Reviews

Peter Brimelow — Alien Nation: Common Sense About America’s Immigration Disaster — Videos

Posted on July 21, 2014. Filed under: American History, Blogroll, Books, British History, Business, Catholic Church, Communications, Computers, Demographics, Diasters, Economics, Employment, Family, Federal Government, Foreign Policy, Freedom, Friends, government spending, history, Illegal, Immigration, IRS, Islam, Language, Law, Legal, liberty, Life, Links, Literacy, media, Medicine, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Politics, Press, Psychology, Public Sector, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Shite, Strategy, Sunni, Talk Radio, Taxes, Technology, Terrorism, Unemployment, Unions, Video, War, Water, Wealth, Weather, Welfare, Wisdom | Tags: , , , , , , , |

aliennation

peter_brimelow

VDARE.com

What Price Mass Immigration – Peter Brimelow Introduction

 

Peter Brimelow of VDare on How Republican Party Has to be More White

Alien Nation: America’s Immigration Disaster

Mr. Brimelow discussed his book Alien Nation: Common Sense About America’s Immigration Disaster, published by Random House. The book focuses on U.S. immigration policy and cycles of control on immigration. Mr. Brimelow argues that legislation passed in 1965 has resulted in negative trends in immigration to the United States, including an influx of immigrants from a very few countries that he says are engulfing America. The author says that the latest immigration wave consists of immigrants who are less educated, less skilled, and less likely to share American ideals, which he argues is a detriment to American culture.

Peter Brimelow Reflects on Immigration in America, Post-Alien Nation

Michael Coren Interviews Peter Brimelow

Peter Brimelow, Immigration Road to Hell

Peter Brimelow speaks CPAC 2012

Inequality and Immigration (1 of 3)

Inequality and Immigration (2 of 3)

Inequality & Immigration (3 of 3)

Peter Brimelow On Western Culture At The Thomas Jefferson Club

The Libertarian Case Against Open Immigration | Peter Brimelow

Related Articles and Videos

George J. Borjas: Costs of Immigration – Economics Roundtable

 

Read Full Post | Make a Comment ( None so far )

Freak Out On Google Glass Name Tag App — Videos

Posted on February 5, 2014. Filed under: American History, Blogroll, Communications, Computers, Economics, history, Investments, Language, Law, liberty, Life, Links, People, Philosophy, Photos, Politics, Rants, Raves, Resources, Reviews, Science, Strategy, Talk Radio, Technology, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 205: February 5, 2014 

Pronk Pops Show 204: February 4, 2014 

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 202-204

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Story 1: Freak Out On Google Glass Name Tag App —  Videos

name_tag

glass-face-recognition

google-glass-facial-recognition.si_

NameTag – Google Glass Facial Recognition Beta App Demo

World’s First Real-Time Google Glass Facial Recognition App Demo – November 26 2013

NameTag – Facial Recognition App for Google Glass #CES2014

Googlicious : Google Glass gets a new look

Google Glass How-to: Getting Started

How it Feels [through Google Glass]

Google Glass Review

Google Glass eyes-on review

Panel Robert Scoble and Andrew Keen on Google Glass and privacy issues at TNW Conference Europe 2013

Amazing Google Glasses Demonstration at Google I/O 2012

Facebook Using Face Recognition Software

Facebook’s New Facial-Recognition Technology

Facial Recognition Systems Going Mainstream

Chic – Le Freak

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Have you heard about the new dance craze?
Listen to us, I’m sure you’ll be amazed
Big fun to be had by everyone
It’s up to you, it surely can be done

Young and old are doing it, I’m told
Just one try and you too will be sold
It’s called Le Freak! They’re doing it night and day
Allow us, we’ll show you the way

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

All that pressure got you down
Has your head spinning all around
Feel the rhythm, check the rhyme
Come on along and have a real good time

Like the days of stomping at the Savoy
Now we freak, oh what a joy!
Just come on down to 54
Find a spot out on the floor

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Now freak!
I said freak!
Now freak!

All that pressure got you down
Has your head spinning all around
Feel the rhythm, check the ride
Come on along and have a real good time

Like the days of stomping at the Savoy
Now we freak, oh what a joy!
Just come on down 54
Find a spot out on the floor

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Just When You Thought Google Glass Couldn’t Get Creepier: New App Allows Strangers to ID You Just by Looking at You

ave you ever seen someone wearing Google Glass out at the bar? Like a real person at a real bar actually wearing Google Glass? If so, you know how absolutely ridiculous they look. Which may be the only factor we have that will stop this:

A new app will allow total strangers to ID you and pull up all your information, just by looking at you and scanning your face with their Google Glass. The app is called NameTag and it sounds CREEPY.

The “real-time facial recognition” software “can detect a face using the Google Glass camera, send it wirelessly to a server, compare it to millions of records, and in seconds return a match complete with a name, additional photos and social media profiles.”

NEWS: Google Glass Users Can Now Wink to Take Photos, Which Is Horrible

The information listed could include your name, occupation, any social media profiles you have set up and whether or not you have a criminal record (“CRIMINAL HISTORY FOUND” pops up in bright red letters according to the demo).

And NameTag may have already added you to their database.

Two million entries have already been uploaded to FacialNetwork.com. Once the app officially goes live, you can sign up for NameTag and opt-out, instead of the alternative: Having to opt-in to allow them to show your information.

How is that OK?

WATCH: RadioShack’s Awesome Super Bowl Commercial Recruits the Best ’80s Stars

“It’s not about invading anyone’s privacy,” one NameTag’s creators claimed (viaIndependent). “It’s about connecting people that want to be connected. We will even allow users to have one profile that is seen during business hours and another that is seen in social situations. NameTag can make the big, anonymous world we live in as friendly as a small town.”

It may not be about invading anyone’s privacy, but that sounds like what it does. And forcing people to opt-out if they want to maintain their privacy is wrong (we would go so far as to say it should be illegal). But the purported benefits of the app are almost even worse:

They continue, “It’s much easier to meet interesting new people when we can simply look at someone, see their Facebook, review their LinkedIn page or maybe even see their dating site profile. Often we were interacting with people blindly or not interacting at all. NameTag on Google Glass can change all that.”

Gross.

It’s enough to make you root for that app that lets you film Google Glass porn. If you had to pick one. Luckily, Google has banned facial-recognition software from the Glass—for now.

http://www.eonline.com/news/507361/just-when-you-thought-google-glass-couldn-t-get-creepier-new-app-allows-strangers-to-id-you-just-by-looking-at-you

Bay Area Researcher Developing Facial Recognition Glasses To Help Stop Crime

y now, you have probably heard about the Google Glass wearable computer. Soon, a Mountain View startup will begin selling 3-D eyewear with technology so sophisticated, it could help crime fighters stop crime before it happens.

It’s not a new concept. The 2002 Hollywood film “Minority Report” gave us a look into the future when actor Tom Cruise catches and arrests a criminal before he commits the crime.

y now, you have probably heard about the Google Glass wearable computer. Soon, a Mountain View startup will begin selling 3-D eyewear with technology so sophisticated, it could help crime fighters stop crime before it happens.

It’s not a new concept. The 2002 Hollywood film “Minority Report” gave us a look into the future when actor Tom Cruise catches and arrests a criminal before he commits the crime.

Allen Yang is a University of California at Berkeley researcher and founder of Atheer, the startup developing the glasses.

The 3-D glasses are a wearable computer where users are wirelessly immersed in their own computer through virtual images.

“…And it’s streaming live from the internet to your glasses,” said Theo Goguely, senior product manager at Atheer.

The glasses will ultimately be used by business for work or for regular users for entertainment.

One could put on their glasses and instantly see a 3-D screen with a daytime calendar with a list of things to do. The smart glasses can assist users looking at their kitchen cupboard and they will help visualize nutritional needs.

One of its goals is for use by law enforcement. For example, police wearing the glasses could scan a crowd and possibly locate a suspect or a lost child.

This technology could have helped police find the suspects in the Boston Marathon bombing sooner. Although police had images of the suspects, it took investigators days to identify them. Current facial recognition programs were limited in identifying the low resolution images of the suspects from surveillance cameras.

But Yang said Atheer has developed a better mousetrap. Even if 60 percent of the image is corrupted, Yang said his company’s technology can convert it to an identifiable image.

Yang said the program will be available within two or three years and could help police identify known suspects before they commit another crime.

“In the optimal scenario, they can actually get an alert when they’re patrolling on the streets and they can prevent something from happening before even the event happens,” said Yang.

In addition, the program can be used on surveillance cameras on bridges, roads or buildings to help find missing or kidnapped people.

The 3-D glasses will available next month. The cost: $350 for a model that connects to smart phones and $850 for the standalone version.

All of the programs are still in the early stages of development.

http://sanfrancisco.cbslocal.com/2014/02/04/bay-area-researcher-developing-facial-recognition-glasses-to-help-stop-crime/

Read Full Post | Make a Comment ( None so far )

Senator Session Warns Republicans — Immigration Bill is Bad Politics, Bad Policy and Bad Economics — Videos

Posted on January 30, 2014. Filed under: American History, Blogroll, Business, Climate, College, Communications, Constitution, Crime, Culture, Demographics, Diasters, Economics, Education, Employment, Energy, Federal Government, Federal Government Budget, Food, government, government spending, Health Care, history, Illegal, Immigration, Investments, IRS, Language, Legal, liberty, Life, Links, media, Obamacare, People, Philosophy, Photos, Politics, Press, Private Sector, Psychology, Public Sector, Rants, Raves, Regulations, Resources, Reviews, Security, Tax Policy, Taxes, Technology, Terrorism, Unemployment, Unions, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 201: January 201, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

 Senator Session Warns Republicans — Immigration Bill is Bad Politics, Bad Policy and Bad Economics — Videos

Sen Sessions: Immigration Increases Income Inequality – The Real Story W Gretchen Carlson

Jeff Sessions Elite Group With Special Agendas Behind Legislation That Impacts All America

Jeff Session Mocks Gang Of Eight and Special Interest Forces Immigration Debate

Jeff Sessions: ‘Elite Group With Special Agendas’ Behind Legislation That Impacts All Amer

The entire memo is here and worth a read:

Sessions Warns House GOP: Immigration Bill Is Bad Politics, Bad Policy

Offers a better way forward.

By DANIEL HALPER

Yesterday afternoon, before President Obama’s State of the Union Address, Senator Jeff Sessions’ staff hand-delivered to each Republican member of the House an important memo on the so-called immigration reform bill being debated on Capital Hill. The 3-page document, written by Sessions, argues that pushing the current immigration legislation forward is bad politics, bad policy, and that there’s a better way for Republicans.

Jeff Sessions

Sessions believes House Republicans are at risk of falling into President Obama’s trap. “[A]ccording to news reports, House Republican leaders are instead turning 2014 into a headlong rush towards Gang-of-Eight style ‘immigration reform,'” writes Sessions. “They are reportedly drafting an immigration plan that is uncomfortably similar to a ‘piecemeal’ repackaging of the disastrous Senate plan—and even privately negotiating a final package with Democrat activists before consulting with their own members.”

It’s bad politics, Sessions writes. “In the rush to pass an immigration bill, there has been a near absence of any serious thought about the conditions facing American workers. The last 40 years has been a period of record immigration to the U.S., with the last 10 years seeing more new arrivals than any prior 10- year period in history. This trend has coincided with wage stagnation, enormous growth in welfare programs, and a shrinking workforce participation rate. A sensible, conservative approach would focus on lifting those living here today, both immigrant and native-born, out of poverty and into the middle class—before doubling or tripling the level of immigration into the U.S.

A sensible immigration policy would also listen to the opinion of the American people. Not the opinions of the paid-for consultants trotted out with their agenda-driven polls to GOP member meetings—but the actual, honest opinion of the people who sent us here. There is a reason why none of the corporate-funded ads for amnesty breathe a word about doubling immigration levels. According to Rasmussen Reports, working and middle class Americans strongly oppose large expansions of our already generous immigration system. Those earning under $30,000 prefer a reduction to an increase by an overwhelming 3-1 margin.

And bad policy, the senator from Alabama details. “Coordinating with a small group of the nation’s most powerful special interests, last year President Obama and Senate Democrats forced through an immigration bill which can only be described as a hammer blow to the American middle class. Not only would it grant work permits to millions of illegal immigrants at a time of record joblessness, it would also double the annual flow of new immigrant workers and provide green cards to more than 30 million permanent residents over the next decade. These new workers, mostly lesser-skilled, will compete for jobs in every sector, industry, and occupation in the U.S. economy.”

He adds, “House Republicans, in crafting immigration principles, should reply to the President’s immigration campaign with a simple message: our focus is to help unemployed Americans get back to work—not to grant amnesty or to answer the whims of immigration activists and CEOs. In turn, that message could be joined with a detailed and unifying policy agenda for accomplishing that moral and social objective.”

As for Sessions’ “Better Agenda,” he lays it out very precisely:

The GOP’s 2014 agenda should not be to assist the President in passing his immigration plan. Rather, it should be a consuming focus on restoring hope and opportunity to millions of discouraged workers. The GOP’s 2014 agenda should be a national effort—announced proudly and boldly—to reduce the welfare rolls and get America back to work, including:

  •  More American energy that creates good-paying jobs right here in the U.S.
  •  A more competitive tax and regulatory code that allows U.S. businesses and workers tocompete on a level global playing field
  •  A trade policy that increases U.S. exports and expands domestic manufacturing
  •  An immigration policy that serves the interests of the American people
  •  Converting the welfare office into a job training center
  •  Making government leaner and more accountable to U.S. taxpayers
  •  Restoring economic confidence by continuing our effort to balance the federal budget

An all-out immigration push is inimical to these goals.

Rep. Ryan: GOP Looking at Legal Status, Chance for Citizenship

Rep. Paul Ryan (R., Wis.), a leading GOP advocate for tackling immigration, confirmed Wednesday that Republicans are looking to give illegal immigrants legal status right away, with the chance for a green card—and citizenship—down the line.

Officials familiar with the planning had said as much before. But Mr. Ryan is the first member of the GOP leadership to lay out the Republican vision publicly.

At issue is how to handle more than 11 million people already in the U.S. illegally. Most House Republicans oppose the Senate approach, whereby all qualified illegal immigrants would first win legal status, then have the chance to apply for legal permanent residence (also known as a green card), and then for citizenship. House Republicans call that a “special path to citizenship” that is unavailable to those who followed the law.

House Republicans have been talking since last summer about a different approach, and Mr. Ryan laid it out on Wednesday in an interview with MSNBC’s “The Daily Rundown.”

First, illegal immigrants would be offered a “probationary” status, allowing them to work while the government tightened border security and interior enforcement. Officials have explained that this would allow people to work legally while they wait for permanent legal status. (Officials have explained that this group could revert to illegal status if enforcement benchmarks are not met.)

Mr. Ryan said it would make sure that the Obama administration went ahead with the enforcement provisions. “We want to make sure that we write a law that he can’t avoid,” Mr. Ryan said.

After that, they would be eligible for a “regular work permit,” he said.

“If those things are met, you satisfy the terms of your probation, you’re not on welfare, you pay a fine, you learn English and civics, and the border’s been secured and interior enforcement independently verified, then you can get a regular work permit,” he said.

At that point, this group could apply for green cards using the same system available to any newcomer.

“That’s the kind of process we envision,” he said. “Which is not a special pathway to citizenship and it’s not going to automatically in any way give an undocumented immigrant citizenship.”

Some Democrats and immigration advocates have signaled that they could accept this approach, depending on the details. It’s unclear whether enough Republicans would feel the same. The idea will get its first full airing on Thursday afternoon, when House Republicans are scheduled to discuss immigration at their retreat in Cambridge, Md.

http://blogs.wsj.com/washwire/2014/01/29/rep-ryan-gop-looking-at-legal-status-chance-for-citizenship/

Read Full Post | Make a Comment ( None so far )

President Obama’s State of the Union 2014 Address — The Young and The Jobless Betrayed By Obama — Videos

Posted on January 29, 2014. Filed under: Agriculture, American History, Babies, Blogroll, Business, College, Communications, Constitution, Crime, Culture, Demographics, Diasters, Economics, Education, Employment, Energy, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Food, Foreign Policy, Fraud, government, government spending, Health Care, history, History of Economic Thought, Illegal, Immigration, Inflation, Investments, IRS, Language, Law, Legal, liberty, Life, Links, Literacy, Macroeconomics, media, Narcissism, Obamacare, People, Philosophy, Photos, Politics, Press, Private Sector, Psychology, Public Sector, Quotations, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Taxes, Technology, Terrorism, Unemployment, Unions, Video, War, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014 

Pronk Pops Show 198: January 27, 2014 

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 194-200

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

unemployment_minimum_wage

illegal_immigration

2011-0318-origins

USA-Immigration-by-Decadeimmigration_against_population

Story 1: President Obama’s State of the Union 2014 Address — The Young and The Jobless Betrayed By Obama — Videos

Watch the State of the Union – 2014

State of the Union 2014 Address: President Obama’s Full Speech – New York Times

Obama Urges Immigration Reform | State of the Union 2014

STATE OF THE UNION ADDRESS – OBAMA wants to REBUILD the PEOPLES TRUST

State of the Union 2014 Address: Obama on Raising the Minimum Wage – New York Times

Frank Luntz State of the Union Focus Group on The Kelly File – Jan. 28, 2014

Rand Paul Sotu Reaction. Rand Paul State Of The Union Reaction

Sen. Ted Cruz Reaction to the State of the Union Address

FULL SPEECH: Tea Party Response to 2014 State of the Union – Senator Mike Lee

Gohmert’s Reaction to The 2014 State of the Union

Watch the Republican Response to the 2014 State of the Union

Maximum Rage Over The Minimum Wage

Glenn Beck: Obama Became America’s First Dictator During State of the Union 2014

Read Full Post | Make a Comment ( None so far )

U.S. Senate Select Committee on Intelligence Report — TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI, LIBYA, SEPTEMBER 11-12, 2012 January 1, 2014 — General Carter Ham’s Testimony — Benghazi Was A Terrorist Attack — YouTube Video Story Was A Lie – The White House Is The Liars Lair — Videos

Posted on January 15, 2014. Filed under: American History, Banking, Blogroll, College, Communications, Constitution, Crime, Culture, Diasters, Economics, Education, Employment, Energy, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Fraud, Genocide, government, government spending, history, Law, liberty, Life, Links, media, Monetary Policy, Money, Natural Gas, Oil, People, Philosophy, Photos, Politics, Press, Rants, Raves, Regulations, Reviews, Talk Radio, Technology, Terrorism, Video, War, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , |

general_carter_hamm

The head of the U.S. Africa Command, General Carter Ham, told the House Committee on Armed Services in June 2013, according to recently declassified testimony, that Benghazi was immediately considered an attack.

liar-obama-obamacare

Document

Senate Benghazi report

A Sen­ate in­tel­li­gence com­mit­tee re­port re­leased Wed­nes­day places the blame on State De­part­ment and in­tel­li­gence agen­cies for the 2012 ter­ror­ist at­tack in Benghazi.

Senator Intelligence Committee releases Benghazi attack report The Latest News

[youube=http://www.youtube.com/watch?v=jF5VSfqyuCw]

Benghazi Attack New Senate CMTE Report Criticizes Obama Admin’s Response To Benghazi

Jay Carney Scolds Fox’s Ed Henry For ‘Coloring Outside the Lines’ On Benghazi: ‘Come On, Ed’

The Benghazi Transcripts Don’t Lie

General Carter Ham Quickly became clear, Benghazi a terrorist attack not a demonstration

The Truth About The Murders In Benghazi Attack NYT Under Pressure

Benghazi Scandal Told To Keep Quiet NDA Given To Benghazi Survivors At Memorial

Glenn Beck Why Obama Hid the Truth of Benghazi

Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood

SYRIA Geraldo Rivera: My Sources Say The US Running Libya Arms To Syrian Rebels

SYRIA CNBC: Benghazi Is Not About Libya But An Operation To Put Arms & Men In Syria

SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria

Benghazi Scandal – Susan Rice Defends Benghazi Interviews; Has No Regrets – The Real Story

Fox O’Reilly: Obama Appointing Susan Rice Not Insult to Republicans but Defiance to All Americans

Labrador: Susan Rice Response to Benghazi Attack “Shameful”

Susan Rice Caught Lying About Benghazi – Rep. Trey Gowdy Whistleblower Questioning

R Mc Govern: Beyond Benghazi questioning Susan Rice

LIBYA No US Consulate In Benghazi But CIA Operation, Hired Militia Linked To Extremist

White House Knew at 6:07 PM EST That Ansar Al-Sharia Was Behind the Benghazi Attack

Obama Linked to Benghazi Attack

Obama blames the video in his UN speech

Pres. Obama Speech on 9/11/2012 Terrorist Attacks in Libya

Susan Rice on contending with crisis

Susan Rice Interview on Meet the Press – 9/16/12

Susan Rice ‘This Week’ Interview: U.S. Ambassador to UN Discusses Muslim Protest (09/2012)

Benghazi attack: New report shows the real scandal isn’t what Obama called it

By Ryan Teague Beckwith,

The fight over Benghazi isn’t going away, but the reason for the fight may be changing.

In the days after the deadly attack on a U.S. mission in Libya, the political fight centered on whether President Obama had called it terrorism and whether it was a planned or spontaneous attack.

A new bipartisan Senate report released Wednesday, however, focuses more on the failure of the State Department and U.S. intelligence agencies for not preventing the attack.

The report shows several major problems:

• The State Department did not increase security at its sites despite warnings of possible violence.

• The CIA did not share information about the existence of its outpost with the U.S. military.

• The CIA and the State Department were not working out of the same location.

• Libyans charged with protecting the compound did not do their job.

The report doesn’t touch on the more political aspects of the 2012 attack, which led to the death of U.S. Ambassador Chris Stevens and two others. But six Republican senators added a separate note to the report criticizing the Obama administration for delaying the report and for not being transparent.

“Information has been withheld from the Committee because of the ‘ongoing criminal investigation’ into the attacks, in an apparent effort to shield certain government agencies from congressional oversight or potential embarrassment,” they wrote.

But the fact that their criticisms come up as an addendum to the report instead of in the report itself shows the controversy about what happened at Benghazi is shifting in D.C.

http://www.dailynews.com/general-news/20140115/benghazi-attack-new-report-shows-the-real-scandal-isnt-what-obama-called-it

Pentagon labeled Benghazi a terrorist attack as Obama administration wavered: newly declassified testimony

Gen. Carter Ham’s newly declassified testimony before the House suggests the prospect of an out-of-control demonstration was not raised by Defense officials and that they immediately considered the incident an attack.

By Leslie Larson

The Obama administration was wary to label the 2012 attack on the U.S. Consulate in Benghazi as an act of terrorism but declassified testimony from a top Pentagon official indicates there was little ambiguity among Defense Department players that terrorism was the likely motive.

Former U.S. Ambassador to the U.N. Susan Rice represented the Obama administration in discussing the incident in the aftermath of the attack, suggesting the death of Ambassador Chris Stephens and three Americans came as the result of a protest over an incendiary viral video blasting the prophet Mohammad and was not a preplanned act of terrorism.

Rice appeared on CBS’ “Face the Nation,” CNN’s “State of the Union,” NBC’s “Meet The Press,” “Fox News Sunday” and ABC’s “This Week” on Sep. 16, 2012, to speak on behalf of the President and she repeated the belief that the incident was a “spontaneous” mob uprising and not “a preplanned, premeditated attack.”

“This is not an expression of hostility in the broadest sense toward the United States or to U.S. policy,” she stated.

Republicans pounced on Rice’s analysis, claiming she was placating extremists and not adequately representing the national security threat to the American people.

Now testimony by Gen. Carter Ham, head of AFRICOM at the time of attack, before the House Committee on Armed Services in June 2013 suggests that Defense officials did not raise the prospect of an out-of-control demonstration and immediately deemed the incident an attack.

Ham, whose partially redacted transcript was declassified by the House on Monday, said at the 2013 hearing that he was alerted to the incident 15 minutes after it erupted at 9:42 p.m. Libya Time (3:42 p.m. EST) on Sep. 11, 2012.

“When we saw a rocket-propelled grenade attack, what appeared to be pretty well aimed small arms fire — again, this is all coming second and third hand through unclassified, you know, commercial cellphones for the most part initially. To me, it started to become clear pretty quickly that this was certainly a terrorist attack and not just not something sporadic,” he stated.

Ham served as head of the United States Africa Command, which manages U.S. military operations in Africa. He served in that capacity from March 2011 to April 2013.

He describes how as soon as AFRICOM learned of the attack, the command control repositioned a drone to the consulate to gather intelligence on the ground movements. The unmanned, unarmed surveillance aircraft was ordered to be diverted to the Benghazi site at 9:59 p.m. Libya Time, 17 minutes after the attack.

According to the timeline, at 10:32 p.m. Libya Time, Ham briefed then Defense Secretary Leon Panetta and Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, before they traveled to the White House for a pre-scheduled meeting with Obama, during which they briefed Obama on the situation.

During Ham’s briefing with Panetta and Dempsey, before they left for the White House, he said there was a “peripheral” discussion as to the cause but added, “We knew at that initial meeting, we knew that a U.S. facility had been attacked and was under attack.”

“I am not aware of (a demonstration), sir. It became pretty apparent to me, and I think to most at Africa Command pretty shortly after this attack began, that this was an attack,” he told Rep. Howard P. (Buck) McKeon (R-CA), chairman of the House Armed Services Committee.

“We knew at that point that we had two individuals, Ambassador Stevens and Mr. Smith (a Foreign Service information officer), unaccounted for. And so the focus of our effort at that point was gaining understanding of what the situation was. And then we started very quickly to think about, you know, the possibility of a U.S. ambassador being held hostage in a foreign land and what does that mean,” Ham said during his House testimony.

The testimony includes a reference to an Ops Alert announcing the attack that was received in the White House Situation Room at 10:05 p.m. Libya time, but Ham was not privy to what details the alert included.

Panetta’s testimony before the Senate Armed Services Committee in February similarly stated the early belief that the episode was an attack.

“There was no question in my mind that this was a terrorist attack,” Panetta said of his early assessment of the situation on the ground in Benghazi.

Ham’s version of events could discredit the accounts from some Obama officials who were hesitant to state the security threat posed by the attack.

In particular, Rice has been accused of misleading the American public with her statements that the incident was a protest run amok rather than terrorism.

In May 2013, then Secretary of State Hillary Clinton was also implicated in an ABC News report that claimed a State Department official urged the CIA and White House to avoid describing the event as an act of terrorism in public statements.

susan_rice

Susan Rice went on TV talk shows days after the Benghazi attack to speak on behalf of the President. She repeated the belief that the incident was a ‘spontaneous’ mob uprising and not ‘a preplanned, premeditated attack.’

RELATED: STASI: CBS PUTS LARA LOGAN ON LEAVE BUT FIRED RATHER FOR LESS

Leaked emails show that then State Department spokeswoman Victoria Nuland suggested that a CIA memo on Benghazi not include any reference of links to al-Qaeda and the intelligence warnings in the months preceding the attack.

Nuland wrote in protest to the CIA description, saying it “could be abused by members (of Congress) to beat up on the State Department for not paying attention to warnings,” in an email to the White House and the CIA, according to ABC.

The intelligence memo was the basis for Rice’s public statements in September 2012.

The PR spin to describe the attack as spontaneous rather than pre-planned was seen as a move to protect the State Department from being blamed for not adequately providing security and anticipating the attack.

RELATED: CBS ORDERS LOGAN, PRODUCER TO TAKE LEAVE

White House Press Secretary Jay Carney denied any wrongdoing in Rice’s description of the episode, telling the press in May that Rice didn’t have “hard, concrete evidence” to suggest terrorism.

“It was simply a reflection of we did not, and the intelligence community did not, and others within the administration did not, jump to conclusions about who was responsible before we had an investigation to find out the facts,” he said of Rice’s highly criticized assessment of the situation.

Her behavior in the aftermath of the tragedy displeased Congress and is largely to blame for her failure to be appointed Secretary of State after Clinton’s retirement in Obama’s second term.

Instead, Rice was appointed to the role of National Security adviser.

Clinton has defended Rice and said the root motive for the attack was not an important detail to focus on.

“We had four dead Americans. Was it because of a protest or because of guys out for a walk one night and decided to go kill some Americans? At this point what difference does it make, Senator?” Clinton said at a tense Senate hearing in January 2013.

Clinton, a likely contender in the 2016 White House bid, remains defensive as the “Benghazi stain” continues to haunt her legacy.

Read Full Post | Make a Comment ( None so far )

National Security Agency Invades Computers Using Radio Pathway — Crossing The Line Into Criminal Activity — Videos

Posted on January 14, 2014. Filed under: American History, Blogroll, Communications, Computers, Computers, Constitution, Data Storage, Economics, External Hard Drives, External Hard Drives, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Investments, IRS, Language, Law, liberty, Life, Links, media, Mobile Phones, People, Philosophy, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Regulations, Resources, Reviews, Security, Strategy, Systems, Talk Radio, Taxes, Technology, Television, Terrorism, Unemployment, Video, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , |

prism3

NSA could ‘Spy on offline Computers’ | NSA Infiltrates Personal Computers Worldwide

NY Times: NSA Maps Radio Pathway Into Computers — Even If They Are Offline

Report: NSA Intercepts Computer Deliveries

New York Times – Give Edward Snowden Clemency

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

January 14 2014 Breaking News Barack Obama Gun control & NSA worldwide people control last days news

Enemy of the State

N.S.A. Devises Radio Pathway Into Computers

By and JAN. 14, 2014

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.

Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

No Domestic Use Seen

There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s.

“N.S.A.’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”

Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.

President Obama is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services.

Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.

Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”

“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”

From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.’s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.

A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.

That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.

A Focus on Defense

In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States.

“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.

“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”

If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.

The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australia’s help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit.

Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers. When the Chinese place surveillance software on American computer systems — and they have, on systems like those at the Pentagon and at The Times — the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. Obama laid out America’s complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June.

At that session, Mr. Obama tried to differentiate between conducting surveillance for national security — which the United States argues is legitimate — and conducting it to steal intellectual property.

http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?hp&_r=0

Read Full Post | Make a Comment ( None so far )

Record Low Temperatures in United States As Mother Nature Changes Weather and Climate To Global Cooling — The Coming Ice Age — Need Nuclear Power To Keep Warm and Cool — Videos

Posted on January 6, 2014. Filed under: American History, Biology, Blogroll, Books, Business, Chemistry, Climate, Communications, Computers, Culture, Economics, Foreign Policy, government, government spending, history, Language, Law, liberty, Life, Links, media, Non-Fiction, People, Philosophy, Photos, Physics, Politics, Rants, Raves, Regulations, Resources, Reviews, Science, Security, Technology, Video, Water, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 184-187

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Story 1: Record Low Temperatures in United States As Mother Nature Changes Weather and Climate To Global Cooling — The Coming Ice Age — Need Nuclear Power To Keep Warm and Cool — Videos

TIME_Covers

global_cooling

Time-Global-Cooling

global-cooling_time-magazine

060403_DomCNNL3R1

global_warming

war_global_warming

global_warming_time

global_warming_Time_Cover

time_gw_covers_large

polar_bears

gw-time-magazine-ice-age-global-warming

Bloomberg-Cover1

North America set for record low temperatures as cold snap stretches

Arctic freeze hits US Midwest with record low temperatures

What is an Ice Age?

Climate Change in 12 Minutes – The Skeptic’s Case

The Next Ice Age and The Gulf Stream – Future Focus

In Search Of… The Coming Ice Age (1978) [Global Cooling]

Global Cooling: The Coming Ice Age

Dr Matthew J Penn suggests global cooling – new Little Ice Age

Global Cooling || UN Climate Report Reveals Rate Of Global Warming About Half Average Rate – Dobbs

Global Warming or a New Ice Age: Documentary Film

Related Posts On Pronk Palisades

Roy W. Spencer: Why The Global Warming Agenda Is Wrong–Video

Cap and Trade

Glenn Beck Exposes The Crime of The Century By The Progressive Radical Socialist Democratic Party–The Global Warming Investment Fraud, Political Scam and Science Scandal–Extorting and Robbing The American People–Racketeer Influenced and Corrupt Organizations (RICO) Case!

Jeffrey Miron–Obamaomics–Videos

William A. Sprigg, PhD., an IPCC climate scientist, On “Climategate”–Videos

Richard Lindzen, Roy Spencer, and Fred Singer On The Climate and Global Warming Alarmists and Junk Science Computer Models –Videos

Global Warming Is Caused By Man: The Arrogance of Man–The Wrath Of Mother Nature–

Al Gore Global Warming Hot Head Says The Artic Ice Cap Will Disappear In 5-10-15 Years–Volcanoe Gate–Eruptions Melt Ice and Increase Carbon Dioxide!–Videos

Climategate–A Political Scam, Investment Fraud, and Science Scandal of The Century Exposed–The Progressive Radical Socialist’s Big Lie And Con That Man Is The Cause Of Global Warming Was In Fact Nothing More Than Politicians, Investment Bankers, and Government Scientists Creating Climate Crisis!–

Glenn Beck, John Bolton, and Lord Christopher Monckton On Copenhagen 2009 Treaty, Climate Change and World Government–Videos

Lord Christopher Monckton–Climate Change–Treaty–Videos

“We Can Reverse Climate Change”–President Barack Obama–Liar or Fool–Or Both–You Be The Judge!

Time To Sound The Alarm: Call Your Representative and Senators–Cap and Trade Bill to be Voted in U.S. House on Friday–Kill The Cap and Trade Energy Tax Today! UPDATED

Green Government Gestapo Goons: Global Warming Police Force Invades Your Home And Living in Your Home May Be A Crime!

White House Memo: Carbon Dioxide Is Not A Pollutant and A Cap And Trade Program (Carbon Dioxide Tax) Serious Economic Impact –The Smoking Gun Video!

Save Your Job and Life–Abolish The Environmental Protection Agency!

President Obama–Killer of The American Dream and Market Capitalism–Stop The Radical Socialists Before They Kill You!

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY DEBATE–Videos

Facing Fundamental Facts

Let Them Eat Cake Act: American Elites Killing and Starving The American People

Clinton’s Cap and Trade Tax on The American People for Consuming Electricity and Driving Cars, SUVs and Trucks!

The Heidelberg Appeal: Beware of False Gods and Prophets

Saving The World: The Importance of Getting The Priorities Right

Global Warming/Climate Change

Roy Spencer–The Great Global Warming Blunder: How Mother Nature Fooled the World’s Top Climate Scientists –Videos

CO2 is Life: Global Warming Panel Discussion–Videos

William A. Sprigg, PhD., an IPCC climate scientist, On “Climategate”–Videos

Professor Fred Singer–On Climate Change–Videos

Richard Lindzen, Roy Spencer, and Fred Singer On The Climate and Global Warming Alarmists and Junk Science Computer Models –Videos

Al Gore Global Warming Hot Head Says The Artic Ice Cap Will Disappear In 5-10-15 Years–Volcanoe Gate–Eruptions Melt Ice and Increase Carbon Dioxide!–Videos

Climategate–The Political Scam, Investment Fraud, and Science Scandal of The Century Exposed–The Progressive Radical Socialist’s Big Lie And Con That Man Is The Cause Of Global Warming Was In Fact Nothing More Than Politicians, Investment Bankers, and Government Scientists Creating Climate Crisis!–

Glenn Beck, John Bolton, and Lord Christopher Monckton On Copenhagen 2009 Treaty, Climate Change and World Government–Videos

Lord Christopher Monckton–Climate Change–Treaty–Videos

“We Can Reverse Climate Change”–President Barack Obama–Liar or Fool–Or Both–You Be The Judge!

John Holdren–Science Czar–Videos

John Holdren: Global Warming: What Do We Know and Should Do–Videos

The Obama Depression Has Arrived: 15,000,000 to 25,000,000 Unemployed Americans–Stimulus Package and Bailouts A Failure–400,000 Leave Labor Force In July!

Facing Fundamental Facts

Gore Grilled & Gingrich Gouged–American People Oppose Massive Carbon Cap and Trade Tax Increase–Videos

National Center for Policy Analysis–A Global Warming Primer

Global Warming is The Greatest Hoax, Scam and Disinformation Campaign in History

Global Warming Videos

Global Warming Books

Global Warming Sites

The Heidelberg Appeal: Beware of False Gods and Prophets

Read Full Post | Make a Comment ( None so far )

The Men Who Killed Kennedy — Fact and Fiction — Kennedy Must Be Killed — Videos

Posted on January 6, 2014. Filed under: American History, Blogroll, Books, Business, College, Communications, Crime, Culture, Diasters, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiction, Fiscal Policy, government, government spending, history, Homicide, IRS, Law, liberty, Life, Links, media, Non-Fiction, People, Philosophy, Politics, Press, Psychology, Rants, Raves, Regulations, Resources, Reviews, Talk Radio, Taxes, Technology, Terrorism, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , |

jfkTHE MEN WHO KILLED KENNEDY

kennedy_must_be_killed

Kennedy Must Be Killed

As a young CIA officer, Patrick McCarthy witnesses first-hand JFK’s political immaturity and personal recklessness. When Kennedy is elected in 1960, Patrick fears that Kennedy is unprepared to lead the nation in the height of the Cold War. After the near catastrophic events of the Cuban Missile Crisis, The Patriots, a shadowy group of powerful men, decide to take action before Kennedy’s next political blunder destroys the country. Patrick’s devotion to protecting his country ensnares him in the conspiracy to assassinate the president. After the assassination, Patrick assists in orchestrating the Warren Commission cover-up. He realizes too late that he has been duped by those he trusted. Years later, the House Select Committee on Assassinations reopens the investigation and subpoenas Patrick to testify. Patrick grapples with the decision to reveal the truth-a truth which will re-write American history and destroy the reputations and fortunes of some of America’s most powerful men.

KENNEDY MUST BE KILLED chronicles the life of Patrick McCarthy from the time he arrives in postwar Washington D.C. as an idealistic, patriotic young man to that fateful day on the grassy knoll when he destroys the heart of the nation. It is a story about one man’s love for his country, love for his wife and family, and an act of betrayal that causes him to lose everything that he holds dear.

The Men Who Killed Kennedy: Part 1 The Coup d’Etat

The Men Who Killed Kennedy is a video documentary series by Nigel Turner that originally aired in 1988 in England with two one-hour segments about the John F. Kennedy assassination. The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. Three one-hour segments were added in 1991. A sixth segment was added in 1995. Finally, three additional hourly segments were added by the History Channel in November 2003. The ninth segment, titled “The Guilty Men”, directly implicated Lyndon B. Johnson. Within days, Johnson’s widow, Lady Bird Johnson, more of his surviving associates, ex-President Jimmy Carter, and the lone, living Warren Commission commissioner and ex-President Gerald R. Ford immediately complained to the History Channel. They subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. “The Guilty Men” segment was completely withdrawn by the History Channel. Also during the series, French prisoner Christian David named Lucien Sarti as one of three French criminals hired to carry out the assassination of Kennedy, when he was interviewed by author Anthony Summers. This claim is one of the most strongly investigated theories presented on the show.

The Men Who Killed Kennedy: Part 2 The Forces of Darkness

The Men Who Killed Kennedy: Part 3 The Cover-Up

The Men Who Killed Kennedy: Part 4 The Patsy

The Men Who Killed Kennedy, Part 5

The Men Who Killed Kennedy, Part 6

The Men Who Killed Kennedy – Part 7 – The Smoking Guns

The Men Who Killed Kennedy – Part 8 – The Love Affair

The Men Who Killed Kennedy – Part 9 – The Guilty Men

The Men Who Killed Kennedy is a video documentary series by Nigel Turner that originally aired in 1988 in England with two one-hour segments about the John F. Kennedy assassination. The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. Three one-hour segments were added in 1991. A sixth segment was added in 1995. Finally, three additional hourly segments were added by the History Channel in November 2003. The ninth segment, titled “The Guilty Men”, directly implicated Lyndon B. Johnson. Within days, Johnson’s widow, Lady Bird Johnson, more of his surviving associates, ex-President Jimmy Carter, and the lone, living Warren Commission commissioner and ex-President Gerald R. Ford immediately complained to the History Channel. They subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. “The Guilty Men” segment was completely withdrawn by the History Channel. Also during the series, French prisoner Christian David named Lucien Sarti as one of three French criminals hired to carry out the assassination of Kennedy, when he was interviewed by author Anthony Summers. This claim is one of the most strongly investigated theories presented on the show.

  • The Men Who Killed Kennedy

The Men Who Killed Kennedy is a United Kingdom ITV video documentary series by Nigel Turner about the John F. Kennedy assassination. Originally broadcast in 1988 in two parts (with a subsequent studio discussion), it was rebroadcast in 1991 re-edited to three parts with additional material, and a fourth episode added in 1995. The addition of three further episodes in 2003 caused great controversy, particularly in the final episode implicating Lyndon Johnson, and the withdrawal of these additional episodes.

Broadcast history and critical response

1988 to 2003

The Men Who Killed Kennedy began with two 50-minute segments originally aired on 25 October 1988 in the United Kingdom, entitled simply Part One and Part Two. The programmes were produced by Central Television for the ITV network, and was followed three weeks later with a studio discussion on the issues titled The Story Continues, chaired by broadcaster Peter Sissons.

The original broadcast was controversial in Britain. The episodes identified three men as the assassins of Kennedy as three men, deceased drug trafficker Lucien Sarti and two living men. All three were later revealed to have strong alibis: Sarti was undergoing medical treatment in France, another was in prison at the time, and the third had been in the French Navy. One of the two living men threatened to sue, and Central Television’s own subsequent investigation into the allegations revealed they were “total nonsense”. Turner justified his failure to interview one of the accused on the grounds that the individual was “too dangerous”. Turner was censured by the British Parliament. An unsuccessful attempt was made to revoke the franchise of Central Television under British laws against broadcasting inaccuracies, but the Independent Broadcasting Authority did force Central Television to produce a third episode dedicated to the false allegations, aired November 16, 1988, which was later referred to as a “studio crucifixion” of Turner and his inaccuracies. This was the first time the IBA had taken such an action.[2]

The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. In 1989, the series was nominated for a Flaherty Documentary Award. In November 1991, the series was re-edited with additional material and divided into three 50-minute programmes, which were also shown by ITV on consecutive nights. An additional episode appeared in 1995. The series typically aired in November every year and from time to time during the year.

2003 onwards

In November 2003, three additional segments (“The Final Chapter”) were added by the History Channel, entitled, respectively, “The Smoking Guns”, “The Love Affair” and “The Guilty Men”.

“The Love Affair” focussed on the claims of Judyth Vary Baker to have been Lee Harvey Oswald‘s lover in 1963, and to have worked with Oswald and others to develop a cancer-causing biological weapon as part of a CIA plan to assassinate Fidel Castro.[3][4]

The third of these additional segments – “The Guilty Men” – was based substantially on the book Blood, Money & Power: How L.B.J. Killed J.F.K by Barr McClellan.[5] The book and the episode directly implicates former U. S. President Lyndon B. Johnson (LBJ) and its airing in 2003 created an outcry among Johnson’s surviving associates, including Johnson’s widow, Lady Bird Johnson, journalistBill MoyersJack Valenti (longtime president of the Motion Picture Association of America), Jimmy Carter, and the last-living (at the time of the outcry) Warren Commission member Gerald R. Ford. These Johnson supporters lodged complaints of libel with the History Channel, and subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. The History Channel responded by assembling a panel of three historians, Robert DallekStanley Kutler, and Thomas Sugrue. On a program aired April 7, 2004, titles “The Guilty Man: A Historical Review,” the panel agreed that the documentary was not credible and should not have aired. The History Channel issued a statement saying, in part, “The History Channel recognizes that ‘The Guilty Men’ failed to offer viewers context and perspective, and fell short of the high standards that the network sets for itself. The History Channel apologizes to its viewers and to Mrs. Johnson and her family for airing the show.” The channel said it would not show the episode again. Author Barr McClellan, on whose work the episode was largely based, complained that he had tried to cooperate with the reviewing historians to discuss his evidence with them, and had been ignored.[5][6]

Malcolm Liggett, a retired economics professor, sued A&E regarding the episode “The Smoking Guns,” which claimed Liggett was involved in a conspiracy to kill Kennedy. Liggett and A&E reached a settlement, which required that a letter by Liggett be read on the show History Center.[7]

David Browne of Entertainment Weekly described the documentary as “well-researched, but still farfetched”.[8] Addressing “The Guilty Men” episode, Dorothy Rabinowitz of The Wall Street Journal called it a “primitive piece of conspiracy-mongering” and wrote that “…the documentary’s ever deepening mess of charges and motives is never less than clear about its main point — that Lyndon Johnson personally arranged the murder not only of the president, but also seven other people, including his own sister.”[9]

In a letter to the chief executives of the three parent companies of A & E Networks, — Victor F. Ganzi of the Hearst CorporationMichael D. Eisner of Disney, and Robert C. Wrightof NBC — former United States President Gerald Ford described the allegations as “the most damaging accusations ever made against a former vice president and president in American history.”[10]

Episode list

The first two episodes were followed by “The Story Continues” (16 November 1988), a critical studio discussion about them. The final episode was followed by a critical review, “The Guilty Men: A Historical Review.” (7 April 2004).

  1. “The Coup D’Etat” (25 October 1988)
  2. “The Forces Of Darkness” (25 October 1988)
  3. “The Cover-Up” (20 November 1991)
  4. “The Patsy” (21 November 1991)
  5. “The Witnesses” (21 November 1991)
  6. “The Truth Shall Set You Free” (1995)
  7. “The Smoking Guns” (2003)
  8. “The Love Affair” (2003)
  9. “The Guilty Men” (2003)

References

  1. Jump up^ WorldCatThe men who killed Kennedy : the definitive account of American history’s most controversial mystery
  2. Jump up^ Holland, Max“The British JFK Producer Who Brought Shame on the History Channel”. Kennedy Assassination Home Page. Retrieved 6 December 2013.
  3. Jump up^ John C. McAdamsShould We Believe Judyth Baker?, Marquette University
  4. Jump up^ Judyth Vary Baker, “Judyth Baker Responds to Critics”, archived at John C. McAdams‘ website at http://mcadams.posc.mu.edu/sboard.htm
  5. Jump up to:a b Reuters, 12 April 2004, “History Channel Pulls JFK Conspiracy Show”
  6. Jump up^ Bruce Weber, “History Channel Apologizes“, New York Times, April 7, 2004
  7. Jump up^ Grace Murphy, “History Channel, Vero man reach settlement in JFK allegations”, Fort Pierce Tribune, March 19, 2005
  8. Jump up^ Browne, David (November 20, 1992). “The Men Who Killed Kennedy (1992)”EW.com. Entertainment Weekly. Retrieved January 28, 2013.
  9. Jump up^ Rabinowitz, Dorothy (February 19, 2004). “Character Assassination”The Wall Street Journal. Retrieved February 4, 2013.
  10. Jump up^ Weber, Bruce (February 5, 2004). “Moyers and Others Want History Channel Inquiry Over Film That Accuses Johnson”The New York Times (New York). Retrieved March 7, 2013.

http://en.wikipedia.org/wiki/The_Men_Who_Killed_Kennedy

Read Full Post | Make a Comment ( None so far )

Senator Rand Paul Filing Class-Action Lawsuit Against National Security Agency — Videos

Posted on January 4, 2014. Filed under: American History, Blogroll, College, Communications, Computers, Computers, Constitution, Crime, Economics, Education, Employment, External Hard Drives, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government spending, Health Care, history, Inflation, Investments, IRS, Language, Law, liberty, Life, Links, Literacy, Philosophy, Politics, Rants, Raves, Resources, Reviews, Talk Radio, Tax Policy, Taxes, Technology, Terrorism, Video, Wealth, Wisdom, Writing | Tags: , , , , , , |

Sen. Rand Paul Filing Class-Action Lawsuit Against NSA

Rand Paul – Class-Action Lawsuit Against Obama

 

Related Posts On Pronk Palisades

National Security Agency (NSA)  — Thin Thread — Trailblazer — The Program — Stellar Wind: PRISM — NUCLEON — Mainstay — Marina — EVILOLIVE — FASCIA —  XKeyscore — Co-Traveller — Photos — Slides — Videos

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Vide

Read Full Post | Make a Comment ( None so far )

National Security Agency (NSA) — Thin Thread — Trailblazer — The Program — Stellar Wind: PRISM — NUCLEON — Mainstay — Marina — EVILOLIVE — FASCIA — XKeyscore — Co-Traveller — Photos — Slides — Videos

Posted on January 4, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Computers, Constitution, Crime, Economics, Education, Employment, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Inflation, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Photos, Politics, Psychology, Raves, Regulations, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Technology, Television, Terrorism, Unemployment, Video, War, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , |

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Published on Dec 30, 2013

Through a PRISM, Darkly
Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.

Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

Glenn Becks “SURVEILLANCE STATE”

Inside the NSA

Ed Snowden, NSA, and Fairy Tales

AT&T Spying On Internet Traffic

For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”

NSA Whistle-Blower Tells All – Op-Docs: The Program

The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Benny – The Government is Profiling You (The NSA is Spying on You)

‘After 9/11 NSA had secret deal with White House’

The story of Whistleblower Thomas Drake

Whistleblowers, Part Two: Thomas Drake

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Meet Edward Snowden: NSA PRISM Whistleblower

The Truth About Edward Snowden

N.S.A. Spying: Why Does It Matter?

Inside The NSA~Americas Cyber Secrets

NSA Whistleblower Exposes Obama’s Dragnet

AT&T whistleblower against immunity for Bush spy program-1/2

AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program

The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.

AT&T whistleblower against immunity for Bush spy program-2/2

Enemy Of The State 1998 (1080p) (Full movie)

Background Articles and Videos

Stellar Wind

Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]

The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]

In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

PRISM

PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.

A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]

According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]

History

Slide showing that much of the world’s communications flow through the US

Details of information collected via PRISM

PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]

PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]

The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]

Response from companies

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]

Initial Public Statements

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]

Slide listing companies and the date that PRISM collection began

  • Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
  • Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
  • Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
  • Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
  • Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
  • Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]

In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13] The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]

“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]

Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]

The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]

While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]

Post-PRISM Transparency Reports

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000″ user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]

Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]

Response from United States government

Executive branch

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]

Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]

On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]

The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]

The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]

In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]

Legislative branch

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

  • June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

  • June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
  • June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
  • June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

  • June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]

Representative John Boehner (R-OH), Speaker of the House of Representatives

  • June 11 “He’s a traitor”[50] (referring to Edward Snowden)

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

  • June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

  • June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
  • June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]

Senator Mark Udall (D-CO)

  • June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]

Representative Todd Rokita (R-IN)

  • June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]

Senator Rand Paul (R-KY)

  • June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
  • June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]

Representative Luis Gutierrez (D-IL)

  • June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]

Judicial branch

The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.

Applicable law and practice

On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]

After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.

If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]

If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]

Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]

The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]

Involvement of other countries

Australia

The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]

Canada

Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]

Germany

Germany did not receive any raw PRISM data, according to a Reuters report.[59]

Israel

Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.

New Zealand

In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]

United Kingdom

In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]

Domestic response

Unbalanced scales.svg
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)

The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]

Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]

In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]

In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]

The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]

On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]

International response

Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]

Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]

Protests at Checkpoint Charlie in Berlin

The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]

The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]

William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]

Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]

Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]

Russia has offered to consider an asylum request from Edward Snowden.[91]

Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]

Related government Internet surveillance programs

A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]

A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]

http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29

ThinThread

ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]

http://en.wikipedia.org/wiki/ThinThread

Trailblazer

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.

NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]

Background

Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]

The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing

According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]

In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]

Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]

http://www.youtube.com/watch?v=1AXwwSq_me4

Boundless Informant

Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.

Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]

History

Slide showing that much of the world’s communications flow through the US.

Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]

NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]

Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]

Technology

According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]

Legality and FISA Amendments Act of 2008

The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]

The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]

Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]

http://en.wikipedia.org/wiki/Boundless_Informant

ECHELON

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]

The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Organization

UKUSA Community
Map of UKUSA Community countries with Ireland

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

  • the Government Communications Headquarters of the United Kingdom,
  • the National Security Agency of the United States,
  • the Communications Security Establishment of Canada,
  • the Defence Signals Directorate of Australia, and
  • the Government Communications Security Bureau of New Zealand.
  • the National SIGINT Organisation (NSO) of The Netherlands

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]

Controversy

See also: Industrial espionage

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]

Name

The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

  • Hong Kong (since closed)
  • Australian Defence Satellite Communications Station (Geraldton, Western Australia)
  • Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
  • Misawa Air Base (Japan) Map
  • GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
  • Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
  • Sugar Grove (West Virginia, U.S.) Map
  • Yakima Training Center (Washington, U.S.) Map
  • GCSB Waihopai (New Zealand)
  • GCSB Tangimoana (New Zealand)
  • CFS Leitrim (Ontario, Canada)
  • Teufelsberg (Berlin, Germany) (closed 1992)

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:

  • Ayios Nikolaos (Cyprus – U.K.)
  • Bad Aibling Station (Bad Aibling, Germany – U.S.)
    • relocated to Griesheim in 2004[19]
    • deactivated in 2008[20]
  • Buckley Air Force Base (Aurora, Colorado)
  • Fort Gordon (Georgia, U.S.)
  • Gander (Newfoundland & Labrador, Canada)
  • Guam (Pacific Ocean, U.S.)
  • Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
  • Lackland Air Force Base, Medina Annex (San Antonio, Texas)

http://en.wikipedia.org/wiki/ECHELON

Room 641A

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]

Description

Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]

The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]

The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.

Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.

Lawsuit

Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]

More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.

Main article: Hepting v. AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.

http://en.wikipedia.org/wiki/Room_641A

List of government surveillance projects for the United States

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.

http://en.wikipedia.org/wiki/List_of_government_surveillance_projects

Related Posts On Pronk Palisades

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

Breaking Bob Grant Dead At 84 –Talk Radio Path Maker — Rest In Peace — Videos

Posted on January 2, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Culture, Economics, Education, Employment, Entertainment, Fiscal Policy, Heroes, history, Language, Law, liberty, Life, Links, Literacy, media, People, Philosophy, Photos, Politics, Press, Psychology, Radio, Radio, Rants, Raves, Regulations, Reviews, Security, Talk Radio, Unemployment, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , |

bob_grantbob_grant

‘Bob Grant has died. Born March 14, 1929 he was an American radio host whose real name was Robert Ciro Gigante. Grant, who lived in Tom’s River, N.J., died on New Year’s Eve.He was a veteran of radio broadcasting in New York City, and Grant is considered to be a pioneer of the “conservative” and “confrontational” talk radio format who influenced many people after him.He began working in radio in the 1940s at WBBM in Chicago as a radio personality and television talk show host at KNX in Los Angeles, and as an actor. During the Korean War he served in the Naval Reserve. He became sports director at KABC in Los Angeles, where after some substitute appearances he inherited the talk show of Joe Pyne in 1964 and began to build a huge following. Grant hosted three shows on KABC in 1964 titled, “Open Line,” “Night Line,” and “Sunday Line.” Many people were avid listeners of his show and it helped the popularity of the format.He was the father of conservative talkradio.He was known to say: “Good afternoon, Ladies and Gentlemen, and welcome to another hour of the free and open exchange of ideas and opinions in the belief that as American citizens you have the right to hear, and to be heard.”

Bob Grant on “Hannity & Colmes” discusses retiring 1.16.2006 (Sean Hannity)

Bob Grant Celebrates 40 Years on New York Radio

 

Bob Grant Interview: Media Coverage of Obama “Absolutely Sca

Bob Grant’s Emotional Monologue 9.23.2012

Bob Grant 40th Anniversary in New York City Show on WABC 9.20.2010

Howard Stern calls into Bob Grant’s last WOR show 1.13.2006

Bob Grant in “the History of Talk Radio” documentary 1996

Rush Limbaugh Roasts Bob Grant – September 15, 1991

Bob Grant makes fun of Michael Savage hyping his books

Bob Grant on filling in for Michael Savage

The Best of Bob Grant-2000’s Pt 1

The Best of Bob Grant 2007-2012 Pt 2

Bob Grant on CBS News discussing Rush Limbaugh’s prescription drug addiction 10.11.2003

Bob Grant Show-Day after September 11, 2001 (9.12.2001)

Bob Grant attacks ‘the Tea Party’ 1.6.2013

Bob Grant on taking over Joe Pyne’s Show the night of the Kennedy Assassination

WABC 77 New York – Bob Grant GAG (Get At Grant) Hour- Dec 1988

Bob Grant, Father of Conservative Talk Radio, Dead at 84

Veteran New York radio personality Bob Grant — widely credited with inventing the conservative talk-radio format — has died at the age of 84.

Grant, who lived in Tom’s River, N.J., passed away on New Year’s Eve, according to the Branchburg Funeral Home, which is handling the arrangements.

Grant began his career as a controversial talk show host in 1970, when he joined WMCA in New York and quickly bucked the liberal slant of many of the other hosts.

The gravel-voiced talker’s in-your-face opinions and regular telling off of callers often got him in hot water.

He opened his show stating: “Good afternoon, Ladies and Gentlemen, and welcome to another hour of the free and open exchange of ideas and opinions in the belief that as American citizens you have the right to hear, and to be heard.”

He slammed uncouth politicians as “craven bootlickers.” He once said of the Second Coming of Jesus: “He’s not coming back. Look, I don’t believe he’s coming back. I think that’s a myth and I say it.”

Grant routinely signed off with the chant “Get Gaddafi,” in a taunt at Libyan dictator Muammar al-Gaddafi.

In 1973, he called Rep. Benjamin Rosenthal of New York a coward for cancelling an appearance on his show, leading Rosenthal to complain to the Federal Communications Commission.

The case went to the U.S. Court of Appeals and was ultimately thrown out after a judge decided Grant had offered Rosenthal equal time.

Grant left WMCA in 1977 to work for WOR, but was fired for controversial remarks he made in 1979.

“A caller phoned in to the show saying he was upset with a woman who was blaming the police for what happened to her sons. [This woman] was the public relations director or community relations director of WCBS newsradio,” he said.

“I stupidly asked the caller if he knew how she got that job. The caller said he didn’t know and I promptly and arrogantly said, “I will tell you how. She passed the gynecological and pigmentation test — that’s how! … WOR was forced to fire me even though I had given the radio giant the biggest overnight ratings they ever had.”

Grant returned to WMCA in 1980, where his producer was Steve Malzberg, now host of “The Steve Malzberg Show” on Newsmax TV.

“I had grown up listening to Bob Grant so this was a dream come true,” Malzberg said.

“He was an extremely nice guy, a wonderful and funny pioneer who overcame many attempts to turn him into a villain. He persevered and did what he love until the very end.”

In 1984, Grant was hired by WABC, which had switched formats from Top 40 music to all-talk. With its strong signal, Grant was heard by millions of listener in the Northeastern United States.

The station began billing him as “America’s most listened to talk radio personality.”

But Grant got in trouble with WABC in 1996 when he made a mean-spirited crack about Commerce Secretary Ron Brown whose plane had crashed in Croatia.

“My hunch is that [Brown] is the one survivor. I just have that hunch. Maybe it’s because, at heart, I’m a pessimist,” Grant said. Brown, along with 34 others on board, had been killed.

Grant then moved back to WOR and his show became nationally syndicated. His WOR run ended in 2006.

In 2007, he returned to WABC where he stayed for a year and a half, before leaving to host an Internet radio show titled “Straight Ahead!” He again returned to WABC in Sept. 2009, to host a Sunday talk show, retiring last summer because of poor health.

Grant’s family asks that memorial contributions may be made in his memory can be made to the Young America’s Foundation, 110 Elden Street, Herndon, VA 20170 or the New York Police and Fire Widows’ & Childrens’ Benefit Fund, Inc., 767 Fifth Ave., 2614C, New York, NY 10153.

http://www.newsmax.com/Newsfront/Grant-radio-obituary-conservative/2014/01/02/id/544851

Bob Grant

Bob Grant (March 14, 1929 – December 31, 2013) was an American radio host whose real name was Robert Ciro Gigante. A veteran of broadcasting in New York City, Grant is considered a pioneer of the “conservative” and “confrontational” talk radio format.[2][3][4]

Career[edit]

Early work[edit]

Grant graduated from the University of Illinois at Urbana-Champaign with a degree in journalism. He began working in radio in the 1940s at the news department at WBBM (AM) in Chicago, as a radio personality and television talk show host at KNX (AM) in Los Angeles, and as an actor. During the Korean War, he served in the Naval Reserve. [5] He later became sports director at KABC (AM) in Los Angeles, where after some substitute appearances he inherited the talk show of early controversialist Joe Pyne in 1964 and began to build a following. Grant hosted three shows on KABC (AM) in 1964 titled, “Open Line,” “Night Line,” and “Sunday Line.”[6]

Move to New York City (WMCA: 1970–1977)[edit]

Grant came to New York in 1970, where he hosted a talk show on WMCA as the “house conservative”, distinctively out of fashion with both the times and with some countercultural WMCA personalities, including Alex Bennett. His offbeat but combative style (along with Fairness Doctrine requirements of the era) won him seven years on WMCA, with a growing and loyal audience. His sign-off for many years was “Get Gaddafi”, which meant remove Muammar al-Gaddafi, the dictator of Libya, whose anti-Israeli stance was in opposition to Grant’s pro-Israeli feelings.

On March 8, 1973, Grant had scheduled New York Rep. Benjamin S. Rosenthal, who was leading a boycott of meat. Grant later learned that Rosenthal would not appear on his show, and in a discussion with a caller, Grant referred to Rosenthal as a “coward.” Rosenthal then filed a complaint with the F.C.C., and the issue went all the way up to the United States Court of Appeals for the District of Columbia Circuit in Straus Communications v. Federal Communications Commission, United States Court of Appeals for the District of Columbia Circuit, January 16, 1976, Wright, J.[7][8][9] The appeals court ultimately ruled in favor of WMCA and Grant, due to the fact that Grant offered the congressman an invitation to appear on his show, granting Rosenthal equal time.[9]

One of Grant’s most memorable regular callers was Ms. Trivia, who aired her “Beef of the Week”, a series of seemingly trivial complaints. Ms. Trivia was Grant’s guest at a Halloween Festival dinner held at Lauritano’s Restaurant in theBronx, where a young Ms. Trivia, not long out of her teens, revealed herself for the first time to a startled radio audience, many who had expected and assumed, based upon her articulation and intonation, that she would be an elderly, prudish woman. Instead, a statuesque and fashionable Ms. Trivia, wearing an elaborate Victorian costume, was the surprise guest seated next to Grant at the dais table along with several political figures from New York. The following day the majority of calls to the show were for the purpose of obtaining information about the mysterious Mm. Trivia, with Grant in his typical manner finally in exasperation hanging up on the callers, shouting, “THIS IS NOT Mm. TRIVIA’S SHOW!”[10]

A linguistic “hoax” trivia question originated on Grant’s WMCA show in 1975, “There are three words in the English language that end in -gry. Two of them are angry and hungry. What is the third?”[11] While at WMCA, Grant attracted attention in 1975 from a commentary he recorded titled, “How Long Will You Stand Aside.”[12] Grant also released an LP record in 1977 titled, “Let’s Be Heard,” which was a recording of a speech Grant gave before a synagogue in New York. Grant left WMCA in 1977.

WOR AND WWDB[edit]

In 1979, radio host Barry Farber, fought with WMCA station manager Ellen Straus to rehire Grant. Farber broadcast during the 4-7 P.M. weekday timeslot on WMCA. When asked by Straus at a meeting if Farber was willing to give up his airtime for Grant, Farber replied, “Yes he can have my time. I’d rather he have my time than no time at all.”[13] While away from WMCA, Grant went up the dial to New York’s WOR (AM) for a time, where he was fired for controversial remarks. Grant describes the remarks that got him fired from WOR:

I had done my nightly show on WOR and a caller phoned in to the show saying he was upset with a woman who was blaming the police for what happened to her sons. I had read the story the man was referring to and noted that the woman, who was very angry with the police, was the public relations director or community relations director of WCBS newsradio. I stupidly asked the caller if he knew how she got that job. The caller said he didn’t know and I promptly and arrogantly said, “I will tell you how. She passed the gynecological and pigmentation test — that’s how!” Not only did that turn off Roger Ailes, but WOR was forced to fire me even though I had given the radio giant the biggest overnight ratings they ever had.[14]

After being fired from WOR, Grant worked at WWDB in Philadelphia. Grant had gone back to WMCA after working at WWDB in Philadelphia. It was reported upon Grant’s departure that his ratings had slipped to number 23 out of 39 shows during the 4-7 P.M. weekday timeslot.[15]

WABC (1984–1996)[edit]

In 1984, WABC (AM) in New York City hired Grant to join their new talk station. He first hosted a show from 9-11pm, before moving to the 3-6pm afternoon time slot. The Bob Grant Show consistently dominated the ratings in the highly competitive afternoon drive time slot in New York City and at one point the radio station aired recorded promos announcing him as “America’s most listened to talk radio personality.” The gravel-voiced Grant reminded listeners during the daily introduction that the “program was unscripted and unrehearsed”.

Grant’s long stay at WABC ended when he was fired for a remark about the April 3, 1996 airplane crash involving Commerce Secretary Ron Brown. Grant remarked to caller named, Carl of Oyster Bay (Carl Limbacher, later of NewsMaxfame), “My hunch is that [Brown] is the one survivor. I just have that hunch. Maybe it’s because, at heart, I’m a pessimist.” When Brown was found dead, Grant’s comments were widely criticized, and several weeks later, after a media campaign, his contract was terminated.[16]

Return to WOR (1996–2006)[edit]

After being fired, Grant moved down the dial to WOR to host his show in the same afternoon drive-time slot. Grant’s age began to show while broadcasting at WOR. He was less engaging with the callers, and not as energetic during his broadcasts. For a time, the Bob Grant show went into national syndication, but has been a local only show since 2001. Grant and his WABC replacement Sean Hannity would sometimes throw jabs at each other. Hannity defeated Grant in the ratings from 2001–2006.[17][18]

Grant’s WOR run ended on January 13, 2006. Grant’s ratings were not to blame for his departure, according to the New York Post, which mentioned that the decision was reached because the station’s other shows had niche audiences to garner more advertising dollars.[19] On January 16, 2006, shortly after Grant’s last WOR show, Grant appeared on Sean Hannity’s radio show and TV program Hannity & Colmes, where his former competitor paid tribute to him. Having left his options open for “an offer he cannot refuse,” Grant returned to WOR in February 2006, doing one minute “Straight Ahead” commentaries which aired twice daily after news broadcasts until September 2006. On September 8, 2006 Grant again appeared on Hannity’s show to provide a post-retirement update, which led to premature rumors that Grant was returning to WABC.[20][21] Grant then made various isolated radio appearances. He appeared as a guest host on WFNY (now WXRK) on December 7, 2006, and was interviewed by attorney Anthony Macri for Macri’s WOR show on February 24, 2007.

Post-Retirement: Return to WABC and Internet broadcasting[edit]

His guest appearances became more frequent beginning in July 2007. On July 7, 2007, he guest hosted for John R. Gambling, and appeared on Mark Levin’s show (which is networked from WABC) on July 10. Grant, guest hosted for Jerry Agar on July 9, 10, 11 and re-appeared as a fill-in host again for John Gambling on August 20 and 21. Then, on August 22, while appearing on Hannity’s show, he announced that he was returning as a regular host to WABC, in the 8–10 PM slot that at the time was filled by Agar. It would later be revealed, on what was Agar’s final show a few hours later, that he would be starting effective immediately, as Grant took over the final segments of the show. His first full show on ABC since 1996 was on August 23. The story of Grant’s return, as reported by the New York Daily News, had been discovered only a couple of hours before Grant’s official announcement.

Grant’s stint lasted less than a year and a half, until his regular nightly show was pulled by WABC in late November 2008 as part of a programming shuffle stemming from the debut of Curtis Sliwa’s national show, and later Mark Levin’s show expanding to three hours, leaving no room for Grant.[22] Grant did his most recent AM radio work as guest host filling in for Michael Savage on January 21, 2009, Mark Levin on March 23, 2009, and Sean Hannity on July 31, 2009.[22]

During the week of July 6, 2009 Grant began hosting an Internet radio show titled Straight Ahead! which originally ran Monday through Friday from 8 to 9 a.m. Eastern time on UBATV.com.[23] As a webcast, the show differed from Grant’s radio shows, in that the viewer watched Grant as he did his broadcast. The first two months of Straight Ahead! were from inside Grant’s home, and were run with technical assistance from independent filmmaker Ryan O’Leary.[24]New York radio personalities Richard Bey and Jay Diamond were also brought on board to broadcast their own one hour shows. Grant mentioned that he did not get paid to do the UBATV show, but believes that Internet broadcasting is the future.[25][26]

Beginning in September 2009, Grant reduced Straight Ahead! from five days a week down to two (Mondays and Wednesdays from 10 to 11 a.m Eastern time). Grant also moved the show from his home to a professional studio. Due to a low number of callers to the show, Grant usually interviewed only guests for the hour. On January 13, 2010, Grant did his last UBATV show. Grant’s last UBATV show and his last WOR show both fell on the date of January 13.

On September 13, 2009, Grant returned to WABC for a third stint at the station, doing a weekly Sunday talk show from 12pm to 2pm. Grant’s return to AM broadcasting has allowed him to continue interacting with his fan base through greater listenership and participation than his previous internet radio show provided. At the close of his first show, he expressly thanked the management of the station for “inviting him back” and said he looked forward to continuing this joint venture every week for the foreseeable future. Grant issued a statement in October 2012 that his October 7 broadcast would be his last, but then rescinded that message after the show, labeling it a “mistake” and an attempt to grab attention. He then took off a short time for medical work, and when he returned to the air, it was for a shortened 1pm to 2pm Sunday show (current as of November 2012). Bob Grant’s last show on WABC was July 28, 2013 when he retired due to ill health.

Grant also prepares weekly columns for his website, www.BobGrantOnline.com. The site was originally sponsored by NewsMax. As of February 19, 2013, Grant has discontinued his editorials.

Characteristics of Grant’s radio shows[edit]

This section of a biography of a living person does not include any references or sources. Please help by adding reliable sources. Contentious material about living people that is unsourced or poorly sourced must be removed immediately(January 2010)

Grant’s political philosophy generally followed American conservatism, but with some lurches into populism, libertarianism, conspiracy theory, and unorthodoxy (such as being pro-choice and anti-Flag Desecration Amendment). Grant was known for using a number of catchphrases on his show, such as “You’re a fake, a phony, and a fraud!”,[27] “Straight ahead”, “Get off my phone!”, “Anything and everything is grist for our ever-grinding mill”, and his closing line, “Your influence counts. Use it.” His opening line was used as the title of his 1996 book, Let’s Be Heard, a title representing an abbreviated version of his original opener, “And let’s be heard! Good afternoon, Ladies and Gentlemen, and welcome to another hour of the free and open exchange of ideas and opinions in the belief that as American citizens you have the right to hear, and to be heard.” Before his daily monologue, Grant would ask the rhetorical question, “And what’s on your mind today, hmmm?”, and would sometimes call women “chickie-poos”. He occasionally referred to women as “broads” and when certain undesirable, lacklustre or contentious women were combative he referenced them as “several miles of bad road”. One of his favorite put-downs was to refer to someone as a “cacazote”. During the 1988 presidential bid of Michael Dukakis, this term took on a natural segue as Grant often referred to him as “Dukacazote”. He also referred to feckless politicians as “craven bootlickers,” especially when elected officials would cave in to political pressures, and Grant accused them of “folding like a cheap camera”. Due to his Italian heritage, Grant frequently used Italian slang words to describe callers or other individuals calling them gavones (crude or uncultured persons), stunads (stupid, thick, dense) or chiacchorones (persons who talk excessively). During his second stint at WOR, Grant often closed his show with the phrase, “Somebody’s got to say these things, it has to be me!” As a resident of Manalapan, New Jersey in the late-1990s, he considered running for statewide office, but eventually decided against it.

Grant occasionally made on-air reference to an always unheard, ethereal Beatrice-like presence à la Dante’s Paradiso section in The Divine Comedy, “The Lady Josephine”, to whom he constantly paid obeisance. His son, Jeff Grant, a traffic reporter with a different station, would call in occasionally. Grant made frequent references to the REO Diner in Woodbridge, New Jersey, his regular haunt.

For many years Grant closed each show with the exclamation, “Get Khadafy!” This was apparently an allusion to the practice of Roman statesman Cato the Elder ending his speeches with a call for the destruction of Carthage even if he had not been discussing Carthage in the speech. When Khadafy was finally killed in the 2012 Libyan civil war, Grant praised the decision.

When once asked by the caller George the Atheist whether he believed in God, Grant replied, “What if I tell you, George, that sometimes I do and sometimes I don’t?” On his July 21, 2005 broadcast, Grant, a baptized and raised Roman Catholic, unequivocally stated to the same caller his opinion on the Second Coming of Jesus: “He’s not coming back. Look, I don’t believe he’s coming back. I think that’s a myth and I say it. I don’t trumpet it but if a person asks — and you know one thing for sure, I’ve been deadly honest, dead-on honest all the time I’ve been on the air talking to people and they ask me questions or they make a comment that elicits a response, they are going to get an honest response. It may always not be ‘correct’ but it’s honest.” Grant has since stated that he is not an atheist.

Like many hosts in the talk radio format, Grant had his battery of usual callers that added interest to the show. John from Staten Island, Jimmy from Brooklyn, Al from Chappaqua, Greg from Chatham, David from Irvington, Dorothy from Montclair, Hal from North Bergen (at the time an undercover FBI agent provocateur posing as a white supremacist, he later went rogue), patients rights activist Eddie Carbone, and the popular Frank from Queens were some of the frequent callers. A few quasi-fictitious characters (played by Grant) were also employed during the show such as, ‘Julian P. Farquar, Dexter Pogue, Rantz Greeb, Paul “needlenose” Monage, and Lucy Shagnasty.

Over the years, Grant has made a number of statements on his shows that critics have described as racist. For example, he was quoted in the Newsday of June 2, 1992, as saying “Minorities are the Big Apple’s majority, you don’t need the papers to tell you that, walk around and you know it. To me, that’s a bad thing. I’m a white person.” In his book, Grant defended this statement by writing that he did not intend to put down other races, but only intended to express that “no one likes to be in the minority,” and that America can only survive by retaining its “humane, west European culture.” Thus, he supports ending bilingualism and multiculturalism, two policies of which he has been highly critical.

On October 15, 2008, Grant said “Did you notice Obama is not content with just having several American flags, plain old American flags with the 50 states represented by 50 stars? He has the ‘O’ flag. [...] He had the flag painted over, and the ‘O’ for Obama. Now,…these things are symptomatic of a person who would like to be a potentate — a dictator.” The “O” flag to which Grant referred was, in fact, the state flag of Ohio.

Grant distinguished himself from other conservative talk show hosts by calling for Obama to release his long form birth certificate, prior to Obama releasing it.[28]

Although Grant is generally known as being a conservative, he has been a critic of hard-lined conservative advocates in primary races, including the Tea Party movement’s candidates. This has been a frequent debate topic between Grant and his callers over the past few years. During the fall election of 2010, Grant criticized candidates, such as Christine O’Donnell, Rand Paul, and Sharron Angle. Grant endorsed Charlie Crist over Marco Rubio on a July 10, 2010 broadcast for the Florida senate primary. On a May 8, 2011 broadcast, Grant informed his audience that he supported the moderate Jon Huntsman, Jr. for the Republican nomination for president, although he would later go on to supportMitt Romney.[29]

Influences and legacy[edit]

Being largely the innovator of his own particular talk radio style, Grant previously worked with the likes of Barry Gray and Joe Pyne. Pyne would often end each broadcast with “Straight Ahead” which is something Grant picked up, leading many to believe that Grant was the first host to frequently use that line.

Over the years, national radio talk personality Howard Stern has made differing remarks on his admiration for Grant as an early influence. Upon Stern’s arrival in New York, he cited Grant as an influence,[30] but as Stern’s stardom rose, Grant became the subject of ridicule on Stern’s show. During Stern’s prime, he denied being influenced by Grant or having respect for him.[31] Stern has also frequently criticized Grant for changing his act to appease management.[31]Grant told Paul D. Colford, author of the 1996 Stern bio, Howard Stern: King of All Media, about being approached at a public appearance by Ben Stern, Howard’s father, with a teenage Howard in tow. Father introduced son to Grant and told him of Howard’s desire to go into radio. “I looked at this big, gawky kid and I said to him, ‘Just be yourself,'” Grant recalled. Stern has denied Grant’s version of the story.[31] Soon after Grant’s firing from WABC, and before his first WOR show, Grant appeared as a call-in guest on Stern’s radio show. In more recent years, Stern began to praise Grant’s legacy,[32] and called in on his last WOR show in 2006.[33]

Glenn Beck now uses the catchphrase “Get off my phone!” as a spinoff of Grant’s earlier call-in talk show style, as do Tom Scharpling and Mark Levin; similarly, Sean Hannity often uses Grant’s phrase “Straight ahead.”

In 2002, industry magazine Talkers ranked Grant as the 16th greatest radio talk show host of all time.[34]

On March 28, 2007 Bob Grant was nominated for induction into the National Radio Hall of Fame.[35]

Radio & Records had planned to issue a Lifetime Achievement Award to Grant during its annual convention in March 2008; however, the award was revoked in January 2008 for “past comments by him that contradict our values and the respect we have for all members of our community.”[36] Several talk radio hosts have spoken out against the decision; Neal Boortz has stated:

I usually try not to miss the Radio & Records talk radio convention… Not this year. Maybe never again. R&R has succumbed to political correctness… I don’t call for boycotts. But I do think it would be wonderful to see talk show hosts refuse to appear at this convention… What we have seen here in this revocation of the award to Bob Grant is simple pandering to political correctness. Nothing more, nothing less.[37]

Sean Hannity, Opie and Anthony, Comedian Jim Norton, Lars Larson, Rush Limbaugh, Mark Levin, Lionel and Howard Stern opposed the move as well, with Levin stating “I am disgusted with the mistreatment of Bob Grant. I am fed up with the censors, intimidators, and cowards in this business.”[this quote needs a citation] Don Imus deemed the award unimportant, offered to return awards he had received after treating them to his sledgehammer and block of wood, and called Grant’s comments “stupid”, although he also referred to Grant as a “legendary broadcaster.”[38]

http://en.wikipedia.org/wiki/Bob_Grant_(radio)

Read Full Post | Make a Comment ( None so far )

God Is Behind Going Duck Crazy — Duck Dynasty Phil Robertson Suspended From Show For Expressing Views On Gays — Will Not Inherit The Kingdom of God — I’m With Phil — Photos & Videos

Posted on December 19, 2013. Filed under: American History, Art, Art, Blogroll, Business, Comedy, Communications, Culture, Economics, Education, Employment, Entertainment, Heroes, history, liberty, Life, Links, media, Music, People, Philosophy, Politics, Programming, Radio, Rants, Raves, Religion, Resources, Reviews, Security, Talk Radio, Technology, Television, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Merry Christmas and Happy New Year 

Merry-Christmas-Happy-New-Year

Pronk Pops Show 185: January 2, 2014

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 184

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 0: God Is Behind Going Duck Crazy — Duck Dynasty Phil Robertson Suspended From Show For Expressing Views On Gays — Will Not Inherit The Kingdom of God — I’m With Phil — Photos & Videos

 

Phil-Robertsonphil-robertson-meme_2A&E Networks 2012 Upfront - InsidePhil-Robertson5jpgphil_on_foundersA+E Networks 2013 Upfront-3Si-Robertson

Phil+Robertson_friends

phil_robertson_baseballxt0pn55t0rG_Phil_Robertson_football_photo

phil_robertson_quarterbackp_robertson_crusadephil_robertson_words

I am Second® – The Robertsons

Duck Dynasty : Phil’s Way of Life

Duck Dynasty: Unknown Facts About The Robertsons

The Best of Uncle Si

Duck Dynasty : Si Struck

Duck Dynasty: Si’s New Toy

Duck Dynasty: Si’s Dating Tips

Duck Dynasty : Hey

Uncle Si Robertson “ICY STARE” HILARIOUS DUCK DYNASTY ( 720P HD )

Duck Commanders Phil and Willie Robertson Interview – CONAN on TBS

The Robertson’s of Duck Dynasty Talk About How Their Faith in Jesus Turned Around Their Lives!!

Duck Commander Phil Robertson Talks About Why This Country Needs More Jesus

Duck Commander Phil Robertson from Duck Dynasty spoke to the congregation of Saddleback church in July on why people need Jesus and why the founders would agree — and I gotta say it was awesome. I watched it last night and knew I had to post it for you guys. Duck Commander’s message is really simple, that people need to love God and love each other and he delivers it beautifully. He really is a fantastic preacher.

‘Duck Dynasty’ star: Homosexuality wrong

Phil Robertson Duck Dynasty Suspended GQ Anti-Gay -Black Racist Comments Suspension

‘Duck Dynasty’ Star Makes Shocking ‘Gay is Sin’ Comment

Duck Dynasty dared to mention Jesus

‘Duck Dynasty’ star slammed over anti-gay rant

By Andrea Morabito

Phil Robertson, patriarch of the “Duck Dynasty” clan, is being slammed for controversial comments he made about homosexuality in an interview in the January issue of GQ.

“It seems like, to me, a vagina—as a man—would be more desirable than a man’s anus. That’s just me,” Robertson told the magazine. “I’m just thinking: There’s more there! She’s got more to offer. I mean, come on, dudes! You know what I’m saying? But hey, sin: It’s not logical, my man. It’s just not logical.”

When the reporter asked Robertson what he found sinful, he said “Start with homosexual behavior and just morph out from there. Bestiality, sleeping around with this woman and that woman and that woman and those men.”

The self-proclaimed Bible-thumper then went on to paraphrase Corinthians: “Don’t be deceived. Neither the adulterers, the idolaters, the male prostitutes, the homosexual offenders, the greedy, the drunkards, the slanderers, the swindlers—they won’t inherit the kingdom of God. Don’t deceive yourself. It’s not right.”

On Wednesday, GLAAD called Robertson’s statements “vile” and “littered with outdated stereotypes.”

“Phil and his family claim to be Christian, but Phil’s lies about an entire community fly in the face of what true Christians believe,” said GLAAD spokesperson Wilson Cruz. “He clearly knows nothing about gay people or the majority of Louisianans — and Americans — who support legal recognition for loving and committed gay and lesbian couples.

“Phil’s decision to push vile and extreme stereotypes is a stain on A&E and his sponsors who now need to reexamine their ties to someone with such public disdain for LGBT people and families.”

An A&E spokesman had no comment, but Robertson released his own statement responding to the controversy.

“I myself am a product of the 60s; I centered my life around sex, drugs and rock and roll until I hit rock bottom and accepted Jesus as my Savior,” he said. “My mission today is to go forth and tell people about why I follow Christ and also what the Bible teaches, and part of that teaching is that women and men are meant to be together.

“However, I would never treat anyone with disrespect just because they are different from me. We are all created by the Almighty and like Him, I love all of humanity. We would all be better off if we loved God and loved each other.”

“Duck Dynasty” has been a ratings phenomenon for A&E, drawing 11.8 million viewers to its fourth season premiere last August, the most-watched nonfiction series telecast in cable history.

Its fifth season premieres on Jan. 15.

http://nypost.com/2013/12/18/duck-dynasty-member-slammed-for-comments-on-homosexuality/

Related Posts On Pronk Palisades

Three Cheers for Phil Robertson —  Duck Dynasty, Free Speech, and Religious Freedom Win One — GLAAD IS SAD —  Live With It and Move On — Videos

Related Posts On Pronk Pops

The Pronk Pops Show 184, December 19, 2013, Segment 1: Bubbles Ben Bernanke Bumps Bubble of Quantitative Easing Down By $10 Billion Per Month — Near Zero Interest Rate Policy Will Continue Well Into 2014 –Last Press Conference — Videos

Read Full Post | Make a Comment ( None so far )

Bubbles Ben Bernanke Bumps Bubble of Quantitative Easing Down By $10 Billion Per Month — Near Zero Interest Rate Policy Will Continue Well Into 2014 –Last Press Conference — Videos

Posted on December 18, 2013. Filed under: American History, Banking, Blogroll, College, Communications, Constitution, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, Inflation, Investments, IRS, Language, Law, liberty, Life, Links, Macroeconomics, media, Microeconomics, Monetary Policy, Money, People, Philosophy, Politics, Public Sector, Regulations, Resources, Reviews, Strategy, Talk Radio, Tax Policy, Taxes, Technology, Unemployment, Unions, Video, War, Wealth, Wisdom | Tags: , , , , |

Merry Christmas and A Happy New Year

Merry-Christmas-Happy-New-Year

Pronk Pops Show 185: January 2, 2014

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 184

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 1: Bubbles Ben Bernanke Bumps Bubble of Quantitative Easing Down By $10 Billion Per Month — Near Zero Interest Rate Policy Will Continue Well Into 2014 –Last Press Conference — Videos

Bernanke-press-conference-Dec-18-2

Bernanke on Fed taper in 90 seconds

Fed Chairman Ben Bernanke’s Final Speech

Press Conference with Chairman of the FOMC, Ben S. Bernanke

FED Downgrades Economic Outlook & Says It Will Not Change Policy – Stuart Varney

US Federal Reserve to pull back on stimulus program in economic vote of confidence

Assessing the Ben Bernanke Legacy

Background Articles and Videos

Max Keiser Discusses QE & Rigged Global Markets

Peter Schiff Was Right – ‘Taper’ Edition (Dec 18, 2013 Update)

Peter Schiff We’re in Depression, Dollar Crisis Coming

Peter Schiff Money Causes Economic Crises – Peter Schiff Economic Crisis – Peter Schiff Money

Related Posts On Pronk Pops

The Pronk Pops Show 184, December 19, 2013, Segment 0: God Is Behind Going Duck Crazy — Duck Dynasty Phil Robertson Suspended From Show For Expressing Views On Gays — Will Not Inherit The Kingdom of God — I’m With Phil — Photos & Videos

Read Full Post | Make a Comment ( None so far )

U.S. District Court Rules National Security Agency (NSA)’s Phone Surveillance Program Unconstitutional — Videos

Posted on December 16, 2013. Filed under: American History, Blogroll, College, Communications, Computers, Computers, Constitution, Demographics, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government spending, history, Law, liberty, Life, Links, media, People, Philosophy, Politics, Press, Radio, Rants, Raves, Regulations, Reviews, Security, Strategy, Technology, Terrorism, Video, War, Wisdom | Tags: , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 174-182

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 0: U.S. District Court Rules National Security Agency (NSA)’s Phone Surveillance Program Unconstitutional — Videos

Judge rules NSA spying program likely unconstitutional

Federal Judge Rules NSA Spying On All American Phone Calls Unconstitutional

OBAMA defends Massive NSA Spying PRISM program. Taps in to Data of Apple, Google, Skype, Verizon

Sen. Paul Applauds the Protection of Fourth Amendment Rights

Dec 16, 2013

WASHINGTON, D.C. - Sen. Rand Paul today issued the following statement applauding the U.S. District Court ruling that deemed the National Security Agency’s (NSA) phone surveillance program unconstitutional:

“I commend U.S. District Court Judge Richard Leon for upholding and protecting our Fourth Amendment rights. This decision represents an important first step in having the constitutionality of government surveillance programs decided in the regular court system rather than a secret court where only one side is presented,” Sen. Paul said. “In June, I introduced the Fourth Amendment Restoration Act which, if enacted, would have restored our Constitutional rights and declared that the Fourth Amendment shall not be construed to allow any agency of the United States government to search the phone records of Americans without a warrant based on probable cause. The NSA phone surveillance program is a blatant abuse of power and an invasion of our privacy. This ruling reminds the Federal government that it is not above the law. I will continue to fight against the violations of American’s Constitutional rights through illegal phone surveillance until it is stopped once and for all.”

Related Posts On Pronk Pops

The Pronk Pops Show 182, December 16, 2013, Segment 1: Republican Senators and Representatives Traitors To The Principle of Fiscal Responsibility and Conservative and Tea Party Movement — Republican Conservative, Libertarian and Tea Party Base Will Take Out The Republican Budget Big Interventionist Government Spenders — Videos

Read Full Post | Make a Comment ( None so far )

Obama’s October Surprise: The August 2012 8.1% Unemployment Rate That Declined To 7.8 for September 2012 Faked and Manipulated By Census Bureau for Political Reasons — Jack Welch Was Right — Happy Birthday Jack — Video

Posted on November 19, 2013. Filed under: American History, Blogroll, College, Communications, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, Inflation, Investments, Law, liberty, Links, Literacy, media, People, Philosophy, Photos, Politics, Raves, Regulations, Reviews, Talk Radio, Unemployment, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , |

Now

November 19, 2013

gdp_large

Unemployment Rate

Series Id:           LNS14000000 Seasonally Adjusted Series title:        (Seas) Unemployment Rate Labor force status:  Unemployment rate Type of data:        Percent or rate Age:                 16 years and over

unemployment_rate

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 4.0 4.1 4.0 3.8 4.0 4.0 4.0 4.1 3.9 3.9 3.9 3.9
2001 4.2 4.2 4.3 4.4 4.3 4.5 4.6 4.9 5.0 5.3 5.5 5.7
2002 5.7 5.7 5.7 5.9 5.8 5.8 5.8 5.7 5.7 5.7 5.9 6.0
2003 5.8 5.9 5.9 6.0 6.1 6.3 6.2 6.1 6.1 6.0 5.8 5.7
2004 5.7 5.6 5.8 5.6 5.6 5.6 5.5 5.4 5.4 5.5 5.4 5.4
2005 5.3 5.4 5.2 5.2 5.1 5.0 5.0 4.9 5.0 5.0 5.0 4.9
2006 4.7 4.8 4.7 4.7 4.6 4.6 4.7 4.7 4.5 4.4 4.5 4.4
2007 4.6 4.5 4.4 4.5 4.4 4.6 4.7 4.6 4.7 4.7 4.7 5.0
2008 5.0 4.9 5.1 5.0 5.4 5.6 5.8 6.1 6.1 6.5 6.8 7.3
2009 7.8 8.3 8.7 9.0 9.4 9.5 9.5 9.6 9.8 10.0 9.9 9.9
2010 9.8 9.8 9.9 9.9 9.6 9.4 9.5 9.5 9.5 9.5 9.8 9.3
2011 9.1 9.0 8.9 9.0 9.0 9.1 9.0 9.0 9.0 8.9 8.6 8.5
2012 8.3 8.3 8.2 8.1 8.2 8.2 8.2 8.1 7.8 7.9 7.8 7.8
2013 7.9 7.7 7.6 7.5 7.6 7.6 7.4 7.3 7.2 7.3

Series Id:           LNS11300000
Seasonally Adjusted
Series title:        (Seas) Labor Force Participation Rate
Labor force status:  Civilian labor force participation rate
Type of data:        Percent or rate
Age:                 16 years and over

Labor_Force_Participation_Rate
Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 67.3 67.3 67.3 67.3 67.1 67.1 66.9 66.9 66.9 66.8 66.9 67.0
2001 67.2 67.1 67.2 66.9 66.7 66.7 66.8 66.5 66.8 66.7 66.7 66.7
2002 66.5 66.8 66.6 66.7 66.7 66.6 66.5 66.6 66.7 66.6 66.4 66.3
2003 66.4 66.4 66.3 66.4 66.4 66.5 66.2 66.1 66.1 66.1 66.1 65.9
2004 66.1 66.0 66.0 65.9 66.0 66.1 66.1 66.0 65.8 65.9 66.0 65.9
2005 65.8 65.9 65.9 66.1 66.1 66.1 66.1 66.2 66.1 66.1 66.0 66.0
2006 66.0 66.1 66.2 66.1 66.1 66.2 66.1 66.2 66.1 66.2 66.3 66.4
2007 66.4 66.3 66.2 65.9 66.0 66.0 66.0 65.8 66.0 65.8 66.0 66.0
2008 66.2 66.0 66.1 65.9 66.1 66.1 66.1 66.1 66.0 66.0 65.9 65.8
2009 65.7 65.8 65.6 65.7 65.7 65.7 65.5 65.4 65.1 65.0 65.0 64.6
2010 64.8 64.9 64.9 65.1 64.9 64.6 64.6 64.7 64.6 64.4 64.6 64.3
2011 64.2 64.2 64.2 64.2 64.2 64.0 64.0 64.1 64.2 64.1 64.1 64.0
2012 63.7 63.9 63.8 63.6 63.8 63.8 63.7 63.5 63.6 63.8 63.6 63.6
2013 63.6 63.5 63.3 63.3 63.4 63.5 63.4 63.2 63.2 62.8

Rick Santelli Rages Against Media Over ‘Manipulated’ Unemployment Data Allegations

October 5th 2012 CNBC Stock Market Squawk Box (September Jobs Report)

Jobless Rate Drops Bellow 8 Percent – Jack Welch Weighs in On Cavuto!!

Jay Carney Swats Away ‘Conspiracy Theories’ About Faked 2012 Employment Data – 11-19-2013

Jack Welch: Jobs Data Too Good to Be True – CNBC’s The Kudlow Report

Jack Welch on Hardball w/Chris Matthews

Anderson Cooper Goes After Jack Welch Over Unemployment Numbers

UnEmployment Rate – New Jobs Report – Steve Forbes: Jack Welch Is Right!

Peter Schiff Explains the Questionable Unemployment Figures on his Dec. 7, 2012 Show

Census ‘faked’ 2012 election jobs report

By John Crudele

November 18, 2013 | 8:06pm

In the home stretch of the 2012 presidential campaign, from August to September, the unemployment rate fell sharply — raising eyebrows from Wall Street to Washington.

The decline — from 8.1 percent in August to 7.8 percent in September — might not have been all it seemed. The numbers, according to a reliable source, were manipulated.

And the Census Bureau, which does the unemployment survey, knew it.

Just two years before the presidential election, the Census Bureau had caught an employee fabricating data that went into the unemployment report, which is one of the most closely watched measures of the economy.

And a knowledgeable source says the deception went beyond that one employee — that it escalated at the time President Obama was seeking reelection in 2012 and continues today.

“He’s not the only one,” said the source, who asked to remain anonymous for now but is willing to talk with the Labor Department and Congress if asked.

The Census employee caught faking the results is Julius Buckmon, according to confidential Census documents obtained by The Post. Buckmon told me in an interview this past weekend that he was told to make up information by higher-ups at Census.

Ironically, it was Labor’s demanding standards that left the door open to manipulation.

Labor requires Census to achieve a 90 percent success rate on its interviews — meaning it needed to reach 9 out of 10 households targeted and report back on their jobs status.

Census currently has six regions from which surveys are conducted. The New York and Philadelphia regions, I’m told, had been coming up short of the 90 percent.

Philadelphia filled the gap with fake interviews.

“It was a phone conversation — I forget the exact words — but it was, ‘Go ahead and fabricate it’ to make it what it was,” Buckmon told me.

Census, under contract from the Labor Department, conducts the household survey used to tabulate the unemployment rate.

Interviews with some 60,000 household go into each month’s jobless number, which currently stands at 7.3 percent. Since this is considered a scientific poll, each one of the households interviewed represents 5,000 homes in the US.

Buckmon, it turns out, was a very ambitious employee. He conducted three times as many household interviews as his peers, my source said.

By making up survey results — and, essentially, creating people out of thin air and giving them jobs — Buckmon’s actions could have lowered the jobless rate.

Buckmon said he filled out surveys for people he couldn’t reach by phone or who didn’t answer their doors.

But, Buckmon says, he was never told how to answer the questions about whether these nonexistent people were employed or not, looking for work, or have given up.

But people who know how the survey works say that simply by creating people and filling out surveys in their name would boost the number of folks reported as employed.

Census never publicly disclosed the falsification. Nor did it inform Labor that its data was tainted.

“Yes, absolutely they should have told us,” said a Labor spokesman. “It would be normal procedure to notify us if there is a problem with data collection.”

Census appears to have looked into only a handful of instances of falsification by Buckmon, although more than a dozen instances were reported, according to internal documents.

In one document from the probe, Program Coordinator Joal Crosby was ask in 2010, “Why was the suspected … possible data falsification on all (underscored) other survey work for which data falsification was suspected not investigated by the region?”

On one document seen by The Post, Crosby hand-wrote the answer: “Unable to determine why an investigation was not done for CPS,” or the Current Population Survey — the official name for the unemployment report.

With regard to the Consumer Expenditure survey, only four instances of falsification were looked into, while 14 were reported.

I’ve been suspicious of the Census Bureau for a long time.

During the 2010 Census report — an enormous and costly survey of the entire country that goes on for a full year — I suspected (and wrote in a number of columns) that Census was inexplicably hiring and firing temporary workers.

I suspected that this turnover of employees was being done purposely to boost the number of new jobs being report each month. (The Labor Department does not use the Census Bureau for its other monthly survey of new jobs — commonly referred to as the Establishment Survey.)

Last week I offered to give all the information I have, including names, dates and charges to Labor’s inspector general.

I’m waiting to hear back from Labor.

I hope the next stop will be Congress, since manipulation of data like this not only gives voters the wrong impression of the economy but also leads lawmakers, the Federal Reserve and companies to make uninformed decisions.

To cite just one instance, the Fed is targeting the curtailment of its so-called quantitative easing money-printing/bond-buying fiasco to the unemployment rate for which Census provided the false information.

So falsifying this would, in essence, have dire consequences for the country.

http://nypost.com/2013/11/18/census-faked-2012-election-jobs-report/

New York Post Claims Census Falsifies Unemployment Figures

The New York Post is reporting an absolute bombshell story if true.  They claim the September 2012 unemployment report was manipulated and survey data was faked, just in time for the election.  The story quotes anonymous sources, insiders from the Census Bureau who claim to have falsified survey data for the unemployment report.

The decline — from 8.1 percent in August to 7.8 percent in September — might not have been all it seemed. The numbers, according to a reliable source, were manipulated.

And the Census Bureau, which does the unemployment survey, knew it.

Not only is the Post claiming the September 2012 unemployment surveys were manipulated but this is still going on today.  The Census actually caught one employee fabricating the unemployment statistics by falsifying survey results which should be answered by respondents.

Just two years before the presidential election, the Census Bureau had caught an employee fabricating data that went into the unemployment report, which is one of the most closely watched measures of the economy.

And a knowledgeable source says the deception went beyond that one employee — that it escalated at the time President Obama was seeking reelection in 2012 and continues today.

The story might very well be true.  The unemployment rate comes from surveys, sent out to 60,000 households spread out over 2,025 geographical areas of the country..  The Bureau of Labor Statistics gives great detail into the methodology used for these surveys.  The fraud reported by the New York Post comes from the 2200 Census employees who conduct the phone interviews each month for the Household survey.  Instead of doing their job and recording the answers from the interview questions of these households, a few individuals are falsifying the survey results.  If employees were falsifying interviews and this fudging of surveys is done with enough households, such fraud could skew the unemployment rate.

“He’s not the only one,” said the source, who asked to remain anonymous for now but is willing to talk with the Labor Department and Congress if asked.

The Census employee caught faking the results is Julius Buckmon, according to confidential Census documents obtained by The Post. Buckmon told me in an interview this past weekend that he was told to make up information by higher-ups at Census.

The Post claims the Census Bureau demands a 90% interview response rate and certain regions of the country that is hard to get.  So personnel are fudging the results and filling in the survey.  There might certainly be truth to this as employees are under pressure to produce results, no one answers their phones these days and who wants to be bothered by some Census Bureau employee asking a lot of obnoxious questions?

What is more odious is the BLS is not publishing actual response rates for the household survey.  If the Post article is true and the Census expects a 90% or greater response rate, that seems a little ridiculous demand by itself.  Below is a short explanation on how the unemployment report statistics are collected.  Read it and then imagine being part of this survey.  How accurate would you be or even responsive over time?

The survey is conducted by the U.S. Census Bureau for the Bureau of Labor Statistics. Each month, during the calendar week including the 19th day, Census interviewers contact households by telephone and in person and ask questions regarding the labor market activity of household members during the previous calendar week which included the 12th day of the month—the reference week. Personal visits are preferred in the first month in which the household is in the sample. At the first visit, interviewers prepare a roster of the household members including their demographic characteristics and their relationship to the person maintaining the household, and enter the information via laptop computers, along with responses to all survey questions.

In the months following the first interview, the interview is generally conducted by telephone. The household roster is checked for accuracy and brought up to date in each interview. About 10 percent of households are interviewed via computer-assisted telephone interviewing (CATI) by staff in three centralized calling centers. Other telephone interviews are collected by field representatives. A personal visit is generally attempted for the fifth interview. At the end of each day’s interviewing, the data are transmitted over secure telecommunications lines to the Census Bureau’s central computer in Washington, DC.

From the number of households and individual Census employees it is clear the Census would have to falsify many interviews to actually skew the survey results enough to manipulate the unemployment rate.  The Post story quotes the employee already busted for falsifying survey interview responses that he did so on the demand from management at the Census Bureau.

The question of intentional hoodwinking for political agendas versus low paid workers having to interview people all day on a quota is really unanswered.  Yet none of that matters.  If any portion of this story is true, it means data integrity is compromised.  All sorts of policies, funds, legislation and even Wall Street are tied to the unemployment rate.  Suspecting fictional statistics, just the concept, could result in no confidence of government statistics.  That is an unmitigated disaster on a host of fronts.

Census appears to have looked into only a handful of instances of falsification by Buckmon, although more than a dozen instances were reported, according to internal documents.

In one document from the probe, Program Coordinator Joal Crosby was ask in 2010, “Why was the suspected … possible data falsification on all (underscored) other survey work for which data falsification was suspected not investigated by the region?”

On one document seen by The Post, Crosby hand-wrote the answer: “Unable to determine why an investigation was not done for CPS,” or the Current Population Survey — the official name for the unemployment report.

With regard to the Consumer Expenditure survey, only four instances of falsification were looked into, while 14 were reported.

We look at the unemployment statistics in great detail every month and the way to prove the Census is falsifying data is by a probability and error margin analysis check.  Such an analysis is quite involved.  To detect Census employee fraud, such an analysis should be performed on individual employee interview results.  This still leaves the question of how honest actual survey respondents are as well.  In terms of statistical accuracy, we’ve never liked the Household survey.  The error margin is too great and we believe the Census should cross correlate survey results with other labor market metrics for a reality check.  While not a poll, a survey is just that, asking people to volunteerinformation.  To make matters worse, recently some of the revisions to GDP methodology are truly questionable and the last thing America needs is even more manipulated or skewed economic statistics

At the time the September 2012 unemployment report was released, the results were so extreme we compared it to falling through a worm hole in statistical space.  Yet that month is not the only one which seems to be skewed.  Every month we analyze these reports digging out the figures to explain the unbelievable, such as the unemployment rate dropping dramatically while the net gain of those employed is basically static.

We question the conspiracy element of the Post story that the Census would actually falsify the unemployment rate to skew an election.  The reason that seems absurd is the press pays no attention to the pathetic labor market and neither Presidential candidate in 2012 was offering a damn thing to actually increase jobs.  It is also doubtful a sudden drop in the unemployment rate would sway the election results, even though the official unemployment rate sweeps millions of Americans needing a job under the political and statistical rug.

What could very well be true is an increasing nonresponse rate to Census survey unemployment questions.  Generally speaking people do not have the time, feel obligated to answer such surveys or even pick up a land line, unlike 50 years ago.  We also question how honest people are who do answer surveys as well as the type of person to respond versus those who do not.  Just by asking individuals would seem to put bias into the sampling group.  One would think America could obtain more accurate data collection methods than a survey in order to find out what people are doing each month for work.  After all, the NSA knows every single thing we say or do these days.

http://www.economicpopulist.org/content/new-york-post-claims-census-falsifies-unemployment-figures-5436

Then

October 5, 2012

Over 23 Million Americans Looking For A Full Time Job As The Total Unemployment Rate U-6 Unchanged At 14.7%–Unemployment Rate U-3 Drops To 7.8% The Same Rate As January 2009!–Obama’s October Surprise As GDP Growth Rate Falls–Videos

Describing “Shadow Government Statistics” — John Williams 

Unemployment Rate Falls to 7.8% on New Jobs Report

BREAKING: U.S. Adds 114,000 Jobs, Unemployment Rate Drops to 7.8 

October 5th 2012 CNBC Stock Market Squawk Box (September Jobs Report) 

Today’s report includes a surprise drop in the unemployment rate-but it is statistically questionable. Payroll numbers continued modest improvement. The unemployment rate unexpectedly dropped to 7.8 percent, following a decline to 8.1 percent in August. Payroll jobs in September gained about as expected with a modest 114,000 increase, following an rise in August of 142,000 (originally up 96,000) and an increase of 181,000 in July (previous estimate of 141,000). The net revisions for July and August were up 86,000. Market expectations were for a 113,000 boost for September.

Private payrolls advanced 104,000 in September after increasing 97,000 the month before. The consensus projected a 130,000 increase.

Wage inflation has been volatile and the latest number was on the up side. Average hourly earnings growth improved to 0.3 percent in September, following no change in August. Analysts forecast a 0.2 percent rise. The average workweek nudged up to 34.5 hours in September from 34.4 hours in August. Expectations were for 34.4 hours.

Turning to the household survey, the unemployment rate drop reflected an 873,000 spike in household employment versus a 368,000 drop in August. The labor force rebounded 418,000 after a 368,000 decrease in August. The household survey is much smaller than the payroll survey and is more volatile

September Unemployment Falls to 7.8% 

Jack Welch Hardball w/Chris Matthews 10/5/12 

Jack Welch, the lionized former chairman of General Electric Co, provoked cries of outrage in Washington on Friday when he appeared to accuse the White House of manipulating September job figures for political gains.
White House officials dismissed as “ludicrous” a tweet Welch sent to his more than 1.3 million followers that suggested U.S. President Barack Obama’s administration rigged the data as a way of recovering from a poor Wednesday night showing in a debate against Mitt Romney, his Republican challenger for the White House.

“Unbelievable jobs numbers..these Chicago guys will do anything..can’t debate so change numbers,” Welch said in a posting on Twitter, apparently referring to Obama, who formerly served as a senator from Illinois.

The tweet was repeated more than 2,000 times, with many mocking posts comparing Welch to New York real estate tycoon Donald Trump – who during his failed bid for the presidency loudly argued that Obama was not born in the United States – and Clint Eastwood, who gave a widely panned speech to an empty chair at the Republican National Convention in August.
Officials in Washington quickly dismissed the idea that the Labor Department report – which showed U.S. unemployment falling to a four-year low of 7.8 percent – could be rigged.
“That’s a ludicrous comment. No serious person believes that the bureau of labor statistics manipulates its statistics,” said Alan Krueger, chairman of the White House Council of Economic Advisers. “The jobs report and all of their other statistics are prepared by career employees. They use the same process every month. They use the same process for Republican and Democratic administrations.”

The tweet was by no means Welch’s first criticism of Obama on his Twitter feed, where he has regularly spoken out in favor of Romney, as well as weighing in on sports. During the presidential debate in Denver, Colorado, on Wednesday night, Welch tweeted: “HOW can anyone vote for Obama after this performance..he has demonstrated his incompetence.”

Word of the Day: Unemployment (U3 and U6) 

FACT CHECK: LABOR SECRETARY SOLIS MISLEADS ON JOBS REVISIONS 

The AFL-CIO Reacts to the September BLS Jobs Report 

Employment Level

142,974,000

Series Id:           LNS12000000
Seasonally Adjusted
Series title:        (Seas) Employment Level
Labor force status:  Employed
Type of data:        Number in thousands
Age:                 16 years and over

Employment Level

Employment Level

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 136559(1) 136598 136701 137270 136630 136940 136531 136662 136893 137088 137322 137614
2001 137778 137612 137783 137299 137092 136873 137071 136241 136846 136392 136238 136047
2002 135701 136438 136177 136126 136539 136415 136413 136705 137302 137008 136521 136426
2003 137417(1) 137482 137434 137633 137544 137790 137474 137549 137609 137984 138424 138411
2004 138472(1) 138542 138453 138680 138852 139174 139556 139573 139487 139732 140231 140125
2005 140245(1) 140385 140654 141254 141609 141714 142026 142434 142401 142548 142499 142752
2006 143150(1) 143457 143741 143761 144089 144353 144202 144625 144815 145314 145534 145970
2007 146028(1) 146057 146320 145586 145903 146063 145905 145682 146244 145946 146595 146273
2008 146397(1) 146157 146108 146130 145929 145738 145530 145196 145059 144792 144078 143328
2009 142187(1) 141660 140754 140654 140294 140003 139891 139458 138775 138401 138607 137968
2010 138500(1) 138665 138836 139306 139340 139137 139139 139338 139344 139072 138937 139220
2011 139330(1) 139551 139764 139628 139808 139385 139450 139754 140107 140297 140614 140790
2012 141637(1) 142065 142034 141865 142287 142415 142220 142101 142974
1 : Data affected by changes in population controls.

Civilian Labor Force

155,063,000

Series Id:           LNS11000000
Seasonally Adjusted
Series title:        (Seas) Civilian Labor Force Level
Labor force status:  Civilian labor force
Type of data:        Number in thousands
Age:                 16 years and over

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 142267(1) 142456 142434 142751 142388 142591 142278 142514 142518 142622 142962 143248
2001 143800 143701 143924 143569 143318 143357 143654 143284 143989 144086 144240 144305
2002 143883 144653 144481 144725 144938 144808 144803 145009 145552 145314 145041 145066
2003 145937(1) 146100 146022 146474 146500 147056 146485 146445 146530 146716 147000 146729
2004 146842(1) 146709 146944 146850 147065 147460 147692 147564 147415 147793 148162 148059
2005 148029(1) 148364 148391 148926 149261 149238 149432 149779 149954 150001 150065 150030
2006 150214(1) 150641 150813 150881 151069 151354 151377 151716 151662 152041 152406 152732
2007 153144(1) 152983 153051 152435 152670 153041 153054 152749 153414 153183 153835 153918
2008 154075(1) 153648 153925 153761 154325 154316 154480 154646 154559 154875 154622 154626
2009 154236(1) 154521 154143 154450 154800 154730 154538 154319 153786 153822 153833 153091
2010 153454(1) 153704 153964 154528 154216 153653 153748 154073 153918 153709 154041 153613
2011 153250(1) 153302 153392 153420 153700 153409 153358 153674 154004 154057 153937 153887
2012 154395(1) 154871 154707 154365 155007 155163 155013 154645 155063
1 : Data affected by changes in population controls.

Labor Force Participation Rate

63.6%

Series Id:           LNS11300000
Seasonally Adjusted
Series title:        (Seas) Labor Force Participation Rate
Labor force status:  Civilian labor force participation rate
Type of data:        Percent or rate
Age:                 16 years and over

Labor Force Participation Rate

Labor Force Participation Rate

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 67.3 67.3 67.3 67.3 67.1 67.1 66.9 66.9 66.9 66.8 66.9 67.0
2001 67.2 67.1 67.2 66.9 66.7 66.7 66.8 66.5 66.8 66.7 66.7 66.7
2002 66.5 66.8 66.6 66.7 66.7 66.6 66.5 66.6 66.7 66.6 66.4 66.3
2003 66.4 66.4 66.3 66.4 66.4 66.5 66.2 66.1 66.1 66.1 66.1 65.9
2004 66.1 66.0 66.0 65.9 66.0 66.1 66.1 66.0 65.8 65.9 66.0 65.9
2005 65.8 65.9 65.9 66.1 66.1 66.1 66.1 66.2 66.1 66.1 66.0 66.0
2006 66.0 66.1 66.2 66.1 66.1 66.2 66.1 66.2 66.1 66.2 66.3 66.4
2007 66.4 66.3 66.2 65.9 66.0 66.0 66.0 65.8 66.0 65.8 66.0 66.0
2008 66.2 66.0 66.1 65.9 66.1 66.1 66.1 66.1 65.9 66.0 65.8 65.8
2009 65.7 65.8 65.6 65.6 65.7 65.7 65.5 65.4 65.1 65.0 65.0 64.6
2010 64.8 64.9 64.9 65.1 64.9 64.6 64.6 64.7 64.6 64.4 64.5 64.3
2011 64.2 64.2 64.2 64.2 64.2 64.1 64.0 64.1 64.1 64.1 64.0 64.0
2012 63.7 63.9 63.8 63.6 63.8 63.8 63.7 63.5 63.6

Unemployment Level

12,088,000

Series Id:           LNS13000000
Seasonally Adjusted
Series title:        (Seas) Unemployment Level
Labor force status:  Unemployed
Type of data:        Number in thousands
Age:                 16 years and over

Unemployment Level

Unemployment Level

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 5708 5858 5733 5481 5758 5651 5747 5853 5625 5534 5639 5634
2001 6023 6089 6141 6271 6226 6484 6583 7042 7142 7694 8003 8258
2002 8182 8215 8304 8599 8399 8393 8390 8304 8251 8307 8520 8640
2003 8520 8618 8588 8842 8957 9266 9011 8896 8921 8732 8576 8317
2004 8370 8167 8491 8170 8212 8286 8136 7990 7927 8061 7932 7934
2005 7784 7980 7737 7672 7651 7524 7406 7345 7553 7453 7566 7279
2006 7064 7184 7072 7120 6980 7001 7175 7091 6847 6727 6872 6762
2007 7116 6927 6731 6850 6766 6979 7149 7067 7170 7237 7240 7645
2008 7678 7491 7816 7631 8395 8578 8950 9450 9501 10083 10544 11299
2009 12049 12860 13389 13796 14505 14727 14646 14861 15012 15421 15227 15124
2010 14953 15039 15128 15221 14876 14517 14609 14735 14574 14636 15104 14393
2011 13919 13751 13628 13792 13892 14024 13908 13920 13897 13759 13323 13097
2012 12758 12806 12673 12500 12720 12749 12794 12544 12088

Unemployment Rate U-3

7.8%

Series Id:           LNS14000000
Seasonally Adjusted
Series title:        (Seas) Unemployment Rate
Labor force status:  Unemployment rate
Type of data:        Percent or rate
Age:                 16 years and over

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 4.0 4.1 4.0 3.8 4.0 4.0 4.0 4.1 3.9 3.9 3.9 3.9
2001 4.2 4.2 4.3 4.4 4.3 4.5 4.6 4.9 5.0 5.3 5.5 5.7
2002 5.7 5.7 5.7 5.9 5.8 5.8 5.8 5.7 5.7 5.7 5.9 6.0
2003 5.8 5.9 5.9 6.0 6.1 6.3 6.2 6.1 6.1 6.0 5.8 5.7
2004 5.7 5.6 5.8 5.6 5.6 5.6 5.5 5.4 5.4 5.5 5.4 5.4
2005 5.3 5.4 5.2 5.2 5.1 5.0 5.0 4.9 5.0 5.0 5.0 4.9
2006 4.7 4.8 4.7 4.7 4.6 4.6 4.7 4.7 4.5 4.4 4.5 4.4
2007 4.6 4.5 4.4 4.5 4.4 4.6 4.7 4.6 4.7 4.7 4.7 5.0
2008 5.0 4.9 5.1 5.0 5.4 5.6 5.8 6.1 6.1 6.5 6.8 7.3
2009 7.8 8.3 8.7 8.9 9.4 9.5 9.5 9.6 9.8 10.0 9.9 9.9
2010 9.7 9.8 9.8 9.9 9.6 9.4 9.5 9.6 9.5 9.5 9.8 9.4
2011 9.1 9.0 8.9 9.0 9.0 9.1 9.1 9.1 9.0 8.9 8.7 8.5
2012 8.3 8.3 8.2 8.1 8.2 8.2 8.3 8.1 7.8

Unemployment Rate U-6

14.7%

Series Id:           LNS13327709 

Seasonally Adjusted 
Series title:        (seas) Total unemployed, plus all marginally attached workers 
                      plus total employed part time for economic reasons, as a percent of all civilian labor force
                      plus all marginally attached workers 
Labor force status:  Aggregated totals unemployed 
Type of data:        Percent or rate 
Age:                 16 years and over 
Percent/rates:       Unemployed and mrg attached and pt for econ reas as percent of labor force 
                     plus marg attached

Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
2000 7.1 7.2 7.1 6.9 7.1 7.0 7.0 7.1 7.0 6.8 7.1 6.9
2001 7.3 7.4 7.3 7.4 7.5 7.9 7.8 8.1 8.7 9.3 9.4 9.6
2002 9.5 9.5 9.4 9.7 9.5 9.5 9.6 9.6 9.6 9.6 9.7 9.8
2003 10.0 10.2 10.0 10.2 10.1 10.3 10.3 10.1 10.4 10.2 10.0 9.8
2004 9.9 9.7 10.0 9.6 9.6 9.5 9.5 9.4 9.4 9.7 9.4 9.2
2005 9.3 9.3 9.1 8.9 8.9 9.0 8.8 8.9 9.0 8.7 8.7 8.6
2006 8.4 8.4 8.2 8.1 8.2 8.4 8.5 8.4 8.0 8.2 8.1 7.9
2007 8.4 8.2 8.0 8.2 8.2 8.3 8.4 8.4 8.4 8.4 8.4 8.8
2008 9.2 9.0 9.1 9.2 9.7 10.1 10.5 10.8 11.1 11.8 12.7 13.5
2009 14.2 15.1 15.7 15.8 16.4 16.5 16.5 16.7 16.8 17.2 17.1 17.1
2010 16.7 16.9 16.9 17.0 16.6 16.5 16.5 16.6 16.9 16.8 16.9 16.6
2011 16.1 15.9 15.7 15.9 15.8 16.2 16.1 16.2 16.4 16.0 15.6 15.2
2012 15.1 14.9 14.5 14.5 14.8 14.9 15.0 14.7 14.7

Background Articles and Videos

Employment Situation Summary

Transmission of material in this release is embargoed                   USDL-12-1981
until 8:30 a.m. (EDT) Friday, October 5, 2012

Technical information:
 Household data:       (202) 691-6378  *  cpsinfo@bls.gov  *  www.bls.gov/cps
 Establishment data:   (202) 691-6555  *  cesinfo@bls.gov  *  www.bls.gov/ces

Media contact:         (202) 691-5902  *  PressOffice@bls.gov

                    THE EMPLOYMENT SITUATION -- SEPTEMBER 2012

The unemployment rate decreased to 7.8 percent in September, and total nonfarm 
payroll employment rose by 114,000, the U.S. Bureau of Labor Statistics reported 
today. Employment increased in health care and in transportation and warehousing 
but changed little in most other major industries.

Household Survey Data

The unemployment rate declined by 0.3 percentage point to 7.8 percent in September. 
For the first 8 months of the year, the rate held within a narrow range of 8.1 
and 8.3 percent. The number of unemployed persons, at 12.1 million, decreased by 
456,000 in September. (See table A-1.)

Among the major worker groups, the unemployment rates for adult men (7.3 percent), 
adult women (7.0 percent), and whites (7.0 percent) declined over the month. 
The unemployment rates for teenagers (23.7 percent), blacks (13.4 percent), and 
Hispanics (9.9 percent) were little changed. The jobless rate for Asians, at 
4.8 percent (not seasonally adjusted), fell over the year. (See tables A-1, A-2, 
and A-3.)

In September, the number of job losers and persons who completed temporary jobs 
decreased by 468,000 to 6.5 million. (See table A-11.)

The number of persons unemployed for less than 5 weeks declined by 302,000 over 
the month to 2.5 million. The number of long-term unemployed (those jobless for 
27 weeks or more) was little changed at 4.8 million and accounted for 40.1 
percent of the unemployed. (See table A-12.)

Total employment rose by 873,000 in September, following 3 months of little 
change. The employment-population ratio increased by 0.4 percentage point to 
58.7 percent, after edging down in the prior 2 months. The overall trend in 
the employment-population ratio for this year has been flat. The civilian labor 
force rose by 418,000 to 155.1 million in September, while the labor force 
participation rate was little changed at 63.6 percent. (See table A-1.)

The number of persons employed part time for economic reasons (sometimes 
referred to as involuntary part-time workers) rose from 8.0 million in August 
to 8.6 million in September. These individuals were working part time because 
their hours had been cut back or because they were unable to find a full-time 
job. (See table A-8.)

In September, 2.5 million persons were marginally attached to the labor force, 
essentially unchanged from a year earlier. (These data are not seasonally 
adjusted.) These individuals were not in the labor force, wanted and were 
available for work, and had looked for a job sometime in the prior 12 months. 
They were not counted as unemployed because they had not searched for work 
in the 4 weeks preceding the survey. (See table A-16.)

Among the marginally attached, there were 802,000 discouraged workers in 
September, a decline of 235,000 from a year earlier. (These data are not 
seasonally adjusted.) Discouraged workers are persons not currently looking 
for work because they believe no jobs are available for them. The remaining 
1.7 million persons marginally attached to the labor force in September had 
not searched for work in the 4 weeks preceding the survey for reasons such 
as school attendance or family responsibilities. (See table A-16.)

Establishment Survey Data

Total nonfarm payroll employment increased by 114,000 in September. In 2012, 
employment growth has averaged 146,000 per month, compared with an average 
monthly gain of 153,000 in 2011. In September, employment rose in health care 
and in transportation and warehousing. (See table B-1.)

Health care added 44,000 jobs in September. Job gains continued in ambulatory 
health care services (+30,000) and hospitals (+8,000). Over the past year, 
employment in health care has risen by 295,000.

In September, employment increased by 17,000 in transportation and warehousing. 
Within the industry, there were job gains in transit and ground passenger 
transportation (+9,000) and in warehousing and storage (+4,000).

Employment in financial activities edged up in September (+13,000), reflecting 
modest job growth in credit intermediation (+6,000) and real estate (+7,000).

Manufacturing employment edged down in September (-16,000). On net, manufacturing 
employment has been unchanged since April. In September, job losses occurred 
in computer and electronic products (-6,000) and in printing and related 
activities (-3,000).

Employment in other major industries, including mining and logging, construction, 
wholesale trade, retail trade, information, professional and business services, 
leisure and hospitality, and government, showed little change over the month.

The average workweek for all employees on private nonfarm payrolls edged up by 
0.1 hour to 34.5 hours in September. The manufacturing workweek edged up by 
0.1 hour to 40.6 hours, and factory overtime was unchanged at 3.2 hours. 
The average workweek for production and nonsupervisory employees on private 
nonfarm payrolls was unchanged at 33.7 hours. (See tables B-2 and B-7.)

In September, average hourly earnings for all employees on private nonfarm 
payrolls rose by 7 cents to $23.58. Over the past 12 months, average hourly 
earnings have risen by 1.8 percent. In September, average hourly earnings of 
private-sector production and nonsupervisory employees increased by 5 cents 
to $19.81. (See tables B-3 and B-8.)

The change in total nonfarm payroll employment for July was revised from 
+141,000 to +181,000, and the change for August was revised from +96,000 to 
+142,000.

____________
The Employment Situation for October is scheduled to be released on
Friday, November 2, 2012, at 8:30 a.m. (EDT).
http://www.bls.gov/news.release/empsit.nr0.htmEmployment Situation Summary Table A. Household data, seasonally adjusted

[Numbers in thousands]

HOUSEHOLD DATA Summary table A. Household data, seasonally adjusted
Category Sept. 2011 July 2012 Aug. 2012 Sept. 2012 Change from: Aug. 2012- Sept. 2012
Employment status
Civilian noninstitutional population 240,071 243,354 243,566 243,772 206
Civilian labor force 154,004 155,013 154,645 155,063 418
Participation rate 64.1 63.7 63.5 63.6 0.1
Employed 140,107 142,220 142,101 142,974 873
Employment-population ratio 58.4 58.4 58.3 58.7 0.4
Unemployed 13,897 12,794 12,544 12,088 -456
Unemployment rate 9.0 8.3 8.1 7.8 -0.3
Not in labor force 86,067 88,340 88,921 88,710 -211
Unemployment rates
Total, 16 years and over 9.0 8.3 8.1 7.8 -0.3
Adult men (20 years and over) 8.7 7.7 7.6 7.3 -0.3
Adult women (20 years and over) 8.1 7.5 7.3 7.0 -0.3
Teenagers (16 to 19 years) 24.5 23.8 24.6 23.7 -0.9
White 7.9 7.4 7.2 7.0 -0.2
Black or African American 15.9 14.1 14.1 13.4 -0.7
Asian (not seasonally adjusted) 7.8 6.2 5.9 4.8 -
Hispanic or Latino ethnicity 11.3 10.3 10.2 9.9 -0.3
Total, 25 years and over 7.7 6.9 6.8 6.6 -0.2
Less than a high school diploma 13.9 12.7 12.0 11.3 -0.7
High school graduates, no college 9.6 8.7 8.8 8.7 -0.1
Some college or associate degree 8.4 7.1 6.6 6.5 -0.1
Bachelor’s degree and higher 4.2 4.1 4.1 4.1 0.0
Reason for unemployment
Job losers and persons who completed temporary jobs 8,028 7,123 7,003 6,535 -468
Job leavers 972 878 942 957 15
Reentrants 3,484 3,380 3,318 3,306 -12
New entrants 1,323 1,311 1,277 1,247 -30
Duration of unemployment
Less than 5 weeks 2,743 2,711 2,844 2,542 -302
5 to 14 weeks 2,902 3,092 2,868 2,826 -42
15 to 26 weeks 2,029 1,760 1,845 1,860 15
27 weeks and over 6,197 5,185 5,033 4,844 -189
Employed persons at work part time
Part time for economic reasons 9,270 8,246 8,031 8,613 582
Slack work or business conditions 5,900 5,342 5,217 5,523 306
Could only find part-time work 2,844 2,576 2,507 2,572 65
Part time for noneconomic reasons 18,329 18,866 18,996 18,736 -260
Persons not in the labor force (not seasonally adjusted)
Marginally attached to the labor force 2,511 2,529 2,561 2,517 -
Discouraged workers 1,037 852 844 802 -
-  Over-the-month changes are not displayed for not seasonally adjusted data. NOTE: Persons whose ethnicity is identified as Hispanic or Latino may be of any race. Detail for the seasonally adjusted data shown in this table will not necessarily add to totals because of the independent seasonal adjustment of the various series. Updated population controls are introduced annually with the release of January data.

Employment Situation Summary Table B. Establishment data, seasonally adjusted

ESTABLISHMENT DATA Summary table B. Establishment data, seasonally adjusted
Category Sept. 2011 July 2012 Aug. 2012(p) Sept. 2012(p)
EMPLOYMENT BY SELECTED INDUSTRY (Over-the-month change, in thousands)
Total nonfarm 202 181 142 114
Total private 216 163 97 104
Goods-producing 33 20 -22 -10
Mining and logging 6 -1 -1 1
Construction 30 3 1 5
Manufacturing -3 18 -22 -16
Durable goods(1) 4 18 -20 -13
Motor vehicles and parts 2.9 12.8 -6.9 -3.4
Nondurable goods -7 0 -2 -3
Private service-providing(1) 183 143 119 114
Wholesale trade -3.0 8.8 7.0 -1.6
Retail trade 14.2 3.2 8.3 9.4
Transportation and warehousing 1.8 14.2 7.7 17.1
Information 34 8 1 -6
Financial activities -6 1 7 13
Professional and business services(1) 59 41 19 13
Temporary help services 23.7 13.0 0.1 -2.0
Education and health services(1) 58 40 25 49
Health care and social assistance 47.5 27.7 22.2 44.5
Leisure and hospitality 20 24 38 11
Other services 3 9 -2 9
Government -14 18 45 10
WOMEN AND PRODUCTION AND NONSUPERVISORY EMPLOYEES(2) AS A PERCENT OF ALL EMPLOYEES
Total nonfarm women employees 49.4 49.3 49.3 49.3
Total private women employees 47.9 47.8 47.8 47.8
Total private production and nonsupervisory employees 82.5 82.6 82.6 82.6
HOURS AND EARNINGS ALL EMPLOYEES
Total private
Average weekly hours 34.4 34.4 34.4 34.5
Average hourly earnings $23.16 $23.52 $23.51 $23.58
Average weekly earnings $796.70 $809.09 $808.74 $813.51
Index of aggregate weekly hours (2007=100)(3) 94.5 95.9 96.0 96.4
Over-the-month percent change 0.4 -0.2 0.1 0.4
Index of aggregate weekly payrolls (2007=100)(4) 104.4 107.6 107.7 108.4
Over-the-month percent change 0.7 -0.1 0.1 0.6
HOURS AND EARNINGS PRODUCTION AND NONSUPERVISORY EMPLOYEES
Total private
Average weekly hours 33.6 33.7 33.7 33.7
Average hourly earnings $19.53 $19.77 $19.76 $19.81
Average weekly earnings $656.21 $666.25 $665.91 $667.60
Index of aggregate weekly hours (2002=100)(3) 101.5 103.5 103.6 103.7
Over-the-month percent change 0.2 0.1 0.1 0.1
Index of aggregate weekly payrolls (2002=100)(4) 132.5 136.7 136.8 137.3
Over-the-month percent change 0.4 0.3 0.1 0.4
DIFFUSION INDEX(5) (Over 1-month span)
Total private (266 industries) 57.9 54.9 51.3 52.8
Manufacturing (81 industries) 53.7 48.8 38.9 39.5
Footnotes (1) Includes other industries, not shown separately. (2) Data relate to production employees in mining and logging and manufacturing, construction employees in construction, and nonsupervisory employees in the service-providing industries. (3) The indexes of aggregate weekly hours are calculated by dividing the current month’s estimates of aggregate hours by the corresponding annual average aggregate hours. (4) The indexes of aggregate weekly payrolls are calculated by dividing the current month’s estimates of aggregate weekly payrolls by the corresponding annual average aggregate weekly payrolls. (5) Figures are the percent of industries with employment increasing plus one-half of the industries with unchanged employment, where 50 percent indicates an equal balance between industries with increasing and decreasing employment. (p) Preliminary
NOTE:  Data in this table have been corrected.  For more information see http://www.bls.gov/bls/ceswomen_usps_correction.htm.
Read Full Post | Make a Comment ( None so far )

America’s Choice: Liberty or Sustainable Development? — Videos

Posted on November 10, 2013. Filed under: American History, Blogroll, Business, College, Communications, Constitution, Demographics, Diasters, Economics, Education, Employment, Enivornment, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Food, Genocide, government, government spending, Health Care, history, Homes, Illegal, Immigration, Inflation, Investments, Language, Law, Legal, liberty, Life, Links, Literacy, media, Narcissism, People, Philosophy, Photos, Politics, Programming, Psychology, Quotations, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Talk Radio, Tax Policy, Unemployment, Video, War, Weapons | Tags: , , , , , , , |

America’s Choice: Liberty or Sustainable Development? (Part 1 of 4)

America’s Choice: Liberty or Sustainable Development? (Part 2 of 4)

America’s Choice: Liberty or Sustainable Development? (Part 3 of 4)

America’s Choice: Liberty or Sustainable Development? (Part 4 of 4)

Agenda 21 For Dummies

How your community is implementing AGENDA 21

Agenda 21, Glenn Beck’s Latest Book Talks w/ UN A21 Expert Rose Koire a Democrat

The Glenn Beck Program – Air Date: Monday, November 19, 2012

The Depopulation Agenda For a New-World-Order Agenda 21

Related Posts On Pronk Palisades

United Nations Agenda 21 — Sustainable Development — Videos

 

Read Full Post | Make a Comment ( None so far )

Obamacare’s Metal Plans (Bronze, Silver, Gold, Platinum) With Higher Premiums and Deductibles — The Road To The Single Government Option Lead Plan — Videos

Posted on October 26, 2013. Filed under: American History, Banking, Blogroll, Communications, Constitution, Diasters, Economics, Education, Federal Government Budget, Fiscal Policy, government, government spending, Health Care, history, History of Economic Thought, Illegal, Immigration, Inflation, IRS, Language, Law, liberty, Life, Links, Macroeconomics, media, Medicine, Monetary Policy, Money, People, Philosophy, Politics, Public Sector, Radio, Rants, Raves, Regulations, Resources, Reviews, Science, Talk Radio, Tax Policy, Taxes, Technology, Unemployment, Unions, Video, War, Wealth, Wisdom | Tags: , , , , , , , |

Project_1

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

Pronk Pops Show 140: September 30, 2013

Pronk Pops Show 139: September 27, 2013

Pronk Pops Show 138: September 26, 2013

Pronk Pops Show 137: September 25, 2013

Pronk Pops Show 136: September 24, 2013

Pronk Pops Show 135: September 23, 2013

Pronk Pops Show 134: September 20, 2013

Pronk Pops Show 133: September 19, 2013

Pronk Pops Show 132: September 18, 2013

Pronk Pops Show 131: September 17, 2013

Pronk Pops Show 130: September 16, 2013

Pronk Pops Show 129: September 13, 2013

Pronk Pops Show 128: September 12, 2013

Pronk Pops Show 127: September 11, 2013

Pronk Pops Show 126: September 10, 2013

Pronk Pops Show 125: September 9, 2013

Pronk Pops Show 124: September 6, 2013

Listen To Pronk Pops Podcast or Download Show 151-156

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 0: Obamacare’s Metal Plans (Bronze, Silver, Gold, Platinum) With Higher Premiums and Deductibles — The Road To The Single Government Option Lead Plan — Videos

Health Pocket.com

http://www.healthpocket.com/individual-health-insurance

HealthCare.gov

https://www.healthcare.gov/

John C. Goodman – Obamacare Costs – 10-08-13

John C. Goodman – Obamacare Rate Increase – 10-15-13

Bret Baier If Problems With Obamacare Continue, ‘There Is Going to Have to Be a Delay’

John C. Goodman – Sticker Shock – 10-22-13

John C. Goodman – Death Spiral – 10-23-13

How to Get Obamacare ( healthcare.gov enrollment instructions )

youtube=http://www.youtube.com/watch?v=ZiHg4veV6q0]

Platinum Plans

Gold Plans

Silver Plans

Bronze Plans

Related Posts On Pronk Palisades

The Pronk Pops Show 155, October 24, 2013, Segment 0: Obama’s Tech Surge Team for Healthcare.gov — Best & Brightest or Dumb, Blind and Deaf — Videos

Read Full Post | Make a Comment ( None so far )

Obama Rejects Republican Offer To Reopen the Federal Government For 6 Months and Suspend and Raise The Debt Ceiling For 6 Weeks– Videos

Posted on October 12, 2013. Filed under: American History, Banking, Blogroll, College, Communications, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, Immigration, Inflation, Investments, IRS, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Monetary Policy, Money, People, Philosophy, Politics, Rants, Raves, Regulations, Reviews, Security, Strategy, Talk Radio, Tax Policy, Taxes, Video, War, Wisdom | Tags: , , , , , |

Government shutdown, debt ceiling: Who will blink first?

Full Program | Friday, October 11, 2013

HEATED President Obama VS House Speaker Boehner over US Government Shutdown

Shutdown Talks “Constructive”, But No Deal – Full White House Press Briefing

Senate Rejects Democratic Debt Limit Extension

Obama Rejects Latest House GOP Offer

President Obama used his weekly radio address to reject the latest offer from House Republicans to end the fiscal stalemate. The outline of their proposal was released Friday and would have reopened government through December and lifted the debt ceiling for six weeks.

“It wouldn’t be wise, as some suggest, to just kick the debt ceiling can down the road for a couple months, and flirt with a first-ever intentional default right in the middle of the holiday shopping season,” Obama said in his address.

“Because damage to America’s sterling credit rating wouldn’t just cause global markets to go haywire; it would become more expensive for everyone in America to borrow money,” Obama continued. “Students paying for college. Newlyweds buying a home,”

On Friday, Senate Republicans floated the outlines of their own plan to end the standoff. Their proposal would lift the debt ceiling through the end of January and reopen the government for six months. The dueling proposals put Obama in the enviable position of choosing between his opponents. He can reject one proposal and still look Presidential by negotiating on a competing offer. Obama said Friday he would look for the “best deal.”

On Saturday, the House Republicans are meeting to finalize the details of the plan they released Friday. Obama’s rejection of even the outlines of that plan make the next moves by the House uncertain. The Senate, meanwhile, moves back to center-stage of the debate with a vote Saturday afternoon on a one-year increase in the debt ceiling.

http://www.breitbart.com/Big-Government/2013/10/12/Obama-Rejects-Latest-House-GOP-Offer

Read Full Post | Make a Comment ( None so far )

Obama’s Thugs Are The Collectivist Authoritarians and Extremists And They Are A Minority That Fear The American People — Videos

Posted on October 4, 2013. Filed under: American History, Blogroll, College, Communications, Constitution, Crime, Culture, Economics, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Genocide, government, government spending, Health Care, history, History of Economic Thought, Homicide, Illegal, Immigration, Inflation, IRS, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, Math, media, People, Philosophy, Photos, Politics, Press, Programming, Public Sector, Rants, Raves, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Taxes, Terrorism, Unemployment, Unions, Video, War, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , |

thuggery

Glenn Beck: ‘They Are Building a Thugocracy We’ve Passed Major ‘Signposts’ – Government Shutdown

2012.03.29 – GBTV – Glenn Beck Program – Progressive Thugs

Read Full Post | Make a Comment ( None so far )

Collectivists Common Core Standards Funded By Gates and Department of Educations — Videos

Posted on October 2, 2013. Filed under: American History, Babies, Blogroll, Books, Business, College, Communications, Constitution, Crime, Culture, Economics, Education, Employment, government, government spending, High School, history, Investments, Language, Law, liberty, Life, Links, Literacy, Math, media, People, Philosophy, Photos, Politics, Programming, Psychology, Raves, Regulations, Resources, Reviews, Science, Strategy, Technology, Unemployment, Video | Tags: , , , , , , , |

BL-common-core-update-AUG-2013

What do the Common Core State Standards mean to you?

Ben Swann Exposes Common Core Curriculum

Joy Pullmann on Common Core

Problems with Common Core

PJTV: How the Obama Administration Is Dumbing Down Education

Obama’s Race to the Bottom: US Is Seizing School Power and Setting Lower Education Standards

PJTV: Obama Replacing Classics with Government Propaganda

Common Core State Standards – An Introduction To Marxism 101

FIXING AMERICA’S EDUCATION “BILL GATES” !

Bill Gates at the National Conference of State Legislatures (clip 4)

Bill Gates at the National Conference of State Legislatures (clip 5)

Bill Gates at the National Conference of State Legislatures (clip 6)

Bill Gates: How state budgets are breaking US schools

Why was a parent arrested for protesting Common Core

SHOCKING! Parent Arrested for Objecting to Obama Common Core

Common Core debate: Critics blast new education standards

Reclaiming Education Freedom: The Fight to Stop Common Core National Standards and Tests

“Common Core Common Sense: Why It’s Illiberal and Unconstitutional”

Who Is Behind The Privatization Of Education:Gates, Broad, KIPP, Pearson, WestEd & The Gulen Schools

Bill Bennett Endorses the Common Core

Resource Bank 2013: Confronting the Common Core: Strategic Discussion

Exposing Common Core

The Problem With Common Core – July 27, 2013 Boise, Idaho

Stopping Common Core National Standards and Tests

The Glenn Beck Program: Common Core and Education

You’ll never guess who is supporting Common Core?

GLENN BECK,Did Bill Gates admit the real purpose of Common Core?

The Government will Control Your Childs Every Move? Common Core Disaster?

The Danger Of Common Core – TheBlazeTV – The Glenn Beck Radio Program – 2013.03.15

Common Core Glenn Beck

Learn the Common Core Standards in 10 Minutes

Common Core: Dangers And Threats To American Liberty And Education

Common Core Standards – Fact and Fiction

Part 1 of 5 Stop the Common Core

Part 2 of 5 Stop the Common Core

Part 3 of 5 Stop the Common Core

Part 4 of 5 Stop the Common Core

Part 5 of 5 Stop the Common Core

Related Posts On Pronk Palisades

Stop Obama’s Common Core Curriculum Standards — Progressive Indoctrination, Standardization And Tracking Of American Children Into Collectivists — Little Boxes — Videos

Big Brother Bill Gates Funds k-12 Tracking of Students With InBloom Database — Invasion of Privacy — Opt Out — Video

Read Full Post | Make a Comment ( None so far )

Breaking News — Tom Clancy — Rest In Peace — Photos — Videos

Posted on October 2, 2013. Filed under: American History, Ammunition, Blogroll, Bomb, Book, Books, Communications, Culture, Diasters, Dirty Bomb, Drones, Employment, Entertainment, Federal Government, Fiction, Foreign Policy, Games, government spending, history, IRS, Islam, Language, Law, liberty, Life, Links, Literacy, Movies, Music, Nuclear, People, Philosophy, Photos, Pistols, Politics, Psychology, Rants, Raves, Resources, Reviews, Rifles, Security, Strategy, Talk Radio, Taxes, Unemployment, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , , , , |

Tom Clancy And General Zinni Promote "Battle Ready"

clancy_books

the_hunt_for_red_October

Author-Tom-Clancy

orl-tom-clancy-1998-

 CLANCY-smoking

all_tom_clancy_books

Tom Clancy11

Author Tom Clancy dies at 66

Best-selling Author Tom Clancy Dead at 66

Author Tom Clancy, master of the modern day thriller, dead at 66

 

VIDEO – Worldwide Trend Topic Tom Clancy’s Dead WorldWideTT

US author Tom Clancy dies aged 66

Archive Tom Clancy on prophetic 9 11 plot

Tom Clancy Dead Tom Clancy dies in Baltimore age 66 Author Tom Clancy’s Splinter Cell 1947-2013

Tom Clancy Dead Tom Clancy dies in Baltimore age 66 Author Tom Clancy’s Rainbow Six 1947 2013

9/11 Tom Clancy Coverage of the WTC 7 Collapse CNN 5 35 PM 9 11 2001

Politika (1997) – Tom Clancy’s Fictional Interview on Boris Yeltsin

Tom Clancy on Government

Tom Clancy – Greek Island Interview – SSN – 1996

Tom Clancy, Dead or Alive: Discussion w/ ‘Chuck’ A. Horner, retired Air Force General

Tom Clancy – OP Center (Full movie)

Tom Clancy’s Splinter Cell: Blacklist – All Cutscenes | Movie [HD]

The Hunt For Red October (1990) Trailer.flv

The Hunt for Red October (1/9) Movie CLIP – Another Possibility (1990) HD

The Hunt for Red October (2/9) Movie CLIP – Ryan’s Plan (1990) HD

The Sum of All Fears (1/9) Movie CLIP – Everyone Has Opinions (2002) HD

The Sum of All Fears (2/9) Movie CLIP – I Can’t Tell You That (2002) HD

The True Story The Hunt For Red October

Tom Clancy – Wiki Article

Published on May 21, 2013

Thomas Leo “Tom” Clancy, Jr. is an American author who is best known for his technically detailed espionage and military science storylines that are set during and in the aftermath of the Cold War, along with video games which bear his name for licensing and promotional purposes, although he did not actually work on them himself. His name is also a brand for similar movie scripts written by ghost writers and many series of non-fiction books on military subjects and merged biographies of key leaders. He is Vice Chairman of Community Activities and Public Affairs, as well as a part-owner of the Baltimore Orioles.

Personal life

Clancy was born in Baltimore, Maryland. He attended Loyola Blakefield in Towson, Maryland, graduating with the class of 1965. He then attended Loyola College in Baltimore, graduating in 1969. Before making his literary debut, he spent some time running an independent insurance agency. This agency thrived for a few years before joining a group of investors.

Clancy and his first wife Wanda married in 1969, separated briefly in 1995, and permanently separated in December 1996. Clancy filed for divorce in November 1997, which became final in January 1999.

In 1993, Tom Clancy joined a group of investors that included Peter Angelos and bought the Baltimore Orioles from Eli Jacobs. In 1998, he reached an agreement to purchase the Minnesota Vikings, but had to abandon the deal because of the divorce settlement cost.

On June 26, 1999, Clancy married freelance journalist Alexandra Marie Llewellyn, whom he had met in 1997. Llewellyn is the daughter of J. Bruce Llewellyn, and a family friend of Colin Powell, who originally introduced the couple to each other.

In 2008, the French video game manufacturer Ubisoft purchased the use of Clancy’s name for an undisclosed sum. It has been used in conjunction with video games and related products such as movies and books. Based on his interest in space, and his investment in the launch vehicle company Rotary Rocket, in 2007 Clancy was interviewed for the documentary film Orphans of Apollo.

Political views

Tom Clancy has been a lifetime supporter of conservative and Republican causes in America. His books bear dedications to conservative political figures, most notably Ronald Reagan. A week after the September 11, 2001 attacks, on The O’Reilly Factor, Clancy stated that left-wing politicians in the United States were partly responsible for September 11 due to their “gutting” of the Central Intelligence Agency. Clancy has also associated himself with General Anthony Zinni, a critic of the George W. Bush administration, and has been critical of former Defense Secretary Donald Rumsfeld as well.

On September 11, 2001, Clancy was interviewed by Judy Woodruff on CNN. During the interview, he asserted “Islam does not permit suicide” (see Islam and suicide). Among other observations during this interview, Clancy cited discussions he had with military experts on the lack of planning to handle a hijacked plane being used in a suicide attack and criticized the news media’s treatment of the United States Intelligence Community. Clancy appeared again on PBS’s Charlie Rose, to discuss the implications of the day’s events with Richard Holbrooke, New York Times journalist Judith Miller, and Senator John Edwards, among others. Clancy was interviewed on these shows because his 1994 book Debt of Honor included a scenario where a disgruntled Japanese character crashes a fueled Boeing 747 into the U.S. Capitol dome during a State of the Union address, killing the President and most of Congress. This plot device bore strong similarities to the attacks of Sept. 11, 2001.

Clancy has been a Life Member of the National Rifle Association since 1978.

Bibliography

The Hunt for Red October, Patriot Games, Clear and Present Danger, and The Sum of All Fears have been turned into commercially successful films with actors Alec Baldwin, Harrison Ford, and Ben Affleck as Clancy’s most famous fictional

Tom Clancy, Best-Selling Novelist of Military Thrillers, Dies

at 66

By JULIE BOSMAN

Tom Clancy, whose complex, adrenaline-fueled military novels made him one of the world’s best-selling and best-known authors, died on Tuesday in a hospital in Baltimore. He was 66.

Ivan Held, the president of G. P. Putnam’s Sons, his publisher, did not provide a cause of death.

Mr. Clancy’s books were successfully transformed into blockbuster Hollywood films, including “Patriot Games,” “The Hunt for Red October“ and “Clear and Present Danger.”

His next book, “Command Authority,” is planned for publication on Dec. 3.

Seventeen of his novels were No. 1 New York Times best sellers, including his most recent, “Threat Vector,” which was released in December 2012.

Mr. Clancy was an insurance salesman when he sold his first novel, “The Hunt for Red October,” to the Naval Institute Press for only $5,000.

That publisher had never released a novel before, but the editors were taken with Mr. Clancy’s manuscript. They were concerned, however, that there were too many technical descriptions, so they asked him to make cuts. Mr. Clancy made revisions and cut at least 100 pages.

The book took off when President Ronald Reagan, who had received a copy, called it was “my kind of yarn” and said that he couldn’t put it down.

After the book’s publication in 1985, Mr. Clancy was praised for his mastery of technical details about Soviet submarines and weaponry. Even high-ranking members of the military took notice of the book’s apparent inside knowledge.

In an interview in 1986, Mr. Clancy said, “When I met Navy Secretary John Lehman last year, the first thing he asked me about the book was, ‘Who the hell cleared it?’ “

David Shanks, a Penguin executive who worked with Mr. Clancy for decades, called him “a consummate author, creating the modern-day thriller, and one of the most visionary storytellers of our time.”Born to a middle-class family in Baltimore on April 12, 1947, Mr. Clancy skipped over the usual children’s literature and became obsessed by naval history from a young age, reading journals and books whose intended audience was career military officers and engineering experts.

He absorbed details of submarine warfare, espionage, missile systems and covert plots between superpowers.

He attended Loyola College in Baltimore, where he majored in English, and graduated in 1969. While Mr. Clancy harbored ambitions to join the military, even joining the Army R.O.T.C., he was told that he was too nearsighted to qualify.

Mr. Clancy began working at a small insurance agency in rural Maryland that was founded by his wife’s grandfather.

After “The Hunt for Red October” was published, Mr. Clancy’s fame was fairly instant. Frequently posing for photographs in darkened aviator sunglasses, jeans and holding a cigarette, Mr. Clancy spoke of the laserlike focus required to succeed.

“I tell them you learn to write the same way you learn to play golf,” he said. “You do it, and keep doing it until you get it right. A lot of people think something mystical happens to you, that maybe the muse kisses you on the ear. But writing isn’t divinely inspired — it’s hard work.”

He followed “The Hunt for Red October” with “Red Storm Rising“ in 1986, “Patriot Games” in 1987, “The Cardinal of the Kremlin“ in 1988 and “Clear and Present Danger” in 1989.

The critical reception to his novels was gushing from the start. Reviewing “Red Storm Rising” in The New York Times in 1986, Christopher Lehmann-Haupt wrote that the book “far surpassed” Mr. Clancy’s debut novel.

“Red Storm Rising” is a “superpower thriller,” he wrote, “the verbal equivalent of a high-tech video game.” (Mr. Clancy would eventually venture into video games, which were easily adapted from his novels.)

Other critics questioned the unwaveringly virtuous nature of many of Mr. Clancy’s heroes, particularly his protagonist Jack Ryan.

“All the Americans are paragons of courage, endurance and devotion to service and country,” Robert Lekachman wrote in the Times in 1986. “Their officers are uniformly competent and occasionally inspired. Men of all ranks are faithful husbands and devoted fathers.”

Mr. Clancy was frequently accused of using classified information in his novels, a claim that amused him. While he spent time on military bases, visited the Pentagon and dined with high-level military officials, he insisted that he didn’t want to know any classified information.

“I hang my hat on getting as many things right as I can,” Mr. Clancy once said in an interview. “I’ve made up stuff that’s turned out to be real, that’s the spooky part.”

http://www.nytimes.com/2013/10/03/books/tom-clancy-best-selling-novelist-of-military-thrillers-dies-at-66.html?_r=1&

Tom Clancy

Thomas Leo “Tom” Clancy, Jr. (April 12, 1947 – October 1, 2013)[1][2] was an American author best known for his technically detailed espionage and military science storylines that are set during and in the aftermath of the Cold War, along with video games which bear his name for licensing and promotional purposes. His name was also a brand for similar movie scripts written by ghost writers and many series of non-fiction books on military subjects and merged biographies of key leaders. He was Vice Chairman of Community Activities and Public Affairs, as well as a part-owner, of the Baltimore Orioles.

Literary career

Clancy’s fiction works, The Hunt for Red OctoberPatriot GamesClear and Present Danger, and The Sum of All Fears, have been turned into commercially successful films with actors Alec BaldwinHarrison Ford, and Ben Affleck as Clancy’s most famous fictional character Jack Ryan, while his second most famous character John Clark has been played by actors Willem Dafoe and Liev Schreiber. All but two of Clancy’s solely written novels feature Jack Ryan or John Clark.

The first NetForce novel was adapted as a television movie, starring Scott Bakula and Joanna Going. The first Op-Center novel was released to coincide with a 1995 NBC television mini-series of the same name (Tom Clancy’s Op-Center) starring Harry Hamlin and a cast of stars. Though the mini-series did not continue, the book series did, but it had little in common with the first mini-series other than the title and the names of the main characters.

With the release of The Teeth of the Tiger, Clancy introduced Jack Ryan’s son and two nephews as main characters; these characters continue in his three latest novels, Dead or AliveLocked On and Threat Vector.

Clancy wrote several nonfiction books about various branches of the U.S. armed forces (see non-fiction listing, below). Clancy also branded several lines of books and video games with his name that are written by other authors, following premises or storylines generally in keeping with Clancy’s works. These are sometimes referred to by fans as “apostrophe” books; Clancy did not initially acknowledge that these series were being authored by others, only thanking the actual authors in the headnotes for their “invaluable contribution to the manuscript”.

By 1988, Clancy had earned $1.3 million for The Hunt for Red October and had signed a $3 million contract for his next three books.[3] By 1997, it was reported that Penguin Putnam Inc. (part of Pearson Education) would pay Clancy $50 million for world rights to two new books, and another $25 million to Red Storm Entertainment for a four-year book/multimedia deal.[4] Clancy followed this up with an agreement with Penguin’s Berkley Books for 24 paperbacks to tie in with the ABC television miniseries Tom Clancy’s Net Force aired in the fall/winter of 1998. The Op-Center universe has laid the ground for the series of books written by Jeff Rovin, which was in an agreement worth $22 million, bringing the total value of the package to $97 million.[4]

In 1993, Clancy joined a group of investors that included Peter Angelos and bought the Baltimore Orioles from Eli Jacobs. In 1998, he reached an agreement to purchase theMinnesota Vikings, but had to abandon the deal because of the divorce settlement cost.

On June 26, 1999, Clancy married freelance journalist Alexandra Marie Llewellyn, whom he had met in 1997.[5] Llewellyn is the daughter of J. Bruce Llewellyn, and a family friend ofColin Powell, who originally introduced the couple to each other.[6]

In 2008, the French video game manufacturer Ubisoft purchased the use of Clancy’s name for an undisclosed sum. It has been used in conjunction with video games and related products such as movies and books.[7] Based on his interest in space, and his investment in the launch vehicle company Rotary Rocket, in 2007 Clancy was interviewed for the documentary film Orphans of Apollo.

Political views

A longtime holder of conservative and Republican views, Clancy’s books bear dedications to American conservative political figures, most notably Ronald Reagan. A week after theSeptember 11, 2001 attacks, on The O’Reilly Factor, Clancy claimed that left-wing politicians in the United States were partly responsible for September 11 due to their “gutting” of the Central Intelligence Agency.[6]

In recent years, Clancy associated himself with General Anthony Zinni, a critic of the George W. Bush administration, and has been critical of former Defense Secretary Donald Rumsfeld as well.[8]

On September 11, 2001, Clancy was interviewed by Judy Woodruff on CNN.[9] During the interview, he asserted “Islam does not permit suicide” (see Islam and suicide). Among other observations during this interview, Clancy cited discussions he had with military experts on the lack of planning to handle a hijacked plane being used in a suicide attack and criticized the news media’s treatment of the United States Intelligence Community. Clancy appeared again on PBS‘s Charlie Rose, to discuss the implications of the day’s events with Richard Holbrooke, New York Times journalist Judith Miller, and Senator John Edwards, among others.[10] Clancy was interviewed on these shows because his 1994 book Debt of Honor included a scenario where a disgruntled Japanese character crashes a fueled Boeing 747 into the U.S. Capitol dome during an address by the President to a joint session of Congress, killing the President and most of Congress. This plot device bore strong similarities to the attacks of September 11, 2001.

Clancy was also a Life Member of the National Rifle Association since 1978.[11]

Personal

Clancy was born in Baltimore, Maryland.[1] He attended Loyola Blakefield in Towson, Maryland, graduating with the class of 1965.[1] He then attended Loyola College (now Loyola University) in Baltimore, graduating in 1969.[1] Before making his literary debut, he spent some time running an independent insurance agency.

Clancy and his first wife Wanda married in 1969, separated briefly in 1995, and permanently separated in December 1996.[12] Clancy filed for divorce in November 1997,[13] which became final in January 1999.[14] In 1999, Clancy married freelance journalist Alexandra Marie Llewellyn.[15]

Clancy died October 1, 2013, after a brief illness at Johns Hopkins Hospital, near his Baltimore home. He was 66 and no cause of death was released. He is survived by four children and his second wife, Alexandra Marie Llewellyn.[16]

Bibliography

Works, by year of publication

The Hunt for Red October (1984)
Clancy’s first published novel. CIA analyst Jack Ryan assists in the defection of a respected Soviet naval captain, along with the most advanced ballistic missile submarine of the Soviet fleet. The movie (1990) stars Alec Baldwin as Ryan and Sean Connery as Captain Ramius. Captain Mancuso is introduced here. Nearly every book after has Mancuso in ever increasing command of U.S. submarine forces.
Red Storm Rising (1986)
War between NATO and USSR. The basis of the combat game of the same name, this book is not a member of the Ryan story series (although the protagonist of the story has many similarities with Jack Ryan). Cowritten with Larry Bond.
Patriot Games (1987)
Patriot Games chronologically predates the first book that Clancy wrote, The Hunt for Red October. Jack Ryan foils an attack in London on the Prince and Princess of Wales by the “Ulster Liberation Army”. The ULA then attacks Ryan’s Maryland home while he is hosting the Prince and Princess for dinner. The movie stars Harrison Ford as Ryan and Samuel L. Jackson as Robby Jackson.
The Cardinal of the Kremlin (1988)
The sequel to “The Hunt for Red October.” First appearance of John Clark and Sergey Golovko. Ryan leads a CIA operation which forces the head of the KGB to defect. Other elements include anti-satellite lasers and other SDI-type weapons, and the Soviet war in Afghanistan. Major Alan Gregory is introduced here. (He appears later, updating SAMsoftware in The Bear and the Dragon). Colonel Bondarenko also is introduced here. (He appears in later books offering advice to Golovko in “Executive Orders” and commanding the Russian Army defenses against China in its sequel “The Bear and the Dragon”.)
Clear and Present Danger (1989)
The President authorizes the CIA to use American military forces in a covert war against cocaine producers in Colombia. The operation is betrayed. Ryan meets John Clark as they lead a mission to rescue abandoned soldiers. Domingo “Ding” Chavez (Clark’s protege in later novels) is one of the rescued soldiers. The 1994 film stars Harrison Ford as Ryan, Willem Dafoe as Clark, and Raymond Cruz as Chavez.
The Sum of All Fears (1991)
Arab terrorists find a nuclear weapon that had been lost by Israel, and use it to attack the United States. This nearly triggers a war between the U.S. and the Soviet Union, due to the incompetence of the new President and his mistress with an anti-Ryan agenda. Ryan intervenes to avert the war. The 2002 film stars Ben Affleck as Ryan and Liev Schreiber as Clark, and changes the identity and motivation of the terrorists to neo-Nazis.
Without Remorse (1993)
Without Remorse takes place during the Vietnam War, when Jack Ryan was a teenager. Ex-SEAL John Clark (then John Kelly) fights a one-man war against drug dealers in Baltimore, attracting the attention of Jack’s father Emmett, a Baltimore police detective. He also helps plan and execute a raid on a prisoner-of-war camp in North Vietnam. Clark joins the Central Intelligence Agency (CIA).
Debt of Honor (1994)
A secret cabal of extreme nationalists gains control of Japan (having acquired some nuclear weapons), and start a war with the U.S. Ryan, now National Security Advisor, and Clark and Chavez, agents in Japan, help win the war. The Vice President resigns in a scandal, and the President appoints Ryan to replace him. A vengeful, die-hard Japanese airline pilot then crashes a jetliner into the U.S. Capitol during a joint session of Congress attended by most senior U.S. government officials, including the President. Ryan thus becomes the new President through succession.
Executive Orders (1996)
This is the immediate sequel to Debt of Honor. President Ryan survives press hazing, an assassination attempt, and a biological warfare attack on the United States. Clark and Chavez trace the virus to a Middle Eastern madman, and the U.S. military goes to work.
SSN: Strategies for Submarine Warfare (1996)
Follows the missions of USS Cheyenne in a future war with China precipitated by China’s invasion of the disputed Spratly Islands. Also not a Ryan universe book, SSN is actually a loosely connected collection of “scenario” chapters in support of the eponymous video game.
Rainbow Six (1998)
Released to coincide with the video game of the same name. John Clark and Ding, who is now Clark’s son-in-law, lead an elite multi-national anti-terrorist unit that combats a worldwide genocide attempt by eco-terrorists. Ryan is the U.S. President and only mentioned or referred to as either ‘The President’ or ‘Jack’.
The Bear and the Dragon (2000)
War between Russia and China. Ryan recognizes the independence of Taiwan, Chinese police officers kill a Roman Catholic Cardinal, and the American armed forces help Russia defeat a Chinese invasion of Siberia.
Red Rabbit (2002)
In the early 1980s, CIA analyst Ryan aids in the defection of a Soviet officer who knows of a plan to assassinate Pope John Paul II.
The Teeth of the Tiger (2003)
Jack Ryan’s son, Jack Ryan, Jr., becomes an intelligence analyst, and then a field consultant, for The Campus, an off-the-books intelligence agency with the freedom to discreetly assassinate individuals “who threaten national security”, following the end of the Jack Ryan Sr. presidential administration. This book of the Jack Ryan series by Tom Clancy introduces Ryan’s son and two nephews as heirs to his spook-legacy.
Dead or Alive (2010, with Grant Blackwood)
The story picks up where The Teeth of the Tiger left off with Jack Ryan, Jr. and The Campus trying to catch a terrorist known as “The Emir”.
Against All Enemies (2011, with Peter Telep)
A terrorist bombing in Pakistan wipes out Max Moore’s entire CIA team. As the only survivor, the former Navy SEAL plunges deeper into the treacherous tribal lands to find the terrorist cell, but what he discovers there leads him to a much darker conspiracy in an unexpected part of the globe — the United States/Mexico border.
Locked On (Dec 2011, with Mark Greaney)
While Jack Ryan Jr. trains to become a field operative within The Campus, his father campaigns for re-election as President of the United States. A devout enemy of Jack Sr. launches a privately funded vendetta to discredit him, while a corrupt Pakistani general has entered into a deadly pact with a fanatical terrorist to procure nuclear warheads.
Search and Destroy (July 2012, with Peter Telep) (Cancelled)
Threat Vector (Dec 2012, with Mark Greaney)
Jack Ryan has only just moved back into the Oval Office when he is faced with a new international threat. An aborted coup in the People’s Republic of China has left President Wei Zhen Lin with no choice but to agree with the expansionist policies of General Su Ke Quiang. They have declared the South China Sea a protectorate and are planning an invasion of Taiwan. The Ryan administration is determined to thwart China’s ambitions, but the stakes are dangerously high as a new breed of powerful Chinese anti-ship missiles endanger the US Navy’s plans to protect the island. Meanwhile, Chinese cyber warfare experts have launched a devastating attack on American infrastructure.
Command Authority (December 2013, with Mark Greaney)
There is a new strong man in Russia but his rise to power is based on a dark secret hidden decades in the past. The clue to the mystery lies with a most unexpected source, President Jack Ryan.[17]

Novels not in a series

Jack Ryan/John Clark universe chronology

In the order in which they occur in the storyline (and when they occur):

  • Without Remorse (1969–70, 1973 – Starts late 1969, in Hurricane Camille’s aftermath. Continues the following spring, in 1970. Epilogue is titled “February 12, 1973″) Ryan briefly appears in this novel.
  • Patriot Games (1982, based on a reference to Ryan’s age, which is 31 at the beginning of the novel. This roughly fits with a reference to the Princess of Wales’s first child being a baby and a few months old, Prince William was born in 1982) Discrepancies include the reference to a van having a likely year of manufacture of 1984.
  • Red Rabbit (circa spring of 1982, based on references to living Leonid Brezhnev and Mikhail Suslov, both of whom died in 1982 (although Suslov died already in January of that year), as well as Jack Ryan, Jr.’s age in the novel, 6 months) Discrepancies with the estimate of 1982 include frequent references to “Transformers” which did not appear until 1984 and the fact that the Orioles played the Phillies in the World Series in 1983, not to mention that the World Series is played in the Fall, not the Spring. Also a reference to “Coke Classic” which did not debut until the summer of 1985.
  • The Hunt for Red October (1984)
  • The Cardinal of the Kremlin (1986) – “The first chapter is set in January and states that Ryan is 35 years old. It also has references to the other books set earlier. For example the Foleys have been in Moscow for almost four years. The book must begin (not including prologue which was set end of previous year) in January 1986.

Starting with the following novel, the series becomes distinctly different from real history as noted below.

  • Clear and Present Danger (1988) The book refers to Jack’s age as 40.
  • The Sum of All Fears (1990–1991) — Israel partially cedes sovereignty over Jerusalem to the Vatican and Saudi Arabia, and the city becomes a United Nations protectorate policed by Swiss Guards. Residents of Jerusalem can choose between either Vatican, Israeli or Islamic judicial law. Denver is devastated by a terrorist nuclear explosion. The book occurs after the Persian Gulf War and before the dissolution of the Soviet Union. It is implied that both events occur at the same time in the Ryan universe as in actual history (of the Soviet Union dissolution), 1991. In the earlier chapters it states that it had almost been two Novembers since President Fowler had been elected, making the beginning set in 1990. Interestingly, the video game Tom Clancy’s Rainbow Six puts the atomic detonation in Denver as having occurred in 1989.
  • Debt of Honor (1995–1996) — The U.S. and Russia destroy all of their ballistic missiles. After crippling the U.S. economy and becoming a nuclear power, Japan invades and takes the Marianas Islands; the United States and Japan fight a brief war, which the Japanese lose (they are subsequently denuclearized); an embittered Japanese pilot and proponent of the war crashes a 747 into the United States Capitol Building immediately after Ryan’s confirmation vote for the Vice President, killing most of the House andSenate, the President, all nine Supreme Court justices, the senior military establishment (including the JCS), and most of the Cabinet; Ryan is left in charge of a gutted government. The end of the book occurs eleven months before 1997 presidential inauguration. Of interest, but not crucial to the plot of this or further books is that North and South Korea were said to be unified at some point between The Sum of All Fears and this book.
  • Executive Orders (1996) — Saddam Hussein is assassinatedIran and Iraq merge forming the United Islamic Republic; the UIR launches a biological attack on the U.S. using the Ebola virus; the United States launches the Second Persian Gulf War against the UIR and defeats them; the Ayatollah is killed in a smart-bomb attack by the U.S.
  • Rainbow Six (1999–2000) – events are based on the Sydney Olympics held in 2000, RAINBOW – an elite counter-terrorist force – is created and engages terrorists acrossEurope. Ecoterrorists plan to create a genetically-enhanced virus based on Ebola and cancer cells, which they plan to use to wipe out much of the world’s population.
  • The Bear and the Dragon (2002) — Russia is admitted to NATO; China and Russia fight a major war, in which the U.S. intervenes on its NATO ally’s side. It implies that theBritish Prime Minister is Tony Blair. Ryan has won re-election as president (2001). He resigns before the 2004 election making Robby Jackson president.
  • The Teeth of the Tiger (2006, based on the age of Jack Ryan, Jr.) The U.S. is now engaged in a global war on terrorism, in response to the September 11 attacks, which occurred in the Ryan universe as they did in the real world. It is mentioned that the wars in Afghanistan and Iraq occurred in the Ryan universe continuity, and that the Jerusalem Treaty signed in The Sum of All Fears has failed as Israelis and Palestinians went back to fighting each other.
  • Dead or Alive (2007, based on Jack Ryan’s announcement that he would run against Ed Kealty for President “in the coming year”) — The Umayyad Revolutionary Council (the Ryan universe version of Al-Qaeda) and its leader “The Emir” (based on Osama bin Laden) plan a string of major attacks on the U.S. The wars in Afghanistan and Iraq continue, as in our timeline, and President Kealty is in the process of withdrawing U.S. troops from Iraq. A character also explicitly refers to the date as May 2010, in the process of decoding encrypted messages, but this must be seen as a contradiction, as Ed Kealty is president and is only president for one term. In accordance with the Jack Ryan continuity, Kealty must be president in the term 2005-2009.
  • Locked On (2008, based on Jack Ryan Sr.’s campaign for re-election). Jack Ryan is running for president again. Since it is only possible for Kealty to serve one term per the rules of the Constitution, that term must be from 2005 to 2009. The election happens in this book, too, making it only possible that the events take place in 2008. Jack Ryan Sr.’s opponent, Edward Kealty, tries to dig up dirt on him by going after John Clark. Meanwhile, a renegade Pakistani general steals nuclear weapons from his country and delivers them to rebel Dagestani forces. In the middle of all this, Jack Ryan Jr. and The Campus try to prevent the use of the lethal weapon and come to help Clark.
  • Threat Vector (2012). Ryan has been sworn in as president of the United States after having been elected the previous year. It also states that the events of this novel happen six months after the previous novel.
  • Command Authority To be released 12-3-2013

Op-Center universe

  1. Op-Center (1995)
  2. Mirror Image (1995)
  3. Games of State (1996)
  4. Acts of War (1996)
  5. Balance of Power (1998)
  6. State of Siege (1999)
  7. Divide and Conquer (2000)
  8. Line of Control (2001)
  9. Mission of Honor (2002)
  10. Sea of Fire (2003)
  11. Call to Treason (2004)
  12. War of Eagles (2005)

Net Force universe

  • Net Force (1999)
  • Hidden Agendas (1999)
  • Night Moves (1999)
  • Breaking Point (2000)
  • Point of Impact (2001)
  • CyberNation (2001)
  • State of War (2003)
  • Changing of the Guard (2003)
  • Springboard (2005)
  • The Archimedes Effect (2006)

Net Force Explorers universe

Power Plays series

  • Politika (novel, 1997)
    • Politika (video game) by Red Storm Entertainment
    • Politika (board game)
  • ruthless.com (novel, 1998)
    • ruthless.com (video game, 1998) by Red Storm Entertainment
  • Shadow Watch (novel, 1999) by Jerome Preisler
    • Shadow Watch (video game, 1999) by Red Storm Entertainment
  • Bio-Strike (novel, 2000) by Jerome Preisler
  • Cold War (novel, 2001) by Jerome Preisler
  • Cutting Edge (novel, 2002) by Jerome Preisler
  • Zero Hour (novel, 2003) by Jerome Preisler
  • Wild Card (novel, 2004) by Jerome Preisler

Ghost Recon universe

EndWar universe

H.A.W.X universe

  • Tom Clancy’s H.A.W.X by Grant Blackwood as David Michaels

Non-fiction

Guided Tour

Study in Command

Other

  • The Tom Clancy Companion — Edited by Martin H. Greenberg — Writings by Clancy along with a concordance of all his fiction novels, detailing characters and military units or equipment.

Video games

In 1996, Clancy co-founded the video game developer Red Storm Entertainment and ever since he has had his name on several of Red Storm’s most successful games. Red Storm was later bought by publisher Ubisoft Entertainment, which continued to use the Clancy name, though the extent of Clancy’s actual involvement with creation of the games and development of intellectual properties, if any, was unclear. This game series includes:

Board games

Achievements and awards

References

  1. Jump up to:a b c d Clancy, Tom (October 31, 1997). “alt.books.tom-clancy”. groups.google.com. Retrieved 2012-03-20.
  2. Jump up^ A few sources, such as Who’s Who and “Tom Clancy”Encyclopedia Britannica Online. Retrieved March 20, 2012., give his birth date as March 12, 1947. He died Wednesday October 2, 2013.
  3. Jump up^ Anderson, Patrick (1 May 1988). “King of the Techno-thriller”New York Times Magazine.
  4. Jump up to:a b Quinn, Judy (24 August 1997). “$100M Mega-Deals for Clancy”Publishers Weekly 243 (34).[dead link]
  5. Jump up^ “Alexandra Llewellyn, Tom Clancy,” The New York Times, June 27, 1999.
  6. Jump up to:a b “Tom Clancy”. NNDB. 1999-06-26. Retrieved 2010-02-28.
  7. Jump up^ Mitchell, Richard (2008-03-25). “Clancy name bought by Ubisoft, worth big bucks. SOURCE: www.chatwave.in”. Xbox360fanboy.com. Retrieved 2010-02-28.
  8. Jump up^ Paperback Writer, The New Republic, May 25, 2004.
  9. Jump up^ 23 October 2007. “Tom Clancy on Sept 11 2001 & WTC 7 Collapse”. Youtube.com. Retrieved 2010-02-28.
  10. Jump up^ “An hour about the 9/11 attacks”. Charlierose.com. 2001-09-11. Retrieved 2010-02-28.
  11. Jump up^ LaPierre, Wayne (1994). Guns, Crime, and Freedom. HarperPerennial. p. xiii.ISBN 978-0-06-097674-3.
  12. Jump up^ Schindehette, Susan (15 June 1998). “Storm Rising”People Magazine 49 (23): 141.
  13. Jump up^ Jones, Brent (27 August 2008). “Reconsider Clancy case ruling”Baltimore Sun.
  14. Jump up^ “Case No. 04-C-03-000749 OC”. Circuit Court for Calvert County. Retrieved March 23, 2012.
  15. Jump up^ Kennedy, John R. (2013-10-02). “Author Tom Clancy dead at 66 – Okanagan”. Globalnews.ca. Retrieved 2013-10-02.
  16. Jump up^ “Tom Clancy, author of ‘Hunt for Red October’ and ‘Patriot Games,’ dead at 66″. NY Times. Retrieved 2 October 2013.
  17. Jump up^ “Command Authority by Tom Clancy”. Barnesandnoble.com. Retrieved 2013-10-02.
  18. Jump up^ Ryan, Michael E. (12 April 2000). “Shadow Watch”. Gamespot. Retrieved 23 March 2012.
  19. Jump up^ Totilo, Stephen (May 12, 2011). “Ghost Recon: Future Soldier Will Rival the Shooter Heavyweights, but is Getting Far Out of the Way”. Kotaku. Retrieved May 12, 2011.
  20. Jump up^ “Tom Clancy’s Politika | Board Game”. BoardGameGeek. Retrieved 2011-12-19.
  21. Jump up^ “Washington Post”. Washington Post. 1997-06-01. Retrieved 2010-02-28.
  22. Jump up^ “Rensselaer Magazine: Summer 2004: At Rensselaer”. Rpi.edu. Retrieved 2010-02-28.
  23. Jump up^ “TC Post: Clancy Speaks Again Briefly”. Clancyfaq.com. 2000-06-25. Retrieved 2010-02-28.

External links

Read Full Post | Make a Comment ( None so far )

Benghazi One Year Later — The White House and CIA Stonewalling and Coverup Continues — No Arrests or Justice For The Victims — Who Ordered The Stand Down of Military and CIA Operators — Obama or Jarrett or Both? — Videos

Posted on September 11, 2013. Filed under: American History, Blogroll, Communications, Constitution, Crime, Economics, European History, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Islam, Islam, Language, Law, liberty, Life, Links, Literacy, media, People, Philosophy, Photos, Pistols, Politics, Psychology, Rants, Religion, Resources, Reviews, Rifles, Security, Shite, Strategy, Sunni, Talk Radio, Tax Policy, Terrorism, Video, War, Weapons, Weapons of Mass Destruction, Weather, Wisdom | Tags: , , , , , , , , , , , , , |

benghazi-victims

Benghazi Terrorist Suspects Identified But No Arrests Made RPT America Needs Answers Cavuto

Benghazi Scandal, Chris Wallace To WH Chief Of Staff Where Are Benghazi Arrest Powers & Sayegh

Benghazi One Year Later

Congressman: Benghazi Survivors Forced to Sign Non-Disclosure Agreements

[youtube3=http://www.youtube.com/watch?v=bBEvahC_ZFg]

Benghazi 1 YR Later Top Diplomat Says State Dept Failed To Send Help!

Judge Jeanine Pirro – Benghazi Terror Attack One Year Later And Still No Answers

One Year Since Benghazi And Still No Arrests – Fox News Sunday Panel – Chris Wallace – 9-8-13

CNN’s Burnett on Benghazi: “One Year Later, Justice Has Not Been Served…May Never Be Served”

Illegal Cover-up: Obama Changing Names Of Benghazi Survivors

Benghazi Assassination Coverup and Lies Being Exposed – Demand Impeachment/Resignation

Related Posts On Pronk Palisades

The Obama Avalanche: Obamacare And Obama’s Scandals (Benghazi, AP, Fox’s James Rosen, DOJ, IRS, NSA) Lead To Failed Lame Duck Presidency — Videos

Breaking News Bombshell: President Obama’s Phony Scandal and Big Lies of Benghazi Terror Attack Goes Viral As CIA Had 35 operators Assisting In Transfer from Libya of 20,000 Soviet Grinch SA-24 (Igla-S man-portable air defense system (MANPADS) ) shoulder-launched Surface-to-Air Missiles ( equivalent of U.S.-made Stinger missiles) To Syria — CIA Monthly Polygraphying of CIA Employees To Stop Leaks To Media — Videos

It Takes A Phony President Obama To Have Phony Scandals And Phony Economic Recovery That Kill Real Men And Resulted In Millions of American Citizens Unemployed — Obama Has Lost The Trust of The American People — Videos

The Obama Avalanche: Obamacare and Obama’s Scandals (Benghazi, AP, Fox’s James Rosen, DOJ, IRS, NSA) Lead To Failed Lame Duck Presidency — Videos

Obama’s CIA Covert Action Operations Provides Arms and Death Squads From Benghazi, Libya to Syria — Graphic Video of Executions — The Consequences of Obama’s Responsibility To Protect Foreign Policy — Sharia Law At Work — World War III? — Video

Who Benefited From Delaying The Disclosure of the Benghazi and IRS Scandals? President Barack Obama — Who Lost? American People — Videos

Who Wrote The Benghazi Cover-up Story of The Anti-Islamic YouTube Video for Rice, Clinton, and Obama? Ben Rhodes, Deputy National Security Advisor for Strategic Communication–Propagandist Speech Writer? — Videos

The Day They Drove Old Hillary Down–Benghazi-Gate Obama Clinton Cover-up Blown — Rice, Clinton, Obama Lied To American People and The World — Americans Died — Videos

Secretary of State Hillary Clinton Grilled Over 4 Deaths and Poor Security in Benghazi and Arms Shipments or Transfers From Libya To Turkey Bound For Syria–Denies There Was Any Shipment–Ask The Central Intelligence Agency–Videos

The Rise and Fall of General David Petreaus–Leaks and Lying: Lessons Learned–Obama Lied and Americans Died–Email Evasion of Privacy–Benghazigate–Videos

Presidential Oath Takers and Oath Breakers–Stopping The 20 Million Mexican Illegal Alien Invasion of the United States!

Read Full Post | Make a Comment ( None so far )

Western Digital My Passport 2TB and WD Nomad Rugged Carrying Case — Videos

Posted on June 22, 2013. Filed under: Blogroll, Business, Communications, Computers, Data Storage, Economics, Education, External Hard Drives, External Hard Drives, liberty, Life, Links, Literacy, media, Music, People, Philosophy, Politics, Raves, Resources, Reviews, Security, Strategy, Technology, Video, Wealth, Wisdom | Tags: , , , , , , , |

Western_Digital_2tb_passport_portable_external_hard_drive

wd-my-passport-studio-2-tb-external-hard-drive-portable-firewire-800-usb-20-

WD_2TB_My_Passport_three_colors

boxe_WD_2tb_external_hard_drive

Western-Digital-WD-Nomad-Passport-Hard-Drive-Case-Open

WD Nomad™ Rugged Case for My Passport Portable Drives

WD Nomad case for My Passport hard drives

Western Digital My Passport 2TB Unboxing and Review

Western Digital Elements 2TB External Hard Drive Review

Western Digital My Passport 2TB USB 3.0 portable hard drive review

Western Digital (WD) My Passport 2TB HDD Review

Review: Western Digital My Passport (2TB)

If looks aren’t paramount, you’d be hard pressed to find a better portable drive than the My Passport. It has plenty of capacity and top-notch performance.

The My Passport is Western Digital’s mainstream line of portable hard drives. The best performer in the roundup, it’s available in 500GB to 2TB flavors for twice the available capacity of any of the other drives we tested.

The $180, 2TB My Passport that WD sent us took the top spot by a very slight margin over its slimmer My Passport Edge cousin. It read our 10GB mix of files and folders at 61.2MBps, and it wrote them at 48.3MBps. The same operations with our large 10GB file registered 113.2MBps and 104.2MBps. That’s fast in anyone’s book; it’s more than adequate for streaming HD movies, backing up client PCs, or any other chore you can think of.

WD’s SmartWare software bundle comes preloaded on the My Passport. The package supports the PC and the Mac, offering secure erase, SMART status, drive-level password protection, and sleep timer adjustment, as well as backup. While it’s neither the smallest nor the sexiest drive in this roundup, the My Passport is arguably the best all-around product.

Note: This review is part of a five-product roundup. Click here to return to the introduction, or click on the next review you’d like to read:

Rocstor Lancer LX (500GB)

Seagate Satellite Mobile Wireless Storage (500GB)

Seagate Slim (500GB)

Western Digital My Passport Edge (500GB)

 

read20tes-100010983-large

write20tes-100010984-large

http://www.pcworld.com/article/2013329/review-western-digital-my-passport-2tb.html

How to buy the best portable hard drive

By Michael Brown

ou can never have too much digital storage, and the day will come—sooner than you think—when you won’t be able to squeeze a single new file onto your computer’s hard drive. And if your primary computer is a laptop or an all-in-one desktop, you won’t be able to solve the problem by opening the case and tossing in a supplemental drive.

One solution might be to rent storage space in the cloud, but buying a hard-drive’s worth of capacity is prohibitively expensive: 500GB of storage on Dropbox, for example, will set you back $499 per year. If you need just storage, as opposed to a service for file syncing or collaborating via the cloud, buying a portable hard drive is far more economical. For less than $200, you can get a 2TB drive that supplies four times the capacity of a Dropbox account. Pay for that storage capacity once, and you’ll own it forever—and you can take it with you wherever you go. Before you can choose the right drive, however, you have to identify your needs, wants, and budget.

Mac or PC: OS X and Windows use different file systems (HFS+ and NTFS, respectively), so most hard-drive manufacturers offer platform-specific models; the drives are preformatted accordingly, and the bundled software (if any) is compatible with the given platform. OS X can read files on an NTFS drive, but it can’t write them. If you intend to use the same drive on both platforms, you can install software on your Mac that will enable it to do both: NTFS-3G is a free option. If you prefer commercial software, take a look at Paragon NTFS ($20) or Tuxera NTFS ($32).

Capacity: To determine how much storage you need, consider adopting this rule of thumb from drive manufacturer Western Digital: A 500GB hard drive can store approximately 100,000 digital photos taken with a 6-megapixel camera, or 125,000 songs encoded as 128-kbps MP3 files. Higher-resolution photos and music, of course, consume more storage.

Everything else being equal, a high-capacity drive will deliver a better price-to-performance ratio than a low-capacity model: For instance, a 500GB drive priced at $100 costs around 20 cents per gigabyte, while a 2TB drive priced at $180 costs just 9 cents per gigabyte. You won’t regret buying more storage capacity than you currently need, because you will surely need more later.

Rotational speed: The rate at which a hard drive spins its platters has a direct effect on how fast it can read and write data. A drive spinning at 7200 rpm will deliver much better performance than a drive spinning at 5400 rpm. Some high-end desktop drives spin their platters at 10,000 rpm.

The Buffalo MiniStation provides both USB 3.0 and Thunderbolt connections.

Drive interface: Once you’ve decided on the speed and capacity you need, you need to consider how the drive will connect to your computer. USB is the most common interface for Macs and PCs, and USB 3.0 delivers a faster data rate than USB 2.0 (5 gbps versus 480 mbps) and more electrical power to an attached device (900mA versus 500mA). The newer standard is backward-compatible, so your computer will be able to use a USB 3.0 drive even if the computer has only USB 2.0 ports.



Thunderbolt ports are twice as fast as USB 3.0 ports, achieving a raw data transfer rate of 10 gbps. That’s speedy enough to transfer a full-length, high-definition movie in less than 30 seconds. Apple provides Thunderbolt ports on its most recent desktop and laptop computers, and the technology is beginning to show up on Windows machines, too. Thunderbolt hard drives are relatively expensive, however: At $180, Buffalo’s 500GB MiniStation HD-PA500TU3 portable drive costs nearly as much as a 2TB hard drive equipped with a USB 3.0 interface. Still, If you choose to buy one of Buffalo’s drives, you’ll be happy to know that the company includes a Thunderbolt cable in the box, given ho pricey these cables are: Apple’s 2-meter cable costs $49.

Plug this $100 adapter into any Seagate GoFlex drive, and you’ll gain a fast Thunderbolt port.

FireWire (also known as IEEE 1394) is another high-speed interface used on both Macs and many PCs. The FireWire 400 interface can support a data transfer rate of 400 mbps, while the newer FireWire 800 interface can deliver throughput of 786 mbps.

USB, Thunderbolt, and FireWire all provide enough electrical power to run an attached drive, so the only cord you’ll need to carry with you is the appropriate interface cable.

Enclosure: The vast majority of portable hard drives are 2.5-inch mechanisms, but not all portable hard drives are the same size. Some models come housed in low-profile enclosures, while others are wrapped in shock-absorbing material within ruggedized cases. Such design decisions affect the drive’s overall weight, but they also influence how well the drive can survive misadventure. If you’re a frequent traveler who grudges every ounce that goes into your laptop bag, you’ll need to work out for yourself the right balance between data security and tolerable shoulder load.

This rugged Nomad case for Western Digital’s Passport drives costs $20.

Some manufacturers, including Seagate and Western Digital, offer accessory cases for their drives that can add shock protection. We especially like the Nomad hard-shell case for Western Digital’s Passport drives. The amply padded, 6.25-ounce polycarbonate case has an opening for a USB cable, so you don’t have to remove the drive to use it.

Other features: In situations where performance is roughly equal, the easiest way for a hard drive manufacturer to differentiate its product from the competition’s is by adding special features or by bundling the drive with useful software. If you’re interested in backing up your PCs, watch for drives that come bundled with automated backup software.

If you’re security conscious, look for a drive that you can password-protect or that includes software for encrypting the data stored on it. Some Seagate drives support the Universal Storage Module standard: They use SATA as their primary hardware interface, but you can switch to a USB, Thunderbolt, or FireWire interface by plugging in the appropriate module. Seagate is also unique in offering a portable drive that can wirelessly stream media to a mobile client device.

A few of our favorite portable hard drives

Buffalo MiniStation Thunderbolt

Buffalo MiniStation Thunderbolt: The MiniStation sports both a USB 3.0 and a Thunderbolt interface, but the drive’s rather pedestrian rotational speed of 5400 rpm hobbles its overall performance. It comes preformatted for the Mac, and both USB 3.0 and Thunderbolt cables are included.

Click here to read Macworld’s complete hands-on review of the 1TB model in a Mac environment.

Rocstor Lancer LX

Rocstor Lancer LX: If you’re looking for a ruggedized drive with a very fast interface, Rocstor’s Lancer LX provides both USB 3.0 and two FireWire 800 ports. The border of the enclosure is fabricated from aluminum and can bear a fair amount of weight, while shock-absorbing material inside the case protects the drive from thumps and bumps.

Click here to read our detailed review of the 500GB model in a PC environment.

Seagate Satellite

Seagate Satellite: This battery-powered drive can create its own local hotspot, and stream audio and video to up to eight wireless clients. Seagate provides client software for Android and iOS devices, plus an NTFS driver for the Mac. It uses a USB 3.0 interface.

Click here to read our full review of the 500GB drive in a PC environment.

Seagate Slim

Seagate Slim: The 9mm-thin Seagate Slim is appropriately named. It leaves the factory with a USB 3.0 interface, but since it’s based on the Universal Storage Module standard, you can purchase an optional Thunderbolt interface for $100 (you’ll need to provide your own cable). It comes formatted for NTSF, but Seagate provides an NTFS driver for the Mac. On the downside, this model delivers only 500GB of capacity.

Click here for our hands-on review of the Slim in a PC environment.

Western Digital My Passport

Western Digital My Passport: For people who need a lot of storage on the go, this drive packs up to 2TB of space into a package that weighs just 8 ounces. It comes with a USB 3.0 interface and a collection of utilities—including automatic back-up software—for both the Mac and the PC.

Click here for our complete review of the My Passport in a PC environment.

http://www.pcworld.com/article/2015241/how-to-buy-the-best-portable-hard-drive.html

Read Full Post | Make a Comment ( None so far )

Bernanke and Federal Reserve Will End The Keyboarding of Money and Buying Bonds in 2014 and May Lower Unemployment Threshold Below 6.5% — Videos

Posted on June 19, 2013. Filed under: American History, Banking, Blogroll, Business, Communications, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government spending, history, Inflation, Investments, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Monetary Policy, Money, People, Philosophy, Politics, Radio, Raves, Resources, Reviews, Security, Talk Radio, Tax Policy, Taxes, Unemployment, Video, War, Wealth, Wisdom | Tags: , , , , , , , , , , , |

Senate Holds Hearing To Re-Nominate Ben Bernanke As Fed Chairman

Steve Forbes  Bernanke Has Failed   CNBC

Bernanke Says FOMC May Lower Unemployment Threshold

Press Conference with Chairman of the FOMC, Ben S. Bernanke 

FOMC Meeting: Does Fed, Ben Bernanke Fear QE Is Creating An Asset Bubble?

    Ben Bernanke’s Message Was Pro-Growth: Bill Gross

The Next Fed Chief: Who’s Best to Replace Ben Bernanke?

Peter Schiff Predicts Economic Crisis That Makes 2008 Look Like NOTHING!

Bernanke Says Fed on Course to End Asset Buying in 2014

Federal Reserve Chairman Ben S. Bernanke said the central bank may start dialing down its unprecedented bond-buying program this year and end it entirely in mid-2014 if the economy finally achieves the sustainable growth the Fed has sought since the recession ended in 2009.

The Federal Open Market Committee today left the monthly pace of bond purchases unchanged at $85 billion, while saying that “downside risks to the outlook for the economy and the labor market” have diminished. Policy makers raised their growth forecasts for next year to a range of 3 percent to 3.5 percent and reduced their outlook for unemployment to as low as 6.5 percent.

“If the incoming data are broadly consistent with this forecast, the committee currently anticipates that it would be appropriate to moderate the pace of purchases later this year,” Bernanke said in a press conference in Washington. If later reports meet the Fed’s expectations, “we will continue to reduce the pace of purchases in measured steps through the first half of next year, ending purchases around mid-year.”

Stocks and Treasuries slid as Bernanke’s comments raised the prospect of an end to the quantitative easing that has fueled a rally in financial markets and helped keep the world’s largest economy expanding in the face of federal budget cuts, a slowdown in China and a recession in the euro area.

Connecting Dots

“The Fed is out of the closet,” said Ward McCarthy, chief financial economist at Jefferies Group LLC in New York and a former Richmond Fed economist. “They expect to end these QE purchases. Bernanke wasn’t more specific than later this year, but connecting all the dots suggests he is thinking in the fourth quarter.”

The Standard & Poor’s 500 Index declined 1.4 percent to 1,628.93. The yield on the 10-year Treasury note jumped to 2.36 percent, the highest since March 2012, from 2.19 percent late yesterday.

Still, Bernanke tried to temper his message by saying that the Fed has “no deterministic or fixed plan” to end asset purchases.

“If you draw the conclusion that I just said that our policies — that our purchases will end in the middle of next year, you’ve drawn the wrong conclusion, because our purchases are tied to what happens in the economy,” he said. “If the economy does not improve along the lines that we expect, we will provide additional support.”

Open-Ended

Bernanke is expanding the Fed’s balance sheet toward $4 trillion as he seeks to reduce a jobless rate that stands at 7.6 percent after four years of economic growth. The Fed’s open-ended purchases, started last September and expanded in December, are unprecedented. In two previous rounds, it specified total purchases in advance.

“I’m surprised at how badly the Fed wants to taper” to a slower pace of purchases, said Julia Coronado, the chief economist for North America at BNP Paribas SA in New York and a former Fed economist. The Fed has “greater confidence than the average private sector forecaster in the outlook.”

The economy will grow 1.9 percent in 2013 and 2.7 percent in 2014, according to the median estimates in a Bloomberg survey. The economy has not grown more than 3 percent over the course of 12 months since the four quarters ending in June 2006.

The Fed also left unchanged its statement that it plans to hold its target interest rate near zero as long as unemployment remains above 6.5 percent and the outlook for inflation doesn’t exceed 2.5 percent.

Unemployment Threshold

Bernanke said policy makers might aim for a lower unemployment threshold before considering an increase in short-term interest rates.

“In terms of adjusting the threshold, I think that’s something that might happen,” he said in response to a question. “If it did happen, it would be to lower it, I’m sure, not to raise it.” He said an interest-rate increase is still “far in the future.”

Fed officials lowered their forecasts for the unemployment and inflation rates this year.

They now see a jobless rate of 7.2 percent to 7.3 percent, compared with 7.3 percent to 7.5 percent in their March forecasts. They predict the jobless rate will fall to 6.5 percent to 6.8 percent in 2014.

“Labor market conditions have shown further improvement in recent months, on balance, but the unemployment rate remains elevated,” the FOMC said in its statement. “Partly reflecting transitory influences, inflation has been running below the committee’s longer-run objective, but longer term inflation expectations have remained stable.”

Target Rate

Fifteen of 19 policy makers expect no increase in the federal funds rate before 2015, according to today’s forecasts. In March, 14 policy makers had that expectation.

The Fed repeated that it will keep buying assets “until the outlook for the labor market has improved substantially.” Bond purchases will remain divided between $40 billion a month of mortgage-backed securities and $45 billion a month of Treasury securities. The central bank also will continue reinvesting securities as they mature.

St. Louis Fed President James Bullard dissented for the first time in his tenure on the FOMC, saying the committee should “signal more strongly its willingness to defend its inflation goal in light of recent low inflation readings.”

Kansas City Fed President Esther George dissented for the fourth meeting in a row, continuing to cite concern that keeping the benchmark interest rate near zero risks creating “economic and financial imbalances,” including asset price bubbles.

Economists’ Forecasts

No change in policy was expected at today’s meeting. Fifty-eight of 59 economists in a June 4-5 Bloomberg Survey predicted the central bank would maintain the pace of purchases.

Inflation is providing little impetus for a tapering in bond purchases. A gauge of consumer prices excluding food and energy that is watched by the Fed rose 1.1 percent in the year through April, matching the smallest gain since records started in 1960. Officials expect inflation to slowly rise in coming years, with core prices climbing to 1.5 percent to 1.8 percent in 2014 and 1.7 percent to 2 percent in 2015.

Speculation that an improving economy will prompt Fed policy makers to reduce bond buying last month triggered the biggest jump in 10-year Treasury yields since December 2010.

About $2 trillion has been erased from the value of global equities since Bernanke told U.S. lawmakers on May 22 that the FOMC “could” consider reducing bond purchases within “the next few meetings” if officials see signs of improvement in the labor market and are convinced the gains can be sustained.

Mortgage Rates

Mortgage rates have soared the most in a decade on speculation the Fed’s purchases may slow. The interest rate on a 30-year fixed home loan climbed to a 14-month high of 3.98 percent last week, according to data compiled by Freddie Mac.

Bernanke is nearing the end of his second four-year term, a period marked by unprecedented measures to battle the deepest recession since the 1930s and then to keep the economy growing at a pace that’s brisk enough to put millions of unemployed Americans back to work.

The former Princeton professor cut the Fed’s target interest rate almost to zero in December 2008 and has led the central bank in three rounds of large-scale asset purchases that have swelled the Fed’s balance sheet to a record $3.41 trillion.

President Barack Obama, in an interview on PBS this week, provided one of the clearest signals yet that Bernanke may not remain beyond the end of his term on Jan. 31. Bernanke “already stayed a lot longer than he wanted or he was supposed to,” Obama said.

Bernanke declined to discuss his future at today’s press conference.

“We just spent two days working on monetary policy issues and I would like to keep the debate, discussion, questions here on policy,” he said in response to a question. “I don’t have anything for you on my personal plans.”

http://www.bloomberg.com/news/2013-06-19/fed-keeps-85-billion-pace-of-bond-buying-sees-risks-waning.html

Read Full Post | Make a Comment ( None so far )

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Posted on June 12, 2013. Filed under: American History, Blogroll, Books, Business, Communications, Demographics, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Politics, Programming, Psychology, Radio, Raves, Resources, Reviews, Strategy, Talk Radio, Tax Policy, Video | Tags: , , , , , , , , , , , , , , , , , |

sASHA_iSSENBER

THE_VICTORY_lAB

Strata 2013: Sasha Issenberg, “The Victory Lab”

Sasha Issenberg interviewed at Strata Santa Clara 2013

Sasha Issenberg Discusses His New Book, ‘The Victory Lab’

Sasha Issenberg | The Victory Lab: How Innovation Happens in Electioneering | PDF13

Algorithmic Trading to Algorithmic Campaigning, Behind the Political Scene w/Sasha Issenberg

The Anatomy of an Election: Technology with Sasha Issenberg

The Victory Lab: ‘Moneyball for Politics'” Sasha Issenberg

A Conversation with Sasha Issenberg

Sasha Issenberg discusses the 2012 Obama campaign

Sasha Issenberg discusses the use of social science experiments in Rick Perry’s 2006 campaign

Sasha Issenberg speaks at NationBuilder

How They Did It: Political Tactics That Helped Obama Win

Can You Replicate the Obama Strategy? | The New School for Public Engagement

Political campaigns have revolutionized the way they target, contact and motivate supporters. Strategists are taking the insights of experimental social science and marrying them to the corporate world’s Big Data marketing tools. The Obama Campaign won in large part by using statistical modeling techniques to identify persuadable voters and to fine-tune persuasive messages. This is politics today and in the future—not only for elections but on issue campaigns for education reform, health care, the environment, labor rights and beyond. Who are the pioneers? And how might you apply their the strategies?

Related Posts On Pronk Palisades

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

NSC’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

Posted on May 30, 2013. Filed under: Airplanes, American History, Autos, Blogroll, Business, Communications, Constitution, Crime, Demographics, Drug Cartels, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Illegal, Immigration, Language, Law, Legal, liberty, Life, Links, Literacy, Macroeconomics, media, Politics, Press, Private Sector, Psychology, Public Sector, Radio, Rants, Raves, Reviews, Tax Policy, Transportation, Unemployment, Unions, Video, War, Wealth, Wisdom | Tags: , , , , , , , , , , |

Defeat The Gang of 8 Amensty For Illegal Immigation Bill

gang_eight

8_immigration

Gang Of Eight Senators Kill Amendment Requiring Border Fence

Rep. Steve King: Immigration Legislation is ‘Breathtaking, Outrageous Form of Amnesty’

Heritage Foundation Report on the cost of legalizing 11 mn illegal immigrants

Legalizing Illegals Will Cost $6.3 Trillion!

Wood Says Immigration Amnesty to Cost $6.3 Trillion

Schumer Refuses To Estimate Future Immigration Flow Under Gang Of Eight Proposal

 Cruz Offers Amendments to ‘Gang of Eight’ Bill

Congressman Steve King leads House opposition to Senate’s Gang of Eight immigration bill

Law Officers Plead With Congress To Hear Their Concerns Over Proposed Amnesty Bill

Sessions: Gang Of Eight Sticking Together To Defeat Improvements To Their Bill

Top ICE Agent: ‘Zero Confidence In This Administration’ To Deliver On Immigration Enforcement

The Gang Of 8’s Opposition Cost $6.3 Trillion – Sessions: 35 million Illegals New Citizen – Dobbs

Sessions: Gang Of Eight Bill Would Surge Low-Skill Immigration, Hurt Working Americans

Sessions: Senate Rushing Immigration Bill Lawmakers Haven’t Read

US. & Mexican Government Working Together To Provide Legal & illegal Aliens Food Stamp – O’Reilly

Border Patrol Official: Illegal Immigrants To Get ‘A Free Pass’ Under President’s New Policy

Sen. Sessions: Senate immigration bill will ‘hammer working Americans’

By Bernie Becker

Sen. Jeff Sessions (R-Ala.) said Friday that the Senate immigration reform bill would “hammer working Americans.”

Sessions, one of the immigration overhaul’s most strident critics, suggested the measure would prioritize foreign-born workers over people already in the U.S. struggling to find a job.

“This is far, far too many low-skilled workers that are going to take jobs and pull down wages of people unemployed and underemployed right now,” Sessions, a senior member of the Senate Judiciary Committee, said on Fox Business. “It’s really, really dangerous.”

The Senate Judiciary panel cleared the immigration bill crafted by the so-called “Gang of Eight” this week by a bipartisan 13-5 vote, and its supporters hope to rack up 70 votes in the chamber.

But Sen. Robert Menendez (D-N.J.), one of the Gang of Eight, said Friday that the vote doesn’t yet have 60 votes in the chamber. Sen. Orrin Hatch (Utah), another senior Republican on the Judiciary panel, voted for the measure in committee, but has said he might not back it on the Senate floor.


Read more: http://thehill.com/blogs/blog-briefing-room/news/301979-sessions-immigration-bill-will-hammer-working-americans#ixzz2ULNbxOq3
Follow us: @thehill on Twitter | TheHill on Facebook

 

Related Posts On Pronk Palisades

NSC’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

Fast and Syrious: Obama’s Gun-Running Benghazi CIA “Title 50″ Covert Action Operation With Syrian Rebels Strawmen for Al-Qaeda — Videos

Posted on May 11, 2013. Filed under: American History, Ammunition, Blogroll, Bomb, College, Communications, Diasters, Economics, Education, Employment, Energy, Federal Government, Foreign Policy, government spending, history, Islam, Language, Law, liberty, Life, Links, Natural Gas, People, Philosophy, Pistols, Politics, Reviews, Rifles, Strategy, Talk Radio, Video, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

obama-arming-al-qaeda-syria-battaile-politics-13526874571

CIA Special Operator

Covert Action

“The term “covert action” means an activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly, but does not include . . . (2) traditional . . . military activities or routine support to such activities.

What roles Turkey play in Syria’s insurgency?

WW3 in ACTION: US LAUNCH covert OPERATION to ARM militants in Syria with HEAVY WEAPONS!

Retired Lt. Gen. Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi

Retired Army Lt. Gen. William G. Boykin—who is the former commander of the U.S. Special Forces Command, the former deputy undersecretary of defense for intelligence and who, in the 1990s, worked with the CIA—told CNSNews.com in a video interview last week that he believes it is a reasonable supposition that the U.S. was supporting or planning to support the Syrian rebels via Benghazi, Libya.

“The CIA Is Nothing More Than A Front For Global Gansters!” CIA’s Role In The Syrian Conflict

BREAKING! Pres Obama Authorizes COVERT Support To Syrian Rebels “Could Have Been Going On For Months

English News Today – CIA: from intelligence agency to killing machine

English News Today – ‘CIA-armed Syria militants will turn against US’

The United States government assists militants across the world, only to one day fight against them, a prominent political activist tells Press TV. In the background to this, Syria has been experiencing unrest since mid-March 2011, with the Syrian government and experts saying an anti-Syria plot was hatched by the US, Qatar and Saudi Arabia.

Press TV has conducted an interview with Sara Flounders, co-director of the International Action Center, from New York, to further discuss the issue. Flounders is joined by Scott Rickard, a former US intelligence linguist from Florida, and George Lambraski, a former US diplomat, from London.

Ron Paul on Covert U.S. Support of Terrorist Insurrection in Syria

June 27, 2012 – Ron Paul warns of the ongoing U.S. government’s covert support of the terrorist insurrection against the Syrian government and offers a short history of the quagmires and blowback that U.S. interventions abroad have brought about.

Pul – Interview with Charlie Wilson, 2009

Charlie Wilson’s War – Trailer(HD) Tom Hanks, Julia Roberts

Charlie Wilson’s War (8/9) Movie CLIP – Anti-Helicopter Light Missile (2007) HD

Glenn Beck – Benghazi: Truth coming out

Soros, Obama & ‘Responsibility to Protect’

END WAR: Scheuer On CIA In Libya To Arm Islamist And May Be US Ground Invasion In Another Arab State

The truth about SYRIA by Westerns

Syrian Rebels Capture City Near Jordanian Border – Libya Vs Syria Where’s The Obama Admin?

Gaffney on Benghazi » Not Just About Cover Up « About Administration Embracing Muslim Brotherhood

ADM Lyons, “Muslim Brotherhood has penetrated every government agency”

ADM “Ace” Lyons, Former Commander in Chief of the U.S. Pacific Fleet, the largest single military command in the world, states, “The Muslim Brotherhood has penetrated every level of the US government.”

End the Coverup: Rep. Frank Wolf Urges New Benghazi Investigation

Rep. Frank Wolf called a press conference outside the capitol to discuss his sponsorship of H. Res. 36, which would create a special congressional committee to investigate the failures that contributed to the deadly jihadist attack in Benghazi, Libya last year. He was joined by Family Research Council’s Lt. Gen. Jerry Boykin, former Deputy Undersecretary of Defense for Intelligence and former member of Delta Force. Boykin represented Special Operations Speaks, a group of ex-special forces operators who came together to write a letter to Members of Congress, urging them to commit to getting to the bottom of what happened in Benghazi, and to end the administration’s cover-up. Finally, the Center for Security Policy’s Frank Gaffney spoke about the implications of the attack in Libya on America’s national security and foreign policy in the Middle East/North Africa region.

Write a letter to your congressman at Http://www.endthecoverup.com

Gen. Jerry Boykin: “Get accountability and get the truth out” on Benghazi

Rand Paul: I Believe Part of Cause for Benghazi Attack Was Gun-Running Operation Going

Syrian rebel group Al-Nusra allies itself to al-Qaeda

Nusra Front and al-Qaeda in Iraq are joining forces to bring back the Caliphate.

A Caliphate Is Coming – GBTV

George Galloway In Syria Rebels are funded & operated by Americans & NATO Forces

Obama Hiding Arms Shipments To Syrian Jihadists

Lebanon seizes 150 tons of Libyan arms en route to Syrian rebels

Treason: Benghazi Revelations Could Sink Obama

Benghazi-Gate: Connection between CIA and al-Qaeda in Libya and Syria, with Turkey’s Help

Benghazi-Gate: Connection between CIA and al-Qaeda in Libya and Syria, with Turkey’s Help

Syrian Rebel Group Joins Branch Of Al Qaeda

West Intervenes to Stop Islamist Rebels in Mali but Supports Them to Destroy Syria

Presidential Finding

A presidential finding is an executive directive issued by the head of the executive branch of a government, similar to the more well-known executive order. The term is mostly used by the United States Government, and in other countries may be identified by different terms. Such findings and other executive decrees are usually protocols which have evolved through the course of government and not typically established by law.

Use and history in the United States

“US President Barack Obama has signed a secret order allowing the CIA and other American agencies to support rebels seeking to overthrow the Assad regime, a US government source told Reuters. Obama reportedly gave the order, known as an intelligence “finding”, earlier this year. The presidential finding also provides for US collaboration with a secret command center operated by Turkey and its allies. The full extent of the assistance the “finding” allows the CIA to give the Syrian rebels is unclear. It is also unknown precisely when Obama signed the order.” The report of Obama’s authorization for covert rebel support comes amidst continued fighting between Syrian government troops and rebels over control of Aleppo, the country’s economic capital. Thousands of people have fled the city, while the government and rebels continue to release conflicting reports on the extent of their control over the city. Asia Times Online correspondent Pepe Escobar told RT that the leak’s timing was intended to distort the true nature of Washington’s covert operations on the ground in Syria.

“This intelligence finding signed by Obama – that’s the code for a secret order – this was signed six months ago. So the fact that Reuters has only been allowed now to report about it proves that there have been high deliberations in Washington: ‘should we let people know about what they already know?’”

“In fact, the Washington Post two weeks ago had already reported about it, and when the CIA wants to leak something in the US, they usually go to the Washington Post. The CIA and Mossad, on the ground [in Syria], side by side working with the Qataris, the Turks, the Saudis and a swarm of jihadis coming from everywhere, but especially from across the border in Iraq,” he argues.

Escobar says the leak was intended to make it look as though Washington was leading the Syrian campaign from behind the scenes, when in fact the US is “leading from the front lines alongside al-Qaeda-style Jihadists, Qatari intelligence, and Turkish logistics.” [1]

The first specific use of presidential findings was precipitated by the Agricultural Trade Development and Assistance Act of 1954, in which the findings indicated that certain conditions of that act had be satisfied and, therefore, sales of agricultural commodities could proceed. In their use under this act, such findings were published in the Federal Register and the CFR Title 3 compilations. In contrast, presidential findings in their modern use are not published in these or other governmental publications.

Current use of the presidential finding stems from the so-called Hughes-Ryan amendment to the Foreign Assistance Act of 1974, which prohibited the expenditure of appropriated funds by or on behalf of the Central Intelligence Agency for intelligence activities “unless and until the President finds that each such operation is important to the national security of the United States and reports, in a timely fashion, a description and scope of such operation to the appropriate committees of Congress” (section 662). This was intended to ensure that clear responsibility for such action was attributable to the President and that Congress was always made aware of such activities. Due to the sensitivity of their content, presidential findings are almost always classified.

The most recent change to exercise of findings occurred in the Intelligence Authorization Act of 1991, which introduced increased flexibility in the reporting requirement: findings are to be “reported to the intelligence committees as soon as possible” after being approved “and before the initiation of the covert action authorized by the finding.” As such, presidential findings are one of the primary means through which the intelligence committees exercise their oversight of the government’s intelligence operations.

http://en.wikipedia.org/wiki/Presidential_finding

Covert Action: Title 10, Title 50, and the Chain of Command

By Joseph B. Berger III

Abstract

America champions the rule of law and must maintain that moral stance in its international dealings and retain the clarity of an unambiguous chain of command. The Abbottabad raid on Osama bin Laden’s compound highlighted the dangers and vagaries of departing from the traditional military chain of command. The Secretary of Defense was taken out of the chain and the CID Director was inserted. In contrast, the rescue of a U.S. citizen in Somalia was carried out secretively but not covertly by joint forces under military command, maintaining individual Servicemember protections that may be forfeit in the gray zone of questionable legality. National authorities should reconsider the rejection of the 9/11 Commission’s recommendation that DOD be responsible for paramilitary covert actions, and when DOD acts in that capacity, the operation should be carried out as a traditional military operation with a military chain of command.

Recent media reports have Pentagon officials considering “putting elite special operations troops under CIA [Central Intelligence Agency] control in Afghanistan after 2014, just as they were during last year’s raid on [Osama bin Laden’s] compound.”1 This shell game would allow Afghan and U.S. officials to deny the presence of American troops in Afghanistan because once “assigned to CIA control, even temporarily, they become spies.”2 Nearly simultaneously, Department of Defense (DOD) leaders were warned to “be vigilant in ensuring military personnel are not inappropriately utilized” in performing “new, expanding, or existing missions,” ensuring the force is aligned against strategic choices “supported by rigorous analysis.”3 Placing Servicemembers—uniformed members of the Army, Navy, Marine Corps, and Air Force—under CIA control demands such rigorous analysis. The raid on bin Laden’s compound provides a framework.

n his May 1, 2011, televised address, President Barack Obama reported “to the American people and to the world that the United States ha[d] conducted an operation that killed Osama bin Laden.”4 President Obama initially detailed little beyond noting that he had directed “the[n] Director of the CIA [Leon Panetta], to make the killing or capture of bin Laden the top priority of our war against al Qaeda” and that the operation, carried out by a “small team of Americans” was done “at [his] direction [as President].” In the following days, senior executive branch officials garrulously provided explicit details, from the now-iconic White House Situation Room photograph to intricate diagrams of the Abbottabad compound and the assault force’s composition. Most noteworthy was Panetta’s unequivocal assertion the raid was a covert action:

Since this was what’s called a “Title 50” operation, which is a covert operation, and it comes directly from the president of the United States who made the decision to conduct this operation in a covert way, that direction goes to me. And then, I am, you know, the person who then commands the mission. But having said that, I have to tell you that the real commander was Admiral [William] McRaven because he was on site, and he was actually in charge of the military operation that went in and got bin Laden.5

Despite his self-effacing trumpeting of Vice Admiral McRaven’s role, Panetta’s comment highlights that critical confusion exists among even the most senior U.S. leaders about the chain of command and the appropriate classification of such operations.

Openly describing the raid as both a “covert operation” and “military operation,” Panetta asserted he was the “commander,” describing a chain of “command” that went from the President to Panetta to McRaven. Panetta’s public comments are problematic, as is describing a chain of command that excludes the Secretary of Defense and purports to route command authority through the CIA director. Title 50 is clear:

The term “covert action” means an activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly, but does not include . . . (2) traditional . . . military activities or routine support to such activities.6

The administration did the opposite, making patently clear the raid’s nature and, in exhaustive detail, the precise role of the United States. Instead of categorizing it as a covert action under the director’s “command,” the President could have conducted the raid as a covert action under the Secretary of Defense instead of the CIA director, or under his own constitutional authority as Commander in Chief and the Secretary’s statutory authorities, classifying it as a traditional military activity and excepting it from the statute’s coverage. As a traditional military activity, there would have been no legal limits on subsequent public discussion. Alternatively, conducting the raid as a covert action within a military chain of command removes the issues the director raised in asserting command authority over Servicemembers. The decisionmaking process remains shrouded, but conducting a raid into a sovereign country targeting a nonstate actor using military personnel and equipment under the “command” of the CIA director and classifying it as a covert action raises significant legal and policy questions. Such decisions threaten the legitimacy and moral authority of future U.S. actions and demand a rigorous examination of those associated risks.

The Abbottabad raid illustrates the post-9/11 security environment convergence of DOD military and CIA intelligence operations.7 While dead terrorists attest to this arrangement’s efficacy, many directly challenge the legal and policy framework behind current DOD-CIA cooperation. The discourse focuses largely on distinctions between Title 10 and Title 50 and the legal basis for conducting apparently overlapping military and intelligence operations beyond the battlefields of Iraq and Afghanistan. Notwithstanding the potentially misleadingly simple labels of Title 10 and Title 50, these complex issues lack clear answers. Many argue the legacy structure ill equips the President to effectively combat the threat. But tweaking that structure carries risk. Thus, correctly classifying and structuring our actions within that framework are critical. The law of war is designed to protect our nation’s military forces when they are engaged in traditional military activities under a military chain of command; spies conducting intelligence activities under executive authority have no such protections. This distinction rests on a constitutional, statutory, treaty, and doctrinal framework underpinning the military concept of command authority.

U.S. power relies on moral and legal legitimacy. Exclusive state control over the legitimate use of armed force remains viable domestically and internationally only where exercised within an accepted framework. Thus, employing DOD forces in a nontraditional manner entails significant risk. The policy implications of classification and structure are neither semantic nor inconsequential, and must be understood by senior decisionmakers; likewise, individual Servicemembers must understand the practical effects. A rigorous risk analysis should therefore inform any deviation, however permissible under domestic law.

This article focuses on the risks associated with both using military personnel to conduct kinetic covert action and using them without a military chain of command. Those risks inform the recommendation to change practice, but not the law. Specifically, the author rejects melding distinct operational military (Title 10) and intelligence (Title 50) authorities into the often mentioned Title 60. Properly classifying actions—either under the statute as a covert action or exempted from the statute as a traditional military activity—ensures the correct command structure is in place.8 Ultimately, the analysis argues for revisiting the previously rejected 9/11 Commission recommendation to place paramilitary covert action under DOD control.9

This article first outlines current and likely future threats and then explains the critical terms of art related to covert action and, against that lingua franca, examines why kinetic military operations should be either classified as traditional military activities or kept under a military chain of command. Analyzing the relevant constitutional, statutory, treaty, and doctrinal elements of command, this article illustrates that a raid conducted like the Abbottabad raid, while legally permissible, is best conducted as a traditional military activity.

Changed Character of the Battlefield and Enemy

In the decade since 9/11, DOD and CIA elements have become “operationally synthesi[zed].”10 A senior intelligence official recently noted that “the two proud groups of American secret