with Obama: Bill Ayers, Carl Davidson and Wade Rathke. Surely Aryeh Neier would have heard from his former colleagues of the promising new politician. More to the point, Neier is firmly committed to supporting the hugely successful radical organization, ACORN, and would be certain back their favored candidate, Barack Obama.
ACORN
Obama has spent a large portion of his professional life working for ACORN or its subsidiaries, representing ACORN as a lawyer on some of its most critical issues, and training ACORN leaders. Stanley Kurtz’s excellent National Review article, “Inside Obama’s Acorn.” also describes Obama’s ACORN connection in detail. But I can’t improve on Obama’s own words:
I’ve been fighting alongside ACORN on issues you care about my entire career (emphasis added). Even before I was an elected official, when I ran Project Vote voter registration drive in Illinois, ACORN was smack dab in the middle of it, and we appreciate your work. - Barack Obama, Speech to ACORN, November 2007 (Courtesy Newsmax.)
In another excellent article on Obama’s ACORN connections, Newsmax asks a nagging question:
It would be telling to know if Obama, during his years at Columbia, had occasion to meet Cloward and study the Cloward-Piven Strategy.
I ask you, is it possible ACORN would train Obama to take leadership positions within ACORN without telling him what he was training for? Is it possible ACORN would put Obama in leadership positions without clueing him into what his purpose was?? Is it possible that this most radical of organizations would put someone in charge of training its trainers, without him knowing what it was he was training them for?
As a community activist for ACORN; as a leadership trainer for ACORN; as alead organizer for ACORN’s Project Vote; as an attorney representing ACORN’s successful efforts to impose Motor Voter regulations in Illinois; as ACORN’s representative in lobbying for the expansion of high risk housing loans through Fannie Mae and Freddie Mac that led to the current crisis; as a recipient of their assistance in his political campaigns — both with money and campaign workers; it is doubtful that he was unaware of ACORN’s true goals. It is doubtful he was unaware of the Cloward-Piven Strategy.
Fast-forward to 2005 when an obsequious, servile and scraping Daniel Mudd, CEO of Fannie Mae spoke at the Congressional Black Caucus swearing in ceremony for newly-elected Illinois Senator, Barack Obama. Mudd called, the Congressional Black Caucus “our family” and “the conscience of Fannie Mae.”
In 2005, Republicans sought to rein in Fannie and Freddie. Senator John McCain was at the forefront of that effort. But it failed due to an intense lobbying effort put forward by Fannie and Freddie.
In his few years as a U.S. senator, Obama has received campaign contributions of $126,349, from Fannie and Freddie, second only to the $165,400 received by Senator Chris Dodd, who has been getting donations from them since 1988. What makes Obama so special?
His closest advisers are a dirty laundry list of individuals at the heart of the financial crisis: former Fannie Mae CEO Jim Johnson; Former Fannie Mae CEO and former Clinton Budget Director Frank Raines; and billionaire failed Superior Bank of Chicago Board Chair Penny Pritzker.
Johnson had to step down as adviser on Obama’s V.P. search after this gem came out:
An Office of Federal Housing Enterprise Oversight (OFHEO) report[1] from September 2004 found that, during Johnson’s tenure as CEO, Fannie Mae had improperly deferred $200 million in expenses. This enabled top executives, including Johnson and his successor, Franklin Raines, to receive substantial bonuses in 1998.[2] A 2006 OFHEO report[3] found that Fannie Mae had substantially under-reported Johnson’s compensation. Originally reported as $6-7 million, Johnson actually received approximately $21 million.
Obama denies ties to Raines but the Washington Post calls him a member of “Obama’s political circle.” Raines and Johnson were fined $3 million by the Office of Federal Housing Oversight for their manipulation of Fannie books. The fine is small change however, compared to the $50 million Raines was able to obtain in improper bonuses as a result of juggling the books.
Most significantly, Penny Pritzker, the current Finance Chairperson of Obama’s presidential campaign helped develop the complicated investment bundling of subprime securities at the heart of the meltdown. She did so in her position as shareholder and board chair of Superior Bank. The Bank failed in 2001, one of the largest in recent history, wiping out $50 million in uninsured life savings of approximately 1,400 customers. She was named in a RICO class action law suit but doesn’t seem to have come out of it too badly.
As a young attorney in the 1990s, Barack Obama represented ACORN in Washington in their successful efforts to expand Community Reinvestment Act (CRA) authority. In addition to making it easier for ACORN groups to force banks into making risky loans, this also paved the way for banks like Superior to package mortgages as investments, and for the Government Sponsored Enterprises Fannie Mae and Freddie Mac to underwrite them. These changes created the conditions that ultimately lead to the current financial crisis.
Did they not know this would occur? Were these smart people, led by a Harvard graduate, unaware of the Econ 101 concept of moral hazard that would result from the government making implicit guarantees to underwrite private sector financial risk? They should have known that freeing the high-risk mortgage market of risk, calamity was sure to ensue. I think they did.
Barack Obama, the Cloward-Piven candidate, no matter how he describes himself, has been a radical activist for most of his political career. That activism has been in support of organizations and initiatives that at their heart seek to tear the pillars of this nation asunder in order to replace them with their demented socialist vision. Their influence has spread so far and so wide that despite their blatant culpability in the current financial crisis, they are able to manipulate Capital Hill politicians to cut them into $140 billion of the bailout pie!
God grant those few responsible yet remaining in Washington, DC the strength to prevent this massive fraud from occurring. God grant them the courage to stand up in the face of this Marxist tidal wave.

The Cloward-Piven Strategy Explained

By  Email To A Friend Email To A Friend

Editors Note: Shortly after becoming part of a local Tea Party Group, I became aware of something called The Cloward-Piven Strategy. After researching this topic extensively, I discovered an article written in September, 2008 BEFORE Barack Obama was elected President. The article was written by James Simpson and originally posted at American Thinker. Here’s a link to the original post if you’d like to check it out. Mr. Simpson has graciously given us permission to repost the article here and will be contributing other material to this site in the future. We are looking forward to his further investigations! As far was TeaPartyConnect.com is concerned, this article should be required reading for all Tea Party members.
TheGuru

The Cloward-Piven Strategy, Part II:
Barack Obama and the Strategy of Manufactured Crisis

America waits with bated breath while Washington struggles to bring the U.S. economy back from the brink of disaster. But many of those same politicians caused the crisis, and if left to their own devices will do so again.

Despite the mass media news blackout, a series of books, talk radio and the blogosphere have managed to expose Barack Obama’s connections to his radical mentors – Weather Underground bombers William Ayers and Bernardine Dohrn, Communist Party member Frank Marshall Davis and others. David Horowitz and his Discover the Networks.org have also contributed a wealth of information and have noted Obama’s radical connections since the beginning.

Yet, no one to my knowledge has connected all the dots between Barack Obama and the Radical Left. When seen together, the influences on Obama’s life comprise a who’s who of the radical leftist movement, and it becomes painfully apparent that not only is Obama a willing participant in that movement, he has spent most of his adult life deeply immersed in it.

But even this doesn’t fully describe the extreme nature of this candidate. He can be tied directly to a malevolent overarching strategy that has motivated many, if not all, of the most destructive radical leftist organizations in the United States since the 1960s.

The Cloward-Piven Strategy of Orchestrated Crisis

In an earlier post, I noted the liberal record of legislative disasters, the latest of which is now being played out in the financial markets before our eyes. Before the 1994 Republican takeover, Democrats had sixty years of virtually unbroken power in Congress – with substantial majorities most of the time. Can a group of smart people, studying issue after issue for years on end, with virtually unlimited resources at their command, not come up with a single policy that works? Why are they chronically incapable?

Why?

One of two things must be true. Either the Democrats are unfathomable idiots, who ignorantly pursue ever more destructive policies despite decades of contrary evidence, or they understand the consequences of their actions and relentlessly carry on anyway because they somehow benefit.

I submit to you they understand the consequences. For many it is simply a practical matter of eliciting votes from a targeted constituency at taxpayer expense; we lose a little, they gain a lot, and the politician keeps his job. But for others, the goal is more malevolent – the failure is deliberate. Don’t laugh. This method not only has its proponents, it has a name: the Cloward-Piven Strategy. It animates their agenda, tactics, and long-term strategy.

The Strategy was first elucidated in the May 2, 1966 issue of The Nation magazine by a pair of radical socialist Columbia University professors, Richard Andrew Cloward and Frances Fox Piven. David Horowitz summarizes it as:

The strategy of forcing political change through orchestrated crisis. The “Cloward-Piven Strategy” seeks to hasten the fall of capitalism by overloading the government bureaucracy with a flood of impossible demands, thus pushing society into crisis and economic collapse.

Cloward and Piven were inspired by radical organizer [and Hillary Clinton mentor] Saul Alinsky:

“Make the enemy live up to their (sic) own book of rules,” Alinsky wrote in his 1989 book Rules for Radicals. When pressed to honor every word of every law and statute, every Judeo-Christian moral tenet, and every implicit promise of the liberal social contract, human agencies inevitably fall short. The system’s failure to “live up” to its rule book can then be used to discredit it altogether, and to replace the capitalist “rule book” with a socialist one. (Courtesy of Discover the Networks.org)

Newsmax rounds out the picture:

Their strategy to create political, financial, and social chaos that would result in revolution blended Alinsky concepts with their more aggressive efforts at bringing about a change in U.S. government. To achieve their revolutionary change, Cloward and Piven sought to use a cadre of aggressive organizers assisted by friendly news media to force a re-distribution of the nation’s wealth.

In their Nation article, Cloward and Piven were specific about the kind of “crisis” they were trying to create:

By crisis, we mean a publicly visible disruption in some institutional sphere. Crisis can occur spontaneously (e.g., riots) or as the intended result of tactics of demonstration and protest which either generate institutional disruption or bring unrecognized disruption to public attention.

 

No matter where the strategy is implemented, it shares the following features:

  • The offensive organizes previously unorganized groups eligible for government benefits but not currently receiving all they can.
  • The offensive seeks to identify new beneficiaries and/or create new benefits.
  • The overarching aim is always to impose new stresses on target systems, with the ultimate goal of forcing their collapse.

Capitalizing on the racial unrest of the 1960s, Cloward and Piven saw the welfare system as their first target. They enlisted radical black activist George Wiley, who created the National Welfare Rights Organization (NWRO) to implement the strategy. Wiley hired militant foot soldiers to storm welfare offices around the country, violently demanding their “rights.” According to a City Journal article by Sol Stern, welfare rolls increased from 4.3 million to 10.8 million by the mid-1970s as a result, and in New York City, where the strategy had been particularly successful, “one person was on the welfare rolls… for every two working in the city’s private economy.”

According to another City Journal article titled “Compassion Gone Mad”:

The movement’s impact on New York City was jolting: welfare caseloads, already climbing 12 percent a year in the early sixties, rose by 50 percent during Lindsay’s first two years; spending doubled… The city had 150,000 welfare cases in 1960; a decade later it had 1.5 million.

The vast expansion of welfare in New York City that came of the NWRO’s Cloward-Piven tactics sent the city into bankruptcy in 1975. Rudy Giuliani cited Cloward and Piven by name as being responsible for “an effort at economic sabotage.” He also credited Cloward-Piven with changing the cultural attitude toward welfare from that of a temporary expedient to a lifetime entitlement, an attitude which in-and-of-itself has caused perhaps the greatest damage of all.

Cloward and Piven looked at this strategy as a gold mine of opportunity. Within the newly organized groups, each offensive would find an ample pool of foot soldier recruits willing to advance its radical agenda at little or no pay, and expand its base of reliable voters, legal or otherwise. The radicals’ threatening tactics also would accrue an intimidating reputation, providing a wealth of opportunities for extorting monetary and other concessions from the target organizations. In the meantime, successful offensives would create an ever increasing drag on society. As they gleefully observed:

Moreover, this kind of mass influence is cumulative because benefits are continuous. Once eligibility for basic food and rent grants is established, the drain on local resources persists indefinitely.

The next time you drive through one of the many blighted neighborhoods in our cities, or read of the astronomical crime, drug addiction, and out-of-wedlock birth rates, or consider the failed schools, strapped police and fire resources of every major city, remember Cloward and Piven’s thrill that “…the drain on local resources persists indefinitely.”

ACORN, the new tip of the Cloward-Piven spear

In 1970, one of George Wiley’s protégés, Wade Rathke – like Bill Ayers, a member of the radical Students for a Democratic Society (SDS) – was sent to found the Arkansas Community Organizations for Reform Now. While NWRO had made a good start, it alone couldn’t accomplish the Cloward-Piven goals. Rathke’s group broadened the offensive to include a wide array of low income “rights.” Shortly thereafter they changed “Arkansas” to “Association of” and ACORN went nationwide.

Today ACORN is involved in a wide array of activities, including housing, voting rights, illegal immigration and other issues. According to ACORN’s website: “ACORN is the nation’s largest grassroots community organization of low- and moderate-income people with over 400,000 member families organized into more than 1,200 neighborhood chapters in 110 cities across the country,” It is perhaps the largest radical group in the U.S. and has been cited for widespread criminal activity on many fronts.

Voting

On voting rights, ACORN and its voter mobilization subsidiary, Project Vote, have been involved nationwide in efforts to grant felons the vote and lobbied heavily for the Motor Voter Act of 1993, a law allowing people to register at motor vehicle departments, schools, libraries and other public places. That law had been sought by Cloward and Piven since the early1980s and they were present, standing behind President Clinton at the signing ceremony.

ACORN’s voter rights tactics follow the Cloward-Piven Strategy:

  1. Register as many democrat voters as possible, legal or otherwise and help them vote, multiple times if possible.
  2. Overwhelm the system with fraudulent registrations using multiple entries of the same name, names of deceased, random names from the phone book, even contrived names.
  3. Make the system difficult to police by lobbying for minimal identification standards.

In this effort, ACORN sets up registration sites all over the country and has been frequently cited for turning in fraudulent registrations, as well as destroying republican applications. In the 2004-2006 election cycles alone, ACORN was accused of widespread voter fraud in 12 states. It may have swung the election for one state governor.

ACORN’s website brags:

“Since 2004, ACORN has helped more than 1.7 million low- and moderate-income and minority citizens apply to register to vote.”

Project Vote boasts 4 million. I wonder how many of them had a pulse. For the 2008 cycle, ACORN and Project Vote have pulled out all the stops. Given their furious nationwide effort, it is not inconceivable that this presidential race could be decided by fraudulent votes alone.

Barack Obama ran ACORN’s Project Vote in Chicago and his highly successful voter registration drive wascredited with getting the disgraced former Senator Carol Moseley-Braun elected. Newsmax reiteratesCloward and Piven’s aspirations for ACORN’s voter registration efforts:

By advocating massive, no-holds-barred voter registration campaigns, they [Cloward & Piven] sought a Democratic administration in Washington, D.C. that would re-distribute the nation’s wealth and lead to a totalitarian socialist state.

Illegal Immigration

As I have written elsewhere, the Radical Left’s offensive to promote illegal immigration is “Cloward-Piven on steroids.” ACORN is at the forefront of this movement as well, and was a leading organization among a broad coalition of radical groups, including Soros’ Open Society Institute, the Service Employees International Union (ACORN founder Wade Rathke also runs a SEIU chapter), and others, that became theCoalition for Comprehensive Immigration Reform. CCIR fortunately failed to gain passage for the 2007 illegal immigrant amnesty bill, but its goals have not changed.

The burden of illegal immigration on our already overstressed welfare system has been widely documented. Some towns in California have even been taken over by illegal immigrant drug cartels. The disease, crime and overcrowding brought by illegal immigrants places a heavy burden on every segment of society and every level of government, threatening to split this country apart at the seams. In the meantime, radical leftist efforts to grant illegal immigrants citizenship guarantee a huge pool of new democrat voters. With little border control, terrorists can also filter in.

Obama aided ACORN as their lead attorney in a successful suit he brought against the Illinois state government to implement the Motor Voter law there. The law had been resisted by Republican Governor Jim Edgars, who feared the law was an opening to widespread vote fraud.

His fears were warranted as the Motor Voter law has since been cited as a major opportunity for vote fraud, especially for illegal immigrants, even terrorists. According to the Wall Street Journal: “After 9/11, the Justice Department found that eight of the 19 hijackers were registered to vote…”

ACORN’s dual offensives on voting and illegal immigration are handy complements. Both swell the voter rolls with reliable democrats while assaulting the country ACORN seeks to destroy with overwhelming new problems.

Mortgage Crisis

And now we have the mortgage crisis, which has sent a shock wave through Wall Street and panicked world financial markets like no other since the stock market crash of 1929. But this is a problem created in Washington long ago. It originated with the Community Reinvestment Act (CRA), signed into law in 1977 by President Jimmy Carter. The CRA was Carter’s answer to a grassroots activist movement started in Chicago, and forced banks to make loans to low income, high risk customers. PhD economist and former Texas Senator Phil Gramm has called it: “a vast extortion scheme against the nation’s banks.”

ACORN aggressively sought to expand loans to low income groups using the CRA as a whip. EconomistStan Leibowitz wrote in the New York Post:

In the 1980s, groups such as the activists at ACORN began pushing charges of “redlining”—claims that banks discriminated against minorities in mortgage lending. In 1989, sympathetic members of Congress got the Home Mortgage Disclosure Act amended to force banks to collect racial data on mortgage applicants; this allowed various studies to be ginned up that seemed to validate the original accusation.

In fact, minority mortgage applications were rejected more frequently than other applications—but the overwhelming reason wasn’t racial discrimination, but simply that minorities tend to have weaker finances.

ACORN showed its colors again in 1991, by taking over the House Banking Committee room for two days to protest efforts to scale back the CRA. Most significant of all, ACORN was the driving force behind a 1995 regulatory revision pushed through by the Clinton Administration that greatly expanded the CRA and laid the groundwork for the Fannie Mae, Freddie Mac borne financial crisis we now confront. Barack Obama was the attorney representing ACORN in this effort. With this new authority, ACORN used its subsidiary,ACORN Housing, to promote subprime loans more aggressively. Barack Obama represented ACORN in this effort.

As a New York Post article describes it:

A 1995 strengthening of the Community Reinvestment Act required banks to find ways to provide mortgages to their poorer communities. It also let community activists intervene at yearly bank reviews, shaking the banks down for large pots of money.

Banks that got poor reviews were punished; some saw their merger plans frustrated; others faced direct legal challenges by the Justice Department.

Flexible lending programs expanded even though they had higher default rates than loans with traditional standards. On the Web, you can still find CRA loans available via ACORN with “100 percent financing . . . no credit scores . . . undocumented income . . . even if you don’t report it on your tax returns.” Credit counseling is required, of course.

Ironically, an enthusiastic Fannie Mae Foundation report singled out one paragon of nondiscriminatory lending, which worked with community activists and followed “the most flexible underwriting criteria permitted.” That lender’s $1 billion commitment to low-income loans in 1992 had grown to $80 billion by 1999 and $600 billion by early 2003.

The lender they were speaking of was Countrywide – rescued by Bank of America in July – which specialized in subprime lending and had a working relationship with ACORN.

Investor’s Business Daily added:

The revisions also allowed for the first time the securitization of CRA-regulated loans containing subprime mortgages. The changes came as radical “housing rights” groups led by ACORN lobbied for such loans. ACORN at the time was represented by a young public-interest lawyer in Chicago by the name of Barack Obama. (Emphasis, mine.)

Since these loans were to be underwritten by the government sponsored Fannie Mae and Freddie Mac, the implicit government guarantee of those loans absolved lenders, mortgage bundlers and investors of any concern over the obvious risk. As Bloomberg reported: “It is a classic case of socializing the risk while privatizing the profit.”

And if you think Washington policy makers cared about ACORN’s negative influence, think again. Before this whole mess came down, a Democrat-sponsored bill on the table would have created an “Affordable Housing Trust Fund,” granting ACORN access to approximately $500 million in Fannie Mae and Freddie Mac revenues with little or no oversight.

Even now, unbelievably – on the brink of national disaster – Democrats have insisted ACORN benefit from bailout negotiations! Senator Lindsay Graham reported Thursday night (9/25/08) in an interview with Greta Van Susteren of On the Record that Democrats want 20 percent of the bailout money to go to ACORN!

This entire fiasco represents perhaps the pinnacle of ACORN’s efforts to advance the Cloward-Piven Strategy and is a stark demonstration of the power they wield in Washington.

Enter Barack Obama.

In attempting to capture the significance of Barack Obama’s Radical Left connections and his connection to the Cloward Piven strategy, I constructed following flow chart. It is by no means complete. There are simply too many radical individuals and organizations to include them all here. But these are perhaps the most significant.

The chart puts Barack Obama at the epicenter of an incestuous stew of American radical leftism. Not only are his connections significant, they practically define who he is. Taken together, they constitute a who’s who of the American Radical Left, and guiding all is the Cloward-Piven strategy.

Conspicuous in their absence are any connections at all with any other group, moderate, or even mildly leftist. They are all radicals, firmly bedded in the anti-American, communist, socialist, radical leftist mesh.

Saul Alinsky

Most people are unaware that Barack Obama received his training in “community organizing” from Saul Alinsky’s Industrial Areas Foundation. But he did. In and of itself that marks his heritage and training as that of a radical activist. One really need go no further. But we have.

Bill Ayers

Obama objects to being associated with SDS bomber Bill Ayers, claiming he is being smeared with “guilt by association.” But they worked together at the Woods Fund. The Wall Street Journal has added substantially to our knowledge by describing in great detail Obama’s work over five years with Ayers on the board of the Chicago Annenberg Challenge, a non-profit Ayers designed to push a radical agenda on public school children. As Stanley Kurtz states: “…the issue here isn’t guilt by association; it’s guilt by participation. As CAC chairman, Mr. Obama was lending moral and financial support to Mr. Ayers and his radical circle. That is a story even if Mr. Ayers had never planted a single bomb 40 years ago.”

Also included in the mix is John and Theresa Heinz Kerry’s favorite charity, the Tides Foundation. A partial list of Tides grants tells you all you need to know: ACLU, ACORN, Center for American Progress, Center for Constitutional Rights (a communist front,) CAIR, Earth Justice, Institute for Policy Studies (KGB spy nest), National Lawyers Guild (oldest communist front in U.S.), People for the Ethical Treatment of Animals (PETA), and practically every other radical group there is. ACORN’s Wade Rathke runs a Tides subsidiary, the Tides Center. No wonder Kerry, Kennedy et al love Obama. Just one big happy family.

Carl Davidson and the New Party

We have heard about Bomber Bill, but we hear little about fellow SDS member Carl Davidson. According toDiscover the Networks, Davidson was an early supporter of Barack Obama and a prominent member of Chicago’s New Party, a synthesis of CPUSA members, Socialists, ACORN veterans and other radicals. Obama sought and received the New Party’s endorsement, and they assisted with his campaign. The New Party also developed a strong relationship with ACORN. As an excellent article on the New Party observes: “Barack Obama knew what he was getting into and remains an ideal New Party candidate.”

George Soros

The chart also suggests one reason for George Soros’ fervent support of Obama. The President of his Open Society Institute is Aryeh Neier, founder of the radical Students for a Democratic Society (SDS). As mentioned above, three other former SDS members had extensive contact with Obama: Bill Ayers, Carl Davidson and Wade Rathke. Surely Aryeh Neier would have heard of the promising new politician from his former colleagues. More to the point, Neier is firmly committed to supporting the hugely successful radical organization, ACORN, and would be certain back their favored candidate, Barack Obama. Soros is a natural suspect in this fiasco as he has made all his ill-gotten gains short-selling on national disaster. The extent of his dirty dealings is worthy of its own book.

ACORN

Obama has spent a large portion of his professional life working for ACORN or its subsidiaries, representing ACORN as a lawyer on some of its most critical issues, and training ACORN leaders. Stanley Kurtz’s excellent National Review article, “Inside Obama’s Acorn.” also describes Obama’s ACORN connection in detail. But I can’t improve on Obama’s own words:

I’ve been fighting alongside ACORN on issues you care about my entire career (emphasis added). Even before I was an elected official, when I ran Project Vote voter registration drive in Illinois, ACORN was smack dab in the middle of it, and we appreciate your work. — Barack Obama, Speech to ACORN, November 2007 (Courtesy Newsmax.)

In another excellent article on Obama’s ACORN connections, Newsmax asks a nagging question:

It would be telling to know if Obama, during his years at Columbia, had occasion to meet Cloward and study the Cloward-Piven Strategy.

I will put it more bluntly: Barack Obama is fully aware of the Cloward-Piven strategy and has actively worked to achieve its goals for most of his adult life.

I ask you, is it possible ACORN would train Obama to take leadership positions within ACORN without telling him what he was training for? Is it possible ACORN would put Obama in leadership positions without clueing him into what his purpose was?? Is it possible that this most radical of organizations would put someone in charge of training its trainers, without him knowing what it was he was training them for???

As a community activist for ACORN; as a leadership trainer for ACORN; as a lead organizer for ACORN’s Project Vote; as an attorney representing ACORN’s successful efforts to impose Motor Voter regulations in Illinois; as ACORN’s representative in lobbying for the expansion of high risk housing loans through Fannie Mae and Freddie Mac that led to the current crisis; as a recipient of their assistance in his political campaigns – both with money and campaign workers; it is inconceivable that he was unaware of ACORN’s true goals. It is inconceivable he was unaware of the Cloward-Piven Strategy.

Fast-forward to 2005 when an obsequious, servile and scraping Daniel Mudd, CEO of Fannie Mae spoke at the Congressional Black Caucus swearing in ceremony for newly-elected Illinois Senator, Barack Hussein Obama. Mudd called, the Congressional Black Caucus “our family” and “the conscience of Fannie Mae.”

In 2005, Republicans sought to reign in Fannie and Freddie. Senator John McCain was at the forefront of that effort. But it failed due to an intense lobbying effort put forward by Fannie and Freddie.

In his few years as a U.S. senator, Obama has received campaign contributions of $126,349, from Fannie and Freddie, second only to the $165,400 received by Senator Chris Dodd, who has been getting donations from them since 1988. What makes Obama so special?

His closest advisers are a dirty laundry list of individuals at the heart of the financial crisis: former Fannie Mae CEO Jim Johnson; Former Fannie Mae CEO and former Clinton Budget Director Frank Raines; and billionaire failed Superior Bank of Chicago Board Chair Penny Pritzker.

Johnson had to step down as adviser on Obama’s V.P. search after this gem came out:

An Office of Federal Housing Enterprise Oversight (OFHEO) report[1] from September 2004 found that, during Johnson’s tenure as CEO, Fannie Mae had improperly deferred $200 million in expenses. This enabled top executives, including Johnson and his successor, Franklin Raines, to receive substantial bonuses in 1998.[2] A 2006 OFHEO report[3] found that Fannie Mae had substantially under-reported Johnson’s compensation. Originally reported as $6-7 million, Johnson actually received approximately $21 million.

Obama denies ties to Raines but the Washington Post calls him a member of “Obama’s political circle.” Raines and Johnson were fined $3 million by the Office of Federal Housing Oversight for their manipulation of Fannie books. The fine is small change however, compared to the $50 million Raines was able to obtain in improper bonuses as a result of juggling the books. To add insult to injury, the $3 million fine was paid with Fannie Mae’s insurance fund.

Most significantly, Penny Pritzker, the current Finance Chairperson of Obama’s presidential campaign, helped develop the complicated investment bundling of subprime securities at the heart of the meltdown. She did so in her position as owner and board chair of Superior Bank. The Bank failed in 2001, one of the largest in recent history, wiping out $50 million in life savings of the bank’s approximately 1,400 customers. She was named in a RICO class action law suit but doesn’t seem to have come out of it too badly.

As a young attorney in the 1990s, Barack Obama represented ACORN in Washington in their successful efforts to expand Community Reinvestment Act (CRA) authority. In addition to making it easier for ACORN groups to force banks into making risky loans, this also paved the way for banks like Superior to package mortgages as investments, and for the Government Sponsored Enterprises Fannie Mae and Freddie Mac to underwrite them. These changes created the conditions that ultimately lead to the current financial crisis.

Did they not know this would occur? Were these smart people, led by a Harvard graduate, unaware of the Econ 101 concept of moral hazard that would result from the government making implicit guarantees to underwrite private sector financial risk? They should have known that freeing the high-risk mortgage market of risk, calamity was sure to ensue. I think they did.

Barack Obama, the Cloward-Piven candidate, no matter how he describes himself, has been a radical activist for most of his political career. That activism has been in support of organizations and initiatives that at their heart seek to tear the pillars of this nation asunder in order to replace them with their demented socialist vision. Their influence has spread so far and so wide that despite their blatant culpability in the current financial crisis, they are able to manipulate Capital Hill politicians to cut them into $140 billion of the bailout pie!

God grant those few responsible yet remaining in Washington, DC the strength to prevent this massive fraud from occurring. God grant them the courage to stand up in the face of this Marxist tidal wave.

Jim Simpson is a former White House staff economist and budget analyst. His writings have been published in American ThinkerWashington Times, FrontPage MagazineDefenseWatchSoldier of Fortune and others. His blog is Truth and Consequences.

You can access the other parts of the Cloward-Piven series of articles by James Simpson at the American Daughter Media Center which also includes versions of these articles in Word Document format for downloading and re-printing.

The Cloward-Piven Strategy, Part I: Manufactured Crisis 
The Cloward-Piven Strategy, Part I — print copy
The Cloward-Piven Strategy, Part II: Barack Obama and the Strategy of Manufactured Crisis
The Cloward-Piven Strategy, Part II — print copy
The Cloward-Piven Strategy, Part III: Conspiracy of the Lemmings 
The Cloward-Piven Strategy, Part III — print copy

http://www.teapartyconnect.com/102/the-cloward-piven-strategy-explained/

 

Cloward–Piven strategy

From Wikipedia, the free encyclopedia

The Cloward–Piven strategy is a political strategy outlined in 1966 by American sociologists and political activists Richard Cloward and Frances Fox Piven that called for overloading the U.S. public welfare system in order to precipitate a crisis that would lead to a replacement of the welfare system with a national system of “a guaranteed annual income and thus an end to poverty”. Cloward and Piven were a married couple who were both professors at the Columbia University School of Social Work. The strategy was formulated in a May 1966 article in liberal[1] magazine The Nation titled “The Weight of the Poor: A Strategy to End Poverty”.[2]

The two stated that many Americans who were eligible for welfare were not receiving benefits, and that a welfare enrollment drive would strain local budgets, precipitating a crisis at the state and local levels that would be a wake-up call for the federal government, particularly the Democratic Party. There would also be side consequences of this strategy, according to Cloward and Piven. These would include: easing the plight of the poor in the short-term (through their participation in the welfare system); shoring up support for the national Democratic Party then-splintered by pluralistic interests (through its cultivation of poor and minority constituencies by implementing a national “solution” to poverty); and relieving local governments of the financially and politically onerous burdens of public welfare (through a national “solution” to poverty)[citation needed].

 

 

The strategy

Cloward and Piven’s article is focused on forcing the Democratic Party, which in 1966 controlled the presidency and both houses of the United States Congress, to take federal action to help the poor. They stated that full enrollment of those eligible for welfare “would produce bureaucratic disruption in welfare agencies and fiscal disruption in local and state governments” that would “deepen existing divisions among elements in the big-city Democratic coalition: the remaining white middle class, the working-class ethnic groups and the growing minority poor. To avoid a further weakening of that historic coalition, a national Democratic administration would be constrained to advance a federal solution to poverty that would override local welfare failures, local class and racial conflicts and local revenue dilemmas.”[3] They wrote:

The ultimate objective of this strategy—to wipe out poverty by establishing a guaranteed annual income—will be questioned by some. Because the ideal of individual social and economic mobility has deep roots, even activists seem reluctant to call for national programs to eliminate poverty by the outright redistribution of income.[3]

Michael Reisch and Janice Andrews wrote that Cloward and Piven “proposed to create a crisis in the current welfare system – by exploiting the gap between welfare law and practice – that would ultimately bring about its collapse and replace it with a system of guaranteed annual income. They hoped to accomplish this end by informing the poor of their rights to welfare assistance, encouraging them to apply for benefits and, in effect, overloading an already overburdened bureaucracy.”[4]

Focus on Democrats

The authors pinned their hopes on creating disruption within the Democratic Party. “Conservative Republicans are always ready to declaim the evils of public welfare, and they would probably be the first to raise a hue and cry. But deeper and politically more telling conflicts would take place within the Democratic coalition,” they wrote. “Whites – both working class ethnic groups and many in the middle class – would be aroused against the ghetto poor, while liberal groups, which until recently have been comforted by the notion that the poor are few… would probably support the movement. Group conflict, spelling political crisis for the local party apparatus, would thus become acute as welfare rolls mounted and the strains on local budgets became more severe.”[5]

Reception and criticism

Howard Phillips, chairman of The Conservative Caucus, was quoted in 1982 as saying that the strategy could be effective because “Great Society programs had created a vast army of full-time liberal activists whose salaries are paid from the taxes of conservative working people.”[6]

Liberal commentator Michael Tomasky, writing about the strategy in the 1990s and again in 2011, called it “wrongheaded and self-defeating”, writing: “It apparently didn’t occur to [Cloward and Piven] that the system would just regard rabble-rousing black people as a phenomenon to be ignored or quashed.”[7]

Impact of the strategy

In papers published in 1971 and 1977, Cloward and Piven argued that mass unrest in the United States, especially between 1964 and 1969, did lead to a massive expansion of welfare rolls, though not to the guaranteed-income program that they had hoped for.[8]Political scientist Robert Albritton disagreed, writing in 1979 that the data did not support this thesis; he offered an alternative explanation for the rise in welfare caseloads.

In his 2006 book Winning the Race, political commentator John McWhorter attributed the rise in the welfare state after the 1960s to the Cloward–Piven strategy, but wrote about it negatively, stating that the strategy “created generations of black people for whom working for a living is an abstraction.”[9]

According to historian Robert E. Weir in 2007, “Although the strategy helped to boost recipient numbers between 1966 and 1975, the revolution its proponents envisioned never transpired.”[10]

Some commentators have blamed the Cloward–Piven strategy for the near-bankruptcy of New York City in 1975.[11][12]

Conservative commentator Glenn Beck referred to the Cloward-Piven Strategy often on his Fox News television show, Glenn Beck, during its run from 2009 to 2011, reiterating his opinion that it had helped to inspire President Barack Obama‘s economic policy. On February 18, 2010, for example, Beck said, “you’ve got total destruction of wealth coming … It’s the final phase of the Cloward-Piven strategy, which is collapse the system.”[13]

Richard Kim, writing in 2010 in The Nation (in which the original essay appeared), called such assertions “a reactionary paranoid fantasy …” but says that “the left’s gut reaction upon hearing of it–to laugh it off as a Scooby-Doo comic mystery–does nothing to blunt its appeal or limit its impact.”[14] The Nation later stated that Beck blames the “Cloward-Piven Strategy” for “the financial crisis of 2008, healthcare reform, Obama’s election and massive voter fraud” and has resulted in the posting of much violent and threatening rhetoric by users on Beck’s website, including death threats against Frances Fox Piven.[15] For her part, Piven vigorously continues to defend the original idea, calling its conservative interpretation “lunatic”.[16]

References

  1. Jump up^ Peters, Jeremy W. (November 7, 2010). “Bad News for Liberals May Be Good News for a Liberal Magazine”The New York Times. Retrieved June 17, 2010.
  2. Jump up^ Cloward, Richard; Piven, Frances (May 2, 1966). “The Weight of the Poor: A Strategy to End Poverty”. (Originally published in The Nation).
  3. Jump up to:a b Cloward and Piven, p. 510
  4. Jump up^ Reisch, Michael; Janice Andrews (2001). The Road Not Taken. Brunner Routledge. pp. 144–146. ISBN 1-58391-025-5.
  5. Jump up^ Cloward and Piven, p. 516
  6. Jump up^ Robert Pear (1984-04-15). “Drive to Sign Up Poor for Voting Meets Resistance”. The New York Times.
  7. Jump up^ Glenn Beck and Fran Piven, Michael Tomasky, Michael Tomasky’s BlogThe Guardian, January 24, 2011
  8. Jump up^ Albritton, Robert (December 1979). Social Amelioration through Mass Insurgency? A Reexamination of the Piven and Cloward Thesis. American Political Science Review. JSTOR 1953984.
  9. Jump up^ McWhorter, John, “John McWhorter: How Welfare Went Wrong“, NPR, August 9, 2006.
  10. Jump up^ Weir, Robert (2007). Class in America. Greenwood Press. p. 616. ISBN 978-0-313-33719-2.
  11. Jump up^ Chandler, Richard, “The Cloward–Piven strategy“, The Washington Times, October 15, 2008
  12. Jump up^ Frances Fox Piven: Glenn Beck Seeks ‘Foreign, Dark-Skinned, Intellectual’ Scapegoats, Kyle Olson, BigGovernment.com, February 8, 2010
  13. Jump up^ Beck, Glenn (February 18, 2010). “Study Says We’re Toast”.
  14. Jump up^ Kim, Richard (April 12, 2010). “The Mad Tea Party”The Nation.
  15. Jump up^ “Glenn Beck Targets Frances Fox Piven”The Nation. February 7, 2011.
  16. Jump up^ Piven, F.F. (2011) Crazy Talk and American Politics: or, My Glenn Beck StoryThe Chronicle of Higher Education (The Chronicle Review) 57(25), B4-B5.

http://en.wikipedia.org/wiki/Cloward%E2%80%93Piven_strategy

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

[youtube=http://www.youtube.com/watch?v=zw3p2

Read Full Post | Make a Comment ( None so far )

National Security Agency (NSA) — Who’s The Enemy? — The American People — House Judiciary Committee Guts NSA Reform Bill — USA Freedom Act — Broadly Defined Bulk Collection Will Continue — Congress Pulls Bait-and-Switch on U.S. Freedom Act — Videos

Posted on May 11, 2014. Filed under: American History, Blogroll, College, Communications, Computers, Computers, Constitution, Data Storage, Diasters, Drones, Economics, Education, Employment, Energy, External Hard Drives, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, government, government spending, history, Inflation, Investments, IRS, Language, Law, liberty, Life, Macroeconomics, media, Mobile Phones, National Security Agency (NSA_, Natural Gas, Nuclear, Nuclear Power, Oil, People, Philosophy, Photos, Politics, Programming, Psychology, Radio, Raves, Regulations, Resources, Security, Strategy, Systems, Talk Radio, Tax Policy, Taxes, Technology, Television, Terrorism, Unemployment, Video, War, Water, Wealth, Weapons, Weapons of Mass Destruction, Weather, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , |

slide_summary__________________________________________________________________________________________________________________prism-slide-1_2-660x483prism-slide-2_2-660x495prism

prism_vendor_slide

nsa-prism-slide.png

PRISM-Slide

prism-slide-6

PRISM-SLIDES-2

top-secret-nsa-prism-slide-9

NSA-X-Keyscore-slide-002

KS1

page7-776px-XKeyscore_presentation_from_2008.pdf

X-Keyscore-4-1024x772

methodology

xkeyscore_slide

tecnology_detection

why_go_deep

KS7

 

Screen-Shot-2013-07-31-at-7.35.06-AM

language_tracking

KS55edit

51fa1a30709a6

KS3edit2

google_mapsdelivery_new_systemsplug_ins

02-550x412

Bizarre week for NSA reformers

“USA Freedom Act” Has All Oversight Of NSA Gutted By Phony Gatekeepers!

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

U.S. Freedom act

Real Talk with Julie Borowski: Stop Snooping, NSA!

Is NSA reform being sabotaged?

 

“The USA FREEDOM Act” Congress Plan To Curb NSA Spying On American Citizens

GOP against Justin Amash The Glenn Beck Talk Show

Report exposes secret NSA snooping tool

Opposing Bulk NSA Surveillance (Rep. Justin Amash)

Rep. Justin Amash cosponsored an amendment that would have defunded the National Security Agency’s unwarranted bulk collection of Americans’ phone data. The measure failed narrowly, but has re-energized the legislative struggle for civil liberties. Amash believes that James Clapper, the Director of National Intelligence, should be prosecuted for lying to Congress. He also says he doesn’t appreciate the “condescending” tone of New Jersey Gov. Chris Christie with respect to the debate over national security.

Glenn Beck Justin Amash Interview On Nsa Surveillance

Congress’s Abdication on NSA Oversight (U.S. Rep. Justin Amash (R-MI))

Justin Amash: President Obama Was ‘Highly Misleading’ In Claiming There’s No Domestic Spying Program

House committee passes NSA reform bill

The House Judiciary Committee passed the National Security Agency reforming “USA Freedom Act” 31-0 Wednesday. The first major piece of legislation seeking to curb the NSA’s collection of electronic information, the bill which has undergone major changes will now proceed to the full House of Representatives. It will be competing with another reform bill that is expected to be approved by the House Intelligence Committee Thursday. RT’s Sam Sacks breaks down the bill and the chances for instituting real reform.

“USA Freedom Act” Bill To Put NSA “Out Of Business”

Fox News Reporting The NSA’s Secret War Who’ The Enemy? 1 of 6

Fox News Reporting The NSA’s Secret War Who’ The Enemy Controversy Not The First Time 2 of

Fox News Reporting The NSA’s Secret War Who’ The Enemy? Controversy? 9 11 3 of 6

Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Phone Records – 4 of 6

Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Edward Snowden & Security – 5 of 6

Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Day Of Reckoning At Hand? – 6 of 6

C-SPAN Callers On The Future Of The National Security Agency (NSA)

James Bamford Says NSA “Exploiting” U.S. Citizens With Info About Their Online Porno Viewing Habits

 

 

 

Congress Pulls Bait-and-Switch on USA FREEDOM Act

Yesterday, C4L sent a letter to members of the House Judiciary Committee strongly opposing the Manager’s Amendment to H.R. 3361, the USA FREEDOM Act.

The original version of the act was sold to Americans as a way to rein in the NSA’s domestic surveillance programs, and it would have been a first step towards real reform of the surveillance state since 9/11.

But, that’s seldom the way Congress works. In an effort to “pass something this year,” the Judiciary Committee watered down the legislation and it passed out of the committee unanimously.

Want proof the recent changes to USA Freedom Act make it unworthy of support from civil libertarians? Mike Rogers and Dutch Ruppersberger, the NSA’s biggest cheerleaders in the House,just reported it out of their committee by voice vote.

What’s more likely, that Rogers and Ruppersberger had a change of heart on the NSA? Or that Judiciary watered down the USA FREEDOM Act enough to the point that its “reform” is devoid of any substantive changes?

The bill is now earning plaudits from the same guys who said the original version would “make America less safe,” and from the administration that never wanted you to know they were spying on you in the first place.

Read Campaign for Liberty’s letter to the Judiciary Committee below:

Letter to Judiciary Committee – USA FREEDOM Act

http://www.campaignforliberty.org/national-blog/congress-pulls-bait-switch-usa-freedom-act/

 

USA Freedom Act unanimously clears House Judiciary Committee

Surveillance reform bill designed to prevent collection of US phone data in bulk and is first to proceed onto the House floor

Jim Sensenbrenner
The bill’s architect, Republican James Sensenbrenner, said the bill ‘makes it crystal clear that Congress does not support bulk collection.’ Photo: Chip Somodevilla /Getty

Six months after it was written to restrain the National Security Agency’s sweeping domestic surveillance, a privacy bill cleared a major legislative obstacle on Wednesday, even as its advocates worried that the compromises made to advance the bill have weakened its constraints on mass data collection.

The USA Freedom Act, designed to prevent the US government from collecting US phone data in bulk, passed the House Judiciary Committee by a 32 to zero bi-partisan vote, making it the first surveillance reform bill to proceed out of committee and to the House floor.

But an internal committee breakthrough on Monday that won the support of chairman Bob Goodlatte, a Virginia Republican, significantly recast the bill, softening its prohibitions on aspects of bulk collection and requiring transparency around it.

The bill’s architect, Republican James Sensenbrenner of Wisconsin, who also wrote the 2001 Patriot Act, said the bill “makes it crystal clear that Congress does not support bulk collection.”

While changes to the bill now permit the government to gather call records up to two degrees of separation away from a specific target – potentially millions of records – Sensenbrenner urged his colleagues “not to make the perfect the enemy of the good,” expressing confidence that the revamped USA Freedom Act was on “the fast track to passage.”

Supporters in and outside of Congress concede the latest compromises have left the USA Freedom Act less protective of civil liberties than it was when introduced in October. Its distinctions from a rival bill written by the leaders of the House intelligence committee, the NSA’s strongest Capitol Hill advocates, are somewhat blurred, prompting civil libertarians to become less enthusiastic of a measure they have championed as a fix to the broad NSA powers exposed by whistleblower Edward Snowden.

Representative John Conyers, a Michigan Democrat and longtime USA Freedom Act supporter, said that the new version of the bill was a “less than perfect compromise” that still makes “important, vital, substantive changes” to US surveillance.

The revised USA Freedom Act, “while still better than any other proposal on the board, is a setback from the original,” said Amie Stepanovich of Access, a human rights and digital rights advocacy group.

While the USA Freedom Act has nearly 150 House co-sponsors, and a stalled Senate companion commands 20 votes in the upper chamber, it was clear on Wednesday that the House intelligence committee will continue attempts to outmaneuvre its rival.

The chairman of the intelligence committee, until now a fervent critic of the USA Freedom Act, is now praising a bill he has long criticized, and which several congressional sources said he attempted to influence ahead of Wednesday’s vote.

Representative Mike Rogers, a Michigan Republican who is retiring this year, called the changes to the USA Freedom Act a “huge improvement,” adding in an interview with Foreign Policy magazine that the bill’s architects have “come a lot closer [and] now we’re just trying to work out the wording.”

Rogers is scheduled to mark up his alternative bill, the Fisa Transparency and Modernization Act, on Thursday, a decision USA Freedom Act supporters view as a desperation move. But on Wednesday, Rogers’ committee announced it will also mark up the USA Freedom Act on Thursday, prompting Capitol Hill speculation that Rogers will attempt to merge his bill with the Freedom Act rather than attempt to rally more votes.

House Speaker John Boehner of Ohio had earlier thrown his support behind Rogers’ bill. But now Boehner is said to be monitoring the committe process and keeping his options open. Congressional sources expected Boehner to schedule a vote on a surveillance proposal – of whatever form – as early as the week of 19 May, so the issue does not derail the annual defense budget authorization, though nothing is scheduled yet.

Both bills as originally crafted prevent the NSA from collecting US phone data in bulk, as it has done in secret since 2001, a position that President Barack Obama now embraces. The major difference between the two bills remains the role of judges in authorizing data collection. The Rogers bill permits the government to collect phone and email data absent a judges’ prior order, which the revised USA Freedom Act requires in all but emergency cases.

Additionally, the revised USA Freedom Act permits the government to get phone data two “hops,” or degrees of separation, from the target of the order, which can mean millions of call records reaped from a single court order. The legal standard for that order, for counterterrorism purposes, will be “reasonable articulable suspicion” of connection to an agent of a foreign power, the NSA’s desired framework.

Significantly, the new version of the USA Freedom Act all but stripped out a provision preventing the NSA from combing through its foreign communications dragnets for Americans’ information, something Senator Ron Wyden of Oregon dubbed the “backdoor search provision,” an absence that has deeply upset supporters. Those dragnets exist pursuant to a major 2008 piece of legislation, known as Section 702 of the Fisa Amendments Act.

Congressional sources pointed to new language tightening up prohibitions on the NSA intentionally targeting Americans’ communications at the outset as a palliative. But they conceded the absence of the backdoor search ban was a major change – one they said the NSA’s advocates fought hard for, an indication of how central the NSA considers a power it has rarely forthrightly acknowledged using. They indicated that USA Freedom Act supporters lacked the votes within the committee to pass the bill that retained the backdoor search prohibition.

An attempt by Representative Zoe Lofgren, a California Democrat, to restore the backdoor search provision failed Wednesday. Goodlatte said restoring it would “disrupt this bipartisan agreement.”

Kevin Bankston of the Open Technology Institute said he was “incredibly disappointed” at the new USA Freedom Act’s effective blessing of backdoor searches.

“Especially when we’re expecting the government’s own surveillance watchdog, the Privacy and Civil Liberties Oversight Board, to issue a report on just that issue within a month or so, closing the door to reform on Section 702 of the Fisa Amendments Act would be premature,” Bankston said in a statement.

But the Judiciary Committee restored a provision initially struck from the original USA Freedom Act permitting increased transparency for companies receiving surveillance orders for their customers’ data, the absence of which had alarmed supporters.

The language, added back to the bill Wednesday by Representative Suzan Delbene of Washington, had been cut in order to codify a January deal the Justice Department reached with phone and Internet companies allowing them to list received orders only in bands of 1,000 and with a time lag. Congressional sources said companies lobbied hard to restore transparency language.

The Obama administration has withheld endorsement of either bill in public, confusing supporters. But in recent weeks, its guidance to Capitol Hill on surveillance reform included a requirement for up-front judicial authorization for data requests, which only the USA Freedom Act possesses.

“At this stage, I think I’d just say we will be watching closely as these bills go through the process,” said Caitlin Hayden, a White House spokeswoman said shortly before the vote.

Hours after the vote, Hayden issued a statement welcoming the USA Freedom Act as “a very good first step”:

“In March the president laid out his proposal to reform Section 215, and called upon Congress to act quickly to pass implementing legislation. We applaud the House Judiciary Committee for approaching this issue on a bipartisan basis. The Judiciary Committee passed bill is a very good first step in that important effort, and we look forward to House Permanent Select Committee on Intelligence action on it tomorrow,” Hayden said.

Section 215 of the Patriot Act is the provision cited by the NSA and blessed by the secret Fisa Court for bulk data collection.

Some legislators, distressed by the changes to the USA Freedom Act, are considering a different option for surveillance reform.

As amended, the USA Freedom Act would push back the expiration of Section 215 to the end of 2017, when Section 702 is set to expire. The current expiration is 1 June of next year. Some legislators are already whispering that allowing Section 215 to expire wholesale in 2015 is a preferable reform.

But Representative Jerrold Nadler of New York, a Democrat, said the USA Freedom Act was “the first, best and perhaps only chance in a decade” to constrain widespread surveillance.

“This is our chance. We have to seize it,” Nadler said on Wednesday.

Patrick Leahy, the Vermont Democrat who sponsored the USA Freedom Act in the Senate, hailed the committee vote, but said he was concerned that the text does not reform the Federal Bureau of Investigation’s national-security letters and makes insufficient changes on transparency and to the Fisa Court.

“I will continue to push for those reforms when the Senate Judiciary Committee considers the USA Freedom Act this summer,” Leahy said in a statement.

http://www.theguardian.com/world/2014/may/07/usa-freedom-act-clears-house-committee-nsa-surveillance

 

USA Freedom Act

The USA Freedom Act, formally titled the Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection and Online Monitoring Act, is a bill that was introduced in both houses of the U.S. Congress on October 29, 2013.

The House version, introduced by Representative Jim Sensenbrenner as HR 3361, was referred to the United States House Judiciary Subcommittee on Crime, Terrorism, Homeland Security and Investigations January 9, 2014,[3] and the Senate version, S. 1599, introduced by Senator Patrick Leahy, was read twice and referred to the Senate Committee on the Judiciary.[4] An amended version out of the House Judiciary Committee contained many provisions raising concerns among civil libertarians,[5] including an extension of the controversial USA PATRIOT Act through the end of 2017.[6][7] The bill will be considered in the Senate through the summer of 2014.[8]

Purpose

The USA Freedom Act[9] would end the bulk collection of Americans’ metadata, end the secret laws created by the FISA court, and introduce a “Special Advocate” to represent public and privacy matters.[10][11][12] Other proposed changes include limits to programs like PRISM, which “incidentally” retains Americans’ Internet data,[13] and greater transparency by allowing companies such as Google and Facebook to disclose information about government demands for information.[14]

Representative Jim Sensenbrenner, who introduced the bill, stated that its purpose was:

To rein in the dragnet collection of data by the National Security Agency (NSA) and other government agencies, increase transparency of the Foreign Intelligence Surveillance Court (FISC), provide businesses the ability to release information regarding FISA requests, and create an independent constitutional advocate to argue cases before the FISC.[10][15]

According to the bill’s sponsors, their legislation would amend Section 215 of the Patriot Act to ensure that any phone records obtained by the government were essential in an investigation that involved terrorism or espionage, thereby ending bulk collection,[16] while preserving “the intelligence community’s ability to gather information in a more focused way.”[17] A May 2014 amended version of the bill would also extend thecontroversial USA PATRIOT Act through the end of 2017.[18] The Electronic Privacy Information Center (EPIC) has criticized the Patriot Act as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”.[19]

The bill is made up of several titles: FISA business records reforms, FISA pen register and trap and trace device reforms, FISA acquisitions targeting persons outside the United States reforms, Foreign Intelligence Surveillance Court reforms, Office of the Special Advocate, National Security Letter reforms, FISA and National Security Letter transparency reforms, and Privacy and Civil Liberties Oversight Board subpoena authority.[20]

Background

Many members of Congress believed that in the wake of the Snowden disclosures, restoration of public trust would require legislative changes.[21] More than 20 bills have been written since the disclosures began with the goal of reining in government surveillance powers.[13]

Sensenbrenner, who introduced the USA PATRIOT Act (H.R. 3162) in 2001 following the September 11 terrorist attacks to give more power to US intelligence agencies, and who has described himself as “author of the Patriot Act”,[22] declared that it was time to put the NSA’s “metadata program out of business”. With its bulk collection of Americans’ phone data, Sensenbrenner asserted that the intelligence community “misused those powers”, had gone “far beyond” the original intent of the legislation, and had “overstepped its authority”.[21][23]

An opinion piece by Leahy and Sensenbrenner, published in Politico, described the impetus for proposed changes,[24] saying:

The intelligence community has failed to justify its expansive use of [the FISA and Patriot Act] laws. It is simply not accurate to say that the bulk collection of phone records has prevented dozens of terrorist plots. The most senior NSA officials have acknowledged as much in congressional testimony. We also know that the FISA court has admonished the government for making a series of substantial misrepresentations to the court regarding these programs. As a result, the intelligence community now faces a trust deficit with the American public that compromises its ability to do its job. It is not enough to just make minor tweaks around the edges. It is time for real, substantive reform.[17]

Markup in House Judiciary Committee

In May 2014, the U.S. House Judiciary Committee posted a “Manager’s Amendment” on its website. Title VII of the Amendment read “Section 102(b)(1) of the USA Patriot Improvement and Reauthorization Act of 2005 (50 U.S.C. 1805 note) is amended by striking “June 1, 2015″ and inserting “December 31, 2017″, extending the controversial USA PATRIOT Act through the end of 2017.[25] The Electronic Privacy Information Center(EPIC) has criticized the Patriot Act as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”.[19] James Dempsey, of the CDT, believes that the Patriot Act unnecessarily overlooks the importance of notice under the Fourth Amendment and under a Title III wiretap,[26] while the American Library Association became so concerned that they formed a resolution condemning the USA PATRIOT Act, and which urged members to defend free speech and protect patrons’ privacy against the Act.[27]

The Guardian wrote “civil libertarians on the Judiciary Committee had to compromise in order to gain support for the act. Significantly, the government will still be able to collect phone data on Americans, pending a judge’s individualized order based on ‘reasonable articulable suspicion‘ – a standard preferred by the NSA – of wrongdoing, and can collect call records two degrees or ‘hops’ of separation from the individual suspected”.[5] Kara Brandeisky of ProPublica said “some worry that the bill does not unequivocally ban bulk collection of American records. Again, a lot depends on how the Foreign Intelligence Surveillance Court interprets the statute”.[28]

The National Journal wrote “one tech lobbyist noted concern that a provision that would have allowed companies to disclose to customers more information about government data requests has been dropped. In addition, an external special advocate that would oversee the Foreign Intelligence Surveillance Court would no longer be selected by the Privacy and Civil Liberties Oversight Board. Instead, the court’s judges would designate five ‘amicus curiae‘ who possess appropriate security clearances.”[29]

The Electronic Frontier Foundation (EFF) stated it remained “concerned that this bill omits important transparency provisions found in the USA FREEDOM Act, which are necessary to shed light on surveillance abuses”. In addition, the EFF said it believed “this bill should do more to address mass surveillance under Section 702 of Foreign Intelligence Surveillance Amendments Act, a section of law used to collect the communications of users worldwide”.[30] The Open Technology Institute commented “several other key reforms—such as provisions allowing Internet and phone companies to publish more information about the demands they receive, which OTI and a coalition of companies and organizations have been pressing for since last summer—have been removed, while the bill also provides for a new type of court order that the President has requested, allowing for continuous collection by the government of specified telephone records.”[31]

Despite the criticism from civil liberties groups, Mike Rogers, a defender of the NSA‘s surveillance practices and the chairman of the House Intelligence Committee, praised the amendments. Rogers, who had his own bill which would codify the NSA’s surveillance practices in to law, called the proposed amendments a “huge improvement”. Foreign Policy wrote “any compromise to the Judiciary bill risks an insurrection from civil libertarians in Congress. Michigan Republican Justin Amash led such a revolt last year when he offered an NSA amendment to a defense appropriations bill that would have stripped funding for the NSA’s collection program.” “Just a weakened bill or worse than status quo? I’ll find out,” Representative Amash said.[32]

After passage of the marked up bill, USA Freedom Act co-author and Senate Committee on the Judiciary Chairman Patrick Leahy commented that he “remain concerned that the legislation approved today does not include some of the important reforms related to national security letters, a strong special advocate at the FISA Court, and greater transparency. I will continue to push for those reforms when the Senate Judiciary Committee considers the USA FREEDOM Act this summer.”[8]

Reaction

The Act has bipartisan support, evenly split between Democrats and Republicans. As of May 8, 2014, it had 150 co-sponsors in the House[1] and 21 in the Senate.[2] Viewed as one of the most comprehensive of the similar bills introduced since the NSA leaks, the USA Freedom Act has support or qualified support from a diverse range of groups such as the ACLUMozilla, and the NRA.[13][33]

Representative Justin Amash, author of the narrowly-defeated Amash Amendment, a proposal that would have de-funded the NSA, backed the legislation. “It’s getting out of control” he commented, “[Courts are issuing] general warrants without specific cause…and you have one agency that’s essentially having superpowers to pass information onto others”.[23]

According to Deputy Attorney General James Cole, even if the Freedom Act becomes law, the NSA could continue its bulk collection of American’s phone records. He explained that “it’s going to depend on how the [FISA] court interprets any number of the provisions” contained within the legislation.[16] Jennifer Granick, Director of Civil Liberties at Stanford Law School, stated:

The Administration and the intelligence community believe they can do whatever they want, regardless of the laws Congress passes, so long they can convince one of the judges appointed to the secretive Foreign Intelligence Surveillance Court (FISC) to agree. This isn’t the rule of law. This is a coup d’etat.[16]

Opponents of global surveillance have called for the bill to be strengthened. The Electronic Frontier Foundation (EFF) released a statement saying “we consider this bill to be a floor, not a ceiling”. The ACLU wrote that “although the USA Freedom Act does not fix every problem with the government’s surveillance authorities and programs, it is an important first step and it deserves broad support.”[34][35]

International human rights groups remain somewhat skeptical of specific provisions of the bill. For example, Human Rights Watch expressed its concern that the “bill would do little to increase protections for the right to privacy for people outside the United States, a key problem that plagues U.S. surveillance activities. Nor would the bill address mass surveillance or bulk collection practices that may be occurring under other laws or regulations, such as Section 702 of the FISA Amendments Act or Executive Order 12333. These practices affect many more people and include the collection of the actual content of internet communications and phone calls, not just metadata”.[36] Zeke Johnson, Director of Amnesty International‘s Security and Human Rights Program, agreed that “any proposal that fails to ban mass surveillance, end blanket secrecy, or stop discrimination against people outside the U.S. will be a false fix”.[37]

See also

References

  1. Jump up to:a b “Bill Summary & Status 113th Congress (2013–2014) H.R.3361″THOMAS, Library of Congress. Retrieved 8 May 2014.
  2. Jump up to:a b “Bill Summary & Status 113th Congress (2013–2014) H.R.3361″THOMAS, Library of Congress. Retrieved 8 May 2014.
  3. Jump up^ “Bill Summary & Status 113th Congress (2013–2014) H.R.3361″. THOMAS, Library of Congress.
  4. Jump up^ “Bill Summary & Status 113th Congress (2013–2014) S.1599″. THOMAS, Library of Congress.
  5. Jump up to:a b The Guardian: Chairman of key House committee agrees to proceed with NSA reform bill
  6. Jump up^ House Judicicary Committee: Manager’s Amendment to USA Freedom Act

    Section 102(b)(1) of the USA PATRIOT Improvement and Reauthorization Act of 2005 (50 U.S.C. 1805 note) is amended by striking ‘‘June 1, 2015’’ and inserting ‘‘December 31, 2017’’.

  7. Jump up^ The Guardian: USA Freedom Act unanimously clears House Judiciary Committee

    As amended, the USA Freedom Act would push back the expiration of Section 215 to the end of 2017, when Section 702 is set to expire. The current expiration is 1 June of next year. Some legislators are already whispering that allowing Section 215 to expire wholesale in 2015 is a preferable reform.

  8. Jump up to:a b Office of Senator Patrick Leahy: Comment Of Senator Patrick Leahy (D-Vt.), Chairman, Senate Judiciary Committee, On Action by the House Judiciary Committee to End Bulk Collection
  9. Jump up^ “Bill Summary & Status: 113th Congress (2013–2014) H.R.3361 CRS Summary”. THOMAS, Library of Congress.
  10. Jump up to:a b Roberts, Dan. “The USA Freedom Act: a look at the key points of the draft bill”Guardian.com. Retrieved 18 January 2014.
  11. Jump up^ Wilhelm, Alex (2013-10-29). “Proposed USA FREEDOM Act Would Dramatically Curtail The NSA’s Surveillance”TechCrunch.com. Retrieved 18 January 2014.
  12. Jump up^ ‘Patriot Act’ Author Seeks ‘USA Freedom Act’ to Rein In NSA – US News and World Report. Usnews.com (October 10, 2013).
  13. Jump up to:a b c Gallagher, Rhan. “U.S. Lawmakers Launch Assault on NSA Domestic Snooping”Slate.com. Retrieved 18 January 2014.
  14. Jump up^ “USA Freedom Act Would Leash the National Security Agency”Businessweek. Bloomberg. 2013-10-31. Retrieved 18 January 2014.
  15. Jump up^ Sensenbrenner, Jim. “The USA Freedom Act”House.gov. Retrieved 18 January 2014.
  16. Jump up to:a b c Granick, Jennifer (2013-12-16). “NSA’s Creative Interpretations Of Law Subvert Congress And The Rule Of Law”Forbes. Retrieved 18 January 2014.
  17. Jump up to:a b Leahy, Sen. Patrick; Sensenbrenner, Rep. Jim (29 October 2013). “The case for NSA reform”Politico. Retrieved 18 January 2014.
  18. Jump up^ House Judicicary Committee: Manager’s Amendment to USA Freedom Act
  19. Jump up to:a b “Analysis of Specific USA PATRIOT Act Provisions: Expanded Dissemination of Information Obtained in Criminal Investigations”AnalysisElectronic Privacy Information Center. Retrieved July 11, 2008.
  20. Jump up^ “Bill Text 113th Congress (2013–2014) H.R.3361.IH”THOMASLibrary of Congress. Retrieved 2014-03-09.
  21. Jump up to:a b Roberts, Dan (2013-10-10). “Patriot Act author prepares bill to put NSA bulk collection ‘out of business'”Guardian. Retrieved 20 January 2014.
  22. Jump up^ Editorial Board (2013-06-06). “President Obama’s Dragnet”. New York Times.
  23. Jump up to:a b Krietz, Andrew (2013-10-15). “Amash-backed bill aimed to end NSA spying programs garners even bipartisan support”. Retrieved 20 January 2014.
  24. Jump up^ Shabad, Rebecca (2014-01-16). “Sen. Leahy on NSA claim: ‘Baloney'”The Hill.com. Retrieved 18 January 2014.
  25. Jump up^ House Judicicary Committee: Manager’s Amendment to USA Freedom Act
  26. Jump up^ James X. Dempsey“Why Sections 209, 212, and 220 Should be Modified” (undated). Retrieved October 15, 2007.
  27. Jump up^ “Resolution on the USA Patriot Act and Related Measures That Infringe on the Rights of Library Users”American Library Association. January 29, 2003. Retrieved July 11, 2008.
  28. Jump up^ ProPublica: What the Proposed NSA Reforms Wouldn’t Do
  29. Jump up^ National Journal: House Panels Race Against Each Other to Reform NSA Spying
  30. Jump up^ EFF Statement on Rep. Sensenbrenner’s USA FREEDOM Act Amendment
  31. Jump up^ Open Technology Institute: OTI Statement on New Version of Surveillance Reform Bill, The USA FREEDOM Act
  32. Jump up^ Foreign Policy: Key NSA Defender: Congress ‘A Lot Closer’ On Surveillance Reform
  33. Jump up^ Handerson (2013-10-29). “The Freedom Act will Help Rebuild User Trust in the Internet”The Mozilla Blog. Retrieved 18 January 2014.
  34. Jump up^ Kurt Opsahl and Rainey Reitman (2013-11-14). “A Floor, Not a Ceiling: Supporting the USA FREEDOM Act as a Step Towards Less Surveillance”. Electronic Frontier Foundation.
  35. Jump up^ Michelle Richardson (2013-10-29). “The USA FREEDOM Act is Real Spying Reform”. American Civil Liberties Union.
  36. Jump up^ Human Rights Watch: US: Modest Step by Congress on NSA Reform
  37. Jump up^ Amnesty International: Congress Must Put Human Rights at the Center of Surveillance Reform

External links

http://en.wikipedia.org/wiki/USA_Freedom_Act

 

XKeyscore

From Wikipedia, the free encyclopedia

Logo for the XKeyscore program

XKeyscore or XKEYSCORE (abbreviated as XKS) is a formerly secret computer system first used by the United States National Security Agency for searching and analyzing Internet data it collects worldwide every day. The program has been shared with other spy agencies including Australia’s Defence Signals Directorate, New Zealand’s Government Communications Security Bureau and the German Bundesnachrichtendienst.[1]

The program’s existence was publicly revealed in July 2013 by Edward Snowden in The Sydney Morning Herald and O Globo newspapers, though the codename is mentioned in earlier articles, and like many other codenames can also be seen in job postings, and in the online resumes of employees.[2][3]

The scope of XKeyscore

XKeyscore is a complicated system and various authors have different interpretations about its actual capabilities. Edward Snowden and Glenn Greenwald explained XKeyscore as being a system which enables almost unlimited surveillance of anyone anywhere in the world, while NSA said that usage of the system is limited and restricted.

According to The Washington Post and national security reporter Marc Ambinder, XKeyscore is an NSA data-retrieval system which consists of a series of user interfaces, backend databases, servers and software that selects certain types of data and metadata that the NSA has already collected using other methods.[4][5]

According to Snowden and Greenwald

On January 26, 2014, the German broadcaster Norddeutscher Rundfunk asked Edward Snowden in its TV interview: “What could you do if you would use XKeyscore?” and he answered:[1]

“You could read anyone’s email in the world, anybody you’ve got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you’re tracking: you can follow it as it moves from place to place throughout the world. It’s a one-stop-shop for access to the NSA’s information.”
“…You can tag individuals… Let’s say you work at a major German corporation and I want access to that network, I can track your username on a website on a form somewhere, I can track your real name, I can track associations with your friends and I can build what’s called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.”

According to The Guardian’s Glenn Greenwald, low-level NSA analysts can via systems like XKeyscore “listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst.”[6]

He added that the NSA’s databank of collected communications allows its analysts to listen “to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future”.[6]

According to the NSA

Further information: SIGINT

In an official statement from July 30, 2013, the NSA said there is no “unchecked analyst access to NSA collection data. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks.” The NSA also states that there are “stringent oversight and compliance mechanisms built in at several levels. One feature is the system’s ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst’s defined responsibilities.”[7]

The agency defended the program, stressing that it was only used to legally obtain information about “legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. [...] XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system. [...] These types of programs allow us to collect the information that enables us to perform our missions successfully — to defend the nation and to protect U.S. and allied troops abroad.”[8]

Workings

Slide from a 2008 NSA presentation about XKeyscore, showing a worldmap with the locations of XKeyscore servers

Slide from a 2008 NSA presentation about XKeyscore, showing the query hierarchy

An NSA presentation about XKeyscore from 2008 says that it’s a “DNI Exploitation System/Analytic Framework”. DNI stands for Digital Network Intelligence, which means intelligence derived from internet traffic.[9] In an interview with the German Norddeutscher Rundfunk, Edward Snowden said about XKeyscore: “It’s a front end search engine”.[10]

Data sources

XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data, like “US and allied military and other facilities as well as US embassies and consulates” in many countries around the world.[11][12][13] Among the facilities involved in the program are four bases in Australia and one in New Zealand.[12]

According to an NSA presentation from 2008, these XKeyscore servers are fed with data from the following collection systems:[14]

  1. F6 (Special Collection Service) – joint operation of the CIA and NSA that carries out clandestine operations including espionage on foreign diplomats and leaders
  2. FORNSAT – which stands for “foreign satellite collection”, and refers to intercepts from satellites
  3. SSO (Special Source Operations) – a division of the NSA that cooperates with telecommunication providers

In a single, undated slide published by Swedish media in December 2013, the following additional data sources for XKeyscore are mentioned:[15]

  1. Overhead – intelligence derived from American spy planes, drones and satellites
  2. Tailored Access Operations – a division of the NSA that deals with hacking and cyberwarfare
  3. FISA – all types of surveillance approved by the Foreign Intelligence Surveillance Court
  4. Third party – foreign partners of the NSA such as the (signals) intelligence agencies of Belgium, Denmark, France, Germany, Italy, Japan, the Netherlands, Norway, Sweden, etc.

From these sources, XKeyscore stores “full-take data”, which are indexed by plug-ins that extract certain types of metadata (like phone numbers, e-mail addresses, log-ins, and user activity) and index them in metadata tables, which can be queried by analysts. XKeyscore has been integrated with MARINA, which is NSA’s database for internet metadata.[9]

However, the system continuously gets so much Internet data that it can be stored only for short periods of time. Content data remain on the system for only three to five days, while metadata is stored for up to 30 days.[16] A detailed commentary on an NSA presentation published in The Guardian in July 2013 cites a document published in 2008 declaring that “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”[17]

Capabilities

Slide from a 2008 NSA presentation about XKeyscore, showing the differences between the various NSA database systems

For analysts, XKeyscore provides a “series of viewers for common data types”, which allows them to query terabytes of raw data gathered at the aforementioned collection sites. This enables them to find targets that cannot be found by searching only the metadata, and also to do this against data sets that otherwise would have been dropped by the front-end data processing systems. According to a slide from an XKeyscore presentation, NSA collection sites select and forward less than 5% of the internet traffic to the PINWALE database for internet content.[16]

Because XKeyscore holds raw and unselected communications traffic, analysts can not only perform queries using “strong selectors” like e-mail addresses, but also using “soft selectors”, like keywords, against the body texts of e-mail and chat messages and digital documents and spreadsheets in English, Arabic and Chinese.[9]

This is useful because “a large amount of time spent on the web is performing actions that are anonymous” and therefore those activities can’t be found by just looking for e-mail addresses of a target. When content has been found, the analyst might be able to find new intelligence or a strong selector, which can then be used for starting a traditional search.[9]

Besides using soft selectors, analysts can also use the following other XKeyscore capabilities:[9][18]

  • Look for the usage of Google Maps and terms entered into a search engine by known targets looking for suspicious things or places.
  • Look for “anomalies” without any specific person attached, like detecting the nationality of foreigners by analyzing the language used within intercepted emails. An example would be a German speaker in Pakistan. The Brazilian paper O Globo claims that this has been applied to Latin America and specifically to Colombia, Ecuador, Mexico and Venezuela.[11][19]
  • Detect people who use encryption by do searches like “all PGP usage in Iran”. The caveat given is that very broad queries can result in too much data to transmit back to the analyst.
  • Showing the usage of Virtual private networks (VPNs) and machines that can potentially be hacked via TAO.
  • Track the source and authorship of a document that has passed through many hands.

Most of these things cannot be detected by other NSA tools because they operate with strong selectors (like e-mail and IP addresses and phone numbers) and the raw data volumes are too high to forward them to other NSA databases.[9]

In 2008, it was planned to add a number of new capabilities in the future, like:

Significance

The NSA slides published in The Guardian during 2013 claimed that XKeyscore had played a role in capturing 300 terrorists by 2008.[9] This claim could not be substantiated as the redacted documents do not cite instances of terrorist interventions.

A 2011 report from the NSA unit in Griesheim (Germany) says that XKeyscore made it easier and more efficient to target surveillance. Previously, analysis often accessed data they were not interested in. XKeyscore allowed them to focus on the intended topics, while ignoring unrelated data. XKeyscore also proved to be an outstanding tool for tracking active groups associated with the Anonymous movement in Germany, because it allows for searching on patterns, rather than particular individuals. An analyst is able to determine when targets research new topics, or develop new behaviors.[20]

To create additional motivation, the NSA incorporated various features from computer games into the program. For instance, analysts who were especially good at using XKeyscore could acquire “skilz” points and “unlock achievements.” The training units in Griesheim were apparently successful and analysts there had achieved the “highest average of skilz points” compared with all other NSA departments participating in the training program.[20]

Usage by foreign partners of the NSA

Germany

Excerpt of an NSA document leaked by Edward Snowden that reveals the BND‘s usage of the NSA’s XKeyscore to wiretap a German domestic target

According to documents Der Spiegel acquired from Snowden, the German intelligence agencies BND (foreign intelligence) and BfV (domestic intelligence) were also allowed to use the XKeyscore system. In those documents the BND agency was described as the NSA’s most prolific partner in information gathering.[21] This led to political confrontations, after which the directors of the German intelligence agencies briefed members of the German parliamentary intelligence oversight committee on July 25, 2013. They declared that XKeyscore has been used by the BND since 2007 and that the BfV uses a test version since 2012. The directors also explained that this program is not for collecting data, but only for analyzing them.[22]

Sweden

As part of the UKUSA Agreement, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand for the purpose of intelligence collaboration and data sharing.[23] According to documents leaked by Snowden, the National Defence Radio Establishment (FRA) has been granted access to XKeyscore.[24]

 

Related Posts On Pronk Palisades

A Matter Of Trust — Do You Believe The National Security Agency And The House Armed Services Committee That Snowden Is A Traitor? The Same People That Have Been Spying On The American People For Decades And Lying About It– Fat Chance

National Security Agency Invades Computers Using Radio Pathway — Crossing The Line Into Criminal Activity — Videos

National Security Agency (NSA)  — Thin Thread — Trailblazer — The Program — Stellar Wind: PRISM — NUCLEON — Mainstay — Marina — EVILOLIVE — FASCIA —  XKeyscore — Co-Traveller — Photos — Slides — Videos

Snowden Used Automated Web Crawler To Scrap Data From Over 1.7 Million Restricted National Security Agency Files — Videos

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

When will Bureau of Land Management (BLM) Roundup 2,000 Plus Wild Horses On Utah Rangeland? — The BLM Should Do Its Job and Not Harass Neveda Ranchers! — BLM’s Appropriate Management Level (AML) of 27,000 Wild Horses and Over 40,000 Wild Horses Nationally Plus Over 50,000 in Feed Lost Costing The American Taxpayer Millions! — Herd Size Doubles Every 4 Years — Sell The Wild Horses To China and Mexico — Beef and Food Prices Soaring — Connect The Dots People — Videos

Posted on April 13, 2014. Filed under: Agriculture, American History, Beef, Blogroll, Bread, Business, College, Communications, Data, Demographics, Diasters, Economics, Education, Employment, Faith, Family, Famine, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Food, Freedom, Friends, Fruit, government, government spending, history, Language, Law, liberty, Life, Links, media, Milk, People, Philosophy, Photos, Rants, Raves, Regulations, Resources, Security, Transportation, Vegetables | Tags: , , , , , , , , , , , , , , , , , |

food_pricesThis image is most likely part of a set containing many other similar images.If you would like to view more of this set,please contact us at sales@runwiththewild.com,All prices are negotiable  8]blm-estimatedpop

BLM2blm

blm_chart feral_horses map_blmwild-horse-captivity-costs   wild_horses_2  Wild horse or mustangblm_round_upblm_helicopterfeed_lots

obama

Rising-Food-Prices

national_brands_store_brands_food_prices

worldfoodpriceincreases

milk_consumption

cpi_categories_1

FRED_food

cereals_bakery

Wild Horses on Public Lands and the impact on Ranching and Communities

We took the show to Beaver County this week to get an on the ground look at how wild horses impact the range. In Utah the population of wild horses is over the Appropriate Management Level (AML) by 1,300 animals. Nationally the problem of dealing with the number of wild horses increases to 14,000 beyond the AML. The management of wild horses costs the BLM tens of millions of dollars every year but despite the efforts to gather wild horses off the range; the numbers keep increasing.
Chad Booth talks to Beaver County Commissioner, Mark Whitney; Iron County Commissioner, David Miller; and local rancher Mark Winch about the impacts on ranchers and the ultimate impact it has on the economies of rural Utah.

Transfer of Public Lands

Public Lands in Utah County Seat Season3, Episode 8

In recent years there has been a public outcry from Utahans asking the State to take a more active role in how management decisions are made on public lands. The take back Utah movement has looked at the history of public lands in the United States and began to ask why hasn’t Utah received the same treatment as other states in the Union. Utah has about 67% of its lands controlled and managed by the federal government. Some counties in the state are about 90% federally owned which creates a burden on the local governments because there is no property tax base to pay for the services that citizens need.

Last year Utah passed the Utah Public Lands Transfer Act, HB148; which basically asks the federal government to dispose of the remaining unallocated federal lands within the state by 2014. HB148 has opened up a conversation about what the proper role of the federal government should be in the management of public lands. Today’s show takes a look at the issues from a federal, state, and county perspective.

 

WARNING! MORE FOOD INFLATION COMING 2014 STOCK UP ASAP

Grocery Prices Soar

Spike in food prices has shoppers feeling effects – Mar 19th, 2014

U S Government Says ‘No Inflation’ As Food Prices Soar New update 2014

Preppers: Food Prices Rise Sharply – Up 19% for 2014!

Milk Prices PKG

Food Prices The Shocking Truth

Food Prices The Shocking Truth 1 of 2

Food Prices The Shocking Truth 2 of 2

Worldwide Food Shortages

GLOBAL FOOD CRISIS to Usher in Worldwide Famine

Where’s the (Cheap) Beef? US Prices Soar

Meat Beef Bacon Costs Rise due to Drought? Inflation! Starvation Great-Depression Dollar$

Beef prices explained

BLM Wild Horse Strategy

The BLM’s Wild Horse and Burro Program

BLM Socorro Water Trap Method Wild Horse Gather

The World Food Crisis ~ Special Report

Don’t Fence Me In – Roy Rogers & The Sons of the Pioneers –

Roy Rogers & Sons of The Pioneers Sing “The Last Roundup”

Wild horses targeted for roundup in Utah rangeland clash

Reuters
Two of a band of wild horses graze in the Nephi Wash area outside Enterprise, Utah

.

View gallery

Two of a band of wild horses graze in the Nephi Wash area outside Enterprise, Utah, April 10, 2014. REUTERS/Jim …

By Jennifer Dobner

ENTERPRISE, Utah (Reuters) – A Utah county, angry over the destruction of federal rangeland that ranchers use to graze cattle, has started a bid to round up federally protected wild horses it blames for the problem in the latest dustup over land management in the U.S. West.

Close to 2,000 wild horses are roaming southern Utah’s Iron County, well over the 300 the U.S. Bureau of Land Management has dubbed as appropriate for the rural area’s nine designated herd management zones, County Commissioner David Miller said.

County officials complain the burgeoning herd is destroying vegetation crucial to ranchers who pay to graze their cattle on the land, and who have already been asked to reduce their herds to cope with an anticipated drought.

Wild horse preservation groups say any attempt to remove the horses would be a federal crime.

On Thursday county workers, accompanied by a Bureau of Land Management staffer, set up the first in a series of metal corrals designed to trap and hold the horses on private land abutting the federal range until they can be moved to BLM facilities for adoption.

“There’s been no management of the animals and they keep reproducing,” Miller said in an interview. “The rangeland just can’t sustain it.”

The conflict reflects broader tension between ranchers, who have traditionally grazed cattle on public lands and held sway over land-use decisions, and environmentalists and land managers facing competing demands on the same land.

The Iron County roundup comes on the heels of an incident in neighboring Nevada in which authorities sent in helicopters and wranglers on horseback to confiscate the cattle herd of a rancher they say is illegally grazing livestock on public land.

In Utah, county commissioners warned federal land managers in a letter last month that the county would act independently to remove the horses if no mitigation efforts were launched.

“We charge you to fulfill your responsibility,” commissioners wrote. “Inaction and no-management practices pose an imminent threat to ranchers.”

The operation was expected to last weeks or months.

“The BLM is actively working with Iron County to address the horse issue,” Utah-based BLM spokeswoman Megan Crandall said, declining to comment further.

Attorneys for wild horse preservation groups sent a letter this week to Iron County commissioners and the BLM saying the BLM, under federal law, cannot round up horses on public lands without proper analysis and disclosure.

“The BLM must stop caving to the private financial interests of livestock owners whenever they complain about the protected wild horses using limited resources that are available on such lands,” wrote Katherine Meyer of Meyer, Glitzenstein and Crystal a Washington, DC-based public interest law firm representing the advocates.

LONG-RUNNING PROBLEM

The BLM puts the free-roaming wild horse and burro population across western states at more than 40,600, which it says on its website exceeds by nearly 14,000 the number of animals it believes “can exist in balance with other public rangeland resources and uses.”

Wild horse advocates point out that the tens of thousands of wild horses on BLM property pales into comparison with the millions of private livestock grazing on public lands managed by the agency.

Wild horses have not been culled due to budget constraints, according to Utah BLM officials, who say their herds grow by roughly 20 percent per year.

Pressure on rangeland from the horses may worsen this summer due to a drought that could dry up the already sparse available food supply, according to Miller.

“We’re going to see those horses starving to death out on the range,” he said. “The humane thing is to get this going now.”

Adding to frustration is BLM pressure on ranchers to cut their cattle herds by as much as 50 percent to cope with the drought, Miller said.

A tour of Iron County rangeland, not far from the Nevada border, illustrates the unchecked herds’ impact on the land, said Jeremy Hunt, a fourth generation Utah rancher whose cattle graze in the summer in a management area split through its middle by a barbed wire fence.

On the cattle side of the fence, the sagebrush and grass landscape is thick and green. The other, where a group of horses was seen on Thursday, is scattered with barren patches of dirt and sparse vegetation.

“This land is being literally destroyed because they are not following the laws that they set up to govern themselves,” said Hunt, who also works as a farmhand to make ends meet for his family of six.

“I want the land to be healthy and I want be a good steward of the land,” he added. “But you have to manage both sides of the fence.”

 

 

Wholesale Prices in U.S. Rise on Services as Goods Stagnate

 

Wholesale prices in the U.S. rose in March as the cost of services climbed by the most in four years while commodities stagnated.

The 0.5 percent advance in the producer-price index was the biggest since June and followed a 0.1 percent decrease the prior month, the Labor Department reported today in Washington. The recent inclusion of services may contribute to the gauge’s volatility from month-to-month, which will make it more difficult to determine underlying trends.

Rising prices at clothing and jewelry retailers and food wholesalers accounted for much of the jump in services, even as energy costs retreated, signaling slowing growth in emerging markets such as China will keep price pressures muted. With inflation running well below the Federal Reserve’s goal, the central bank is likely to keep borrowing costs low in an effort to spur growth.

“Every six months or so service prices seem to pop, but over the year, service prices tend to dampen inflation more often than not,” Jay Morelock, an economist at FTN Financial in New York, wrote in a note. “One month of price gains is not indicative of a trend.”

Also today, consumer confidence climbed this month to the highest level since July, a sign an improving job market is lifting Americans’ spirits. The Thomson Reuters/University of Michigan preliminary April sentiment index rose to 82.6 from 80 a month earlier.

 
Photographer: Craig Warga/Bloomberg

Rising prices at clothing and jewelry retailers and food wholesalers accounted for much… Read More

Shares Fall

Stocks dropped, with the Standard & Poor’s 500 Index heading for its biggest weekly decline since January, as disappointing results from JPMorgan Chase & Co. fueled concern that corporate earnings will be weak. The S&P 500 fell 0.4 percent to 1,826.29 at 10:02 a.m. in New York.

Today’s PPI report is the third to use an expanded index that measures 75 percent of the economy, compared to about a third for the old metric, which tallied the costs of goods alone. After its first major overhaul since 1978, PPI now measures prices received for services, government purchases, exports and construction.

Estimates for the PPI in the Bloomberg survey of 72 economists ranged from a drop of 0.2 percent to a 0.3 percent gain.

Core wholesale prices, which exclude volatile food and energy categories, climbed 0.6 percent, the biggest gain since March 2011, exceeding the projected 0.2 percent advance of economists surveyed by Bloomberg. They dropped 0.2 percent in February.

Past Year

The year-to-year gain in producer prices was the biggest since August and followed a 0.9 percent increase in the 12 months to February. Excluding food and energy, the index also increased 1.4 percent year to year following a 1.1 percent year-to-year gain in February.

The cost of services climbed 0.7 percent in March, the biggest gain since January 2010. Goods prices were unchanged and were up 1.1 percent over the past 12 months.

Wholesale food costs climbed 1.1 percent in March, led by higher costs for meats, including pork and sausage. Energy costs fell 1.2 percent last month.

Food producers and restaurants say they’re paying more for beef, poultry, dairy and shrimp. At General Mills Inc. (GIS), maker of Yoplait yogurt, Cheerios cereal and other brands, rising dairy prices helped push retail profit down 11 percent in the third quarter, said Ken Powell, chairman and chief executive officer of the Minneapolis-based company. Powell called the inflation “manageable.”

Food Prices

“While the economy is improving slowly and incomes are strengthening slowly, they are improving,” Powell said on a March 19 earnings call. “As incomes continue to grow and consumers gain confidence that will be a positive sign for our category.”

Today’s PPI report provides a glimpse into the consumer-price index, the broadest of three inflation measures released by the Labor Department. The CPI, due to be released April 15, probably climbed 0.1 percent in March, according to the median forecast in a Bloomberg survey.

The wholesale price report also offers an advance look into the personal consumption expenditures deflator, a gauge monitored closely by the Fed. Health care prices make up the largest share of the core PCE index, which excludes food and energy costs. The next PCE report is due from the Commerce Department May 1.

This week, Fed policy makers played down their own predictions that interest rates might rise faster than they had forecast, according to minutes of the Federal Open Market Committee’s March meeting. The minutes bolstered remarks made by last month by Chair Janet Yellen.

“If inflation is persistently running below our 2 percent objective, that is a very good reason to hold the funds rate at its present range for longer,” Yellen said at a March 19 press conference following the committee meeting.

 

http://www.bloomberg.com/news/2014-04-11/wholesale-prices-in-u-s-rise-more-than-forecast-on-services.html

Read Full Post | Make a Comment ( None so far )

16 Year Old Teenager Stabs 20 in High School — Progressives Call For Registration of All Knives, Concealed Knife Carry Permits and Ban On All Assault Knives — Will Baseball Bats Be Next? — Videos

Posted on April 10, 2014. Filed under: Blogroll, Culture, Diasters, Economics, Education, Freedom, High School, Law, liberty, Life, Links, media, People, Philosophy, Photos, Press, Rants, Security, Talk Radio, Terrorism, Video, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 241: April 10, 2014

Pronk Pops Show 240: April 9, 2014

Pronk Pops Show 239: April 8, 2014

Pronk Pops Show 238: April 7, 2014

Pronk Pops Show 237: April 4, 2014

Pronk Pops Show 236: April 3, 2014

Pronk Pops Show 235: March 31, 2014

Pronk Pops Show 234: March 28, 2014

Pronk Pops Show 233: March 27, 2014

Pronk Pops Show 232: March 26, 2014

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1:16 Year Old Teenager Stabs 20 in High School — Progressives Call For Registration of All Knives, Concealed Knife Carry Permits and Ban On All Assault Knives — Will Baseball Bats Be Next? —  Videos

Kitchen-knives

20_hurt_in_Pennsylvania_school_stabbing_1492980000_4031342_ver1.0_640_480franklin-regional-hs-600franklin2 the_stabber stabber_2Alex Hribal suspect

kitchen-knife-f2z

News Wrap: Teenager stabs students at Pennsylvania school

High School Stabbing Franklin Regional High School Murrysville Pennsylvania 20 Students

Alex Hribal Did High School Stabbing At Franklin High Murrysville Pennsylvania

BREAKING: Surgeon Reports Over Mass Stabbing at Franklin High School

Mass Stabbing 20 Students injured Franklin Regional High School in Murrysville PA YouTube

BREAKING: Mass Stabbing Suspect Alex Hribal to be Tried as Adult

News Wrap: Teenager stabs students at Pennsylvania school

CNN Contributor Compares MASS Stabbing VS Shooting: You Get Your Hands Dirty

Suspect in School Stabbing Spree Is ‘Confused, Scared and Depressed’

Alex Hribal, the 16-year-old student who police say stabbed 22 people at his Pennsylvania high school Wednesday, is “confused, scared and depressed,” his attorney told ABC News in an exclusive interview.

“I think he understands what he did,” attorney Patrick Thomassey said in an interview with “Good Morning America.”

“I don’t think he at this point understands the gravity of what he did. I don’t think he realizes how severely injured some of these people are. And, hopefully, there’s no death involved in any of these. We’re praying that everybody is all right.”

Knife-Wielding Pa. Student Wounds at Least 22 in Stabbing Spree

Thomassey said he’s unaware of any signs of Hribal’s being bullied, adding that the teen’s parents are shocked and horrified.

“They could not have predicted that this was going to happen,” he said. “They don’t understand how this occurred.”

The stabbing spree happened at Franklin Regional High School in Murrysville, a suburb located about 20 miles east of Pittsburgh. Morgan Ritchey, who said she had two classes with Hribal, described him as being “a little misunderstood.”

I just always felt like he had a different side to him that nobody knew and it was, like, hard to uncover,” said Ritchey. Hribal, a sophomore, used two 8-to-10 inch “kitchen-type” “straight” knives in the attack, which started shortly after 7 a.m., police said. Murrysville Police Officer William “Buzz” Yakshe, a school resource officer, heard a disturbance in the hallway and joined a school security guard to go find out what was happening, according to a police affidavit. The guard and officer split up. The next time Yakshe saw the guard, he was leaning against a wall, bleeding from his stomach. Sam King, the school’s assistant principal, told police he saw Hribal stab the security guard. King tackled the teen and subdued him while Yakshe handcuffed him. King heard one of the victims say, “I’ve been stabbed,” he told police. Authorities charged Hribal as an adult with four counts of attempted criminal homicide, 21 counts of aggravated assault and one count of possession of weapons on school property. He was being held without bail in a juvenile detention center in Westmoreland County. Murrysville Police Chief Thomas Seefeld said someone pulled a fire alarm during the attack, raising attention and getting students and teachers to evacuate. “When we got there we saw a hallway in chaos, as you can imagine,” Seefeld said at a news conference. “There was a lot of evidence of blood on the floors and in the hallway, we had students running about, trying to get out of the area.” Nate Moore, 15, was stabbed during the rampage and said he had to be treated with 15 stitches. “It was really fast. It felt like he hit me with a wet rag because I felt the blood splash on my face. It spurted up on my forehead,” Moore told The Associated Press. Student Gracey Evans said heroes emerged during the attack. “My best friend, he stepped in front of me and in the meantime, he got stabbed in the back protecting me,” she said. “You couldn’t step a single place without pretty much stepping in blood.” At least 22 people were injured after the stabbings at the start of the school day, Westmoreland County emergency management spokesman Dan Stevens said. The motive for the rampage is under investigation. Seefeld said officials were unaware of any warning signs from the suspect, a sophomore at the school. At least four people with injuries emergency management officials described as “serious” were flown to hospitals for treatment. Others were not actually stabbed, he said, and some of their injuries included cuts and scrapes. http://gma.yahoo.com/suspect-school-stabbing-spree-confused-scared-depressed-115319444–abc-news-topstories.html

A BLANK LOOK, FOLLOWED BY BLOODSHED AT HIGH SCHOOL

It was just before the start of class and the hallways were packed with students at their lockers or chatting with friends.

Nate Moore was walking to homeroom, book in hand, when a classmate he knew to be quiet and unassuming tackled a freshman boy a few feet in front of him. Moore thought it was the start of a fistfight and went to break it up.

But 16-year-old Alex Hribal wasn’t throwing punches — he was stabbing his victim in the belly, Moore said. The suspect got up and slashed Moore’s face, then took off down the hall, where authorities said he stabbed and slashed other students in an attack that injured 21 students and a security guard — and might have been even worse but for the “heroes” who Pennsylvania’s governor said helped prevent further injury or loss of life.

An assistant principal tackled and subdued Hribal, who was charged Wednesday night with four counts of attempted homicide and 21 counts of aggravated assault and jailed without bail. Authorities said he would be prosecuted as an adult.

The suspect’s motive remained a mystery.

“He wasn’t saying anything,” Moore recalled hours later. “He didn’t have any anger on his face. It was just a blank expression.”

At a brief hearing Wednesday night, District Attorney John Peck said that after he was taken into custody, Hribal made comments suggesting he wanted to die. Defense attorney Patrick Thomassey described him as a good student who got along with others, and asked for a psychiatric examination.

Thomassey told ABC’s Good Morning America on Thursday that any defense he offers would likely be based on Hribal’s mental health. He said he hoped to move the charges against the teenager to juvenile court, where he could be rehabilitated. If convicted as an adult, Hribal faces likely decades in prison.

Thomassey told several media outlets that Hribal is remorseful, though he acknowledged his client didn’t appear to appreciate the gravity of his actions.

“At this point, he’s confused, scared and depressed. Over the next few days we’ll try to figure out what the heck happened here,” Thomassey told ABC. “I think he understands what he did. … I don’t think he realizes how severely injured some of these people are.”

At least five students were critically wounded in the attack, including a boy who was on a ventilator after a knife pierced his liver, missing his heart and aorta by only millimeters, doctors said. He had additional surgery overnight, they said.

The rampage comes after decades in which U.S. schools have focused their emergency preparedness on mass shootings, not stabbings.

While knife attacks at schools are not unusual, they’re most often limited to a single victim, said Mo Canady, executive director of the National Association of School Resource Officers.

Nevertheless, there have been at least two major stabbing attacks at U.S. schools over the past year, the first at a community college in Texas last April that wounded at least 14 people, and another, also in Texas, that killed a 17-year-old student and injured three others at a high school last September.

The attack in Pittsburgh unfolded shortly after 7 a.m. Wednesday, a few minutes before the start of classes at 1,200-student Franklin Regional High School, in an upper-middle-class area 15 miles east of Pittsburgh. By Thursday morning, the school was no longer being treated as a crime scene, according to police and school officials, who said they expected it to reopen Monday.

Mia Meixner, 16, said the freshman boy who was tackled tried to fight back, then, when his assailant got off him, stood up and lifted his shirt to reveal a midsection covered in blood.

“He had his shirt pulled up and he was screaming, ‘Help! Help!'” said another witness, Michael Float, 18. “He had a stab wound right at the top right of his stomach, blood pouring down.”

As students rushed to the boy’s aid, the attacker slashed Moore before taking off around a bend.

“It was really fast. It felt like he hit me with a wet rag because I felt the blood splash on my face. It spurted up on my forehead,” said Moore, whose gashed right cheek required 11 stitches.

The boy ran down about 200 feet of hallway, slashing and stabbing other students with kitchen knives about 8 to 10 inches long, police said. The assault touched off a “stampede of kids” yelling, “Run! Get out of here! Someone has a knife!” according to Meixner.

Assistant Principal Sam King heard the commotion and found a chaotic scene in the blood-soaked hall.

“I’ve been stabbed,” he heard a student say, according to a police affidavit.

King then saw Hribal stab a security guard, who leaned against the wall, bleeding from his stomach, the affidavit said. King tackled Hribal and kept him on the floor until a school police officer handcuffed him.

The rampage lasted about five minutes.

“There are a number of heroes in this day. Many of them are students,” Gov. Tom Corbett said in a visit to the town. “Students who stayed with their friends and didn’t leave their friends.”

He also commended cafeteria workers, teachers and teacher’s aides who put themselves at risk to help others.

Looking for a motive, Murrysville Police Chief Thomas Seefeld said investigators were checking reports of a threatening phone call between Hribal and another student the night before. He didn’t say whether the suspect received or made the call.

The FBI went to the boy’s house, and local media reports said agents removed at least one computer along with other items.

Meixner and Moore called the attacker a shy and quiet boy who largely kept to himself, but they said he was not an outcast and they saw no indication before the attack that he might be violent.

“He was never mean to anyone, and I never saw people be mean to him,” Meixner said. “I never saw him with a particular group of friends.”

During the attack, the boy had a “blank look,” she said. “He was just kind of looking like he always does, not smiling, not scowling or frowning.”

___

Associated Press writers Michael Rubinkam in northeastern Pennsylvania, Joe Mandak in Pittsburgh and JoAnn Loviglio in Philadelphia contributed to this report.

http://www.breitbart.com/system/wire/ap_9a58be3772564946b1e85a87f10519ca

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 236-241

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Breaking News: Shooting At Fort Hood in Texas — 16 Wounded From Gunshots and 4 Dead Including Shooter — Shelter in Place — PTSD and Suicides of Afgan and Iraq War Veterans — The War Within — Videos

Posted on April 2, 2014. Filed under: Blogroll, Business, Communications, Constitution, Crime, Diasters, government, government spending, Homicide, liberty, Life, Links, media, Politics, Press, Radio, Talk Radio, Video, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

fort-hood-0514-story-tophood-mapfort_hood

fort-hood-texas-map

miiltary-flights-fort-hood-map1

fort_hood_entrance

Ivan_Lopez

Sources have confirmed to CBS 11 that this image is that of suspected shooter 34-year-old Ivan Lopez.

ivan-slipknot-photos-91

Sources have confirmed to CBS 11 that this image is that of suspected shooter 34-year-old Ivan Lopez.

fort-hood-3

ivan_lopez_2

Fort Hood Shooter Was On Psych Meds

Fort Hood Shooting: Four dead and 16 injured in another mass shooting

Army: Alleged Shooter Saw No Combat in Iraq

President Obama Delivers a Statement on Fort Hood

WATCH: Fort Hood Shooting Military News Conference 4/2/2014

Fort Hood Soldier Opens Fire On Army Base

 

Fort Hood shooting – exclusive Footage shooter at Military army Base Texas! 4/2/2014

 

President Obama Fort Hood Shooting Military Base 2014 | SPEECH

[YOUTUBE=http://www.youtube.com/watch?v=A8-g2fNKJIg]

Multiple Fatalities In Shooting At Fort Hood – April 2, 2014

Fort Hood Shooting Base on Lockdown Several injured by Active Shooter

 

Fort Hood Texas shooting police scanner April 2 2014

Fort Hood TX Shooting April 2014 Dispatch Audio, Part 1

CNN: “A” SHOOTER IN FORT HOOD INCIDENT IS DEAD!

Shooting at Fort Hood Military Base | At least one dead | Raw Footage

Shooting in Fort Hood April 02 2014

(Original) Full Video: Shooting At Fort Hood Military Post ~ Today April 2, 2014

Fort Hood Shooting In Texas! (SHOOTER IS DEAD!)

Shooting At Fort Hood Military Post Base! (April 2, 2014)

BREAKING: Mass Shooting At Fort Hood Military Base Multiple Casualties – APRIL 2, 2014

BREAKING: Shooting at Fort Hood Military Base – 1 Death Confirmed

7News : Shooting at Fort Hood military base

Fort Hood Shooting In Texas At Fort Hood Military Base | 1 Death Confirmed

Islamic Jihad : Three Stages of Islamic Jihad 

November 5, 2009

Broken Heart: “For The Record” on the Fort Hood Shooting

Soldier Opens Fire At Fort Hood; 4 Dead, Several Injured

A soldier opened fire Wednesday on fellow service members at the Fort Hood military base, killing three people and wounding 16 before committing suicide at the same post where more than a dozen people were slain in a 2009 attack, authorities said.

The shooter, 34-year-old Ivan Lopez who served in Iraq in 2011, had been undergoing an assessment to determine whether he had post-traumatic stress disorder, according to Lt. Gen. Mark A. Milley, the senior officer on the base. He was also undergoing psychiatric treatment for depression.

FULL COVERAGE OF FORT HOOD SHOOTING

There was no indication the attack was related to terrorism, Milley said “although we are not ruling anything out.”

A Texas congressman said the shooting happened at a medical center. Rep. Michael McCaul, chairman of the House Homeland Security Committee, also identified the suspect as Ivan Lopez. But additional details about the gunman were not immediately available.

The injured were taken to Darnall Army Community Hospital at Fort Hood and other local hospitals. Dr. Glen Couchman, chief medical officer at Scott and White Hospital in Temple, said the first four people admitted there had gunshots to chest, abdomen, neck and extremities and that their conditions range from stable to “quite critical.”  At last check, nine patients had been admitted to Scott and White.

The 2009 assault on Fort Hood was the deadliest attack on a domestic military installation in U.S. history. Thirteen people were killed and more than 30 wounded.

After the shooting began, the Army’s official Twitter feed said the post had been locked down. Hours later, all-clear sirens sounded.

On Wednesday evening, a fatigue-clad soldier and a military police officer stood about a quarter-mile from the main gate waving away traffic. Other lanes were blocked by a police car and van.

Meanwhile, relatives of soldiers waited for news about their loved ones.

Tayra DeHart, 33, said she had last heard from her husband, a soldier at the post, that he was safe, but that was hours earlier.

“The last two hours have been the most nerve-racking I’ve ever felt. I know God is here protecting me and all the soldiers, but I have my phone in my hand just hoping it will ring and it will be my husband,” DeHart said.

Brooke Conover, whose husband was on base at the time of the shooting, said she found out about it while checking Facebook. She said she called her husband, Staff Sgt. Sean Conover, immediately to make sure he was OK, but he could not even tell her exactly what was going on, only that the base was locked down.

“I’m still hearing conflicting stories about what happened and where the shooting was exactly,” Conover said in a telephone interview, explaining that she still did not know how close the incident was to her husband.

“I just want him to come home,” said Conover, who moved to Fort Hood with her husband and three daughters two years ago.

President Barack Obama vowed that investigators would get to the bottom of the shooting.

In a hastily arranged statement in Chicago, Obama said he was following the situation closely. He said the shooting brought back painful memories of the 2009 attack.

Obama reflected on the sacrifices that troops stationed at Fort Hood have made – including enduring multiple tours to Iraq and Afghanistan.

“They serve with valor. They serve with distinction, and when they’re at their home base, they need to feel safe,” Obama said. “We don’t yet know what happened tonight, but obviously that sense of safety has been broken once again.”

The president spoke without notes or prepared remarks in the same room of a steakhouse where he had just met with about 25 donors at a previously scheduled fundraiser for the Democratic National Committee. White House officials quickly pushed tables to the side of the room to make room for Obama to speak to the nation.

The November 2009 attack happened inside a crowded building where soldiers were waiting to get vaccines and routine paperwork after recently returning from deployments or preparing to go to Afghanistan and Iraq.

Army psychiatrist Nidal Hasan was convicted and sentenced to death last year in that mass shooting. He said he acted to protect Islamic insurgents abroad from American aggression.

According to testimony during Hasan’s trial last August, Hasan walked inside carrying two weapons and several loaded magazines, shouted “Allahu Akbar!” – Arabic for “God is great!” – and opened fire with a handgun.

Witnesses said he targeted soldiers as he walked through the building, leaving pools of blood, spent casings and dying soldiers on the floor. Photos of the scene were shown to the 13 officers on the military jury.

The rampage ended when Hasan was shot in the back by Fort Hood police officers outside the building. He was paralyzed from the waist down and is now on death row at the military prison at Fort Leavenworth in Kansas.

After that shooting, the military tightened security at bases nationwide. Those measures included issuing security personnel long-barreled weapons, adding an insider-attack scenario to their training and strengthening ties to local law enforcement, according to Peter Daly, a vice admiral who retired from the Navy in 2011. The military also joined an FBI intelligence-sharing program aimed at identifying terror threats.

 

http://dfw.cbslocal.com/2014/04/02/search-for-active-shooter-on-fort-hood-base/

3 Victims, Gunman Dead After Second Fort Hood Mass Shooting

Deceased are all military personnel, Fort Hood official says

By Frank Heinz

Four people are dead, including the gunman, and another 16 are injured in a mass shooting at the Fort Hood Army post Wednesday. One of the survivors is in grave condition, NBC News reports.

More than four hours after the shooting, all-clear sirens sounded as the lockdown at the post was lifted. Hundreds of cars began streaming from the giant complex, many including children who had been kept locked-down in schools since gunshots were first reported at about 4:30 p.m.

A military official told NBC News that the deceased shooter, identified as 34-year-old enlisted Army soldier Ivan Lopez, took his own life and appeared to be the only shooter, despite an earlier report of two possible gunmen.

Lt. Gen. Mark Milley, the commanding general at Fort Hood, refused to identify the gunman during a news conference Wednesday night pending notification of family members.

Milley said the sequence of events are not 100 percent clear but that investigators believe the shooting began when a soldier assigned to the 13th Sustainment Command (Expeditionary) fired shots at individuals in the 1st Medical Brigade. Milley said the shooter then left that building, got into a vehicle and continued firing. He then went to another building at the post, went inside and opened fire.  The gunman, when confronted by a military police officer, put his gun to his head and pulled the trigger.

The gunman was armed with a single weapon, a .45-caliber Smith & Wesson handgun he had recently purchased, Milley said.

The gunman had served four months in Iraq in 2011 and was currently under diagnosis for post traumatic stress disorder, but had not been officially diagnosed with PTSD, Milley said. He added the shooter was undergoing behavioral health care for depression and anxiety, had a self-reported traumatic brain injury and was not physically injured in combat.

NBC News learned that Lopez served with the Puerto Rican Army National Guard and was an E4 in the U.S. Army.  NBC News reported that the shooter was in uniform and that the shooting rampage may have resulted from an argument with other soldiers in the motor pool and was not related to terrorism.

The names of the victims have not yet been released, though Milley did confirm that all of the victims are military personnel.  Officials at Fort Hood said the names of the victims will be released 24 hours after all family have been notified.

Temple Hospital Taking Fort Hood Patients

Baylor Scott & White Hospital in Temple confirms they have a command center in place and have received nine patients from the post.

All patients are in the intensive care unit; three are critical and five are serious.  The ninth patient is en route, as of 10:20 p.m. Wednesday night.

In an update early Wednesday night, Glen Couchman, chief medical officer for Baylor Scott & White Memorial Hospital, said patients are receiving treatment for wounds to their chest, abdomen, neck and extremities and range from “stable to quite critical.”

“This is another sad day for Central Texas,” Couchman said. He said the hospital planned to offer another update on the conditions of the victims later in the evening.

Officials at Baylor Scott & White said the blood center closed at 8 p.m., but will be open for donations from 8 a.m. to 7 p.m. Thursday.

Investigation Continues

Officials at Fort Hood said Wednesday that there is no indication the mass shooting is related to terrorism.

The investigation by law enforcement is ongoing and post officials were reluctant to reveal any further information about what may have led to the rampage.

Milley said the investigation into the shooting continues and that nothing is being ruled out as a cause at this point. The investigation is being conducted with the support of The Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation, the Texas Rangers, The Texas Department of Public Safety, military police, Army CID, the Killeen Police Department and the Harker Heights Police Department.

During the lockdown of the base, officials with the Bell County Sheriff’s Office and Texas Department of Public Safety were called in to help to secure the perimeter of the largest active duty armored post in the U.S. Armed Services.

Obama, Gov. Perry Respond

President Barack Obama addressed the shooting in brief remarks in Chicago, where he was attending a fundraiser Wednesday night.

“We’re following it closely. The situation is fluid right now … I want to just assure all of us we are going to get to the bottom of exactly what happened,” he said. “We’re heartbroken something like this might have happened again.”

Texas Gov. Rick Perry issued a statement Wednesday as well. “Today, Fort Hood was once again stricken by tragedy,” he said. “Fort Hood has proven its resilience before, and will again.”

Perry was one of several politicians who tweeted messages following the news of the shooting, many of whom called for prayers for the post and Central Texas.

Mom Stuck at Fort Hood With 4-Year-Old During Shooting

Charlotte Spencer was picking up her 4-year-old son from soccer practice on the Fort Hood post when Wednesday’s shooting occurred.

Spencer said her son had just climbed in the car when a woman came over a loudspeaker telling everyone to shelter in place immediately.

“The siren came over and she was like, ‘This is an emergency. Get in your homes, lock your doors, lock your windows, turn off your AC units and turn off your heaters if you have them running. Just stay in place. This is an active emergency,’” Spencer described.

Spencer said she tried to delicately explain the all too familiar situation to her young son.

“It Sounded Powerful”

Antonio Ortiz, 30, who lives a quarter of a mile from the east gate of Fort Hood, told NBC News he heard a commotion and went outside to hear alarms going off and announcements for people to stay inside. He went back in and turned on the TV news, then soon after heard a barrage of gunshots.

“It sounded powerful,” Ortiz said, adding that while it seemed to be coming from the base, he couldn’t rule out the possibility someone in the civilian neighborhood was shooting.

“I’m scared for my son. He’s 7,” Ortiz said. “But I do have a 12-gauge pump shotgun.”

Tayra DeHart, 33, said she had last heard from her husband, a soldier at the post, that he was safe, but that was hours earlier.

“The last two hours have been the most nerve-wracking I’ve ever felt. I know God is here protecting me and all the soldiers, but I have my phone in my hand just hoping it will ring and it will be my husband,” DeHart said.

Brooke Conover, whose husband was on base at the time of the shooting, said she found out about it while checking Facebook. She said she called her husband, Staff Sgt. Sean Conover, immediately to make sure he was OK, but he couldn’t even tell her exactly what was going on, only that the base was locked down.

“I’m still hearing conflicting stories about what happened and where the shooting was exactly,” Conover said in a telephone interview, explaining that she still doesn’t know how close the incident was to her husband.

“I just want him to come home,” said Conover, who moved to Fort Hood with her husband and three daughters two years ago.

Tragic History at Fort Hood

In November 2009, 13 people were killed and more than 30 others injured when Maj. Nidal Hasan, an Army psychiatrist, opened fire on dozens of people at the post. Hasan was paralyzed during an exchange of gunfire and, in late 2013, was sentenced to death.  He is currently awaiting execution.

In February, officials at the Central Texas Army post said the site of the 2009 massacre, a processing center also known as Building 42003, had been razed.

Hasan’s rampage isn’t the most recent mass shooting at a U.S. military installation.  Last September, a lone gunman with ties to North Texas, Aaron Alexis, killed 12 when he opened fire at the Washington Navy Yard.

Largest Active-Duty Military Base

Fort Hood covers a total of 340 square miles and supports multiple units, a corps headquarters and a robust mobilization mission. It is home to two full divisions, the 1st Cavalry Division and 4th Infantry Division (Mechanized) and 12 additional units.

Around 50,000 soldiers work at Fort Hood, and there are an additional 150,000 civilians who support the base.

The post is about 60 miles north of the capital city of Austin, 50 miles south of Waco, 160 miles south of Dallas and 150 miles north of San Antonio

http://www.nbcdfw.com/news/local/Active-Shooter-Reported-at-Fort-Hood-253636461.html

FBI, military hunt ex-Army recruit suspected of plotting ‘Ft. Hood-inspired jihad’

EXCLUSIVE: The FBI is searching for a recent Army recruit believed to be planning a “Fort Hood-inspired jihad against U.S. soldiers,” FoxNews.com has learned.

The alert, whose legitimacy was confirmed by military and law enforcement officials, stated that a man identified as Booker had told friends of his “intention to commit jihad.” Booker, who is also known as Muhammad Abdullah Hassan, was recruited by the U.S. Army in Kansas City, Mo., in February 2014 and was scheduled to report for basic training on April 7. But he was discharged last week, apparently after law enforcement authorities learned of his alleged plan.

Both the FBI and the 902d Military Intelligence Group at Fort Leavenworth are involved in the hunt.

The alert, a copy of which was obtained by FoxNews.com, was sent out by the FBI’s Kansas City Division on Friday and distributed through the U.S. Marine Corps. The portion obtained by FoxNews.com did not include Hassan’s photo or age. It was also sent to the Kansas City Police Department, which could indicate authorities believe he may have remained in the area where he was recruited.

The alert is titled, “Planned Fort Hood-inspired Jihad against US Soldiers by Army Recruit” and was issued “to inform and protect officers who may encounter this individual or others exhibiting the same aspirations.” The source of the information contained in the alert was listed as “An FBI agent.”

According to the alert:

“On 20 March 2014, the Kansas City Division FBI became aware of an individual named BOOKER aka Muhammad Abdullah Hassan who had publicly stated his intention to commit jihad, bidding farewell to his friends and making comments indicating his jihad was imminent. BOOKER had been recruited by the US Army in Kansas City, Mo., in February 2014 and was scheduled to report for Basic Training on 7 April 2014. Kansas City Division Agents interviewed BOOKER on 20 March 2014.”

Marine Corps spokesman Capt. Ty Balzer confirmed the alert’s legitimacy, but referred questions to the FBI. A spokeswoman with the Kansas City Division of the FBI — the same division responsible for sending out the alert and who, according to the alert, spoke with Booker on March 20 — said she did “not have any information to provide in regards to your inquiry.”

Law enforcement sources familiar with the alert said it appeared to suggest that there may be others in addition to Booker who also might have expressed similar intentions to commit jihad against U.S. military installations.

A military source said it appeared the bulletin was provided by the FBI, then distributed by the Marine Corps under the normal protocol of sharing any information relating to a potential threat to U.S. military installations or personnel.

A spokesman for the Kansas City recruiting station where Booker enlisted referred FoxNews.com’s questions to 902d Military Intelligence Group, which did not immediately return requests for comment.

The Fort Hood shooting, referenced in the alert, took place on Nov. 5, 2009. U.S. Army Maj. Nidal Hasan, a psychiatrist who had become a radical Muslim while serving in the military, killed 13 people and injured dozens more inside the Texas Army base. Hasan, who represented himself at a military trial after clashing with his appointed attorneys, was sentenced to death in August.

http://www.foxnews.com/us/2014/04/01/military-hunts-one-time-recruit-planning-ft-hood-style-jihad/

 

Shooting Confirmed at Fort Hood Army Base

NBC News reports there may be two shooters, one down, one at-large

 

Multiple people have been injured and the search for the gunman is underway after a shooting at the Fort Hood Army post Wednesday afternoon.

Reports of an active shooter triggered a lockdown at Fort Hood, with local sheriff’s deputies and the FBI immediately responding.
As many as eight people may be injured, and there may have been two shooters, NBC News reported. One of those was believed to be “down,” while the second was believed to be at-large, according to NBC News.

Fort Hood confirmed that a shooting occurred at the base, though the number of people injured and the severity of their injuries has not been confirmed.

Just after 5 p.m. local time, the base tweeted that all personnel were being asked to shelter in place, close doors and stay away from windows.

The shooting is believed to have taken place at the Medical Brigade Building. Local NBC affiliate KCEN-TV reported there were also reports of victims at the Battle Simulation Center.

Central Texas College’ campus was evacuated due to the shooting, with all personnel and students asked to leave and all classes canceled.

Officials with the Bell County Sheriff’s Office and Texas Department of Public Safety are helping to secure the perimiter of the base.

In November 2009, 13 people were killed and more than 30 others injured when Maj. Nidal Hasan opened fire on dozens of people at the base. Hasan was paralyzed during an exchange of gunfire and, in late 2013, was sentenced to death. He is currently awaiting execution.

 

 

Background Articles and Videos

US Soldier Suicides: Congress to increase efforts to curb high rate of military suicides

 

Vets Rally to Curb Military Suicides

Iraq and Afghanistan veterans express pain and pride of war

According to a new survey, 89 percent of Iraq and Afghanistan War veterans say they would join the military again, while also reporting a spike in suicide, reduced physical wellness and feelings of disconnection. Gwen Ifill talks to two veterans, Tom Tarantino of Iraq and Afghanistan Veterans of America and Nathan Smith of Hire Heroes USA, as well as Rajiv Chandrasekaran of The Washington Post.

Tens of thousands of Afghan, Iraq war veterans homeless in 2013

Quick Facts: Plight of US veterans

On Afghan War 11th Anniversary, Vets Confront Mental Health Crisis, Suicide, Violence 1 of 3

On the 11th anniversary of the U.S. invasion of Afghanistan, we take a look at the invisible wounds of war here at home. Since the war began on Oct. 7, 2001, less than a month after the Sept. 11th attacks, at least 2,000 U.S. soldiers have died. Some 2.4 million U.S. soldiers have served in Afghanistan and Iraq, and the psychological toll of the wars is mounting. Last year, the Veterans Administration treated almost 100,000 Iraq and Afghanistan veterans for post-traumatic stress disorder (PTSD) and soldier suicides reached an all-time high this year.

On Afghan War 11th Anniversary, Vets Confront Mental Health Crisis, Suicide, Violence 2 of 3

On Afghan War 11th Anniversary, Vets Confront Mental Health Crisis, Suicide, Violence 3 of 3

ALEX JONES INFOWARS – US VETERANS – RECORD SUICIDES DUE TO PTSD

Between Iraq and a Hard Place – PTSD and Suicides in Iraq

Veterans of PTSD PBS NOW

The War Within 1 of 4

The War Within 2 of 4

The War Within 3 of 4

The War Within 4 of 4

Marines PTSD Suicide CPL Anthony Clay Ward, USMC, FOX 2/11 Iraq War

 

 

 

 

 

 

 

 

 

Veterans statistics: PTSD, Depression, TBI, Suicide.

The following veterans statistics are from a major study done by the RAND Corporation (full pdf of study), a study by the Congressional Research Service, the Veterans Administration, and the US Surgeon General.

PTSD statistics are a moving target that is fuzzy: do you look only at PTSD diagnosed within one year of return from battle? Do you only count PTSD that limits a soldier’s ability to go back into battle or remain employed, but that may have destroyed a marriage or wrecked a family? Do you look at the PTSD statistics for PTSD that comes up at any time in a person’s life: it is possible to have undiagnosed PTSD for 30 years and not realize it–possibly never or until you find a way to get better and then you realize there is another way to live. When you count the PTSD statistic of “what percentage of a population gets PTSD,” is your overall starting group combat veterans, veterans who served in the target country, or all military personnel for the duration of a war?

And veterans PTSD statistics get revised over time. The findings from the NVVR Study (National Vietnam Veterans’ Readjustment Study) commissioned by the government in the 1980s initially found that for “Vietnam theater veterans” 15% of men had PTSD at the time of the study and 30% of men had PTSD at some point in their life. But a 2003 re-analysis found that “contrary to the initial analysis of the NVVRS data, a large majority of Vietnam Veterans struggled with chronic PTSD symptoms, with four out of five reporting recent symptoms when interviewed 20-25 years after Vietnam.” (see also NVVR review)

There is a similar problem with suicide statistics. The DoD and their researchers tend to lose track of military personnel once they retire, and not all suicides will be counted as a military suicide (plus, is a person who drinks themselves to death committing suicide?). A recent study found U.S. veteran suicide rates to be be as high as 5,000 a year. See suicide statistics (bottom of page).

Summary of Veterans Statistics for PTSD, TBI, Depression and Suicide.

    • there are over 2.3 million American veterans of the Iraq and Afghanistan wars (compared to 2.6 million Vietnam veterans who fought in Vietnam; there are 8.2 million “Vietnam Era Veterans” (personnel who served anywhere during any time of the Vietnam War)
    • at least 20% of Iraq and Afghanistan veterans have PTSD and/or Depression. (Military counselors I have interviewed state that, in their opinion, the percentage of veterans with PTSD is much higher; the number climbs higher when combined with TBI.) Other accepted studies have found a PTSD prevalence of 14%; see a complete review of PTSD prevalence studies, which quotes studies with findings ranging from 4 -17% of Iraq War veterans with post-traumatic stress disorder)
    • 50% of those with PTSD do not seek treatment
    • out of the half that seek treatment, only half of them get “minimally adequate” treatment (RAND study)
    • 19% of veterans may have traumatic brain injury (TBI)
    • Over 260,000 veterans from OIF and OEF so far have been diagnosed with TBI. Traumatic brain injury is much more common in the general population than  previously thought: according to the CDC, over 1,700,000 Americans have a traumatic brain injury each year; in Canada 20% of teens had TBI resulting in hospital admission or that involved over 5 minutes of unconsciousness (VA surgeon reporting in BBC News)
    • 7% of veterans have both post-traumatic stress disorder and traumatic brain injury
    • rates of post-traumatic stress are greater for these wars than prior conflicts
    • in times of peace, in any given year, about 4% (actually 3.6%) of the general population have PTSD (caused by natural disasters, car accidents, abuse, etc.)
    • recent statistical studies show that rates of veteran suicide are much higher than previously thought (see suicide prevention page).
    • PTSD distribution between services for OND, OIF, and OEF: Army 67% of cases, Air Force 9%, Navy 11%, and Marines 13%. (Congressional Research Service, Sept. 2010)
    • recent sample of 600 veterans from Iraq and Afghanistan found: 14% post-traumatic stress disorder; 39% alcohol abuse; 3% drug abuse. Major depression also a problem. “Mental and Physical Health Status and Alcohol and Drug Use Following Return From Deployment to Iraq or Afghanistan.” Susan V. Eisen, PhD
    • Oddly, statistics for veteran tobacco use are never reported alongside PTSD statistics, even though increases in rates of smoking are strongly correlated with the stress of deployment and combat, and smoking statistics show that tobacco use is tremendously damaging and costly for soldiers.
    • More active duty personnel die by own hand than combat in 2012 (New York Times)

Other veterans PTSD statistics references and sources:

 

U.S. Suicide Rate Surged Among Veterans
Eli Clifton

Suicides among United States military veterans ballooned by 26 percent from 2005 to 2007, according to new statistics released by the Veterans Affairs (VA) department. 

“Of the more than 30,000 suicides in this country each year, fully 20 percent of them are acts by veterans,” said VA Secretary Eric Shinseki at a VA-sponsored suicide prevention conference on Monday. “That means on average 18 veterans commit suicide each day. Five of those veterans are under our care at VA.”

The spike in the suicide rate can most clearly be attributed to the ongoing wars in Iraq and Afghanistan and the high number of veterans returning to the U.S. with post-traumatic stress disorder (PTSD).

”We have now nearly two million vets of Iraq and Afghanistan and we still haven’t seen the type of mobilisation of resources necessary to handle an epidemic of veteran suicides,” Aaron Glantz, an editor at New America Media editor and author of “The War Comes Home”, told IPS.

”With [President Barack] Obama surging in Afghanistan coupled with his unwillingness to withdraw speedily from Iraq, it means we have more veterans who have served more and more tours and as a result we have an escalating number of people coming home with PTSD, depression and other mental health issues,” Glantz continued.

Health officials have pointed to the multiple tours of duty served by many U.S. soldiers deployed to Afghanistan and Iraq as one of the stresses placed on military personnel that differs from previous wars fought by the U.S.

“The unfortunate truth is that the real challenge begins when these service men and women return home and readjust to day-to-day life,” said Rep. Michael McMahon, co-founder of the Congressional Invisible Wounds Caucus.

“The Department of Defense and the Department of Veterans Affairs must be prepared with the appropriate staff and funding to conduct post-deployment psychological screenings with a mental health professional for all service men and women,” he said. “Evidently, the paper questionnaires currently in use simply do not suffice. How many more young men and women must die before we provide the necessary mental health care?”

The VA estimated that in 2005, the suicide rate per 100,000 veterans among men ages 18-29 was 44.99, but jumped to 56.77 in 2007.

A Rand Corporation report last year found that as many as 20 percent of Iraq and Afghanistan veterans exhibited symptoms of PTSD or depression.

”As I’ve often asked, mostly of myself, but also of others from time to time, why do we know so much about suicides but so little about how to prevent them?” said Shinseki.

The VA came under attack by veterans’ groups in April 2008, when internal emails sent by the VA’s head of mental health, Dr. Ira Katz, showed that the VA was attempting to conceal the number of suicides committed by veterans.

Under the Obama administration, the approach to handling the increasing number of suicides appears to have shifted, with a greater focus on transparency – the VA is holding a three-day conference on suicide this week. Last year, Obama announced a 25-billion-dollar increase in the VA’s budget over the next five years.

While the emphasis on greater transparency, particularly with regards to PTSD and mental health issues, and increased funding for the VA has been welcomed, many are still concerned that the troop surge in Afghanistan and the ongoing U.S. role in Iraq will put ever greater strains on the VA and its ability to deal with soldiers returning from multiple tours of duty.

”The first Gulf War was over in a matter of months. This war has gone on for nine years in Afghanistan and seven years in Iraq. There are two million vets, most of whom have served multiple tours,” said Glantz.

”What this means is that the military has never faced the stress it faces now. Not even in Vietnam where we had a draft and most soldiers only served one tour. In Iraq and Afghanistan everyone’s on the frontlines all the time. Even being in a vehicle going from one military base to another is extremely dangerous,” he said.

Shinseki cited the fact that of the 18 veterans who commit suicide each day, five are under the care of the VA, as evidence that both the VA’s efforts to prevent suicides are falling short and that the VA is failing to bring enough veterans under its care.

Suicides among active duty personnel have also risen, with 147 reported suicides in the Army from January through November 2009 – an increase from 127 in the same period of 2008.

Among non-active duty reserve soldiers, 50 suicides were reported in 2008 but the number had risen to 71 during the first 11 months of 2009.

Suicide rates in all four services of the military are significantly higher than in the general population, with 52 Marines, 48 sailors, and 41 members of the Air force committing suicide in 2009.

The final figures for suicides in the Army during 2009 will be released Thursday.

http://ipsnorthamerica.net/news.php?idnews=2784

 

Read Full Post | Make a Comment ( None so far )

NSA Metadata To Be Held By Telephone Companies — Great Distraction — Still Collecting and Intercepting All Americans Telephone Calls and All Information Transmitted Over The Internet and Telephone Exchanges — Stop Deceiving The American People Mr. President — Videos

Posted on March 30, 2014. Filed under: American History, Blogroll, Business, Central Intelligence Agency (CIA), Comedy, Communications, Computers, Constitution, Demographics, Diasters, Economics, Employment, European History, Family, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, government spending, history, Illegal, Immigration, Islam, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, National Security Agency (NSA_, People, Philosophy, Politics, Press, Programming, Psychology, Quotations, Radio, Rants, Raves, Security | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 233: March 27, 2014

Pronk Pops Show 232: March 26, 2014

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: NSA Metadata To Be Held By Telephone Companies — Great Distraction — Still Collecting and Intercepting All Americans Telephone Calls and All Information Transmitted Over The Internet and Telephone Exchanges — Stop Deceiving The American People Mr. President — Videos

Obama: NSA Proposal Satisfies Public Concerns

 

Obama announces overhaul of NSA metadata collection

NSA – Changes To Metadata Program – Special Report All Star

President Obama Names Michael Rogers As New Head Of The NSA

Background Articles and Videos

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Published on Dec 30, 2013

Through a PRISM, Darkly
Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.

Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

Glenn Becks “SURVEILLANCE STATE”

Inside the NSA

Ed Snowden, NSA, and Fairy Tales

AT&T Spying On Internet Traffic

For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”

NSA Whistle-Blower Tells All – Op-Docs: The Program

The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Benny – The Government is Profiling You (The NSA is Spying on You)

‘After 9/11 NSA had secret deal with White House’

The story of Whistleblower Thomas Drake

Whistleblowers, Part Two: Thomas Drake

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Meet Edward Snowden: NSA PRISM Whistleblower

The Truth About Edward Snowden

N.S.A. Spying: Why Does It Matter?

Inside The NSA~Americas Cyber Secrets

NSA Whistleblower Exposes Obama’s Dragnet

AT&T whistleblower against immunity for Bush spy program-1/2

AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program

The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.

AT&T whistleblower against immunity for Bush spy program-2/2

Enemy Of The State 1998 (1080p) (Full movie)

Background Articles and Videos

Stellar Wind

Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]

The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]

In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

PRISM

PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.

A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]

According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]

History

Slide showing that much of the world’s communications flow through the US

Details of information collected via PRISM

PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]

PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]

The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]

Response from companies

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]

Initial Public Statements

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]

Slide listing companies and the date that PRISM collection began

  • Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
  • Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
  • Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
  • Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
  • Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
  • Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]

In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13] The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]

“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]

Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]

The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]

While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]

Post-PRISM Transparency Reports

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000″ user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]

Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]

Response from United States government

Executive branch

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]

Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]

On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]

The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]

The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]

In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]

Legislative branch

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

  • June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

  • June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
  • June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
  • June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

  • June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]

Representative John Boehner (R-OH), Speaker of the House of Representatives

  • June 11 “He’s a traitor”[50] (referring to Edward Snowden)

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

  • June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

  • June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
  • June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]

Senator Mark Udall (D-CO)

  • June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]

Representative Todd Rokita (R-IN)

  • June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]

Senator Rand Paul (R-KY)

  • June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
  • June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]

Representative Luis Gutierrez (D-IL)

  • June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]

Judicial branch

The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.

Applicable law and practice

On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]

After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.

If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]

If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]

Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]

The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]

Involvement of other countries

Australia

The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]

Canada

Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]

Germany

Germany did not receive any raw PRISM data, according to a Reuters report.[59]

Israel

Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.

New Zealand

In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]

United Kingdom

In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]

Domestic response

Unbalanced scales.svg
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)

The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]

Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]

In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]

In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]

The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]

On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]

International response

Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]

Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]

Protests at Checkpoint Charlie in Berlin

The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]

The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]

William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]

Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]

Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]

Russia has offered to consider an asylum request from Edward Snowden.[91]

Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]

Related government Internet surveillance programs

A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]

A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]

http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29

ThinThread

ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]

http://en.wikipedia.org/wiki/ThinThread

Trailblazer

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.

NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]

Background

Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]

The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing

According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]

In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]

Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]

http://www.youtube.com/watch?v=1AXwwSq_me4

Boundless Informant

Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.

Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]

History

Slide showing that much of the world’s communications flow through the US.

Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]

NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]

Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]

Technology

According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]

Legality and FISA Amendments Act of 2008

The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]

The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]

Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]

http://en.wikipedia.org/wiki/Boundless_Informant

ECHELON

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]

The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Organization

UKUSA Community
Map of UKUSA Community countries with Ireland

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

  • the Government Communications Headquarters of the United Kingdom,
  • the National Security Agency of the United States,
  • the Communications Security Establishment of Canada,
  • the Defence Signals Directorate of Australia, and
  • the Government Communications Security Bureau of New Zealand.
  • the National SIGINT Organisation (NSO) of The Netherlands

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]

Controversy

See also: Industrial espionage

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]

Name

The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

  • Hong Kong (since closed)
  • Australian Defence Satellite Communications Station (Geraldton, Western Australia)
  • Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
  • Misawa Air Base (Japan) Map
  • GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
  • Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
  • Sugar Grove (West Virginia, U.S.) Map
  • Yakima Training Center (Washington, U.S.) Map
  • GCSB Waihopai (New Zealand)
  • GCSB Tangimoana (New Zealand)
  • CFS Leitrim (Ontario, Canada)
  • Teufelsberg (Berlin, Germany) (closed 1992)

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:

  • Ayios Nikolaos (Cyprus – U.K.)
  • BadAibling Station (BadAibling, Germany – U.S.)
    • relocated to Griesheim in 2004[19]
    • deactivated in 2008[20]
  • Buckley Air Force Base (Aurora, Colorado)
  • Fort Gordon (Georgia, U.S.)
  • Gander (Newfoundland & Labrador, Canada)
  • Guam (Pacific Ocean, U.S.)
  • Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
  • Lackland Air Force Base, Medina Annex (San Antonio, Texas)

http://en.wikipedia.org/wiki/ECHELON

Room 641A

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]

Description

Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]

The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]

The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.

Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.

Lawsuit

Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]

More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.

Main article: Hepting v. AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.

http://en.wikipedia.org/wiki/Room_641A

List of government surveillance projects for the United States

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.

http://en.wikipedia.org/wiki/List_of_government_surveillance_projects

Related Posts On Pronk Palisades

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-233

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Noah November — People Payback Purges Presidential Poison Pill — Obamacare — Drown Democrats — Freakout — Videos

Posted on March 17, 2014. Filed under: American History, Blogroll, Communications, Constitution, Diasters, Economics, Employment, Federal Government, Freedom, government, government spending, Health Care, history, IRS, Law, liberty, Life, Links, Literacy, media, Obamacare, People, Philosophy, Photos, Politics, Rants, Raves, Taxes, Video, War, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014 

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

 

Story 2: Noah November — People Payback Purges Presidential Poison Pill — Obamacare — Drown Democrats — Freakout  — Videos

Their-Lips-600-NRD-wLogo

liar_obama.cms_obama-i-lieObamacare-white-House-trick-or-treat-poisonrats_desert_ship

for-something

Chic – Le Freak

Do Dems need a ‘wake up call’ for 2014?

Obamacare hardship exemption: What you need to know News

White House Works With Vulnerable Democrats To Craft Latest Obamacare Delay RPT Cavuto

Is President Obama toxic for the Democratic Party?

Bill O’Reilly to Glenn Beck: If Obamacare Implodes, Democrats Will Be ‘Banished For 10 to 15 Years’

Pat Caddell [4 minutes] spills the beans on political reality

2014 CPAC Pat Cadell – GOP wants IRS to go after Tea Party

Rush Limbaugh Details Pat Caddell’s Hammering GOP Consultant Class at CPAC

The True Tea Party Message Direction for 2014

Tea Party debate: Tea Party vs. establishment: Who is helping the right, and who is hurting it?

Obama Factor Adds to Fears of Democrats

By JONATHAN MARTIN and ASHLEY PARKER

Democrats are becoming increasingly alarmed about their midterm election fortunes amid President Obama’s sinking approval ratings, a loss in a special House election in Florida last week, and millions of dollars spent by Republican-aligned groups attacking the new health law.

The combination has led to uncharacteristic criticism of Mr. Obama and bitter complaints that his vaunted political organization has done little to help the party’s vulnerable congressional candidates.

The latest in a cascade of bad news came Friday when Scott Brown, a former senator from Massachusetts, announced an exploratory committee to challenge the incumbent Democrat in New Hampshire, Senator Jeanne Shaheen, and when the Republican-aligned “super PAC” American Crossroads said it would spend $600,000 to help his effort.

Earlier, another top-tier Republican recruit, Representative Cory Gardner, decided to challenge Senator Mark Udall of Colorado; the two races create unanticipated opportunities improving Republicans’ chances to take control of the Senate. No prominent Democrats predict their party will win back the House.

Interviews with more than two dozen Democratic members of Congress, state party officials and strategists revealed a new urgency about the need to address the party’s prospects. One Democratic lawmaker, who asked not to be identified, said Mr. Obama was becoming “poisonous” to the party’s candidates. At the same time, Democrats are pressing senior aides to Mr. Obama for help from the political network.

“I’m a prolific fund-raiser, but I can’t compete with somebody who has got 50-some-odd billion dollars,” said Representative Joe Garcia of Florida, a vulnerable first-term member who has already faced more than $500,000 in negative TV ads from third-party conservative groups. “One hopes the cavalry is coming. One hopes the cavalry is coming.”

The gap is yawning. Outside Republican groups have spent about $40 million in this election cycle, compared with just $17 million by Democrats.

When two senior White House officials — Jennifer Palmieri, the communications director, and Phil Schiliro, the health care adviser — went to the Capitol late last month to address Senate Democrats about the Affordable Care Act, they were met with angry questions about why Mr. Obama’s well-funded advocacy group, Organizing for Action, was not airing commercials offering them cover on the health law.

Among those raising concerns was Senator Michael Bennet of Colorado, chairman of the Democratic Senatorial Campaign Committee, who also has a low-key style and warm relationship with Mr. Obama.

“They did not want to hear about health care enrollment,” one source familiar with the meeting said, describing “a high level of anxiety.”

After the loss in Florida’s 13th Congressional District, which Mr. Obama carried in 2012, Representative Steve Israel of New York, the chairman of the House Democratic campaign arm, asked the White House political director, David Simas, for additional help during a Wednesday meeting at the Democratic Congressional Campaign Committee.

Responding to these concerns, several Democrats said Friday that Organizing for Action would cut back its fund-raising activities so the group would not be in competition with the candidates for donors. Katie Hogan, a spokeswoman for it, said, “We understand and expect that some of our more than 420,000 contributors will shift their focus to their local campaigns during the midterm season.”

Democrats also said that the White House would make Mr. Obama available for additional fund-raisers and that the president was starting to meet with small groups of the party’s largest contributors that could benefit the party’s own super PACS.

“Everyone is trying to send the signal: Don’t get ahead of yourself — 2016 is critical, but 2014 comes first,” said David Plouffe, the president’s former campaign manager.

Mr. Obama’s approval rating of 41 percent in a Wall Street Journal/NBC Poll last week matched that of a New York Times/CBS News survey in February and represents one of the clearest reasons for Democratic malaise. Since the post-World War II era, that measurement has been one of the most accurate predictors of midterm results, and any number below 50 means trouble for the party that holds the White House.

“The state of Democrats is very much tied to the state of the president, and in that regard, these are far from the best of times,” said Geoff Garin, a Democratic pollster.

In addition to problems with the health law, the White House is losing the support of Democrats on key appointments such as Mr. Obama’s nominee to head the Justice Department’s Civil Rights Division and his choice to be surgeon general. Also last week, Senator Dianne Feinstein, Democrat of California, broke with the administration with a scalding criticism of the Central Intelligence Agency.

Historical trends over all also argue against the president’s party in a sixth year. In 1958, Republicans lost 48 seats in the House and 13 in the Senate; in 2006, Republicans lost 30 seats in the House and six in the Senate. In the past 50 years, only Bill Clinton in 1998, when his approval ratings were much higher than Mr. Obama’s today, did not drag down his party in a second midterm; Democrats picked up five House seats.

Republicans also seem to be benefiting from the argument — reinforced by advertising and by their media surrogates — that Mr. Obama has presided over an activist government that has overreached and proved incompetent.

Most Democrats up for re-election are trying to put some distance between themselves and the president, choosing surrogates such as Mr. Clinton to campaign for them, particularly in the South and parts of the West.

Asked whether Mr. Obama is a liability, Representative Ami Bera, Democrat of California, demurred. “We haven’t really focused much on the president,” he said. “We’re focused on Sacramento County and the folks that are there.”

This unease is also prompting Democrats to speak more candidly about what many see as the root cause for their political difficulties: the bungled unveiling of the health law, in particular the insurance website, and the White House’s failure to market the initiative effectively.

“The rollout left a bad taste in people’s mouth from Day 1, and it’s hard to create a new flavor now,” said Representative Steve Cohen, Democrat of Tennessee.

To stem losses, the Democratic National Committee is focusing on technology and data to give their candidates, as well as the state parties, the latest tools they will need to turn out the vote more effectively and efficiently. And Senate Democrats will try to make races about local issues rather than a referendum on Mr. Obama.

Mr. Obama’s aides say he is not idly watching congressional Democrats drown in a Republican wave. By the end of June, the president will have attended 14 events for Democratic groups.

But on Capitol Hill, Democrats are furious that the same major contributors who enabled Mr. Obama and allied outside groups to raise over $1 billion for his re-election in 2012 are not rallying to ensure the president does not face a Congress controlled entirely by Republicans for his final two years.

Democrats say that the party needs more donors with the means of the California billionaire Thomas F. Steyer, who is helping candidates who support addressing climate change, to protect candidates who backed the health law.

“I’m not in the super PAC business, but we need somebody like a Steyer to get in the fight on the Affordable Care Act,” said Representative John Yarmuth of Kentucky. Democrats, he said, are “getting beat to death.”

http://www.nytimes.com/2014/03/16/us/politics/obama-factor-adds-to-fears-of-democrats.html?_r=0

Anatomy of a Democratic Midterm Freakout

National Democrats are in a near panic — if the media’s highly-attuned panic detectors are any indicator — with a “poisonous” president unable to use his popularity to sway voters, a “screaming siren” warning about mid-term turnout, and Republicans on the offensive on Obamacare. There are a long eight months until November, but Democrats seem unlikely to get much sleep over the interim.

There are (at least!) six reasons why.

1. The midterms were always going to be bad for Democrats because of turnout.

It’s important to remember that the midterm elections were always going to be difficult for the Democrats. Lower turnout elections usually favor Republicans, whose older, wealthier constituents vote more reliably. One large reason that Republican David Jolly won the special election in Florida last week was thatturnout was very, very low.

On Bloomberg TV over the weekend, Obama advisor David Plouffe didn’t mince words. “We have a turnout issue,” he said. “This is a screaming siren that the same problems that afflicted us [in 2010] could happen again.” In 2010 — a low turnout election that strongly favored the nascent Tea Party movement — Democrats lost 63 seats. Republicans are unlikely to make that much progress again simply because they did so well four years ago. But Democrats are unlikely to make much headway — and certainly won’t retake the Chamber. “No prominent Democrats predict their party will win back the House,” The New York Times drily notes.

2. President Obama is near all-time lows on his approval ratings.

That Times article also contains a quote explaining one of the key reasons Democrats are freaked out. “One Democratic lawmaker, who asked not to be identified, said Mr. Obama was becoming ‘poisonous’ to the party’s candidates.” Presidential popularity can be a key tool for ginning up support on the campaign trail. And being tied to an unpopular president can be an anchor.

Last week, an NBC / Wall Street Journal poll identified the poison. Obama’s approval is at a record low in the surveys, and voters are wary of voting for people who are seen as solidly supportive of his administration. Democrats are eager to get Obama’s vaunted-but-diminished voter engagement apparatus involved in their races, but Mr. Obama is welcome to remain in Washington, thank you very much.

3. Republicans have figured out how to walk the line on Obamacare.

In the wake of Jolly’s win last week, Republicans clearly feel emboldened to return to the attack on Obamacare, a policy that (obviously not objective) GOP Chair Reince Priebus called “complete poison out there in the field.” As Reuters notes, the win “has emboldened Republicans to press their case hard against Obama’s signature first-term achievement.”

Reuters reports that a Democratic pollster sent a memo around Capitol Hill after last week’s race, explaining that “‘keeping parts’ of the Affordable Care Act that work and ‘fixing those that don’t’ drew higher numbers than ‘the Republican message of repeal.'”

Which is why House Republicans, after 50 votes attempting to curtail the law, have shifted toward a package of fixes. The Washington Post‘s Robert Costa describesthe proposal as a sort of greatest hits of Republican reform proposals. And the rationale for releasing it now is obvious. “In meetings with Speaker John A. Boehner (R-Ohio) last week,” Costa reports, “House leadership allies cast Florida as a sign of good things to come in November. But they also cautioned that Republicans needed to offer a clearer alternative.”

It’s important to note that the caucus’ right-most wing, the group that largely prompted those 50 votes, is skeptical. But in order to rebut the Democrats on the campaign trail, Republicans only need an alternative in-hand, not necessarily for anything to pass.

4. Outside Republican groups are outspending their opposition.

A key concern from Democrats is how badly they’re being outspent. While Jolly and the Republicans were outspent by his Democratic rival Alex Sink and her allies in Florida, that’s not the case nationally. The Times reports that “Republican groups have spent about $40 million in this election cycle, compared with just $17 million by Democrats” — largely focused on a repeal of Obamacare. The head of the Democrats’ House campaign committee, New York Rep. Steve Israel, put it bluntly. “Florida 13 doesn’t keep me up at night,” he said, “but the aggregate Republican super PAC money makes me toss and turn.”

“I’m a prolific fund-raiser,” Florida Rep. Joe Garcia told the Times, “but I can’t compete with somebody who has got 50-some-odd billion dollars.”

5. Republicans are expanding the number of races where they want to compete.

The money the Democrats have will also need to be spent in places they would rather not have to spend it. On Friday, former Massachusetts senator Scott Brownentered the Senate race in New Hampshire, forcing the Democratic Senatorial Campaign Committee arm to have to spend money in a year when they’re already desperate to hold existing seats. Brown trails, but the DSCC would obviously rather spend that money holding embattled seats in Louisiana or Arkansas — or unseating Sen. Mitch McConnell in Kentucky.

6. Democrats freaking out will only make all of the above problems worse.

In The Washington Post, columnist E. J. Dionne despairs, “Listlessness is bad politics. Defensiveness is poor strategy. And resignation is never inspiring.”

Obama and his party are in danger of allowing the Republicans to set the terms of the 2014 elections, just as they did four years ago. The fog of nasty and depressing advertising threatens to reduce the electorate to a hard core of older, conservative voters eager to hand the president a blistering defeat.

On one hand, it’s the turnout argument, that Republicans will be excited about turning out in November and Democrats won’t. But in a larger sense, Dionne’s message is that Democrats need to change their attitude, and quickly. Which, of course, is like telling someone suffering from depression to get over it. The problem runs a little deeper than that.

http://www.thewire.com/politics/2014/03/anatomy-democratic-midterm-freakout/359229/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-225

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Plane — The Plane — Where is the plane? — Crashed Landed — Where? Where? — Fantasy Island! Fantasy Island? — New Reality TV Series Publicity Stunt — Reality: Malaysia Airlines Flight 370 Hijacked — Destination Unknown — Malaysian Prime Minister News Conference — Videos

Posted on March 15, 2014. Filed under: Airplanes, American History, Blogroll, College, Communications, Computers, Constitution, Crashed, Crime, Culture, Diasters, Economics, Education, Faith, Federal Government, Foreign Policy, Freedom, history, Islam, Language, Law, liberty, Life, Links, media, People, Philosophy, Photos, Politics, Press, Psychology, Radio, Rants, Raves, Terrorism, Transportation, Video, War, Weather, Wisdom, Writing | Tags: , , , , , , , |

malaysia+airlines+plane

 Malaysia-Airlines-Plane-Turned-Around-

search_area

the_plane

Fantasy House

 bell_tower

the_plane_bell_tower

Fantasy Island

Noah November — People Payback Purges Presidential Poison Pill — Obamacare — Drown Democrats — Freakout  — Videos]

FLIGHT GEAR | HOW TO START THE BOEING 777-200ER

Best Cockpit landing ever

Malaysia Air Flight MH370: The Transponder Mystery

BREAKING: Malaysian PM News Conference over MH370 Hijacked

Malaysian Airlines Plane Hijacked: Malaysian government official says investigators have concluded

March 15 2014 Breaking News FLIGHT MH370 HIJACKED Official stated

FULL] Malaysia Airlines Hijacked: Was Malaysia Airlines 370 Hijacked?

Full Video – Malaysia Airlines Flight MH370 may have been hijacked

2014 BBC World News Malaysia Airlines Flight MH 370 Vanishes Without Trace 8 3 14

Airlines Flight 370 Missing – Terrorism Motive? – Malaysian Prime Minister Speech Against

Malaysia Airlines Mystery: How Does a Plane Vanish?

Officials Investigate Stolen Passports Used on Missing Malaysia Airlines Flight

Missing airliner may have flown on for 7 hours

By , and , Updated: Saturday, March 15, 12:40 PM

KUALA LUMPUR, Malaysia — Malaysian Prime Minister Najib Razak said Saturday that a missing passenger jet was steered off course after its communications systems were intentionally disabled and could have potentially flown for seven additional hours.

In the most comprehensive account to date of the plane’s fate, Najib drew an ominous picture of what happened aboard Malaysia Airlines Flight 370, saying investigators had determined there was “deliberate action by someone on the plane.”

Najib said the investigation had “refocused” to look at the crew and passengers. A Malaysia Airlines representative, speaking to relatives of passengers in Beijing, said the Malaysian government had opened a criminal investigation into the plane’s disappearance.

(See: New map shows possible search corridors for the Malaysia Airlines flight.)

The plane’s whereabouts remain unknown one week after it disappeared from civilian radar shortly after takeoff from Kuala Lumpur. But Najib, citing newly analyzed satellite data, said the plane could have last made contact anywhere along one of two corridors: one stretching from northern Thailand toward the Kazakhstan-Turkmenistan border, the other, more southern corridor stretching from Indonesia to the remote Indian Ocean.

U.S. officials previously said they believed the plane could have remained in the air for several extra hours, and Najib said Saturday that the flight was still communicating with satellites until 8:11 a.m. — 7 ½ hours after takeoff, and more than 90 minutes after it was due in Beijing. There was no further communication with the plane after that time, Najib said. If the plane was still in the air, it would have been nearing its fuel limit.

“Due to the type of satellite data,” Najib said, “we are unable to confirm the precise location of the plane when it last made contact with the satellite.”

A U.S. official with knowledge of the investigation on Friday said the only thing the satellite can tell is how much it would need to adjust its antenna to get the strongest signal from the plane. It cannot provide the plane’s exact position or which direction it flew, just how far the plane is, roughly, from the last good data-transmission location when the digital datalink system was actually sending data up to the satellite.

The U.S. official said the search area is somewhere along the arc or circumference of a circle with a diameter of thousands of miles.

The new leads about the plane’s end point, though ambiguous, have drastically changed a search operation involving more than a dozen nations. Malaysia on Saturday said that efforts would be terminated in the Gulf of Thailand and the South China Sea, the spot where the plane first disappeared from civilian radar.

Malaysian authorities are now likely to look for help from other countries in Southeast and South Asia, seeking mysterious or unidentified readings that their radar systems might have picked up.

The plane, based on one potential end point, could have spent nearly all its flight time over the Indian Ocean as it headed to an area west of Australia. But if the plane traveled in the direction of Kazakhstan or Turkmenistan, it would present a more perplexing scenario in which it would have evaded detection for hours while flying through a volatile region where airspace is heavily monitored: Burma, Pakistan, India and Afghanistan and western China are all in the neighborhood of that path, as is the United States’ Bagram air base, which is in Afghanistan.

U.S. officials in Afghanistan would not comment on the possibility that the plane had flown over that country, but that scenario seems unlikely given the tight western control over Afghan airspace.

Afghan officials said they rely on Americans on such matters. “We do not know what has happened to the plane or if it has overflown Afghan air space. We do not have a radar. Go and ask the Americans,” said a senior Afghan official.

A Pakistani official said his country has not yet been asked by Malaysia to share its radar data, but will provide them if asked.

“Given the strong radar system that we have, and also that India and other countries in the region have, it’s very difficult for a plane to fly undetected for so long,” said Abid Qaimkhan, a spokesman for Pakistan’s Civil Aviation Authority.

Malaysia has confirmed that a previously unknown radar trail picked up by its military was indeed MH370. That blip suggests the plane had cut west, across the Malaysian peninsula, after severing contact with the ground. Malaysia received help in analyzing that radar data from the United States’ National Transportation Safety Board, Federal Aviation Administration, and the British Air Accident Investigation Branch.

Malaysian investigators now believe that the Boeing-777 airliner, bound for Beijing with 227 passengers, deliberately cut a series of communications systems as it headed toward the boundary of Malaysian airspace. U.S. officials and aviation experts say the plane could have been hijacked by somebody with aviation knowledge or sabotaged by a crew member.

Investigators have not yet presented a clear scenario of what could have happened on board. Reuters reported that Malaysian police on Saturday searched the home of the plane’s captain, Zaharie Ahmad Shah, 53, who had more than three decades of commercial flight experience. A senior Malaysian police official refused to confirm the search.

Zaharie had a flight simulator at his home, something that appeared in a YouTube video posted from his unconfirmed YouTube account. Malaysia Airlines chief executive Ahmad Jauhari Yahya said Friday that “everyone is free to do their own hobby” and that it isn’t unusual for pilots to have home simulators.

U.S. officials have said that the plane, shortly after being diverted, reached an altitude of 45,000 feet and “jumped around a lot.” But the airplane otherwise appeared to operate normally. Significantly, the transponder and a satellite-based communication system did not stop at the same time, as they would if the plane had exploded, disintegrated or crashed into the ocean.

Najib said Saturday that the Aircraft Communications Addressing and Reporting System, or ACARS, was disabled just as MH370 reached the eastern coast of Malaysia. The transponder was then switched off, Najib said, as the aircraft neared the border between Malaysian and Vietnamese airspace.

According to the Malaysian government, a satellite that tracked the aircraft was located more than 22,000 miles above sea level. Even after the ACARS system was disconnected, the satellite still received some basic signal from the plane — what one U.S. official described as a “handshake.” Though no data was being transmitted, the satellite continued to reach out to the plane on an hourly basis and received confirmation that the plane was still flying.

“There’s no circuit breaker that would allow you to shut off the handshake,” the official said.

That satellite handshake took place on a system operated by Inmarsat, a British satellite company that provides global mobile telecommunications services.

U.S. officials declined to say how closely that handshake allowed them to track the path of the missing plane. But one U.S. official explained that the satellite wasn’t able to read the plane’s exact location or even what direction it flew. Instead, the satellite was able to determine how far the plane had traveled since the last known spot where ACARS was transmitting data. That could explain how Malaysia created two possible arcs where the plane might have traveled.

Najib said Saturday that the search for MH370 had entered a “new phase.” The U.S. Navy, already positioned to the west of the Malaysian peninsula, was planning to meet tonight to discuss whether and how to redeploy its assets, spokesman Cmdr. William Marks said.

Indian officials said Saturday morning that they were still awaiting new orders in response to the Malaysian prime minister’s statement that the official search focus shift from the South China Sea to the two “corridors” west of Malaysia.

“Nothing is certain. These are all probabilities,” said Captain D.K. Sharma, a spokesman for the India Navy. “Let the new orders come. Let’s see how we respond.”

India has now expanded its search from the area around the Andaman and Nicobar Islands — where five vessels and four planes have been deployed — to the north and west, by adding four additional aircraft to scour the massive Bay of Bengal — two P-8I anti-submarine and electronic intelligence planes and three other military aircraft, including a C-130J and two Dorniers. Search teams from the Indian military had spent much of the day Friday searching the jungles on remote islands of the Andaman and Nicobar archipelago, most of which are uninhabited, but so far have come up empty.

Other nations along the Bay of Bengal are now the expanding search as well. Gowher Rizvi, an adviser to Bangladesh’s prime minister Sheikh Hasina, said that country had deployed two aircraft and two frigates in the Bay of Bengal.

Harlan reported from Kuala Lumpur, and Gowen reported from New Delhi. Liu Liu contributed from Beijing. Tim Craig contributed from Pakistan, Joel Achenbach, Adam Goldman and Sari Horwitz contributed from Washington and Rama Lakshmi contributed from New Delhi.

Read Full Post | Make a Comment ( None so far )

Collectivists Celebrate 100 Anniversary of Start of World War I By Starting World War III? — Accidents Happen — Cold War Turns Into Hot War — Videos

Posted on March 14, 2014. Filed under: American History, Blogroll, Business, Communications, Constitution, Crime, Culture, Demographics, Diasters, Drones, Economics, Education, Employment, Energy, Entertainment, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, Homicide, Inflation, Investments, Islam, Language, Law, liberty, Life, Links, media, Natural Gas, Nuclear, Oil, Oil, People, Philosophy, Photos, Pistols, Politics, Programming, Radio, Rants, Raves, Religion, Resources, Rifles, Security, Shite, Strategy, Sunni, Talk Radio, Technology, Terrorism, Unemployment, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , |

europe-mapUkrain-physical-mapukraine_russia_timeline

 map_of_russian_gas_pipelines_supplies_to_europe_via_ukraine

 

gas_europe

map_eurrussian_gas_pipelines

 

Russia dismisses U.S. proposals in Ukraine talks

Drifting Towards War

Ron Paul: U.S. Already Spent $5 Billion to Undermine Ukrainian Government

Victoria Nuland’s Admits Washington Has Spent $5 Billion to “Subvert Ukraine”

Ron Paul: US shouldn’t meddle in Ukraine

Russia Ukraine debate sparks fiery exchange

Putin in Ukraine ‘Russia will lose most from this’

Clashes in Ukraine create tension for U.S. and Russia

Debate: Is Ukraine’s Opposition a Democratic Movement or a Force of Right-Wing Extremism…

A New Cold War? Ukraine Violence Escalates, Leaked Tape Suggests US Was Plotting Coup

OReilly: Distorting Russia: How the American Media Misrepresent Putin, Sochi and Ukraine

2/18/14 Stephen F. Cohen, Ph.D. on O’Reilly claiming we’re Putin bashing

US Betrayal of Russia

Learn How The United States Is Behind The Kiev Ukraine Riots

Build up to WW3 – OBAMA Announces SANCTIONS to be Imposed on RUSSIA Amid UKRAINE CRISIS

GERALD CELENTE on the UKRAINE CRISIS – U.S. Agenda To Destabilize Russia

 

OBAMA PUSHING WAR WITH RUSSIA WORLD WAR 3 RUSSIAN TROOPS IN UKRAINE! 3-2-14

John McCain moves to start World War 3 in Ukraine

Why Ukraine matters to the U.S. & Russia

MUST SEE! World War 3 is upon us!

Build up to WW3 – RUSSIAN TROOPS in Uneasy Standoff with UKRAINE TROOPS in CRIMEA

The Road to World War 3: Ukraine, Russia and American Imperialism

The First World War – Part 1/10

The First World War – Part 2/10

The First World War – Part 3/10

The First World War – Part 4/10

The First World War – Part 5/10

The First World War – Part 6/10

The First World War – Part 7/10

The First World War – Part 8/10

The First World War – Part 9/10

The First World War – Part 10/10

The Guns of August

The Guns of August is a documentary that follows the book by the same title by author, Barbara Tuchman (1912-1989), an eminent American historian. She received the first of her two Pulitzer prizes for this 1962 masterpiece on World War I. The documentary was made in 1965. Barbara Tuchman was highly respected for her ability to present complex subjects and present them with clarity. Until I read the previous review, I have never heard of anyone accusing her of hating Germany or its people or of her book being anti-German propaganda. But there are pictures of shot civilians and movies of smoldering ruins. Then again, there are people who claim the Holocaust never took place and is just anti-Nazi propaganda… Facts: On August 3 1914, Germany declared war on France. The German invasion plan for France called for an attack through Belgium, instead of through the heavily defended Franco-German border. Belgium was neutral and its neutrality was protected by treaty with Great Britain. The Germans attacked on August 3rd. The next day, August 4th, Great Britain declared war on Germany. Germany warned Belgium that they only wanted to reach France and if Belgium complied, there wouldn’t be any trouble. Despite its small army, Belgium chose to protect its sovereignty and its honor and paid for it. Liège, Aarschot, Andenne, Tamines, Dinant, and Leuven, where the worst of the German depredations occurred.

 

Read Full Post | Make a Comment ( None so far )

Warning You Are Being Tracked — The Secret Surveillance Security State — Vidoes

Posted on March 5, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Constitution, Crime, Culture, Diasters, Economics, Education, Employment, European History, Faith, Federal Communications Commission, Federal Government, history, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Photos, Politics, Press, Rants, Raves, Regulations, Security, Strategy, Talk Radio, Unemployment, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014 

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To