Reviews

Skim Milk — Bananas — Videos

Posted on November 23, 2014. Filed under: Agriculture, American History, Biology, Blogroll, Chemistry, Communications, Diet, Food, Freedom, Friends, government, government spending, Health Care, history, Medical, Milk, People, Philosophy, Raves, Reviews, Science, Talk Radio, Wisdom, Writing | Tags: , , , , , , , , |

Is Milk Good For You?

The benefits of skim milk

Which is Healthier: Whole Milk or Skim Milk?

5 Reasons to stop drinking MILK

The BEST fat-burner food is BANANAS!

Monsanto & Cancer Milk: FOX NEWS KILLS STORY & FIRES Reporters

Milk The Deadly Poison

Today’s Modern Food: It’s not what you think – Part 1 of 2

Today’s Modern Food: It’s not what you think – Part 2 of 2

10 Foods NOT to eat

 

 

 

Read Full Post | Make a Comment ( None so far )

Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos

Posted on November 18, 2014. Filed under: American History, Blogroll, Books, Business, Central Intelligence Agency (CIA), Computers, Constitution, Corruption, Crime, Crisis, Diasters, Documentary, Education, Employment, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Films, Foreign Policy, Fraud, Freedom, Friends, government, government spending, history, Homicide, Illegal, Immigration, Language, Law, liberty, Life, Links, Literacy, media, National Security Agency (NSA_, People, Philosophy, Photos, Politics, Press, Radio, Raves, Regulations, Reviews, Security, Strategy, Unemployment, War, Wealth, Weapons, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014

Story 1: Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos

Stuff They Don’t Want You to Know – Dirty Tricks: Agent Provocateur

Preparing for violence in Missouri

Ferguson Nervously Awaits Grand Jury Decision

How police Agent Provocateur frame people

Provocateur Caught Throwing Bricks At Ferguson Police

John Sayles on New FBI Rules & Role of Agent Provocateurs in Disrupting Social Movements

FBI Warns of Ferguson Violence from ‘Extremists’ After Grand Jury Decision

Ferguson braces for grand jury decision

Biracial couple: We’re staying in Ferguson

Snipers Take Aim and Push Infowars Reporters

Combat Vet Ferguson Missouri Has Turned Into Fallujah Iraq

Infowars Shatters Multiple Mainstream Media Lies in Ferguson, MO

Infowars Recounts Ferguson Police State

Missouri Deploys National Guard

Occupy LA – Police Provocateurs Confirmed

Occupy LA has become victim to police provocateur (under cover cops causing violence) much like other cities around the world. What to look for:

The same boots,
black masks
black backpacks,
specific type of black bandana.

Police Provocateurs are not smart, and they are easy to spot. Do not let your 1st amendment rights be trampled by corrupt police.

LAPD Infiltrators and Agent Provocateurs Targeted Left and Panthers – Johnston on RAI – (2/4)

The Deep State and the Power of Billionaires – David Cay Johnston on Reality Asserts Itself (3/4)

Ferguson on the edge: RT America special on eve of grand jury ruling

Michael Brown Protests Turns Into RIOT…LOOTINGS…VIOLENCE(RIOT Police Called In)

Ferguson, Missouri LOOTERS Target FOOT LOCKER…FAMILY DOLLAR …RIMS… BURNS Down QUICKTRIP!!

Violence erupts in Ferguson

COINTELPRO 101 – The Sabotage Of Legitimate Dissent

Activists Who Stole FBI Documents in 1971 Revealing COINTELPRO Speak Out

Betty Medsger “The Burglary”

TREASON 101 FBI Cointelpro

COINTELPRO: The FBI’s War on Black America

BUSTED! Proof Missouri Riots Were Obama’s Attempt To Implement A Martial Law Police State!

FBI Agent Provocateur Suggested Terror Attack at Mosque

FBI – Don’t post that or I’ll be “livid”

Return of the Ferguson War Zone? Missouri Enacts State of Emergency Ahead of Mike Brown Grand Jury

 Missouri Gov. Jay Nixon has declared a state of emergency in advance of the grand jury’s pending decision in the Michael Brown shooting case. On Monday, Nixon issued an executive order to activate the state’s National Guard in response to what he called “the possibility of expanded unrest.” Nixon cited the protests in Ferguson and the St. Louis area since Brown, an unarmed black teenager, was killed by police officer Darren Wilson on August 9. The grand jury has been meeting for nearly three months, and protests are expected to escalate if they choose not to indict. But while state officials say they fear violence, protesters say they fear a return to the militarized crackdown that turned their community into a war zone. As the grand jury nears a decision and all sides prepare for the unknown under a state of emergency, we are joined by two guests: Jeff Smith, a New School professor and former Missouri state senator whose new book is “Ferguson: In Black and White,” and Montague Simmons, chair of the St. Louis-based Organization for Black Struggle and a key organizer in the movement that has emerged since Brown’s killing.

Under Obama, U.S. personal freedom ranking slips below France

U.S. Secrets: Classified Intelligence, CIA,FBI,NSA,Secret Service, Edward Snowden

 

The No Indictment.org Ferguson protest group released its list of potential targets following the decision by the St. Louis County Courthouse on the Mike Brown case.

The published map shows expected landmarks like the Ferguson City Hall and the County Courthouse.

But it also marks things that have NOTHING to do with the Michael Brown situation, like Anheuser Busch and Boeing.
ferguson targets

Most telling thing is the mark for Emerson Electric. Emerson has been in Ferguson for at least 50 years, long before Ferguson became a minority municipality. Yet not only do they mark Emerson they make note of the CEO’s salary. Maybe they’re mutating into an extortion group straight out of the playbook of Jesse Jackson’s Rainbow Push Coalition?

Below is the published list of potential St. Louis area targets.
Potential Action Locations

  • Robert McCulloch’s office
  • St. Louis County Justice Center
  • Stephanie Karr’s office
  • Olin Corporation Headquarters
  • Judge Maura McShane’s courtroom
  • St. Louis County Police Department
  • Governor Nixon’s Office (Wainwright Building)
  • Clayton School District Office
  • Department of Justice
  • Dean Plocher’s office
  • Ronald Brockmeyer’s office
  • Dan Boyle’s office
  • Thomas Flach’s office
  • Regal III Market
  • Canfield Green Apartments
  • Ferguson Police Department & Jail
  • West Florissant Quick Trip
  • Missouri Botanical Gradens
  • Powell Symphony Hall
  • Monsanto Headquarters
  • Peabody Energy Headquarters
  • Anheuser-Busch Headquarters
  • Emerson Electric Headquarters
  • Steve Stenger’s lawfirm
  • St. Louis Art Museum
  • Gateway Arch
  • Peabody Opera House
  • Ritz Carlton
  • Lambert International Airport
  • Mayor Slay
  • Boeing
  • St. Louis City Police Department
  • St. Louis Galleria
  • Plaza Frontenac
  • Six Stars Market
  • Colonel Jon Belmar
  • Senator Roy Blunt
  • Senator Claire McCaskill
  • St. Louis City Justice Center
  • St. Ann Police Department & Jail
  • Clayton City Hall
  • GCI Security, Inc.
  • St. Louis County Council
  • Clayton Police Department & Jail
  • Ferguson City Hall
  • Lacy Clay’s Office
  • Donors
  • Husch Blackwell LLP
  • Martin Insurance Group LLC
  • Stone, Leyton & Gershman
  • University Square Company
  • Stone & Alter Real Estate
  • Carey & Danis LLC
  • The Law Firm of Thomas C Antoniou LLC
  • Hammond & Shinners Law Firm
  • Collinsville Acquisitions Inc
  • Thompson Coburn
  • Commercial Bank
  • Sanctuaries
  • Greater St. Mark Family Church
  • Veterans for Peace Office
  • St. John’s Episcopal Church
  • Hospitals
  • St. Louis University Hospital
  • SSM Cardinal Glennon Children’s Medical Center
  • SSM St. Mary’s Health Center
  • Barnes Jewish Hospital
  • St. Alexius Hospital
  • Kindred Hospital
  • Southwest Medical Center

The Ferguson Mike Brown protesters are not ruling out violence or looting.

“Rioting and looting are the tools of those without a voice. The rioting and looting, while I didn’t participate in it, was necessary. Without it we would not be standing here today.”

 

http://www.thegatewaypundit.com/2014/11/justice-for-mike-brown-group-releases-list-of-targets-including-anheuser-busch-boeing-emerson-electric-airport/

 

No Indictment Planning

#Ferguson

 

In preparation for a no-indictment decision, here is the important information to know.

 

On August 9, 2014, Mike Brown was killed by Officer Darren Wilson. For nearly 100 days, we have protested to demand an indictment. We are hopeful that Darren Wilson will be indicted for murder, but the recent signs do not seem that this outcome is likely.

 

We will update this page daily with key information regarding post indictment decision announcement planning. And this isn’t meant to replace twitter or the newsletter, but to be a central space for information that can be updated in real-time.

 

If you’d like to donate, please click here.

 

If you have not already done so, please read the last Protestor and Ally Open Letter entitled, “An American Horror Story,” by clicking here.

 

We are on the right side of justice. Stand with us.

 

// Netta (@nettaaaaaaaa) and DeRay (@deray)

 

P.S. To suggest additions to the site, please e-mail us at netta@thisisthemovement.org or deray@thisisthemovement.org.

Possible Protest Spaces

Here is a map of possible protest spaces. Remember, we actively advocate and profess the importance of peaceful protest. We do not support, condone, or encourage violence.

 

Safe Spaces

These are spaces to escape police violence, get updated on protest plans and all are located near protest zones.

 

Shaw: St. John’s Episcopal Church, 3664 Arsenal, 63166

 

Ferguson: Greater St. Mark’s Church, 9950 Glen Owen Drive, 63136

 

Clayton: Veterans for Peace Office, 216 S. Meramec Ave., 63105

 

 

Day of Non-Indictment Decision Announcement

On the day of the non-indictment announcement, protestors are gathering at the #Ferguson PD Lot and at VonDerrit’s memorial site in Shaw.

 

Day AFTER Non-Indictment Decision Announcement

On the day AFTER the non-indictment announcement, protestors are gathering in Clayton. More information is forthcoming.

 

Grand Jury Announcement Text Alert

Click here to sign up to receive a text alert when the Grand Jury makes its decision regarding the killing of Michael Brown Jr. (Here’s the direct link: http://bit.ly/GJText)

 

Rules of Engagement

Protestors publicly proposed Rules of Engagement for police in the event of a non-indictment. Here is the link to the rules: http://media.wix.com/ugd/9c5255_9d5572481c7840fbad088ef6d8ae82d4.pdf

 

Law-Related Volunteers

Lawyers, Legal Workers, and Law Students – The Ferguson Legal Defense Fund, a coalition of St. Louis lawyers and firms, has issued an emergency call to action to find volunteers to assist with legal representation, jail supports and visits, legal research, legal observation, and legal observation and training. Click here to learn more and to volunteer.

 

Nationwide Actions Planned

Click here to learn more about the actions planned across the country in the event of a non-indictment. Actions are currently planned in 50+ cities across America.

 

Protest Preparation

For a primer and re-cap of the direct action trainings, click here to access the core materials. More information will be posted in the coming days.

 

Support With Safe House Supplies

All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.

Food
Apples, Oranges, Pretzels, Chips, Crackers, Peanut Butter, Jelly, Carrots, Granola Bars, Cookies, Chips & Salsa, Nuts, Bread, Jerky, Cheese, Hummus
Drinks
Water, Coffee, Tea, Juice, Gatorade
Cleaning/Eating
Toilet Paper, Paper Towels, Disinfectant Wipes, Hand Soap, Disposable Plates, Cups, Napkins, Utensils, Trash Bags
Electronics
Surge Protectors, Flashlights (w/ batteries), Cell Phone Chargers
Wearables
Blankets, Hand Warmers
Communication
Flip Chart Markers, Pens, Pads of Paper

 

 

Safe Spaces and Sanctuaries

We will publish the list of Safe Spaces and Sanctuaries later this week.

 

Hospitals and urgent care: Name, address, approximate time by car from Canfield Green Apts, phone number, hours.

  • St Louis University Hospital: 3635 Vista Ave, STL. 25 min. 314-577-8000.
  • Concentra Urgent Care: 463 Lynn Haven, Hazelwood. 13 Min. 314-731-0448. M-F 8-5
  • Concentra Urgent Care — North Broadway. 8340 N Broadway, STL. 15 min. 314-385-9563. M-F 8-5.
  • St Luke’s Urgent Care: 8857 Ladue Rd, STL. 18 min. 314-576-8189. M-Su 8-8.

 

 

Protestor Action Kit:

  1. Jail support number written on your body with permanent marker
  2. Change of warm clothes
  3. Plastic gallon bags
  4. Snacks/Water
  5. Portable phone charger
  6. Paper map
  7. Medications
  8. Gloves, hat, scarf, hand warmers
  9. Shatter proof goggles
  10. Quick reference sheet with names (first, last) and date of birth for each member of your team/cohort and any important phone numbers and addresses
  11. Medical supplies: gauze, tape, L.A.W. (liquid antacid and water – Maalox and water), mask, cold pack

 

Support With Protest Supplies

All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.

Signage
White Bed Sheets (for banners), Banners, Spray Paint
Gas Masks
2 liter plastic bottles, box cutters, duct tape, rubber foam, shoestrings, elastic bands, glue
Wooden Shields
Rubber hoses, ¾” and ½” Phillps screws, 11/32” plywood sheathing cut into 32X34” sections, electric drills or Phillips screwdrives
Other

http://noindictment.org/

FBI Warns Ferguson Decision ‘Will Likely’ Lead to Violence By Extremists Protesters

Jeff Roberson/AP Photo
PHOTO: A protester kicks a smoke grenade that had been deployed by police back in the direction of police, Aug. 13, 2014, in Ferguson, Mo.

The bulletin cites a series of recent messages threatening law enforcement, including a message posted online last week by a black separatist group that offered “a $5,000 bounty for the location” of Ferguson police officer Darren Wilson, who fired the shots that killed Brown on Aug. 9.

In interviews with ABC News, police officials said their departments have identified a number of agitators who routinely appear at mass demonstrations.

“How many of those sympathizers are actually sympathizers?” Rick Hite, the chief of the Indianapolis Metropolitan police department, wondered. Many of them see the protests as a way to “chime in with their own personal agenda,” he said.

In its new intelligence bulletin, obtained by ABC News, the FBI says “exploitation” of mass demonstrations “could occur both in the Ferguson area and nationwide.”

“All it takes is one.”

Overall, though, law enforcement officials contacted by ABC News – stretching from Los Angeles to the Atlanta area – remained confident that any protests in their cities would not be tainted by violence.

“We are not expecting any issues in our city,” said Billy Grogan, the chief of police in Dunwoody, Ga., outside Atlanta. “However, we are preparing just in case. I believe most departments are watching the situation closely and are prepared to respond if needed.”

A law enforcement official in Pennsylvania agreed, saying that while authorities there are not enacting any significant new measures they are “monitoring” developments out of Ferguson.

PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.

Scott Olson/Getty Images
PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.

In addition, police officials emphasized that efforts to address a big decision like the one pending in Ferguson actually begin well before that decision.

In Indianapolis, police have held two town-hall meetings in the past two months to discuss the Ferguson issue with concerned residents, and meetings like that help build a “bank of trust,” Hite said.

But it’s sometimes hard to build such trust between a community and the law enforcement officers working its streets.

With several recent cases involving allegations of excessive force by police officers, many in African-American communities can’t help but wonder why seemingly routine encounters escalate so dramatically.

PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.

Jeff Roberson/AP Photo
PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.

In a recent interview with ABC News, Philadelphia Police Chief Charles Ramsey said people in “communities of color” often “don’t view us as people who really have the right to enforce laws or tell them what to do,” and sometimes it’s because of “the way they’ve seen us conduct ourselves in the past.”

“Not all cops, but all it takes is one,” Ramsey said. “As human beings, we tend to remember the one bad incident, not the 10 good ones that we may have experienced.”

On the other side of the spectrum, there are some uncomfortable facts that may be influencing how some police respond to African-Americans they encounter on routine patrols.

In particular, African-Americans are disproportionally represented in crime. According to the FBI, 4,379 blacks were arrested for murder last year, while 3,799 whites were arrested for murder – even though census numbers show there are six times more whites than blacks in the United States.

But as Ramsey said, crime statistics are no excuse for police bias.

“Protest. But protest peacefully. Have your voices be heard.”

And now a grand jury in Ferguson and federal prosecutors are separately looking into whether that type of bias led to Brown’s death.

It’s unclear whether the facts of the case will lead to any prosecution. Indeed, it seems few pieces of evidence are without dispute.

The day after the encounter that resulted in Brown’s death, St. Louis County Police Chief Jon Belmar told reporters that Brown “physically assaulted” Wilson inside his police car and that “there was a struggle over the officer’s weapon.” At least one shot was fired inside the car, but the fatal shot was fired when both Wilson and Brown were outside the car, according to Belmar. At least one witness said Brown was shot “with his arms up in the air,” while the police claim Wilson fired because Brown was advancing towards him.

PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.

Jeff Roberson/AP Photo
PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.

Pressed in September to acknowledge that the Justice Department’s own civil rights investigation may not result in charges, outgoing Attorney General Eric Holder would only say that “at the end of the day, it’s most important that we get it right.”

As for what’s ahead in Ferguson and communities across the country, Ramsey offered this piece of advice: “Protest. But protest peacefully. Have your voices be heard.”

http://abcnews.go.com/Politics/fbi-warns-ferguson-decision-lead-violence-extremist-protesters/story?id=26980624

The Wonderful American World of Informers and Agents Provocateurs


A New York City police officer near the New York Stock Exchange, Wednesday, July 11, 2012, in New York. (AP Photo/Frank Franklin II)

This article originally appeared at TomDispatch.com. To stay on top of important articles like these, sign up to receive the latest updates from TomDispatch.com.

Only Martians, by now, are unaware of the phone and online data scooped up by the National Security Agency (though if it turns out that they are aware, the NSA has surely picked up their signals and crunched their metadata). American high-tech surveillance is not, however, the only kind around. There’s also the lower tech, up-close-and-personal kind that involves informers and sometimes government-instigated violence.

Just how much of this is going on and in how coordinated a way no one out here in the spied-upon world knows. The lower-tech stuff gets reported, if at all, only one singular, isolated event at a time—look over here, look over there, now you see it, now you don’t. What is known about such surveillance as well as the suborning of illegal acts by government agencies, including the FBI, in the name of counterterrorism has not been put together by major news organizations in a way that would give us an overview of the phenomenon. (TheACLU has done by far the best job of compiling reports on this sort of spying on Americans.)

Some intriguing bits about informers and agents provocateurs briefly made it into the public spotlight whenOccupy Wall Street was riding high. But as always, dots need connecting. Here is a preliminary attempt to sort out some patterns behind what could be the next big story about government surveillance and provocation in America.

Two Stories From Occupy Wall Street

The first is about surveillance. The second is about provocation.

On September 17, 2011, Plan A for the New York activists who came to be known as Occupy Wall Street was to march to the territory outside the bank headquarters of JPMorgan Chase. Once there, they discovered that the block was entirely fenced in. Many activists came to believe that the police had learned their initial destination from e-mail circulating beforehand. Whereupon they headed for nearby Zuccotti Park and a movement was born.

The evening before May Day 2012, a rump Occupy groupmarched out of San Francisco’s Dolores Park and into the Mission District, a neighborhood where not so many 1 percenters live, work or shop. There, they proceeded to trash “mom and pop shops, local boutiques and businesses, and cars,” according to Scott Rossi, a medic and eyewitness, who summed his feelings up this way afterward: “We were hijacked.” The people “leading the march tonight,” he added, were

clean cut, athletic, commanding, gravitas not borne of charisma but of testosterone and intimidation. They were decked out in outfits typically attributed to those in the “black bloc” spectrum of tactics, yet their clothes were too new, and something was just off about them. They were very combative and nearly physically violent with the livestreamers on site, and got ignorant with me, a medic, when I intervened.… I didn’t recognize any of these people. Their eyes were too angry, their mouths were too severe. They felt “military” if that makes sense. Something just wasn’t right about them on too many levels.

He was quick to add, “I’m not one of those tin foil hat conspiracy theorists. I don’t subscribe to those theories that Queen Elizabeth’s Reptilian slave driver masters run the Fed. I’ve read up on agents provocateurs and plants and that sort of thing and I have to say that, without a doubt, I believe 100 percent that the people that started tonight’s events in the Mission were exactly that.”

Taken aback, Occupy San Francisco condemned the sideshow: “We consider these acts of vandalism and violence a brutal assault on our community and the 99%.”

Where does such vandalism and violence come from? We don’t know. There are actual activists who believe that they are doing good this way; and there are government infiltrators; and then there are double agents who don’t know who they work for, ultimately, but like smashing things or blowing them up. By definition, masked trashers of windows in Oakland or elsewhere are anonymous. In anonymity, they—and the burners of flags and setters of bombs—magnify their power. They hijack the media spotlight. In this way, tiny groups—incendiary, sincere, fraudulent, whoever they are—seize levers that can move the entire world.

The Sting of the Clueless Bee

Who casts the first stone? Who smashes the first window? Who teaches bombers to build and plant actual or spurious bombs? The history of the secret police planting agents provocateurs in popular movements goes back at least to nineteenth-century France and twentieth-century Russia. In 1905, for example, the priest who led the St. Petersburg’s revolution was some sort of double agent, as was the man who organized the assassination of the czar’s uncle, the grand duke. As it happens, the United States has its own surprisingly full history of such planted agents at work turning small groups or movements in directions that, for better or far more often worse, they weren’t planning on going. One well-documented case is that of “Tommy the Traveler,” a Students for a Democratic Society (SDS) organizer who after years of trying to arouse violent action convinced two 19-year-old students to firebomb an ROTC headquarters at Hobart College in upstate New York. The writer John Schultz reported onlikely provocateurs in Chicago during the Democratic National Convention of 1968. How much of this sort of thing went on? Who knows? Many relevant documents molded in unopened archives, or have been heavily redacted or destroyed.

As the Boston marathon bombing illustrates, there are homegrown terrorists capable of producing the weapons they need and killing Americans without the slightest help from the US government. But historically, it’s surprising how relatively often the gendarme is also a ringleader. Just how often is hard to know, since information on the subject is fiendishly hard to pry loose from the secret world.

Through 2011, 508 defendants in the United States were prosecuted in what the Department of Justice calls “terrorism-related cases.” According to Mother Jones’s Trevor Aaronson, the FBI ran sting operations that “resulted in prosecutions against 158 defendants”—about one-third of the total. “Of that total, forty-nine defendants participated in plots led by an agent provocateur—an FBI operative instigating terrorist action. With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings.”

In Cleveland, on May Day of 2012, in the words of a Rolling Stone exposé, the FBI “turned five stoner misfits into the world’s most hapless terrorist cell.” To do this, the FBI put a deeply indebted, convicted bank robber and bad-check passer on its payroll, and hooked him up with an arms dealer, also paid by the bureau. The FBI undercover man then hustled five wacked-out wannabe anarchists into procuring what they thought was enough C4 plastic explosive to build bombs they thought would blow up a bridge. The bombs were, of course, dummies. The five were arrested and await trial.

What do such cases mean? What is the FBI up to? Trevor Aaronson offers this appraisal:

The FBI’s goal is to create a hostile environment for terrorist recruiters and operators—by raising the risk of even the smallest step toward violent action. It’s a form of deterrence.… Advocates insist it has been effective, noting that there hasn’t been a successful large-scale attack against the United States since 9/11. But what can’t be answered—as many former and current FBI agents acknowledge—is how many of the bureau’s targets would have taken the step over the line at all, were it not for an informant.

Perhaps Aaronson is a bit too generous. The FBI may, at times, be anything but thoughtful in its provocations. It may, in fact, be flatly dopey. COINTELPRO records released since the 1960s under the Freedom of Information Act (FOIA) show that it took FBI Director J. Edgar Hoover until 1968 to discover that there was such a thing as a New Left that might be of interest. Between 1960 and 1968, as the New Left was becoming a formidable force in its own right, the bureau’s top officials seem to have thought that groups like Students for a Democratic Society were simply covers for the Communist Party, which was like mistaking the fleas for the dog. We have been assured that the FBI of today has learned something since the days of J. Edgar Hoover. But of ignorance and stupidity there is no end.

Trivial and Nontrivial Pursuits

Entrapment and instigation to commit crimes are in themselves genuine dangers to American liberties, even when the liberties are those of the reckless and wild. But there is another danger to such pursuits: the attention the authorities pay to nonexistent threats (or the creation of such threats) is attention not paid to actual threats.

Anyone concerned about the security of Americans should cast a suspicious eye on the allocation or simply squandering of resources on wild goose chases. Consider some particulars which have recently come to light. Under the Freedom of Information Act, thePartnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups—during the very time that they were missing actual warnings about actual terrorist actions.

From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places. In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’ ”

Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center, one of seventy-seven coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily. As the investigative journalist Michael Isikoff recently reported, it was not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’ ”

It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber. That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either. The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of… Code Pink and Veterans for Peace.

Public Agencies and the “Private Sector”

So we know that Boston’s master coordinators—its Committee on Public Safety, you might say—were worried about constitutionally protected activity, including its consequences for “commercial and financial sector assets.” Unsurprisingly, the feds worked closely with Wall Street even before the settling of Zuccotti Park. More surprisingly, in Alaska, Alabama, Florida, Mississippi, Tennessee and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations—and vice versa.

Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.” Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.” Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:

• “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”

• “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to…[twenty-two] campus police officials.… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”

• An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on November 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services reported to DSAC on the relationship between OWS and organized labor.”

• DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” It advised corporate employees to dress conservatively, avoid political discussions and “avoid all large gatherings related to civil issues. Even seemingly peaceful rallies can spur violent activity or be met with resistance by security forces.”

• The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.

• In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.” Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’ ”

Sometimes, “intelligence” moves in the opposite direction—from private corporations to public agencies. Among the collectors of such “intelligence” are entities that, like the various intelligence and law enforcement outfits, do not make distinctions between terrorists and nonviolent protesters. Consider TransCanada, the corporation that plans to build the 1,179-mile Keystone-XL tar sands pipeline across the US and in the process realize its “vision to become the leading energy infrastructure company in North America.“ The anti-pipeline group Bold Nebraska filed a successful Freedom of Information Act request with the Nebraska State Patrol and so was able to put TransCanada’s briefing slideshow up online.

So it can be documented in living color that the company lectured federal agents and local police to look into the use of “anti-terrorism statutes” against peaceful anti-Keystone activists. TransCanada showed slides that cited as sinister the “attendance” of Bold Nebraska members at public events, noting “Suspicious Vehicles/Photography.” TransCanada alerted the authorities that Nebraska protesters were guilty of “aggressive/abusive behavior,” citing a local anti-pipeline group that, they said, committed a “slap on the shoulder” at the Merrick County Board Meeting (possessor of said shoulder unspecified). They fingered nonviolent activists by name and photo, paying them the tribute of calling them “’Professionals’ & Organized.” Native News Network pointed out that “although TransCanada’s presentation to authorities contains information about property destruction, sabotage, and booby traps, police in Texas and Oklahoma have never alleged, accused, or charged Tar Sands Blockade activists of any such behaviors.”

Centers for Fusion, Diffusion and Confusion

After September 11, 2001, government agencies at all levels, suddenly eager to break down information barriers and connect the sort of dots that had gone massively unconnected before the Al Qaeda attacks, used Department of Homeland Security funds to start “fusion centers.” These are supposed to coordinate anti-terrorist intelligence gathering and analysis. They are also supposed to “fuse” intelligence reports from federal, state and local authorities, as well as private companies that conduct intelligence operations. According to the ACLU, at least seventy-seven fusion centers currently receive federal funds.

Much is not known about these centers, including just who runs them, by what rules and which public and private entities are among the fused. There is nothing public about most of them. However, some things are known about a few. Several fusion center reports that have gone public illustrate a remarkably slapdash approach to what constitutes “terrorist danger” and just what kinds of data are considered relevant for law enforcement. In 2010, the American Civil Liberties Union of Tennessee learned, for instance, that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents. The letter encourages schools to be supportive of all religious beliefs during the holiday season.” (The map is no longer online.)

So far, the prize for pure fused wordiness goes to a 215-page manual issued in 2009 by theVirginia Fusion Center (VFC), filled with Keystone Kop–style passages among pages that in their intrusive sweep are anything but funny. The VFC warned, for instance, that “the Garbage Liberation Front (GLF) is an ecological direct action group that demonstrates the joining of anarchism and environmental movements.” Among GLF’s dangerous activities well worth the watching, the VFC included “dumpster diving, squatting, and train hopping.”

In a similarly jaw-dropping manner, the manual claimed—the italics are mine—that “Katuah Earth First (KEF), based in Asheville, North Carolina, sends activists throughout the region to train and engage in criminal activity. KEF has trained local environmentalists in non-violent tactics, including blocking roads and leading demonstrations, at action camps in Virginia.While KEF has been primarily involved in protests and university outreach, members have also engaged in vandalism.” Vandalism! Send out an APB!

The VFC also warned that, “although the anarchist threat to Virginia is assessed as low, these individuals view the government as unnecessary, which could lead to threats or attacks against government figures or establishments.” It singled out the following 2008 incidents as worth notice:

• At the Martinsville Speedway, “A temporary employee called in a bomb threat during a Sprint Cup race…because he was tired of picking up trash and wanted to go home.”

• In Missouri, “a mobile security team observed an individual photographing an unspecified oil refinery.… The person abruptly left the scene before he could be questioned.”

• Somewhere in Virginia, “seven passengers aboard a white pontoon boat dressed in traditional Middle Eastern garments immediately sped away after being sighted in the recreational area, which is in close proximity to” a power plant.

What idiot or idiots wrote this script?

Given a disturbing lack of evidence of terrorist actions undertaken or in prospect, the authors even warned:

It is likely that potential incidents of interest are occurring, but that such incidents are either not recognized by initial responders or simply not reported. The lack of detailed information for Virginia instances of monitored trends should not be construed to represent a lack of occurrence.

Lest it be thought that Virginia stands alone and shivering on the summit of bureaucratic stupidity, consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the antiwar movement, a former US Congresswoman, the US Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’ ”

And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies. According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’ ” The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’ ”

Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”

One of these investigations concerned Greenpeace protests planned for ExxonMobil shareholder meetings. (Note: I was on Greenpeace’s board of directors during three of those years.) The inquiry was kept open “for over three years, long past the shareholder meetings that the subjects were supposedly planning to disrupt.” The FBI put the names of Greenpeace members on its federal watch list. Around the same time, an ExxonMobil-funded lobby got the IRS to audit Greenpeace.

This counterintelligence archipelago of malfeasance and stupidity is sometimes fused with ass-covering fabrication. In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department inspector general’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects. The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.

The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor. He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.

The sequel was not quite so droll. The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.

Moreover, at least one fusion center has involved military intelligence in civilian law enforcement. In 2009, a military operative from Fort Lewis, Washington, worked undercovercollecting information on peace groups in the Northwest. In fact, he helped run the Port Militarization Resistance group’s Listserv. Once uncovered, he told activists there were others doing similar work in the Army. How much the military spies on American citizens is unknown and, at the moment at least, unknowable.

Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos—I have some in my own heavily redacted files obtained through an FOIA request—were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case. During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to “Military Surveillance of Civilian Politics, 1967–70,” an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews. They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”

Years later, I met one of these agents, now retired, in San Francisco. He knew more about what I was doing in the late 1960s than my mother did.

Squaring Circles

In 2009, President Obama told the graduating class at the Naval Academy that, “as Americans, we reject the false choice between our security and our ideals.” Security and ideals: officially we want both. But how do you square circles, especially in a world in which “security” has often enough become a stand-in for whatever intelligence operatives decide to do?

Please support our journalism. Get a digital subscription for just $9.50!

The ACLU’s Tennessee office sums the situation up nicely: “While the ostensible purpose of fusion centers, to improve sharing of anti-terrorism intelligence among different levels and arms of government, is legitimate and important, using the centers to monitor protected First Amendment activity clearly crosses the line.” Nationally, the ACLU rightly worries about who is in charge of fusion centers and by what rules they operate, about what becomes of privacy when private corporations are inserted into the intelligence process, about what the military is doing meddling in civilian law enforcement, about data-mining operations that Federal guidelines encourage, and about the secrecy walls behind which the fusion centers operate.

Even when fusion centers do their best to square that circle in their own guidelines, like the ones obtained by the ACLU from Massachusetts’s Commonwealth Fusion Center (CFC), the knots in which they tie themselves are all over the page. Imagine, then, what happens when you let informers or agents provocateurs loose in actual undercover situations.

“Undercovers,” writes the Massachusetts CFC, “may not seek to gain access to private meetings and should not actively participate in meetings.… At the preliminary inquiry stage, sources and informants should not be used to cultivate relationships with persons and groups that are the subject of the preliminary inquiry.” So far so good. Then, it adds, “Investigators may, however, interview, obtain, and accept information known to sources and informants.” By eavesdropping, say? Collecting trash? Hacking? All without warrants? Without probable cause?

“Undercovers and informants,” the guidelines continue, “are strictly prohibited from engaging in any conduct the sole purpose of which is to disrupt the lawful exercise of political activity, from disrupting the lawful operations of an organization, from sowing seeds of distrust between members of an organization involved in lawful activity, or from instigating unlawful acts or engaging in unlawful or unauthorized investigative activities.” Now, go back and note that little, easy-to-miss word “sole.” Who knows just what grim circles that tiny word squares?

The Massachusetts CFC at least addresses the issue of entrapment: “Undercovers should not become so involved in a group that they are participating in directing the operations of a group, either by accepting a formal position in the hierarchy or by informally establishing the group’s policy and priorities. This does not mean an undercover cannot support a group’s policies and priorities; rather an undercover should not become a driving force behind a group’s unlawful activities.” Did Cleveland’s fusion center have such guidelines? Did they follow them? Do other state fusion centers? We don’t know.

Whatever the fog of surveillance, when it comes to informers, agents provocateurs, and similar matters, four things are clear enough:

• Terrorist plots arise, in the United States as elsewhere, with the intent of committing murder and mayhem. Since 2001, in the US, these have been almost exclusively the work of freelance Islamist ideologues like the Tsarnaev brothers of Boston. None have been connected in any meaningful way with any legitimate organization or movement.

• Government surveillance may in some cases have been helpful in scotching such plots, but there is no evidence that it has been essential.

• Even based on the limited information available to us, since September 11, 2001, the net of surveillance has been thrown wide indeed. Tabs have been kept on members of quite a range of suspect populations, including American Muslims, anarchists, and environmentalists, among others—in situation after situation where there was no probable cause to suspect preparations for a crime.

• At least on occasion—we have no way of knowing how often—agents provocateurs on government payrolls have spurred violence.

How much official unintelligence is at work? How many demonstrations are being poked and prodded by undercover agents? How many acts of violence are being suborned? It would be foolish to say we know. At least equally foolish would be to trust the authorities to keep to honest-to-goodness police work when they are so mightily tempted to take the low road into straight-out, unwarranted espionage and instigation.

http://www.thenation.com/article/175005/wonderful-american-world-informers-and-agents-provocateurs#

 

COINTELPRO

COINTELPRO (an acronym for COunter INTELligence PROgram) was a series of covert, and at times illegal,[1][2] projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveying, infiltrating, discrediting, and disrupting domestic political organizations.[3] National Security Agency operation Project MINARET targeted the personal communications of leading Americans who criticized the Vietnam War, including Senators (e.g., Frank Church and Howard Baker), civil rights leaders, journalists, and athletes.[4][5]

The official COINTELPRO label took place between 1956 and 1971.[6][7] The FBI’s stated motivation was “protecting national security, preventing violence, and maintaining the existing social and political order.”[8]

FBI records show that 85% of COINTELPRO resources targeted groups and individuals that the FBI deemed “subversive”,[9]including communist and socialist organizations; organizations and individuals associated with the Civil Rights Movement, including Rev. Dr. Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, theNational Association for the Advancement of Colored People, and the Congress of Racial Equality and other civil rights organizations; black nationalist groups; the Young Lords; the Rainbow Coalition; the American Indian Movement; a broad range of organizations labeled “New Left“, including Students for a Democratic Society and the Weathermen; almost all groupsprotesting the Vietnam War, as well as individual student demonstrators with no group affiliation; the National Lawyers Guild; organizations and individuals associated with the women’s rights movement; nationalist groups such as those seeking independence for Puerto Rico, United Ireland, and Cuban exile movements including Orlando Bosch‘s Cuban Power and theCuban Nationalist Movement; and additional notable Americans (for example, Albert Einstein, who was a socialist and a member of several civil rights groups, came under FBI surveillance during the years just before COINTELPRO’s official inauguration).[10] The remaining 15% of COINTELPRO resources were expended to marginalize and subvert white supremist hate groups, including the Ku Klux Klan and the National States’ Rights Party.[11]

FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and their leaders.[12][13] Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.[14] Attorney General Robert F. Kennedy personally authorized some of these programs.[15] Kennedy would later learn that he also had been a target of FBI surveillance.[citation needed]

History

The FBI engaged in the political repression of “communism” almost from the time of the agency’s inception in 1908, at a time of widespread social disruption due to anarchists and labor movements. Beginning in the 1930s, antecedents to COINTELPRO operated during the Franklin D. Roosevelt and Harry S. Trumanadministrations. Centralized operations under COINTELPRO officially began in August 1956 with a program designed to “increase factionalism, cause disruption and win defections” inside the Communist Party U.S.A. (CPUSA). Tactics included anonymous phone calls, IRS audits, and the creation of documents that would divide American communists internally.[16] An October 1956 memo from Hoover reclassified the FBI’s ongoing surveillance of black leaders, including it within COINTELPRO, with the justification that the movement was infiltrated by communists.[17] In 1956, Hoover sent an open letter denouncing Dr. T.R.M. Howard, a civil rights leader, surgeon, and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders of George W. Lee, Emmett Till, and other blacks in the South.[18] When the Southern Christian Leadership Conference (SCLC) was founded in 1957, the FBI began to monitor and target the group almost immediately, focusing particularly on Bayard Rustin, Stanley Levison, and, eventually, Rev. Martin Luther King, Jr.[19]

After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote:

In the light of King’s powerful demagogic speech. … We must mark him now, if we have not done so before, as the most dangerous Negro of the future in this nation from the standpoint of communism, the Negro, and national security.[20]

Soon after, the FBI was systematically bugging King’s home and his hotel rooms.[21]

In the mid-1960s, King began publicly criticizing the Bureau for giving insufficient attention to the use of terrorism by white supremacists. Hoover responded by publicly calling King the most “notorious liar” in the United States.[22] In his 1991 memoir, Washington Post journalist Carl Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to commit suicide.[23] Historian Taylor Branch documents an anonymous November 21, 1964 “suicide package” sent by the FBI that contained audio recordings of King’s sexual indiscretions combined with a letter telling him “There is only one way out for you. You better take it before your filthy, abnormal, fraudulent self is bared to the nation.”[24]

During the same period the program also targeted Malcolm X. While an FBI spokesman has denied that the FBI was “directly” involved in Malcolm’s murder, it is documented that the Bureau fostered the violent schism between Malcolm and the Nation of Islam that led to the black leader’s death. The FBI heavily infiltrated Malcolm’s Organization of Afro-American Unity in the final month’s of his life. The Pulitzer Prize-winning biography of Malcolm X by Manning Marable asserts that most of the men who plotted Malcolm’s assassination were never apprehended and that the full extent of the FBI’s involvement in his death cannot be known.[25] [26]

Amidst the urban unrest of July–August 1967, the FBI began “COINTELPRO–BLACK HATE”, which focused on King and the SCLC as well as the Student Nonviolent Coordinating Committee (SNCC), the Revolutionary Action Movement (RAM), the Deacons for Defense and Justice, Congress of Racial Equality (CORE), and theNation of Islam.[27] BLACK HATE established the Ghetto Informant Program and instructed 23 FBI offices to “disrupt, misdirect, discredit, or otherwise neutralize the activities of black nationalist hate type organizations”.[28]

A March 1968 memo stated the programs goal was to “prevent the coalition of militant black nationalist groups” ; to “Prevent the RISE OF A ‘MESSIAH’ who could unify…the militant black nationalist movement” ; “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence [against authorities].” ; to “Prevent militant black nationalist groups and leaders from gaining RESPECTABILITY, by discrediting them to…both the responsible community and to liberals who have vestiges of sympathy…”; and to “prevent the long-range GROWTH of militant black organizations, especially among youth.” Dr. King was said to have potential to be the “messiah” figure, should he abandon nonviolence and integrationism;[29] Stokely Carmichael was noted to have “the necessary charisma to be a real threat in this way.” [30]

This program coincided with a broader federal effort to prepare military responses for urban riots, and began increased collaboration between the FBI, Central Intelligence Agency, National Security Agency, and the Department of Defense. The CIA launched its own domestic espionage project in 1967 called Operation CHAOS. [31] A particular target was the Poor People’s Campaign, a national effort organized by King and the SCLC to occupy Washington, D.C. The FBI monitored and disrupted the campaign on a national level, while using targeted smear tactics locally to undermine support for the march.[32]

COINTELPRO–NEW LEFT was created in April 1968, in the wake of Martin Luther King, Jr.‘s assassination in Memphis and mass student protests at Columbia University.[33]

Overall, COINTELPRO encompassed disruption and sabotage of the Socialist Workers Party (1961), the Ku Klux Klan (1964), the Nation of Islam, the Black Panther Party (1967), and the entire New Left social/political movement, which included antiwar, community, and religious groups (1968). A later investigation by the Senate’sChurch Committee (see below) stated that “COINTELPRO began in 1956, in part because of frustration with Supreme Court rulings limiting the Government’s power to proceed overtly against dissident groups …”[34] Official congressional committees and several court cases[35] have concluded that COINTELPRO operations against communist and socialist groups exceeded statutory limits on FBI activity and violated constitutional guarantees of freedom of speech and association.[1]

Program exposed

The building broken into by the Citizen’s Commission to Investigate the FBI, at One Veterans Square, Media, Pennsylvania

The program was successfully kept secret until 1971, when the Citizens’ Commission to Investigate the FBI burglarized an FBI field office in Media, Pennsylvania, took several dossiers, and exposed the program by passing this material to news agencies. Many news organizations initially refused to publish the information. Within the year, Director J. Edgar Hooverdeclared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled on a case-by-case basis.[36][37]

Additional documents were revealed in the course of separate lawsuits filed against the FBI by NBC correspondent Carl Stern, the Socialist Workers Party, and a number of other groups. In 1976 the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the United States Senate, commonly referred to as the “Church Committee” for its chairman, Senator Frank Church of Idaho, launched a major investigation of the FBI and COINTELPRO. Journalists and historians speculate that the government has not released many dossier and documents related to the program. Many released documents have been partly, or entirely, redacted.

Since the conclusion of centralized COINTELPRO operations in 1971, FBI counterintelligence operations have been handled on a “case-by-case basis”; however allegations of improper political repression continue.[38][39]

The Final Report of the Select Committee castigated conduct of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:

The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law.[1] Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that … the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.[34]

The Church Committee documented a history of the FBI exercising political repression as far back as World War I, through the 1920s, when agents were charged with rounding up “anarchists, communists, socialists, reformists and revolutionaries” for deportation. The domestic operations were increased against political and anti-war groups from 1936 through 1976.

Intended effects

The intended effect of the FBI’s COINTELPRO was to “expose, disrupt, misdirect, or otherwise neutralize” groups that the FBI officials believed were “subversive”[40] by instructing FBI field operatives to:[41]

  1. create a negative public image for target groups (e.g. by surveilling activists, and releasing negative personal information to the public)
  2. break down internal organization
  3. create dissension between groups
  4. restrict access to public resources
  5. restrict the ability to organize protests
  6. restrict the ability of individuals to participate in group activities

Range of targets

The main target was the Communist Party.[42]

According to the Church Committee:

While the declared purposes of these programs were to protect the “national security” or prevent violence, Bureau witnesses admit that many of the targets were nonviolent and most had no connections with a foreign power. Indeed, nonviolent organizations and individuals were targeted because the Bureau believed they represented a “potential” for violence—and nonviolent citizens who were against the war in Vietnam were targeted because they gave “aid and comfort” to violent demonstrators by lending respectability to their cause.

The imprecision of the targeting is demonstrated by the inability of the Bureau to define the subjects of the programs. The Black Nationalist program, according to its supervisor, included “a great number of organizations that you might not today characterize as black nationalist but which were in fact primarily black.” Thus, the nonviolent Southern Christian Leadership Conference was labeled as a Black Nationalist-“Hate Group.”

Furthermore, the actual targets were chosen from a far broader group than the titles of the programs would imply. The CPUSA program targeted not only Communist Party members but also sponsors of the National Committee to Abolish the House Un-American Activities Committee and civil rights leaders allegedly under Communist influence or deemed to be not sufficiently “anti-Communist”. The Socialist Workers Party program included non-SWP sponsors of anti-war demonstrations which were cosponsored by the SWP or the Young Socialist Alliance, its youth group. The Black Nationalist program targeted a range of organizations from the Panthers to SNCC to the peaceful Southern Christian Leadership Conference, and included every Black Student Union and many other black student groups. New Left targets ranged from the SDS to the InterUniversity Committee for Debate on Foreign Policy, from Antioch College (“vanguard of the New Left”) to the New Mexico Free University and other “alternate” schools, and from underground newspapers to students’ protesting university censorship of a student publication by carrying signs with four-letter words on them.

Examples of surveillance, spanning all presidents from FDR to Nixon, both legal and illegal, contained in the Church Committee report:[43]

  • President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his “national defense” policy and supporting Col. Charles Lindbergh.
  • President Truman received inside information on a former Roosevelt aide’s efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists.
  • President Eisenhower received reports on purely political and social contacts with foreign officials by Bernard Baruch, Eleanor Roosevelt, and Supreme Court Justice William O. Douglas.
  • The Kennedy administration had the FBI wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm. US Attorney General Robert F. Kennedy received the fruits of an FBI wire tap on Martin Luther King, Jr. and an electronic listening device targeting a congressman, both of which yielded information of a political nature.
  • President Johnson asked the FBI to conduct “name checks” of his critics and members of the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the 1964 Democratic Conventionfrom FBI electronic surveillance.
  • President Nixon authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a Supreme Court Justice.

The COINTELPRO documents show numerous cases of the FBI’s intentions to prevent and disrupt protests against the Vietnam War. Many techniques were used to accomplish this task. “These included promoting splits among antiwar forces, encouraging red-baiting of socialists, and pushing violent confrontations as an alternative to massive, peaceful demonstrations.” One 1966 COINTELPRO operation tried to redirect the Socialist Workers Party from their pledge of support for the antiwar movement.[44]

The FBI claims that it no longer undertakes COINTELPRO or COINTELPRO-like operations. However, critics have claimed that agency programs in the spirit of COINTELPRO targeted groups such as the Committee in Solidarity with the People of El Salvador,[45] the American Indian Movement,[6][46] Earth First!,[47] the White Separatist Movement,[48] and the Anti-Globalization Movement.[citation needed]

Methods

Body of Fred Hampton, national spokesman for the Black Panther Party, who was killed by members of the Chicago Police Department, as part of a COINTELPRO operation.[49][50][7][51]

According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:

  1. Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.
  2. Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketingto create suspicion about targeted activists, sometimes with lethal consequences.[52]
  3. Legal harassment: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.[49]
  4. Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break-ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations.[49][50][7][53] The object was to frighten or eliminate dissidents and disrupt their movements.

The FBI specifically developed tactics intended to heighten tension and hostility between various factions in the black militancy movement, for example between the Black Panthers, the US Organization, and the Blackstone Rangers. This resulted in numerous deaths, among which were San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.[49]

The FBI also conspired with the police departments of many U.S. cities (San Diego, Los Angeles, San Francisco, Oakland, Philadelphia, Chicago) to encourage repeated raids on Black Panther homes—often with little or no evidence of violations of federal, state, or local laws—which resulted directly in the police killing many members of the Black Panther Party, most notably Chicago Black Panther Party Chairman Fred Hampton on December 4, 1969.[49][50][7][54]

In order to eliminate black militant leaders whom they considered dangerous, the FBI is believed to have worked with local police departments to target specific individuals,[55] accuse them of crimes they did not commit, suppress exculpatory evidence and falsely incarcerate them.[citation needed] Elmer “Geronimo” Pratt, a Black Panther Party leader, was incarcerated for 27 years before a California Superior Court vacated his murder conviction, ultimately freeing him. Appearing before the court, an FBI agent testified that he believed Pratt had been framed, because both the FBI and the Los Angeles Police Department knew he had not been in the area at the time the murder occurred.[56][57]

Some sources claim that the FBI conducted more than 200 “black bag jobs“,[58][59] which were warrantless surreptitious entries, against the targeted groups and their members.[60]

J. Edgar Hoover

In 1969 the FBI special agent in San Francisco wrote Hoover that his investigation of the Black Panther Party (BPP) had concluded that in his city, at least, the Panthers were primarily engaged in feeding breakfast to children. Hoover fired back a memo implying the agent’s career goals would be directly affected by his supplying evidence to support Hoover’s view that the BPP was “a violence-prone organization seeking to overthrow the Government by revolutionary means”.[61]

Hoover supported using false claims to attack his political enemies. In one memo he wrote: “Purpose of counterintelligence action is to disrupt the BPP and it is immaterial whether facts exist to substantiate the charge.”[62]

In one particularly controversial 1965 incident, white civil rights worker Viola Liuzzo was murdered by Ku Klux Klansmen, who gave chase and fired shots into her car after noticing that her passenger was a young black man; one of the Klansmen was Gary Thomas Rowe, an acknowledged FBI informant.[63][64] The FBI spread rumors that Liuzzo was a member of theCommunist Party and had abandoned her children to have sexual relationships with African Americans involved in the Civil Rights Movement.[65][66] FBI records show that J. Edgar Hoover personally communicated these insinuations to President Johnson.[67][68] FBI informant Rowe has also been implicated in some of the most violent crimes of the 1960s civil rights era, including attacks on the Freedom Riders and the 1963 Birmingham, Alabama 16th Street Baptist Church bombing.[63]According to Noam Chomsky, in another instance in San Diego, the FBI financed, armed, and controlled an extreme right-wing group of former Minutemen, transforming it into a group called the Secret Army Organization that targeted groups, activists, and leaders involved in the Anti-War Movement, using both intimidation and violent acts.[69][70][71]

Hoover ordered preemptive action “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence.”[12]

Illegal surveillance

The final report of the Church Committee concluded:

Too many people have been spied upon by too many Government agencies and too much information has been illegally collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret and bias informants, but also using other intrusive techniques such as wiretaps, microphone “bugs”, surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous—and even of groups suspected of associating with potentially dangerous organizations—have continued for decades, despite the fact that those groups did not engage in unlawful activity.

Groups and individuals have been assaulted, repressed, harassed and disrupted because of their political views,social believes and their lifestyles. Investigations have been based upon vague standards whose breadth made excessive collection inevitable. Unsavory, harmful and vicious tactics have been employed—including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths. Intelligence agencies have served the political and personal objectives of presidents and other high officials. While the agencies often committed excesses in response to pressure from high officials in the Executive branch and Congress, they also occasionally initiated improper activities and then concealed them from officials whom they had a duty to inform.

Governmental officials—including those whose principal duty is to enforce the law—have violated or ignored the law over long periods of time and have advocated and defended their right to break the law.

The Constitutional system of checks and balances has not adequately controlled intelligence activities. Until recently the Executive branch has neither delineated the scope of permissible activities nor established procedures for supervising intelligence agencies. Congress has failed to exercise sufficient oversight, seldom questioning the use to which its appropriations were being put. Most domestic intelligence issues have not reached the courts, and in those cases when they have reached the courts, the judiciary has been reluctant to grapple with them.[72][73]

Post-COINTELPRO operations

While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI actions indicate that post-COINTELPRO reforms did not succeed in ending COINTELPRO tactics.[74][75][76] Documents released under the FOIA show that the FBI tracked the late David Halberstam—a Pulitzer Prize-winning journalist and author—for more than two decades.[77][78] In 1978, then-acting FBI Director William H. Webster indicated that, by 1976, most of the program’s resources has been rerouted.[79][better source needed]

“Counterterrorism” guidelines implemented during the Reagan administration have been described as allowing a return to COINTELPRO tactics.[80][pages needed] Some radical groups accuse factional opponents of being FBI informants or assume the FBI is infiltrating the movement.[81]

According to a report by the Inspector General (IG) of the U.S. Department of Justice, the FBI improperly opened investigations of American activist groups, even though they were planning nothing more than peaceful protests and civil disobedience. The review by the inspector general was launched in response to complaints by civil liberties groups and members of Congress. The FBI improperly monitored groups including the Thomas Merton Center, a Pittsburgh-based peace group; People for the Ethical Treatment of Animals (PETA); and Greenpeace USA, an environmental activism organization. Also, activists affiliated with Greenpeace were improperly put on a terrorist watch list, although they were planning no violence or illegal activities.

The IG report found these “troubling” FBI practices between 2001 and 2006. In some cases, the FBI conducted investigations of people affiliated with activist groups for “factually weak” reasons. Also, the FBI extended investigations of some of the groups “without adequate basis” and improperly kept information about activist groups in its files. The IG report also found that FBI Director Robert Mueller III provided inaccurate congressional testimony about one of the investigations, but this inaccuracy may have been due to his relying on what FBI officials told him.[82]

Several authors have accused the FBI of continuing to deploy COINTELPRO-like tactics against radical groups after the official COINTELPRO operations were ended. Several authors have suggested the American Indian Movement (AIM) has been a target of such disturbing operations.

Authors such as Ward Churchill, Rex Weyler, and Peter Matthiessen allege that the federal government intended to acquire uranium deposits on the Lakota tribe’s reservation land, and that this motivated a larger government conspiracy against AIM activists on the Pine Ridge reservation.[6][46][83][84][85] Others believe COINTELPRO continues and similar actions are being taken against activist groups.[85][86][87] Caroline Woidat says that, with respect to Native Americans, COINTELPRO should be understood within a historical context in which “Native Americans have been viewed and have viewed the world themselves through the lens of conspiracy theory.”[88] Other authors note that while some conspiracy theories related to COINTELPRO are unfounded, the issue of ongoing government surveillance and repression is real.[39][89]

See also

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 369-373

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Meet The Democratic Candidate For President in 2016: California Governor Jerry Brown — Balancing Budgets and Building A Presidential Campaign Chest — Achilles Heel California Created a Sanctuary State For Illegal Aliens — Save Water — Save Money — Save Illegals? — Progressive But Fiscally Responsible — Videos

Posted on November 17, 2014. Filed under: American History, Blogroll, Business, Climate, College, Communications, Constitution, Culture, Economics, Education, Employment, Energy, Enivornment, Faith, Family, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Food, Freedom, Friends, government, government spending, Health Care, history, Illegal, Immigration, Inflation, IRS, Law, Legal, liberty, Life, Links, media, Music, Obamacare, People, Philosophy, Photos, Politics, Press, Psychology, Radio, Rants, Raves, Regulations, Resources, Reviews, Talk Radio, Tax Policy, Taxes, Unemployment, Video, War, Water, Wealth, Weather, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014

Story 1: Meet The Democratic Candidate For President in 2016: California Governor Jerry Brown — Balancing Budgets and Building A Presidential Campaign Chest — Achilles Heel California Created a Sanctuary State For Illegal Aliens — Save Water — Save Money — Save Illegals? — Progressive But Fiscally Responsible — Videos jerry_brown
jerry brown

jerry-brownjerry brown 2

Jerry Brown for President?

KQED Newsroom Segment: Jerry Brown Exclusive Interview, May 2, 2014

Brown wins historic fourth term as California’s governor

How Jerry Brown is undermining American immigration law

Gov. Jerry Brown talks about Central American immigrants

Gov. Brown to sign illegal immigrant license bill into law

Driver’s licenses for illegal immigrants – CA

California Governor Jerry Brown Signs Bill Giving Undocumented Immigrants Right To Obtain Driver’s Licenses

Jerry Brown – Limits To Government

Jerry Brown, 1975. An innovative free thinker before party politics ground him into a garden-variety statist.

CA Gov. Jerry Brown interview- media in politics (Merv Griffin Show 1981)

California Governor Jerry Brown talks with Merv about the role of the media in modern American politics. Not much has changed in 30 years, it seems. Merv Griffin had over 5000 guests appear on his show from 1963-1986. Footage from the Merv Griffin Show is available for licensing to all forms of media through Reelin’ In The Years Productions. http://www.reelinintheyears.com.

Jerry Brown 1992

Jerry Brown Announcement Video

Brown-Whitman Debate: Illegal Immigration

Governor Brown Halts Budget Negotiations

Governor Brown Update on the Budget 06.12.11

Budget Veto

Address to the People of California: Governor Brown Discusses 2012-2013 State Budget

California Gov. Jerry Brown on Balancing the State Budget

Mexican president in California to talk trade, border issues

JERRY BROWN FOR PRESIDENT? MEETS WITH DONORS THIS WEEK

California Governor Jerry Brown, who was re-elected in a landslide earlier this month to what he says is his last term in office, will ask political donors on Monday to keep contributing, the Los Angeles Times reports. Brown defeated his opponent, Neel Kashkari, while retaining $20 million or more in his reelection account as of mid-October. However, Brown–who says he will not run for President–is still asking for cash.

The Sacramento reception asks for donations of $5,000 for a “private reception and sit down conversation” with Brown at Mulvaney’s B&L. Capitol Advocacy, a top lobbying firm, plans to attend; the firm will reportedly bring some of its major clients, including PepsiCo, Corrections Corporation of America, T-Mobile USA Inc., WellCare Health Plans, Pacific Compensation Insurance Co., and Diageo.

The Times, which secured a copy of the invitation, reports that Brown has spent little of his reelection funds since mid-October; he had told the Times that he was thinking of using any funds left over from his campaign to support ballot measures in his new term.

The Washington Post reported in October that Brown’s campaign said it had spent over $3.3 million on ads for Propositions 1 and 2. At that point he had not run a single television ad for his campaign.

Some journalists, notably Chuck Todd of NBC News, have speculated that Brown would likely run for president. Recently, HBO’s Bill Maher said that Brown ought to do so, and condemned what he said was age discrimination. (Brown would be 78 years old in 2016.)

Neither spokesmen for Brown nor his chief fundraiser, Angie Tate, had any comment when contacted by the Times.

 

 

The Obstacles to a Jerry Brown Run in 2016

When a governor in one of the country’s largest states is reelected by landslide margins, questions about that governor’s presidential prospects arise even before the polls close. But California’s Jerry Brown, who on Tuesday was given an unprecedented fourth termby Golden State voters, will almost certainly not be a candidate for the White House in 2016. The reasons have less to do with actuarial tables than with the nature of the national Democratic primary electorate.

The most noticeable obstacle to a Brown candidacy is his age. Although he was the youngest governor in California’s history when he was first elected in 1974, at age 36, Mr. Brown is now the state’s oldest governor ever. In November 2016, he will be 78, meaning that he would conclude his first term in the Oval Office at 82. The governor is in very good health, and this advanced age would not disqualify him from the presidency, but it does appear to have made him less ambitious about national office he was in 1976 and 1980, when he campaigned for the presidency. He has already said that he intends to use the many unspent millions of dollars he raised during this year’s gubernatorial campaign to fund future state ballot initiatives. Not only can most of that money not be transferred into a presidential campaign fund, but trying to run for president while also seeking to pass ballot initiatives in California would be enormously challenging–certainly given the time required to succeed at either task.

But the bigger obstacle for Mr. Brown is that his brand of centrism has no logical place in a 2016 primary field. If a challenge to Hillary Rodham Clinton is going to emerge, it will almost certainly be a populist voice from the Democratic base. Mr. Brown’s insistence on budget cuts that frustrated his party’s legislators, his unwillingness to ban fracking, and his continued interest in revamping California’s environmental regulations make him an unlikely flag-carrier for progressive primary voters. The key to Mr. Brown’s large victory Tuesday was fashioning an agenda of sufficient appeal to the state’s business community to deprive his Republican challenger of substantive financial backing.

A benefit of not running for president, of course, is that it allows the governor to focus his full attention on his day job. That might not be the stuff of national headlines, but, at this point in his long career, that might be good enough for Jerry Brown.

http://blogs.wsj.com/washwire/2014/11/05/why-jerry-brown-is-unlikely-to-run-in-2016/

Gov. Jerry Brown says 2016 Democratic nomination is Hillary Clinton’s ‘if she wants’

When Bill Clinton arrived at the 1992 Democratic National Convention as the party’s all-but-certain presidential nominee, his persistent and pesky primary opponent, former California governor Jerry Brown, refused to endorse him.Two decades later, Brown is again governor of the nation’s most-populous state. Yet in a sign that he has patched things up with the first family of Democratic politics, Brown is ready to support Hillary Rodham Clinton if she seeks the presidency in 2016.“I really believe that Hillary Clinton has the presence, the experience and the support of the vast majority of Democrats in a way that I have not seen in my lifetime,” Brown said in a wide-ranging interview with The Washington Post. “She has this if she wants.”http://www.washingtonpost.com/politics/gov-jerry-brown-says-2016-democratic-nomination-is-hillary-clintons-if-she-wants/2014/05/28/de3d0e0c-e5cc-11e3-8f90-73e071f3d637_story.html

More And More People Are Not Running For President In 2016

Posted: 01/16/2014 6:25 pm EST Updated: 01/25/2014 4:01 pm EST
JERRY BROWN NOT RUNNING 2016

It is 2014 at the moment, but since there isn’t any kind of massive unemployment problem and it’s totally safe for pregnant women to drink the water, water, everywhere, the media are filling the hole in their lives with only the hottest speculation about the 2016 presidential election.

For example, this week Time magazine istackling the phenomenon that is Hillary Clinton’s shadow campaign for president, noting that the mere threat of her candidacy is keeping other Democrats out of the race. This is less a “news story” than it is a fun and bouncy ball that is being passed from news organization to news organization. Time all but announced the unoriginality of the idea with its cover, which was created by going to a clip art archive and doing a global search for “women” and “clichés.” As with the story’s trope itself, it’s best examined in the gray light of the afterglow of an afterthought.

Against the 2016 onslaught, and our own contributions to it, let us now praise the real heroes of this period of premature frenzy — those men and women who have seen the light of presidential speculation beaming in their direction and have forthrightly declared, “You can include me out.” This week’s award for Valor In The Face Of People Wondering If You’ll Run For President goes to California Gov. Jerry Brown (D), who is not running for president:

Speaking at a Tuesday news conference in Riverside, Calif., Brown scuttled speculation about his presidential prospects when a reporter asked if he planned to throw his hat in the ring for a fourth time.

“No, that’s not in the cards. Unfortunately,” Brown said, according to the Los Angeles Times. “Actually, California is a lot more governable.”

Supporters of Brown — who ran for the Democratic nomination in 1976, 1980 and 1992 — had hoped the popular governor would enter the 2016 race. Brown stoked speculation by not explicitly ruling out the possibility, although in May the 75-year-old noted that “time is kind of running out on that.”

You are forgiven if you weren’t aware that “Jerry Brown 2016″ was even a thing about which people were even talking. It was an idea that had a share of anonymous supporters, but only just enough news coverage to warrant an inclusion onWikipedia’s list of potential 2016 candidates.

That page, by the way, is one of the most hilarious reflections of American politics on the Internet, because it turns out it doesn’t take much to be included. Missouri Gov. Jay Nixon (D) ended up there because a St. Louis Post-Dispatch story speculating on whether Nixon’s future included a turn in the national spotlight led to a Politico story speculating on whether Nixon might not get his turn in the national spotlight because of Hillary Clinton, which led to another St. Louis Post-Dispatch story about the aforementioned Politico story, which led to a Washington Post story … speculating on whether Nixon’s future included a turn in the national spotlight, again.

Meanwhile, outside of Missouri, you have probably never heard of Jay Nixon. But you’re probably aware that Jerry Brown, between his first and latest stint as the Golden State’s governor, ran for president a bunch of times. And so, unsurprisingly, there was always someone on hand to stoke the fires of retro chic. In July 2013, the Washington Examiner’s Paul Bedard reported that some of Brown’s “allies” were “starting to talk up a possible 2016 presidential bid,” while another group of Brown’s associates were saying that Brown was going to be “78 [years old] by Election Day 2016,” that he “ran for statewide office only to end [California’s] budget crisis,” and that he was thus “nearly done with politics.”

A month later, Bernie Quigley, writing for The Hill, attempted to coax a Brown candidacy into being with the awesome force of the purplest prose he could muster:

California rises again with Brown, and it should come as no surprise. California brings the final destiny of our American journey, the final edge of expectation, the end and then the beginning again, the place and time of our American turning. Steve Jobs put it succinctly at the end: “The spaceship has landed.”

I asked an astute Californian about Brown’s prospects for national office. He said he will be too old in 2016. But Brown, Zen man of contemporary politics, is in a sense timeless.

Yeah … so that was a lot to absorb. The salient point is that Brown, obviously, doesn’t have the same opinion of his own timelessness. (Perhaps he finally decided to not run when he failed to regenerate into Peter Capaldi?)

Brown joins a happy confederacy of other men and women who have indicated that everyone can stop wondering if they are going to run for president, including New Jersey Sen. Cory Booker (D), San Antonio Mayor Julian Castro (D), New Mexico Gov. Susana Martinez (R), Massachusetts Gov. Deval Patrick (D) and Massachusetts Sen. Elizabeth Warren (D).

Also, Tim Pawlenty is not going to run for president. (I did some digging and found out that this Pawlenty fellow was a former Republican governor of Minnesota who ran for president once before. Who knew? I guess I totally spaced.)

http://www.huffingtonpost.com/2014/01/16/jerry-brown-not-running-2016_n_4612584.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 369-372

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Mike Maden — Drone — Videos

Posted on August 2, 2014. Filed under: American History, Blogroll, Books, College, Communications, Crime, Crisis, Doumentary, Drones, Drug Cartels, Education, Energy, Entertainment, Fiction, Films, Foreign Policy, Freedom, government spending, history, Homicide, Illegal, Immigration, Islam, Language, Law, liberty, Life, Links, media, Movies, Natural Gas, Natural Gas, Oil, Oil, People, Philosophy, Photos, Politics, Resources, Reviews, Security, Transportation, Video, War, Weapons, Welfare | Tags: , , , , , , , , , , , , , |

 

drone_

Mike Maden

mike maden

Obama defends US drone attacks

Peter Singer: Drone Warfare

The Morality of Drone Warfare

DRONE WARS, PART ONE: THE DRONE LANDSCAPE

DRONE WARS, PART TWO: THE DRONE ECONOMY

DRONE WARS, PART THREE: THE DRONE MORALITY

Drone Boom Why Drones Aren’t Just for Dropping Bombs Anymore

Drone Laws Restrict Civilian UAV’s but allow Government

Rise of the Drones(full documentary)HD

RISE OF THE DRONES – NOVA (full documentary)

The Costs of Drone Warfare – Documentary

Richard Clarke – U.S. Drone Program Under Obama “Got Out of Hand”

EVERYONE needs to see this! Drone Strikes

Top 10 Drones in the world

ex CEO Colin Guinn is ALIVE, Files legal Injunction against DJI Innovations

 

Read Full Post | Make a Comment ( None so far )

Peter Brimelow — Alien Nation: Common Sense About America’s Immigration Disaster — Videos

Posted on July 21, 2014. Filed under: American History, Blogroll, Books, British History, Business, Catholic Church, Communications, Computers, Demographics, Diasters, Economics, Employment, Family, Federal Government, Foreign Policy, Freedom, Friends, government spending, history, Illegal, Immigration, IRS, Islam, Language, Law, Legal, liberty, Life, Links, Literacy, media, Medicine, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Politics, Press, Psychology, Public Sector, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Shite, Strategy, Sunni, Talk Radio, Taxes, Technology, Terrorism, Unemployment, Unions, Video, War, Water, Wealth, Weather, Welfare, Wisdom | Tags: , , , , , , , |

aliennation

peter_brimelow

VDARE.com

What Price Mass Immigration – Peter Brimelow Introduction

 

Peter Brimelow of VDare on How Republican Party Has to be More White

Alien Nation: America’s Immigration Disaster

Mr. Brimelow discussed his book Alien Nation: Common Sense About America’s Immigration Disaster, published by Random House. The book focuses on U.S. immigration policy and cycles of control on immigration. Mr. Brimelow argues that legislation passed in 1965 has resulted in negative trends in immigration to the United States, including an influx of immigrants from a very few countries that he says are engulfing America. The author says that the latest immigration wave consists of immigrants who are less educated, less skilled, and less likely to share American ideals, which he argues is a detriment to American culture.

Peter Brimelow Reflects on Immigration in America, Post-Alien Nation

Michael Coren Interviews Peter Brimelow

Peter Brimelow, Immigration Road to Hell

Peter Brimelow speaks CPAC 2012

Inequality and Immigration (1 of 3)

Inequality and Immigration (2 of 3)

Inequality & Immigration (3 of 3)

Peter Brimelow On Western Culture At The Thomas Jefferson Club

The Libertarian Case Against Open Immigration | Peter Brimelow

Related Articles and Videos

George J. Borjas: Costs of Immigration – Economics Roundtable

 

Read Full Post | Make a Comment ( None so far )

Freak Out On Google Glass Name Tag App — Videos

Posted on February 5, 2014. Filed under: American History, Blogroll, Communications, Computers, Economics, history, Investments, Language, Law, liberty, Life, Links, People, Philosophy, Photos, Politics, Rants, Raves, Resources, Reviews, Science, Strategy, Talk Radio, Technology, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 205: February 5, 2014 

Pronk Pops Show 204: February 4, 2014 

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 202-204

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Story 1: Freak Out On Google Glass Name Tag App —  Videos

name_tag

glass-face-recognition

google-glass-facial-recognition.si_

NameTag – Google Glass Facial Recognition Beta App Demo

World’s First Real-Time Google Glass Facial Recognition App Demo – November 26 2013

NameTag – Facial Recognition App for Google Glass #CES2014

Googlicious : Google Glass gets a new look

Google Glass How-to: Getting Started

How it Feels [through Google Glass]

Google Glass Review

Google Glass eyes-on review

Panel Robert Scoble and Andrew Keen on Google Glass and privacy issues at TNW Conference Europe 2013

Amazing Google Glasses Demonstration at Google I/O 2012

Facebook Using Face Recognition Software

Facebook’s New Facial-Recognition Technology

Facial Recognition Systems Going Mainstream

Chic – Le Freak

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Have you heard about the new dance craze?
Listen to us, I’m sure you’ll be amazed
Big fun to be had by everyone
It’s up to you, it surely can be done

Young and old are doing it, I’m told
Just one try and you too will be sold
It’s called Le Freak! They’re doing it night and day
Allow us, we’ll show you the way

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

All that pressure got you down
Has your head spinning all around
Feel the rhythm, check the rhyme
Come on along and have a real good time

Like the days of stomping at the Savoy
Now we freak, oh what a joy!
Just come on down to 54
Find a spot out on the floor

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Now freak!
I said freak!
Now freak!

All that pressure got you down
Has your head spinning all around
Feel the rhythm, check the ride
Come on along and have a real good time

Like the days of stomping at the Savoy
Now we freak, oh what a joy!
Just come on down 54
Find a spot out on the floor

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Just When You Thought Google Glass Couldn’t Get Creepier: New App Allows Strangers to ID You Just by Looking at You

ave you ever seen someone wearing Google Glass out at the bar? Like a real person at a real bar actually wearing Google Glass? If so, you know how absolutely ridiculous they look. Which may be the only factor we have that will stop this:

A new app will allow total strangers to ID you and pull up all your information, just by looking at you and scanning your face with their Google Glass. The app is called NameTag and it sounds CREEPY.

The “real-time facial recognition” software “can detect a face using the Google Glass camera, send it wirelessly to a server, compare it to millions of records, and in seconds return a match complete with a name, additional photos and social media profiles.”

NEWS: Google Glass Users Can Now Wink to Take Photos, Which Is Horrible

The information listed could include your name, occupation, any social media profiles you have set up and whether or not you have a criminal record (“CRIMINAL HISTORY FOUND” pops up in bright red letters according to the demo).

And NameTag may have already added you to their database.

Two million entries have already been uploaded to FacialNetwork.com. Once the app officially goes live, you can sign up for NameTag and opt-out, instead of the alternative: Having to opt-in to allow them to show your information.

How is that OK?

WATCH: RadioShack’s Awesome Super Bowl Commercial Recruits the Best ’80s Stars

“It’s not about invading anyone’s privacy,” one NameTag’s creators claimed (viaIndependent). “It’s about connecting people that want to be connected. We will even allow users to have one profile that is seen during business hours and another that is seen in social situations. NameTag can make the big, anonymous world we live in as friendly as a small town.”

It may not be about invading anyone’s privacy, but that sounds like what it does. And forcing people to opt-out if they want to maintain their privacy is wrong (we would go so far as to say it should be illegal). But the purported benefits of the app are almost even worse:

They continue, “It’s much easier to meet interesting new people when we can simply look at someone, see their Facebook, review their LinkedIn page or maybe even see their dating site profile. Often we were interacting with people blindly or not interacting at all. NameTag on Google Glass can change all that.”

Gross.

It’s enough to make you root for that app that lets you film Google Glass porn. If you had to pick one. Luckily, Google has banned facial-recognition software from the Glass—for now.

http://www.eonline.com/news/507361/just-when-you-thought-google-glass-couldn-t-get-creepier-new-app-allows-strangers-to-id-you-just-by-looking-at-you

Bay Area Researcher Developing Facial Recognition Glasses To Help Stop Crime

y now, you have probably heard about the Google Glass wearable computer. Soon, a Mountain View startup will begin selling 3-D eyewear with technology so sophisticated, it could help crime fighters stop crime before it happens.

It’s not a new concept. The 2002 Hollywood film “Minority Report” gave us a look into the future when actor Tom Cruise catches and arrests a criminal before he commits the crime.

y now, you have probably heard about the Google Glass wearable computer. Soon, a Mountain View startup will begin selling 3-D eyewear with technology so sophisticated, it could help crime fighters stop crime before it happens.

It’s not a new concept. The 2002 Hollywood film “Minority Report” gave us a look into the future when actor Tom Cruise catches and arrests a criminal before he commits the crime.

Allen Yang is a University of California at Berkeley researcher and founder of Atheer, the startup developing the glasses.

The 3-D glasses are a wearable computer where users are wirelessly immersed in their own computer through virtual images.

“…And it’s streaming live from the internet to your glasses,” said Theo Goguely, senior product manager at Atheer.

The glasses will ultimately be used by business for work or for regular users for entertainment.

One could put on their glasses and instantly see a 3-D screen with a daytime calendar with a list of things to do. The smart glasses can assist users looking at their kitchen cupboard and they will help visualize nutritional needs.

One of its goals is for use by law enforcement. For example, police wearing the glasses could scan a crowd and possibly locate a suspect or a lost child.

This technology could have helped police find the suspects in the Boston Marathon bombing sooner. Although police had images of the suspects, it took investigators days to identify them. Current facial recognition programs were limited in identifying the low resolution images of the suspects from surveillance cameras.

But Yang said Atheer has developed a better mousetrap. Even if 60 percent of the image is corrupted, Yang said his company’s technology can convert it to an identifiable image.

Yang said the program will be available within two or three years and could help police identify known suspects before they commit another crime.

“In the optimal scenario, they can actually get an alert when they’re patrolling on the streets and they can prevent something from happening before even the event happens,” said Yang.

In addition, the program can be used on surveillance cameras on bridges, roads or buildings to help find missing or kidnapped people.

The 3-D glasses will available next month. The cost: $350 for a model that connects to smart phones and $850 for the standalone version.

All of the programs are still in the early stages of development.

http://sanfrancisco.cbslocal.com/2014/02/04/bay-area-researcher-developing-facial-recognition-glasses-to-help-stop-crime/

Read Full Post | Make a Comment ( None so far )

Senator Session Warns Republicans — Immigration Bill is Bad Politics, Bad Policy and Bad Economics — Videos

Posted on January 30, 2014. Filed under: American History, Blogroll, Business, Climate, College, Communications, Constitution, Crime, Culture, Demographics, Diasters, Economics, Education, Employment, Energy, Federal Government, Federal Government Budget, Food, government, government spending, Health Care, history, Illegal, Immigration, Investments, IRS, Language, Legal, liberty, Life, Links, media, Obamacare, People, Philosophy, Photos, Politics, Press, Private Sector, Psychology, Public Sector, Rants, Raves, Regulations, Resources, Reviews, Security, Tax Policy, Taxes, Technology, Terrorism, Unemployment, Unions, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 201: January 201, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

 Senator Session Warns Republicans — Immigration Bill is Bad Politics, Bad Policy and Bad Economics — Videos

Sen Sessions: Immigration Increases Income Inequality – The Real Story W Gretchen Carlson

Jeff Sessions Elite Group With Special Agendas Behind Legislation That Impacts All America

Jeff Session Mocks Gang Of Eight and Special Interest Forces Immigration Debate

Jeff Sessions: ‘Elite Group With Special Agendas’ Behind Legislation That Impacts All Amer

The entire memo is here and worth a read:

Sessions Warns House GOP: Immigration Bill Is Bad Politics, Bad Policy

Offers a better way forward.

By DANIEL HALPER

Yesterday afternoon, before President Obama’s State of the Union Address, Senator Jeff Sessions’ staff hand-delivered to each Republican member of the House an important memo on the so-called immigration reform bill being debated on Capital Hill. The 3-page document, written by Sessions, argues that pushing the current immigration legislation forward is bad politics, bad policy, and that there’s a better way for Republicans.

Jeff Sessions

Sessions believes House Republicans are at risk of falling into President Obama’s trap. “[A]ccording to news reports, House Republican leaders are instead turning 2014 into a headlong rush towards Gang-of-Eight style ‘immigration reform,'” writes Sessions. “They are reportedly drafting an immigration plan that is uncomfortably similar to a ‘piecemeal’ repackaging of the disastrous Senate plan—and even privately negotiating a final package with Democrat activists before consulting with their own members.”

It’s bad politics, Sessions writes. “In the rush to pass an immigration bill, there has been a near absence of any serious thought about the conditions facing American workers. The last 40 years has been a period of record immigration to the U.S., with the last 10 years seeing more new arrivals than any prior 10- year period in history. This trend has coincided with wage stagnation, enormous growth in welfare programs, and a shrinking workforce participation rate. A sensible, conservative approach would focus on lifting those living here today, both immigrant and native-born, out of poverty and into the middle class—before doubling or tripling the level of immigration into the U.S.

A sensible immigration policy would also listen to the opinion of the American people. Not the opinions of the paid-for consultants trotted out with their agenda-driven polls to GOP member meetings—but the actual, honest opinion of the people who sent us here. There is a reason why none of the corporate-funded ads for amnesty breathe a word about doubling immigration levels. According to Rasmussen Reports, working and middle class Americans strongly oppose large expansions of our already generous immigration system. Those earning under $30,000 prefer a reduction to an increase by an overwhelming 3-1 margin.

And bad policy, the senator from Alabama details. “Coordinating with a small group of the nation’s most powerful special interests, last year President Obama and Senate Democrats forced through an immigration bill which can only be described as a hammer blow to the American middle class. Not only would it grant work permits to millions of illegal immigrants at a time of record joblessness, it would also double the annual flow of new immigrant workers and provide green cards to more than 30 million permanent residents over the next decade. These new workers, mostly lesser-skilled, will compete for jobs in every sector, industry, and occupation in the U.S. economy.”

He adds, “House Republicans, in crafting immigration principles, should reply to the President’s immigration campaign with a simple message: our focus is to help unemployed Americans get back to work—not to grant amnesty or to answer the whims of immigration activists and CEOs. In turn, that message could be joined with a detailed and unifying policy agenda for accomplishing that moral and social objective.”

As for Sessions’ “Better Agenda,” he lays it out very precisely:

The GOP’s 2014 agenda should not be to assist the President in passing his immigration plan. Rather, it should be a consuming focus on restoring hope and opportunity to millions of discouraged workers. The GOP’s 2014 agenda should be a national effort—announced proudly and boldly—to reduce the welfare rolls and get America back to work, including:

  •  More American energy that creates good-paying jobs right here in the U.S.
  •  A more competitive tax and regulatory code that allows U.S. businesses and workers tocompete on a level global playing field
  •  A trade policy that increases U.S. exports and expands domestic manufacturing
  •  An immigration policy that serves the interests of the American people
  •  Converting the welfare office into a job training center
  •  Making government leaner and more accountable to U.S. taxpayers
  •  Restoring economic confidence by continuing our effort to balance the federal budget

An all-out immigration push is inimical to these goals.

Rep. Ryan: GOP Looking at Legal Status, Chance for Citizenship

Rep. Paul Ryan (R., Wis.), a leading GOP advocate for tackling immigration, confirmed Wednesday that Republicans are looking to give illegal immigrants legal status right away, with the chance for a green card—and citizenship—down the line.

Officials familiar with the planning had said as much before. But Mr. Ryan is the first member of the GOP leadership to lay out the Republican vision publicly.

At issue is how to handle more than 11 million people already in the U.S. illegally. Most House Republicans oppose the Senate approach, whereby all qualified illegal immigrants would first win legal status, then have the chance to apply for legal permanent residence (also known as a green card), and then for citizenship. House Republicans call that a “special path to citizenship” that is unavailable to those who followed the law.

House Republicans have been talking since last summer about a different approach, and Mr. Ryan laid it out on Wednesday in an interview with MSNBC’s “The Daily Rundown.”

First, illegal immigrants would be offered a “probationary” status, allowing them to work while the government tightened border security and interior enforcement. Officials have explained that this would allow people to work legally while they wait for permanent legal status. (Officials have explained that this group could revert to illegal status if enforcement benchmarks are not met.)

Mr. Ryan said it would make sure that the Obama administration went ahead with the enforcement provisions. “We want to make sure that we write a law that he can’t avoid,” Mr. Ryan said.

After that, they would be eligible for a “regular work permit,” he said.

“If those things are met, you satisfy the terms of your probation, you’re not on welfare, you pay a fine, you learn English and civics, and the border’s been secured and interior enforcement independently verified, then you can get a regular work permit,” he said.

At that point, this group could apply for green cards using the same system available to any newcomer.

“That’s the kind of process we envision,” he said. “Which is not a special pathway to citizenship and it’s not going to automatically in any way give an undocumented immigrant citizenship.”

Some Democrats and immigration advocates have signaled that they could accept this approach, depending on the details. It’s unclear whether enough Republicans would feel the same. The idea will get its first full airing on Thursday afternoon, when House Republicans are scheduled to discuss immigration at their retreat in Cambridge, Md.

http://blogs.wsj.com/washwire/2014/01/29/rep-ryan-gop-looking-at-legal-status-chance-for-citizenship/

Read Full Post | Make a Comment ( None so far )

President Obama’s State of the Union 2014 Address — The Young and The Jobless Betrayed By Obama — Videos

Posted on January 29, 2014. Filed under: Agriculture, American History, Babies, Blogroll, Business, College, Communications, Constitution, Crime, Culture, Demographics, Diasters, Economics, Education, Employment, Energy, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Food, Foreign Policy, Fraud, government, government spending, Health Care, history, History of Economic Thought, Illegal, Immigration, Inflation, Investments, IRS, Language, Law, Legal, liberty, Life, Links, Literacy, Macroeconomics, media, Narcissism, Obamacare, People, Philosophy, Photos, Politics, Press, Private Sector, Psychology, Public Sector, Quotations, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Taxes, Technology, Terrorism, Unemployment, Unions, Video, War, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014 

Pronk Pops Show 198: January 27, 2014 

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 194-200

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

unemployment_minimum_wage

illegal_immigration

2011-0318-origins

USA-Immigration-by-Decadeimmigration_against_population

Story 1: President Obama’s State of the Union 2014 Address — The Young and The Jobless Betrayed By Obama — Videos

Watch the State of the Union – 2014

State of the Union 2014 Address: President Obama’s Full Speech – New York Times

Obama Urges Immigration Reform | State of the Union 2014

STATE OF THE UNION ADDRESS – OBAMA wants to REBUILD the PEOPLES TRUST

State of the Union 2014 Address: Obama on Raising the Minimum Wage – New York Times

Frank Luntz State of the Union Focus Group on The Kelly File – Jan. 28, 2014

Rand Paul Sotu Reaction. Rand Paul State Of The Union Reaction

Sen. Ted Cruz Reaction to the State of the Union Address

FULL SPEECH: Tea Party Response to 2014 State of the Union – Senator Mike Lee

Gohmert’s Reaction to The 2014 State of the Union

Watch the Republican Response to the 2014 State of the Union

Maximum Rage Over The Minimum Wage

Glenn Beck: Obama Became America’s First Dictator During State of the Union 2014

Read Full Post | Make a Comment ( None so far )

U.S. Senate Select Committee on Intelligence Report — TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI, LIBYA, SEPTEMBER 11-12, 2012 January 1, 2014 — General Carter Ham’s Testimony — Benghazi Was A Terrorist Attack — YouTube Video Story Was A Lie – The White House Is The Liars Lair — Videos

Posted on January 15, 2014. Filed under: American History, Banking, Blogroll, College, Communications, Constitution, Crime, Culture, Diasters, Economics, Education, Employment, Energy, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Fraud, Genocide, government, government spending, history, Law, liberty, Life, Links, media, Monetary Policy, Money, Natural Gas, Oil, People, Philosophy, Photos, Politics, Press, Rants, Raves, Regulations, Reviews, Talk Radio, Technology, Terrorism, Video, War, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , |

general_carter_hamm

The head of the U.S. Africa Command, General Carter Ham, told the House Committee on Armed Services in June 2013, according to recently declassified testimony, that Benghazi was immediately considered an attack.

liar-obama-obamacare

Document

Senate Benghazi report

A Sen­ate in­tel­li­gence com­mit­tee re­port re­leased Wed­nes­day places the blame on State De­part­ment and in­tel­li­gence agen­cies for the 2012 ter­ror­ist at­tack in Benghazi.

Senator Intelligence Committee releases Benghazi attack report The Latest News

[youube=http://www.youtube.com/watch?v=jF5VSfqyuCw]

Benghazi Attack New Senate CMTE Report Criticizes Obama Admin’s Response To Benghazi

Jay Carney Scolds Fox’s Ed Henry For ‘Coloring Outside the Lines’ On Benghazi: ‘Come On, Ed’

The Benghazi Transcripts Don’t Lie

General Carter Ham Quickly became clear, Benghazi a terrorist attack not a demonstration

The Truth About The Murders In Benghazi Attack NYT Under Pressure

Benghazi Scandal Told To Keep Quiet NDA Given To Benghazi Survivors At Memorial

Glenn Beck Why Obama Hid the Truth of Benghazi

Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood

SYRIA Geraldo Rivera: My Sources Say The US Running Libya Arms To Syrian Rebels

SYRIA CNBC: Benghazi Is Not About Libya But An Operation To Put Arms & Men In Syria

SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria

Benghazi Scandal – Susan Rice Defends Benghazi Interviews; Has No Regrets – The Real Story

Fox O’Reilly: Obama Appointing Susan Rice Not Insult to Republicans but Defiance to All Americans

Labrador: Susan Rice Response to Benghazi Attack “Shameful”

Susan Rice Caught Lying About Benghazi – Rep. Trey Gowdy Whistleblower Questioning

R Mc Govern: Beyond Benghazi questioning Susan Rice

LIBYA No US Consulate In Benghazi But CIA Operation, Hired Militia Linked To Extremist

White House Knew at 6:07 PM EST That Ansar Al-Sharia Was Behind the Benghazi Attack

Obama Linked to Benghazi Attack

Obama blames the video in his UN speech

Pres. Obama Speech on 9/11/2012 Terrorist Attacks in Libya

Susan Rice on contending with crisis

Susan Rice Interview on Meet the Press – 9/16/12

Susan Rice ‘This Week’ Interview: U.S. Ambassador to UN Discusses Muslim Protest (09/2012)

Benghazi attack: New report shows the real scandal isn’t what Obama called it

By Ryan Teague Beckwith,

The fight over Benghazi isn’t going away, but the reason for the fight may be changing.

In the days after the deadly attack on a U.S. mission in Libya, the political fight centered on whether President Obama had called it terrorism and whether it was a planned or spontaneous attack.

A new bipartisan Senate report released Wednesday, however, focuses more on the failure of the State Department and U.S. intelligence agencies for not preventing the attack.

The report shows several major problems:

• The State Department did not increase security at its sites despite warnings of possible violence.

• The CIA did not share information about the existence of its outpost with the U.S. military.

• The CIA and the State Department were not working out of the same location.

• Libyans charged with protecting the compound did not do their job.

The report doesn’t touch on the more political aspects of the 2012 attack, which led to the death of U.S. Ambassador Chris Stevens and two others. But six Republican senators added a separate note to the report criticizing the Obama administration for delaying the report and for not being transparent.

“Information has been withheld from the Committee because of the ‘ongoing criminal investigation’ into the attacks, in an apparent effort to shield certain government agencies from congressional oversight or potential embarrassment,” they wrote.

But the fact that their criticisms come up as an addendum to the report instead of in the report itself shows the controversy about what happened at Benghazi is shifting in D.C.

http://www.dailynews.com/general-news/20140115/benghazi-attack-new-report-shows-the-real-scandal-isnt-what-obama-called-it

Pentagon labeled Benghazi a terrorist attack as Obama administration wavered: newly declassified testimony

Gen. Carter Ham’s newly declassified testimony before the House suggests the prospect of an out-of-control demonstration was not raised by Defense officials and that they immediately considered the incident an attack.

By Leslie Larson

The Obama administration was wary to label the 2012 attack on the U.S. Consulate in Benghazi as an act of terrorism but declassified testimony from a top Pentagon official indicates there was little ambiguity among Defense Department players that terrorism was the likely motive.

Former U.S. Ambassador to the U.N. Susan Rice represented the Obama administration in discussing the incident in the aftermath of the attack, suggesting the death of Ambassador Chris Stephens and three Americans came as the result of a protest over an incendiary viral video blasting the prophet Mohammad and was not a preplanned act of terrorism.

Rice appeared on CBS’ “Face the Nation,” CNN’s “State of the Union,” NBC’s “Meet The Press,” “Fox News Sunday” and ABC’s “This Week” on Sep. 16, 2012, to speak on behalf of the President and she repeated the belief that the incident was a “spontaneous” mob uprising and not “a preplanned, premeditated attack.”

“This is not an expression of hostility in the broadest sense toward the United States or to U.S. policy,” she stated.

Republicans pounced on Rice’s analysis, claiming she was placating extremists and not adequately representing the national security threat to the American people.

Now testimony by Gen. Carter Ham, head of AFRICOM at the time of attack, before the House Committee on Armed Services in June 2013 suggests that Defense officials did not raise the prospect of an out-of-control demonstration and immediately deemed the incident an attack.

Ham, whose partially redacted transcript was declassified by the House on Monday, said at the 2013 hearing that he was alerted to the incident 15 minutes after it erupted at 9:42 p.m. Libya Time (3:42 p.m. EST) on Sep. 11, 2012.

“When we saw a rocket-propelled grenade attack, what appeared to be pretty well aimed small arms fire — again, this is all coming second and third hand through unclassified, you know, commercial cellphones for the most part initially. To me, it started to become clear pretty quickly that this was certainly a terrorist attack and not just not something sporadic,” he stated.

Ham served as head of the United States Africa Command, which manages U.S. military operations in Africa. He served in that capacity from March 2011 to April 2013.

He describes how as soon as AFRICOM learned of the attack, the command control repositioned a drone to the consulate to gather intelligence on the ground movements. The unmanned, unarmed surveillance aircraft was ordered to be diverted to the Benghazi site at 9:59 p.m. Libya Time, 17 minutes after the attack.

According to the timeline, at 10:32 p.m. Libya Time, Ham briefed then Defense Secretary Leon Panetta and Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, before they traveled to the White House for a pre-scheduled meeting with Obama, during which they briefed Obama on the situation.

During Ham’s briefing with Panetta and Dempsey, before they left for the White House, he said there was a “peripheral” discussion as to the cause but added, “We knew at that initial meeting, we knew that a U.S. facility had been attacked and was under attack.”

“I am not aware of (a demonstration), sir. It became pretty apparent to me, and I think to most at Africa Command pretty shortly after this attack began, that this was an attack,” he told Rep. Howard P. (Buck) McKeon (R-CA), chairman of the House Armed Services Committee.

“We knew at that point that we had two individuals, Ambassador Stevens and Mr. Smith (a Foreign Service information officer), unaccounted for. And so the focus of our effort at that point was gaining understanding of what the situation was. And then we started very quickly to think about, you know, the possibility of a U.S. ambassador being held hostage in a foreign land and what does that mean,” Ham said during his House testimony.

The testimony includes a reference to an Ops Alert announcing the attack that was received in the White House Situation Room at 10:05 p.m. Libya time, but Ham was not privy to what details the alert included.

Panetta’s testimony before the Senate Armed Services Committee in February similarly stated the early belief that the episode was an attack.

“There was no question in my mind that this was a terrorist attack,” Panetta said of his early assessment of the situation on the ground in Benghazi.

Ham’s version of events could discredit the accounts from some Obama officials who were hesitant to state the security threat posed by the attack.

In particular, Rice has been accused of misleading the American public with her statements that the incident was a protest run amok rather than terrorism.

In May 2013, then Secretary of State Hillary Clinton was also implicated in an ABC News report that claimed a State Department official urged the CIA and White House to avoid describing the event as an act of terrorism in public statements.

susan_rice

Susan Rice went on TV talk shows days after the Benghazi attack to speak on behalf of the President. She repeated the belief that the incident was a ‘spontaneous’ mob uprising and not ‘a preplanned, premeditated attack.’

RELATED: STASI: CBS PUTS LARA LOGAN ON LEAVE BUT FIRED RATHER FOR LESS

Leaked emails show that then State Department spokeswoman Victoria Nuland suggested that a CIA memo on Benghazi not include any reference of links to al-Qaeda and the intelligence warnings in the months preceding the attack.

Nuland wrote in protest to the CIA description, saying it “could be abused by members (of Congress) to beat up on the State Department for not paying attention to warnings,” in an email to the White House and the CIA, according to ABC.

The intelligence memo was the basis for Rice’s public statements in September 2012.

The PR spin to describe the attack as spontaneous rather than pre-planned was seen as a move to protect the State Department from being blamed for not adequately providing security and anticipating the attack.

RELATED: CBS ORDERS LOGAN, PRODUCER TO TAKE LEAVE

White House Press Secretary Jay Carney denied any wrongdoing in Rice’s description of the episode, telling the press in May that Rice didn’t have “hard, concrete evidence” to suggest terrorism.

“It was simply a reflection of we did not, and the intelligence community did not, and others within the administration did not, jump to conclusions about who was responsible before we had an investigation to find out the facts,” he said of Rice’s highly criticized assessment of the situation.

Her behavior in the aftermath of the tragedy displeased Congress and is largely to blame for her failure to be appointed Secretary of State after Clinton’s retirement in Obama’s second term.

Instead, Rice was appointed to the role of National Security adviser.

Clinton has defended Rice and said the root motive for the attack was not an important detail to focus on.

“We had four dead Americans. Was it because of a protest or because of guys out for a walk one night and decided to go kill some Americans? At this point what difference does it make, Senator?” Clinton said at a tense Senate hearing in January 2013.

Clinton, a likely contender in the 2016 White House bid, remains defensive as the “Benghazi stain” continues to haunt her legacy.

Read Full Post | Make a Comment ( None so far )

National Security Agency Invades Computers Using Radio Pathway — Crossing The Line Into Criminal Activity — Videos

Posted on January 14, 2014. Filed under: American History, Blogroll, Communications, Computers, Computers, Constitution, Data Storage, Economics, External Hard Drives, External Hard Drives, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Investments, IRS, Language, Law, liberty, Life, Links, media, Mobile Phones, People, Philosophy, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Regulations, Resources, Reviews, Security, Strategy, Systems, Talk Radio, Taxes, Technology, Television, Terrorism, Unemployment, Video, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , |

prism3

NSA could ‘Spy on offline Computers’ | NSA Infiltrates Personal Computers Worldwide

NY Times: NSA Maps Radio Pathway Into Computers — Even If They Are Offline

Report: NSA Intercepts Computer Deliveries

New York Times – Give Edward Snowden Clemency

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

January 14 2014 Breaking News Barack Obama Gun control & NSA worldwide people control last days news

Enemy of the State

N.S.A. Devises Radio Pathway Into Computers

By and JAN. 14, 2014

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.

Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

No Domestic Use Seen

There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s.

“N.S.A.’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”

Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.

President Obama is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services.

Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.

Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”

“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”

From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.’s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.

A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.

That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.

A Focus on Defense

In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States.

“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.

“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”

If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.

The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australia’s help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit.

Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers. When the Chinese place surveillance software on American computer systems — and they have, on systems like those at the Pentagon and at The Times — the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. Obama laid out America’s complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June.

At that session, Mr. Obama tried to differentiate between conducting surveillance for national security — which the United States argues is legitimate — and conducting it to steal intellectual property.

http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?hp&_r=0

Read Full Post | Make a Comment ( None so far )

Record Low Temperatures in United States As Mother Nature Changes Weather and Climate To Global Cooling — The Coming Ice Age — Need Nuclear Power To Keep Warm and Cool — Videos

Posted on January 6, 2014. Filed under: American History, Biology, Blogroll, Books, Business, Chemistry, Climate, Communications, Computers, Culture, Economics, Foreign Policy, government, government spending, history, Language, Law, liberty, Life, Links, media, Non-Fiction, People, Philosophy, Photos, Physics, Politics, Rants, Raves, Regulations, Resources, Reviews, Science, Security, Technology, Video, Water, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 184-187

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Story 1: Record Low Temperatures in United States As Mother Nature Changes Weather and Climate To Global Cooling — The Coming Ice Age — Need Nuclear Power To Keep Warm and Cool — Videos

TIME_Covers

global_cooling

Time-Global-Cooling

global-cooling_time-magazine

060403_DomCNNL3R1

global_warming

war_global_warming

global_warming_time

global_warming_Time_Cover

time_gw_covers_large

polar_bears

gw-time-magazine-ice-age-global-warming

Bloomberg-Cover1

North America set for record low temperatures as cold snap stretches

Arctic freeze hits US Midwest with record low temperatures

What is an Ice Age?

Climate Change in 12 Minutes – The Skeptic’s Case

The Next Ice Age and The Gulf Stream – Future Focus

In Search Of… The Coming Ice Age (1978) [Global Cooling]

Global Cooling: The Coming Ice Age

Dr Matthew J Penn suggests global cooling – new Little Ice Age

Global Cooling || UN Climate Report Reveals Rate Of Global Warming About Half Average Rate – Dobbs

Global Warming or a New Ice Age: Documentary Film

Related Posts On Pronk Palisades

Roy W. Spencer: Why The Global Warming Agenda Is Wrong–Video

Cap and Trade

Glenn Beck Exposes The Crime of The Century By The Progressive Radical Socialist Democratic Party–The Global Warming Investment Fraud, Political Scam and Science Scandal–Extorting and Robbing The American People–Racketeer Influenced and Corrupt Organizations (RICO) Case!

Jeffrey Miron–Obamaomics–Videos

William A. Sprigg, PhD., an IPCC climate scientist, On “Climategate”–Videos

Richard Lindzen, Roy Spencer, and Fred Singer On The Climate and Global Warming Alarmists and Junk Science Computer Models –Videos

Global Warming Is Caused By Man: The Arrogance of Man–The Wrath Of Mother Nature–

Al Gore Global Warming Hot Head Says The Artic Ice Cap Will Disappear In 5-10-15 Years–Volcanoe Gate–Eruptions Melt Ice and Increase Carbon Dioxide!–Videos

Climategate–A Political Scam, Investment Fraud, and Science Scandal of The Century Exposed–The Progressive Radical Socialist’s Big Lie And Con That Man Is The Cause Of Global Warming Was In Fact Nothing More Than Politicians, Investment Bankers, and Government Scientists Creating Climate Crisis!–

Glenn Beck, John Bolton, and Lord Christopher Monckton On Copenhagen 2009 Treaty, Climate Change and World Government–Videos

Lord Christopher Monckton–Climate Change–Treaty–Videos

“We Can Reverse Climate Change”–President Barack Obama–Liar or Fool–Or Both–You Be The Judge!

Time To Sound The Alarm: Call Your Representative and Senators–Cap and Trade Bill to be Voted in U.S. House on Friday–Kill The Cap and Trade Energy Tax Today! UPDATED

Green Government Gestapo Goons: Global Warming Police Force Invades Your Home And Living in Your Home May Be A Crime!

White House Memo: Carbon Dioxide Is Not A Pollutant and A Cap And Trade Program (Carbon Dioxide Tax) Serious Economic Impact –The Smoking Gun Video!

Save Your Job and Life–Abolish The Environmental Protection Agency!

President Obama–Killer of The American Dream and Market Capitalism–Stop The Radical Socialists Before They Kill You!

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY DEBATE–Videos

Facing Fundamental Facts

Let Them Eat Cake Act: American Elites Killing and Starving The American People

Clinton’s Cap and Trade Tax on The American People for Consuming Electricity and Driving Cars, SUVs and Trucks!

The Heidelberg Appeal: Beware of False Gods and Prophets

Saving The World: The Importance of Getting The Priorities Right

Global Warming/Climate Change

Roy Spencer–The Great Global Warming Blunder: How Mother Nature Fooled the World’s Top Climate Scientists –Videos

CO2 is Life: Global Warming Panel Discussion–Videos

William A. Sprigg, PhD., an IPCC climate scientist, On “Climategate”–Videos

Professor Fred Singer–On Climate Change–Videos

Richard Lindzen, Roy Spencer, and Fred Singer On The Climate and Global Warming Alarmists and Junk Science Computer Models –Videos

Al Gore Global Warming Hot Head Says The Artic Ice Cap Will Disappear In 5-10-15 Years–Volcanoe Gate–Eruptions Melt Ice and Increase Carbon Dioxide!–Videos

Climategate–The Political Scam, Investment Fraud, and Science Scandal of The Century Exposed–The Progressive Radical Socialist’s Big Lie And Con That Man Is The Cause Of Global Warming Was In Fact Nothing More Than Politicians, Investment Bankers, and Government Scientists Creating Climate Crisis!–

Glenn Beck, John Bolton, and Lord Christopher Monckton On Copenhagen 2009 Treaty, Climate Change and World Government–Videos

Lord Christopher Monckton–Climate Change–Treaty–Videos

“We Can Reverse Climate Change”–President Barack Obama–Liar or Fool–Or Both–You Be The Judge!

John Holdren–Science Czar–Videos

John Holdren: Global Warming: What Do We Know and Should Do–Videos

The Obama Depression Has Arrived: 15,000,000 to 25,000,000 Unemployed Americans–Stimulus Package and Bailouts A Failure–400,000 Leave Labor Force In July!

Facing Fundamental Facts

Gore Grilled & Gingrich Gouged–American People Oppose Massive Carbon Cap and Trade Tax Increase–Videos

National Center for Policy Analysis–A Global Warming Primer

Global Warming is The Greatest Hoax, Scam and Disinformation Campaign in History

Global Warming Videos

Global Warming Books

Global Warming Sites

The Heidelberg Appeal: Beware of False Gods and Prophets

Read Full Post | Make a Comment ( None so far )

The Men Who Killed Kennedy — Fact and Fiction — Kennedy Must Be Killed — Videos

Posted on January 6, 2014. Filed under: American History, Blogroll, Books, Business, College, Communications, Crime, Culture, Diasters, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiction, Fiscal Policy, government, government spending, history, Homicide, IRS, Law, liberty, Life, Links, media, Non-Fiction, People, Philosophy, Politics, Press, Psychology, Rants, Raves, Regulations, Resources, Reviews, Talk Radio, Taxes, Technology, Terrorism, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , |

jfkTHE MEN WHO KILLED KENNEDY

kennedy_must_be_killed

Kennedy Must Be Killed

As a young CIA officer, Patrick McCarthy witnesses first-hand JFK’s political immaturity and personal recklessness. When Kennedy is elected in 1960, Patrick fears that Kennedy is unprepared to lead the nation in the height of the Cold War. After the near catastrophic events of the Cuban Missile Crisis, The Patriots, a shadowy group of powerful men, decide to take action before Kennedy’s next political blunder destroys the country. Patrick’s devotion to protecting his country ensnares him in the conspiracy to assassinate the president. After the assassination, Patrick assists in orchestrating the Warren Commission cover-up. He realizes too late that he has been duped by those he trusted. Years later, the House Select Committee on Assassinations reopens the investigation and subpoenas Patrick to testify. Patrick grapples with the decision to reveal the truth-a truth which will re-write American history and destroy the reputations and fortunes of some of America’s most powerful men.

KENNEDY MUST BE KILLED chronicles the life of Patrick McCarthy from the time he arrives in postwar Washington D.C. as an idealistic, patriotic young man to that fateful day on the grassy knoll when he destroys the heart of the nation. It is a story about one man’s love for his country, love for his wife and family, and an act of betrayal that causes him to lose everything that he holds dear.

The Men Who Killed Kennedy: Part 1 The Coup d’Etat

The Men Who Killed Kennedy is a video documentary series by Nigel Turner that originally aired in 1988 in England with two one-hour segments about the John F. Kennedy assassination. The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. Three one-hour segments were added in 1991. A sixth segment was added in 1995. Finally, three additional hourly segments were added by the History Channel in November 2003. The ninth segment, titled “The Guilty Men”, directly implicated Lyndon B. Johnson. Within days, Johnson’s widow, Lady Bird Johnson, more of his surviving associates, ex-President Jimmy Carter, and the lone, living Warren Commission commissioner and ex-President Gerald R. Ford immediately complained to the History Channel. They subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. “The Guilty Men” segment was completely withdrawn by the History Channel. Also during the series, French prisoner Christian David named Lucien Sarti as one of three French criminals hired to carry out the assassination of Kennedy, when he was interviewed by author Anthony Summers. This claim is one of the most strongly investigated theories presented on the show.

The Men Who Killed Kennedy: Part 2 The Forces of Darkness

The Men Who Killed Kennedy: Part 3 The Cover-Up

The Men Who Killed Kennedy: Part 4 The Patsy

The Men Who Killed Kennedy, Part 5

The Men Who Killed Kennedy, Part 6

The Men Who Killed Kennedy – Part 7 – The Smoking Guns

The Men Who Killed Kennedy – Part 8 – The Love Affair

The Men Who Killed Kennedy – Part 9 – The Guilty Men

The Men Who Killed Kennedy is a video documentary series by Nigel Turner that originally aired in 1988 in England with two one-hour segments about the John F. Kennedy assassination. The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. Three one-hour segments were added in 1991. A sixth segment was added in 1995. Finally, three additional hourly segments were added by the History Channel in November 2003. The ninth segment, titled “The Guilty Men”, directly implicated Lyndon B. Johnson. Within days, Johnson’s widow, Lady Bird Johnson, more of his surviving associates, ex-President Jimmy Carter, and the lone, living Warren Commission commissioner and ex-President Gerald R. Ford immediately complained to the History Channel. They subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. “The Guilty Men” segment was completely withdrawn by the History Channel. Also during the series, French prisoner Christian David named Lucien Sarti as one of three French criminals hired to carry out the assassination of Kennedy, when he was interviewed by author Anthony Summers. This claim is one of the most strongly investigated theories presented on the show.

  • The Men Who Killed Kennedy

The Men Who Killed Kennedy is a United Kingdom ITV video documentary series by Nigel Turner about the John F. Kennedy assassination. Originally broadcast in 1988 in two parts (with a subsequent studio discussion), it was rebroadcast in 1991 re-edited to three parts with additional material, and a fourth episode added in 1995. The addition of three further episodes in 2003 caused great controversy, particularly in the final episode implicating Lyndon Johnson, and the withdrawal of these additional episodes.

Broadcast history and critical response

1988 to 2003

The Men Who Killed Kennedy began with two 50-minute segments originally aired on 25 October 1988 in the United Kingdom, entitled simply Part One and Part Two. The programmes were produced by Central Television for the ITV network, and was followed three weeks later with a studio discussion on the issues titled The Story Continues, chaired by broadcaster Peter Sissons.

The original broadcast was controversial in Britain. The episodes identified three men as the assassins of Kennedy as three men, deceased drug trafficker Lucien Sarti and two living men. All three were later revealed to have strong alibis: Sarti was undergoing medical treatment in France, another was in prison at the time, and the third had been in the French Navy. One of the two living men threatened to sue, and Central Television’s own subsequent investigation into the allegations revealed they were “total nonsense”. Turner justified his failure to interview one of the accused on the grounds that the individual was “too dangerous”. Turner was censured by the British Parliament. An unsuccessful attempt was made to revoke the franchise of Central Television under British laws against broadcasting inaccuracies, but the Independent Broadcasting Authority did force Central Television to produce a third episode dedicated to the false allegations, aired November 16, 1988, which was later referred to as a “studio crucifixion” of Turner and his inaccuracies. This was the first time the IBA had taken such an action.[2]

The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. In 1989, the series was nominated for a Flaherty Documentary Award. In November 1991, the series was re-edited with additional material and divided into three 50-minute programmes, which were also shown by ITV on consecutive nights. An additional episode appeared in 1995. The series typically aired in November every year and from time to time during the year.

2003 onwards

In November 2003, three additional segments (“The Final Chapter”) were added by the History Channel, entitled, respectively, “The Smoking Guns”, “The Love Affair” and “The Guilty Men”.

“The Love Affair” focussed on the claims of Judyth Vary Baker to have been Lee Harvey Oswald‘s lover in 1963, and to have worked with Oswald and others to develop a cancer-causing biological weapon as part of a CIA plan to assassinate Fidel Castro.[3][4]

The third of these additional segments – “The Guilty Men” – was based substantially on the book Blood, Money & Power: How L.B.J. Killed J.F.K by Barr McClellan.[5] The book and the episode directly implicates former U. S. President Lyndon B. Johnson (LBJ) and its airing in 2003 created an outcry among Johnson’s surviving associates, including Johnson’s widow, Lady Bird Johnson, journalistBill MoyersJack Valenti (longtime president of the Motion Picture Association of America), Jimmy Carter, and the last-living (at the time of the outcry) Warren Commission member Gerald R. Ford. These Johnson supporters lodged complaints of libel with the History Channel, and subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. The History Channel responded by assembling a panel of three historians, Robert DallekStanley Kutler, and Thomas Sugrue. On a program aired April 7, 2004, titles “The Guilty Man: A Historical Review,” the panel agreed that the documentary was not credible and should not have aired. The History Channel issued a statement saying, in part, “The History Channel recognizes that ‘The Guilty Men’ failed to offer viewers context and perspective, and fell short of the high standards that the network sets for itself. The History Channel apologizes to its viewers and to Mrs. Johnson and her family for airing the show.” The channel said it would not show the episode again. Author Barr McClellan, on whose work the episode was largely based, complained that he had tried to cooperate with the reviewing historians to discuss his evidence with them, and had been ignored.[5][6]

Malcolm Liggett, a retired economics professor, sued A&E regarding the episode “The Smoking Guns,” which claimed Liggett was involved in a conspiracy to kill Kennedy. Liggett and A&E reached a settlement, which required that a letter by Liggett be read on the show History Center.[7]

David Browne of Entertainment Weekly described the documentary as “well-researched, but still farfetched”.[8] Addressing “The Guilty Men” episode, Dorothy Rabinowitz of The Wall Street Journal called it a “primitive piece of conspiracy-mongering” and wrote that “…the documentary’s ever deepening mess of charges and motives is never less than clear about its main point — that Lyndon Johnson personally arranged the murder not only of the president, but also seven other people, including his own sister.”[9]

In a letter to the chief executives of the three parent companies of A & E Networks, — Victor F. Ganzi of the Hearst CorporationMichael D. Eisner of Disney, and Robert C. Wrightof NBC — former United States President Gerald Ford described the allegations as “the most damaging accusations ever made against a former vice president and president in American history.”[10]

Episode list

The first two episodes were followed by “The Story Continues” (16 November 1988), a critical studio discussion about them. The final episode was followed by a critical review, “The Guilty Men: A Historical Review.” (7 April 2004).

  1. “The Coup D’Etat” (25 October 1988)
  2. “The Forces Of Darkness” (25 October 1988)
  3. “The Cover-Up” (20 November 1991)
  4. “The Patsy” (21 November 1991)
  5. “The Witnesses” (21 November 1991)
  6. “The Truth Shall Set You Free” (1995)
  7. “The Smoking Guns” (2003)
  8. “The Love Affair” (2003)
  9. “The Guilty Men” (2003)

References

  1. Jump up^ WorldCatThe men who killed Kennedy : the definitive account of American history’s most controversial mystery
  2. Jump up^ Holland, Max“The British JFK Producer Who Brought Shame on the History Channel”. Kennedy Assassination Home Page. Retrieved 6 December 2013.
  3. Jump up^ John C. McAdamsShould We Believe Judyth Baker?, Marquette University
  4. Jump up^ Judyth Vary Baker, “Judyth Baker Responds to Critics”, archived at John C. McAdams‘ website at http://mcadams.posc.mu.edu/sboard.htm
  5. Jump up to:a b Reuters, 12 April 2004, “History Channel Pulls JFK Conspiracy Show”
  6. Jump up^ Bruce Weber, “History Channel Apologizes“, New York Times, April 7, 2004
  7. Jump up^ Grace Murphy, “History Channel, Vero man reach settlement in JFK allegations”, Fort Pierce Tribune, March 19, 2005
  8. Jump up^ Browne, David (November 20, 1992). “The Men Who Killed Kennedy (1992)”EW.com. Entertainment Weekly. Retrieved January 28, 2013.
  9. Jump up^ Rabinowitz, Dorothy (February 19, 2004). “Character Assassination”The Wall Street Journal. Retrieved February 4, 2013.
  10. Jump up^ Weber, Bruce (February 5, 2004). “Moyers and Others Want History Channel Inquiry Over Film That Accuses Johnson”The New York Times (New York). Retrieved March 7, 2013.

http://en.wikipedia.org/wiki/The_Men_Who_Killed_Kennedy

Read Full Post | Make a Comment ( None so far )

Senator Rand Paul Filing Class-Action Lawsuit Against National Security Agency — Videos

Posted on January 4, 2014. Filed under: American History, Blogroll, College, Communications, Computers, Computers, Constitution, Crime, Economics, Education, Employment, External Hard Drives, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government spending, Health Care, history, Inflation, Investments, IRS, Language, Law, liberty, Life, Links, Literacy, Philosophy, Politics, Rants, Raves, Resources, Reviews, Talk Radio, Tax Policy, Taxes, Technology, Terrorism, Video, Wealth, Wisdom, Writing | Tags: , , , , , , |

Sen. Rand Paul Filing Class-Action Lawsuit Against NSA

Rand Paul – Class-Action Lawsuit Against Obama

 

Related Posts On Pronk Palisades

National Security Agency (NSA)  — Thin Thread — Trailblazer — The Program — Stellar Wind: PRISM — NUCLEON — Mainstay — Marina — EVILOLIVE — FASCIA —  XKeyscore — Co-Traveller — Photos — Slides — Videos

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Vide

Read Full Post | Make a Comment ( None so far )

National Security Agency (NSA) — Thin Thread — Trailblazer — The Program — Stellar Wind: PRISM — NUCLEON — Mainstay — Marina — EVILOLIVE — FASCIA — XKeyscore — Co-Traveller — Photos — Slides — Videos

Posted on January 4, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Computers, Constitution, Crime, Economics, Education, Employment, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Inflation, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Photos, Politics, Psychology, Raves, Regulations, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Technology, Television, Terrorism, Unemployment, Video, War, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , |

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Published on Dec 30, 2013

Through a PRISM, Darkly
Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.

Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

Glenn Becks “SURVEILLANCE STATE”

Inside the NSA

Ed Snowden, NSA, and Fairy Tales

AT&T Spying On Internet Traffic

For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”

NSA Whistle-Blower Tells All – Op-Docs: The Program

The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Benny – The Government is Profiling You (The NSA is Spying on You)

‘After 9/11 NSA had secret deal with White House’

The story of Whistleblower Thomas Drake

Whistleblowers, Part Two: Thomas Drake

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Meet Edward Snowden: NSA PRISM Whistleblower

The Truth About Edward Snowden

N.S.A. Spying: Why Does It Matter?

Inside The NSA~Americas Cyber Secrets

NSA Whistleblower Exposes Obama’s Dragnet

AT&T whistleblower against immunity for Bush spy program-1/2

AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program

The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.

AT&T whistleblower against immunity for Bush spy program-2/2

Enemy Of The State 1998 (1080p) (Full movie)

Background Articles and Videos

Stellar Wind

Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]

The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]

In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

PRISM

PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.

A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]

According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]

History

Slide showing that much of the world’s communications flow through the US

Details of information collected via PRISM

PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]

PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]

The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]

Response from companies

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]

Initial Public Statements

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]

Slide listing companies and the date that PRISM collection began

  • Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
  • Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
  • Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
  • Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
  • Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
  • Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]

In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13] The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]

“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]

Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]

The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]

While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]

Post-PRISM Transparency Reports

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000″ user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]

Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]

Response from United States government

Executive branch

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]

Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]

On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]

The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]

The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]

In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]

Legislative branch

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

  • June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

  • June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
  • June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
  • June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

  • June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]

Representative John Boehner (R-OH), Speaker of the House of Representatives

  • June 11 “He’s a traitor”[50] (referring to Edward Snowden)

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

  • June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

  • June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
  • June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]

Senator Mark Udall (D-CO)

  • June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]

Representative Todd Rokita (R-IN)

  • June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]

Senator Rand Paul (R-KY)

  • June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
  • June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]

Representative Luis Gutierrez (D-IL)

  • June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]

Judicial branch

The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.

Applicable law and practice

On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]

After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.

If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]

If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]

Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]

The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]

Involvement of other countries

Australia

The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]

Canada

Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]

Germany

Germany did not receive any raw PRISM data, according to a Reuters report.[59]

Israel

Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.

New Zealand

In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]

United Kingdom

In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]

Domestic response

Unbalanced scales.svg
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)

The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]

Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]

In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]

In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]

The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]

On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]

International response

Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]

Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]

Protests at Checkpoint Charlie in Berlin

The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]

The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]

William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]

Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]

Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]

Russia has offered to consider an asylum request from Edward Snowden.[91]

Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]

Related government Internet surveillance programs

A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]

A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]

http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29

ThinThread

ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]

http://en.wikipedia.org/wiki/ThinThread

Trailblazer

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.

NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]

Background

Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]

The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing

According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]

In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]

Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]

http://www.youtube.com/watch?v=1AXwwSq_me4

Boundless Informant

Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.

Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]

History

Slide showing that much of the world’s communications flow through the US.

Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]

NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]

Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]

Technology

According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]

Legality and FISA Amendments Act of 2008

The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]

The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]

Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]

http://en.wikipedia.org/wiki/Boundless_Informant

ECHELON

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]

The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Organization

UKUSA Community
Map of UKUSA Community countries with Ireland

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

  • the Government Communications Headquarters of the United Kingdom,
  • the National Security Agency of the United States,
  • the Communications Security Establishment of Canada,
  • the Defence Signals Directorate of Australia, and
  • the Government Communications Security Bureau of New Zealand.
  • the National SIGINT Organisation (NSO) of The Netherlands

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]

Controversy

See also: Industrial espionage

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]

Name

The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

  • Hong Kong (since closed)
  • Australian Defence Satellite Communications Station (Geraldton, Western Australia)
  • Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
  • Misawa Air Base (Japan) Map
  • GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
  • Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
  • Sugar Grove (West Virginia, U.S.) Map
  • Yakima Training Center (Washington, U.S.) Map
  • GCSB Waihopai (New Zealand)
  • GCSB Tangimoana (New Zealand)
  • CFS Leitrim (Ontario, Canada)
  • Teufelsberg (Berlin, Germany) (closed 1992)

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:

  • Ayios Nikolaos (Cyprus – U.K.)
  • Bad Aibling Station (Bad Aibling, Germany – U.S.)
    • relocated to Griesheim in 2004[19]
    • deactivated in 2008[20]
  • Buckley Air Force Base (Aurora, Colorado)
  • Fort Gordon (Georgia, U.S.)
  • Gander (Newfoundland & Labrador, Canada)
  • Guam (Pacific Ocean, U.S.)
  • Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
  • Lackland Air Force Base, Medina Annex (San Antonio, Texas)

http://en.wikipedia.org/wiki/ECHELON

Room 641A

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]

Description

Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]

The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]

The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.

Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.

Lawsuit

Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]

More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.

Main article: Hepting v. AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.

http://en.wikipedia.org/wiki/Room_641A

List of government surveillance projects for the United States

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.

http://en.wikipedia.org/wiki/List_of_government_surveillance_projects

Related Posts On Pronk Palisades

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

Breaking Bob Grant Dead At 84 –Talk Radio Path Maker — Rest In Peace — Videos

Posted on January 2, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Culture, Economics, Education, Employment, Entertainment, Fiscal Policy, Heroes, history, Language, Law, liberty, Life, Links, Literacy, media, People, Philosophy, Photos, Politics, Press, Psychology, Radio, Radio, Rants, Raves, Regulations, Reviews, Security, Talk Radio, Unemployment, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , |

bob_grantbob_grant

‘Bob Grant has died. Born March 14, 1929 he was an American radio host whose real name was Robert Ciro Gigante. Grant, who lived in Tom’s River, N.J., died on New Year’s Eve.He was a veteran of radio broadcasting in New York City, and Grant is considered to be a pioneer of the “conservative” and “confrontational” talk radio format who influenced many people after him.He began working in radio in the 1940s at WBBM in Chicago as a radio personality and television talk show host at KNX in Los Angeles, and as an actor. During the Korean War he served in the Naval Reserve. He became sports director at KABC in Los Angeles, where after some substitute appearances he inherited the talk show of Joe Pyne in 1964 and began to build a huge following. Grant hosted three shows on KABC in 1964 titled, “Open Line,” “Night Line,” and “Sunday Line.” Many people were avid listeners of his show and it helped the popularity of the format.He was the father of conservative talkradio.He was known to say: “Good afternoon, Ladies and Gentlemen, and welcome to another hour of the free and open exchange of ideas and opinions in the belief that as American citizens you have the right to hear, and to be heard.”

Bob Grant on “Hannity & Colmes” discusses retiring 1.16.2006 (Sean Hannity)

Bob Grant Celebrates 40 Years on New York Radio

 

Bob Grant Interview: Media Coverage of Obama “Absolutely Sca

Bob Grant’s Emotional Monologue 9.23.2012

Bob Grant 40th Anniversary in New York City Show on WABC 9.20.2010

Howard Stern calls into Bob Grant’s last WOR show 1.13.2006

Bob Grant in “the History of Talk Radio” documentary 1996

Rush Limbaugh Roasts Bob Grant – September 15, 1991

Bob Grant makes fun of Michael Savage hyping his books

Bob Grant on filling in for Michael Savage

The Best of Bob Grant-2000’s Pt 1

The Best of Bob Grant 2007-2012 Pt 2

Bob Grant on CBS News discussing Rush Limbaugh’s prescription drug addiction 10.11.2003

Bob Grant Show-Day after September 11, 2001 (9.12.2001)

Bob Grant attacks ‘the Tea Party’ 1.6.2013

Bob Grant on taking over Joe Pyne’s Show the night of the Kennedy Assassination

WABC 77 New York – Bob Grant GAG (Get At Grant) Hour- Dec 1988

Bob Grant, Father of Conservative Talk Radio, Dead at 84

Veteran New York radio personality Bob Grant — widely credited with inventing the conservative talk-radio format — has died at the age of 84.

Grant, who lived in Tom’s River, N.J., passed away on New Year’s Eve, according to the Branchburg Funeral Home, which is handling the arrangements.

Grant began his career as a controversial talk show host in 1970, when he joined WMCA in New York and quickly bucked the liberal slant of many of the other hosts.

The gravel-voiced talker’s in-your-face opinions and regular telling off of callers often got him in hot water.

He opened his show stating: “Good afternoon, Ladies and Gentlemen, and welcome to another hour of the free and open exchange of ideas and opinions in the belief that as American citizens you have the right to hear, and to be heard.”

He slammed uncouth politicians as “craven bootlickers.” He once said of the Second Coming of Jesus: “He’s not coming back. Look, I don’t believe he’s coming back. I think that’s a myth and I say it.”

Grant routinely signed off with the chant “Get Gaddafi,” in a taunt at Libyan dictator Muammar al-Gaddafi.

In 1973, he called Rep. Benjamin Rosenthal of New York a coward for cancelling an appearance on his show, leading Rosenthal to complain to the Federal Communications Commission.

The case went to the U.S. Court of Appeals and was ultimately thrown out after a judge decided Grant had offered Rosenthal equal time.

Grant left WMCA in 1977 to work for WOR, but was fired for controversial remarks he made in 1979.

“A caller phoned in to the show saying he was upset with a woman who was blaming the police for what happened to her sons. [This woman] was the public relations director or community relations director of WCBS newsradio,” he said.

“I stupidly asked the caller if he knew how she got that job. The caller said he didn’t know and I promptly and arrogantly said, “I will tell you how. She passed the gynecological and pigmentation test — that’s how! … WOR was forced to fire me even though I had given the radio giant the biggest overnight ratings they ever had.”

Grant returned to WMCA in 1980, where his producer was Steve Malzberg, now host of “The Steve Malzberg Show” on Newsmax TV.

“I had grown up listening to Bob Grant so this was a dream come true,” Malzberg said.

“He was an extremely nice guy, a wonderful and funny pioneer who overcame many attempts to turn him into a villain. He persevered and did what he love until the very end.”

In 1984, Grant was hired by WABC, which had switched formats from Top 40 music to all-talk. With its strong signal, Grant was heard by millions of listener in the Northeastern United States.

The station began billing him as “America’s most listened to talk radio personality.”

But Grant got in trouble with WABC in 1996 when he made a mean-spirited crack about Commerce Secretary Ron Brown whose plane had crashed in Croatia.

“My hunch is that [Brown] is the one survivor. I just have that hunch. Maybe it’s because, at heart, I’m a pessimist,” Grant said. Brown, along with 34 others on board, had been killed.

Grant then moved back to WOR and his show became nationally syndicated. His WOR run ended in 2006.

In 2007, he returned to WABC where he stayed for a year and a half, before leaving to host an Internet radio show titled “Straight Ahead!” He again returned to WABC in Sept. 2009, to host a Sunday talk show, retiring last summer because of poor health.

Grant’s family asks that memorial contributions may be made in his memory can be made to the Young America’s Foundation, 110 Elden Street, Herndon, VA 20170 or the New York Police and Fire Widows’ & Childrens’ Benefit Fund, Inc., 767 Fifth Ave., 2614C, New York, NY 10153.

http://www.newsmax.com/Newsfront/Grant-radio-obituary-conservative/2014/01/02/id/544851

Bob Grant

Bob Grant (March 14, 1929 – December 31, 2013) was an American radio host whose real name was Robert Ciro Gigante. A veteran of broadcasting in New York City, Grant is considered a pioneer of the “conservative” and “confrontational” talk radio format.[2][3][4]

Career[edit]

Early work[edit]

Grant graduated from the University of Illinois at Urbana-Champaign with a degree in journalism. He began working in radio in the 1940s at the news department at WBBM (AM) in Chicago, as a radio personality and television talk show host at KNX (AM) in Los Angeles, and as an actor. During the Korean War, he served in the Naval Reserve. [5] He later became sports director at KABC (AM) in Los Angeles, where after some substitute appearances he inherited the talk show of early controversialist Joe Pyne in 1964 and began to build a following. Grant hosted three shows on KABC (AM) in 1964 titled, “Open Line,” “Night Line,” and “Sunday Line.”[6]

Move to New York City (WMCA: 1970–1977)[edit]

Grant came to New York in 1970, where he hosted a talk show on WMCA as the “house conservative”, distinctively out of fashion with both the times and with some countercultural WMCA personalities, including Alex Bennett. His offbeat but combative style (along with Fairness Doctrine requirements of the era) won him seven years on WMCA, with a growing and loyal audience. His sign-off for many years was “Get Gaddafi”, which meant remove Muammar al-Gaddafi, the dictator of Libya, whose anti-Israeli stance was in opposition to Grant’s pro-Israeli feelings.

On March 8, 1973, Grant had scheduled New York Rep. Benjamin S. Rosenthal, who was leading a boycott of meat. Grant later learned that Rosenthal would not appear on his show, and in a discussion with a caller, Grant referred to Rosenthal as a “coward.” Rosenthal then filed a complaint with the F.C.C., and the issue went all the way up to the United States Court of Appeals for the District of Columbia Circuit in Straus Communications v. Federal Communications Commission, United States Court of Appeals for the District of Columbia Circuit, January 16, 1976, Wright, J.[7][8][9] The appeals court ultimately ruled in favor of WMCA and Grant, due to the fact that Grant offered the congressman an invitation to appear on his show, granting Rosenthal equal time.[9]

One of Grant’s most memorable regular callers was Ms. Trivia, who aired her “Beef of the Week”, a series of seemingly trivial complaints. Ms. Trivia was Grant’s guest at a Halloween Festival dinner held at Lauritano’s Restaurant in theBronx, where a young Ms. Trivia, not long out of her teens, revealed herself for the first time to a startled radio audience, many who had expected and assumed, based upon her articulation and intonation, that she would be an elderly, prudish woman. Instead, a statuesque and fashionable Ms. Trivia, wearing an elaborate Victorian costume, was the surprise guest seated next to Grant at the dais table along with several political figures from New York. The following day the majority of calls to the show were for the purpose of obtaining information about the mysterious Mm. Trivia, with Grant in his typical manner finally in exasperation hanging up on the callers, shouting, “THIS IS NOT Mm. TRIVIA’S SHOW!”[10]

A linguistic “hoax” trivia question originated on Grant’s WMCA show in 1975, “There are three words in the English language that end in -gry. Two of them are angry and hungry. What is the third?”[11] While at WMCA, Grant attracted attention in 1975 from a commentary he recorded titled, “How Long Will You Stand Aside.”[12] Grant also released an LP record in 1977 titled, “Let’s Be Heard,” which was a recording of a speech Grant gave before a synagogue in New York. Grant left WMCA in 1977.

WOR AND WWDB[edit]

In 1979, radio host Barry Farber, fought with WMCA station manager Ellen Straus to rehire Grant. Farber broadcast during the 4-7 P.M. weekday timeslot on WMCA. When asked by Straus at a meeting if Farber was willing to give up his airtime for Grant, Farber replied, “Yes he can have my time. I’d rather he have my time than no time at all.”[13] While away from WMCA, Grant went up the dial to New York’s WOR (AM) for a time, where he was fired for controversial remarks. Grant describes the remarks that got him fired from WOR:

I had done my nightly show on WOR and a caller phoned in to the show saying he was upset with a woman who was blaming the police for what happened to her sons. I had read the story the man was referring to and noted that the woman, who was very angry with the police, was the public relations director or community relations director of WCBS newsradio. I stupidly asked the caller if he knew how she got that job. The caller said he didn’t know and I promptly and arrogantly said, “I will tell you how. She passed the gynecological and pigmentation test — that’s how!” Not only did that turn off Roger Ailes, but WOR was forced to fire me even though I had given the radio giant the biggest overnight ratings they ever had.[14]

After being fired from WOR, Grant worked at WWDB in Philadelphia. Grant had gone back to WMCA after working at WWDB in Philadelphia. It was reported upon Grant’s departure that his ratings had slipped to number 23 out of 39 shows during the 4-7 P.M. weekday timeslot.[15]

WABC (1984–1996)[edit]

In 1984, WABC (AM) in New York City hired Grant to join their new talk station. He first hosted a show from 9-11pm, before moving to the 3-6pm afternoon time slot. The Bob Grant Show consistently dominated the ratings in the highly competitive afternoon drive time slot in New York City and at one point the radio station aired recorded promos announcing him as “America’s most listened to talk radio personality.” The gravel-voiced Grant reminded listeners during the daily introduction that the “program was unscripted and unrehearsed”.

Grant’s long stay at WABC ended when he was fired for a remark about the April 3, 1996 airplane crash involving Commerce Secretary Ron Brown. Grant remarked to caller named, Carl of Oyster Bay (Carl Limbacher, later of NewsMaxfame), “My hunch is that [Brown] is the one survivor. I just have that hunch. Maybe it’s because, at heart, I’m a pessimist.” When Brown was found dead, Grant’s comments were widely criticized, and several weeks later, after a media campaign, his contract was terminated.[16]

Return to WOR (1996–2006)[edit]

After being fired, Grant moved down the dial to WOR to host his show in the same afternoon drive-time slot. Grant’s age began to show while broadcasting at WOR. He was less engaging with the callers, and not as energetic during his broadcasts. For a time, the Bob Grant show went into national syndication, but has been a local only show since 2001. Grant and his WABC replacement Sean Hannity would sometimes throw jabs at each other. Hannity defeated Grant in the ratings from 2001–2006.[17][18]

Grant’s WOR run ended on January 13, 2006. Grant’s ratings were not to blame for his departure, according to the New York Post, which mentioned that the decision was reached because the station’s other shows had niche audiences to garner more advertising dollars.[19] On January 16, 2006, shortly after Grant’s last WOR show, Grant appeared on Sean Hannity’s radio show and TV program Hannity & Colmes, where his former competitor paid tribute to him. Having left his options open for “an offer he cannot refuse,” Grant returned to WOR in February 2006, doing one minute “Straight Ahead” commentaries which aired twice daily after news broadcasts until September 2006. On September 8, 2006 Grant again appeared on Hannity’s show to provide a post-retirement update, which led to premature rumors that Grant was returning to WABC.[20][21] Grant then made various isolated radio appearances. He appeared as a guest host on WFNY (now WXRK) on December 7, 2006, and was interviewed by attorney Anthony Macri for Macri’s WOR show on February 24, 2007.

Post-Retirement: Return to WABC and Internet broadcasting[edit]

His guest appearances became more frequent beginning in July 2007. On July 7, 2007, he guest hosted for John R. Gambling, and appeared on Mark Levin’s show (which is networked from WABC) on July 10. Grant, guest hosted for Jerry Agar on July 9, 10, 11 and re-appeared as a fill-in host again for John Gambling on August 20 and 21. Then, on August 22, while appearing on Hannity’s show, he announced that he was returning as a regular host to WABC, in the 8–10 PM slot that at the time was filled by Agar. It would later be revealed, on what was Agar’s final show a few hours later, that he would be starting effective immediately, as Grant took over the final segments of the show. His first full show on ABC since 1996 was on August 23. The story of Grant’s return, as reported by the New York Daily News, had been discovered only a couple of hours before Grant’s official announcement.

Grant’s stint lasted less than a year and a half, until his regular nightly show was pulled by WABC in late November 2008 as part of a programming shuffle stemming from the debut of Curtis Sliwa’s national show, and later Mark Levin’s show expanding to three hours, leaving no room for Grant.[22] Grant did his most recent AM radio work as guest host filling in for Michael Savage on January 21, 2009, Mark Levin on March 23, 2009, and Sean Hannity on July 31, 2009.[22]

During the week of July 6, 2009 Grant began hosting an Internet radio show titled Straight Ahead! which originally ran Monday through Friday from 8 to 9 a.m. Eastern time on UBATV.com.[23] As a webcast, the show differed from Grant’s radio shows, in that the viewer watched Grant as he did his broadcast. The first two months of Straight Ahead! were from inside Grant’s home, and were run with technical assistance from independent filmmaker Ryan O’Leary.[24]New York radio personalities Richard Bey and Jay Diamond were also brought on board to broadcast their own one hour shows. Grant mentioned that he did not get paid to do the UBATV show, but believes that Internet broadcasting is the future.[25][26]

Beginning in September 2009, Grant reduced Straight Ahead! from five days a week down to two (Mondays and Wednesdays from 10 to 11 a.m Eastern time). Grant also moved the show from his home to a professional studio. Due to a low number of callers to the show, Grant usually interviewed only guests for the hour. On January 13, 2010, Grant did his last UBATV show. Grant’s last UBATV show and his last WOR show both fell on the date of January 13.

On September 13, 2009, Grant returned to WABC for a third stint at the station, doing a weekly Sunday talk show from 12pm to 2pm. Grant’s return to AM broadcasting has allowed him to continue interacting with his fan base through greater listenership and participation than his previous internet radio show provided. At the close of his first show, he expressly thanked the management of the station for “inviting him back” and said he looked forward to continuing this joint venture every week for the foreseeable future. Grant issued a statement in October 2012 that his October 7 broadcast would be his last, but then rescinded that message after the show, labeling it a “mistake” and an attempt to grab attention. He then took off a short time for medical work, and when he returned to the air, it was for a shortened 1pm to 2pm Sunday show (current as of November 2012). Bob Grant’s last show on WABC was July 28, 2013 when he retired due to ill health.

Grant also prepares weekly columns for his website, www.BobGrantOnline.com. The site was originally sponsored by NewsMax. As of February 19, 2013, Grant has discontinued his editorials.

Characteristics of Grant’s radio shows[edit]

This section of a biography of a living person does not include any references or sources. Please help by adding reliable sources. Contentious material about living people that is unsourced or poorly sourced must be removed immediately(January 2010)

Grant’s political philosophy generally followed American conservatism, but with some lurches into populism, libertarianism, conspiracy theory, and unorthodoxy (such as being pro-choice and anti-Flag Desecration Amendment). Grant was known for using a number of catchphrases on his show, such as “You’re a fake, a phony, and a fraud!”,[27] “Straight ahead”, “Get off my phone!”, “Anything and everything is grist for our ever-grinding mill”, and his closing line, “Your influence counts. Use it.” His opening line was used as the title of his 1996 book, Let’s Be Heard, a title representing an abbreviated version of his original opener, “And let’s be heard! Good afternoon, Ladies and Gentlemen, and welcome to another hour of the free and open exchange of ideas and opinions in the belief that as American citizens you have the right to hear, and to be heard.” Before his daily monologue, Grant would ask the rhetorical question, “And what’s on your mind today, hmmm?”, and would sometimes call women “chickie-poos”. He occasionally referred to women as “broads” and when certain undesirable, lacklustre or contentious women were combative he referenced them as “several miles of bad road”. One of his favorite put-downs was to refer to someone as a “cacazote”. During the 1988 presidential bid of Michael Dukakis, this term took on a natural segue as Grant often referred to him as “Dukacazote”. He also referred to feckless politicians as “craven bootlickers,” especially when elected officials would cave in to political pressures, and Grant accused them of “folding like a cheap camera”. Due to his Italian heritage, Grant frequently used Italian slang words to describe callers or other individuals calling them gavones (crude or uncultured persons), stunads (stupid, thick, dense) or chiacchorones (persons who talk excessively). During his second stint at WOR, Grant often closed his show with the phrase, “Somebody’s got to say these things, it has to be me!” As a resident of Manalapan, New Jersey in the late-1990s, he considered running for statewide office, but eventually decided against it.

Grant occasionally made on-air reference to an always unheard, ethereal Beatrice-like presence à la Dante’s Paradiso section in The Divine Comedy, “The Lady Josephine”, to whom he constantly paid obeisance. His son, Jeff Grant, a traffic reporter with a different station, would call in occasionally. Grant made frequent references to the REO Diner in Woodbridge, New Jersey, his regular haunt.

For many years Grant closed each show with the exclamation, “Get Khadafy!” This was apparently an allusion to the practice of Roman statesman Cato the Elder ending his speeches with a call for the destruction of Carthage even if he had not been discussing Carthage in the speech. When Khadafy was finally killed in the 2012 Libyan civil war, Grant praised the decision.

When once asked by the caller George the Atheist whether he believed in God, Grant replied, “What if I tell you, George, that sometimes I do and sometimes I don’t?” On his July 21, 2005 broadcast, Grant, a baptized and raised Roman Catholic, unequivocally stated to the same caller his opinion on the Second Coming of Jesus: “He’s not coming back. Look, I don’t believe he’s coming back. I think that’s a myth and I say it. I don’t trumpet it but if a person asks — and you know one thing for sure, I’ve been deadly honest, dead-on honest all the time I’ve been on the air talking to people and they ask me questions or they make a comment that elicits a response, they are going to get an honest response. It may always not be ‘correct’ but it’s honest.” Grant has since stated that he is not an atheist.

Like many hosts in the talk radio format, Grant had his battery of usual callers that added interest to the show. John from Staten Island, Jimmy from Brooklyn, Al from Chappaqua, Greg from Chatham, David from Irvington, Dorothy from Montclair, Hal from North Bergen (at the time an undercover FBI agent provocateur posing as a white supremacist, he later went rogue), patients rights activist Eddie Carbone, and the popular Frank from Queens were some of the frequent callers. A few quasi-fictitious characters (played by Grant) were also employed during the show such as, ‘Julian P. Farquar, Dexter Pogue, Rantz Greeb, Paul “needlenose” Monage, and Lucy Shagnasty.

Over the years, Grant has made a number of statements on his shows that critics have described as racist. For example, he was quoted in the Newsday of June 2, 1992, as saying “Minorities are the Big Apple’s majority, you don’t need the papers to tell you that, walk around and you know it. To me, that’s a bad thing. I’m a white person.” In his book, Grant defended this statement by writing that he did not intend to put down other races, but only intended to express that “no one likes to be in the minority,” and that America can only survive by retaining its “humane, west European culture.” Thus, he supports ending bilingualism and multiculturalism, two policies of which he has been highly critical.

On October 15, 2008, Grant said “Did you notice Obama is not content with just having several American flags, plain old American flags with the 50 states represented by 50 stars? He has the ‘O’ flag. […] He had the flag painted over, and the ‘O’ for Obama. Now,…these things are symptomatic of a person who would like to be a potentate — a dictator.” The “O” flag to which Grant referred was, in fact, the state flag of Ohio.

Grant distinguished himself from other conservative talk show hosts by calling for Obama to release his long form birth certificate, prior to Obama releasing it.[28]

Although Grant is generally known as being a conservative, he has been a critic of hard-lined conservative advocates in primary races, including the Tea Party movement’s candidates. This has been a frequent debate topic between Grant and his callers over the past few years. During the fall election of 2010, Grant criticized candidates, such as Christine O’Donnell, Rand Paul, and Sharron Angle. Grant endorsed Charlie Crist over Marco Rubio on a July 10, 2010 broadcast for the Florida senate primary. On a May 8, 2011 broadcast, Grant informed his audience that he supported the moderate Jon Huntsman, Jr. for the Republican nomination for president, although he would later go on to supportMitt Romney.[29]

Influences and legacy[edit]

Being largely the innovator of his own particular talk radio style, Grant previously worked with the likes of Barry Gray and Joe Pyne. Pyne would often end each broadcast with “Straight Ahead” which is something Grant picked up, leading many to believe that Grant was the first host to frequently use that line.

Over the years, national radio talk personality Howard Stern has made differing remarks on his admiration for Grant as an early influence. Upon Stern’s arrival in New York, he cited Grant as an influence,[30] but as Stern’s stardom rose, Grant became the subject of ridicule on Stern’s show. During Stern’s prime, he denied being influenced by Grant or having respect for him.[31] Stern has also frequently criticized Grant for changing his act to appease management.[31]Grant told Paul D. Colford, author of the 1996 Stern bio, Howard Stern: King of All Media, about being approached at a public appearance by Ben Stern, Howard’s father, with a teenage Howard in tow. Father introduced son to Grant and told him of Howard’s desire to go into radio. “I looked at this big, gawky kid and I said to him, ‘Just be yourself,'” Grant recalled. Stern has denied Grant’s version of the story.[31] Soon after Grant’s firing from WABC, and before his first WOR show, Grant appeared as a call-in guest on Stern’s radio show. In more recent years, Stern began to praise Grant’s legacy,[32] and called in on his last WOR show in 2006.[33]

Glenn Beck now uses the catchphrase “Get off my phone!” as a spinoff of Grant’s earlier call-in talk show style, as do Tom Scharpling and Mark Levin; similarly, Sean Hannity often uses Grant’s phrase “Straight ahead.”

In 2002, industry magazine Talkers ranked Grant as the 16th greatest radio talk show host of all time.[34]

On March 28, 2007 Bob Grant was nominated for induction into the National Radio Hall of Fame.[35]

Radio & Records had planned to issue a Lifetime Achievement Award to Grant during its annual convention in March 2008; however, the award was revoked in January 2008 for “past comments by him that contradict our values and the respect we have for all members of our community.”[36] Several talk radio hosts have spoken out against the decision; Neal Boortz has stated:

I usually try not to miss the Radio & Records talk radio convention… Not this year. Maybe never again. R&R has succumbed to political correctness… I don’t call for boycotts. But I do think it would be wonderful to see talk show hosts refuse to appear at this convention… What we have seen here in this revocation of the award to Bob Grant is simple pandering to political correctness. Nothing more, nothing less.[37]

Sean Hannity, Opie and Anthony, Comedian Jim Norton, Lars Larson, Rush Limbaugh, Mark Levin, Lionel and Howard Stern opposed the move as well, with Levin stating “I am disgusted with the mistreatment of Bob Grant. I am fed up with the censors, intimidators, and cowards in this business.”[this quote needs a citation] Don Imus deemed the award unimportant, offered to return awards he had received after treating them to his sledgehammer and block of wood, and called Grant’s comments “stupid”, although he also referred to Grant as a “legendary broadcaster.”[38]

http://en.wikipedia.org/wiki/Bob_Grant_(radio)

Read Full Post | Make a Comment ( None so far )

God Is Behind Going Duck Crazy — Duck Dynasty Phil Robertson Suspended From Show For Expressing Views On Gays — Will Not Inherit The Kingdom of God — I’m With Phil — Photos & Videos

Posted on December 19, 2013. Filed under: American History, Art, Art, Blogroll, Business, Comedy, Communications, Culture, Economics, Education, Employment, Entertainment, Heroes, history, liberty, Life, Links, media, Music, People, Philosophy, Politics, Programming, Radio, Rants, Raves, Religion, Resources, Reviews, Security, Talk Radio, Technology, Television, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Merry Christmas and Happy New Year 

Merry-Christmas-Happy-New-Year

Pronk Pops Show 185: January 2, 2014

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 184

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 0: God Is Behind Going Duck Crazy — Duck Dynasty Phil Robertson Suspended From Show For Expressing Views On Gays — Will Not Inherit The Kingdom of God — I’m With Phil — Photos & Videos

 

Phil-Robertsonphil-robertson-meme_2A&E Networks 2012 Upfront - InsidePhil-Robertson5jpgphil_on_foundersA+E Networks 2013 Upfront-3Si-Robertson

Phil+Robertson_friends

phil_robertson_baseballxt0pn55t0rG_Phil_Robertson_football_photo

phil_robertson_quarterbackp_robertson_crusadephil_robertson_words

I am Second® – The Robertsons

Duck Dynasty : Phil’s Way of Life

Duck Dynasty: Unknown Facts About The Robertsons

The Best of Uncle Si

Duck Dynasty : Si Struck

Duck Dynasty: Si’s New Toy

Duck Dynasty: Si’s Dating Tips

Duck Dynasty : Hey

Uncle Si Robertson “ICY STARE” HILARIOUS DUCK DYNASTY ( 720P HD )

Duck Commanders Phil and Willie Robertson Interview – CONAN on TBS

The Robertson’s of Duck Dynasty Talk About How Their Faith in Jesus Turned Around Their Lives!!

Duck Commander Phil Robertson Talks About Why This Country Needs More Jesus

Duck Commander Phil Robertson from Duck Dynasty spoke to the congregation of Saddleback church in July on why people need Jesus and why the founders would agree — and I gotta say it was awesome. I watched it last night and knew I had to post it for you guys. Duck Commander’s message is really simple, that people need to love God and love each other and he delivers it beautifully. He really is a fantastic preacher.

‘Duck Dynasty’ star: Homosexuality wrong

Phil Robertson Duck Dynasty Suspended GQ Anti-Gay -Black Racist Comments Suspension

‘Duck Dynasty’ Star Makes Shocking ‘Gay is Sin’ Comment

Duck Dynasty dared to mention Jesus

‘Duck Dynasty’ star slammed over anti-gay rant

By Andrea Morabito

Phil Robertson, patriarch of the “Duck Dynasty” clan, is being slammed for controversial comments he made about homosexuality in an interview in the January issue of GQ.

“It seems like, to me, a vagina—as a man—would be more desirable than a man’s anus. That’s just me,” Robertson told the magazine. “I’m just thinking: There’s more there! She’s got more to offer. I mean, come on, dudes! You know what I’m saying? But hey, sin: It’s not logical, my man. It’s just not logical.”

When the reporter asked Robertson what he found sinful, he said “Start with homosexual behavior and just morph out from there. Bestiality, sleeping around with this woman and that woman and that woman and those men.”

The self-proclaimed Bible-thumper then went on to paraphrase Corinthians: “Don’t be deceived. Neither the adulterers, the idolaters, the male prostitutes, the homosexual offenders, the greedy, the drunkards, the slanderers, the swindlers—they won’t inherit the kingdom of God. Don’t deceive yourself. It’s not right.”

On Wednesday, GLAAD called Robertson’s statements “vile” and “littered with outdated stereotypes.”

“Phil and his family claim to be Christian, but Phil’s lies about an entire community fly in the face of what true Christians believe,” said GLAAD spokesperson Wilson Cruz. “He clearly knows nothing about gay people or the majority of Louisianans — and Americans — who support legal recognition for loving and committed gay and lesbian couples.

“Phil’s decision to push vile and extreme stereotypes is a stain on A&E and his sponsors who now need to reexamine their ties to someone with such public disdain for LGBT people and families.”

An A&E spokesman had no comment, but Robertson released his own statement responding to the controversy.

“I myself am a product of the 60s; I centered my life around sex, drugs and rock and roll until I hit rock bottom and accepted Jesus as my Savior,” he said. “My mission today is to go forth and tell people about why I follow Christ and also what the Bible teaches, and part of that teaching is that women and men are meant to be together.

“However, I would never treat anyone with disrespect just because they are different from me. We are all created by the Almighty and like Him, I love all of humanity. We would all be better off if we loved God and loved each other.”

“Duck Dynasty” has been a ratings phenomenon for A&E, drawing 11.8 million viewers to its fourth season premiere last August, the most-watched nonfiction series telecast in cable history.

Its fifth season premieres on Jan. 15.

http://nypost.com/2013/12/18/duck-dynasty-member-slammed-for-comments-on-homosexuality/

Related Posts On Pronk Palisades

Three Cheers for Phil Robertson —  Duck Dynasty, Free Speech, and Religious Freedom Win One — GLAAD IS SAD —  Live With It and Move On — Videos

Related Posts On Pronk Pops

The Pronk Pops Show 184, December 19, 2013, Segment 1: Bubbles Ben Bernanke Bumps Bubble of Quantitative Easing Down By $10 Billion Per Month — Near Zero Interest Rate Policy Will Continue Well Into 2014 –Last Press Conference — Videos

Read Full Post | Make a Comment ( None so far )

Bubbles Ben Bernanke Bumps Bubble of Quantitative Easing Down By $10 Billion Per Month — Near Zero Interest Rate Policy Will Continue Well Into 2014 –Last Press Conference — Videos

Posted on December 18, 2013. Filed under: American History, Banking, Blogroll, College, Communications, Constitution, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, Inflation, Investments, IRS, Language, Law, liberty, Life, Links, Macroeconomics, media, Microeconomics, Monetary Policy, Money, People, Philosophy, Politics, Public Sector, Regulations, Resources, Reviews, Strategy, Talk Radio, Tax Policy, Taxes, Technology, Unemployment, Unions, Video, War, Wealth, Wisdom | Tags: , , , , |

Merry Christmas and A Happy New Year

Merry-Christmas-Happy-New-Year

Pronk Pops Show 185: January 2, 2014

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 184

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 1: Bubbles Ben Bernanke Bumps Bubble of Quantitative Easing Down By $10 Billion Per Month — Near Zero Interest Rate Policy Will Continue Well Into 2014 –Last Press Conference — Videos

Bernanke-press-conference-Dec-18-2

Bernanke on Fed taper in 90 seconds

Fed Chairman Ben Bernanke’s Final Speech

Press Conference with Chairman of the FOMC, Ben S. Bernanke

FED Downgrades Economic Outlook & Says It Will Not Change Policy – Stuart Varney

US Federal Reserve to pull back on stimulus program in economic vote of confidence

Assessing the Ben Bernanke Legacy

Background Articles and Videos

Max Keiser Discusses QE & Rigged Global Markets

Peter Schiff Was Right – ‘Taper’ Edition (Dec 18, 2013 Update)

Peter Schiff We’re in Depression, Dollar Crisis Coming

Peter Schiff Money Causes Economic Crises – Peter Schiff Economic Crisis – Peter Schiff Money

Related Posts On Pronk Pops

The Pronk Pops Show 184, December 19, 2013, Segment 0: God Is Behind Going Duck Crazy — Duck Dynasty Phil Robertson Suspended From Show For Expressing Views On Gays — Will Not Inherit The Kingdom of God — I’m With Phil — Photos & Videos

Read Full Post | Make a Comment ( None so far )

U.S. District Court Rules National Security Agency (NSA)’s Phone Surveillance Program Unconstitutional — Videos

Posted on December 16, 2013. Filed under: American History, Blogroll, College, Communications, Computers, Computers, Constitution, Demographics, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government spending, history, Law, liberty, Life, Links, media, People, Philosophy, Politics, Press, Radio, Rants, Raves, Regulations, Reviews, Security, Strategy, Technology, Terrorism, Video, War, Wisdom | Tags: , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 174-182

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 0: U.S. District Court Rules National Security Agency (NSA)’s Phone Surveillance Program Unconstitutional — Videos

Judge rules NSA spying program likely unconstitutional

Federal Judge Rules NSA Spying On All American Phone Calls Unconstitutional

OBAMA defends Massive NSA Spying PRISM program. Taps in to Data of Apple, Google, Skype, Verizon

Sen. Paul Applauds the Protection of Fourth Amendment Rights

Dec 16, 2013

WASHINGTON, D.C. - Sen. Rand Paul today issued the following statement applauding the U.S. District Court ruling that deemed the National Security Agency’s (NSA) phone surveillance program unconstitutional:

“I commend U.S. District Court Judge Richard Leon for upholding and protecting our Fourth Amendment rights. This decision represents an important first step in having the constitutionality of government surveillance programs decided in the regular court system rather than a secret court where only one side is presented,” Sen. Paul said. “In June, I introduced the Fourth Amendment Restoration Act which, if enacted, would have restored our Constitutional rights and declared that the Fourth Amendment shall not be construed to allow any agency of the United States government to search the phone records of Americans without a warrant based on probable cause. The NSA phone surveillance program is a blatant abuse of power and an invasion of our privacy. This ruling reminds the Federal government that it is not above the law. I will continue to fight against the violations of American’s Constitutional rights through illegal phone surveillance until it is stopped once and for all.”

Related Posts On Pronk Pops

The Pronk Pops Show 182, December 16, 2013, Segment 1: Republican Senators and Representatives Traitors To The Principle of Fiscal Responsibility and Conservative and Tea Party Movement — Republican Conservative, Libertarian and Tea Party Base Will Take Out The Republican Budget Big Interventionist Government Spenders — Videos

Read Full Post | Make a Comment ( None so far )

Obama’s October Surprise: The August 2012 8.1% Unemployment Rate That Declined To 7.8 for September 2012 Faked and Manipulated By Census Bureau for Political Reasons — Jack Welch Was Right — Happy Birthday Jack — Video

Posted on November 19, 2013. Filed under: American History, Blogroll, College, Communications, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, Inflation, Investments, Law, liberty, Links, Literacy, media, People, Philosophy, Photos, Politics, Raves, Regulations, Reviews, Talk Radio, Unemployment, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , |

Now

November 19, 2013

gdp_large

Unemployment Rate

Series Id:           LNS14000000 Seasonally Adjusted Series title:        (Seas) Unemployment Rate Labor force status:  Unemployment rate Type of data:        Percent or rate Age:                 16 years and over

unemployment_rate

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 4.0 4.1 4.0 3.8 4.0 4.0 4.0 4.1 3.9 3.9 3.9 3.9
2001 4.2 4.2 4.3 4.4 4.3 4.5 4.6 4.9 5.0 5.3 5.5 5.7
2002 5.7 5.7 5.7 5.9 5.8 5.8 5.8 5.7 5.7 5.7 5.9 6.0
2003 5.8 5.9 5.9 6.0 6.1 6.3 6.2 6.1 6.1 6.0 5.8 5.7
2004 5.7 5.6 5.8 5.6 5.6 5.6 5.5 5.4 5.4 5.5 5.4 5.4
2005 5.3 5.4 5.2 5.2 5.1 5.0 5.0 4.9 5.0 5.0 5.0 4.9
2006 4.7 4.8 4.7 4.7 4.6 4.6 4.7 4.7 4.5 4.4 4.5 4.4
2007 4.6 4.5 4.4 4.5 4.4 4.6 4.7 4.6 4.7 4.7 4.7 5.0
2008 5.0 4.9 5.1 5.0 5.4 5.6 5.8 6.1 6.1 6.5 6.8 7.3
2009 7.8 8.3 8.7 9.0 9.4 9.5 9.5 9.6 9.8 10.0 9.9 9.9
2010 9.8 9.8 9.9 9.9 9.6 9.4 9.5 9.5 9.5 9.5 9.8 9.3
2011 9.1 9.0 8.9 9.0 9.0 9.1 9.0 9.0 9.0 8.9 8.6 8.5
2012 8.3 8.3 8.2 8.1 8.2 8.2 8.2 8.1 7.8 7.9 7.8 7.8
2013 7.9 7.7 7.6 7.5 7.6 7.6 7.4 7.3 7.2 7.3

Series Id:           LNS11300000
Seasonally Adjusted
Series title:        (Seas) Labor Force Participation Rate
Labor force status:  Civilian labor force participation rate
Type of data:        Percent or rate
Age:                 16 years and over

Labor_Force_Participation_Rate
Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 67.3 67.3 67.3 67.3 67.1 67.1 66.9 66.9 66.9 66.8 66.9 67.0
2001 67.2 67.1 67.2 66.9 66.7 66.7 66.8 66.5 66.8 66.7 66.7 66.7
2002 66.5 66.8 66.6 66.7 66.7 66.6 66.5 66.6 66.7 66.6 66.4 66.3
2003 66.4 66.4 66.3 66.4 66.4 66.5 66.2 66.1 66.1 66.1 66.1 65.9
2004 66.1 66.0 66.0 65.9 66.0 66.1 66.1 66.0 65.8 65.9 66.0 65.9
2005 65.8 65.9 65.9 66.1 66.1 66.1 66.1 66.2 66.1 66.1 66.0 66.0
2006 66.0 66.1 66.2 66.1 66.1 66.2 66.1 66.2 66.1 66.2 66.3 66.4
2007 66.4 66.3 66.2 65.9 66.0 66.0 66.0 65.8 66.0 65.8 66.0 66.0
2008 66.2 66.0 66.1 65.9 66.1 66.1 66.1 66.1 66.0 66.0 65.9 65.8
2009 65.7 65.8 65.6 65.7 65.7 65.7 65.5 65.4 65.1 65.0 65.0 64.6
2010 64.8 64.9 64.9 65.1 64.9 64.6 64.6 64.7 64.6 64.4 64.6 64.3
2011 64.2 64.2 64.2 64.2 64.2 64.0 64.0 64.1 64.2 64.1 64.1 64.0
2012 63.7 63.9 63.8 63.6 63.8 63.8 63.7 63.5 63.6 63.8 63.6 63.6
2013 63.6 63.5 63.3 63.3 63.4 63.5 63.4 63.2 63.2 62.8

Rick Santelli Rages Against Media Over ‘Manipulated’ Unemployment Data Allegations

October 5th 2012 CNBC Stock Market Squawk Box (September Jobs Report)

Jobless Rate Drops Bellow 8 Percent – Jack Welch Weighs in On Cavuto!!

Jay Carney Swats Away ‘Conspiracy Theories’ About Faked 2012 Employment Data – 11-19-2013

Jack Welch: Jobs Data Too Good to Be True – CNBC’s The Kudlow Report

Jack Welch on Hardball w/Chris Matthews

Anderson Cooper Goes After Jack Welch Over Unemployment Numbers

UnEmployment Rate – New Jobs Report – Steve Forbes: Jack Welch Is Right!

Peter Schiff Explains the Questionable Unemployment Figures on his Dec. 7, 2012 Show

Census ‘faked’ 2012 election jobs report

By John Crudele

November 18, 2013 | 8:06pm

In the home stretch of the 2012 presidential campaign, from August to September, the unemployment rate fell sharply — raising eyebrows from Wall Street to Washington.

The decline — from 8.1 percent in August to 7.8 percent in September — might not have been all it seemed. The numbers, according to a reliable source, were manipulated.

And the Census Bureau, which does the unemployment survey, knew it.

Just two years before the presidential election, the Census Bureau had caught an employee fabricating data that went into the unemployment report, which is one of the most closely watched measures of the economy.

And a knowledgeable source says the deception went beyond that one employee — that it escalated at the time President Obama was seeking reelection in 2012 and continues today.

“He’s not the only one,” said the source, who asked to remain anonymous for now but is willing to talk with the Labor Department and Congress if asked.

The Census employee caught faking the results is Julius Buckmon, according to confidential Census documents obtained by The Post. Buckmon told me in an interview this past weekend that he was told to make up information by higher-ups at Census.

Ironically, it was Labor’s demanding standards that left the door open to manipulation.

Labor requires Census to achieve a 90 percent success rate on its interviews — meaning it needed to reach 9 out of 10 households targeted and report back on their jobs status.

Census currently has six regions from which surveys are conducted. The New York and Philadelphia regions, I’m told, had been coming up short of the 90 percent.

Philadelphia filled the gap with fake interviews.

“It was a phone conversation — I forget the exact words — but it was, ‘Go ahead and fabricate it’ to make it what it was,” Buckmon told me.

Census, under contract from the Labor Department, conducts the household survey used to tabulate the unemployment rate.

Interviews with some 60,000 household go into each month’s jobless number, which currently stands at 7.3 percent. Since this is considered a scientific poll, each one of the households interviewed represents 5,000 homes in the US.

Buckmon, it turns out, was a very ambitious employee. He conducted three times as many household interviews as his peers, my source said.

By making up survey results — and, essentially, creating people out of thin air and giving them jobs — Buckmon’s actions could have lowered the jobless rate.

Buckmon said he filled out surveys for people he couldn’t reach by phone or who didn’t answer their doors.

But, Buckmon says, he was never told how to answer the questions about whether these nonexistent people were employed or not, looking for work, or have given up.

But people who know how the survey works say that simply by creating people and filling out surveys in their name would boost the number of folks reported as employed.

Census never publicly disclosed the falsification. Nor did it inform Labor that its data was tainted.

“Yes, absolutely they should have told us,” said a Labor spokesman. “It would be normal procedure to notify us if there is a problem with data collection.”

Census appears to have looked into only a handful of instances of falsification by Buckmon, although more than a dozen instances were reported, according to internal documents.

In one document from the probe, Program Coordinator Joal Crosby was ask in 2010, “Why was the suspected … possible data falsification on all (underscored) other survey work for which data falsification was suspected not investigated by the region?”

On one document seen by The Post, Crosby hand-wrote the answer: “Unable to determine why an investigation was not done for CPS,” or the Current Population Survey — the official name for the unemployment report.

With regard to the Consumer Expenditure survey, only four instances of falsification were looked into, while 14 were reported.

I’ve been suspicious of the Census Bureau for a long time.

During the 2010 Census report — an enormous and costly survey of the entire country that goes on for a full year — I suspected (and wrote in a number of columns) that Census was inexplicably hiring and firing temporary workers.

I suspected that this turnover of employees was being done purposely to boost the number of new jobs being report each month. (The Labor Department does not use the Census Bureau for its other monthly survey of new jobs — commonly referred to as the Establishment Survey.)

Last week I offered to give all the information I have, including names, dates and charges to Labor’s inspector general.

I’m waiting to hear back from Labor.

I hope the next stop will be Congress, since manipulation of data like this not only gives voters the wrong impression of the economy but also leads lawmakers, the Federal Reserve and companies to make uninformed decisions.

To cite just one instance, the Fed is targeting the curtailment of its so-called quantitative easing money-printing/bond-buying fiasco to the unemployment rate for which Census provided the false information.

So falsifying this would, in essence, have dire consequences for the country.

http://nypost.com/2013/11/18/census-faked-2012-election-jobs-report/

New York Post Claims Census Falsifies Unemployment Figures

The New York Post is reporting an absolute bombshell story if true.  They claim the September 2012 unemployment report was manipulated and survey data was faked, just in time for the election.  The story quotes anonymous sources, insiders from the Census Bureau who claim to have falsified survey data for the unemployment report.

The decline — from 8.1 percent in August to 7.8 percent in September — might not have been all it seemed. The numbers, according to a reliable source, were manipulated.

And the Census Bureau, which does the unemployment survey, knew it.

Not only is the Post claiming the September 2012 unemployment surveys were manipulated but this is still going on today.  The Census actually caught one employee fabricating the unemployment statistics by falsifying survey results which should be answered by respondents.

Just two years before the presidential election, the Census Bureau had caught an employee fabricating data that went into the unemployment report, which is one of the most closely watched measures of the economy.

And a knowledgeable source says the deception went beyond that one employee — that it escalated at the time President Obama was seeking reelection in 2012 and continues today.

The story might very well be true.  The unemployment rate comes from surveys, sent out to 60,000 households spread out over 2,025 geographical areas of the country..  The Bureau of Labor Statistics gives great detail into the methodology used for these surveys.  The fraud reported by the New York Post comes from the 2200 Census employees who conduct the phone interviews each month for the Household survey.  Instead of doing their job and recording the answers from the interview questions of these households, a few individuals are falsifying the survey results.  If employees were falsifying interviews and this fudging of surveys is done with enough households, such fraud could skew the unemployment rate.

“He’s not the only one,” said the source, who asked to remain anonymous for now but is willing to talk with the Labor Department and Congress if asked.

The Census employee caught faking the results is Julius Buckmon, according to confidential Census documents obtained by The Post. Buckmon told me in an interview this past weekend that he was told to make up information by higher-ups at Census.

The Post claims the Census Bureau demands a 90% interview response rate and certain regions of the country that is hard to get.  So personnel are fudging the results and filling in the survey.  There might certainly be truth to this as employees are under pressure to produce results, no one answers their phones these days and who wants to be bothered by some Census Bureau employee asking a lot of obnoxious questions?

What is more odious is the BLS is not publishing actual response rates for the household survey.  If the Post article is true and the Census expects a 90% or greater response rate, that seems a little ridiculous demand by itself.  Below is a short explanation on how the unemployment report statistics are collected.  Read it and then imagine being part of this survey.  How accurate would you be or even responsive over time?

The survey is conducted by the U.S. Census Bureau for the Bureau of Labor Statistics. Each month, during the calendar week including the 19th day, Census interviewers contact households by telephone and in person and ask questions regarding the labor market activity of household members during the previous calendar week which included the 12th day of the month—the reference week. Personal visits are preferred in the first month in which the household is in the sample. At the first visit, interviewers prepare a roster of the household members including their demographic characteristics and their relationship to the person maintaining the household, and enter the information via laptop computers, along with responses to all survey questions.

In the months following the first interview, the interview is generally conducted by telephone. The household roster is checked for accuracy and brought up to date in each interview. About 10 percent of households are interviewed via computer-assisted telephone interviewing (CATI) by staff in three centralized calling centers. Other telephone interviews are collected by field representatives. A personal visit is generally attempted for the fifth interview. At the end of each day’s interviewing, the data are transmitted over secure telecommunications lines to the Census Bureau’s central computer in Washington, DC.

From the number of households and individual Census employees it is clear the Census would have to falsify many interviews to actually skew the survey results enough to manipulate the unemployment rate.  The Post story quotes the employee already busted for falsifying survey interview responses that he did so on the demand from management at the Census Bureau.

The question of intentional hoodwinking for political agendas versus low paid workers having to interview people all day on a quota is really unanswered.  Yet none of that matters.  If any portion of this story is true, it means data integrity is compromised.  All sorts of policies, funds, legislation and even Wall Street are tied to the unemployment rate.  Suspecting fictional statistics, just the concept, could result in no confidence of government statistics.  That is an unmitigated disaster on a host of fronts.

Census appears to have looked into only a handful of instances of falsification by Buckmon, although more than a dozen instances were reported, according to internal documents.

In one document from the probe, Program Coordinator Joal Crosby was ask in 2010, “Why was the suspected … possible data falsification on all (underscored) other survey work for which data falsification was suspected not investigated by the region?”

On one document seen by The Post, Crosby hand-wrote the answer: “Unable to determine why an investigation was not done for CPS,” or the Current Population Survey — the official name for the unemployment report.

With regard to the Consumer Expenditure survey, only four instances of falsification were looked into, while 14 were reported.

We look at the unemployment statistics in great detail every month and the way to prove the Census is falsifying data is by a probability and error margin analysis check.  Such an analysis is quite involved.  To detect Census employee fraud, such an analysis should be performed on individual employee interview results.  This still leaves the question of how honest actual survey respondents are as well.  In terms of statistical accuracy, we’ve never liked the Household survey.  The error margin is too great and we believe the Census should cross correlate survey results with other labor market metrics for a reality check.  While not a poll, a survey is just that, asking people to volunteerinformation.  To make matters worse, recently some of the revisions to GDP methodology are truly questionable and the last thing America needs is even more manipulated or skewed economic statistics

At the time the September 2012 unemployment report was released, the results were so extreme we compared it to falling through a worm hole in statistical space.  Yet that month is not the only one which seems to be skewed.  Every month we analyze these reports digging out the figures to explain the unbelievable, such as the unemployment rate dropping dramatically while the net gain of those employed is basically static.

We question the conspiracy element of the Post story that the Census would actually falsify the unemployment rate to skew an election.  The reason that seems absurd is the press pays no attention to the pathetic labor market and neither Presidential candidate in 2012 was offering a damn thing to actually increase jobs.  It is also doubtful a sudden drop in the unemployment rate would sway the election results, even though the official unemployment rate sweeps millions of Americans needing a job under the political and statistical rug.

What could very well be true is an increasing nonresponse rate to Census survey unemployment questions.  Generally speaking people do not have the time, feel obligated to answer such surveys or even pick up a land line, unlike 50 years ago.  We also question how honest people are who do answer surveys as well as the type of person to respond versus those who do not.  Just by asking individuals would seem to put bias into the sampling group.  One would think America could obtain more accurate data collection methods than a survey in order to find out what people are doing each month for work.  After all, the NSA knows every single thing we say or do these days.

http://www.economicpopulist.org/content/new-york-post-claims-census-falsifies-unemployment-figures-5436

Then

October 5, 2012

Over 23 Million Americans Looking For A Full Time Job As The Total Unemployment Rate U-6 Unchanged At 14.7%–Unemployment Rate U-3 Drops To 7.8% The Same Rate As January 2009!–Obama’s October Surprise As GDP Growth Rate Falls–Videos

Describing “Shadow Government Statistics” — John Williams 

Unemployment Rate Falls to 7.8% on New Jobs Report

BREAKING: U.S. Adds 114,000 Jobs, Unemployment Rate Drops to 7.8 

October 5th 2012 CNBC Stock Market Squawk Box (September Jobs Report) 

Today’s report includes a surprise drop in the unemployment rate-but it is statistically questionable. Payroll numbers continued modest improvement. The unemployment rate unexpectedly dropped to 7.8 percent, following a decline to 8.1 percent in August. Payroll jobs in September gained about as expected with a modest 114,000 increase, following an rise in August of 142,000 (originally up 96,000) and an increase of 181,000 in July (previous estimate of 141,000). The net revisions for July and August were up 86,000. Market expectations were for a 113,000 boost for September.

Private payrolls advanced 104,000 in September after increasing 97,000 the month before. The consensus projected a 130,000 increase.

Wage inflation has been volatile and the latest number was on the up side. Average hourly earnings growth improved to 0.3 percent in September, following no change in August. Analysts forecast a 0.2 percent rise. The average workweek nudged up to 34.5 hours in September from 34.4 hours in August. Expectations were for 34.4 hours.

Turning to the household survey, the unemployment rate drop reflected an 873,000 spike in household employment versus a 368,000 drop in August. The labor force rebounded 418,000 after a 368,000 decrease in August. The household survey is much smaller than the payroll survey and is more volatile

September Unemployment Falls to 7.8% 

Jack Welch Hardball w/Chris Matthews 10/5/12 

Jack Welch, the lionized former chairman of General Electric Co, provoked cries of outrage in Washington on Friday when he appeared to accuse the White House of manipulating September job figures for political gains.
White House officials dismissed as “ludicrous” a tweet Welch sent to his more than 1.3 million followers that suggested U.S. President Barack Obama’s administration rigged the data as a way of recovering from a poor Wednesday night showing in a debate against Mitt Romney, his Republican challenger for the White House.

“Unbelievable jobs numbers..these Chicago guys will do anything..can’t debate so change numbers,” Welch said in a posting on Twitter, apparently referring to Obama, who formerly served as a senator from Illinois.

The tweet was repeated more than 2,000 times, with many mocking posts comparing Welch to New York real estate tycoon Donald Trump – who during his failed bid for the presidency loudly argued that Obama was not born in the United States – and Clint Eastwood, who gave a widely panned speech to an empty chair at the Republican National Convention in August.
Officials in Washington quickly dismissed the idea that the Labor Department report – which showed U.S. unemployment falling to a four-year low of 7.8 percent – could be rigged.
“That’s a ludicrous comment. No serious person believes that the bureau of labor statistics manipulates its statistics,” said Alan Krueger, chairman of the White House Council of Economic Advisers. “The jobs report and all of their other statistics are prepared by career employees. They use the same process every month. They use the same process for Republican and Democratic administrations.”

The tweet was by no means Welch’s first criticism of Obama on his Twitter feed, where he has regularly spoken out in favor of Romney, as well as weighing in on sports. During the presidential debate in Denver, Colorado, on Wednesday night, Welch tweeted: “HOW can anyone vote for Obama after this performance..he has demonstrated his incompetence.”

Word of the Day: Unemployment (U3 and U6) 

FACT CHECK: LABOR SECRETARY SOLIS MISLEADS ON JOBS REVISIONS 

The AFL-CIO Reacts to the September BLS Jobs Report 

Employment Level

142,974,000

Series Id:           LNS12000000
Seasonally Adjusted
Series title:        (Seas) Employment Level
Labor force status:  Employed
Type of data:        Number in thousands
Age:                 16 years and over

Employment Level

Employment Level

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 136559(1) 136598 136701 137270 136630 136940 136531 136662 136893 137088 137322 137614
2001 137778 137612 137783 137299 137092 136873 137071 136241 136846 136392 136238 136047
2002 135701 136438 136177 136126 136539 136415 136413 136705 137302 137008 136521 136426
2003 137417(1) 137482 137434 137633 137544 137790 137474 137549 137609 137984 138424 138411
2004 138472(1) 138542 138453 138680 138852 139174 139556 139573 139487 139732 140231 140125
2005 140245(1) 140385 140654 141254 141609 141714 142026 142434 142401 142548 142499 142752
2006 143150(1) 143457 143741 143761 144089 144353 144202 144625 144815 145314 145534 145970
2007 146028(1) 146057 146320 145586 145903 146063 145905 145682 146244 145946 146595 146273
2008 146397(1) 146157 146108 146130 145929 145738 145530 145196 145059 144792 144078 143328
2009 142187(1) 141660 140754 140654 140294 140003 139891 139458 138775 138401 138607 137968
2010 138500(1) 138665 138836 139306 139340 139137 139139 139338 139344 139072 138937 139220
2011 139330(1) 139551 139764 139628 139808 139385 139450 139754 140107 140297 140614 140790
2012 141637(1) 142065 142034 141865 142287 142415 142220 142101 142974
1 : Data affected by changes in population controls.

Civilian Labor Force

155,063,000

Series Id:           LNS11000000
Seasonally Adjusted
Series title:        (Seas) Civilian Labor Force Level
Labor force status:  Civilian labor force
Type of data:        Number in thousands
Age:                 16 years and over

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 142267(1) 142456 142434 142751 142388 142591 142278 142514 142518 142622 142962 143248
2001 143800 143701 143924 143569 143318 143357 143654 143284 143989 144086 144240 144305
2002 143883 144653 144481 144725 144938 144808 144803 145009 145552 145314 145041 145066
2003 145937(1) 146100 146022 146474 146500 147056 146485 146445 146530 146716 147000 146729
2004 146842(1) 146709 146944 146850 147065 147460 147692 147564 147415 147793 148162 148059
2005 148029(1) 148364 148391 148926 149261 149238 149432 149779 149954 150001 150065 150030
2006 150214(1) 150641 150813 150881 151069 151354 151377 151716 151662 152041 152406 152732
2007 153144(1) 152983 153051 152435 152670 153041 153054 152749 153414 153183 153835 153918
2008 154075(1) 153648 153925 153761 154325 154316 154480 154646 154559 154875 154622 154626
2009 154236(1) 154521 154143 154450 154800 154730 154538 154319 153786 153822 153833 153091
2010 153454(1) 153704 153964 154528 154216 153653 153748 154073 153918 153709 154041 153613
2011 153250(1) 153302 153392 153420 153700 153409 153358 153674 154004 154057 153937 153887
2012 154395(1) 154871 154707 154365 155007 155163 155013 154645 155063
1 : Data affected by changes in population controls.

Labor Force Participation Rate

63.6%

Series Id:           LNS11300000
Seasonally Adjusted
Series title:        (Seas) Labor Force Participation Rate
Labor force status:  Civilian labor force participation rate
Type of data:        Percent or rate
Age:                 16 years and over

Labor Force Participation Rate

Labor Force Participation Rate

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 67.3 67.3 67.3 67.3 67.1 67.1 66.9 66.9 66.9 66.8 66.9 67.0
2001 67.2 67.1 67.2 66.9 66.7 66.7 66.8 66.5 66.8 66.7 66.7 66.7
2002 66.5 66.8 66.6 66.7 66.7 66.6 66.5 66.6 66.7 66.6 66.4 66.3
2003 66.4 66.4 66.3 66.4 66.4 66.5 66.2 66.1 66.1 66.1 66.1 65.9
2004 66.1 66.0 66.0 65.9 66.0 66.1 66.1 66.0 65.8 65.9 66.0 65.9
2005 65.8 65.9 65.9 66.1 66.1 66.1 66.1 66.2 66.1 66.1 66.0 66.0
2006 66.0 66.1 66.2 66.1 66.1 66.2 66.1 66.2 66.1 66.2 66.3 66.4
2007 66.4 66.3 66.2 65.9 66.0 66.0 66.0 65.8 66.0 65.8 66.0 66.0
2008 66.2 66.0 66.1 65.9 66.1 66.1 66.1 66.1 65.9 66.0 65.8 65.8
2009 65.7 65.8 65.6 65.6 65.7 65.7 65.5 65.4 65.1 65.0 65.0 64.6
2010 64.8 64.9 64.9 65.1 64.9 64.6 64.6 64.7 64.6 64.4 64.5 64.3
2011 64.2 64.2 64.2 64.2 64.2 64.1 64.0 64.1 64.1 64.1 64.0 64.0
2012 63.7 63.9 63.8 63.6 63.8 63.8 63.7 63.5 63.6

Unemployment Level

12,088,000

Series Id:           LNS13000000
Seasonally Adjusted
Series title:        (Seas) Unemployment Level
Labor force status:  Unemployed
Type of data:        Number in thousands
Age:                 16 years and over

Unemployment Level

Unemployment Level

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 5708 5858 5733 5481 5758 5651 5747 5853 5625 5534 5639 5634
2001 6023 6089 6141 6271 6226 6484 6583 7042 7142 7694 8003 8258
2002 8182 8215 8304 8599 8399 8393 8390 8304 8251 8307 8520 8640
2003 8520 8618 8588 8842 8957 9266 9011 8896 8921 8732 8576 8317
2004 8370 8167 8491 8170 8212 8286 8136 7990 7927 8061 7932 7934
2005 7784 7980 7737 7672 7651 7524 7406 7345 7553 7453 7566 7279
2006 7064 7184 7072 7120 6980 7001 7175 7091 6847 6727 6872 6762
2007 7116 6927 6731 6850 6766 6979 7149 7067 7170 7237 7240 7645
2008 7678 7491 7816 7631 8395 8578 8950 9450 9501 10083 10544 11299
2009 12049 12860 13389 13796 14505 14727 14646 14861 15012 15421 15227 15124
2010 14953 15039 15128 15221 14876 14517 14609 14735 14574 14636 15104 14393
2011 13919 13751 13628 13792 13892 14024 13908 13920 13897 13759 13323 13097
2012 12758 12806 12673 12500 12720 12749 12794 12544 12088

Unemployment Rate U-3

7.8%

Series Id:           LNS14000000
Seasonally Adjusted
Series title:        (Seas) Unemployment Rate
Labor force status:  Unemployment rate
Type of data:        Percent or rate
Age:                 16 years and over

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 4.0 4.1 4.0 3.8 4.0 4.0 4.0 4.1 3.9 3.9 3.9 3.9
2001 4.2 4.2 4.3 4.4 4.3 4.5 4.6 4.9 5.0 5.3 5.5 5.7
2002 5.7 5.7 5.7 5.9 5.8 5.8 5.8 5.7 5.7 5.7 5.9 6.0
2003 5.8 5.9 5.9 6.0 6.1 6.3 6.2 6.1 6.1 6.0 5.8 5.7
2004 5.7 5.6 5.8 5.6 5.6 5.6 5.5 5.4 5.4 5.5 5.4 5.4
2005 5.3 5.4 5.2 5.2 5.1 5.0 5.0 4.9 5.0 5.0 5.0 4.9
2006 4.7 4.8 4.7 4.7 4.6 4.6 4.7 4.7 4.5 4.4 4.5 4.4
2007 4.6 4.5 4.4 4.5 4.4 4.6 4.7 4.6 4.7 4.7 4.7 5.0
2008 5.0 4.9 5.1 5.0 5.4 5.6 5.8 6.1 6.1 6.5 6.8 7.3
2009 7.8 8.3 8.7 8.9 9.4 9.5 9.5 9.6 9.8 10.0 9.9 9.9
2010 9.7 9.8 9.8 9.9 9.6 9.4 9.5 9.6 9.5 9.5 9.8 9.4
2011 9.1 9.0 8.9 9.0 9.0 9.1 9.1 9.1 9.0 8.9 8.7 8.5
2012 8.3 8.3 8.2 8.1 8.2 8.2 8.3 8.1 7.8

Unemployment Rate U-6

14.7%

Series Id:           LNS13327709 

Seasonally Adjusted 
Series title:        (seas) Total unemployed, plus all marginally attached workers 
                      plus total employed part time for economic reasons, as a percent of all civilian labor force
                      plus all marginally attached workers 
Labor force status:  Aggregated totals unemployed 
Type of data:        Percent or rate 
Age:                 16 years and over 
Percent/rates:       Unemployed and mrg attached and pt for econ reas as percent of labor force 
                     plus marg attached

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 7.1 7.2 7.1 6.9 7.1 7.0 7.0 7.1 7.0 6.8 7.1 6.9
2001 7.3 7.4 7.3 7.4 7.5 7.9 7.8 8.1 8.7 9.3 9.4 9.6
2002 9.5 9.5 9.4 9.7 9.5 9.5 9.6 9.6 9.6 9.6 9.7 9.8
2003 10.0 10.2 10.0 10.2 10.1 10.3 10.3 10.1 10.4 10.2 10.0 9.8
2004 9.9 9.7 10.0 9.6 9.6 9.5 9.5 9.4 9.4 9.7 9.4 9.2
2005 9.3 9.3 9.1 8.9 8.9 9.0 8.8 8.9 9.0 8.7 8.7 8.6
2006 8.4 8.4 8.2 8.1 8.2 8.4 8.5 8.4 8.0 8.2 8.1 7.9
2007 8.4 8.2 8.0 8.2 8.2 8.3 8.4 8.4 8.4 8.4 8.4 8.8
2008 9.2 9.0 9.1 9.2 9.7 10.1 10.5 10.8 11.1 11.8 12.7 13.5
2009 14.2 15.1 15.7 15.8 16.4 16.5 16.5 16.7 16.8 17.2 17.1 17.1
2010 16.7 16.9 16.9 17.0 16.6 16.5 16.5 16.6 16.9 16.8 16.9 16.6
2011 16.1 15.9 15.7 15.9 15.8 16.2 16.1 16.2 16.4 16.0 15.6 15.2
2012 15.1 14.9 14.5 14.5 14.8 14.9 15.0 14.7 14.7

Background Articles and Videos

Employment Situation Summary

Transmission of material in this release is embargoed                   USDL-12-1981
until 8:30 a.m. (EDT) Friday, October 5, 2012

Technical information:
 Household data:       (202) 691-6378  *  cpsinfo@bls.gov  *  www.bls.gov/cps
 Establishment data:   (202) 691-6555  *  cesinfo@bls.gov  *  www.bls.gov/ces

Media contact:         (202) 691-5902  *  PressOffice@bls.gov

                    THE EMPLOYMENT SITUATION -- SEPTEMBER 2012

The unemployment rate decreased to 7.8 percent in September, and total nonfarm 
payroll employment rose by 114,000, the U.S. Bureau of Labor Statistics reported 
today. Employment increased in health care and in transportation and warehousing 
but changed little in most other major industries.

Household Survey Data

The unemployment rate declined by 0.3 percentage point to 7.8 percent in September. 
For the first 8 months of the year, the rate held within a narrow range of 8.1 
and 8.3 percent. The number of unemployed persons, at 12.1 million, decreased by 
456,000 in September. (See table A-1.)

Among the major worker groups, the unemployment rates for adult men (7.3 percent), 
adult women (7.0 percent), and whites (7.0 percent) declined over the month. 
The unemployment rates for teenagers (23.7 percent), blacks (13.4 percent), and 
Hispanics (9.9 percent) were little changed. The jobless rate for Asians, at 
4.8 percent (not seasonally adjusted), fell over the year. (See tables A-1, A-2, 
and A-3.)

In September, the number of job losers and persons who completed temporary jobs 
decreased by 468,000 to 6.5 million. (See table A-11.)

The number of persons unemployed for less than 5 weeks declined by 302,000 over 
the month to 2.5 million. The number of long-term unemployed (those jobless for 
27 weeks or more) was little changed at 4.8 million and accounted for 40.1 
percent of the unemployed. (See table A-12.)

Total employment rose by 873,000 in September, following 3 months of little 
change. The employment-population ratio increased by 0.4 percentage point to 
58.7 percent, after edging down in the prior 2 months. The overall trend in 
the employment-population ratio for this year has been flat. The civilian labor 
force rose by 418,000 to 155.1 million in September, while the labor force 
participation rate was little changed at 63.6 percent. (See table A-1.)

The number of persons employed part time for economic reasons (sometimes 
referred to as involuntary part-time workers) rose from 8.0 million in August 
to 8.6 million in September. These individuals were working part time because 
their hours had been cut back or because they were unable to find a full-time 
job. (See table A-8.)

In September, 2.5 million persons were marginally attached to the labor force, 
essentially unchanged from a year earlier. (These data are not seasonally 
adjusted.) These individuals were not in the labor force, wanted and were 
available for work, and had looked for a job sometime in the prior 12 months. 
They were not counted as unemployed because they had not searched for work 
in the 4 weeks preceding the survey. (See table A-16.)

Among the marginally attached, there were 802,000 discouraged workers in 
September, a decline of 235,000 from a year earlier. (These data are not 
seasonally adjusted.) Discouraged workers are persons not currently looking 
for work because they believe no jobs are available for them. The remaining 
1.7 million persons marginally attached to the labor force in September had 
not searched for work in the 4 weeks preceding the survey for reasons such 
as school attendance or family responsibilities. (See table A-16.)

Establishment Survey Data

Total nonfarm payroll employment increased by 114,000 in September. In 2012, 
employment growth has averaged 146,000 per month, compared with an average 
monthly gain of 153,000 in 2011. In September, employment rose in health care 
and in transportation and warehousing. (See table B-1.)

Health care added 44,000 jobs in September. Job gains continued in ambulatory 
health care services (+30,000) and hospitals (+8,000). Over the past year, 
employment in health care has risen by 295,000.

In September, employment increased by 17,000 in transportation and warehousing. 
Within the industry, there were job gains in transit and ground passenger 
transportation (+9,000) and in warehousing and storage (+4,000).

Employment in financial activities edged up in September (+13,000), reflecting 
modest job growth in credit intermediation (+6,000) and real estate (+7,000).

Manufacturing employment edged down in September (-16,000). On net, manufacturing 
employment has been unchanged since April. In September, job losses occurred 
in computer and electronic products (-6,000) and in printing and related 
activities (-3,000).

Employment in other major industries, including mining and logging, construction, 
wholesale trade, retail trade, information, professional and business services, 
leisure and hospitality, and government, showed little change over the month.

The average workweek for all employees on private nonfarm payrolls edged up by 
0.1 hour to 34.5 hours in September. The manufacturing workweek edged up by 
0.1 hour to 40.6 hours, and factory overtime was unchanged at 3.2 hours. 
The average workweek for production and nonsupervisory employees on private 
nonfarm payrolls was unchanged at 33.7 hours. (See tables B-2 and B-7.)

In September, average hourly earnings for all employees on private nonfarm 
payrolls rose by 7 cents to $23.58. Over the past 12 months, average hourly 
earnings have risen by 1.8 percent. In September, average hourly earnings of 
private-sector production and nonsupervisory employees increased by 5 cents 
to $19.81. (See tables B-3 and B-8.)

The change in total nonfarm payroll employment for July was revised from 
+141,000 to +181,000, and the change for August was revised from +96,000 to 
+142,000.

____________
The Employment Situation for October is scheduled to be released on
Friday, November 2, 2012, at 8:30 a.m. (EDT).
http://www.bls.gov/news.release/empsit.nr0.htmEmployment Situation Summary Table A. Household data, seasonally adjusted

[Numbers in thousands]

HOUSEHOLD DATA Summary table A. Household data, seasonally adjusted
Category Sept. 2011 July 2012 Aug. 2012 Sept. 2012 Change from: Aug. 2012- Sept. 2012
Employment status
Civilian noninstitutional population 240,071 243,354 243,566 243,772 206
Civilian labor force 154,004 155,013 154,645 155,063 418
Participation rate 64.1 63.7 63.5 63.6 0.1
Employed 140,107 142,220 142,101 142,974 873
Employment-population ratio 58.4 58.4 58.3 58.7 0.4
Unemployed 13,897 12,794 12,544 12,088 -456
Unemployment rate 9.0 8.3 8.1 7.8 -0.3
Not in labor force 86,067 88,340 88,921 88,710 -211
Unemployment rates
Total, 16 years and over 9.0 8.3 8.1 7.8 -0.3
Adult men (20 years and over) 8.7 7.7 7.6 7.3 -0.3
Adult women (20 years and over) 8.1 7.5 7.3 7.0 -0.3
Teenagers (16 to 19 years) 24.5 23.8 24.6 23.7 -0.9
White 7.9 7.4 7.2 7.0 -0.2
Black or African American 15.9 14.1 14.1 13.4 -0.7
Asian (not seasonally adjusted) 7.8 6.2 5.9 4.8 -
Hispanic or Latino ethnicity 11.3 10.3 10.2 9.9 -0.3
Total, 25 years and over 7.7 6.9 6.8 6.6 -0.2
Less than a high school diploma 13.9 12.7 12.0 11.3 -0.7
High school graduates, no college 9.6 8.7 8.8 8.7 -0.1
Some college or associate degree 8.4 7.1 6.6 6.5 -0.1
Bachelor’s degree and higher 4.2 4.1 4.1 4.1 0.0
Reason for unemployment
Job losers and persons who completed temporary jobs 8,028 7,123 7,003 6,535 -468
Job leavers 972 878 942 957 15
Reentrants 3,484 3,380 3,318 3,306 -12
New entrants 1,323 1,311 1,277 1,247 -30
Duration of unemployment
Less than 5 weeks 2,743 2,711 2,844 2,542 -302
5 to 14 weeks 2,902 3,092 2,868 2,826 -42
15 to 26 weeks 2,029 1,760 1,845 1,860 15
27 weeks and over 6,197 5,185 5,033 4,844 -189
Employed persons at work part time
Part time for economic reasons 9,270 8,246 8,031 8,613 582
Slack work or business conditions 5,900 5,342 5,217 5,523 306
Could only find part-time work 2,844 2,576 2,507 2,572 65
Part time for noneconomic reasons 18,329 18,866 18,996 18,736 -260
Persons not in the labor force (not seasonally adjusted)
Marginally attached to the labor force 2,511 2,529 2,561 2,517 -
Discouraged workers 1,037 852 844 802 -
-  Over-the-month changes are not displayed for not seasonally adjusted data. NOTE: Persons whose ethnicity is identified as Hispanic or Latino may be of any race. Detail for the seasonally adjusted data shown in this table will not necessarily add to totals because of the independent seasonal adjustment of the various series. Updated population controls are introduced annually with the release of January data.

Employment Situation Summary Table B. Establishment data, seasonally adjusted

ESTABLISHMENT DATA Summary table B. Establishment data, seasonally adjusted
Category Sept. 2011 July 2012 Aug. 2012(p) Sept. 2012(p)
EMPLOYMENT BY SELECTED INDUSTRY (Over-the-month change, in thousands)
Total nonfarm 202 181 142 114
Total private 216 163 97 104
Goods-producing 33 20 -22 -10
Mining and logging 6 -1 -1 1
Construction 30 3 1 5
Manufacturing -3 18 -22 -16
Durable goods(1) 4 18 -20 -13
Motor vehicles and parts 2.9 12.8 -6.9 -3.4
Nondurable goods -7 0 -2 -3
Private service-providing(1) 183 143 119 114
Wholesale trade -3.0 8.8 7.0 -1.6
Retail trade 14.2 3.2 8.3 9.4
Transportation and warehousing 1.8 14.2 7.7 17.1
Information 34 8 1 -6
Financial activities -6 1 7 13
Professional and business services(1) 59 41 19 13
Temporary help services 23.7 13.0 0.1 -2.0
Education and health services(1) 58 40 25 49
Health care and social assistance 47.5 27.7 22.2 44.5
Leisure and hospitality 20 24 38 11
Other services 3 9 -2 9
Government -14 18 45 10
WOMEN AND PRODUCTION AND NONSUPERVISORY EMPLOYEES(2) AS A PERCENT OF ALL EMPLOYEES
Total nonfarm women employees 49.4 49.3 49.3 49.3
Total private women employees 47.9 47.8 47.8 47.8
Total private production and nonsupervisory employees 82.5 82.6 82.6 82.6
HOURS AND EARNINGS ALL EMPLOYEES
Total private
Average weekly hours 34.4 34.4 34.4 34.5
Average hourly earnings $23.16 $23.52 $23.51 $23.58
Average weekly earnings $796.70 $809.09 $808.74 $813.51
Index of aggregate weekly hours (2007=100)(3) 94.5 95.9 96.0 96.4
Over-the-month percent change 0.4 -0.2 0.1 0.4
Index of aggregate weekly payrolls (2007=100)(4) 104.4 107.6 107.7 108.4
Over-the-month percent change 0.7 -0.1 0.1 0.6
HOURS AND EARNINGS PRODUCTION AND NONSUPERVISORY EMPLOYEES
Total private
Average weekly hours 33.6 33.7 33.7 33.7
Average hourly earnings $19.53 $19.77 $19.76 $19.81
Average weekly earnings $656.21 $666.25 $665.91 $667.60
Index of aggregate weekly hours (2002=100)(3) 101.5 103.5 103.6 103.7
Over-the-month percent change 0.2 0.1 0.1 0.1
Index of aggregate weekly payrolls (2002=100)(4) 132.5 136.7 136.8 137.3
Over-the-month percent change 0.4 0.3 0.1 0.4
DIFFUSION INDEX(5) (Over 1-month span)
Total private (266 industries) 57.9 54.9 51.3 52.8
Manufacturing (81 industries) 53.7 48.8 38.9 39.5
Footnotes (1) Includes other industries, not shown separately. (2) Data relate to production employees in mining and logging and manufacturing, construction employees in construction, and nonsupervisory employees in the service-providing industries. (3) The indexes of aggregate weekly hours are calculated by dividing the current month’s estimates of aggregate hours by the corresponding annual average aggregate hours. (4) The indexes of aggregate weekly payrolls are calculated by dividing the current month’s estimates of aggregate weekly payrolls by the corresponding annual average aggregate weekly payrolls. (5) Figures are the percent of industries with employment increasing plus one-half of the industries with unchanged employment, where 50 percent indicates an equal balance between industries with increasing and decreasing employment. (p) Preliminary
NOTE:  Data in this table have been corrected.  For more information see http://www.bls.gov/bls/ceswomen_usps_correction.htm.
Read Full Post | Make a Comment ( None so far )

America’s Choice: Liberty or Sustainable Development? — Videos

Posted on November 10, 2013. Filed under: American History, Blogroll, Business, College, Communications, Constitution, Demographics, Diasters, Economics, Education, Employment, Enivornment, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Food, Genocide, government, government spending, Health Care, history, Homes, Illegal, Immigration, Inflation, Investments, Language, Law, Legal, liberty, Life, Links, Literacy, media, Narcissism, People, Philosophy, Photos, Politics, Programming, Psychology, Quotations, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Talk Radio, Tax Policy, Unemployment, Video, War, Weapons | Tags: , , , , , , , |

America’s Choice: Liberty or Sustainable Development? (Part 1 of 4)

America’s Choice: Liberty or Sustainable Development? (Part 2 of 4)

America’s Choice: Liberty or Sustainable Development? (Part 3 of 4)

America’s Choice: Liberty or Sustainable Development? (Part 4 of 4)

Agenda 21 For Dummies

How your community is implementing AGENDA 21

Agenda 21, Glenn Beck’s Latest Book Talks w/ UN A21 Expert Rose Koire a Democrat

The Glenn Beck Program – Air Date: Monday, November 19, 2012

The Depopulation Agenda For a New-World-Order Agenda 21

Related Posts On Pronk Palisades

United Nations Agenda 21 — Sustainable Development — Videos

 

Read Full Post | Make a Comment ( None so far )

Obamacare’s Metal Plans (Bronze, Silver, Gold, Platinum) With Higher Premiums and Deductibles — The Road To The Single Government Option Lead Plan — Videos

Posted on October 26, 2013. Filed under: American History, Banking, Blogroll, Communications, Constitution, Diasters, Economics, Education, Federal Government Budget, Fiscal Policy, government, government spending, Health Care, history, History of Economic Thought, Illegal, Immigration, Inflation, IRS, Language, Law, liberty, Life, Links, Macroeconomics, media, Medicine, Monetary Policy, Money, People, Philosophy, Politics, Public Sector, Radio, Rants, Raves, Regulations, Resources, Reviews, Science, Talk Radio, Tax Policy, Taxes, Technology, Unemployment, Unions, Video, War, Wealth, Wisdom | Tags: , , , , , , , |

Project_1

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

Pronk Pops Show 140: September 30, 2013

Pronk Pops Show 139: September 27, 2013

Pronk Pops Show 138: September 26, 2013

Pronk Pops Show 137: September 25, 2013

Pronk Pops Show 136: September 24, 2013

Pronk Pops Show 135: September 23, 2013

Pronk Pops Show 134: September 20, 2013

Pronk Pops Show 133: September 19, 2013

Pronk Pops Show 132: September 18, 2013

Pronk Pops Show 131: September 17, 2013

Pronk Pops Show 130: September 16, 2013

Pronk Pops Show 129: September 13, 2013

Pronk Pops Show 128: September 12, 2013

Pronk Pops Show 127: September 11, 2013

Pronk Pops Show 126: September 10, 2013

Pronk Pops Show 125: September 9, 2013

Pronk Pops Show 124: September 6, 2013

Listen To Pronk Pops Podcast or Download Show 151-156

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 0: Obamacare’s Metal Plans (Bronze, Silver, Gold, Platinum) With Higher Premiums and Deductibles — The Road To The Single Government Option Lead Plan — Videos

Health Pocket.com

http://www.healthpocket.com/individual-health-insurance

HealthCare.gov

https://www.healthcare.gov/

John C. Goodman – Obamacare Costs – 10-08-13

John C. Goodman – Obamacare Rate Increase – 10-15-13

Bret Baier If Problems With Obamacare Continue, ‘There Is Going to Have to Be a Delay’

John C. Goodman – Sticker Shock – 10-22-13

John C. Goodman – Death Spiral – 10-23-13

How to Get Obamacare ( healthcare.gov enrollment instructions )

youtube=http://www.youtube.com/watch?v=ZiHg4veV6q0]

Platinum Plans

Gold Plans

Silver Plans

Bronze Plans

Related Posts On Pronk Palisades

The Pronk Pops Show 155, October 24, 2013, Segment 0: Obama’s Tech Surge Team for Healthcare.gov — Best & Brightest or Dumb, Blind and Deaf — Videos

Read Full Post | Make a Comment ( None so far )

Obama Rejects Republican Offer To Reopen the Federal Government For 6 Months and Suspend and Raise The Debt Ceiling For 6 Weeks– Videos

Posted on October 12, 2013. Filed under: American History, Banking, Blogroll, College, Communications, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, Immigration, Inflation, Investments, IRS, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Monetary Policy, Money, People, Philosophy, Politics, Rants, Raves, Regulations, Reviews, Security, Strategy, Talk Radio, Tax Policy, Taxes, Video, War, Wisdom | Tags: , , , , , |

Government shutdown, debt ceiling: Who will blink first?

Full Program | Friday, October 11, 2013

HEATED President Obama VS House Speaker Boehner over US Government Shutdown

Shutdown Talks “Constructive”, But No Deal – Full White House Press Briefing

Senate Rejects Democratic Debt Limit Extension

Obama Rejects Latest House GOP Offer

President Obama used his weekly radio address to reject the latest offer from House Republicans to end the fiscal stalemate. The outline of their proposal was released Friday and would have reopened government through December and lifted the debt ceiling for six weeks.

“It wouldn’t be wise, as some suggest, to just kick the debt ceiling can down the road for a couple months, and flirt with a first-ever intentional default right in the middle of the holiday shopping season,” Obama said in his address.

“Because damage to America’s sterling credit rating wouldn’t just cause global markets to go haywire; it would become more expensive for everyone in America to borrow money,” Obama continued. “Students paying for college. Newlyweds buying a home,”

On Friday, Senate Republicans floated the outlines of their own plan to end the standoff. Their proposal would lift the debt ceiling through the end of January and reopen the government for six months. The dueling proposals put Obama in the enviable position of choosing between his opponents. He can reject one proposal and still look Presidential by negotiating on a competing offer. Obama said Friday he would look for the “best deal.”

On Saturday, the House Republicans are meeting to finalize the details of the plan they released Friday. Obama’s rejection of even the outlines of that plan make the next moves by the House uncertain. The Senate, meanwhile, moves back to center-stage of the debate with a vote Saturday afternoon on a one-year increase in the debt ceiling.

http://www.breitbart.com/Big-Government/2013/10/12/Obama-Rejects-Latest-House-GOP-Offer

Read Full Post | Make a Comment ( None so far )

Obama’s Thugs Are The Collectivist Authoritarians and Extremists And They Are A Minority That Fear The American People — Videos

Posted on October 4, 2013. Filed under: American History, Blogroll, College, Communications, Constitution, Crime, Culture, Economics, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Genocide, government, government spending, Health Care, history, History of Economic Thought, Homicide, Illegal, Immigration, Inflation, IRS, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, Math, media, People, Philosophy, Photos, Politics, Press, Programming, Public Sector, Rants, Raves, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Taxes, Terrorism, Unemployment, Unions, Video, War, Wealth, Weather, Wisdom | Tags: , , ,