Television

Senator Harry Reid Calls Cliven Bundy Rancher Supporters Domestic Terrorists — Videos

Posted on April 21, 2014. Filed under: American History, Blogroll, Business, Constitution, Crime, Economics, Faith, Family, Federal Government, Fraud, history, Language, Law, liberty, Life, Links, media, People, Philosophy, Politics, Press, Rants, Regulations, Television, Terrorism, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , |

harry-reid-domestic-terrorist

Reid says Bundy supporters are nothing but domestic terrorists

Harry Reid accuses Cliven Bundy Nevada Ranch supporters of being ‘domestic terrorists’ – LoneWolf

Nevada Rancher Vs Federal Agents – Judge Andrew Napolitano On O’Reilly Factor

COMPLETE INTERVIEW: Rand Paul On Harry Reid Calling Bundy Supporters Domestic Terrorists

 

 

Read Full Post | Make a Comment ( None so far )

National Security Agency Invades Computers Using Radio Pathway — Crossing The Line Into Criminal Activity — Videos

Posted on January 14, 2014. Filed under: American History, Blogroll, Communications, Computers, Computers, Constitution, Data Storage, Economics, External Hard Drives, External Hard Drives, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Investments, IRS, Language, Law, liberty, Life, Links, media, Mobile Phones, People, Philosophy, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Regulations, Resources, Reviews, Security, Strategy, Systems, Talk Radio, Taxes, Technology, Television, Terrorism, Unemployment, Video, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , |

prism3

NSA could ‘Spy on offline Computers’ | NSA Infiltrates Personal Computers Worldwide

NY Times: NSA Maps Radio Pathway Into Computers — Even If They Are Offline

Report: NSA Intercepts Computer Deliveries

New York Times – Give Edward Snowden Clemency

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

January 14 2014 Breaking News Barack Obama Gun control & NSA worldwide people control last days news

Enemy of the State

N.S.A. Devises Radio Pathway Into Computers

By and JAN. 14, 2014

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.

Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

No Domestic Use Seen

There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s.

“N.S.A.’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”

Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.

President Obama is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services.

Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.

Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”

“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”

From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.’s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.

A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.

That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.

A Focus on Defense

In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States.

“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.

“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”

If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.

The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australia’s help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit.

Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers. When the Chinese place surveillance software on American computer systems — and they have, on systems like those at the Pentagon and at The Times — the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. Obama laid out America’s complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June.

At that session, Mr. Obama tried to differentiate between conducting surveillance for national security — which the United States argues is legitimate — and conducting it to steal intellectual property.

http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?hp&_r=0

Read Full Post | Make a Comment ( None so far )

National Security Agency (NSA) — Thin Thread — Trailblazer — The Program — Stellar Wind: PRISM — NUCLEON — Mainstay — Marina — EVILOLIVE — FASCIA — XKeyscore — Co-Traveller — Photos — Slides — Videos

Posted on January 4, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Computers, Constitution, Crime, Economics, Education, Employment, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Inflation, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Photos, Politics, Psychology, Raves, Regulations, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Technology, Television, Terrorism, Unemployment, Video, War, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , |

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Published on Dec 30, 2013

Through a PRISM, Darkly
Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.

Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

Glenn Becks “SURVEILLANCE STATE”

Inside the NSA

Ed Snowden, NSA, and Fairy Tales

AT&T Spying On Internet Traffic

For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”

NSA Whistle-Blower Tells All – Op-Docs: The Program

The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Benny – The Government is Profiling You (The NSA is Spying on You)

‘After 9/11 NSA had secret deal with White House’

The story of Whistleblower Thomas Drake

Whistleblowers, Part Two: Thomas Drake

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Meet Edward Snowden: NSA PRISM Whistleblower

The Truth About Edward Snowden

N.S.A. Spying: Why Does It Matter?

Inside The NSA~Americas Cyber Secrets

NSA Whistleblower Exposes Obama’s Dragnet

AT&T whistleblower against immunity for Bush spy program-1/2

AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program

The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.

AT&T whistleblower against immunity for Bush spy program-2/2

Enemy Of The State 1998 (1080p) (Full movie)

Background Articles and Videos

Stellar Wind

Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]

The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]

In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

PRISM

PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.

A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]

According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]

History

Slide showing that much of the world’s communications flow through the US

Details of information collected via PRISM

PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]

PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]

The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]

Response from companies

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]

Initial Public Statements

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]

Slide listing companies and the date that PRISM collection began

  • Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
  • Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
  • Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
  • Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
  • Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
  • Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]

In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13] The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]

“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]

Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]

The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]

While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]

Post-PRISM Transparency Reports

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000″ user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]

Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]

Response from United States government

Executive branch

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]

Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]

On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]

The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]

The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]

In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]

Legislative branch

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

  • June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

  • June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
  • June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
  • June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

  • June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]

Representative John Boehner (R-OH), Speaker of the House of Representatives

  • June 11 “He’s a traitor”[50] (referring to Edward Snowden)

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

  • June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

  • June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
  • June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]

Senator Mark Udall (D-CO)

  • June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]

Representative Todd Rokita (R-IN)

  • June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]

Senator Rand Paul (R-KY)

  • June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
  • June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]

Representative Luis Gutierrez (D-IL)

  • June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]

Judicial branch

The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.

Applicable law and practice

On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]

After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.

If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]

If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]

Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]

The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]

Involvement of other countries

Australia

The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]

Canada

Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]

Germany

Germany did not receive any raw PRISM data, according to a Reuters report.[59]

Israel

Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.

New Zealand

In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]

United Kingdom

In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]

Domestic response

Unbalanced scales.svg
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)

The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]

Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]

In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]

In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]

The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]

On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]

International response

Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]

Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]

Protests at Checkpoint Charlie in Berlin

The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]

The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]

William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]

Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]

Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]

Russia has offered to consider an asylum request from Edward Snowden.[91]

Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]

Related government Internet surveillance programs

A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]

A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]

http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29

ThinThread

ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]

http://en.wikipedia.org/wiki/ThinThread

Trailblazer

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.

NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]

Background

Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]

The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs’” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing

According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]

In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]

Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]

http://www.youtube.com/watch?v=1AXwwSq_me4

Boundless Informant

Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.

Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]

History

Slide showing that much of the world’s communications flow through the US.

Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]

NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]

Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]

Technology

According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]

Legality and FISA Amendments Act of 2008

The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]

The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]

Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]

http://en.wikipedia.org/wiki/Boundless_Informant

ECHELON

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]

The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Organization

UKUSA Community
Map of UKUSA Community countries with Ireland

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

  • the Government Communications Headquarters of the United Kingdom,
  • the National Security Agency of the United States,
  • the Communications Security Establishment of Canada,
  • the Defence Signals Directorate of Australia, and
  • the Government Communications Security Bureau of New Zealand.
  • the National SIGINT Organisation (NSO) of The Netherlands

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]

Controversy

See also: Industrial espionage

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]

Name

The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

  • Hong Kong (since closed)
  • Australian Defence Satellite Communications Station (Geraldton, Western Australia)
  • Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
  • Misawa Air Base (Japan) Map
  • GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
  • Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
  • Sugar Grove (West Virginia, U.S.) Map
  • Yakima Training Center (Washington, U.S.) Map
  • GCSB Waihopai (New Zealand)
  • GCSB Tangimoana (New Zealand)
  • CFS Leitrim (Ontario, Canada)
  • Teufelsberg (Berlin, Germany) (closed 1992)

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:

  • Ayios Nikolaos (Cyprus – U.K.)
  • Bad Aibling Station (Bad Aibling, Germany – U.S.)
    • relocated to Griesheim in 2004[19]
    • deactivated in 2008[20]
  • Buckley Air Force Base (Aurora, Colorado)
  • Fort Gordon (Georgia, U.S.)
  • Gander (Newfoundland & Labrador, Canada)
  • Guam (Pacific Ocean, U.S.)
  • Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
  • Lackland Air Force Base, Medina Annex (San Antonio, Texas)

http://en.wikipedia.org/wiki/ECHELON

Room 641A

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]

Description

Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]

The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]

The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.

Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.

Lawsuit

Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]

More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.

Main article: Hepting v. AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.

http://en.wikipedia.org/wiki/Room_641A

List of government surveillance projects for the United States

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.

http://en.wikipedia.org/wiki/List_of_government_surveillance_projects

Related Posts On Pronk Palisades

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

Three Cheers for Phil Robertson — Duck Dynasty, Free Speech, and Religious Freedom Win One — GLAAD IS SAD — Live With It and Move On — Videos

Posted on December 28, 2013. Filed under: American History, Art, Art, Babies, Blogroll, Business, Comedy, Communications, Constitution, Culture, Demographics, Economics, Education, Entertainment, Heroes, history, Language, Law, liberty, Life, Links, Literacy, media, Microeconomics, People, Philosophy, Politics, Press, Radio, Rants, Raves, Religion, Rifles, Talk Radio, Television, Television, Vacations, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , |

“Duck Dynasty” star Phil Robertson reinstated

 

A & E lifts suspension on ‘Duck Dynasty’

‘This Week’ Roundtable: ‘Duck Dynasty’ Debate

‘Duck Dynasty’ Reversal Shows GLAAD Has an Expiration Date

A few years ago, I couldn’t imagine a network disregarding GLAAD’s recommendations

By Brandon Ambrosino

Phil v. The Gays. With which will we side? Or rather, against which will we side? This is the question that society demands we answer. Are we anti-Phil or anti-gay or anti-GLAAD or anti-A&E or anti- … ?

Perhaps no other word sums up the Duck Dynasty fiasco as aptly as the word “anti.”

Whenever I hear that someone is anti-this or that, I immediately think of the old quip about MADD – are there any mothers for drunk driving? – and ask myself if anyone is really in favor of the particular thing being protested. Since GLAAD has recently taken a hard-line stance against Phil Robertson’s “anti-gay” comments, I’ve been asking myself a similar question about defamation: Who among us is for it? Most of us are decidedly against defamation, although we choose not to publicly participate in institutional demonstrations to prove how against it we are. But, of course, GLAAD is an institution, and therefore their criticism reverberates at systemic levels.

Founded in 1985 in the wake of the AIDS crisis, GLAAD was formed to protest skewed coverage of LGBT issues and “to put pressure on media organizations to end homophobic reporting.” The original name was an acronym for “Gay & Lesbian Alliance Against Defamation,” and although the organization has recently rebranded itself by deciding that the letters G-L-A-A-D aren’t actually going to stand for anything any more, their reputation for protesting defamatory speech is well known both within and without the LGBT community.

It goes without saying that GLAAD has done a great deal of good for the LGBT community, and for that they deserve our applause and honor. As they noted in their announcement heralding their name change, their work continues to educate and influence the greater culture. Historically they’ve been a symbol of inclusion and tolerance, and they’ve worked tirelessly to infuse these values into our controlling media discourses. Frankly, though, I don’t think their hasty reaction to Phil Robertson displayed our LGBT community’s best values.

Before many of us even learned that Phil Robertson was interviewed by GQ, GLAAD had already convinced us that Phil’s words were vile and offensive, and called upon A&E “to re-examine their ties to someone with such public disdain for LGBT people and families.” (I still wonder how many of us – commentators included – have read the actual story in GQ.) A&E offered its own kneejerk response to GLAAD’s kneejerk response, and placed Phil on “indefinite” hiatus, which then prompted some Evangelicals to offer up their own kneejerk response which had something to do with the freedom of speech and now – did I hear this correctly? – Chick-fil-A. In the end, after carefully reviewing all of the responses, A&E issued a final response explaining their decision to lift Phil’s suspension, which resulted in yet another predictable response from GLAAD. I’m not sure how we do it, but we manage to craft responses to our opponents without ever having actual conversations with them.

It isn’t shocking that a conservative Christian duck-hunter from Louisiana has opinions that GLAAD deemed “anti-gay,” and it isn’t shocking that A&E immediately kowtowed to GLAAD at the first drop of the word “homophobic.” What is shocking, however, is that A&E lifted Phil’s hiatus in spite of the fact that they knew GLAAD wasn’t going to be happy about it. A few years ago, I couldn’t imagine a network disregarding GLAAD’s recommendations. A&E is certainly setting a precedent – which makes me wonder about where we are today with queer politics.

In the ’80s and ’90s, GLAAD was necessary, if only because top media outlets needed to be reminded that journalistic ethics applied to AIDS coverage, too. But in 2014, how necessary is GLAAD? I don’t mean to suggest that the organization isn’t doing some good for our world – as I’ve already noted, they are! But as America edges closer and closer to unqualified and full inclusion of LGBT persons, I wonder if an organization whose raison d’etre is to find and shame instances of discrimination isn’t just a bit archaic.

If our goal is to progress beyond defamation against LGBT persons, then that means GLAAD has a sell-by date. To put it in a different, albeit cheekier way: Defamation is good for GLAAD’s business. To bankrupt our society of LGBT defamation would certainly put GLAAD out of work. It’s hard for me to imagine I’m the only one who’s wondered about this. In fact, GLAAD’s recent name-change only confirms that their leadership has been reexamining and revising their purposes moving forward. Again, I’m not suggesting our world doesn’t need GLAAD: There certainly is a place for them. But A&E’s latest reversal should make us question what exactly that place is.
http://ideas.time.com/2013/12/28/duck-dynasty-reversal-shows-glaad-has-an-expiration-date/

Related Posts On Pronk Palisades

God Is Behind Going Duck Crazy — Duck Dynasty Phil Robertson Suspended From Show For Expressing Views On Gays — Will Not Inherit The Kingdom of God — I’m With Phil — Photos & Videos

Read Full Post | Make a Comment ( None so far )

HIM Obama, HIM Obama, HIM Obama — His Imperial Majesty — Monarch of Marxism, Czar of Communism, Shah of Socialism, and Pharaoh of Progressivism — His Imperial Majesty Obama — HIM Obama, HIM Obama, HIM Obama — HIM That Must Be Obeyed — If You Like Your Plan You Can Keep Your Plan For One More Year — Videos

Posted on November 14, 2013. Filed under: American History, Blogroll, Communications, Computers, Constitution, Demographics, Diasters, Economics, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, Health Care, history, Inflation, IRS, Law, liberty, Life, Links, Literacy, media, Medicine, Narcissism, People, Philosophy, Photos, Politics, Press, Psychology, Radio, Rants, Raves, Regulations, Resources, Security, Strategy, Talk Radio, Tax Policy, Taxes, Technology, Television, Unemployment, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , |

The Pronk Pops Show

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

Listen To Pronk Pops Podcast or Download Show 165-167

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Segment 0: HIM Obama, HIM Obama, HIM Obama — His Imperial Majesty — Monarch of Marxism, Czar of Communism, Shah of Socialism, and Pharaoh of Progressivism — His Imperial Majesty Obama — HIM Obama, HIM Obama, HIM Obama — HIM That Must Be Obeyed — If You Like Your Plan You Can Keep Your Plan For One More Year — Videos

king-obama

characteristics_qualtities_barack_obama

how_Americans_View_Barack_Obamamedicare__social_security_deficits_chartsocial_security_medicareCP-fed-spending-numbers-2013-page-2-chart-2CP-fed-spending-numbers-2013-page-3-chart-2 CP-fed-spending-numbers-2013-page-6-chart-1

A Montage of Obama’s “If You Like Your Plan Keep It” Lies

President Obama describing how to reach single payer flashback

Barack Obama: ‘We Fumbled the Roll Out on This Health Care Law,’ ‘That’s on Me’ – 11-14-2013

Barack Obama Full Speech on Obamacare Disaster & Keep Your Plan Promise – November 14, 2013

Obama wants it both ways on single payer

Obama’s Single Payer Health Care System : New World Order ( NWO )

President Obama Wants A Single Payer Health Care System

Obama on single payer health insurance

Barack Obama and single payer health care

Obama On Single Payer Health Care

President Obama answers question on Health Care Website (C-SPAN Clip)

Obama Town Hall 1st Question? Single Payer

Obama In ’09: Medicare “Is Going Broke”

Trustees say long-run Medicare, Social Security deficit is $66 trillion

Social Security and Medicare – the two largest federal programs – are on track to generate $66 trillion in deficits over time, according to the latest analysis from the programs’ trustees.

Taken together, the reports underscore the fact that whatever modest improvement there has been in the near-term deficit outlook, the nation still faces deep long-term fiscal challenges.

In 2013, Social Security’s trustees expect the program to pay out $79 billion more in benefits than the government collects in Social Security taxes, and anticipate the program running deficits in perpetuity. This is despite the expiration of the 2011-12 payroll tax holiday and the improvement in the economy. Back when President Bush advocated Social Security reform, the program wasn’t supposed to start running annual deficits until 2018.

Typically, the media places emphasis on the Social Security “trust fund.” That is, in past years in which the government was collecting more in Social Security taxes than it cost to provide benefits, it spent the surplus on other government functions and issued IOUs to the Social Security system. Though the distinction is silly given that the money all has to come from the same bank account, the trustees estimate that these IOUs will now run out in 2033, at which point, absent other changes, the federal government would have to automatically cut Social Security benefits by 23 percent. When Bush was advocating Social Security reform, this wasn’t projected to happen until 2042. Put another way, the trust fund exhaustion date that was 37 years away during the Bush era when liberals denied the existence of a Social Security crisis, is now just 20 years away.

Under the trustees’ “infinite horizon” estimates that project the cost of Social Security over time in present dollars, the program is running a long-term deficit of $23.1 trillion.

When it comes to Medicare, the outlook is even grimmer, because the demographics of an expanding older generation, which challenge the finances of Social Security, interact with rising health care costs.

The finances of Medicare are also more complicated, because the program has several different funding streams. The hospital payment program, Medicare Part A, like Social Security, is financed by a payroll tax, in addition to general federal revenue. Medicare Part B (which covers services such as doctors visits and lab tests in addition to equipment such as wheelchairs) and Medicare Part D (which covers prescription drugs) are financed by a combination of collecting premiums from beneficiaries and general revenue.

Over time, the trustees project the hospital fund has $3.5 trillion in unfunded obligations, Part B will require $25 trillion in general revenue to finance, and Part D — passed by a Republican Congress and signed by Bush — will require an injection of $14.4 trillion. All told, Medicare will run $42.9 trillion short. Combined with Social Security, the long-term deficit of the two programs is $66 trillion.

This, however, likely understates the true extent of the financial problems facing Medicare. The reason is that these projections assume that all of the Medicare cuts in President Obama’s health care law will be fully implemented and that Congress will allow scheduled cuts to doctors’ payments to go into effect, even though lawmakers routinely vote to delay such cuts.

Paul Spitalnic, the acting chief actuary of the Centers for Medicare and Medicaid Services, in a statement at the end of the report, cautioned that the projections were ultimately “implausible.” For instance, they would require a cut to Medicare physicians’ payments of nearly 25 percent this January.

“Further, while the Affordable Care Act makes important changes to the Medicare program and substantially improves its financial outlook, there is a strong likelihood that certain of these changes will not be viable in the long range,” Spitalnic wrote. He continued: “Without unprecedented changes in health care delivery systems and payment mechanisms, the prices paid by Medicare for health services are very likely to fall increasingly short of the costs of providing these services. By the end of the long-range projection period, Medicare prices for hospital, skilled nursing facility, home health, hospice, ambulatory surgical center, diagnostic laboratory, and many other services would be less than half of their level without consideration of the productivity price reductions. Medicare prices would be considerably below the current relative level of Medicaid prices, which have already led to access problems for Medicaid enrollees, and far below the levels paid by private health insurance. Well before that point, Congress would have to intervene to prevent the withdrawal of providers from the Medicare market and the severe problems with beneficiary access to care that would result. Overriding the productivity adjustments, as Congress has done repeatedly in the case of physician payment rates, would lead to substantially higher costs for Medicare in the long range than those projected under current law.”

According to an alternate set of assumptions in which Congress undoes these cuts, the trustees estimate that the Medicare program could cost about 50 percent more over a 75-year period.

On paper, the Medicare hospital “trust fund” won’t be exhausted until 2026, which is two years later than last year and nine years later than before the passage of Obamacare. But, this estimate is based on the same unreasonable assumptions. Additionally, it’s misleading, because the projected Medicare savings are really supposed to be used to help finance the health care law’s new spending rather than extend the solvency of Medicare.

http://washingtonexaminer.com/trustees-say-long-run-medicare-social-security-deficit-is-66-trillion/article/2530908

Read Full Post | Make a Comment ( None so far )

People Peace Doves vs. Politician War Hawks– Bye Bye Birdie — Obama’s Secret Sincere Syria Weapon? — War, Eve of Destruction, Where Have All The Flowers Gone? — Videos

Posted on September 8, 2013. Filed under: Airplanes, American History, Ammunition, Blogroll, Bomb, Catholic Church, College, Communications, Constitution, Coptic Christian, Crime, Drones, Economics, Education, Employment, Energy, Federal Government, Federal Government Budget, Fiscal Policy, Food, Foreign Policy, Genocide, government, government spending, history, Illegal, Immigration, Inflation, Investments, Islam, Islam, Language, Law, liberty, Life, Links, media, Natural Gas, Nuclear, Nuclear Power, Oil, People, Philosophy, Photos, Pistols, Politics, Press, Radio, Rants, Raves, Religion, Resources, Rifles, Security, Strategy, Talk Radio, Tax Policy, Technology, Television, Terrorism, Transportation, Video, War, Water, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , , , , , , , , , |

peace-white-dove

hawkdoves-hawks

Bye Bye Birdie HONESTLY SINCERE 1963 Jesse Pearson Ann Margret

American People Making It Clear To THEIR REPRESENTATIVES They Do NOT Want War With Syria!

The Truth About War With Syria

Americans Oppose US Intervention In Syria But…

Why Americans are Against War on Syria

What do Americans think about War with Syria

Syria: Obama Joins Al-Qaeda…

Syria: Iraq Part Deux…

Screw the Economy!!! We’re Going to WAR!!!!

“US out of the Middle East”: anti-war protests gain momentum

There’s no public support for a Syrian war

Poll: majority of French oppose military intervention in Syria

Ann Coulter Syria Shows ‘You Cannot Trust Democrats to Be Commander in Chief’

Obama Talks Syria With McCain, Graham at WH

[youtubehttp://www.youtube.com/watch?v=fAIoUREM2X8]

Bill Kristol: Obama Gave ‘Hawks’ Like McCain and Graham an Opening

Chris Wallace: Full Rand Paul Interview on Fox News – Congress Authorize Strike on Syria? – 9/8/13

Crisis in Syria Debated on the Fox News Sunday Panel – Chris Wallace – 9- 8-13

Ann-Margret BYE BYE BIRDIE title song

War -  Edwin Starr

Barry McGuire – Eve of Destruction

Pete Seeger: Where Have All the Flowers Gone?

Obama’s Syria War Is Really About Iran and Israel

Bob Dreyfuss

The dirty little not-so-secret behind President Obama’s much-lobbied-for, illegal and strategically incompetent war against Syria is that it’s not about Syria at all. It’s about Iran—and Israel. And it has been from the start.

By “the start,” I mean 2011, when the Obama administration gradually became convinced that it could deal Iran a mortal blow by toppling President Bashar al-Assad of Syria, a secular, Baathist strongman who is, despite all, an ally of Iran’s. Since then, taking Iran down a peg has been the driving force behind Obama’s Syria policy.

Not coincidentally, the White House plans to scare members of Congress into supporting the ill-conceived war plan by waving the Iranian flag in their faces. Even liberal Democrats, some of whom are opposing or questioning war with Syria, blanch at the prospect of opposing Obama and the Israel lobby over Iran.

Please support our journalism. Get a digital subscription for just $9.50!

Item for consideration: a new column by the Syria analyst at the Washington Institute for Near East Policy, the chief think tank of the Israel lobby. Andrew Tabler headlines his piece: “Attacking Syria Is the Best Way to Deal with Iran.” In it, he says:

At first glance, the festering Syria crisis seems bad news for diplomatic efforts to keep Iran from developing nuclear capabilities. In actuality, however, achieving U.S. objectives in the Syria crisis is an opportunity to pressure Iran into making hard choices not only in Syria, but regarding its nuclear program as well. More U.S. involvement to achieve its objectives in Syria will inevitably run counter to Tehran’s interests, be it to punish the Assad regime for chemical weapons use or to show support for the Syrian opposition in changing Assad’s calculus and forcing him to “step aside” at the negotiating table or on the battlefield.

Many in U.S. policymaking circles have viewed containing swelling Iranian influence in Syria and preventing Iran from going nuclear as two distinct policy discussions, as the Obama Administration only has so much “bandwidth” to deal with Middle East threats. But the recent deepening of cooperation between Tehran, Hezbollah and the Assad regime, combined with their public acknowledgement of these activities, indicates that they themselves see these activities as furthering the efficacy of the “resistance axis.”

Like every alliance, its members will only make hard policy choices if the costs of its current policies far outweigh the benefits. U.S. strikes on the Assad regime, if properly calibrated as part of an overall plan to degrade the regime, would force Tehran to become more involved in Syria in order to rescue its stalwart ally. This would be costly for Iran financially, militarily and politically. Those costs would make the Iranian regime and its people reassess aspirations to go nuclear.

Needless to say, such a strategy is bound to be counterproductive, since—by slamming Syria, never mind toppling Assad—Washington is likely to undermine doves and bolster hawks in Tehran and undermine the chances for successful negotiations with Iran’s new president, Hassan Rouhani, who’ll be speaking at the UN General Assembly later this month.

In fact, both Russia and Iran have signaled recently, in the wake of Syria’s obvious deployment and use of sarin gas and other deadly weapons that they might be getting ready to join the rest of the world in condemning Syria’s chemical warfare, and that makes it far more likely that the much-postponed US-Russia “Geneva II” peace conference on Syria might work. The hawkish Washington Post today notes Rouhani’s new administration in Tehran is softening its tone on Syria, and it reports that the new Iranian foreign minister, Javad Zarif, has acknowledged the Syria has erred, saying: “We believe that the government in Syria has made grave mistakes that have, unfortunately, paved the way for the situation in the country to be abused.”

Meanwhile, Russia’s President Vladimir Putin, while issuing scathing denunciations of the coming U.S. attack on Syria, has dropped broad hints that he might be willing to join with other nations if and when the United Nations weapons team concludes that Assad used nerve gas, suggesting that Russia might not block a UN Security Council resolution against Syria. In his much-reported interview with the Associated Press, Putin insisted on waiting for the UN report:

“If there is evidence that chemical weapons have been used, and used specifically by the regular army, this evidence should be submitted to the U.N. Security Council. And it ought to be convincing. It shouldn’t be based on some rumors and information obtained by intelligence agencies through some kind of eavesdropping, some conversations and things like that.”

Then, according to the Washington Post, Putin declared that he might join a UN-sponsored coalition on Syria:

He said he “doesn’t exclude” backing the use of force against Syria at the United Nations if there is objective evidence proving that Assad’s regime used chemical weapons against its people. But he strongly warned Washington against launching military action without U.N. approval, saying it would represent an aggression. Russia can veto resolutions at the U.N. Security Council and has protected Syria from punitive actions there before.

But a change in tone on the part of Russia and Iran—the latter of whom the Obama administration still refuses to invite to Geneva II if and when it occurs—won’t mean a thing if the object of war with Syria is to send a message to Iran. As Jeffrey Goldberg, writing for Bloomberg, says, for Israel it’s all about Iran:

Prime Minister Benjamin Netanyahu of Israel would prefer that Obama enforce his red line on chemical weapons use, because he would like to see proof that Obama believes in the red lines he draws. From Netanyahu’s perspective, Israel isn’t unduly threatened by Assad. Syria constitutes a dangerous, but ultimately manageable, threat.

Netanyahu believes, of course, that Iran, Syria’s primary sponsor, poses an existential threat to his country, and so would like the Iranians to understand very clearly that Obama’s red lines are, in fact, very red. As Robert Satloff, the executive director of the Washington Institute for Near East Policy, told me last night, the formula is simple: “If the Iranians do not fear Obama, then the Israelis will lose confidence in Obama.”

In his round-robin television appearances on Sunday, Secretary of State John Kerry—now the administration’s über-hawk—repeatedly said that bombing Syria would send a message to Iran. As he told Fox News on Sunday:

“The fact is that if we act and if we act in concert, then Iran will know that this nation is capable of speaking with one voice on something like this, and that has serious, profound implications, I think, with respect to the potential of a confrontation over their nuclear program. That is one of the things that is at stake here.”

http://www.thenation.com/blog/176040/obamas-syria-war-really-about-iran-and-israel#

Related Posts On Pronk Palisades

Obama’s Red Lines — Videos

Who used chemical weapons in Syria? Syrian Rebels (FSA) or Syrian Regime (SAA) — American People Do Not Want To Take Sides in Syrian Civil War — Videos

Big Interventionist Government Statist (BIGS) Obama Sending Military Support To Syrian Rebels Including Jabhat al-Nusra (Al Qaeda connected) — Neocon Warmonger McCain Approves — All In For World War 3 — Videos

Launching World War 3 with The Missiles of September — Videos

Who Wants World War 3 To Start in Syria? The Warmongers Obama and McCain — Not The American People! — Videos

Muslim Brotherhood Massive Attack on Coptic Christians in Egypt — Silence From President Obama Who Supports Muslim Brotherhood — Muslim Ethnic Cleansing of Coptic Christians — Videos

Obama’s Siding With Muslim Brotherhood Not Popular in Egypt or in The United States — Videos

Muslim Brotherhood in America — Videos

Jeremy Salt on Syria — Videos

A History of Syria — Videos

The Truth About War With Syria — Videos

Read Full Post | Make a Comment ( None so far )

Craig Unger — The Fall of the House of Bush: The Untold Story of How a Band of True Believers Seized the Executive Branch, Started the Iraq War, and Still Imperils America’s Future — Videos

Posted on July 1, 2013. Filed under: American History, Ammunition, Blogroll, Bomb, College, Communications, Constitution, Dirty Bomb, Drones, Economics, Education, Federal Government Budget, Fiscal Policy, Foreign Policy, Genocide, government, government spending, history, Islam, Islam, Language, Law, liberty, Life, Links, media, Nuclear, People, Philosophy, Pistols, Politics, Press, Raves, Religion, Resources, Rifles, Security, Shite, Strategy, Sunni, Talk Radio, Tax Policy, Taxes, Television, Terrorism, Video, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , |

Craig_Unger

Fall_House_Bush

Craig Unger: The Fall of the House of Bush 1

Craig Unger: The Christian Right

Powell Says US Should Not Have Invaded Iraq

Congressman Ron Paul, MD – We’ve Been NeoConned

BBC Panorama – The War Party pt1/5

BBC Panorama – The War Party pt2/5

BBC Panorama – The War Party pt3/5

BBC Panorama – The War Party pt4/5

BBC Panorama – The War Party pt5/5

Background Articles and Videos

Colin Powell regrets Iraq war intelligence

Former US secretary of state says information he provided leading to the invasion of Iraq is a “blot” on his record.

Colin Powell, the former US secretary of state, has said he regrets providing misleading intelligence that led the US to invade Iraq, believing it had weapons of mass destruction.

Powell, the first secretary of state in the administration of George W. Bush, the former US president, which declared war on Iraq in 2003, told Al Jazeera on the 10th anniversary of the worst terror attacks on US soil that the information was a “blot on my record”.

“It turned out, as we discovered later, that a lot of sources that had been attested to by the intelligence community were wrong,” Powell said in Washington, DC.

“I understood the consequences of that failure and, as I said, I deeply regret that the information – some of the information, not all of it – was wrong,” said the former chairman of the Joint Chiefs of Staff.

“It has blotted my record, but – you know – there’s nothing I can do to change that blot. All I can say is that I gave it the best analysis that I could.”

Powell, who was secretary of state from 2002 to 2005, gave an elaborate description of Iraq’s weapons programme in the run-up to the war, saying “ambition and hatred” were enough to bring Iraq and al-Qaeda together and build more sophisticated bombs.

“I gave that speech on a four days’ notice based on an intelligence estimate that had been done months before and provided to Congress, and every word in that speech was gone over by the director of the Central intelligence Agency (CIA) and his deputy director and all experts,” he said.

In the United Kingdom, a traditional ally of the US which backed the military campaign, Tony Blair, who was prime minister at the time of the invasion, said Iraq had the capacity to deploy weapons of mass destruction in 45 minutes.

Blair has since been criticised for allegedly exaggerating that claim and for presenting intelligence that overstated the case for going to war. But Powell said he did not exaggerate the information he presented to Congress.

“There is nothing that I made up; there’s nothing that I stuck in there,” he said.

“Some people tried to stick extra things in there that the intelligence community wouldn’t verify and I said ‘no’.

“And so when I presented that information, it was information that the president believed in; information that my colleagues in government believed in.”

Powell said he “presented the best evidence that we had” and that the United Kingdom and other nations believed it.

The US invaded Iraq about 18 months after commercial airliners were hijacked by 19 men affiliated to al-Qaeda and flown into the twin towers of the World Trade Centre in New York.

Up to 3,000 people were killed by the hijackers who also targeted the Pentagon.

The war in Iraq, in which the US lost 6,000 of its soldiers, was preceded by the invasion in 2001 of Afghanistan by Washington.

Afghanistan was then home to Osama bin Laden, the mastermind of the 9/11 attacks and leader of al-Qaeda who was killed in May in Pakistan by US forces after a manhunt lasting nearly a decade.

The Iraq war was based on a lie, and Iran is too

Dead Wrong: Colin Powell’s UN Speech

Conversations w/Great Minds – Craig Unger – Karl Rove’s Secret Kingdom of Power P1

Top GOP Strategist Karl Rove Loses Cool Under Questioning By “Boss Rove” Author Craig Unger

Craig Unger on New Book, “Boss Rove: Inside Karl Rove’s Secret Kingdom of Power.” 2 of 2

Why We Fight – 2005 (full length)

Read Full Post | Make a Comment ( None so far )

The Coming U.S. Stock and Bond Market Crash of 2013-2014 — The Stock and Bond Big Bubble Burst — Central Banks Buying Gold! — Videos

Posted on April 27, 2013. Filed under: American History, Banking, Blogroll, Books, Business, College, Communications, Computers, Constitution, Crime, Demographics, Diasters, Economics, Education, Employment, Energy, European History, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, Health Care, history, History of Economic Thought, Immigration, Inflation, Investments, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, Monetary Policy, Money, People, Philosophy, Politics, Private Sector, Public Sector, Radio, Rants, Raves, Regulations, Resources, Security, Strategy, Talk Radio, Tax Policy, Taxes, Technology, Television, Transportation, Unemployment, Unions, Video, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

burstbubble

Great_recessionGreat_Depression

Fed-Reserve-Balance-Sheet

fed-dollars-2003-2012fed-balance-sheet-2016

federal_reserve_balance_sheet

Federal_funds_rate

QE-Fed-BalanceSheet-SP500-020413

BREAKING 2013 Economic Collapse Peter Schiff

Overdose: The Next Financial Crisis

David Stockman: We’re in a Monetary Fantasy Land

Ben Bernanke Is The Most Dangerous Man In US History

US BOND BUBBLE’S READY TO BURST!

Max Keiser: Propped Up Bond Market Set To Burst In April

U.S. Government Bond Bubble to Burst, Faber Says 

James Grant and James Turk discuss gold, the Fed and the fiscal situation of the USA

USA Will Die – Economic Collapse 2013 – Jim Rogers

JIM ROGERS – 2013 to Be Bad, ‘God Knows What Will Happen in 2014′

Jim Rogers Predicts Global Depression In 2013-2014

Peter Schiff on Max Keiser – Stopping the Global Financial Crisis

Keiser Report: Psyops & Debt Diets

Max Keiser: Will the next crash be on Bonds?

MAX KEISER: Colossal Collapse Coming! Keiser Report

MAX KEISER: Colossal Collapse Coming! Keiser Report

ALEX JONES & Max Keiser 2013, Year of The GREAT CRASH!

Peter Schiff – Dollar Could Collapse This Fall 2013

Peter Schiff – Economic Collapse 2013

Fed Will Keep Printing Until The Dollar Collapses~ Jim Rickards

Jim Rickards  Gold is Money ($7,000 Gold Price)

James Rickards Predicts US Inflation in 2013 due to the Devaluation of the US dollar

Currency Wars: Jim Rickards

Financial Pearl Harbor’ is a Real Threat Warns a Pentagon Adviser

CNBC Global Recession Is Coming – Marc Faber

Dr. Marc Faber – US is in 50-100 trillion worth of debt!

Marc Faber ‘We Are in the End Game’ Part 1

Marc Faber  ‘We Are in the End Game Part 2

Marc Faber – We Could See a 1987-Like Market Crash – Be Prepared and Get OUT!

Marc Faber-No Government Complies With Anything

Total Economic Collapse, Death of the Dollar, Impovershment, WWIII, Marc Faber Interview

Gerald Celente Deal Or No Debt Deal, The Debt Still Exists

Bill Gross: Economy Faces Structural Headwinds, “I Think We Are Facing Bubbles Almost Everywhere”

ECONOMIC CRASH WORLDWIDE STARTING

Harry Dent predicts global economic crash in 2013

Planned Economic Collapse 2013-2014

Background Articles and Videos

Meltdown (pt 1-4) The Secret History of the Global Financial Collapse 2010

Meltdown (pt 2-4) The Secret History of the Global Financial Collapse 2010

Meltdown (pt 3-4) The Secret History of the Global Financial Collapse.2010 

Meltdown – pt 4-4 The Secret History of the Global Financial Collapse (2010) 

The Fall of Lehman Brothers

Goldman Sachs: Power and Peril – Documentary

The Ascent of Money: A Financial History of The World by Niall Ferguson Epsd. 1-5 (Full Documentary)

The Fall of the Dollar – The Death of a Fiat Currency part 1

The Fall of the Dollar – The Death of a Fiat Currency part 2

The First 12 Hours of a US Dollar Collapse

LIFE HIDDEN TRUTH 2013 GLOBAL FINANCIAL CRISIS

 

Billionaires Dumping Stocks, Economist Knows Why

 

Despite the 6.5% stock market rally over the last three months, a handful of billionaires are quietly dumping their American stocks . . . and fast.

Warren Buffett, who has been a cheerleader for U.S. stocks for quite some time, is dumping shares at an alarming rate. He recently complained of “disappointing performance” in dyed-in-the-wool American companies like Johnson & Johnson, Procter & Gamble, and Kraft Foods.

In the latest filing for Buffett’s holding company Berkshire Hathaway, Buffett has been drastically reducing his exposure to stocks that depend on consumer purchasing habits. Berkshire sold roughly 19 million shares of Johnson & Johnson, and reduced his overall stake in “consumer product stocks” by 21%. Berkshire Hathaway also sold its entire stake in California-based computer parts supplier Intel.

With 70% of the U.S. economy dependent on consumer spending, Buffett’s apparent lack of faith in these companies’ future prospects is worrisome.

Unfortunately Buffett isn’t alone.

Fellow billionaire John Paulson, who made a fortune betting on the subprime mortgage meltdown, is clearing out of U.S. stocks too. During the second quarter of the year, Paulson’s hedge fund, Paulson & Co., dumped 14 million shares of JPMorgan Chase. The fund also dumped its entire position in discount retailer Family Dollar and consumer-goods maker Sara Lee.

Finally, billionaire George Soros recently sold nearly all of his bank stocks, including shares of JPMorgan Chase, Citigroup, and Goldman Sachs. Between the three banks, Soros sold more than a million shares.

So why are these billionaires dumping their shares of U.S. companies?

After all, the stock market is still in the midst of its historic rally. Real estate prices have finally leveled off, and for the first time in five years are actually rising in many locations. And the unemployment rate seems to have stabilized.

It’s very likely that these professional investors are aware of specific research that points toward a massive market correction, as much as 90%.

One such person publishing this research is Robert Wiedemer, an esteemed economist and author of the New York Times best-selling book Aftershock.

Editor’s Note: Wiedemer Gives Proof for His Dire Predictions in This Shocking Interview.

Before you dismiss the possibility of a 90% drop in the stock market as unrealistic, consider Wiedemer’s credentials.

In 2006, Wiedemer and a team of economists accurately predicted the collapse of the U.S. housing market, equity markets, and consumer spending that almost sank the United States. They published their research in the book America’s Bubble Economy.

The book quickly grabbed headlines for its accuracy in predicting what many thought would never happen, and quickly established Wiedemer as a trusted voice.

A columnist at Dow Jones said the book was “one of those rare finds that not only predicted the subprime credit meltdown well in advance, it offered Main Street investors a winning strategy that helped avoid the forty percent losses that followed . . .”

The chief investment strategist at Standard & Poor’s said that Wiedemer’s track record “demands our attention.”

And finally, the former CFO of Goldman Sachs said Wiedemer’s “prescience in (his) first book lends credence to the new warnings. This book deserves our attention.”

In the interview for his latest blockbuster Aftershock, Wiedemer says the 90% drop in the stock market is “a worst-case scenario,” and the host quickly challenged this claim.

Wiedemer calmly laid out a clear explanation of why a large drop of some sort is a virtual certainty.

It starts with the reckless strategy of the Federal Reserve to print a massive amount of money out of thin air in an attempt to stimulate the economy.

“These funds haven’t made it into the markets and the economy yet. But it is a mathematical certainty that once the dam breaks, and this money passes through the reserves and hits the markets, inflation will surge,” said Wiedemer.

“Once you hit 10% inflation, 10-year Treasury bonds lose about half their value. And by 20%, any value is all but gone. Interest rates will increase dramatically at this point, and that will cause real estate values to collapse. And the stock market will collapse as a consequence of these other problems.”

Read Latest Breaking News from Newsmax.com http://www.moneynews.com/MKTNews/billionaires-dump-economist-stock/2012/08/29/id/450265?PROMO_CODE=110D8-1&utm_source=taboola#ixzz2RhO2R5ey
Urgent: Should Obamacare Be Repealed? Vote Here Now!

http://www.moneynews.com/MKTNews/billionaires-dump-economist-stock/2012/08/29/id/450265?PROMO_CODE=110D8-1&utm_source=taboola

Read Full Post | Make a Comment ( None so far )

Conservative savior of UK’s economy, Margaret Thatcher dead at 87 — Videos

Posted on April 10, 2013. Filed under: American History, Banking, Blogroll, College, Communications, Economics, Education, Employment, Energy, European History, Fiscal Policy, Foreign Policy, government, government spending, Health Care, history, History of Economic Thought, Immigration, Inflation, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, Monetary Policy, Money, Natural Gas, People, Philosophy, Private Sector, Public Sector, Rants, Raves, Regulations, Security, Strategy, Talk Radio, Taxes, Technology, Television, Transportation, Unions, Video, War, Water, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , |

Conservative savior of UK’s economy, Margaret Thatcher dead at 87

By Raymond Thomas Pronk

Margaret_Thatcher

“Some Socialists seem to believe that people should be numbers in a State computer. We believe they should be individuals. We are all unequal. No one, thank heavens, is like anyone else, however much the Socialists may pretend otherwise. We believe that everyone has the right to be unequal but to us every human being is equally important.”

~Margaret Thatcher, Speech to Conservative Party Conference, October 10, 1975

Ceremonial funeral services with military honors for Margaret Thatcher, former prime minister of the United Kingdom, known as Maggie to her friends and “the Iron Lady” to her opponents, will be held this Wednesday at St Paul’s Cathedral, according to Prime Minister David Cameron’s office.

Her legacy was to change her country’s dominant ideology from collectivist state socialism implemented in decades of Labour Party policies to an individualist market capitalism implemented in Conservative Party policies. In the process she returned the U.K. to eight years of economic growth and prosperity in the 1980s.

Thatcher supported President Ronald Reagan and the United States in defeating communism in the Soviet Union and winning the Cold War.

Thatcher had been in declining health for a number of years and died peacefully in her sleep the morning of April 8 following a stroke.

British Prime Minister David Cameron said of Thatcher, “As our first woman prime minister, Margaret Thatcher succeeded against all the odds and the real thing about Margaret Thatcher is that she didn’t just lead our country, she saved our country, and I believe she’ll go down as the greatest British peacetime prime minister.”

President Barack Obama said, “The world has lost one of the great champions of freedom and liberty and America has lost a true friend.” Obama said she had taught “our daughters that there is no glass ceiling that can’t be shattered.”

John Boehner, speaker of the house, said, “The greatest peacetime prime minister in British history is dead. Margaret Thatcher, a grocer’s daughter, stared down elites, union bosses and communists to win three consecutive elections, establish conservative principles in Western Europe and bring down the Iron Curtain. There was no secret to her values – hard work and personal responsibility – and no nonsense in her leadership.”

Nancy Reagan, widow of former President Ronald Reagan said: “Ronnie and Margaret were political soul mates, committed to freedom and resolved to end Communism. As Prime Minister, Margaret had the clear vision and strong determination to stand up for her beliefs at a time when so many were afraid to ‘rock the boat.’ As a result, she helped to bring about the collapse of the Soviet Union and the liberation of millions of people.”

In 1975 Thatcher was elected leader of the Conservative Party. She was subsequently elected prime minister of the United Kingdom on May 4, 1979. Thatcher served three terms from 1979 to 1990 becoming Britain’s longest-serving prime minister in over a century as well as the most dynamic, inspirational and controversial.

When Thatcher took office, the British economy was in shambles and in recession, inflation was rising and the government faced possible bankruptcy. This was a direct result of many years of Labour Party socialistic policies of out-of-control government spending, confiscatory taxation and the nationalization or state control of many industries including coal, steel, railways, gas, electricity, water, trucking, airlines and telecommunications.

The writings of Austrian economist and political philosopher, Friedrick A. Hayek, winner of the 1973 Nobel Prize in Economics, in particular his book, “The Road to Serfdom”, inspired and guided Thatcher’s economic policies.

Thatcher turned the economy around and made Britain governable again by taking on and taming the trade unions with labor reform legislation. No longer were the unions able to dictate the nation’s economic policies. Under Thatcher the British government pursued a policy of selling state assets with privatization of industry, thus reversing the Labour Party’s nationalization of industry.

When the Argentina government under the fascist junta invaded the British protectorate of the Falkland Islands in April 1982, she led the U.K. to victory. The Argentinians soon toppled the military junta.

In October 1984 there was an assassination attempt on her life when a hotel in Brighton where she and her husband and other members of her cabinet were staying was bombed by Irish Republican Army (IRA) terrorists.

Thatcher supported Reagan in opposing communism and confronting the “evil empire” of the Soviet Union. She was instrumental in the introduction of cruise missiles in Britain to counter the Soviet military threat. She allied the United Kingdom with the United States against the communist expansion and subversion in the West and the winning of the Cold War with the Soviet Union.

A concise biography of her life can be found at the Margaret Thatcher Foundation web site http://www.margaretthatcher.org/essential/biography.asp.  An excellent critical biography is Claire Berlinsky’s “There is No Alternative: Why Thatcher Matters” and related interview on YouTube video titled, “Thatcher & More with Claire Berlinski.”

An excellent multi-part documentary about Thatcher produced in 2008 by the conservative paper, The Daily Telegraph, can be viewed on YouTube as well as an entertaining movie about her early political career titled, “Margaret Thatcher – The Long Walk to Finchley.”

Her husband of more than 50 years, Denis Thatcher, died in June 2003. She is survived by her twin son, Mark, and daughter, Carol, born in 1953.

Thatcher remains a controversial figure in Britain. She was loved and revered by many as well as loathed and reviled by some. She will be remembered by all who value economic freedom and individual liberty.

“Freedom to choose is something we take for granted—until it is in danger of being taken away. Socialist governments set out perpetually to restrict the area of choice, Conservative governments to increase it. We believe that you become a responsible citizen by making decisions yourself, not by having them made for you.”

~Margaret Thatcher, Speech to Conservative Party Conference, October 10, 1975

David Cameron’s Commons tribute to Margaret Thatcher in full

Margaret Thatcher – Falklands War – YouTube

MARGARET THATCHER – Pt 1 The Making of Margaret (Telegraph Documentary)

MARGARET THATCHER – Pt 2 The Falklands (Telegraph Documentary)

MARGARET THATCHER – Pt 3 World Stage (Telegraph Documentary)

MARGARET THATCHER – Pt 4 The Age of Dissent (Telegraph Documentary)

MARGARET THATCHER – Pt 5 Taking on the Unions (Telegraph Documentary)

MARGARET THATCHER – Pt 6 Public Image, Private Life. (Telegraph Documentary)

MARGARET THATCHER – Pt 7 The Fall (Telegraph Documentary)

MARGARET THATCHER – Pt 8 The Legacy (Telegraph Documentary)

Margaret Thatcher – The Long Walk To Finchley Full Movie

Thatcher: The Downing Street Years (1/4 BBC)

Thatcher: The Downing Street Years (2/4 BBC)

Thatcher: The Downing Street Years (3/4 BBC)

Thatcher: The Downing Street Years (4/4 BBC)

Related Posts On Pronk Palisades

Margaret Thatcher — Rest In Peace — Videos

Claire Berlinski–Why Margaret Thatcher Matters: “There Is No Alternative”–Videos

Friedrich August von Hayek: Fighting the Planners — The Road To Serfdom — A Profile in Liberty — Videos

Read Full Post | Make a Comment ( None so far )

Get Free HDTV — Mohu Leaf Plus — Satelite Direct TV — Videos

Posted on March 26, 2013. Filed under: Blogroll, Business, Communications, Education, Language, Life, Links, People, Technology, Television, Video, Wisdom | Tags: , , , |

satellite-direct-tv-channels

Getting free over the air HDTV with Mohu Leaf Plus Indoor Antenna

Getting free over the air full 1080i and 720p HDTV with Mohu Leaf Plus Indoor Antenna

Know How… 17: Get Free HDTV

Satellite Direct Reviews – The Shocking Truth About Satellite Direct.

Satellite Direct TV, Ultimate IPTV

Satellite Direct TV PC Preview Complete Walk Through

SatelliteDirect Review — Is it for real or just another scam?

Satellite Direct

SatelliteDirect™’s software technology taps into more than 3,500 TV channels worldwide right over the Internet. Now you can enjoy more channels than your cable and satellite TV combined for a one-time fee less than one month of your monthly cable bill.

You don’t need a satellite dish, receiver or any other equipment to use our software. All you need is a computer and an internet connection. Simply download our software and you are ready to enjoy over 3,500 channels worldwide.

You can watch TV right from your laptop or desktop computer anytime or anywhere in the world. Or connect your computer directly to your TV set – once you are a member we will show you how!

Satelite Direct

satellite-direct-tv

Read Full Post | Make a Comment ( None so far )

Give President Obama What He Wants A Massive Tax Increase–Jump Barack Jump!–Republican Senator Paul’s $3 Trillion Budget for Fiscal Year 2014 Would Really Cut Over $500 Billion in Spending–A Balanced Approach Leading To A Balanced Budget!–Videos

Posted on December 28, 2012. Filed under: American History, Banking, Blogroll, Business, Communications, Demographics, Diasters, Economics, Education, Employment, Federal Government, Federal Government Budget, Food, Foreign Policy, government, government spending, Health Care, history, Inflation, Investments, Law, liberty, Life, Links, Macroeconomics, media, Monetary Policy, Money, People, Philosophy, Politics, Programming, Psychology, Public Sector, Radio, Rants, Raves, Regulations, Strategy, Talk Radio, Tax Policy, Taxes, Television, Unemployment, Unions, Video | Tags: , , , , , , , , |

senator_rand_paul

Passerby pushes suicide jumper off bridge in frustration

China bridge jumper ‘gets a push’ 1

The Deal with Jack Hunter: Ignoring Rand Paul’s Budget

Sen. Rand Paul: People in Congress Don’t Deserve to Manage Any More Money

Rand Paul: We Should Let Dems Raise Taxes And Then Let Them Own It -

Rand Paul: We Should Let Democrats Raise Taxes

Rand Paul On The Fiscal Cliff: Spending Cuts Are Fiction, The Tax Increases Should Be Too

Sen. Rand Paul on $500B in Spending Cuts: The American People Are Ready

Senator Rand Paul on Neil Cavuto about $500 Billion spending cut S.162

TEA PARTY THE ANSWER TO GOVT. SPENDING?: Sen. Rand Paul: $500 billion budget cuts

Rand Paul: I’m Mad At My Dad! I Had 500 Billion In Cuts, Now He Comes Out With A Trillion!

Since President Obama wants to grow government and make all Americans dependent upon the Government and Democratic Party, let the Democratic Party and Obama jump from the fiscal cliff.

They will own the resulting recession and will be committing political suicide.

Do not negotiate with a person or party that wants to jump off the cliff by raising taxes on all Americans.

The Republican Party should stop negotiating with the person responsible with the massive spending problem resulting in huge deficits and over $5 trillion of new national debt.

Neither the Democratic Party led by President Obama, Senate Majority Leader Harry Reid and House Minority Leader Nancy Pelosi nor the Republican Party led by House Speaker Boehner, House Majority Leader Eric Cantor and Senate Minority Leader Mitch McConnell, are capable of balancing the budget of the U.S. government.

The table below summarizes the failed 10 year record of both political parties in controlling government spending that have produced massive fiscal-year deficits and an ever increasing national debt.

Summary of Tax Receipts and Spending Outlays of theUnited States Government for Fiscal Years 2002-2012[in million of dollars]
Fiscal Year Tax Receipts Spending Outlays Deficits (+)  or Surplus (-)
2002 1,853,225 2,011,016 157,791
2003 1,782,108 2,159,246 377,139
2004 1,879,783 2,292,628 412,845
2005 2,153,350 2,472,095 318,746
2006 2,406,675 2,654,873 248,197
2007 2,567,672 2,729,199 161,527
2008 2,523,642 2,978,440 454,798
2009 2,104,358 3,520,082 1,415,724
2010 2,161,728 3,455,931 1,294,204
2011 2,302,495 3,601,109 1,298,614
2012 2,449,093 3,538,286 1,089,193
Source: Department of the Treasury, Final Monthly Treasury Statements of Receipts and Outlays of the United States Government for Fiscal Years 2002-2012, table 1.

Simply tell the American people that the Republican Party wants no tax increase for any American and is willing to have a Fiscal Year 2014 budget of $3 trillion that represents a real spending cut of over $500 billion.

Obama rejected the proposal and jumped. Rest in peace.

Pass Senator Rand Paul’s $500 billion spending cuts for Fiscal Year 2014!

FINANCIAL MANAGEMENT SERVICE STAR - TREASURY FINANCIAL DATABASE TABLE 1. SUMMARY OF RECEIPTS, OUTLAYS AND THE DEFICIT/SURPLUS BY MONTH OF THE U.S. GOVERNMENT (IN MILLIONS) ACCOUNTING DATE: 11/12 PERIOD RECEIPTS OUTLAYS DEFICIT/SURPLUS (-) + ____________________________________________________________ _____________________ _____________________ _____________________ PRIOR YEAR OCTOBER 163,072 261,539 98,466 NOVEMBER 152,402 289,704 137,302 DECEMBER 239,963 325,930 85,967 JANUARY 234,319 261,726 27,407 FEBRUARY 103,413 335,090 231,677 MARCH 171,215 369,372 198,157 APRIL 318,807 259,690 -59,117 MAY 180,713 305,348 124,636 JUNE 260,177 319,919 59,741 JULY 184,585 254,190 69,604 AUGUST 178,860 369,393 190,533 SEPTEMBER 261,566 186,386 -75,180 YEAR-TO-DATE 2,449,093 3,538,286 1,089,193 CURRENT YEAR OCTOBER 184,316 304,311 119,995 NOVEMBER 161,730 333,841 172,112 YEAR-TO-DATE 346,045 638,152 292,107 - - - - - - - - 0REPORT ID: STM0P081 USER ID : DATE: 2012-12-10 TIME: 18.47.19 PAGE http://www.fms.treas.gov/mts/mts1112.txt
Read Full Post | Make a Comment ( None so far )

SONY’s Ultra High Definition (UHD) 4K Resolution 84 Inch TV–Videos

Posted on December 2, 2012. Filed under: Communications, Computers, Economics, Language, Law, liberty, Life, Links, media, People, Philosophy, Technology, Television | Tags: , , , , |

SONY-KD-84-X9005-84inches-passive-3D-TV

4krez

HD 2K 4K Video Time Lapse Stock Footage Showreel 2011 – Night Rush Around the World 2 

Ultra High Definition Television: Threshold of a new age

A look at 4K TV, with Tech Expert Marc Saltzman at CES 2012 

Sony Bravia KD-84X9005 84-inch 4K HDTV (IFA 2012) 

VIDEO: Sony’s Ultra High-Definition 84-Inch Television 

SONY 84 INCH 4K UHD TV WTF?!?!

Sony’s Ultra High Definition TV will come with world’s first 4K delivery system

Démo TV Sony 4K Ultra HD 84″ (214cm)

Ultra high-definition 84-inch TV coming to the U.S. with a $25,000 (£15,614)  price tag

  • Sony is releasing its first  ultra-high-definition television, a massive 84-inch set that retails for $25,000  (£15,614) and features nearly four times the resolution of typical  high-definition TVs
  • Ultra HD is widely regarded as the next  evolution in TV technology

“…The new, restored and rebooted films from  Sony Pictures are among the content coming pre-loaded on a video player bundled  with Sony’s first ultra-high-definition television, a massive 84-inch set that  retails for $25,000 (£15,614) and features nearly four times the resolution of  typical high-definition TVs.

‘People ask the question, “Do I need to get a  bigger house to fit an 84-inch TV?”’ said Chris Cookson, president of Sony  Pictures Technologies.

‘The answer is that 25 inches was right for  standard definition; 50 inches was right for high-definition; and 84 inches is  right now that we’re going ultra-high-def.’

Ultra HD is widely regarded as the next  evolution in TV technology, but there’s currently a lack of content that takes  advantage of the vast resolution, though Ultra HD sets are equipped to upscale  lower resolution video.

Sony Corp. is hoping to overcome that pitfall  that with this new player.

The Japanese electronics giant debuted the  hard-disc server – hidden in a cabinet underneath the behemoth television – at a  posh invite-only party Thursday at a private mansion in Santa Monica that  featured a performance by John Legend.

The video player will include 4K content such  as short films, concerts and 10 feature-length movies, including ‘The Other  Guys,’ ‘Salt’ and ‘The Bridge on the River Kwai.’

Sony’s TV will also come with an Xperia  Tablet S, which can be used as a touchscreen remote control.

Read more: http://www.dailymail.co.uk/news/article-2241314/Ultra-high-definition-84-inch-TV-coming-U-S-25-000–15-614-price-tag.html#ixzz2Dw8mvtnR Follow us: @MailOnline on Twitter | DailyMail on Facebook

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...

Follow

Get every new post delivered to your Inbox.

Join 585 other followers