Wild Horses on Public Lands and the impact on Ranching and Communities
We took the show to Beaver County this week to get an on the ground look at how wild horses impact the range. In Utah the population of wild horses is over the Appropriate Management Level (AML) by 1,300 animals. Nationally the problem of dealing with the number of wild horses increases to 14,000 beyond the AML. The management of wild horses costs the BLM tens of millions of dollars every year but despite the efforts to gather wild horses off the range; the numbers keep increasing.
Chad Booth talks to Beaver County Commissioner, Mark Whitney; Iron County Commissioner, David Miller; and local rancher Mark Winch about the impacts on ranchers and the ultimate impact it has on the economies of rural Utah.
Transfer of Public Lands
Public Lands in Utah County Seat Season3, Episode 8
In recent years there has been a public outcry from Utahans asking the State to take a more active role in how management decisions are made on public lands. The take back Utah movement has looked at the history of public lands in the United States and began to ask why hasn’t Utah received the same treatment as other states in the Union. Utah has about 67% of its lands controlled and managed by the federal government. Some counties in the state are about 90% federally owned which creates a burden on the local governments because there is no property tax base to pay for the services that citizens need.
Last year Utah passed the Utah Public Lands Transfer Act, HB148; which basically asks the federal government to dispose of the remaining unallocated federal lands within the state by 2014. HB148 has opened up a conversation about what the proper role of the federal government should be in the management of public lands. Today’s show takes a look at the issues from a federal, state, and county perspective.
WARNING! MORE FOOD INFLATION COMING 2014 STOCK UP ASAP
Grocery Prices Soar
Spike in food prices has shoppers feeling effects – Mar 19th, 2014
U S Government Says ‘No Inflation’ As Food Prices Soar New update 2014
Preppers: Food Prices Rise Sharply – Up 19% for 2014!
Milk Prices PKG
Food Prices The Shocking Truth
Food Prices The Shocking Truth 1 of 2
Food Prices The Shocking Truth 2 of 2
Worldwide Food Shortages
GLOBAL FOOD CRISIS to Usher in Worldwide Famine
Where’s the (Cheap) Beef? US Prices Soar
Meat Beef Bacon Costs Rise due to Drought? Inflation! Starvation Great-Depression Dollar$
Beef prices explained
BLM Wild Horse Strategy
The BLM’s Wild Horse and Burro Program
BLM Socorro Water Trap Method Wild Horse Gather
The World Food Crisis ~ Special Report
Don’t Fence Me In – Roy Rogers & The Sons of the Pioneers –
Roy Rogers & Sons of The Pioneers Sing “The Last Roundup”
Wild horses targeted for roundup in Utah rangeland clash
By Jennifer Dobner April 11, 2014 8:41 PM
Two of a band of wild horses graze in the Nephi Wash area outside Enterprise, Utah, April 10, 2014. REUTERS/Jim …
ENTERPRISE, Utah (Reuters) – A Utah county, angry over the destruction of federal rangeland that ranchers use to graze cattle, has started a bid to round up federally protected wild horses it blames for the problem in the latest dustup over land management in the U.S. West.
Close to 2,000 wild horses are roaming southern Utah’s Iron County, well over the 300 the U.S. Bureau of Land Management has dubbed as appropriate for the rural area’s nine designated herd management zones, County Commissioner David Miller said.
County officials complain the burgeoning herd is destroying vegetation crucial to ranchers who pay to graze their cattle on the land, and who have already been asked to reduce their herds to cope with an anticipated drought.
Wild horse preservation groups say any attempt to remove the horses would be a federal crime.
On Thursday county workers, accompanied by a Bureau of Land Management staffer, set up the first in a series of metal corrals designed to trap and hold the horses on private land abutting the federal range until they can be moved to BLM facilities for adoption.
“There’s been no management of the animals and they keep reproducing,” Miller said in an interview. “The rangeland just can’t sustain it.”
The conflict reflects broader tension between ranchers, who have traditionally grazed cattle on public lands and held sway over land-use decisions, and environmentalists and land managers facing competing demands on the same land.
The Iron County roundup comes on the heels of an incident in neighboring Nevada in which authorities sent in helicopters and wranglers on horseback to confiscate the cattle herd of a rancher they say is illegally grazing livestock on public land.
In Utah, county commissioners warned federal land managers in a letter last month that the county would act independently to remove the horses if no mitigation efforts were launched.
Cattle rancher Jeremy Hunt looks out over land, at a barbed wire fence in the Nephi Wash area outsid …
“We charge you to fulfill your responsibility,” commissioners wrote. “Inaction and no-management practices pose an imminent threat to ranchers.”
The operation was expected to last weeks or months.
“The BLM is actively working with Iron County to address the horse issue,” Utah-based BLM spokeswoman Megan Crandall said, declining to comment further.
Attorneys for wild horse preservation groups sent a letter this week to Iron County commissioners and the BLM saying the BLM, under federal law, cannot round up horses on public lands without proper analysis and disclosure.
“The BLM must stop caving to the private financial interests of livestock owners whenever they complain about the protected wild horses using limited resources that are available on such lands,” wrote Katherine Meyer of Meyer, Glitzenstein and Crystal a Washington, DC-based public interest law firm representing the advocates.
The BLM puts the free-roaming wild horse and burro population across western states at more than 40,600, which it says on its website exceeds by nearly 14,000 the number of animals it believes “can exist in balance with other public rangeland resources and uses.”
Wild horse advocates point out that the tens of thousands of wild horses on BLM property pales into comparison with the millions of private livestock grazing on public lands managed by the agency.
Wild horses have not been culled due to budget constraints, according to Utah BLM officials, who say their herds grow by roughly 20 percent per year.
Pressure on rangeland from the horses may worsen this summer due to a drought that could dry up the already sparse available food supply, according to Miller.
“We’re going to see those horses starving to death out on the range,” he said. “The humane thing is to get this going now.”
Adding to frustration is BLM pressure on ranchers to cut their cattle herds by as much as 50 percent to cope with the drought, Miller said.
A tour of Iron County rangeland, not far from the Nevada border, illustrates the unchecked herds’ impact on the land, said Jeremy Hunt, a fourth generation Utah rancher whose cattle graze in the summer in a management area split through its middle by a barbed wire fence.
On the cattle side of the fence, the sagebrush and grass landscape is thick and green. The other, where a group of horses was seen on Thursday, is scattered with barren patches of dirt and sparse vegetation.
“This land is being literally destroyed because they are not following the laws that they set up to govern themselves,” said Hunt, who also works as a farmhand to make ends meet for his family of six.
“I want the land to be healthy and I want be a good steward of the land,” he added. “But you have to manage both sides of the fence.”
Wholesale Prices in U.S. Rise on Services as Goods Stagnate
By Lorraine WoellertApr 11, 2014 9:07 AM CT
Wholesale prices in the U.S. rose in March as the cost of services climbed by the most in four years while commodities stagnated.
The 0.5 percent advance in the producer-price index was the biggest since June and followed a 0.1 percent decrease the prior month, the Labor Department reported today in Washington. The recent inclusion of services may contribute to the gauge’s volatility from month-to-month, which will make it more difficult to determine underlying trends.
Rising prices at clothing and jewelry retailers and food wholesalers accounted for much of the jump in services, even as energy costs retreated, signaling slowing growth in emerging markets such as China will keep price pressures muted. With inflation running well below the Federal Reserve’s goal, the central bank is likely to keep borrowing costs low in an effort to spur growth.
“Every six months or so service prices seem to pop, but over the year, service prices tend to dampen inflation more often than not,” Jay Morelock, an economist at FTN Financial in New York, wrote in a note. “One month of price gains is not indicative of a trend.”
Also today, consumer confidence climbed this month to the highest level since July, a sign an improving job market is lifting Americans’ spirits. The Thomson Reuters/University of Michigan preliminary April sentiment index rose to 82.6 from 80 a month earlier.
Stocks dropped, with the Standard & Poor’s 500 Index heading for its biggest weekly decline since January, as disappointing results from JPMorgan Chase & Co. fueled concern that corporate earnings will be weak. The S&P 500 fell 0.4 percent to 1,826.29 at 10:02 a.m. in New York.
Today’s PPI report is the third to use an expanded index that measures 75 percent of the economy, compared to about a third for the old metric, which tallied the costs of goods alone. After its first major overhaul since 1978, PPI now measures prices received for services, government purchases, exports and construction.
Estimates for the PPI in the Bloomberg survey of 72 economists ranged from a drop of 0.2 percent to a 0.3 percent gain.
Core wholesale prices, which exclude volatile food and energy categories, climbed 0.6 percent, the biggest gain since March 2011, exceeding the projected 0.2 percent advance of economists surveyed by Bloomberg. They dropped 0.2 percent in February.
The year-to-year gain in producer prices was the biggest since August and followed a 0.9 percent increase in the 12 months to February. Excluding food and energy, the index also increased 1.4 percent year to year following a 1.1 percent year-to-year gain in February.
The cost of services climbed 0.7 percent in March, the biggest gain since January 2010. Goods prices were unchanged and were up 1.1 percent over the past 12 months.
Wholesale food costs climbed 1.1 percent in March, led by higher costs for meats, including pork and sausage. Energy costs fell 1.2 percent last month.
Food producers and restaurants say they’re paying more for beef, poultry, dairy and shrimp. At General Mills Inc. (GIS), maker of Yoplait yogurt, Cheerios cereal and other brands, rising dairy prices helped push retail profit down 11 percent in the third quarter, said Ken Powell, chairman and chief executive officer of the Minneapolis-based company. Powell called the inflation “manageable.”
“While the economy is improving slowly and incomes are strengthening slowly, they are improving,” Powell said on a March 19 earnings call. “As incomes continue to grow and consumers gain confidence that will be a positive sign for our category.”
Today’s PPI report provides a glimpse into the consumer-price index, the broadest of three inflation measures released by the Labor Department. The CPI, due to be released April 15, probably climbed 0.1 percent in March, according to the median forecast in a Bloomberg survey.
The wholesale price report also offers an advance look into the personal consumption expenditures deflator, a gauge monitored closely by the Fed. Health care prices make up the largest share of the core PCE index, which excludes food and energy costs. The next PCE report is due from the Commerce Department May 1.
This week, Fed policy makers played down their own predictions that interest rates might rise faster than they had forecast, according to minutes of the Federal Open Market Committee’s March meeting. The minutes bolstered remarks made by last month by Chair Janet Yellen.
“If inflation is persistently running below our 2 percent objective, that is a very good reason to hold the funds rate at its present range for longer,” Yellen said at a March 19 press conference following the committee meeting.
Story 1:16 Year Old Teenager Stabs 20 in High School — Progressives Call For Registration of All Knives, Concealed Knife Carry Permits and Ban On All Assault Knives — Will Baseball Bats Be Next? — Videos
News Wrap: Teenager stabs students at Pennsylvania school
High School Stabbing Franklin Regional High School Murrysville Pennsylvania 20 Students
Alex Hribal Did High School Stabbing At Franklin High Murrysville Pennsylvania
BREAKING: Surgeon Reports Over Mass Stabbing at Franklin High School
Mass Stabbing 20 Students injured Franklin Regional High School in Murrysville PA YouTube
BREAKING: Mass Stabbing Suspect Alex Hribal to be Tried as Adult
News Wrap: Teenager stabs students at Pennsylvania school
CNN Contributor Compares MASS Stabbing VS Shooting: You Get Your Hands Dirty
Suspect in School Stabbing Spree Is ‘Confused, Scared and Depressed’
By BEN CANDEA, COURTNEY CONDRON and DAN GOOD
Alex Hribal, the 16-year-old student who police say stabbed 22 people at his Pennsylvania high school Wednesday, is “confused, scared and depressed,” his attorney told ABC News in an exclusive interview.
“I think he understands what he did,” attorney Patrick Thomassey said in an interview with “Good Morning America.”
“I don’t think he at this point understands the gravity of what he did. I don’t think he realizes how severely injured some of these people are. And, hopefully, there’s no death involved in any of these. We’re praying that everybody is all right.”
Thomassey said he’s unaware of any signs of Hribal’s being bullied, adding that the teen’s parents are shocked and horrified.
“They could not have predicted that this was going to happen,” he said. “They don’t understand how this occurred.”
The stabbing spree happened at Franklin Regional High School in Murrysville, a suburb located about 20 miles east of Pittsburgh. Morgan Ritchey, who said she had two classes with Hribal, described him as being “a little misunderstood.”
I just always felt like he had a different side to him that nobody knew and it was, like, hard to uncover,” said Ritchey. Hribal, a sophomore, used two 8-to-10 inch “kitchen-type” “straight” knives in the attack, which started shortly after 7 a.m., police said. Murrysville Police Officer William “Buzz” Yakshe, a school resource officer, heard a disturbance in the hallway and joined a school security guard to go find out what was happening, according to a police affidavit. The guard and officer split up. The next time Yakshe saw the guard, he was leaning against a wall, bleeding from his stomach. Sam King, the school’s assistant principal, told police he saw Hribal stab the security guard. King tackled the teen and subdued him while Yakshe handcuffed him. King heard one of the victims say, “I’ve been stabbed,” he told police. Authorities charged Hribal as an adult with four counts of attempted criminal homicide, 21 counts of aggravated assault and one count of possession of weapons on school property. He was being held without bail in a juvenile detention center in Westmoreland County. Murrysville Police Chief Thomas Seefeld said someone pulled a fire alarm during the attack, raising attention and getting students and teachers to evacuate. “When we got there we saw a hallway in chaos, as you can imagine,” Seefeld said at a news conference. “There was a lot of evidence of blood on the floors and in the hallway, we had students running about, trying to get out of the area.” Nate Moore, 15, was stabbed during the rampage and said he had to be treated with 15 stitches. “It was really fast. It felt like he hit me with a wet rag because I felt the blood splash on my face. It spurted up on my forehead,” Moore told The Associated Press. Student Gracey Evans said heroes emerged during the attack. “My best friend, he stepped in front of me and in the meantime, he got stabbed in the back protecting me,” she said. “You couldn’t step a single place without pretty much stepping in blood.” At least 22 people were injured after the stabbings at the start of the school day, Westmoreland County emergency management spokesman Dan Stevens said. The motive for the rampage is under investigation. Seefeld said officials were unaware of any warning signs from the suspect, a sophomore at the school. At least four people with injuries emergency management officials described as “serious” were flown to hospitals for treatment. Others were not actually stabbed, he said, and some of their injuries included cuts and scrapes. http://gma.yahoo.com/suspect-school-stabbing-spree-confused-scared-depressed-115319444–abc-news-topstories.html
A BLANK LOOK, FOLLOWED BY BLOODSHED AT HIGH SCHOOL
It was just before the start of class and the hallways were packed with students at their lockers or chatting with friends.
Nate Moore was walking to homeroom, book in hand, when a classmate he knew to be quiet and unassuming tackled a freshman boy a few feet in front of him. Moore thought it was the start of a fistfight and went to break it up.
But 16-year-old Alex Hribal wasn’t throwing punches — he was stabbing his victim in the belly, Moore said. The suspect got up and slashed Moore’s face, then took off down the hall, where authorities said he stabbed and slashed other students in an attack that injured 21 students and a security guard — and might have been even worse but for the “heroes” who Pennsylvania’s governor said helped prevent further injury or loss of life.
An assistant principal tackled and subdued Hribal, who was charged Wednesday night with four counts of attempted homicide and 21 counts of aggravated assault and jailed without bail. Authorities said he would be prosecuted as an adult.
The suspect’s motive remained a mystery.
“He wasn’t saying anything,” Moore recalled hours later. “He didn’t have any anger on his face. It was just a blank expression.”
At a brief hearing Wednesday night, District Attorney John Peck said that after he was taken into custody, Hribal made comments suggesting he wanted to die. Defense attorney Patrick Thomassey described him as a good student who got along with others, and asked for a psychiatric examination.
Thomassey told ABC’s Good Morning America on Thursday that any defense he offers would likely be based on Hribal’s mental health. He said he hoped to move the charges against the teenager to juvenile court, where he could be rehabilitated. If convicted as an adult, Hribal faces likely decades in prison.
Thomassey told several media outlets that Hribal is remorseful, though he acknowledged his client didn’t appear to appreciate the gravity of his actions.
“At this point, he’s confused, scared and depressed. Over the next few days we’ll try to figure out what the heck happened here,” Thomassey told ABC. “I think he understands what he did. … I don’t think he realizes how severely injured some of these people are.”
At least five students were critically wounded in the attack, including a boy who was on a ventilator after a knife pierced his liver, missing his heart and aorta by only millimeters, doctors said. He had additional surgery overnight, they said.
The rampage comes after decades in which U.S. schools have focused their emergency preparedness on mass shootings, not stabbings.
While knife attacks at schools are not unusual, they’re most often limited to a single victim, said Mo Canady, executive director of the National Association of School Resource Officers.
Nevertheless, there have been at least two major stabbing attacks at U.S. schools over the past year, the first at a community college in Texas last April that wounded at least 14 people, and another, also in Texas, that killed a 17-year-old student and injured three others at a high school last September.
The attack in Pittsburgh unfolded shortly after 7 a.m. Wednesday, a few minutes before the start of classes at 1,200-student Franklin Regional High School, in an upper-middle-class area 15 miles east of Pittsburgh. By Thursday morning, the school was no longer being treated as a crime scene, according to police and school officials, who said they expected it to reopen Monday.
Mia Meixner, 16, said the freshman boy who was tackled tried to fight back, then, when his assailant got off him, stood up and lifted his shirt to reveal a midsection covered in blood.
“He had his shirt pulled up and he was screaming, ‘Help! Help!’” said another witness, Michael Float, 18. “He had a stab wound right at the top right of his stomach, blood pouring down.”
As students rushed to the boy’s aid, the attacker slashed Moore before taking off around a bend.
“It was really fast. It felt like he hit me with a wet rag because I felt the blood splash on my face. It spurted up on my forehead,” said Moore, whose gashed right cheek required 11 stitches.
The boy ran down about 200 feet of hallway, slashing and stabbing other students with kitchen knives about 8 to 10 inches long, police said. The assault touched off a “stampede of kids” yelling, “Run! Get out of here! Someone has a knife!” according to Meixner.
Assistant Principal Sam King heard the commotion and found a chaotic scene in the blood-soaked hall.
“I’ve been stabbed,” he heard a student say, according to a police affidavit.
King then saw Hribal stab a security guard, who leaned against the wall, bleeding from his stomach, the affidavit said. King tackled Hribal and kept him on the floor until a school police officer handcuffed him.
The rampage lasted about five minutes.
“There are a number of heroes in this day. Many of them are students,” Gov. Tom Corbett said in a visit to the town. “Students who stayed with their friends and didn’t leave their friends.”
He also commended cafeteria workers, teachers and teacher’s aides who put themselves at risk to help others.
Looking for a motive, Murrysville Police Chief Thomas Seefeld said investigators were checking reports of a threatening phone call between Hribal and another student the night before. He didn’t say whether the suspect received or made the call.
The FBI went to the boy’s house, and local media reports said agents removed at least one computer along with other items.
Meixner and Moore called the attacker a shy and quiet boy who largely kept to himself, but they said he was not an outcast and they saw no indication before the attack that he might be violent.
“He was never mean to anyone, and I never saw people be mean to him,” Meixner said. “I never saw him with a particular group of friends.”
During the attack, the boy had a “blank look,” she said. “He was just kind of looking like he always does, not smiling, not scowling or frowning.”
Associated Press writers Michael Rubinkam in northeastern Pennsylvania, Joe Mandak in Pittsburgh and JoAnn Loviglio in Philadelphia contributed to this report.
Story 1: Al Sharpton “Forget About It” — FBI Confidential Informant — CI-7 Snitch — On The Mafia — FBI Flipped Him — Sharpton Admits He Informed But Denies He Was Paid — Obamacare Witness Protection Program — Videos
Johnny Depp explains “Fuggetaboutit”
Al Sharpton: Secret Agent Thug
Morton Downey Jr. – Al Sharpton
Al Sharpton knocked on his ass by Roy Innis
GATES CASE: Ann Coulter Teaches Al Sharpton & All Racists A Lesson pt1 7/30/09
GATES CASE: Ann Coulter Teaches Al Sharpton & All Racists A Lesson pt2 7/30/09
The Rev. Al Sharpton Defends President Barack Obama – Oprah’s Next Chapter – OWN
Sheriff Joe Arpaio Pimp Slaps Infamous Douche Bag Al Sharpton
Cornel West: Sharpton Sold Soul for Obama
AL SHARPTON AND CORNEL WEST GO AT IT OVER OBAMA!
Al Sharpton – “American’s Overwhelmingly Voted for Socialism when they elected President Obama”
Judge Jeanine to Obama: Nobel Peace Prize? Give it Back! – Opening Statement – Fox News -
Tavis Smiley & Cornel West on Election, Why Calling Obama Progressive Ignores His Record 1/2
Tavis Smiley & Cornel West on Election, Why Calling Obama Progressive Ignores His Record 2/2
The men behind Barack Obama part 1
The men behind Barack Obama part 2
Dreams from My Real Father: A Story of Reds and Deception
Paul Kengor & Glenn Beck “The Communist” on GBTV Frank Marshall Davis Barack Obama’s Mentor
Paul Kengor on Frank Marshall Davis
O’Reilly Talking Point ▶ Obama Misleading The Country? – The End Justifying The Means
Is Obama dragging down the Democratic party?
Top 5 Mafia Rats in Hiding
Donnie Brasco – Forget About It
I’m Glad It Was Him – Donnie Brasco (8/8) Movie CLIP (1997) HD
Donnie Brasco The Undercover FBI Agent NationalCrimeSyndicate com
Donnie Brasco talking to Benjamin “Lefty” Ruggerio (REAL wiretap): Part 1
Joe Pistone aka Donnie Brasco talking to Benjamin Ruggerio talking about the situation with Anthony Mirra. This conversation happened around 1980. This conversation concerns a meeting concerning Anthony Mirra, Lefty Ruggerio, and other members of the Bonanno Family concerning Pistone. Mirra claimed Pistone cut up $250,000 involving junk money. The other person being mentioned is a man named Rocky, who was also an undercover agent. Pistone attempted to protect Rocky throughout this conversation without showing that he was protecting him.
Donnie Brasco talking to Benjamin “Lefty” Ruggerio (REAL wiretap): Part 2
Donnie Brasco (Joseph Pistone) talking to Benjamin “Lefty” Ruggerio Part 2.
Donnie Brasco talking to Benjamin “Lefty” Ruggerio (REAL wiretap): Part 3
Part 3: Donnie Brasco, aka Joseph Pistone, talking to Benjamin Ruggerio about Anthony Mirra and Rocky
The War Against the Mafia
How the FBI Sabotaged Black America
Al Sharpton’s Secret Work As FBI Informant
Untold story of how activist once aided probes of NYC wiseguys
When friends and family members gathered recently at the White House for a private celebration of Michelle Obama’s 50th birthday, one of the invited partygoers was a former paid FBI Mafia informant.
That same man attended February’s state dinner in honor of French President Francois Hollande. He was seated with his girlfriend at a table adjacent to President Barack Obama, who is likely unaware that, according to federal agents, his guest once interacted with members of four of New York City’s five organized crime families. He even secretly taped some of those wiseguys using a briefcase that FBI technicians outfitted with a recording device.
The high-profile Obama supporter was also on the dais atop the U.S. Capitol steps last year when the president was sworn in for a second term. He was seated in front of the chairman of the Joint Chiefs of Staff, two rows behind Beyonce and Jay Z, and about 20 feet from Eric Holder, the country’s top law enforcement officer. As head of the Department of Justice, Attorney General Holder leads an agency that once reported that Obama’s inauguration guest also had La Cosa Nostra contacts beyond Gotham, and engaged in “conversations with LCN members from other parts of the United States.”
The former mob snitch has become a regular in the White House, where he has met with the 44th president in the East Room, the Roosevelt Room, and the Oval Office. He has also attended Obama Christmas parties, speeches, policy announcements, and even watched a Super Bowl with the First Family (an evening the man has called “one of the highlights of my life”). During these gatherings, he has mingled with cabinet members, top Obama aides, military leaders, business executives, and members of Congress. His former confederates were a decidedly dicier lot: ex-convicts, extortionists, heroin traffickers, and mob henchmen. The man’s surreptitious recordings, FBI records show, aided his government handlers in the successful targeting of powerful Mafia figures with nicknames like Benny Eggs, Chin, Fritzy, Corky, and Baldy Dom.
Later this week, Obama will travel to New York and appear in a Manhattan hotel ballroom at the side of the man whom FBI agents primarily referred to as “CI-7”–short for confidential informant #7–in secret court filings. In those documents, investigators vouched for him as a reliable, productive, and accurate source of information about underworld figures.
The ex-informant has been one of Obama’s most unwavering backers, a cheerleader who has nightly bludgeoned the president’s Republican opponents in televised broadsides. For his part, Obama has sought the man’s counsel, embraced him publicly, and saluted his “commitment to fight injustice and inequality.” The president has even commented favorably on his friend’s svelte figure, the physical manifestation of a rehabilitation effort that coincided with Obama’s ascension to the White House. This radical makeover has brought the man wealth, a daily TV show, bespoke suits, a luxury Upper West Side apartment, and a spot on best seller lists.
Most importantly, he has the ear of the President of the United States, an equally remarkable and perplexing achievement for the former FBI asset known as “CI-7,” the Rev. Al Sharpton.
A lengthy investigation by The Smoking Gun has uncovered remarkable details about Sharpton’s past work as an informant for a joint organized crime task force comprised of FBI agents and NYPD detectives, as well as his dealings with an assortment of wiseguys.
Beginning in the mid-1980s and spanning several years, Sharpton’s cooperation was fraught with danger since the FBI’s principal targets were leaders of the Genovese crime family, the country’s largest and most feared Mafia outfit. In addition to aiding the FBI/NYPD task force, which was known as the “Genovese squad,” Sharpton’s cooperation extended to several other investigative agencies.
TSG’s account of Sharpton’s secret life as “CI-7” is based on hundreds of pages of confidential FBI affidavits, documents released by the bureau in response to Freedom of Information Act requests, court records, and extensive interviews with six members of the Genovese squad, as well as other law enforcement officials to whom the activist provided assistance.
Like almost every other FBI informant, Sharpton was solely an information source. The parameters of his cooperation did not include Sharpton ever surfacing publicly or testifying on a witness stand.
Genovese squad investigators–representing both the FBI and NYPD–recalled how Sharpton, now 59, deftly extracted information from wiseguys. In fact, one Gambino crime family figure became so comfortable with the protest leader that he spoke openly–during ten wired face-to-face meetings–about a wide range of mob business, from shylocking and extortions to death threats and the sanity of Vincent “Chin” Gigante, the Genovese boss who long feigned mental illness in a bid to deflect law enforcement scrutiny. As the mafioso expounded on these topics, Sharpton’s briefcase–a specially customized Hartman model–recorded his every word.
Task force members, who were interviewed separately, spoke on the condition of anonymity when describing Sharpton’s work as an informant and the Genovese squad’s activities. Some of these investigators provided internal FBI documents to a reporter.
Records obtained by TSG show that information gathered by Sharpton was used by federal investigators to help secure court authorization to bug two Genovese family social clubs, including Gigante’s Greenwich Village headquarters, three autos used by crime family leaders, and more than a dozen phone lines. These listening devices and wiretaps were approved during the course of a major racketeering investigation targeting the Genovese family’s hierarchy.
A total of eight separate U.S. District Court judges–presiding in four federal jurisdictions–signed interception orders that were based on sworn FBI affidavits including information gathered by Sharpton. The phones bugged as a result of these court orders included two lines in Gigante’s Manhattan townhouse, the home phone of Genovese captain Dominick “Baldy Dom” Canterino, and the office lines of music industry power Morris Levy, a longtime Genovese family associate. The resulting surreptitious recordings were eventually used to help convict an assortment of Mafia members and associates.
Investigators also used Sharpton’s information in an application for a wiretap on the telephone in the Queens residence of Federico “Fritzy” Giovanelli, a Genovese soldier. Giovanelli was sentenced to 20 years in prison for racketeering following a trial during which those recordings were played for jurors. In a recent interview, the 82-year-old Giovanelli–now three years removed from his latest stint in federal custody–said that he was unaware that Sharpton contributed in any fashion to his phone’s bugging. He then jokingly chided a reporter for inquiring about the civil rights leader’s past. “Poor Sharpton, he cleaned up his life and you want to ruin him,” Giovanelli laughed.
While Sharpton’s acrimonious history with law enforcement–especially the NYPD–rankled some Genovese squad investigators, they nonetheless grudgingly acknowledged in interviews that the activist produced for those he would go on to frequently pillory.
Genovese squad members, however, did not share with Sharpton specific details about how they were using the information he was gathering for them. This is standard practice since FBI affidavits in support of wiretap applications are filed under seal by Department of Justice prosecutors. Still, Sharpton was briefed in advance of his undercover sorties, so he was well aware of the squad’s investigative interest in Gigante and his Mafia cronies.
Sharpton vehemently denies having worked as an FBI informant. He has alleged that claims of government cooperation were attempts by dark forces to stunt his aggressive brand of civil rights advocacy or, perhaps, get him killed. In his most recent book, “The Rejected Stone,” which hit best seller lists following its October 2013 publication, Sharpton claimed to have once been “set up by the government,” whose agents later leaked “false information” that “could have gotten me killed.” He added, “So I have been seriously tested in what I believe over the years.”
In an interview Saturday, Sharpton again denied working as a confidential informant, claiming that his prior cooperation with FBI agents was limited to efforts to prompt investigations of drug dealing in minority communities, as well as the swindling of black artists in the recording industry. He also repeatedly denied being “flipped” by federal agents in the course of an undercover operation. When asked specifically about his recording of the Gambino crime family member, Sharpton was noncommittal: “I’m not saying yes, I’m not saying no.”
If Sharpton’s account is to be believed, he was simply a concerned citizen who voluntarily (and briefly) joined arm-in-arm with federal agents, perhaps risking peril in the process. The other explanation for Sharpton’s cooperation–one that has uniformly been offered by knowledgeable law enforcement agents–presents the reverend in a less noble light. Worried that he could face criminal charges, Sharpton opted for the path of self-preservation and did what the FBI asked. Which is usually how someone is compelled to repeatedly record a gangster discussing murder, extortion, and loan sharking.
Sharpton spoke for an hour in an office at the House of Justice, his Harlem headquarters, where he had just finished addressing a crowd of about 200 people that included his two adult daughters and his second wife (from whom he hasbeen separated for ten years). A few minutes into the interview, Sharpton asked, “Are you taping this?” A TSG reporter answered that he was not recording their interview, but had a digital recorder and wished to do so. Sharpton declined that request.
In the absence of any real examination/exhumation of Sharpton’s past involvement with the FBI and the Mafia, his denials have served the civil rights leader well. Scores of articles and broadcast reports about the Obama-era “rehabilitation” of Sharpton have mentioned his inflammatory past–Tawana Brawley, Crown Heights, Freddy’s Fashion Mart, and various anti-Semitic and homophobic statements. But his organized crime connections and related informant work have received no such scrutiny.
In a “60 Minutes” profile aired three months before the August 2011 launch of Sharpton’s MSNBC show, correspondent Lesley Stahl reported on the “tame” Sharpton’s metamorphosis from “loud mouth activist” to “trusted White House advisor who’s become the president’s go-to black leader.” As for prior underworld entanglements, those were quickly dispatched: “There were allegations of mob ties, never proved,” Stahl flatly declared.
As host of MSNBC’s “PoliticsNation,” Sharpton now reluctantly identifies himself as a member of the media, if not actually a journalist. He spends his time at 30 Rockefeller Plaza surrounded by reporters, editors, and researchers committed to accuracy and the exposure of those who violate the public trust. In fact, Sharpton himself delights in a daily feature that seeks to expose liars, hypocrites, and others engaged in deceit (his targets tend to be Republican opponents of the Obama administration). As he wraps this segment, Sharpton points his finger at the camera and addresses his quarry: “Nice try, but we gotcha!”
In addition to his MSNBC post, Sharpton heads the National Action Network, which describes itself as a “Christian activist organization.” Obama, who refers to Sharpton as “Rev” or “Reverend Al,” is scheduled to deliver a keynote address Friday at the group’s annual convention in New York City. Mayor Bill DeBlasio will preside Wednesday over the convention’s ribbon cutting ceremony, while Holder and three Obama cabinet secretaries will deliver speeches.
Sharpton has been a leading supporter of Holder, who spoke at the National Action Network’s 2012 convention and saluted the reverend for “your partnership, your friendship, and also for your tireless efforts to speak out for the voiceless, to stand up for the powerless, and to shine a light on the problems we must solve, and the promises we must fulfill.” Last Friday, Sharpton appeared on a panel at a Department of Justice forum led by Tony West, the agency’s third-ranking official. West thanked Sharpton for his “leadership, day in and day out, on issues of reconciliation and community restoration.”
According to its most recent IRS return, which Sharpton signed in mid-November 2013, the National Action Network pays him $241,402 annually for serving as president and CEO. In return for that hefty salary, Sharpton–who hosts a three-hour daily radio show in addition to his nightly cable TV program–reportedly works a 40-hour week for the not-for-profit (which lists unpaid tax liabilities totaling $813,576).
For longtime observers, the “new” Sharpton’s public prominence and West Wing access is bewildering considering that his history, mob ties included, could charitably be described as checkered. In fact, Obama has banished others guilty of lesser transgressions (see: Wright, Jeremiah).
Sharpton now calls himself a “refined agitator,” an activist no longer prone to incendiary language or careless provocations. Indeed, a Google check confirms that it has been years since he labeled a detractor a “faggot,” used the term “homos,” or derisively referred to Jewish diamond merchants.
* * *
As an “informant in development,” as one federal investigator referred to Sharpton, the protest leader was seen as an intriguing prospective source, since he had significant contacts in politics, boxing, and the music industry.
Before he was “flipped” in the course of an FBI sting operation in 1983, Sharpton had established relationships with promoter Don King, various elected officials, and several powerful New York hoodlums involved in concert promotion, record distribution, and talent management. At the time, the music business was “overrun by hustlers, con artists, black and white,” Sharpton recalled in his 1996autobiography. A federal agent who was not part of the Genovese squad–but who also used Sharpton as an informant–recalled that “everyone was trying to mine” his music industry ties.
In fact, by any measure, Sharpton himself was a Mafia “associate,” the law enforcement designation given to mob affiliates who, while not initiated, work with and for crime family members. While occupying the lowest rung on the LCN org chart–which is topped by a boss-underboss-consigliere triumvirate–associates far outnumber “made” men, and play central roles in a crime family’s operation, from money-making pursuits to more violent endeavors.
For more than four years, the fact that Sharpton was working as an informant was known only to members of the Genovese squad and a small number of other law enforcement agents. As with any Mafia informant, protecting Sharpton’s identity was crucial to maintaining the viability of ongoing investigations. Not to mention keeping him alive.
For example, an episode recounted by TSG sources highlighted the sensitive nature of Sharpton’s cooperation with the FBI/NYPD task force.
In advance of seeking court authorization to bug a pair of Genovese family social clubs and a Cadillac used by Gigante and Canterino, a draft version of a wiretap affidavit was circulated for review within the Genovese squad, which operated from the FBI’s lower Manhattan headquarters. The 53-page document, which detailed the “probable cause” to believe that listening devices would yield incriminatingconversations, concerned some investigators due to the degree to which the activities of Sharpton were described in the document.
While the affidavit prepared by FBI Agent Gerald King and a federal prosecutor only referred to Sharpton as “CI-7,” the document included the name of a Gambino mobster whom Sharpton taped, as well as the dates and details of five of their recorded meetings. Such specificity was problematic since the possibility existed that the affidavit’s finalized version could someday be turned over to defense lawyers in the discovery phase of a criminal trial.
Investigators fretted that Sharpton could easily be unmasked by the Gambino member, who, if ever questioned about his meetings with “CI-7,” would surely realize that Sharpton was the wired informant referred to in the FBI affidavit. That discovery, of course, could have placed Sharpton’s life in grave danger. The Gambino wiseguy, too, likely would have faced trouble, since he was recorded speaking about a wide range of Mafia matters, including Gigante’s illegal operations. The Genovese power–rightly paranoid about bugged phones and listening devices–famously forbid fellow gangsters from even speaking his name. In fact, if a wiseguy had to refer to Gigante during an in-person meeting, a quick stroke of the chin was the acceptable means of identification.
In response to concerns about the King affidavit, the draft, which a source provided to TSG, was rewritten to carefully shroud Sharpton’s work with government agents. The affidavit’s final version–which was submitted to two federal judges–no longer included the disclosure that “CI-7” had “consensually recorded his conversations” with a gangster. The wiseguy’s name was also deleted from the document, as was any reference to the Gambino family or the informant’s sex.
Instead, the revamped affidavit simply noted that “CI-7 reported” to the FBI various details of Genovese family rackets. The actual source of that valuable intelligence about Gigante & Co. had been carefully obscured. As were the details of how that information was obtained via Sharpton’s battery-powered valise.
But despite efforts like this to protect Sharpton, some details of his informant work leaked out in January 1988, when New York Newsday reported that the civil rights activist had cooperated with federal investigations targeting organized crime figures and Don King. Though he reportedly made incriminating admissions to the newspaper, Sharpton quickly issued vehement denials that he had snitched on anyone.
While acknowledging contact with law enforcement officials, Sharpton–then involved in the early stages of the Tawana Brawley hoax–said he sought the help of investigators to combat the crack cocaine epidemic ravaging New York’s poorest communities. Sharpton also claimed to have contacted agents (and pledged his assistance) after a Mafia associate allegedly threatened him over a music industry dispute.
Sharpton asserted that a phone installed in his Brooklyn apartment by federal investigators in mid-1987 was there to serve as a “hotline” for the public to report drug dealing. He flatly denied recording phone conversations at the direction of law enforcement agents. In one radio interview, Sharpton even declared, “We have an ethical thing against wiretapping.”
In fact, Sharpton had been cooperating with the U.S. Attorney’s Office in Brooklyn as part of an investigation targeting Don King. According to a source involved with that probe, federal agents “ran him for a couple of months,” during which time Sharpton “did some recordings” via his new home telephone. But the nascent Department of Justice operation was abruptly shuttered in the wake of the New York Newsday story.
The Brooklyn investigators were introduced to Sharpton in late-1987 by Joseph Spinelli, one of the reverend’s former FBI handlers (and one of the agents who initially secured his cooperation with the bureau). While Spinelli had left the FBI for another government post, he still helped facilitate Sharpton’s interaction with other investigators. “Joe was shopping him around,” one source recalled.
For example, in July 1987, Spinelli called a federal prosecutor in Los Angeles and offered Sharpton’s assistance with a matter the lawyer was handling. The case involved Salvatore Pisello, a mobbed-up music industry figure who had just been indicted for tax evasion (and whom Sharpton had previously accused of threatening his life).
Referring to Sharpton, ex-prosecutor Marvin Rudnick said in an interview, “I didn’t know who he was” when Spinelli called. In subsequent conversations with Rudnick, Sharpton provided information about Pisello and a related music industry matter that was being scrutinized by Justice Department investigators.
While Sharpton would not prove particularly helpful to Rudnick, the attorney clearly recalled his brief, unorthodox dealings with the New York activist. “I remember having to go to a pay phone to take the call because he didn’t want it to be traced,” Rudnick laughed.
* * *
So why did Sharpton agree to become an FBI informant? And why was he willing to risk the dangers inherent in such cooperation?
“He thought he didn’t have a choice,” one Genovese squad agent recalled.
In the course of an investigation being run by Spinelli and his partner John Pritchard, Sharpton was secretly recorded in meetings with an FBI undercover agent posing as a wealthy drug dealer seeking to promote boxing matches.
As previously reported, Colombo crime family captain Michael Franzese, who knew Sharpton, enlisted the activist’s help in connecting with Don King. Franzese and Sharpton were later surreptitiously filmed during one meeting with the undercover, while Sharpton and Daniel Pagano, a Genovese soldier, were recorded at another sit-down. Pagano’s father Joseph was a Genovese power deeply involved in the entertainment industry (and who also managed the crime family’s rackets in counties north of New York City).
During one meeting with Sharpton, the undercover agent offered to get him “pure coke” at $35,000 a kilo. As the phony drug kingpin spoke, Sharpton nodded his head and said, “I hear you.” When the undercover promised Sharpton a 10 percent finder’s fee if he could arrange the purchase of several kilos, the reverend referred to an unnamed buyer and said, “If he’s gonna do it, he’ll do it much more than that.” The FBI agent steered the conversation toward the possible procurement of cocaine, sources said, since investigators believed that Sharpton acquaintance Daniel Pagano–who was not present–was looking to consummate drug deals. Joseph Pagano, an East Harlem native who rose through a Genovese crew notorious for narcotics trafficking, spent nearly seven years in federal prison for heroin distribution.
While Sharpton did not explicitly offer to arrange a drug deal, some investigators thought his interaction with the undercover agent could be construed as a violation of federal conspiracy laws. Though an actual prosecution, an ex-FBI agent acknowledged, would have been “a reach,” agents decided to approach Sharpton and attempt to “flip” the activist, who was then shy of his 30th birthday. In light of Sharpton’s relationship with Don King, FBI agents wanted his help in connection with the bureau’s three-year-old boxing investigation, code named “Crown Royal” and headed by Spinelli and Pritchard.
The FBI agents confronted Sharpton with the undercover videos and warned that he could face criminal charges as a result of the secret recordings. Sharpton, of course, could have walked out and ran to King, Franzese, or Pagano and reported the FBI approach (and the fact that drug dealer “Victor Quintana” was actually a federal agent).
In subsequent denials that he had been “flipped,” Sharpton has contended that he stiffened in the face of the FBI agents, meeting their bluff with bluster and bravado. He claimed to have turned away Spinelli & Co., daring them to “Indict me” and “Prosecute.” Sharpton has complained that the seasoned investigators were “trying to sting me, entrap me…a young minister.”
In fact, Sharpton fell for the FBI ruse and agreed to cooperate, a far-reaching decision he made without input from a lawyer, according to sources. “I think there was some fear [of prosecution] on his part,” recalled a former federal agent. In a TSG interview, Sharpton claimed that he rebuffed the FBI agents, who, he added, threatened to serve him with a subpoena to testify before a federal grand jury investigating King. After being confronted by the bureau, Sharpton said he consulted with an attorney (whom he declined to identify).
Following bureau guidelines, agents formally opened a “137” informant file on Sharpton, a move that was approved by FBI supervisors, according to several sources. Agents anticipated using Sharpton in the “Crown Royal” case focusing on King, but during initial debriefings of their new recruit, it became clear that his contacts in the music business were equally appealing.
Sharpton had met James Brown in the mid-70s, and became extremely close to the R&B superstar. He worked for and traveled with the mercurial performer, married one of Brown’s backup singers, and wore the same processed hairdo as the entertainer. Like Brown, Sharpton would sometimes even wear a cowboy hat atop his tribute conk.
It was first through executives at Spring Records, a small Manhattan-based label affiliated with Brown, that Sharpton–who worked from the firm’s office–was introduced to various wiseguys, including Franzese. His circle of mob contacts would grow to include, among others, the Paganos, Carmine DeNoia, an imposing Pagano associate known as “Wassel,” and Joseph “Joe Bana” Buonanno, a Gambino crime family figure involved in record distribution and production.
At one point before he was “flipped,” Sharpton participated in a mob scheme to create a business front that would seek a share of lucrative Con Edison set-asides intended for minority-owned businesses. That deal, which involved garbage collection contracts, cratered when the power company determined that Sharpton’s silent partner was Genovese captain Matthew “Matty the Horse” Ianniello. Details of the Con Ed plot emerged at a federal criminal trial of Ianniello and his business partner Benjamin Cohen. It was Cohen, who worked across the hall from Spring Records, who recruited Sharpton for the mob garbage gambit.
The longtime agitator, civil-rights activist and TV host was exposed Monday as an alleged former key FBI informant whose tips helped take down some of the biggest names in New York Mafia history.
The Rev. Al launched his sensational secret life as a paid mob snitch in the mid-1980s, pressured to cooperate after being ensnared in a developing drug sting, according to a bombshell report bythesmokinggun.com.
As “CI-7,” the then-portly Harlem leader would tote a customized Hartmann briefcase equipped with an FBI bug to hobnob with members of some of the city’s most notorious crime families, the site said.
Sharpton’s main job was to dig dirt on the Genovese crime family, according to sources and court documents.
He was so good at “playing dumb’’ that he wound up helping to bring down such names as Venero “Benny Eggs’’ Mangano, Dominick “Baldy Dom’’ Canterino and even the muttering “oddfather” of Greenwich Village, family boss Vincent “Chin’’ Gigante, the site said.
He was a “very reliable informant, and his information ‘has never been found to be false or inaccurate,’ ” the report said, quoting a 1986 court document.
While it was known that Sharpton had spied for the FBI on music- and sports-promotion figures, the new data said he also extracted juicy information from wiseguys.
The feds later used the dirt to obtain warrants to bug key Genovese spots.
Because of Sharpton’s undercover work, listening devices were surreptitiously installed in two crime-family social clubs, including Gigante’s Village headquarters, three cars used by Mafiosos and more than a dozen phone lines, the site said.
Information gleaned from those bugs then helped nail the mobsters.
One of Sharpton’s main unsuspecting founts of useful information was Joseph “Joe Bana’’ Buonanno.
During 10 face-to-face chats between the pair, “Joe Bana just gave him a whole insight into how ‘Chin’ and [music-industry honcho] Morris [Levy] operated,’’ said an NYPD source with the joint FBI-Police Department “Genovese Squad.”
Before his rapt audience of one, Buonanno expounded on the mob’s past extortions and death threats.
He even allegedly revealed to Sharpton a few not-so-flattering details about his boss, Gigante, who for years pretended he was crazy by shuffling around the West Village in a bathrobe to escape prosecution from the feds.
Buonanno told Sharpton of the godfather’s purported illiteracy and the fact that he “hates everyone not Italian,” the site said.
The mob soldier even detailed how Gigante “was present” at the hit of Genovese captain Thomas “Tommy Ryan’’ Eboli, to “make sure it was done right,” the site said.
Still, while Sharpton had the gift of gab and got Buonanno to unwittingly spill his guts, the mob soldier snottily referred to the preacher as “a nose picker’’ behind his back, an associate told the site.
Both Buonanno and Gigante are now dead.
The revelation of Sharpton’s involvement with the feds couldn’t have come at a more embarrassing time.
Sharpton is set to convene the annual convention of his National Action Network in New York this week — with Mayor de Blasio cutting the opening-ceremony ribbon Wednesday and President Obama flying in to give the keynote address Friday.
Sharpton, in an interview with The Post on Monday, didn’t deny that he cooperated with the FBI — but said the thesmokinggun.com report was the equivalent of a mob hit.
“It’s crazy. If I provided all the information they claimed I provided, I should be given a ticker-tape parade,” said Sharpton, 59, who now regularly rubs elbows with Obama and his wife Michelle, Attorney General Eric Holder and congressmen and other national leaders.
“What did Al Sharpton do wrong? Eliot Spitzer did do something wrong, and he got a TV show,” said the Rev. Al, referring to the hooker-loving former governor.
Sharpton is currently the host of MSNBC’s “PoliticsNation.’’ He regularly wraps up one segment by pointing a finger at the camera and yelling, “Nice try, but we gotcha!”
He denied being paid to snitch and said he never carried a brief case with a listening device.
He insisted that if he did cooperate with the feds, it was because he’d been threatened by a mobster while working with black concert promoters.
“The article is embellished. The real story is I told the FBI about being threatened because I was a civil-rights leader helping black concert promoters,” Sharpton said.
He griped that the report was simply an attempt to “muddy’’ him before this week’s NAN convention.
A Sharpton confidante who’s known him for decades was caught off guard by the extent of the activist’s alleged dealings with the FBI.
“Holy s- -t,’’ the source said. “This comes out of left for me. I’m actually driving off the road.’’
But veteran Democratic political consultant George Arzt said the report is more likely to boost Sharpton’s standing with the public rather than hurt it.
“This is just going to add to his luster of being a character,” Arzt said. “It does raise questions about an anti-establishment guy cooperating with the FBI. But now he is establishment.”
Sharpton was considered prime fodder as a mole for the FBI’s Mafia unit because of his already-existing connections to the underworld, the site said.
For example, he knew Genovese soldier Joseph Pagano, who was involved in entertainment-industry schemes for decades, allegedly controlled “Rat Pack’’ singer Sammy Davis Jr. and once even “lost a big roll [of money] to Dean Martin and Frank Sinatra,’’ FBI sources said.
Sharpton allegedly told the feds he had an in with Pagano because he’d introduced him to boxer Muhammad Ali and his reps.
In trying to nail the Genovese Mafiosos with Sharpton’s help, the feds embarked on their bugging scheme — sometimes producing hilarious results, the report said.
At one point, the Genovese Squad tried to wire mobster Dominick Canterino’s Cadillac in front of his Gravesend, Brooklyn, home.
An agent broke into and hot-wired the car to briefly drive it off to plant the bug before returning it.
“Piece of cake,’’ he radioed to fellow agents down the block.
“You’re burned!” an NYPD detective shouted back a minute later, as he spotted Canterino watching the agent drive away with his car.
“In retrospect, it was like a Keystone comedy,’’ chuckled a former FBI agent who was there that day. “But it wasn’t so funny when it occurred.”
Story 2: The Benghazi Cover-up and Scandal — Explosive Testimony of CIA – Americans Died — Obama Lied — False Narrative = The Big Lie — Democrat Deceivers — Tyrants Liars Club (TLC) — A Lie is A Lie is A Lie — Videos
“I’m not upset that you lied to me, I’m upset that from now on I can’t believe you.”
“Anything is better than lies and deceit!”
~ Leo Tolstoy, Anna Karenina
April 2 Benghazi hearing with Mike Morell
Former CIA deputy director Michael Morrell denies Benghazi cover-up – Lone Wolf
Bachmann Challenges Former Acting CIA Director on Benghazi
Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood
House Intel CMTE Holds Hearing On Benghazi Scandal – Michele Bachmann Heated Exchange
Fox praises Thornberry’s questions at Benghazi hearing
Rep. Thornberry Questions former CIA Deputy Director about Benghazi
Rep. Thornberry questions former CIA Deputy Director about Benghazi Part 2
Political Fallout From Michael Morell’s Benghazi Testimony
Ex-CIA Acting Dir. Mike Morell: No Complaints About Susan Rice’s Talking Benghazi Points
Fox praises Thornberry’s questions at Benghazi hearing
Rogers: ‘Some Disagreement’ Between Morrell’s Prior Testimony and CIA Libyan Station Chief
Westmoreland Questions Former CIA Deputy
Director in Benghazi Hearing
A Benghazi Cover-Up? – Fmr CIA Deputy Director To Testify Today – DC Scandal – Fox & Friends
Rep. Thornberry Questions former CIA Deputy Director about Benghazi
BREAKING: CIA Deputy Resigns after 33 years Service, Replaced by WH Lawyer
Lying To Congress – Mike Morell’s Benghazi Attack
Testimony Coming Under Fire – Dc Scandal
Fox News Benghazi cover up Mike Morell’s testimony comes under fire
Benghazi Scandal Frm CIA Deputy DIR Morrell Accused Of Misleading Lawmakers On Benghazi
Rep. Peter King Reacts To Mike Morell’s Benghazi Testimony
Lying To Congress – Mike Morell’s Benghazi Attack Testimony Coming Under Fire – Dc Scandal
Rand Paul ATTACKS Gov Cover Up
RAND PAUL BRINGS IT!… Tells Hillary Clinton: YOU Are to Blame for Benghazi!
U.S. Covert War in Syria Collapsing
BENGHAZI: The Real Reason Behind Obama’s Cover-up
GOP Lawmaker Says Benghazi Investigation Will Lead to Hillary: ‘It Was Her Show’
BREAKING: Obama Dispersing Benghazi Survivors Around US and Changing their Names
TRIFECTA — The Benghazi Scandal and Cover-Up: Is the Mainstream Media Finally Taking Notice?
Benghazi Scandal “Phony Scandal?” – David Ubben Fought Alongside FMR Navy Seal To Protect Consulate
Pat Caddell: John Boehner “purposely” helping Obama cover-up Benghazi
Murder Of Chris Stevens In Benghazi Attack Ordered By American Military Leadership, Possibly Obama
Obama LIED About Benghazi Attack!!! (Lt. Col. Tony Shaffer Interview)
Rush Limbaugh on Benghazi Scandal: “They’re about to Blow this Sky High”; Reviews Scandal Timeline
Glenn Beck – Benghazi: Truth coming out
Glenn Beck Why Obama Hid the Truth of Benghazi
Benghazi: The Truth Behind the Smokescreen.
Things Get Tense When Bachmann Grills Former CIA Deputy Director Over Benghazi Talking Points
The former deputy director of the CIA insisted during a congressional hearing Wednesday that he did not alter the infamous 2012 Benghazi talking points due to political pressure, despite pointed questioning by Rep. Michele Bachmann (R-Minn.).
“The narrative that the attack evolved spontaneously from a protest was a narrative that intelligence community analysts believed,” Mike Morell said. “That turned out to be incorrect. But that is what they believed at the time. So there is no politics there whatsoever.”
“Let me actually give you the facts,” Morell added to Bachmann, before contending the five edits that were made had nothing to do with politics, but instead involved minor stylistic changes and edits to increase accuracy.
Just four days after the attack, the former deputy director of the CIA removed references about threats from extremists tied to Al Qaeda, substituting it by saying that “there are indications extremists participated in the violent demonstrations.”
Bachmann argued such changes were of importance.
“You made significant, substantive changes for the White House,” she said. “Whether it was on behalf, we don’t know. But we know you are the one that made those changes.”
“Ma’am, if you look at the record, what you will see that the changes were fully consistent with what our analysts believed at the time. Period,” the former deputy director replied.
Bachmann said that those on the ground at the time of the attack were ignored and argued that there was an “intentional misleading of the public.”
Morell maintained that the changes he made to the widely debunked 2012 talking points were not for political reasons.
Morell was deputy director of the agency at the time of the attack on Sept. 11, 2012, on the U.S. consulate in Benghazi, Libya, which led to the deaths of four Americans, including Ambassador Chris Stevens. Both Morell and the agency, as well as the administration, have faced criticism from the right regarding the handling of the attack, including claims that there were political motives behind the framing of the information surrounding the incident.
Many took issue with the talking points following the attack, namely the delay in calling it a terrorist attack carried out by Al Qaeda versus a spontaneous demonstration in protest of an anti-Muslim video.
Chairman Mike Rogers (R-Mich.) said the talking points “did not reflect the best information available” and were used by the administration “to perpetrate a false narrative about the attacks.”
Rogers also asked Morell why he did not say during a November 2012 hearing following the attack why references to Al Qaeda had been taken out of the talking points. Morell said that at the time, he did not know who took them out.
“But to be fair, and, in retrospect, what I wish I would have done, was to say to you, ‘Chairman, I do not know who took Al Qaeda out of the talking points, but you should know that I myself made a number of changes to the points.’ That’s what I should have said. I didn’t,” Morell said.
Morell also said there are things that both he and the agency “should have done differently,” but he dismissed political motivations.
“There are areas where the CIA’s performance and my own performance could have been better, but none of our actions were the result of political influence in the intelligence process. None.”
Morell said he did not know that the talking points would be used by Susan Rice, then U.S. ambassador to the United Nations, in her appearances on the Sunday talk shows shortly following the attacks, which were widely criticized and, many say, cost her the secretary of state position, as she later withdrew her consideration for the spot.
“In fact, I didn’t even know she was going to be on the Sunday shows,” Morell said, adding that no one asked him or the agency to prepare Rice.
Morell said he believed that Rice, who is now national security adviser, would have had the talking points, as well as intelligence information from the days prior. However, he acknowledged that she did not have information sent by the CIA’s station chief on the ground, which concluded that the attack was possibly preplanned.
“Don’t you think that was an important document to get in the hands of someone who is going to brief the country on what was actually happening on the ground?” Rogers asked.
Morell said that the information had not been disseminated outside of the CIA and that at the time, he did not find the arguments that it was a preplanned attack “compelling.” Morell said earlier in the hearing that when the information from the station chief was first sent to analysts, they were “sticking to their judgment” that it was a protest.
“So I believed what my analysts said, that there was a protest. I also believed it to be a terrorist attack. You see, we never, we never saw those two things as mutually exclusive, and so I believed both of those at the same time,” Morell said.
Taking issue with Morell’s testimony was Rep. Devin Nunes.
”The problem is that you have all of these conflicting stories, right?” Nunes (R-Calif.) said to Morell, after questioning him on the sequence of dialogue regarding the attack.
“I read your testimony, and you have an excuse for everything,” Nunes later added. “For everything … which is fine, but when the chairman asks you about when you sat next to Director of National Intelligence [James] Clapper in November of 2012, you don’t have an excuse, you only have an apology.”
Rep. Peter King (R-N.Y.), who has been a vocal critic in the handling of Benghazi, also criticized Morell’s testimony.
“He gave a lot of excuses today and a lot of reasons,” King said Wednesday on Fox News’s “Happening Now.”
“The fact is, to believe him you have to believe, basically, everything is contradictory to the facts,” King said, adding that the administration has not told the truth on Benghazi and that Morell has been part of that process.
“Bottom line is, Susan Rice and the administration told the American people it arose out of a video and demonstration,” King said. “They never mentioned terrorism at all, and that’s the reality. They can’t rewrite history.”
Morell, during his testimony Wednesday, said, “no doubt it was a terrorist attack,” but he said the motivations of those who carried out the attack is unknown, because they have not been caught.
CIA officer confirmed no protests before misleading Benghazi account given
Information on ground rejects protest account
Before the Obama administration gave an inaccurate narrative on national television that the Benghazi attacks grew from an anti-American protest, the CIA’s station chief in Libya pointedly told his superiors in Washington that no such demonstration occurred, documents and interviews with current and former intelligence officials show.
The attack was “not an escalation of protests,” the station chief wrote to then-Deputy CIA Director Michael J. Morell in an email dated Sept. 15, 2012 — a full day before the White House sent Susan E. Rice to several Sunday talk shows to disseminate talking points claiming that the Benghazi attack began as a protest over an anti-Islam video.
That the talking points used by Mrs. Rice, who was then U.S. ambassador to the United Nations, were written by a CIA that ignored the assessment by its own station chief inside Libya, has emerged as one of the major bones of contention in the more than two years of political fireworks and congressional investigations into the Benghazi attack.
Two former intelligence officials have told The Washington Times that this question likely will be answered at a Wednesday hearing of the House Permanent Select Committee on Intelligence during which Mr. Morell is scheduled to give his public testimony.
Why they ignored it remains a topic of heated debate within the wider intelligence community.
A third source told The Times on Monday that Mr. Morell and other CIA officials in Washington were weighing several pieces of “conflicting information” streaming in about the Benghazi attack as the talking points were being crafted.
“That’s why they ultimately came up with the analysis that they did,” the source said. “The piece that was coming out of Tripoli was important, but it was one piece amid several streams of information.”
One of the former intelligence officials said the Libya station chief’s assessment was being weighed against media reports from the ground in Benghazi that quoted witnesses as saying there had been a protest. Analysts at the CIA, the source said, also were weighing it against reporting by other intelligence divisions, including the National Security Agency.
“The chief of station in Tripoli who was 600 or 700 miles away from the attacks wouldn’t necessarily have the only view of what actually went on in Benghazi,” that former official said.
While the testimony is expected to focus on Benghazi, the hearing arrives at a time of growing tensions between Congress and the CIA over such matters as the Bush administration’s interrogation rules and mutual charges of spying and illegality between the Senate intelligence committee and the agency.
Lawmakers are likely to press Mr. Morell for a reaction to reports this week that a classified Senate intelligence report has concluded that harsh interrogation methods used in the years after Sept. 11 provided no key evidence in the hunt for Osama bin Laden and that the CIA misled Congress on the matter.
The CIA disputes that conclusion. The Senate panel is expected to vote Thursday on sending the Obama administration a 400-page executive summary of the “enhanced interrogation” report to start a monthslong declassification process.
One of the key issues likely to come up during the House hearing involves what was said during a series of secure teleconferences between CIA officials in Washington and Libya from the time of the attack on Sept. 11, 2012, to the completion of Mrs. Rice’s talking points for dissemination on the Sunday talk shows Sept. 16.
Multiple sources confirmed to The Times on Monday that the station chief’s email to Mr. Morell was written after one of the teleconferences during which senior CIA officials in Washington — Mr. Morell among them — made clear to the Tripoli station chief that they were examining alternative information that suggested there was a protest before the attack.
After the exchange, Mr. Morell signed off on the CIA talking points given to Mrs. Rice promoting what turned out to be the false narrative of a protest. The development ultimately triggered an angry reaction from Republicans, who have long claimed that the Obama administration, with an eye on the November elections, was downplaying the role of terrorists in order to protect the president’s record on counterterrorism.
Documents since released by the White House show that administration officials boasted in internal emails at the time about Mr. Morell’s personal role in editing and rewriting the talking points.
What is not clear is whether the email was in any way referring to the conflicting intelligence streams about a protest in Benghazi.
Alternatively, the email notes that Mr. Morell was uncomfortable with an initial draft of the talking points batted back and forth between White House and CIA officials “because they seemed to encourage the reader to infer incorrectly that the CIA had warned about a specific attack” in Benghazi.
During interviews with The Times, several former senior intelligence officials have lamented the whole “talking points” issue, saying the CIA was caught in the middle of the White House, Congress and the reality on the ground in Benghazi while crafting the points.
The reason the CIA ended up taking the lead on the talking points was because, as news of the attack was breaking around the world, lawmakers on the House intelligence committee were seeking guidance from the agency on how to respond to media questions without revealing classified information.
Specifically, Rep. Mike Rogers, Michigan Republican and the committee chairman, and ranking Democrat C.A. Dutch Ruppersberger of Maryland asked for the guidance.
One former senior intelligence official told The Times that as word circulated through the inner circles of the intelligence community that the CIA was working on the talking points, officials within the Obama administration steered the mission toward crafting something Mrs. Rice could say on national talk shows.
“In essence, the talking points got repurposed,” the former official said. “What it turned into — and I don’t think Michael ever knew this, it’s something to watch for in his testimony this week — was, ‘Let’s hand this thing to the U.N. ambassador and make it what she should say.’”
“That’s a big deal,” the former official said. “It’s one thing to prepare something for lawmakers so they don’t make a mistake or say something inaccurate. It’s quite another matter to have that feed the administration’s then-current, definitive account of what had actually happened in Benghazi.”
“There are a lot of twists and turns in this,” added another former intelligence official. “A lot of it hangs on the fact that the agency thought they were crafting these talking points for Dutch Ruppersberger and Mike Rogers, not the White House.”
Former CIA official accused of misleading lawmakers on Benghazi
By Catherine Herridge
Former CIA Deputy Director Michael Morell is facing accusations from Republicans that he misled lawmakers about the Obama administration’s role in crafting the bogus storyline that a protest gone awry was to blame for the deadly Benghazi attack.
Among other discrepancies, Republicans on the Senate Intelligence Committee allege Morell insisted the talking points were sent to the White House for informational purposes, and not for their input — but emails, later released by the administration, showed otherwise.
“We found that there was actual coordination which could influence then — and did influence — what CIA conveyed to the committees about what happened [in Benghazi],” Sen. Richard Burr, R-N.C., told Fox News.
Burr was one of six Republicans who leveled the allegations against Morell, who also served as acting director, in an addendum to a recently released Senate Intelligence Committee report. According to the claims, in late 2012, Morell testified the so-called Benghazi talking points were sent to the White House “for their awareness, not for their coordination.”
The 16-page addendum continues, “No effort was made to correct the record … the Acting Director’s (Morell) testimony perpetuated the myth that the White House played no part in the drafting or editing of the talking points.”
After Morell’s 2012 testimony, committee Republicans say they insisted on reading the raw email traffic in the days leading up to then-Ambassador Susan Rice’s controversial Sunday show appearances, where she linked the attack to a protest. Vice Chairman of the Senate Intelligence Committee Saxby Chambliss, R-Ga., told Fox News in a recent interview that they only got the emails between the CIA, State Department and White House because lawmakers threatened to hold up former White House counterterrorism adviser John Brennan’s confirmation as CIA director.
Once the emails were released, Republican lawmakers say the conflict with Morell’s testimony was clear. Morell, who at the time was CIA Director David Petraeus’ deputy, was at the heart of the process, cutting some 50 percent of the text — and Republicans say White House coordination began at the earliest stages.
Also in late 2012, Morell and Rice met with Sens. Kelly Ayotte, R-N.H.; John McCain, R-Ariz.; and Lindsey Graham, R-S.C. In a statement released at the time, the senators said Morell blamed the FBI for cutting references to Al Qaeda and did so to prevent compromising an ongoing criminal investigation.
“What I found curious is that he did not accept responsibility for changing the talking points. He told me the FBI had done this. I called the FBI. They went ballistic,” Graham said in a recent interview. “Within 24 hours, his statement was changed where he admitted the CIA had done it.”
Graham’s characterization of the meeting was backed up by Ayotte in a recent interview. “I was in that meeting when Susan Rice was with Director Morell when he blamed the FBI for changing those talking points, and you know then we call the FBI, the FBI goes crazy and said ‘we didn’t change the talking points.’ And so you have to wonder particularly now that we know that he may have received that email the day before what was going on.”
The email Ayotte is referring to was sent by the CIA’s top operative on the ground in Libya to Morell, and others at the CIA, one day before Rice’s Sunday show appearances. In the Sept. 15, 2012 email, first publicly documented in the bipartisan section of the Senate Intelligence Committee report, the CIA chief of station in Tripoli reported the attacks were “not/not an escalation of protests.”
One Republican lawmaker, Rep. Frank Wolf of Virginia, is now urging that Morell be recalled to clear up his testimony.
“I think it’s important for the integrity of the oversight,” Wolf said, adding that congressional oversight would be rendered meaningless if Morell were not recalled given the allegations against him.
Wolf, whose resolution to establish a select committee has the backing of a Republican majority in the House, recently wrote a letter to all House Republicans calling for Morell to testify again, potentially in both chambers, to address possible conflicts with previous testimony.
New details, confirmed by Fox News, suggest a similar scenario played out before the House Intelligence committee, chaired by Republican Mike Rogers.
In mid-November 2012, Morell testified along with James Clapper, the nation’s intelligence chief, and Matt Olsen, a senior counterrorism official.
When asked who was responsible for the talking points, first requested by Rogers’ committee, Clapper said he had no idea, while Morell remained silent, according to sources familiar with the testimony.
“If your silence does create a misleading impression even if you don’t have a strict legal obligation to speak up I think as a public official — somebody entrusted, infused with the public trust — you do have an obligation to speak up to make the truth known,” Tom Dupree, a former deputy assistant attorney general in the Bush administration, said.
Once the talking points emails were released, and Morell’s involvement came into sharper focus, in May 2013 he was asked to testify a second time before the House Intelligence Committee. Sources familiar with Morell’s second testimony say he admitted to changing the talking points, and he offered shifting explanations — from classification issues, to not compromising the FBI investigation — and that exposing the failure of Hillary Clinton’s State Department to act on repeated security warnings seemed unprofessional.
While two sources say Morell insisted the talking points were an afterthought at a White House meeting on Sept. 15 where the text was finalized, an email from White House adviser Ben Rhodes suggests otherwise. Late in the evening of Sept. 14, Rhodes wrote to email addresses at the FBI, the Office of the Director of National Intelligence, CIA, State Department, White House and National Security Staff: “There is a ton of wrong information getting out into the public domain from Congress and people who are not particularly informed … we need to have the capability to correct the record, as there are significant policy and messaging ramifications that would flow from a hardened mis-impression. We can take this up tomorrow morning at deputies.”
Dupree said lawmakers face a choice. “If you’re not getting the full truth in those questions, well then you can either abandon your oversight function or you can call those people back and press them and confront them with the facts.”
Since retiring from the CIA, Morell has taken on high-profile assignments for the administration, including the NSA review panel and the President’s Intelligence Advisory Board. He is now a paid TV commentator for CBS News, has a book deal, and works for Beacon Global Strategies, whose founder Philippe Reines has been described by the New York Times magazine as Clinton’s “principal gatekeeper.”
In an email to Fox News on Feb. 13, Morell said: “I stand behind what I have said to you and testified to Congress about the talking point issue. Neither the Agency, the analysts, nor I cooked the books in any way.”
When asked specific questions about Republican allegations he provided misleading testimony, Morell did not answer the questions, instead referring Fox News to the CIA public affairs office.
Spokesman Dean Boyd provided this statement to Fox News: “As we have said multiple times, the talking points on Benghazi were written, upon a request from Congress, so that members of Congress could say something preliminary and in an unclassified forum about the attacks. As former CIA Deputy Director Michael Morell has stated publicly time and again, the talking points were never meant to be definitive and, in fact, the points themselves noted that the initial assessment may change. He has addressed his role in the talking points numerous times. We don’t have anything further to add to the large body of detail on the talking points that is already in the public domain.”
Mike Morell: Man in the Middle of Benghazi Talking Points Scandal
Recent reporting has centered on CIA deputy director Mike Morell as a key player in critical and misleading changes made to the Obama Administration’s Benghazi talking points. The CIA talking points were cited by U.N. Ambassador Susan Rice on five different national Sunday talk shows on September 16, five days after the attack. Administration officials from President Obama and Secretary of State Hillary Clinton on down cited them. The initial draft of the talking points was produced by the CIA’s Office of Terrorism Analysis on September 14 at 11:15 a.m. A demonstration was mentioned, but so was al-Qaeda and Ansar-al-Sharia involvement. It referred to the CIA’s “numerous pieces on the threat of extremists linked to al Qaeda in Benghazi and eastern Libya.” National Security Council (NSC) staff edited the talking points on the 14th. But it was the State Department that had the most reservations. Hillary Clinton’s spokeswoman (and now Assistant Secretary of State for Europe) Victoria Nuland did not like the CIA’s draft—nor did her “building leadership,” as she said in an e-mail on September 14 at 9:24 p.m. She wrote to the NSC staff:
Why do we want Hill to start fingering Ansar Al Sharia, when we aren’t doing that ourselves until we have the investigation results…and the penultimate point could be abused by Members to beat the State Department for not paying attention to Agency warnings so why do we want to feed that?… Concerned.
The next morning, September 15, at 9.45 a.m., Morell produced what became essentially thefinal version of the talking points (Senate report, p. 51), removing references to known terrorist groups and identifying a non-existing demonstration as the cause. Outrageously, the official talking points contradicted the known facts. According to the recent report by the Senate Select Committee on Intelligence (p. 33), on September 15, the CIA’s Chief of Station in Tripoli reported in an e-mail that the Benghazi attacks were “not an escalation of protests.” Morrell completely ignored it. Below are the finalized talking points:
“The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the US Embassy in Cairo and evolved into a direct assault against the U.S. diplomatic post in Benghazi and subsequently its annex. There are indications that extremists participated in the violent demonstrations.”
“The assessment may change as additional information is collected and analyzed and as currently available information continues to be evaluated.”
“The investigation is on-going, and the US Government is working with the Libyan authorities to bring to justice those responsible for the deaths of US citizens.”
The text was not only misleading but so pathetic that then-CIA director David Petraeus commented, “Frankly, I’d just as soon not use this.” However, it was the State Department and the White House that were calling to shots, and Mike Morell played along.
Michael Joseph Morell (born September 4, 1958) was the deputy director of the Central Intelligence Agency and served as acting director twice in 2011 and from 2012 to 2013. Morell retired from his post on August 9, 2013, to devote more time to his family and to pursue other professional opportunities. As of 2014, Morell is CBS News‘ Senior Security Correspondent.
Most of Morell’s work in the agency was devoted to Asian projects. He also managed the staff that produced the Presidential Daily Briefings for PresidentGeorge W. Bush. Morell was Bush’s briefer during the September 11, 2001 attacks, and has been quoted as saying, “I would bet every dollar I have that it’s al Qaeda.” Furthermore, Morell was a trusted asset to PresidentBarack H. Obama II in the Osama bin Laden raid on May 2, 2011. Before his 2010 nomination as deputy director, Morell served as director for intelligence, a position he had held since 2008. Before that, he served as the CIA’s first associate deputy director from 2006 to 2008.
US President Barack Obama meets Saudi King Abdullah Friday as mistrust fuelled by differences over Iran and Syria overshadows a decades-long alliance between their countries.
Obama, who is due to arrive in Saudi Arabia late in the afternoon on a flight from Italy, is expected to hold evening talks with the monarch on a royal estate outside Riyadh.
Saudi Arabia has strong reservations about efforts by Washington and other major world powers to negotiate a deal with Iran on its nuclear programme.
It is also disappointed over Obama’s 11th-hour decision last year not to take military action against the Syrian regime over chemical weapons attacks.
Saudi analyst Abdel Aziz al-Sagr, who heads the Gulf Research Centre, said Saudi-US relations are “tense due to Washington’s stances” on the Middle East, especially Iran.
The recent rapprochement between Tehran and Washington “must not take place at the expense of relations with Riyadh,” Sagr told AFP.
Sunni Muslim Saudi Arabia, long wary of Shiite Iran’s regional ambitions, views a November deal between world powers and Iran over the latter’s nuclear programme as a risky venture that could embolden Tehran.
The interim agreement curbs Iran’s controversial nuclear activities in exchange for limited sanctions relief, and is aimed at buying time to negotiate a comprehensive accord.
Saudi Arabia’s King Abdullah bin Abdulaziz al-Saud in Rawdat al-Khuraim, on January 5, 2014
But Sagr said “arming the Syrian opposition will top the agenda” during Obama’s visit, his second since his election in 2009.
Analyst Khaled al-Dakhil spoke of “major differences” with Washington, adding that Obama will focus on easing “Saudi fears on Iran and on regional security.”
Saudi Arabia, the largest power in the six-nation Gulf Cooperation Council, fears that a possible US withdrawal from the Middle East and a diplomatic overture towards Iran would further feed Tehran’s regional ambitions.
Iranian-Saudi rivalry crystallised with the Syrian conflict: Tehran backs President Bashar al-Assad’s regime, while several GCC states support the rebellion against him.
- ‘Clearing the air’ -
Obama’s stances towards events reshaping the region “have strained (Saudi-US) relations but without causing a complete break,” said Anwar Eshki, head of the Jeddah-based Middle East Centre for Strategic and Legal Studies.
US security and energy specialist professor Paul Sullivan said Obama meeting King Abdullah could “help clear the air on some misunderstandings.”
US Secretary of State John Kerry (L) and Saudi Arabia’s King Abdullah talk before a meeting
“However, I would be quite surprised if there were any major policy changes during this visit. This is also partly a reassurance visit,” he added.
White House spokesman Jay Carney has said that “whatever differences we may have do not alter the fact that this is a very important and close partnership”.
However, Riyadh seems to be reaching out more towards Asia, including China, in an apparent bid to rebalance its international relations.
Crown Prince Salman bin Abdulaziz visited China, Pakistan, Japan and India this month, reportedly to strengthen ties.
The US-Saudi relationship dates to the end of World War II and was founded on an agreement for Washington to defend the Gulf state in exchange for oil contracts.
OPEC kingpin Saudi Arabia is the world’s top producer and exporter of oil.
Obama and the king are also expected to discuss deadlocked US-brokered Israeli-Palestinian peace talks.
They will also discuss Egypt, another bone of contention since the 2011 uprising that ousted Hosni Mubarak, who was a staunch US and Saudi ally.
The kingdom was dismayed by the partial freezing of US aid to Egypt after the army toppled Islamist president Mohamed Morsi last July — a move hailed by Riyadh.
On Thursday, Egypt’s Field Marshal Abdel Fattah al-Sisi resigned as defence minister after announcing he would stand for president.
Meanwhile, dozens of US lawmakers have urged Obama in a letter to publicly address Saudi Arabia’s “systematic human rights violations,” including efforts by women activists to challenge its ban on female drivers.
And rights group Amnesty International said Obama “must break the US administration’s silence on Saudi Arabia’s human rights record by taking a strong public stand against the systematic violations in the kingdom.”
“It is crucial that President Obama sends a strong message to the government of Saudi Arabia that its gross human rights violations and systematic discrimination are unacceptable,” said Hassiba Hadj Sahraoui, Amnesty’s deputy director for the Middle East and North Africa.
“A failure to do so would undermine the human rights principles the USA purports to stand for,” she added in a statement.
Amnesty also urged Obama to express “dismay” at the kingdom’s ban on women driving as his visit coincides with a local campaign to end the globally unique ban.
Story 1: NSA Metadata To Be Held By Telephone Companies — Great Distraction — Still Collecting and Intercepting All Americans Telephone Calls and All Information Transmitted Over The Internet and Telephone Exchanges — Stop Deceiving The American People Mr. President — Videos
Obama: NSA Proposal Satisfies Public Concerns
Obama announces overhaul of NSA metadata collection
NSA – Changes To Metadata Program – Special Report All Star
President Obama Names Michael Rogers As New Head Of The NSA
Background Articles and Videos
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Published on Dec 30, 2013
Through a PRISM, Darkly
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.
Speaker: Kurt Opsahl
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Glenn Becks “SURVEILLANCE STATE”
Inside the NSA
Ed Snowden, NSA, and Fairy Tales
AT&T Spying On Internet Traffic
For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”
NSA Whistle-Blower Tells All – Op-Docs: The Program
The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Benny – The Government is Profiling You (The NSA is Spying on You)
‘After 9/11 NSA had secret deal with White House’
The story of Whistleblower Thomas Drake
Whistleblowers, Part Two: Thomas Drake
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Meet Edward Snowden: NSA PRISM Whistleblower
The Truth About Edward Snowden
N.S.A. Spying: Why Does It Matter?
Inside The NSA~Americas Cyber Secrets
NSA Whistleblower Exposes Obama’s Dragnet
AT&T whistleblower against immunity for Bush spy program-1/2
AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program
The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.
AT&T whistleblower against immunity for Bush spy program-2/2
Enemy Of The State 1998 (1080p) (Full movie)
Background Articles and Videos
Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau. The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001. Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.
The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity. William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.
There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.
During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”. One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.
In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon. The article suggested that the otherwise dispatched Stellar Wind is actually an active program.
PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[Notes 1]PRISM is a government codename for a data collection effort known officially as US-984XN. It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA). The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.” The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012. The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.
According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum. Clapper issued a statement and “fact sheet” to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.
Slide showing that much of the world’s communications flow through the US
Details of information collected via PRISM
PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC). PRISM was authorized by an order of the FISC. Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017. According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.
PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden. The leaked documents included 41 PowerPoint slides, four of which were published in news articles. The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012). The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”
The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States. The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.
According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally. Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”
Response from companies
The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.
Initial Public Statements
Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports. Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:
Slide listing companies and the date that PRISM collection began
Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”
Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.” “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”
Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”
Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.” “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”
Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”
Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”
In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.” “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.
“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.
Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.
On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant. Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”
The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.” The other companies held discussions with national security personnel on how to make data available more efficiently and securely. In some cases, these companies made modifications to their systems in support of the intelligence collection effort. The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel. These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers” and the companies’ denials.
While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission. Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said. Facebook, for instance, built such a system for requesting and sharing the information. Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.
Post-PRISM Transparency Reports
In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.
On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000″ user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.
Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.
Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.
Response from United States government
Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats. The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.” He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.” Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.” On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans. In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.
Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”
On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.” The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”
The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”
The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.” He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”
In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.
In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification, and others said that they had not been aware of the program. After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:
Senator John McCain (R-AZ)
June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee
June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.
June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”
June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”
Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee
June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”
Representative John Boehner (R-OH), Speaker of the House of Representatives
June 11 “He’s a traitor” (referring to Edward Snowden)
Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act
June 9, “This is well beyond what the Patriot Act allows.” “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”
Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.
June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”
June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”
Senator Mark Udall (D-CO)
June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.
Representative Todd Rokita (R-IN)
June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,
Senator Rand Paul (R-KY)
June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”
June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”
Representative Luis Gutierrez (D-IL)
June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”
The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.
Applicable law and practice
On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).” Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.” In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.” When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.” They do not need to specify which facilities or property that the targeting will be directed at.
After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret. The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.
If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.
If the provider rejects the directive, the A.G. may request an order from FISC to enforce it. A provider that fails to comply with FISC’s order can be punished with contempt of court.
Finally, a provider can petition FISC to reject the directive. In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order. The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.
The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”
Involvement of other countries
The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.
Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”
Germany did not receive any raw PRISM data, according to a Reuters report.
Israeli newspaper Calcalist discussed the Business Insider article about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.
In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”
In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)
The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,” and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”
Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.” Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.” He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.
In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case. An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.” Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.” Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.” In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.
In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers; the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.” George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.
The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.
On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.
Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California. When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”. The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style. Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”
Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.
Protests at Checkpoint Charlie in Berlin
The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”. He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.
The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.
William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.” David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.” Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority. The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”
Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”
Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.” The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.
Russia has offered to consider an asylum request from Edward Snowden.
Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”
A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”
A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority. The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections. A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail. It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation. The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens. Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000. SAIC had also hired a former NSA director to its management; Bobby Inman. SAIC also participated in the concept definition phase of Trailblazer.
Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. 
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” 
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs’” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.” The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule. In 2006 the program was shut down, after having cost billions of US Dollars. Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.
The new project replacing Trailblazer is called Turbulence.
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying. A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy. Drake gave info to DoD during its investigation of the matter. Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed. She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.
Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.
In 2003, the NSA IG (not the DoD IG) had declared Trailblazer an expensive failure. It had cost more than $1 billion.
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative. Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun. Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union. None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917, part of President Barack Obama’s crackdown on whistleblowers and “leakers”. The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.
Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities. It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian. According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.
Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.
Slide showing that much of the world’s communications flow through the US.
Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).
NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.
Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian. The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.
According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.
Legality and FISA Amendments Act of 2008
The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.
The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”
Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS and Five Eyes). It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.
The system has been reported in a number of public sources. Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001, and by author James Bamford in his books on the National Security Agency of the United States. The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
the Government Communications Headquarters of the United Kingdom,
the National Security Agency of the United States,
the Communications Security Establishment of Canada,
the Defence Signals Directorate of Australia, and
the Government Communications Security Bureau of New Zealand.
the National SIGINT Organisation (NSO) of The Netherlands
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic. During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication, and could be intercepted at great distances. The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber. The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%. Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video. Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt. A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.
See also: Industrial espionage
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes. Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon and the speech technology developed by the Belgian firm Lernout & Hauspie. An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.” The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK. At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.
The 2001 European Parliamentary (EP) report lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
Hong Kong (since closed)
Australian Defence Satellite Communications Station (Geraldton, Western Australia)
Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)
Misawa Air Base (Japan) Map
GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
Sugar Grove (West Virginia, U.S.) Map
Yakima Training Center (Washington, U.S.) Map
GCSB Waihopai (New Zealand)
GCSB Tangimoana (New Zealand)
CFS Leitrim (Ontario, Canada)
Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
Ayios Nikolaos (Cyprus – U.K.)
BadAibling Station (BadAibling, Germany – U.S.)
relocated to Griesheim in 2004
deactivated in 2008
Buckley Air Force Base (Aurora, Colorado)
Fort Gordon (Georgia, U.S.)
Gander (Newfoundland & Labrador, Canada)
Guam (Pacific Ocean, U.S.)
Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
Lackland Air Force Base, Medina Annex (San Antonio, Texas)
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.
Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T. The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.” Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.
The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.
The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T. Klein claims he was told that similar black rooms are operated at other facilities around the country.
Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.
Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case. A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.
PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States
Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security. The data mostly comes from the NSA, FBI, CIA, as well as other government sources.
Ron Paul: U.S. Already Spent $5 Billion to Undermine Ukrainian Government
Victoria Nuland’s Admits Washington Has Spent $5 Billion to “Subvert Ukraine”
Ron Paul: US shouldn’t meddle in Ukraine
Russia Ukraine debate sparks fiery exchange
Putin in Ukraine ‘Russia will lose most from this’
Clashes in Ukraine create tension for U.S. and Russia
Debate: Is Ukraine’s Opposition a Democratic Movement or a Force of Right-Wing Extremism…
A New Cold War? Ukraine Violence Escalates, Leaked Tape Suggests US Was Plotting Coup
OReilly: Distorting Russia: How the American Media Misrepresent Putin, Sochi and Ukraine
2/18/14 Stephen F. Cohen, Ph.D. on O’Reilly claiming we’re Putin bashing
US Betrayal of Russia
Learn How The United States Is Behind The Kiev Ukraine Riots
Build up to WW3 - OBAMA Announces SANCTIONS to be Imposed on RUSSIA Amid UKRAINE CRISIS
GERALD CELENTE on the UKRAINE CRISIS – U.S. Agenda To Destabilize Russia
OBAMA PUSHING WAR WITH RUSSIA WORLD WAR 3 RUSSIAN TROOPS IN UKRAINE! 3-2-14
John McCain moves to start World War 3 in Ukraine
Why Ukraine matters to the U.S. & Russia
MUST SEE! World War 3 is upon us!
Build up to WW3 - RUSSIAN TROOPS in Uneasy Standoff with UKRAINE TROOPS in CRIMEA
The Road to World War 3: Ukraine, Russia and American Imperialism
The First World War – Part 1/10
The First World War – Part 2/10
The First World War – Part 3/10
The First World War – Part 4/10
The First World War – Part 5/10
The First World War – Part 6/10
The First World War – Part 7/10
The First World War – Part 8/10
The First World War – Part 9/10
The First World War – Part 10/10
The Guns of August
The Guns of August is a documentary that follows the book by the same title by author, Barbara Tuchman (1912-1989), an eminent American historian. She received the first of her two Pulitzer prizes for this 1962 masterpiece on World War I. The documentary was made in 1965. Barbara Tuchman was highly respected for her ability to present complex subjects and present them with clarity. Until I read the previous review, I have never heard of anyone accusing her of hating Germany or its people or of her book being anti-German propaganda. But there are pictures of shot civilians and movies of smoldering ruins. Then again, there are people who claim the Holocaust never took place and is just anti-Nazi propaganda… Facts: On August 3 1914, Germany declared war on France. The German invasion plan for France called for an attack through Belgium, instead of through the heavily defended Franco-German border. Belgium was neutral and its neutrality was protected by treaty with Great Britain. The Germans attacked on August 3rd. The next day, August 4th, Great Britain declared war on Germany. Germany warned Belgium that they only wanted to reach France and if Belgium complied, there wouldn’t be any trouble. Despite its small army, Belgium chose to protect its sovereignty and its honor and paid for it. Liège, Aarschot, Andenne, Tamines, Dinant, and Leuven, where the worst of the German depredations occurred.
Snowden Appears Via Video Conference At SXSW Panel
Snowden’s first live: ‘Constitution being violated on massive scale’ (FULL VIDEO)
Speaking remotely from Russia on Monday, former National Security Agency contractor Edward Snowden told attendees at the SXSW Interactive conference in Austin, Texas that encryption is still a powerful deterrent against government surveillance.
“Obama Is BIG BROTHER And He’s A LIAR!”
Edward Snowden looms over Pulitzer Prizes
By DYLAN BYERS | 3/13/14 5:03 AM EDT Updated: 3/13/14 8:27 AM EDT
Next month, the trustees who oversee America’s most distinguished journalistic award could face their toughest decision in at least four decades.
The issue before the Pulitzer Prize Board: Does it honor reporting by The Washington Post and The Guardian based on stolen government documents that are arguably detrimental to the national security of the United States, and which were provided by a man who many see as a traitor? Or, does it pass over what is widely viewed as the single most significant story of the year — if not the decade — for the sake of playing it safe?
The politically charged debate surrounding the National Security Agency’s widespread domestic surveillance program, and the man who revealed it, Edward Snowden, is certain to prompt intense discussion for the 19-member Board as it gathers to decide this year’s winners, according to past Board members, veteran journalists and media watchdogs. The debate echoes the historic decision in 1972, when the Board honored The New York Times for its reporting on Daniel Ellsberg’s Pentagon Papers, they said.
“This is an institutional question for them,” said Robert Kaiser, the veteran Washington Post journalist and a previous Pulitzer Prize finalist. “This is a very good argument to have, and there are members of that Board who are going to raise these questions and want to talk about them.”
The risks are manifold, and there is no easy answer: Honoring the NSA reporting — particularly in the coveted category of Public Service — would inevitably be perceived as a political act, with the Pulitzer committee invoking its prestige on behalf of one side in a bitter national argument. In effect, it would be a rebuttal to prominent establishment voices in both parties who say that Snowden’s revelations, and the decision by journalists to publish them, were the exact opposite of a public service. President Barack Obama has said that Snowden’s leaks “could impact our operations in ways that we may not fully understand for years to come.” Former Vice President Dick Cheney has called him “a traitor.” Snowden, who is living in Russia, is facing three felony charges in a criminal complaint filed by the Justice Department.
Yet to pass on the NSA story would be to risk giving the appearance of timidity, siding with the government over the journalists who are trying to hold it accountable and ignoring the most significant disclosure of state secrets in recent memory. It would also look like a willful decision to deny the obvious: No other event has had as dramatic an impact on national and international debates over state surveillance and individual privacy. Last December, in a move that Snowden later described as vindication, a federal district judge ruled that the NSA surveillance Snowden exposed most likely violates the Constitution. Another judge later found the surveillance lawful.
“The stories that came out of this completely changed the agenda on the discussion on privacy and the NSA,” said David Remnick, editor of The New Yorker. “There’s an enormous public good in that, and it’s yet to be proven at all that somehow did great damage to national security.”
Two teams are being considered for their work on the NSA leaks, POLITICO has confirmed. One is made up of The Guardian’s Glenn Greenwald, Laura Poitras and Ewen MacAskill, who published the first landmark report on the NSA’s collection of Verizon phone records, and have since played an integral role in building upon those revelations. The other is Poitras and Barton Gellman, who reported on the wide-ranging surveillance program known as “PRISM” for The Washington Post.
Here, too, the Board faces a challenge: In the eyes of privacy advocates, Greenwald’s work has been much more consequential in the larger arc of the Snowden story, and it was Greenwald who flew to Hong Kong to meet with Snowden and earn his trust. But Greenwald, a staunch anti-surveillance advocate with a brash, outsider’s persona, is not the type of journalist the Pulitzer Board has typically admired. Gellman, by contrast, with his serious and soft-spoken demeanor and decades in the business, comes straight out of Pulitzer central casting. But on what grounds could the Pulitzers recognize Gellman and not Greenwald?
All of these questions will be on the table when the Pulitzer committee meets on April 10 and 11. The winners will be announced on Monday, April 14, at a 3 p.m. news conference at Columbia’s Journalism School.
Sig Gissler, the administrator of the Pulitzer Prizes, and several board members declined to comment on the group’s approach to the NSA reporting, citing the confidentiality of the selection process. “Jurors sign oaths of confidentiality. We certainly do not comment on what is or is not entered or nominated,” Gissler said.
Both Greenwald and Gellman also declined to comment, as did the top editors at The Guardian and The Washington Post. Submissions in each category have already been considered by separate juries, which nominate three finalists to the Board. The Board then considers those nominations for the prizes; with a three-fourths vote, they can move a submission to a different category or recommend another work for consideration. The Guardian’s reporting was conducted through its U.S. outlet in New York, making it eligible for submission.
Several journalists believe that Snowden’s actions should have no bearing on the Pulitzer board’s considerations. It is the reporting that is being honored, not the source, they said.
“The question always is, ‘What was the best journalism produced in the past year?’ And it’s hard to think of a story that has had the impact of the NSA revelations,” said Rem Rieder, the media editor and columnist at USA Today . “These articles made public really important information that the public needs to know, and started a very important national debate over something that should not be decided unilaterally by the executive branch without public input or knowledge.”
Others have a harder time drawing such a definitive line. Michael Kinsley, the veteran political columnist and commentator, has wondered if there isn’t a dubious double standard in the way journalists are honored as heroes while their sources are portrayed as criminals. “If Snowden is guilty of a crime, why isn’t Bart Gellman guilty also?” he asked in an essay for The New Republic last year. Kinsley declined to comment for this piece.
Many of Snowden’s critics are often quick to paint Greenwald, Snowden’s staunchest public advocate, as an accomplice. James Clapper, President Obama’s director of national intelligence, even referred to “Snowden and his accomplices” while testifying before the Senate Intelligence Committee in January.
Whatever the Board’s intention, the decision to give an award to any NSA-related journalism would almost certainly be interpreted as a vindication of Snowden’s efforts, many said. That perceived declaration would surely invite blowback from those who see Snowden in a negative light. In January, after The New York Times editorial board called for clemency for Snowden, Rep. Peter King (R-NY) accused the paper’s editors of being “apologists for terrorists.”
The complications don’t end there. If the Board does decide to honor the reporting on the NSA, it will then have to wrestle with the fact that reporters from two publications were involved in the revelations. Though the Board has given dual awards in the past — the last occasion was in 2006 when The New Orleans Times-Picayune and the Biloxi-Gulfport Sun Herald split the Public Service award for their coverage of Hurricane Katrina — Greenwald’s role as an advocate could further impact the decision. The Brazil-based lawyer, who now works for Pierre Omidyar’s First Look Media, has kept a high profile throughout the past nine months, publicly advocating on Snowden’s behalf — and against the U.S. government — in television appearances, news interviews, and on social media.
“This institution [the Pulitzers] has a tendency to take itself awfully seriously,” said Kaiser, who described Greenwald’s work as “causist” reporting. “Whether committed causes should get a Pulitzer Prize for any kind of reporting is an open question. They’ll have to decide how judgmental they need to be.”
Gellman’s more traditional handling of the NSA story may have more appeal to the board. Instead of jumping into the fray on a near-daily basis, fighting on Twitter and giving contentious cable news interviews, Gellman has produced a few comprehensive reports that sought to put new revelations in a greater context. His ties to The Washington Post have also given the NSA story the imprimatur of “old media” integrity, which the Board is said to value.
Finally, there is the issue of effort. Though Greenwald and Gellman have dismissed the suggestion that Snowden’s trove of NSA files simply fell into their laps, the Pulitzer Board could feel conflicted about giving an award to the recipients of stolen documents when other applicants may have dedicated a significant amount of time and resources to old-fashioned shoe-leather reporting on, say, a local government issue. In several instances throughout its history, the Board has honored reporting based to a significant degree on the amount of effort and diligence shown by the reporters.
“The one wild card is the degree of difficulty question,” Rieder said. “Not to minimize the role of the reporters — it’s not just stenography. You have to sift through the information, present it clearly, explain why it matters, put it in context, etc. The real challenge would be if you had entries where reporters had to go to extraordinary lengths to pry out information of vital interest to the public, as opposed to having it turned over to them. If you had examples of great magnitude, that would make it complicated. That said, this was clearly the story of last year.”
“There’s a real question about whether this is reporting,” Kaiser said. “It might be a public service award, but it’s not a great reporting coup when a source comes to you and hands you this stuff.”
Both Greenwald and Gellman have adamantly dismissed the suggestion that they were merely stenographers for Snowden. Greenwald in particular traveled to Hong Kong and spent hours working with Snowden and earning his trust. Greenwald also continues to pore over the files in his possession, and says he has published just a small fraction of what Snowden gave him.
While the Board refuses to discuss next month’s awards, there are precedents that shed light on how that committee may decide to handle the NSA-related submissions.
In 1972, after what The Associated Press then described as “unprecedented debate,” the Pulitzer committee gave The New York Times the Public Service award for Neil Sheehan’s reporting on the Pentagon Papers, which he had received from former military analyst Daniel Ellsberg. At the time the award was given, Ellsberg was awaiting trial on charges of theft, which were later dropped.
Michael Gartner, the former NBC News president and Iowa newspaperman who spent 10 years on the Pulitzer Board, said he saw no substantive difference between the journalism that resulted from Ellsberg and Snowden’s stolen documents.
“I’m sure that there will be great debates over Snowden’s stuff, but really wasn’t that precedent set with the Pentagon Papers? The nature of the theft might be different, but isn’t the journalism the same — great stories produced from documents that were leaked by an employee of a private contractor?” Gartner wrote in an email. “I can make a distinction between Ellsberg and Snowden, if I have to, based on the nature of what they stole, but how can the board make a distinction between what was published then and what was published now? Reporting is reporting. If I were arguing for the Snowden stuff — and I would — that is the argument I would make.”
In 2006, the Pulitzer committee honored James Risen and Eric Lichtblau of The New York Times for their reporting on the George W. Bush administration’s secret wiretapping program. That decision, too, was a subject of intense internal debate. President Bush had personally asked the Times not to publish the article, and the committee’s decision to honor Risen and Lichtblau’s report was seen as a public rebuke of Bush administration policies.
Last month, in a move that set the stage for April’s Pulitzer debate, Long Island University gave both the Greenwald and Gellman teams the George Polk Award for National Security Reporting.
John Darnton, the curator of the Polk Awards, said he received emails from critics who, seemingly unaware of the precedent set by the Pentagon Papers, blasted the group’s decision to honor reporting based on stolen government documents. One of those emails came from Accuracy In Media, the conservative watchdog.
In a lengthy email to POLITICO, Cliff Kincaid, director of the AIM Center for Investigative Journalism, criticized Snowden and Greenwald for threatening national security.
“Political figures in both political parties agree that Snowden is a traitor. So what does that make his enablers in the media? They are certainly not journalists who deserve journalism prizes,” Kincaid wrote. “Journalism awards should not be given to recipients of stolen national security documents whose work has made America more vulnerable to terrorist attacks and its military personnel more likely to die at the hands of terrorists or enemy regimes.”
To date, no substantial evidence has emerged publicly that any of Greenwald or Gellman’s reporting has compromised America’s national security or military personnel, although intelligence officials have said they’ve detected changes in how groups like Al Qaeda communicate as a result of the broad controversy.
In the end, Darnton said the 10-member Polk panel hardly thought twice about the decision to bestow awards on Greenwald and Gellman.
“In the case of the NSA coverage, we began with a predisposition to seriously consider it because the repercussions were immense,” he explained. “There was a bit of discussion, but not much. The story itself is just so significant — there was no great dissent.”
Activists protest Sen. Feinstein’s ‘hypocritical’ support of NSA surveillance
Justice Department to investigate CIA spying on Senate
Dianne Feinstein: CIA Is Spying on the Senate
Feinstein: CIA Spied on Senate Committee
Feinstein: CIA has been spying on Senate computers
“Giving Hypocrisy a Bad Name”: NSA-Backing Senate Intel Chair Blasts CIA for Spying on Torture Probe
Is the CIA Spying on the Senate? | The Rubin Report
NSA Spying On Americans Sen Rand Paul O’Reilly Wake Up America!
America The Great Satan Sen-Feinstein Defends NSA Spying!!!
White House completely blindsided by WaPo report showing NSA spied on Americans – broke privacy regs
“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying
NSA Whistleblowers: “All U.S. Citizens” Targeted By Surveillance
How the Government Tracks You: NSA Surveillance
CIA Spies on Senate Staffers: A Troubling Pattern Is Reinforced
Senator Dianne Feinstein—who traditionally isastalwartdefender of the intelligence community—came out swinging against them this week. While on the floor of the Senate, she laid bare a two year long struggle concerning CIA spying on Senate Intelligence Committee staffers investigating CIA’s early 2000s torture and enhanced interrogation techniques. The spying by CIA crosses a line when it comes to Congressional oversight of the intelligence community. And it’s an emblem of the extreme imbalance between the power of Congress and the power of the intelligence community. If the intelligence community thinks they can act in such a way towards the people who are supposed to oversee them, what else do they think they can do?
How Did This Happen?
According to Senator Feinstein, the spying occurred in a facility provided by CIA to Senate Intelligence staffers. As part of the investigation, CIA agreed to not interfere with the facility or with the Senate Intelligence staff’s computers. After the staffers found a smoking gun document (an internal CIA review) that contradicted CIA’s own conclusions, the staffers—just like with previous documents—transferred it back to their own facility in the Senate. Soon after, the CIA found out about the possession and deleted files on the Senate staffers’ computers not once, but twice. Over 800 documents were deleted. Staffers do not know what those deleted documents contained.
The Oversight Regime Must Be Fixed
Senator Feinstein’s speech is the first step to ensuring Congressional oversight prevails, but the Department of Justice, which is currently conducting an investigation, should not be the only entity to review the details. The latest breach of trust by the intelligence community must spur Congress to exert their oversight powers and begin a full investigation into these actions and the oversight regime at-large.
These are pressing topics. It’s clear that the lack of oversight was a key factor in many of the egregious intelligence activities we learned about from the documents provided by Edward Snowden. The intelligence community evaded answering questions fully, or providing key documents to the intelligence committees. CIA spying is more proof that the oversight regime needs an overhaul. First and foremost, the American people—and Congress—need an oversight regime that works.
A Long Term Pattern
Some people are aghast at CIA’s actions. Details about the spying are sparse; however, it seems CIA may be guilty—at the minimum—of obstruction laws. But we’ve seen this before from the intelligence community. And we don’t have to draw from examples in the 1960s and 70s when the intelligence community was spying on Martin Luther King Jr. or anti-Vietnam activists. All we have to do is look at the past decade.
After the attacks on September 11, it took years for Senator Jay Rockefeller—then the chairman of the Senate Intelligence Community—to get a briefing and key documents for the entire committee about intelligence community actions. More recently, we saw obfuscation by the intelligence community in 2009 when it misled the FISA court. And just last year, the Director of National Intelligence, General James Clapper, lied to Congress about collecting data on innocent Americans. We also know members of Congress describe intelligence briefings as a game of 20 questions. Despite CIA’s original cooperation, it seems clear CIA did not want the Senate staffers to conduct a full investigation.
It should be obvious to anyone that these actions paint a picture—and confirm a pattern—of out-of-control intelligence agencies. The American public is losing a tremendous amount of trust in the intelligence community—trust that is necessary for the intelligence community to conduct its job. But it’s even more dangerous to the government body that is supposed to oversee the intelligence community: Congress.
Congress Must Act
Senator Feinstein’s concern over CIA spying on her staff should extend to a concern about NSA’s collection of all Americans’ calling records. Both actions are examples of intelligence community overreach and abuse of their authorities. There are serious problems when the stalwart defender of the intelligence community takes to the Senate floor to discuss problems with the committee’s oversight.
Beyond Senator Feinstein, Congress must retake its oversight role. For far too long has the intelligence community run roughshod over the intelligence committees. Time and time again, we’ve seen the inability for the intelligence community to grapple with the behemoth of the intelligence community. This must stop. An investigation should be carried out not only into CIA spying, but into the oversight regime as a whole, the classification system, and the egregious actions by the intelligence community—including the activities of NSA. All of these topics are core problems concerning the inability for the Senate Intelligence Committee to be fully briefed—or even grasp—intelligence community actions. This week may have been a loss for Congressional oversight, but members of Congress must reassert their power. Their duty to serve as representatives of the American people demand it.
Rand Paul on alleged CIA-Senate hacking: ‘This cannot happen in a free country’
By Joel Gehrke
Heads should roll at the CIA if Senate Intelligence Committee Chairman Dianne Feinstein, D-Calif., proves that intelligence officers hacked her staff’s computers as part of a dispute over a committee report on waterboarding, Sen. Rand Paul, R-Ky., told reporters.”There’s an incredible arrogance to me that the CIA thinks they can spy on a committee that is providing oversight for the CIA, and I think it’s a real, very serious constitutional breach,” Paul said outside the Senate chamber on Thursday. “This cannot happen in a free country.”Feinstein took to the Senate floor Tuesday to allege that “the CIA just went and searched the committee’s computers.” CIA director John Brennan denied Feinstein’s allegations, telling NBC, “The CIA was in no way spying on [the committee] or the Senate.” That denial has some lawmakers withholding judgement on the matter, at least for now.House Minority Leader Nancy Pelosi, D-Calif., praised Feinstein. “I tell you, you take on the intelligence community, you’re a person of courage, and she does not do that lightly,” Pelosi said during her weekly press briefing Thursday morning. “Not without evidence — when I say evidence, [I mean] documentation of what it is that she is putting forth.”
A behind-the-scenes battle between the CIA and Congress erupted in public Tuesday as the head of the Senate Intelligence Committee accused the agency of breaking laws and breaching constitutional principles in an alleged effort to undermine the panel’s multi-year investigation of a controversial interrogation program.Chairman Dianne Feinstein (D-Calif.) accused the CIA of secretly removing documents, searching computers used by the committee and attempting to intimidate congressional investigators by requesting an FBI inquiry of their conduct — charges that CIA Director John Brennan disputed within hours of her appearance on the Senate floor.
Sen. Dianne Feinstein (D-Calif.) questioned whether a CIA search of congressional records might have undermined government oversight during a Senate floor speech Tuesday.
If true, “this is Richard Nixon stuff,” one senator says.
<:ARTICLE>Feinstein described the escalating conflict as a “defining moment” for Congress’s role in overseeing the nation’s intelligence agencies and cited “grave concerns” that the CIA had “violated the separation-of-powers principles embodied in the United States Constitution.”Brennan fired back during a previously scheduled speech in Washington, saying that “when the facts come out on this, I think a lot of people who are claiming that there has been this tremendous sort of spying and monitoring and hacking will be proved wrong.”
The dueling claims exposed bitterness and distrust that have soared to new levels as the committee nears completion of a 6,000-page report that is expected to serve as a scathing historical record of the agency’s use of waterboarding and other brutal interrogation methods on terrorism suspects held at secret CIA prisons overseas after the attacks of Sept. 11, 2001.
Displaying flashes of anger during her floor speech, Feinstein said her committee would soon deliver the report to the White House and push for declassification of a document that lays bare “the horrible details of the CIA program that never, never, never should have existed.”
The latest dispute is in some ways a proxy for a deeper conflict over that document. The CIA and the committee are at odds over many of the report’s conclusions about the effectiveness of the interrogation program, but they are battling primarily over tension that surfaced during the investigation.
Feinstein’s remarks provided the most detailed account of that investigation, describing an arrangement in which the CIA set up a secret facility in Northern Virginia with computers where committee investigators were promised unfettered access to millions of operational cables, executive memos and other files on the interrogation program.
The disagreement between Feinstein and Brennan centers on whether agency employees or committee staff members — or both — abused their access to that shared network to gain an upper hand.
Feinstein implied that the CIA sabotaged the committee’s efforts from the outset, loading a massive amount of files on computers with no index, structure or ability to search. “It was a true document dump,” she said.
Over a period of years, investigators pored over more than 6.2 million classified records furnished by the CIA, using a search tool that agency technical experts agreed to install. But U.S. officials said the committee gained access to a set of documents that the agency never intended to share, files that were generated at the direction of former director Leon E. Panetta as part of an effort to take an inventory of the records being turned over to Feinstein’s panel.
The two sides have engaged in heated exchanges in recent days over the nature of those files and how they were obtained.
Referring to them as the “Panetta internal review,” Feinstein insisted that committee staff members discovered the documents during an ordinary search of the trove. She said they are particularly valuable because in tracking the flow of documents, CIA employees in some cases drew conclusions about their contents that match the subsequent interpretations made by committee staff members.
Jeremy Bash, Panetta’s former chief of staff, said Tuesday that that was never the director’s intent. Panetta “did not request an internal review of the interrogation program,” he said. “He asked the CIA staff to keep track of documents that were being provided. . . . He asked that they develop short summaries of the material, so that we would know what was being provided.”
Meanwhile, a letter that Brennan distributed to the CIA workforce on Tuesday raised questions about Feinstein’s claims and her awareness of how and when the committee obtained what she is calling the Panetta review files.
The letter, which Brennan sent to Feinstein on Jan. 27 and which was attached to a message he sent the workforce, recounts a meeting they had weeks earlier to discuss the matter. During that meeting, Feinstein said she didn’t know that the committee already had copies of the Panetta review. Brennan pushed her to explain why the panel had recently requested the files when they were already in its possession.
“You informed me that you were not aware that the committee staff already had access to the materials you had requested,” Brennan wrote, according to a copy obtained by The Washington Post. Brennan urged Feinstein to work with the agency to determine how the committee had obtained the documents, a request she ultimately rejected, officials said.
The CIA began to suspect that the panel had obtained those files this year after lawmakers referred to the supposed “internal review” publicly. U.S. officials said CIA security personnel then checked the logs of the computer system it had set up for the committee, and found that the files had been moved to a part of the network that was off-limits to the CIA.
“They did something to get those documents,” said a U.S. official briefed on the matter. A security “firewall was breached. They figured out a work-around to get it.” The official declined to elaborate.
Feinstein said the review documents were “identified using the search tool provided by the CIA” but she was careful not to say precisely how they were obtained. “We don’t know whether the documents were provided intentionally by the CIA, unintentionally by the CIA, or intentionally by a whistleblower,” she said.
She acknowledged, however, that committee investigators made hard copies of those files and whisked them away to its offices on Capitol Hill, in part because the committee had previously seen cases in which more than 900 pages of records disappeared from the database with no explanation.
Feinstein expressed outrage that the CIA referred the matter to the FBI. “There is no legitimate reason to allege to the Justice Department that Senate staff may have committed a crime,” she said, describing the move as a “potential effort to intimidate this staff, and I am not taking it lightly.”
She also noted that the referral was made by Robert Eatinger, the CIA’s acting general counsel, who previously served as the top lawyer for the department that ran the CIA’s secret prisons, and who “is mentioned by name more than 1,600 times in our study.”
Feinstein, who has been a staunch supporter of other CIA programs including its drone campaign, said the agency may have violated Fourth Amendment protections against unreasonable searches, as well as laws against domestic surveillance.
Although Republicans on the committee initially voted in favor of opening the investigation, GOP members abandoned the effort after it began and none has voted to endorse it.
Sen. Marco Rubio (R-Fla.), a member of the intelligence panel, told Bloomberg News that the dispute is “more complicated than what’s being put out there by Senator Feinstein or others. . . . I don’t think anyone has a clean hand and I think it’s important for the full truth to come out. I think people may be surprised to learn that, in this case, there were no good guys and maybe two or three bad ones.”
Brennan said he had ordered the CIA’s inspector general to review the agency’s conduct. The inspector general, in turn, has issued a separate referral seeking a Justice Department review.
Asked whether he would resign if the CIA was found to be in the wrong, Brennan said he would let the president decide his fate. “If I did something wrong, I will go to the president,” the director said. “He is the one who can ask me to stay or to go.”
Peter Schiff Thinks ‘Unfunded Liabilities’ Is An Economic Indicator
Deficits, Debts and Unfunded Liabilities: The Consequences of Excessive Government Spending
Economist: Real national debt is over $70 trillion, not $17 trillion
The First 12 Hours of a US Dollar Collapse
Overdose: The Next Financial Crisis
Global Debt Exceeds $100 Trillion as Governments Binge, BIS Says
By John Glover Mar 9, 2014 6:00 AM CT
The amount of debt globally has soared more than 40 percent to $100 trillion since the first signs of the financial crisis as governments borrowed to pull their economies out of recession and companies took advantage of record low interest rates, according to the Bank for International Settlements.
The $30 trillion increase from $70 trillion between mid-2007 and mid-2013 compares with a $3.86 trillion decline in the value of equities to $53.8 trillion in the same period, according to data compiled by Bloomberg. The jump in debt as measured by the Basel, Switzerland-based BIS in its quarterly review is almost twice the U.S.’s gross domestic product.
Borrowing has soared as central banks suppress benchmark interest rates to spur growth after the U.S. subprime mortgage market collapsed and Lehman Brothers Holdings Inc.’s bankruptcy sent the world into its worst financial crisis since the Great Depression. Yields on all types of bonds, from governments to corporates and mortgages, average about 2 percent, down from more than 4.8 percent in 2007, according to the Bank of America Merrill Lynch Global Broad Market Index.
“Given the significant expansion in government spending in recent years, governments (including central, state and local governments) have been the largest debt issuers,” according to Branimir Gruic, an analyst, and Andreas Schrimpf, an economist at the BIS. The organization is owned by 60 central banks and hosts the Basel Committee on Banking Supervision, a group of regulators and central bankers that sets global capital standards.
Marketable U.S. government debt outstanding has surged to a record $12 trillion, up from $4.5 trillion at the end of 2007, according to U.S. Treasury data compiled by Bloomberg. Corporate bond sales globally jumped during the period, with issuance totaling more than $21 trillion, Bloomberg data show.
Concerned that high debt loads would cause international investors to avoid their markets, many nations resorted to austerity measures of reduced spending and increased taxes, reining in their economies in the process as they tried to restore the fiscal order they abandoned to fight the worldwide recession.
Adjusting budgets to ignore interest payments, the International Monetary Fund said late last year that the so-called primary deficit in the Group of Seven countries reached an average 5.1 percent in 2010 when also smoothed to ignore large economic swings. The measure will fall to 1.2 percent this year, the IMF predicted.
The unprecedented retrenchments between 2010 and 2013 amounted to 3.5 percent of U.S. gross domestic product and 3.3 percent of euro-area GDP, according to Julian Callow, chief international economist at Barclays Plc in London.
The riskiest to the most-creditworthy bonds have returned more than 31 percent since 2007, according to Bank of America Merrill Lynch index data. Treasury and agency debt handed investors gains of 27 percent in the period, while corporate bonds worldwide returned more than 40 percent, the indexes show.
Rand Paul wins CPAC 2014 Presidential Straw Poll C-SPAN
Rand Paul wins CPAC 2014 Presidential Straw Poll C-SPAN
Rand Paul Previews His CPAC 2014 Speech
Rand Paul CPAC 2014 Speech (FULL) – Let Us All Stand Together in Liberty!
Rand Paul’s CPAC 2013 Speech – 3/14/2013
The BEST foreign policy speech EVER! – Libertarian Senator Rand Paul
Senator Rand Paul
Best 7 minutes of Ronald Reagan at CPAC
President Reagan’s Remarks at the Conservative Political Action Conference – Feb. 26 , 1982
Champions are made from something they have deep inside of them a desire, a dream, a vison.
~ Mahatma Gandhi
Queen - We Are The Champions (HQ) (Live At Wembley 86)
Queen- live at Wembley Stadium 12-07-1986 Saturday (25th Anniversary Edition)
Rand Paul wins 2014 CPAC straw poll, Ted Cruz finishes a distant second
Rubio and Ryan, GOP leaders in Congress all see big drops in support
Sen. Rand Paul demolished his competition in the 2014 Washington Times/CPAC presidential preference straw poll on Saturday, winning 31 percent of the vote — nearly three times the total of second-place Sen. Ted Cruz.
The poll also found a strong plurality of attendees at the Conservative Political Action Conference believe marijuana should be fully legalized, with 41 percent saying it’s time to change the law and tax it. Another 21 percent said it should be legalized only for medicinal purposes, while just 31 percent said it should remain illegal in all cases.
In the presidential poll, Mr. Cruz’s 11 percent was a big improvement for the freshman senator, who won just 4 percent in last year’s straw poll. Neurosurgeon Ben Carson was third with 9 percent and New Jersey Gov. Chris Christie was fourth with 8 percent in results that signal growing discontent with the GOP establishment in Washington.
Indeed, CPAC voters now have an unfavorable view of Republicans in Congress, with 51 percent saying they disapprove of the job the GOP is doing on Capitol Hill. Just last year the GOP had a 54 percent approval rating, and in 2012 they held a 70 percent approval rating.
But a series of tough votes over the last few months that saw Republican leaders work with President Obama to boost spending and raised the government’s debt limit have deepened a rift between the GOP’s leadership on Capitol Hill and conservative activists around the country.
Enlarge PhotoSen. Ted Cruz, R-Texas, speaks at the Conservative Political Action Committee annual … more >
That could be one reason why Rep. Paul Ryan, the Wisconsin Republican who wrote December’s budget deal that boosted spending in 2014 and 2015, saw his standing with CPAC voters cut in half — from 6 percent support in last year’s presidential straw poll to just 3 percent this year.
Sen. Marco Rubio suffered an even bigger drop, falling from 23 percent and second place in 2013 to seventh place, with 6 percent, this year.
For Mr. Paul, the victory is his second in a row, and he saw his support climb from 25 percent last year to 31 percent this year.
“He is the only true liberty candidate who focuses on civil liberties more than anybody else,” said Al Seltzinger, 36, from Baltimore. “I think the way the nation is going today with the government and the president going against the Constitution that we need someone who holds strict to the Constitution and whose voting record is pretty solid when it comes to the Constitution.”
Mr. Cruz also jumped from just 4 percent last year — when he was a newly sworn-in senator — to his 11 percent this year.
Mr. Carson, who gained prominence with a 27-minute speech challenging Mr. Obama when the two appeared at the 2013 National Prayer Breakfast, is also on the rise. In last year’s straw poll, taken just after that speech, he garnered 4 percent of the vote, but jumped to 9 percent this year.
“I love Ted Cruz, I love Rand Paul, but Ben Carson is all of the above,” said Jean Carlton, a 71-year-old CPAC attendee who said the doctor’s lack of Washington experience was a big plus.
For his part Mr. Christie, who has faced political troubles back home in New Jersey after his staffers caused a traffic jam on the George Washington Bridge to punish a town mayor, seems to be holding steady among activists. He rose from 7 percent last year to 8 percent support this year.
In his speech to the conference on Thursday, Mr. Christie argued that the GOP needs to not only pick a conservative champion, but pick a candidate who can get elected.
“We can’t govern if we can’t win,” he said.
That resonated with some CPAC straw poll voters.
“I think he has the best chance in the general election. I am less optimistic about his chances in the primary, but he seems to be more palatable to Independents and Democrats. I think electability is the main concern,” said Matthew Smith, a 19-year-old student at Yale University.
This year’s straw poll listed 25 potential candidates, which is far more than usual. The high number signals just how wide open the GOP’s presidential contest is with two years to go before the first caucuses and primaries.
On the Democratic side, meanwhile, former Secretary of State Hillary Rodham Clinton easily leads the rest of her party’s field in national and state polling.
Previous versions of The Washington Times/CPAC poll showed that the audience that gathers in Washington leans younger and more libertarian than the conservative movement throughout the country, which likely gives Mr. Paul a boost with this crowd here.
Indeed, his father, then-Rep. Ron Paul, won the straw poll twice on a similar libertarian-minded message, though he struggled to translate that support into votes when it came to primaries and caucuses.
The straw poll was conducted between Thursday and Saturday afternoon, and 2,459 votes were cast.
Story 1: The Economics of Russian Imperialism in Ukraine: Russia Goes Around Ukraine with Gas Pipelines — Videos
Pro-Russia Forces Storm Ukraine Centers | The New York Times
Russia Demands Surrender Of Ukraine’s Crimea Forces 04.03.2014
BBC News – Russia demands surrender of Ukraine Crimea forces
Russia demands SURRENDER of Ukraine’s Crimea forces or face an ASSAULT
Russian Forces Officially Enter the Crimea Region of UkraineBuild up to WW3 – PUTIN is Ready To React
Tatars in Crimea will never accept Russian rule in Ukraine
If Ukraine loses Crimea, then Iran & North Korea will pursue nuclear weapons
Putin’s strategy is to provoke overreaction by Ukraine in Crimea, K
Russian military ATTACK HELICOPTERS INVADE UKRANE
Apocalypse Now – Smell of Napalm HD
Gold, Silver and Crude Oil Rise as Russia-Ukraine Tensions Climb
Russia Reinforces Key Areas in Crimea – Putin UNFASED by WARNINGS
Build up to WW3 as RUSSIA Begins MILITARY EXERCISES Amid UKRAINE Tensions
Russian markets, currency hit by Ukraine war threat
Ukraine goes nuclear. Kiev gunmen. MP from Kiev jeered and chased. US warships on standby.
Ukraine Is Critical for Russia’s Oil Trade: Jeff Sachs
Russia Expands Its Natural Gas Infrastructure (Agenda)
Ukraine and Russia’s gas wrangle ignites again
What stands in way of Ukraine-EU deal?
Russia and Ukraine strike $15bln deal
New Pipeline To Europe Ends Ukraine’s Blackmail And Thievery Of Russian Gas
Russian-Ukrainian Conflict Spilling Beyond Borders And Into Natural Gas Markets
The Russian and Ukrainian conflict is about freedom — not just to political expression but also to explore new economic ties with the western world, which includes finding additional access to lucrative natural gas supplies.
It’s a battle that extends well beyond the walls of the former Soviet Bloc and into the heart of Europe that has long relied on Russian natural gas to provide about a quarter of its needs and which a third of it flows through Ukraine’s pipelines. Now that Russia has taken military control of the Crimean section of Ukraine, those conduits are in peril.
Russia, meantime, provides anywhere from one-third to one-half of Ukraine’s natural gas. And, since 2006, the two nations have had legitimate battles over how to value that vital product. During the early years of that dispute, Russia had wanted to quadruple prices to Ukraine. Recently, though, those natural gas prices are tied to global oil prices and have sold at much greater rates, which has cut Ukraine’s consumption of Russian natural gas.
Ukraine still subsidizes the gas that it does buy for its own citizens, noting that without such help, its already recession-ridden country would go into an economic tailspin. The International Monetary Fund is reporting that energy subsidies made up 7.5 percent of Ukraine’s 2012 gross domestic product.
“The Ukrainian economy has been in recession since mid-2012, and the outlook remains challenging. In January–September 2013 GDP contracted by 1.25 percent year-over-year, reflecting lower demand for Ukrainian exports and falling investments,” says the IMF’s December 2013 analysis.
For the moment, Ukraine — and Europe as well — have gotten a minor reprieve because each has had a mild winter. Europe is also warming to U.S. natural gas imports in the form of liquefied natural gas, which can sell for a premium there. Its also been shying away, lately, from Russian gas and using more coal.
Europe, too, has also won access to a number of new pipeline routes, or ones that are able to bypass Ukraine and enter the continent other ways. Among them: Pipelines are linking the Caspian Sea, Middle East and North Africa with Continental Europe. Algeria, for example, is increasing the capacity of its export routes that carry gas into Italy and efforts are also underway to do the same for routes into France and Germany.
Ukraine could ultimately break loose of the natural gas shackles from which Russia has help it captive. A Washington Post story says that Ukraine has signed deals with Chevron Corp and Royal Dutch Shell to invest as much as $10 billion into shale gas development in the western part of the country. ExxonMobil, meantime, wants to drill for oil and gas in the deep water of the Black Sea there — something that the paper says will have to wait given the uncertainties.
It’s accurate to say that the distrust that permeated during Cold War era still exists. But Russia can still be counted on — to act in its self interest. And in this case, the need to grow its own economy and to continue to market its natural gas to both Eastern and Western Europe could help soothe things.
Many Europeans say that Russia needs the revenues from selling its natural gas as much as the West needs those supplies. They maintain that the former Communist state is as reliable of a partner as the nations of the Middle East or Northern Africa. Other nations made up of mostly the former Soviet Bloc argue that Russia leverages its natural gas domination as a way to earn economic clout.
There’s no disagreement that Russia holds vast natural gas reserves. According to theU.S. Energy Information Administration, it possesses 27.5 percent of the world’s gas supply. About half of its own needs are met with natural gas while it provides about 23 percent of Europe’s demand.
Russia’s prized national asset is the natural gas company Gazprom, which is an outgrowth of the old Soviet empire. Today, though, Gazprom suffers from aging fields, state regulation and monopolistic control.
While Russia has been investing in its natural gas sector, it lacks the know-how or the capital to vastly increase its production. For that, it has been in talks with some western enterprises that consist of ConocoPhilips and Norsk Hydro of Norway to develop the gas-rich Shtokman fields in the Barents Sea. To become an energy leader, the U.S. Energy Information Administration says that between $173 billion and $203 billion must be invested in Russia’s gas sector by 2020.
Therein is the western world’s leverage with Russia, which needs the capital and technology to increase its international status. The crisis in Ukraine, however, is challenging the whole geo-political-economic paradigm. Russia needs Ukraine both culturally and economically. But it also needs to refurbish its image and to ingratiate itself with the world community.
In Phone Call, Obama Urges Putin to De-escalate Tensions
ALAN CULLISON in Sevastopol,
PAUL SONNE in Simferopol and
GREGORY L. WHITE in Moscow
The American and Russian presidents spoke on the phone for 90 minutes on Saturday after Russia’s parliament voted unanimously to deploy troops in Ukraine, defying warnings from Western leaders not to intervene.
In his conversation with Russian President Vladimir Putin , U.S. President Barack Obamaexpressed “his deep concern over Russia’s clear violation of Ukrainian sovereignty and territorial integrity.” Mr. Obama urged Russia to de-escalate tensions by withdrawing its forces back to bases in Crimea and to refrain from any interference elsewhere in Ukraine.
Saturday’s developments come as Russian troops and their local allies have already largely taken control of Crimea, a restive province of Ukraine that belonged to Russia until 1954 and remains predominantly pro-Russian.
In a statement after the call between Mr. Putin and Mr. Obama, the White House said the U.S. “condemns Russia’s military intervention into Ukrainian territory.”
Mr. Putin told Mr. Obama that Russia reserved the right to intervene in Ukraine to protect its interests and those of the Russian-speaking population there, according to a statement from the Kremlin.
Mr. Putin also spoke of “provocations, crimes by ultranationalist elements, essentially supported by the current authorities in Kiev.” It wasn’t clear what incidents Mr. Putin was referring to.
French President François Hollande also spoke with Mr. Putin Saturday and urged him to avoid any use of force in Ukraine. The French leader held a round of phone calls with Mr. Obama and German Chancellor Angela Merkel that aimed to forge a common position between the allies.
“I deplore today’s decision by Russia on the use of armed forces in Ukraine. This is an unwarranted escalation of tensions,” said European Union foreign-policy chief Catherine Ashton.
United Nations Secretary-General Ban Ki-moon said he is “gravely concerned about the deterioration of the situation” in Ukraine.
In an emergency meeting of the U.N. Security Council, Russian Ambassador Vitaly Churkin said Saturday that the regional Crimean government had formally requested Russian military assistance to restore stability to the peninsula. U.S. Ambassador Samantha Power denounced the Russian decision to intervene as “dangerous as it is destabilizing” and said it was taken without legal basis. “The Russian military must stand down,” Ms. Power said.
U.S. Defense Secretary Chuck Hagel spoke to his Russian counterpart, Sergei Shoigu. U.S. defense officials wouldn’t immediately provide any details of the call and didn’t say whether Mr. Hagel delivered any warning or caution.
In Brussels, ambassadors to the main political decision-making body of the North Atlantic Treaty Organization are set to meet Sunday to discuss the crisis in Ukraine. Afterward, the ambassadors will meet with the Ukrainian ambassador to NATO in a format called the NATO-Ukraine Council.
Meanwhile, skirmishes broke out in other regions of Ukraine, raising concern about broader unrest.
The new government in Kiev called an urgent session of its security council Saturday evening and set a special parliamentary meeting for Sunday to discuss the Russian move.
Vitali Klitschko, the former boxing champion who is one of the protest movement’s most prominent leaders, called on parliament to call a “general mobilization” to respond to the threat, apparently referring to Ukraine’s military.
Heavily armed troops, many from Russia’s Black Sea Fleet, which is based in the Crimean port of Sevastopol, surrounded key facilities across the region in the past day. The newly installed pro-Russian leader of Crimea Saturday formally asked Russia to deploy its troops to help secure the region.
Mr. Putin’s request didn’t specify how many troops might be sent. It said they would be deployed “until the normalization of the social-political situation in the country.”
The request cited the “threat to the lives of Russian citizens” living in Crimea, as well as the personnel of the Black Sea Fleet.
The approval of Mr. Putin’s request doesn’t necessarily mean troops will be dispatched immediately, an official said.
“Having the right (to deploy forces) doesn’t mean immediately, momentarily exercising that. So we will hope that the situation will go according to a better scenario and won’t continue to be exacerbated as it is now,” presidential spokesman Dmitry Peskov said in a radio interview.
Mr. Peskov said in the interview that no decision had been made yet on deploying forces to Ukraine or on recall of the ambassador.
Sergei Aksyonov, who was appointed prime minister of Crimea after armed men took over the regional parliament this week, said troops from the Black Sea Fleet are guarding vital facilities in the region and helping with patrols to ensure public order. Mr. Aksyonov, who is pro-Russian, said he was taking command of the peninsula’s police and army.
In the economically important eastern Ukrainian city of Donetsk, hundreds of pro-Russian protesters massed Saturday in the main square and took over a main government administration building, and raised the Russian flag, according to local residents and news outlets. It was unclear whether the protesters were local residents. The number of protesters was also unclear; Russian and Ukrainian media had wildly different estimates of crowd strength.
The Donetsk city council issued a statement demanding a referendum over whether the mining region with strong ties to Russia should remain part of Ukraine.
By nightfall, the area around the Donetsk main square was quiet. A reporter from Ukrainian national television said that the protesters remained inside the building, drinking tea and planning new pro-Russia protests for Monday.
In Kharkiv, protests erupted Saturday between crowds of mostly young men who have been camped out at different sides of the city’s main square—Europe’s largest city square—for weeks now.
The groups, one which is pro-Kiev and the other which is pro-Moscow, are mostly local youth, some of which are supporters of the local football team, who appear to have more personal grievances with each other rather than deeply held political agendas, according to local residents who know several of the people at the demonstration.
Interfax reported that about 100 people were injured in the disorder Saturday, though that figure couldn’t immediately be confirmed.
Ukraine military bases were quickly surrounded and sealed off Saturday by Russian forces in Crimea as the Kremlin made preparations for a larger-scale landing of troops.
Russian troops were posted near the gates and around the perimeters of several bases near Sevastopol. When asked why they were there, officers replied that they were providing security to the bases, to stop any pro-Russian citizens who might try to take them.
The troops posted around the base had no markings on their uniforms. Their commander, when asked if he could reveal their nationality, said “of course not.” Others admitted they were Russian. Ukrainian officials at the base said the Russians were allowing food and provisions to be brought in.
Russia’s Foreign Ministry accused the government in Kiev of trying to destabilize the region and directing gunmen to capture Crimea’s ministry of internal affairs building overnight. It said the attack, which couldn’t be verified, was averted with “decisive action.”
Five people who live in the buildings next to the ministry building in Simferopol said everything was peaceful Friday night and they heard nothing. There were no signs of struggle at the building complex.
Vladimir Krashevsky, a top official at the Simferopol-based division of the local berkut, or riot police, said there was no attack by Kiev-allied gunmen on the building, where he gave an impromptu news conference Saturday.
“There was no attack here and there won’t be one,” he said.
The resolution authorizing the use of force in Ukraine cited the threat to Russian citizens there, but officials in Moscow repeatedly suggested that the Kremlin was coming to the defense of ethnic Russians in Ukraine, even if they hold Ukrainian citizenship.
“There is a threat today to the lives and safety of our fellow citizens, of Russian speakers, of ethnic Russians,” Valentina Matvienko, speaker of the upper house of parliament, told reporters after the vote. “We can’t remain indifferent.”
Asked about possible western counter-intervention, she said there was no ground for it. “With all due respect to the United States, where is the U.S. located and where is Russia? This is happening on Russia’s border.”
Alexander Chekalin, a senator, spoke before the vote, saying, “we are one people, speaking one language, following one faith and sharing one history.” The eastern and southern parts of Ukraine have a large number of Russian-speakers who are members of the Orthodox church.
Ukrainian officials said the well-equipped men—many of whom carried sophisticated automatic weapons—were Russian soldiers.
The leader of the Crimean Tatars, the ethnic minority that accounts for 12% of Crimea and supports the new government in Kiev, sought to dispel the notion that the seizure of government buildings in Crimea had grown out of a citizen uprising.
“These buildings were seized by specially trained people acting on military orders,” said Refat Chubarov, the Tatar leader and deputy in the parliament, at a news conference Saturday.
Ukraine’s new prime minister, Arseniy Yatsenyuk, called the continuing militarization in Crimea a provocation intended to draw in Ukraine militarily. He demanded Russian forces return to their base in Sevastopol.
“The presence of Russian troops is nothing more than a violation of the agreement for the Black Sea Fleet to be in Ukraine,” Russia’s Interfax news agency quoted him as saying. “We urge the Russian government to withdraw their troops and return them to their base.”
Story 1: Warning You Are Being Tracked — The Secret Surveillance Security State — Vidoes
RFID Blocker Sleeves
Katherine Albrecht interview with Campaign for Liberty Part 1
Katherine Albrecht interview with Campaign for Liberty Part 2
Katherine Albrecht interview with Campaign for Liberty Part 3
WARNING RFID FOR EVERYONE
Katherine Albrecht, RFID expert , Genesis Communications Network Radio Host, and Author of the Book Spychips sat down with Steve Vasquez on April 20th to discuss Real Id and the Enhanced Drivers license.
What does it all mean? Legislation for total control and tracking.
FAIR USE NOTICE: This video may contain copyrighted material. Such material is made available for educational purposes only. This constitutes a ‘fair use’ of any such copyrighted material as provided for in Title 17 U.S.C. section 106A-117 of the U.S. Copyright Law
Katherine Albrecht – Spychips THREAT! Resist RFID & Electronic Surveillance!
The Enhanced Driver License: A Dream Realized
Texas Schools Track Students with RFID Chips! (Nanny of the Month, Nov ’12)
TEXAS Students to be TRACKED With MICROCHIPS. PUNISHMENTS For NON COMPLIANCE
RFID Chip Required in Obama’s Health Care Bill
Police State IBM VeriChip RFID Implant + Edible RFID Tracking Chips
The Fight Against the Total Surveillance State in Our Schools
Students in San Antonio are now being required to carry identification cards containing an RFID chip which allows school administrators to track their movements throughout the school day. While some are passively accepting the program, one brave student, Andrea Hernandez, is asserting her right to privacy. As John Whitehead explains in this week’s vodcast, the battle playing out in San Antonio could be the turning point in the resistance to the total surveillance state.
Students Required to Wear MicroChips on School Campus
Advanced RFID Student ID Card Identification System-Student Safety
Story 1: Senator Rand Paul Republican Party Front-Runner — A Profile in Courage –Videos
Profile in Courage
Sen. Rand Paul : I’ll Decide in 2014 on a Presidential Run – 2/17/13
Sen. Paul: I heard Obama say `trust me` on NSA
Rand Paul’s Plan To Grow The Economy – Glenn Beck Radio 2/13/2013
Judge Jeanine Pirro Asks Rand Paul If He Will Run For President 2016
Chris Matthews: Rand Paul Will Be Republican Presidential Nominee in 2016
Rand Paul: Voters ready for Libertarian Republican in 2016
Sen. Rand Paul Defends the Fourth Amendment – February 11, 2014
Sen Rand Paul (R-KY) Announces Lawsuit Vs Pres Obama, Dirs Of NSA, FBI, DNi, FBI Named In Suit
Sen. Rand Paul Delivers Response to President’s State of the Union Address
Senator Rand Paul HUMILIATES and EXPOSES John Kerry!!
Explosive: Sen. Rand Paul To Hillary Clinton – I Would Have Fired You
Reclaiming Our Rights in the 21st Century (Sen. Rand Paul)
How Rand Paul said the ‘politically bravest thing’ in Washington
Chris Christie Ties Rand Paul for 2016 GOP Primary Lead as Ted Cruz Slips 5 Points
Rand Paul: I’m Thinking Of Running For President – Fox News’ O’Reilly Factor 2/5/2013
Rand Paul: NSA Spying Doesn’t Make Me Feel Any Safer, But I Do Feel My Privacy Is Being Intruded On
Rand Paul: Voters ready for Libertarian Republican in 2016
Sen. Rand Paul Filing Class-Action Lawsuit Against NSA
Liberty & Civil Rights speech by Senator Rand Paul Howard University
How the GOP Can Attract Young People: Rand Paul and Glenn Beck
Glenn Beck: Rand Paul On Freedom
Rand Paul Is the GOP’s Early Presidential Front-Runner
While the establishment hopes for a governor to emerge, he is quietly putting together a formidable operation.
Republican strategists like to say the party’s next nominee needs to hail from the GOP’s gubernatorial ranks. It’s a response to how unpopular Washington is—particularly the party’s congressional wing—and a reflection of the party’s strength in holding a majority of governorships. But another reason for the gubernatorial focus is to sidestep the one formidable candidate that gives the establishment heartburn: Sen. Rand Paul.
Make no mistake: The Kentuckian scares the living daylights out of many Republicans looking for an electable nominee capable of challenging Hillary Clinton. At the same time, he’s working overtime to broaden the party’s image outside its traditional avenues of support. The 2016 Republican nominating fight will go a long way toward determining whether Paul is the modern version of Barry Goldwater or at the leading edge of a new, more libertarian brand of Republicanism.
“That’s the big challenge—is America ready? I think that Rand and his small-L libertarian Republicanism can break through,” said Paul’s longtime adviser Jesse Benton. “He’s a fundamentally better messenger than Barry Goldwater—[Goldwater's 1964 campaign slogan] ‘In your heart you know he’s right’ is not very compelling. Rand is a wonderful communicator, and I think a message of individual liberty can build wide support.”
Either way, Paul’s brand of politics is a distinct departure from the party’s traditional moorings. His occasional sympathy for Edward Snowden puts him on an island within the party. His critique of the National Security Agency’s domestic surveillance techniques and noninterventionist views on foreign policy are gaining some conservative followers, but are still outside the party mainstream. Many conservative foreign policy hawks could sooner support Clinton than Paul in a 2016 matchup.
And he’s got a history of questionable associations and controversial comments that would make Democratic opposition researchers salivate. Whether it’s hiring a top aide who was a former secessionist talk-show host (and defending him amid controversy), questioning the legality of the 1964 Civil Rights Act during his Senate campaign, or facing allegations of plagiarism from past speeches, Paul’s got plenty of controversies poised to reemerge in a presidential campaign. Paul’s invocation of Bill Clinton’s affair with Monica Lewinsky to attack Hillary Clinton in recent weeks is classic Paul—throw red meat into the fire to energize the base, regardless of the political consequences.
At the same time, Paul has been doing more than almost any other Republican to expand the party’s appeal to nontraditional GOP voters—the type of activity that’s imperative for future success. He spoke at Howard University and historically black Simmons College in Kentucky (twice) as part of an outreach effort toward African-Americans. His Jack Kemp-like pitch for “economic freedom zones” has even drawn the interest of the NAACP, which invited him to speak. He’s been leading the call for reforming drug sentencing, an issue that’s won support from many young voters and minorities who disproportionately bear the burden of current zero-tolerance policy. This week, at a Missouri Republican Party banquet, he said the party needs “a more diverse party—with tattoos and without tattoos.”
Meanwhile, the politics of the 2016 Republican nomination look increasingly favorable to Paul. He is one of the top fundraisers in the field, has a ready-made base of support from his father’s presidential networks, and has proven his savvy political instincts with a made-for-TV drone filibuster and NSA lawsuit. The newly compressed Republican presidential calendar should benefit a Paul candidacy, since he’s got the grassroots support to play in the small states and the money to fight forward in the big media-market states that follow.
Paul’s mutually beneficial alliance with Senate Minority Leader Mitch McConnell, who faces reelection this year, is a prime example of his political foresight. McConnell has helped him build chits with the establishment, including donors skeptical of his national viability. McConnell, meanwhile, has gotten tea-party validation to get him through a contested primary against businessman Matt Bevin. He’s also benefited from Paul’s swipes at former President Clinton, who is emerging as an important surrogate for McConnell’s Democratic challenger, Alison Lundergan Grimes. McConnell, if he survives the general election, could become the next majority leader. But Paul, in taming the establishment skepticism toward him, could end up with the bigger prize.
“He is the Republican front-runner,” said Republican strategist Scott Jennings, who served as deputy political director in the George W. Bush administration and is now running a pro-McConnell super PAC in Kentucky. “The political instinct of when to do things is not something you teach—you either have it or you don’t. He’s got a knack for finding populist issues showing why the government is stupid, and people like it.”
Randal Howard “Rand” Paul (born January 7, 1963) is the juniorUnited States Senator for Kentucky. He is a member of theRepublican Party and the son of former U.S. Representative and presidential candidate Ron Paul of Texas. He first received national attention in 2008 when making political speeches on behalf of his father, who was campaigning for the Republican Party’s nomination for president. During his father’s final term in the house, he was the first United States senator to have served simultaneously with a parent in the United States House of Representatives.
Randal Howard “Rand” Paul (born January 7, 1963) is the juniorUnited States Senator for Kentucky. He is a member of theRepublican Party and the son of former U.S. Representative and presidential candidate Ron Paul of Texas. He first received national attention in 2008 when making political speeches on behalf of his father, who was campaigning for the Republican Party’s nomination for president. During his father’s final term in the house, he was the first United States senator to have served simultaneously with a parent in the United States House of Representatives.
Paul has held a state-issued medical license since moving to Bowling Green in 1993. He received his first job from Dr. John Downing of Downing McPeak Vision Centers, which brought him to Bowling Green after completing his residency. Paul worked for Downing for about five years before parting ways. Afterwards, he went to work at the Gilbert Graves Clinic, a private medical group in Bowling Green, for 10 years before creating his own practice in a converted one-story house across the street from Downing’s office. After his election to the U.S. Senate, he merged his practice with Downing’s medical practice. Paul has faced two malpractice lawsuits between 1993 and 2010; he was cleared in one case while the other was settled for $50,000. Regardless, his medical work has been praised by Downing and he has medical privileges at two Bowling Green hospitals.Paul specializes in cataract and glaucoma surgeries, LASIK procedures, and corneal transplants. As a member of the Bowling Green Noon Lions Club, Paul founded the Southern Kentucky Lions Eye Clinic to help provide eye surgery and exams for those who cannot afford to pay.
National Board of Ophthalmology
In 1995, Paul passed the American Board of Ophthalmology (ABO) boards on his first attempt and earned board-certification under the ABO for 10 years. In 1997, to protest the ABO’s 1992 decision to grandfather in older ophthalmologists and not require them to be recertified every 10 years in order to maintain their status as board-certified practitioners, Paul, along with 200 other ophthalmologists formed the National Board of Ophthalmology (NBO) to offer an alternative ophthalmology certification system. The NBO was incorporated in 1999, but he allowed it to be dissolved in 2000 after not filing the required paperwork with the Kentucky Secretary of State‘s office. Paul later recreated the board in September 2005, three months before his original 10-year certification from the ABO lapsed. His ABO certification lapsed on December 31, 2005. Paul has since been certified by the NBO, with himself as the organization’s president, his wife as vice-president, and his father-in-law as secretary. The ophthalmology board is not officially recognized by the American Board of Medical Specialties (ABMS). The NBO was again dissolved on September 10, 2011.
The Wall Street Journal reported in 2010 that although Paul had told a Kentucky television audience as recently as September 2009 that KTU published ratings each year on state legislators’ tax positions and that “we’ve done that for about 15 years”, the group had stopped issuing its ratings and report cards after 2002 and had been legally dissolved by the state in 2000 after failing to file registration documents.
Paul spoke on his father’s behalf when his father was campaigning for office, including throughout the elder Paul’s run in the 2008 presidential election, during which Rand campaigned door-to-door in New Hampshire and spoke in Boston at a fundraising rally for his father on the anniversary of the 234th anniversary of the Boston Tea Party.
In February 2014, Paul joined the Tea Party-affiliated conservative advocacy group FreedomWorks in filing a class-action lawsuit charging that the US government’s bulk collection of Americans’ phone records metadata is a violation of the Fourth Amendment of the US Constitution. Commenting on the lawsuit at a press conference, Paul said, “I’m not against the NSA, I’m not against spying, I’m not against looking at phone records…. I just want you to go to a judge, have an individual’s name and [get] a warrant. That’s what the Fourth Amendment says.” He also said there was no evidence the surveillance of phone metadata had stopped terrorism. Critics, including Harvard University law professor Alan Dershowitz and Steven Aftergood, the director of the American Scientists’ Project on Government Secrecy, called the lawsuit a political “stunt”. Paul’s political campaign organization said that the names of members of the public who went to Paul’s websites and signed on as potential class-action participants would be available in the organization’s database for future campaign use. On the announcement of the filing of the lawsuit, Mattie Fein, the spokeswoman for and former wife of attorney Bruce Fein, complained that Fein’s intellectual contribution to the lawsuit had been stolen and that he had not been properly paid for his work. Paul’s representatives denied the charge, and Fein issued a statement saying that Mattie Fein had not been authorized to speak for him on the matter and that he had in fact been paid for his work on the lawsuit.
Then-U.S. Senate candidate Rand Paul speaking with a supporter at a healthcare rally in Louisville, Kentucky in November 2009
At the beginning of 2009, there was an online grassroots movement to draft Paul in a bid to replace beleaguered Republican Kentucky senator Jim Bunning. The news of Paul’s potential candidacy became a topic of national interest and was discussed in the Los Angeles Times and locally in the Kentucky press. Paul’s father remarked, “Should Senator Bunning decide not to run, I think Rand would make a great U.S. Senator.”
On May 1, 2009, Paul officially confirmed that if Bunning, whose fundraising in 2009 matched his poor numbers in opinion polling for the 2010 election, declined to seek a third term, he would almost certainly run in the Republican Party primary to succeed him, and formed an exploratory committee soon after, while still promising to stay out of the race if Bunning ultimately decided to run for reelection. Paul made this announcement on MSNBC’sThe Rachel Maddow Show, though a Kentucky news site first broke the news.
On July 28, 2009, Bunning announced that he would not run for reelection in the face of insufficient fundraising. The announcement left only Paul and Secretary of StateTrey Grayson as the remaining candidates for the Republican nomination, with Paul announcing on August 5, 2009 that he would officially run for the U.S. Senate as a Republican. The announcement was made through a series of national TV events, radio, and other programs, as well as newspapers in Kentucky.
Early fundraising success
On August 20, 2009, Paul’s supporters planned a moneybomb to kick off his campaign. The official campaign took in $433,509 in 24 hours. His website reported that this set a new record in Kentucky’s political fundraising history in a 24-hour period.
A second “moneybomb” was held on September 23, 2009, to counter a D.C. fundraiser being held for primary opponent Trey Grayson, by 23 Republican United States Senators, 17 of whom voted for the bank bailout. The theme was a UFC “fight” between Paul and “We the People” vs. Trey Grayson and the “D.C. Insiders”. The money bomb ended up raising $186,276 for Paul in 24 hours on September 23; bringing Paul’s Senate campaign’s total raised to over one million. Later in the campaign, Paul claimed his pledge to not take money from lobbyists and Senators who had voted for the bailout was only a “primary pledge”; he subsequently held a DC fundraiser with the same Senators who had been the target of the September 23, 2009 “moneybomb”. Paul ended up raising some $3 million during the primary period.
Although Grayson was considered the frontrunner in July 2009, Paul found success characterizing Grayson as a “career politician” and challenging Grayson’s conservatism. Paul ran an ad in February that made an issue out of Grayson’s September 2008 admission that he voted for Bill Clinton when he was 20 years old.James Dobson, a Christian evangelical figure, endorsed Grayson on April 26 based on the advice of what Dobson described as “senior members of the GOP”, but on May 3 the Paul campaign announced that Dobson had changed his endorsement to Paul after Paul and some Paul supporters had lobbied Dobson insisting on Paul’s social conservative bona fides.
In the 2010 general election, Paul faced Kentucky Attorney GeneralJack Conway. The campaign attracted $8.5 million in contributions from outside groups, of which $6 million was spent to help Paul and $2.5 million to help Conway. This money influx was in addition to the money spent by the candidates themselves: $6 million by Paul and $4.7 million by Conway. On June 28, 2010, Paul supporters held their first post-primary online fundraising drive, this time promoted as a “money blast”.
Paul’s campaign got off to a rough start after his comments on the Civil Rights Act of 1964 stirred controversy. Paul stated that he favored 9 out of 10 titles of the Civil Rights Act of 1964, but that had he been a senator during the 1960s, he would have raised some questions on the constitutionality of Title II of the Act. Paul said that he abhors racism, and that he would have marched with Martin Luther King Jr. to repeal Jim Crow Laws. He later released a statement declaring that he would have voted for the Act and stated “unequivocally … that I will not support any efforts to repeal the Civil Rights Act of 1964″. Later he generated more controversy by characterizing statements made by Obama Administration officials regarding the BP oil spill cleanup as sounding “un-American”.
In February, Paul was one of two Republicans to vote against extending three key provisions of the USA PATRIOT Act (roving wiretaps, searches of business records, and conducting surveillance of “lone wolves”—individuals not linked to terrorist groups). In May, he remained the last senator opposing the PATRIOT Act, and was ultimately defeated on May 26.
On March 2, Paul was one of nine senators to vote against a stopgap bill that cut $4 billion from the budget and temporarily prevent agovernment shutdown, citing that it did not cut enough from the budget. One week later, he voted against the Democratic and Republican budget proposals to keep funding the federal government, citing that both bills did not cut enough spending. Both bills failed to pass the Senate. He later voted against stopgap measures on March 17 and April 8, both of which passed the senate. On April 14, He was one of 19 senators to vote against a budget that cut $38.5 billion from the budget and fund the government for the remainder of the fiscal year. Paul voiced opposition to U.S. intervention in the Libyan civil war and has criticized President Obama for not gaining congressional consent forOperation Odyssey Dawn. During the debt ceiling crisis, the Senator stated that he would only support raising the debt ceiling if a balanced budget amendment was enacted.Paul was a supporter of the Cut, Cap and Balance Act, which was tabled by Democratic opposition. On August 3, Paul voted against a bill that would raise the debt ceiling.
On September 7, Paul called for a vote of no confidence in U.S. Treasury SecretaryTimothy Geithner. Later that month, Paul blocked legislation that would strengthen safety rules for oil and gas pipelines because he stated the bill was not strong enough. In October, Paul blocked a bill that would provide $36 million in benefits for elderly and disabled refugees, saying that he was concerned that it could be used to aid domestic terrorists. This was in response to two alleged terrorists, who came to the United States through a refugee program and were receiving welfare benefits, were arrested in 2011 in Paul’s hometown of Bowling Green. Paul lifted his hold on the bill after Democratic leaders promised to hold a Congressional hearing into how individuals are selected for refugee status and request an investigation on how the two suspects were admitted in the country through a refugee program.
113th Congress (2013-15)
For the 113th Congress, Paul was added to the Foreign Relations committee and retained his spot on the Health, Education, Labor and Pensions, Homeland Security and Government Affairs, and Small Business committees.
Paul held the floor for 12 hours and 52 minutes. He ceded to several Republican senators and Democratic senator, Ron Wyden, who generally also questioned drone usage. Paul noted his purpose was to challenge drone policy in general and specifically as it related to noncombatants on U.S. soil. He requested a pledge from the Administration that noncombatants would not be targeted on U.S. soil. Attorney General Eric Holder responded that the President is not authorized to deploy extrajudicial punishment without due process, against non combatant citizens. Paul answered that he was “quite happy” with the response. The filibuster was ended with a cloture vote of 81 to 16, and Brennan was confirmed by the Senate with a vote of 63 to 34.
In March 2013, Paul, with Senators Ted Cruz and Mike Lee, threatened another filibuster, this one opposing any legislative proposals to expand federal gun control measures. The filibuster was attempted on April 11, 2013, but was dismissed by cloture, in a 68–31 vote.
Also in March 2013, Paul endorsed fellow Kentucky Republican Senator Mitch McConnell‘s 2014 re-election campaign. McConnell had previously hired Paul’s 2010 campaign manager, Jesse Benton, as his own campaign manager. Paul’s endorsement was seen as a major win for McConnell in avoiding a challenge in the Republican primary. In August 2013, a phone call was released to the public in which Benton said that he was “holding his nose” in supporting McConnell in order to help a potential Rand Paul presidential candidacy.
In response to Detroit’sdeclaration of bankruptcy, Paul stated he would not allow the government to attempt to bail out Detroit. In a phone interview with Breitbart.com on July 19, 2013, Paul said, “I basically say he is bailing them out over my dead body because we don’t have any money in Washington.” Paul said he thought a federal bailout would send the wrong message to other cities with financial problems. In September, Paul stated that the United States should avoid military intervention in the ongoing Syrian civil war. In an op-ed, Paul disputed the Obama administration’s claims that the threat of military force caused Syria’s government to consider turning over its chemical weapons, instead arguing that the opposition to military action in Syria, and the delay that it caused, led to diplomatic progress.
In October 2013, Paul was the subject of some controversy when it was discovered that he had plagiarized from Wikipedia part of a speech in support of Virginia gubernatorial candidateKen Cuccinelli. Referencing the movie Gattaca, Paul quoted almost verbatim from the Wikipedia article about the film without citing the source. Evidence soon surfaced that Paul had copied passages in a number of his other speeches and published works nearly verbatim from other authors without giving credit to the original sources, including in the speech he had given as the Tea Party rebuttal to the president’s 2013 State of the Union address and in a three-page-long passage of Paul’s bookGovernment Bullies, which was taken directly from an article by the conservative think thank The Heritage Foundation. When it became apparent that an op-ed article Paul had published in the Washington Times and testimony he had given before the Senate Judiciary Committee both contained material that was virtually identical to an article that had been published by another author in The Week a few days earlier, the Washington Times said that the newspaper would no longer publish the weekly column Paul had been contributing to the paper. After a week of almost daily news reports of new allegations of plagiarism, Paul said that he was being held to an “unfair standard”, but would restructure his office in order to prevent mistakes in the future, if that would be what it would take “to make people leave me the hell alone”.
He supports term limits, a balanced budget amendment, and the Read the Bills Act, in addition to the widespread reduction of federal spending and taxation. Unlike his more stridently “non-interventionist” father, Paul concedes a role for American armed forces abroad, including permanent foreign military bases.
Paul describes himself as “100% pro life”. Paul opposes abortion even in cases of rape or incest. He has been a sponsor or co-sponsor of several legislative measures to effectively ban all abortions, except possibly in cases in which the mother’s life is at risk. He believes legal personhood begins at fertilization.
He opposes same-sex marriage, but believes the issue should be left to the states to decide. He has argued that Congress’ political position is “ten years behind the American public.”.
In a January 2013 interview, he spoke of a possible 2016 presidential candidacy. While not promising a run, he stated the decision would be made within the next two years. He also indicated his intention to shape GOP politics regardless of a run.
He won the Pennsylvania Leadership Conference poll, held April 19–20, 2013, with 39%  and the Tennessee Republican Assembly straw poll, also held on April 20, with 58%. His 2013 itinerary reportedly included trips through several early primary states.
Paul is married to Kelley (née Ashby) Paul. They live in Bowling Green, Kentucky, where she is a freelance writer and manages payroll and marketing communications for his ophthalmology practice. They have three sons: William, Duncan and Robert. Paul wears hearing aids in both ears