Story 1: Political Establishment Elite (PEE) vs. Tea Party Movement — PEE Republican Candidate Eric Cantor, House Majority Leader Loses To Tea Party Candidate David Brat in Republican Primary — The Remnant Rallies — Videos
Political Establishment Elite (PEE) Candidate Eric Cantor and Republican House Majority Leader Loses Primary
Tea Party Movement Candidate David Brat Wins Republican Primary
That the free enterprise system is the most productive supplier of human needs and economic justice,
That all individuals are entitled to equal rights, justice, and opportunities and should assume their responsibilities as citizens in a free society,
That fiscal responsibility and budgetary restraints must be exercised at all levels of government,
That the Federal Government must preserve individual liberty by observing Constitutional limitations,
That peace is best preserved through a strong national defense,
That faith in God, as recognized by our Founding Fathers, is essential to the moral fiber of the Nation.
• Mark Levin • Tea Party Victory • Cantor Loses • Hannity • 6/10/14
Sarah Palin on Dave Brat Victory: “The Status Quo, Has Got To Go!”
Brat topples Cantor with grassroots enthusiasm
Political Earthquake – Eric Cantor Upset In Virginia GOP Primary – David Brat Wins – Fox & Friends
David Brat Explains How He Beat Congressman Eric Dual-Citizenship Cantor
Mark Levin: Eric Cantor is only pretending to oppose amnesty
GOP leader Eric Cantor loses in shock Tea Party upset
NBC12 Decision Virginia- Cantor ad attacks Brat
Who Is David Brat? Meet the Economics Professor Who Defeated Eric Cantor
About Dave Brat
5 Things To Know About The Tea Party’s Golden Boy David Brat
Laura Ingraham & Dave Brat at Dominon Club
Beck Interviews Dave Brat Eric Cantor’s GOP Opponent
Eric Cantor: Amnesty for Children of Illegal Immigrants
WATCH: Eric Cantor Addresses Primary Defeat, Resigns as House Majority Leader
Virginia Primary: Eric Cantor Loses To Tea Party-Backed Dave Brat
Dave Brat reacts to his shocking win over Eric Cantor
Eric Cantor Loses Primary in Shocking Upset
BREAKING! HOUSE MAJORITY LEADER ERIC CANTOR LOSES PRIMARY ELECTION TO TEA PARTY CANDIDATE!
Full Show 6/11/14: The Dark Money Machine That Beat Eric Cantor
Mark Levin: Eric Cantor is “a little weasel!”
How $1,000,000 lost for $200,000 in Election: The Grassroot Campaign
Rep. Eric Cantor on Immigration Reform and the Tea Party
Mencken and Nock on Elitist Individualism
Isaiah’s Job | by Albert Jay Nock
HOUSE MAJORITY LEADER CANTOR DEFEATED IN PRIMARY
BY ALAN SUDERMAN AND DAVID ESPO
In an upset for the ages, Majority Leader Eric Cantor of Virginia, the second-most powerful man in the House, was dethroned Tuesday by a little-known, tea party-backed Republican primary challenger carried to victory on a wave of public anger over calls for looser immigration laws.
“This is a miracle from God that just happened,” exulted David Brat, an economics professor, as his victory became clear in the congressional district around Virginia’s capital city.
Speaking to downcast supporters, Cantor conceded, “Obviously we came up short” in a bid for renomination to an eighth term.
The victory was by far the biggest of the 2014 campaign season for tea party forces, although last week they forced veteran Mississippi Sen. Thad Cochran into a June 24 runoff, and hope state Sen. Chris McDaniel can prevail then.
Cantor’s defeat was the first primary setback for a senior leader in Congress in recent years. Former House Speaker Thomas Foley of Washington and Senate Democratic leader Tom Daschle of South Dakota both lost their seats at the polls in the past two decades, but they fell to Republicans, not to challengers from within their own parties.
The outcome may well mark the end of Cantor’s political career, and aides did not respond Tuesday night when asked if the majority leader, 51, would run a write-in campaign in the fall.
But its impact on the fate of immigration legislation in the current Congress seemed clearer still. Conservatives will now be emboldened in their opposition to legislation to create a path to citizenship for immigrants living in the country illegally, and party leaders who are more sympathetic to such legislation will likely be less willing to try.
The majority leader had been tugged by two warring forces in his party and in recent weeks sought to emphasize his opposition to far-reaching immigration legislation as Brat’s challenge gained force. Last month, a feisty crowd of Brat supporters booed Cantor in front of his family at a local party convention.
Still, neither he nor other House leaders betrayed any serious concern that his tenure was in danger, and his allies leaked a private poll in recent days that claimed he had a comfortable lead over Brat.
In the end, despite help from establishment groups, Cantor’s repudiation was complete in an area that first sent him to Congress in 2000.
With votes counted in 99 percent of the precincts, 64,418 votes were cast, roughly a 37 percent increase over two years ago.
Despite that, Cantor polled fewer votes than he did in 2012 – 28,631 this time, compared with 37,369 then.
House Speaker John Boehner, R-Ohio, issued a statement hailing Cantor as “a good friend and a great leader, and someone I’ve come to rely upon on a daily basis as we make the tough choices that come with governing.”
It was unclear if Cantor intended to remain in his leadership post for the duration of the year or who might replace him in the new Congress if Republicans hold their majority.
Democrats seized on the upset as evidence that their fight for House control this fall is far from over.
“Eric Cantor has long been the face of House Republicans’ extreme policies, debilitating dysfunction and manufactured crises. Tonight is a major victory for the tea party as they yet again pull the Republican Party further to the radical right,” said the Democratic leader, Nancy Pelosi of California. “As far as the midterm elections are concerned, it’s a whole new ballgame.”
Cantor was appointed to his first leadership position in 2002, when he was named chief deputy whip of the party and became the highest-ranking Jewish Republican in Washington. It was a recognition of his fundraising skills as well as his conservative voting record at a time Republican leaders were eager to tap into Jewish donors for their campaigns. Since Boehner became speaker in 2009, Cantor has been seen as both a likely eventual successor and at times a potential rival.
Jay S. Poole, a Cantor volunteer, said Brat tapped into widespread frustration among voters about the gridlock in Washington and issues such as immigration. “I can’t tell you how amazing this is to me,” Poole said.
Much of the campaign centered on immigration, where critics on both sides of the debate have recently taken aim at Cantor. Brat accused him of being a top cheerleader for “amnesty” for immigrants who are living in the U.S. illegally. Cantor responded forcefully by boasting in mailers of blocking Senate plans “to give illegal aliens amnesty.”
It was a change in tone for Cantor, who has repeatedly voiced support for giving citizenship to certain immigrants brought illegally to the country as children. Cantor and House GOP leaders have advocated a step-by-step approach, rather than the comprehensive bill backed by the Senate – but were persistently vague on the details.
Brat teaches at Randolph-Macon College, a small liberal arts school north of Richmond. He raised just over $200,000 for his campaign, while Cantor spent more than $1 million in April and May alone to try to beat back his challenge.
Washington-based groups also spent heavily in the race. The American Chemistry Council, whose members include many blue chip companies, spent more than $300,000 on TV ads promoting Cantor in the group’s only independent expenditure so far this election year. Political arms of the American College of Radiology, the National Rifle Association and the National Association of Realtors also spent money on ads to promote Cantor.
Brat offset the cash disadvantage with endorsements from conservative activists like radio host Laura Ingraham and with help from local tea party activists angry at Cantor.
In the fall, Brat will face Democrat Jack Trammel, also a professor at Randolph-Macon, in the solidly Republican district.
Associated Press writers David Pace and Erica Werner in Washington and Larry O’Dell, Steve Szkotak and Michael Felberbaum in Richmond contributed to this report. Espo reported from Washington.
His district includes most of the northern and western sections of Richmond, along with most of Richmond’s western suburbs and portions of the Shenandoah Valley. Cantor is the highest-ranking Jewish member of Congress in its history, and currently the only non-Christian Republican in either House.
On June 10, 2014, in his bid for re-election, Cantor lost the Republican primary to economics professor Dave Brat. Following his primary defeat, Cantor announced his resignation as House Majority Leader. Cantor will remain a member of Congress until the start of the 114th United States Congress commencing on January 3, 2015.
Cantor worked for over a decade with his father’s business doing legal work and real estate development.
Virginia House of Delegates
Cantor served in the Virginia House of Delegates from 1992–January 1, 2001. At various times he was a member of committees on Science and Technology, Corporation Insurance and Banking, General Laws, Courts of Justice, (co-chairman) Claims. Cantor announced on March 14, 2000 that he would seek the seat in the United States House of Representatives that was being vacated by Tom Bliley. Cantor had chaired Bliley’s reelection campaigns for the previous six years, and immediately gained the support of Bliley’s political organization, as well as Bliley’s endorsement later in the primary.
Cantor and other House and Senate leaders meeting with President Barack Obama in November 2010.
On November 19, 2008, Cantor was unanimously elected Republican Whip for the 111th Congress, after serving as Deputy Whip for six years under Blunt. Blunt had decided not to seek reelection to the post after Republican losses in the previous two elections. Cantor was the first member of either party from Virginia to hold the position of Party Whip. As Whip, Cantor was the second-ranking House Republican, behind Minority Leader John Boehner. He was charged with coordinating the votes and messages of Republican House members. Cantor became the Majority Leader when the 112th Congress took office on January 3, 2011. He is still the second-ranking Republican in the House behind Speaker Boehner, who is considered the leader of the House Republicans.
As House Majority Leader, Cantor was named in House Resolution 368, which was passed by the House Rules Committee on the night of September 30, 2013, the night before the October 2013 government shutdown began, as the only member of the House with the power to bring forth bills and resolutions for a vote if both chambers of Congress disagree on that bill or resolution. Prior to the resolution’s passing in committee, it was within the power of every member of the House under House Rule XXII, Clause 4 to be granted privilege to call for a vote. This amendment to the House rules was blamed for causing the partial government shutdown and for prolonging it since Cantor refused to allow the Senate’s continuing resolution to be voted on in the House. Journalists and commentators noted during the shutdown that if the Senate’s version of the continuing resolution were to be voted on, it would have passed the House with a majority vote since enough Democrats and Republicans supported it, effectively ending the government shutdown.
As of December 2010, Cantor is the only Jewish Republican in the United States Congress. He supports strong United States-Israel relations. Hecosponsored legislation to cut off all U.S. taxpayer aid to the Palestinian Authority and another bill calling for an end to taxpayer aid to the Palestinians until they stop unauthorized excavations on the Temple Mount in Jerusalem. Responding to a claim by the State Department that the United States provides no direct aid to the Palestinian Authority, Cantor claimed that United States sends about US$75 million in aid annually to the Palestinian Authority, which is administered by the U.S. Agency for International Development. He opposed a Congressionally approved three-year package of US$400 million in aid for the Palestinian Authority in 2000 and has also introduced legislation to end aid to Palestinians.
In May 2008, Cantor said that the Israeli-Palestinian conflict is not a “constant sore” but rather “a constant reminder of the greatness of America”, and followingBarack Obama‘s election as President in November 2008, Cantor stated that a “stronger U.S.-Israel relationship” remains a top priority for him and that he would be “very outspoken” if Obama “did anything to undermine those ties.” Shortly after the 2010 midterm elections, Cantor met privately with Israeli Prime MinisterBenjamin Netanyahu, just before Netanyahu was to meet with US Secretary of StateHillary Clinton. According to Cantor’s office, he “stressed that the new Republican majority will serve as a check on the Administration” and “made clear that the Republican majority understands the special relationship between Israel and the United States.” Cantor was criticized for engaging in foreign policy; one basis for the criticism was that in 2007, after Nancy Pelosi met with the President of Syria, Cantor himself had raised the possibility “that her recent diplomatic overtures ran afoul of the Logan Act, which makes it a felony for any American ‘without authority of the United States’ to communicate with a foreign government to influence that government’s behavior on any disputes with the United States.”
In October 2008, Cantor advocated and voted for the TARP program which aided distressed banks.
On September 29, 2008 Cantor blamed Pelosi for what he felt was the failure of the $700 billion economic bailout bill. He noted that 94 Democrats voted against the measure, as well as 133 Republicans. Though supporting the Federal bailout of the nation’s largest private banks, he referred to Pelosi’s proposal to appoint aCar czar to run the U.S. Automobile Industry Bailout as a “bureaucratic” imposition on private business.
The following February, Cantor led Republicans in the House of Representatives in voting against the American Recovery and Reinvestment Act of 2009 and was a prominent spokesman in voicing the many issues he and his fellow Republicans had with the legislation. Cantor voted in favor of a 90% marginal tax rate increase on taxpayer financed bonuses, despite receiving campaign contributions from TARP recipient Citigroup.
In his book Young Guns, Cantor summarized Keynesian economics with the following opinion, “The idea is that the government can be counted on to spend more wisely than the people.”
As Majority Leader, Cantor steered the STOCK Act through the House, which requires Congressmen to disclose their stock investments more regularly and in a more transparent manner. The legislation passed the House in a 417-2 bipartisan vote on February 9, 2012. It was ultimately signed by President Obama on April 4, 2012. In July 2012, CNN reported that changes made by the House version of the legislation excluded reporting requirements by spouses and dependent children. Initially, Cantor’s office insisted it did nothing to change the intent of the STOCK Act; however, when presented with new information from CNN, the Majority Leader’s office recognized that changes had unintentionally been made and offered technical corrections to fulfill the original intent of the legislation. These corrections were passed by Congress on August 3, 2012.
As Majority Leader, Cantor shepherded the JOBS Act through the House, which combined bipartisan ideas for economic growth – like crowdfunding for startups – into one piece of legislation. Ultimately, President Obama, Eric Cantor, Steve Case and other leaders joined together at the signing ceremony.
Cantor has proposed initiatives which purport to help small businesses grow, including a 20 percent tax cut for businesses that employ fewer than 500 people.
Other foreign affairs
In an article he wrote for the National Review in 2007, he condemned Nancy Pelosi‘s diplomatic visit to Syria, and her subsequent meeting with President Bashar al-Assad, whom he referred to as a “dictator and terror-sponsor”; saying that if “Speaker Pelosi’s diplomatic foray into Syria weren’t so harmful to U.S. interests in the Middle East, it would have been laughable.”
Cantor was first elected to the Virginia House of Delegates 73rd district unopposed.
Cantor was opposed by Independent Reed Halstead in his re-election campaign for the Virginia House of Delegates. Cantor won 79.26% of the vote while Halstead won 20.66%.
Cantor was unopposed for re-election to the Virginia House of Delegates.
Cantor was unopposed for re-election to the Virginia House of Delegates.
Cantor was unopposed for re-election to the Virginia House of Delegates.
Cantor was first elected to the U.S. House of Representatives in 2000, succeeding retiring 20-year incumbent Republican Tom Bliley. He defeated the Democratic nominee, Warren A. Stewart, by nearly 100,000 votes. Cantor had won the closely contested Republican primary over state Senator Stephen Martin by only 263 votes. During his first term, he was one of only two Jewish Republicans serving concurrently in the House of Representatives, the other being Benjamin A. Gilman of New York. Gilman retired in 2002 and Cantor has been the only Jewish Republican since.
Cantor won against Democratic nominee Anita Hartke.
In August 2008 news reports surfaced that Cantor was being considered as John McCain‘s Vice Presidentialrunning mate, with McCain’s representatives seeking documents from Cantor as part of its vetting process. Those rumors were later scoffed at by John McCain as just a rumor from the Cantor camp. The idea for Cantor to be McCain’s running mate was supported by conservative leaders like Richard Land and Erick Erickson.
Cantor faced a primary challenger, Floyd C. Bayne, in the June 12, 2012 Republican Primary. Cantor won that primary and then defeated Democratic challenger Wayne Powell. Although he won with 58% of the vote, Cantor received his lowest vote percentage since taking the hill in 2000.
In the June 10, 2014 Republican primary, Cantor lost to Tea Party challenger Dave Brat in an upset, becoming the first sitting House majority leader to lose a primary since the position was created in 1899.
Threats and campaign office incident
After the passage of the health care reform bill in March 2010, Cantor reported that somebody had shot a bullet through a window of his campaign office inRichmond, Virginia. A spokesman for the Richmond Police later stated that the bullet was not intentionally fired at Cantor’s office, saying that it was instead random gunfire, as there were no signs outside the office identifying the office as being Cantor’s. Cantor responded to this by saying that Democratic leaders in the House should stop “dangerously fanning the flames” by blaming Republicans for threats against House Democrats who voted for the health care legislation.
Cantor also reported that he had received threatening e-mails related to the passage of the bill. In March 2010, Norman Leboon was arrested for threats made against Eric Cantor and his family.
In 2011, Cantor was receiving two threatening phone calls, where Glendon Swift, an antisemite, was “screaming, profanity-laden messages (that) allegedly stated that he was going to destroy Cantor, rape his daughter and kill his wife”. Swift was sentenced in April 2012 to 13 months federal prison.
*Write-in candidate notes: In 2000, write-ins received 304 votes. In 2002, write-ins received 153 votes. In 2004, write-ins received 568 votes. In 2006, write-ins received 272 votes. In 2008, write-ins received 683 votes. In 2010, write-ins received 413 votes. In 2012, write-ins received 914 votes.
Jump up^Cox, Kirk (February 11, 2008). “HJ382: Commending Diana F. Cantor”. Retrieved 2008-12-14. “Diana F. Cantor will step down from her position in 2008, having served the Commonwealth since April 24, 1996, as the outstanding founding executive director of the Virginia Higher Education Tuition Trust Fund, subsequently renamed the Virginia College Savings Plan…” 02/15/2008 Agreed to by Senate by voice vote.
2014 race for 7th congressional district Republican primary
Brat ran against House Majority Leader Eric Cantor for the Republican nomination for Virginia’s 7th congressional district and defeated Cantor by a 12-point margin. Brat was outspent by Cantor 40 to 1. Cantor spent over $5 million and Brat raised $200,000, but did not spend all of it. Brat’s win was a historic and stunning victory, as it was the first time a sitting House Majority Leader had lost a primary race since the creation of the position in the 19th century.
Brat ran well to Cantor’s right. His campaign laid particular stress on immigration reform, stating Rep. Cantor favored “amnesty” for illegal immigrants.Radio talk show host Laura Ingraham endorsed Brat’s candidacy and hosted a rally with him in a Richmond suburb. Radio talk show host Mark Levin also supported and endorsed Brat.Ann Coulter expressed support for his candidacy.
Brat is the BB&T Ethics Program Director, serving 2010–2020. The program arose from a $500,000 grant, given by the charitable arm of the Fortune 500 financial services and banking firm BB&T, awarded to Randolph-Macon College for the study of the moral foundations of capitalism and the establishment of a related ethics program. Other board and leadership positions include:
Governor’s Advisory Board of Economists, GABE/JABE, 2006 – present
One evening last autumn, I sat long hours with a European acquaintance while he expounded a political-economic doctrine which seemed sound as a nut and in which I could find no defect. At the end, he said with great earnestness: “I have a mission to the masses. I feel that I am called to get the ear of the people. I shall devote the rest of my life to spreading my doctrine far and wide among the population. What do you think?”
An embarrassing question in any case, and doubly so under the circumstances, because my acquaintance is a very learned man, one of the three or four really first-class minds that Europe produced in his generation; and naturally I, as one of the unlearned, was inclined to regard his lightest word with reverence amounting to awe. Still, I reflected, even the greatest mind can not possibly know everything, and I was pretty sure he had not had my opportunities for observing the masses of mankind, and that therefore I probably knew them better than he did. So I mustered courage to say that he had no such mission and would do well to get the idea out of his head at once; he would find that the masses would not care two pins for his doctrine, and still less for himself, since in such circumstances the popular favourite is generally some Barabbas. I even went so far as to say (he is a Jew) that his idea seemed to show that he was not very well up on his own native literature. He smiled at my jest, and asked what I meant by it; and I referred him to the story of the prophet Isaiah.
It occurred to me then that this story is much worth recalling just now when so many wise men and soothsayers appear to be burdened with a message to the masses. Dr. Townsend has a message, Father Coughlin has one, Mr. Upton Sinclair, Mr. Lippmann, Mr. Chase and the planned economy brethren, Mr. Tugwell and the New Dealers, Mr. Smith and Liberty Leaguers – the list is endless. I can not remember a time when so many energumens were so variously proclaiming the Word to the multitude and telling them what they must do to be saved. This being so, it occurred to me, as I say, that the story of Isaiah might have something in it to steady and compose the human spirit until this tyranny of windiness is overpast. I shall paraphrase the story in our common speech, since it has to be pieced out from various sources; and inasmuch as respectable scholars have thought fit to put out a whole new version of the Bible in the American vernacular, I shall take shelter behind them, if need be, against the charge of dealing irreverently with the Sacred Scriptures.
The prophet’s career began at the end of King Uzziah’s reign, say about 740 B.C. This reign was uncommonly long, almost half a century, and apparently prosperous. It was one of those prosperous reigns, however – like the reign of Marcus Aurelius at Rome, or the administration of Eubulus at Athens, or of Mr. Coolidge at Washington – where at the end the prosperity suddenly peters out and things go by the board with a resounding crash.
In the year of Uzziah’s death, the Lord commissioned the prophet to go out and warn the people of the wrath to come. “Tell them what a worthless lot they are.” He said, “Tell them what is wrong, and why and what is going to happen unless they have a change of heart and straighten up. Don’t mince matters. Make it clear that they are positively down to their last chance. Give it to them good and strong and keep on giving it to them. I suppose perhaps I ought to tell you,” He added, “that it won’t do any good. The official class and their intelligentsia will turn up their noses at you and the masses will not even listen. They will all keep on in their own ways until they carry everything down to destruction, and you will probably be lucky if you get out with your life.”
IIIsaiah had been very willing to take on the job – in fact, he had asked for it – but the prospect put a new face on the situation. It raised the obvious question: Why, if all that were so – if the enterprise were to be a failure from the start – was there any sense in starting it? “Ah,” the Lord said, “you do not get the point. There is a Remnant there that you know nothing about. They are obscure, unorganized, inarticulate, each one rubbing along as best he can. They need to be encouraged and braced up because when everything has gone completely to the dogs, they are the ones who will come back and build up a new society; and meanwhile, your preaching will reassure them and keep them hanging on. Your job is to take care of the Remnant, so be off now and set about it.”
Apparently, then, if the Lord’s word is good for anything – I do not offer any opinion about that, – the only element in Judean society that was particularly worth bothering about was the Remnant. Isaiah seems finally to have got it through his head that this was the case; that nothing was to be expected from the masses, but that if anything substantial were ever to be done in Judea, the Remnant would have to do it. This is a very striking and suggestive idea; but before going on to explore it, we need to be quite clear about our terms. What do we mean by the masses, and what by the Remnant?
As the word masses is commonly used, it suggests agglomerations of poor and underprivileged people, labouring people, proletarians, and it means nothing like that; it means simply the majority. The mass-man is one who has neither the force of intellect to apprehend the principles issuing in what we know as the humane life, nor the force of character to adhere to those principles steadily and strictly as laws of conduct; and because such people make up the great and overwhelming majority of mankind, they are called collectively the masses. The line of differentiation between the masses and the Remnant is set invariably by quality, not by circumstance. The Remnant are those who by force of intellect are able to apprehend these principles, and by force of character are able, at least measurably, to cleave to them. The masses are those who are unable to do either.
The picture which Isaiah presents of the Judean masses is most unfavorable. In his view, the mass-man – be he high or be he lowly, rich or poor, prince or pauper – gets off very badly. He appears as not only weak-minded and weak-willed, but as by consequence knavish, arrogant, grasping, dissipated, unprincipled, unscrupulous. The mass-woman also gets off badly, as sharing all the mass-man’s untoward qualities, and contributing a few of her own in the way of vanity and laziness, extravagance and foible. The list of luxury-products that she patronized is interesting; it calls to mind the women’s page of a Sunday newspaper in 1928, or the display set forth in one of our professedly “smart” periodicals. In another place, Isaiah even recalls the affectations that we used to know by the name “flapper gait” and the “debutante slouch.” It may be fair to discount Isaiah’s vivacity a little for prophetic fervour; after all, since his real job was not to convert the masses but to brace and reassure the Remnant, he probably felt that he might lay it on indiscriminately and as thick as he liked – in fact, that he was expected to do so. But even so, the Judean mass-man must have been a most objectionable individual, and the mass-woman utterly odious.
But Isaiah was a preacher and Plato a philosopher; and we tend to regard preachers and philosophers rather as passive observers of the drama of life than as active participants. Hence in a matter of this kind their judgment might be suspected of being a little uncompromising, a little acrid, or as the French say, saugrenu. We may therefore bring forward another witness who was preeminently a man of affairs, and whose judgment can not lie under this suspicion. Marcus Aurelius was ruler of the greatest of empires, and in that capacity he not only had the Roman mass-man under observation, but he had him on his hands twenty-four hours a day for eighteen years. What he did not know about him was not worth knowing and what he thought of him is abundantly attested on almost every page of the little book of jottings which he scribbled offhand from day to day, and which he meant for no eye but his own ever to see.If the modern spirit, whatever that may be, is disinclined towards taking the Lord’s word at its face value (as I hear is the case), we may observe that Isaiah’s testimony to the character of the masses has strong collateral support from respectable Gentile authority. Plato lived into the administration of Eubulus, when Athens was at the peak of its jazz-and-paper era, and he speaks of the Athenian masses with all Isaiah’s fervency, even comparing them to a herd of ravenous wild beasts. Curiously, too, he applies Isaiah’s own word remnant to the worthier portion of Athenian society; “there is but a very small remnant,” he says, of those who possess a saving force of intellect and force of character – too small, preciously as to Judea, to be of any avail against the ignorant and vicious preponderance of the masses.
This view of the masses is the one that we find prevailing at large among the ancient authorities whose writings have come down to us. In the eighteenth century, however, certain European philosophers spread the notion that the mass-man, in his natural state, is not at all the kind of person that earlier authorities made him out to be, but on the contrary, that he is a worthy object of interest. His untowardness is the effect of environment, an effect for which “society” is somehow responsible. If only his environment permitted him to live according to his lights, he would undoubtedly show himself to be quite a fellow; and the best way to secure a more favourable environment for him would be to let him arrange it for himself. The French Revolution acted powerfully as a springboard for this idea, projecting its influence in all directions throughout Europe.
His success is unimpressive. On the evidence so far presented one must say, I think, that the mass-man’s conception of what life has to offer, and his choice of what to ask from life, seem now to be pretty well what they were in the times of Isaiah and Plato; and so too seem the catastrophic social conflicts and convulsions in which his views of life and his demands on life involve him. I do not wish to dwell on this, however, but merely to observe that the monstrously inflated importance of the masses has apparently put all thought of a possible mission to the Remnant out of the modern prophet’s head. This is obviously quite as it should be, provided that the earlier preachers and philosophers were actually wrong, and that all final hope of the human race is actually centred in the masses. If, on the other hand, it should turn out that the Lord and Isaiah and Plato and Marcus Aurelius were right in their estimate of the relative social value of the masses and the Remnant, the case is somewhat different. Moreover, since with everything in their favour the masses have so far given such an extremely discouraging account of themselves, it would seem that the question at issue between these two bodies of opinion might most profitably be reopened.On this side of the ocean a whole new continent stood ready for a large-scale experiment with this theory. It afforded every conceivable resource whereby the masses might develop a civilization made in their own likeness and after their own image. There was no force of tradition to disturb them in their preponderance, or to check them in a thoroughgoing disparagement of the Remnant. Immense natural wealth, unquestioned predominance, virtual isolation, freedom from external interference and the fear of it, and, finally, a century and a half of time – such are the advantages which the mass-man has had in bringing forth a civilization which should set the earlier preachers and philosophers at naught in their belief that nothing substantial can be expected from the masses, but only from the Remnant.
But without following up this suggestion, I wish only, as I said, to remark the fact that as things now stand Isaiah’s job seems rather to go begging. Everyone with a message nowadays is, like my venerable European friend, eager to take it to the masses. His first, last and only thought is of mass-acceptance and mass-approval. His great care is to put his doctrine in such shape as will capture the masses’ attention and interest. This attitude towards the masses is so exclusive, so devout, that one is reminded of the troglodytic monster described by Plato, and the assiduous crowd at the entrance to its cave, trying obsequiously to placate it and win its favour, trying to interpret its inarticulate noises, trying to find out what it wants, and eagerly offering it all sorts of things that they think might strike its fancy.
Isaiah, on the other hand, worked under no such disabilities. He preached to the masses only in the sense that he preached publicly. Anyone who liked might listen; anyone who liked might pass by. He knew that the Remnant would listen; and knowing also that nothing was to be expected of the masses under any circumstances, he made no specific appeal to them, did not accommodate his message to their measure in any way, and did not care two straws whether they heeded it or not. As a modern publisher might put it, he was not worrying about circulation or about advertising. Hence, with all such obsessions quite out of the way, he was in a position to do his level best, without fear or favour, and answerable only to his august Boss.The main trouble with all this is its reaction upon the mission itself. It necessitates an opportunist sophistication of one’s doctrine, which profoundly alters its character and reduces it to a mere placebo. If, say, you are a preacher, you wish to attract as large a congregation as you can, which means an appeal to the masses; and this, in turn, means adapting the terms of your message to the order of intellect and character that the masses exhibit. If you are an educator, say with a college on your hands, you wish to get as many students as possible, and you whittle down your requirements accordingly. If a writer, you aim at getting many readers; if a publisher, many purchasers; if a philosopher, many disciples; if a reformer, many converts; if a musician, many auditors; and so on. But as we see on all sides, in the realization of these several desires, the prophetic message is so heavily adulterated with trivialities, in every instance, that its effect on the masses is merely to harden them in their sins. Meanwhile, the Remnant, aware of this adulteration and of the desires that prompt it, turn their backs on the prophet and will have nothing to do with him or his message.
If a prophet were not too particular about making money out of his mission or getting a dubious sort of notoriety out of it, the foregoing considerations would lead one to say that serving the Remnant looks like a good job. An assignment that you can really put your back into, and do your best without thinking about results, is a real job; whereas serving the masses is at best only half a job, considering the inexorable conditions that the masses impose upon their servants. They ask you to give them what they want, they insist upon it, and will take nothing else; and following their whims, their irrational changes of fancy, their hot and cold fits, is a tedious business, to say nothing of the fact that what they want at any time makes very little call on one’s resources of prophesy. The Remnant, on the other hand, want only the best you have, whatever that may be. Give them that, and they are satisfied; you have nothing more to worry about. The prophet of the American masses must aim consciously at the lowest common denominator of intellect, taste and character among 120,000,000 people; and this is a distressing task. The prophet of the Remnant, on the contrary, is in the enviable position of Papa Haydn in the household of Prince Esterhazy. All Haydn had to do was keep forking out the very best music he knew how to produce, knowing it would be understood and appreciated by those for whom he produced it, and caring not a button what anyone else thought of it; and that makes a good job.
Digito monstrari et dicier, Hic est!In a sense, nevertheless, as I have said, it is not a rewarding job. If you can tough the fancy of the masses, and have the sagacity to keep always one jump ahead of their vagaries and vacillations, you can get good returns in money from serving the masses, and good returns also in a mouth-to-ear type of notoriety:
We all know innumerable politicians, journalists, dramatists, novelists and the like, who have done extremely well by themselves in these ways. Taking care of the Remnant, on the contrary, holds little promise of any such rewards. A prophet of the Remnant will not grow purse-proud on the financial returns from his work, nor is it likely that he will get any great renown out of it. Isaiah’s case was exceptional to this second rule, and there are others, but not many.
It may be thought, then, that while taking care of the Remnant is no doubt a good job, it is not an especially interesting job because it is as a rule so poorly paid. I have my doubts about this. There are other compensations to be got out of a job besides money and notoriety, and some of them seem substantial enough to be attractive. Many jobs which do not pay well are yet profoundly interesting, as, for instance, the job of research student in the sciences is said to be; and the job of looking after the Remnant seems to me, as I have surveyed it for many years from my seat in the grandstand, to be as interesting as any that can be found in the world.
What chiefly makes it so, I think, is that in any given society the Remnant are always so largely an unknown quantity. You do not know, and will never know, more than two things about them. You can be sure of those – dead sure, as our phrase is – but you will never be able to make even a respectable guess at anything else. You do not know, and will never know, who the Remnant are, nor what they are doing or will do. Two things you do know, and no more: First, that they exist; second, that they will find you. Except for these two certainties, working for the Remnant means working in impenetrable darkness; and this, I should say, is just the condition calculated most effectively to pique the interest of any prophet who is properly gifted with the imagination, insight and intellectual curiosity necessary to a successful pursuit of his trade.
The fascination and the despair of the historian, as he looks back upon Isaiah’s Jewry, upon Plato’s Athens, or upon Rome of the Antonines, is the hope of discovering and laying bare the “substratum of right-thinking and well-doing” which he knows must have existed somewhere in those societies because no kind of collective life can possibly go on without it. He finds tantalizing intimations of it here and there in many places, as in the Greek Anthology, in the scrapbook of Aulus Gellius, in the poems of Ausonius, and in the brief and touching tribute, Bene merenti, bestowed upon the unknown occupants of Roman tombs. But these are vague and fragmentary; they lead him nowhere in his search for some kind of measure on this substratum, but merely testify to what he already knew a priori – that the substratum did somewhere exist. Where it was, how substantial it was, what its power of self-assertion and resistance was – of all this they tell him nothing.
Similarly, when the historian of two thousand years hence, or two hundred years, looks over the available testimony to the quality of our civilization and tries to get any kind of clear, competent evidence concerning the substratum of right-thinking and well-doing which he knows must have been here, he will have a devil of a time finding it. When he has assembled all he can and has made even a minimum allowance for speciousness, vagueness, and confusion of motive, he will sadly acknowledge that his net result is simply nothing. A Remnant were here, building a substratum like coral insects; so much he knows, but he will find nothing to put him on the track of who and where and how many they were and what their work was like.
Concerning all this, too, the prophet of the present knows precisely as much and as little as the historian of the future; and that, I repeat, is what makes his job seem to me so profoundly interesting. One of the most suggestive episodes recounted in the Bible is that of a prophet’s attempt – the only attempt of the kind on the record, I believe – to count up the Remnant. Elijah had fled from persecution into the desert, where the Lord presently overhauled him and asked what he was doing so far away from his job. He said that he was running away, not because he was a coward, but because all the Remnant had been killed off except himself. He had got away only by the skin of his teeth, and, he being now all the Remnant there was, if he were killed the True Faith would go flat. The Lord replied that he need not worry about that, for even without him the True Faith could probably manage to squeeze along somehow if it had to; “and as for your figures on the Remnant,” He said, “I don’t mind telling you that there are seven thousand of them back there in Israel whom it seems you have not heard of, but you may take My word for it that there they are.”
At that time, probably the population of Israel could not run to much more than a million or so; and a Remnant of seven thousand out of a million is a highly encouraging percentage for any prophet. With seven thousand of the boys on his side, there was no great reason for Elijah to feel lonesome; and incidentally, that would be something for the modern prophet of the Remnant to think of when he has a touch of the blues. But the main point is that if Elijah the Prophet could not make a closer guess on the number of the Remnant than he made when he missed it by seven thousand, anyone else who tackled the problem would only waste his time.
The other certainty which the prophet of the Remnant may always have is that the Remnant will find him. He may rely on that with absolute assurance. They will find him without his doing anything about it; in fact, if he tries to do anything about it, he is pretty sure to put them off. He does not need to advertise for them nor resort to any schemes of publicity to get their attention. If he is a preacher or a public speaker, for example, he may be quite indifferent to going on show at receptions, getting his picture printed in the newspapers, or furnishing autobiographical material for publication on the side of “human interest.” If a writer, he need not make a point of attending any pink teas, autographing books at wholesale, nor entering into any specious freemasonry with reviewers. All this and much more of the same order lies in the regular and necessary routine laid down for the prophet of the masses; it is, and must be, part of the great general technique of getting the mass-man’s ear – or as our vigorous and excellent publicist, Mr. H. L. Mencken, puts it, the technique of boob-bumping. The prophet of the Remnant is not bound to this technique. He may be quite sure that the Remnant will make their own way to him without any adventitious aids; and not only so, but if they find him employing any such aids, as I said, it is ten to one that they will smell a rat in them and will sheer off.
The certainty that the Remnant will find him, however, leaves the prophet as much in the dark as ever, as helpless as ever in the matter of putting any estimate of any kind upon the Remnant; for, as appears in the case of Elijah, he remains ignorant of who they are that have found him or where they are or how many. They did not write in and tell him about it, after the manner of those who admire the vedettes of Hollywood, nor yet do they seek him out and attach themselves to his person. They are not that kind. They take his message much as drivers take the directions on a roadside signboard – that is, with very little thought about the signboard, beyond being gratefully glad that it happened to be there, but with every thought about the directions.
This impersonal attitude of the Remnant wonderfully enhances the interest of the imaginative prophet’s job. Once in a while, just about often enough to keep his intellectual curiosity in good working order, he will quite accidentally come upon some distinct reflection of his own message in an unsuspected quarter. This enables him to entertain himself in his leisure moments with agreeable speculations about the course his message may have taken in reaching that particular quarter, and about what came of it after it got there. Most interesting of all are those instances, if one could only run them down (but one may always speculate about them), where the recipient himself no longer knows where nor when nor from whom he got the message – or even where, as sometimes happens, he has forgotten that he got it anywhere and imagines that it is all a self-sprung idea of his own.
Such instances as these are probably not infrequent, for, without presuming to enroll ourselves among the Remnant, we can all no doubt remember having found ourselves suddenly under the influence of an idea, the source of which we cannot possibly identify. “It came to us afterward,” as we say; that is, we are aware of it only after it has shot up full-grown in our minds, leaving us quite ignorant of how and when and by what agency it was planted there and left to germinate. It seems highly probable that the prophet’s message often takes some such course with the Remnant.
If, for example, you are a writer or a speaker or a preacher, you put forth an idea which lodges in the Unbewußtsein of a casual member of the Remnant and sticks fast there. For some time it is inert; then it begins to fret and fester until presently it invades the man’s conscious mind and, as one might say, corrupts it. Meanwhile, he has quite forgotten how he came by the idea in the first instance, and even perhaps thinks he has invented it; and in those circumstances, the most interesting thing of all is that you never know what the pressure of that idea will make him do.
For these reasons it appears to me that Isaiah’s job is not only good but also extremely interesting; and especially so at the present time when nobody is doing it. If I were young and had the notion of embarking in the prophetical line, I would certainly take up this branch of the business; and therefore I have no hesitation about recommending it as a career for anyone in that position. It offers an open field, with no competition; our civilization so completely neglects and disallows the Remnant that anyone going in with an eye single to their service might pretty well count on getting all the trade there is.
Even assuming that there is some social salvage to be screened out of the masses, even assuming that the testimony of history to their social value is a little too sweeping, that it depresses hopelessness a little too far, one must yet perceive, I think, that the masses have prophets enough and to spare. Even admitting that in the teeth of history that hope of the human race may not be quite exclusively centred in the Remnant, one must perceive that they have social value enough to entitle them to some measure of prophetic encouragement and consolation, and that our civilization allows them none whatever. Every prophetic voice is addressed to the masses, and to them alone; the voice of the pulpit, the voice of education, the voice of politics, of literature, drama, journalism – all these are directed towards the masses exclusively, and they marshal the masses in the way that they are going.
One might suggest, therefore, that aspiring prophetical talent may well turn to another field. Sat patriae Priamoque datum – whatever obligation of the kind may be due the masses is already monstrously overpaid. So long as the masses are taking up the tabernacle of Moloch and Chiun, their images, and following the star of their god Buncombe, they will have no lack of prophets to point the way that leadeth to the More Abundant Life; and hence a few of those who feel the prophetic afflatus might do better to apply themselves to serving the Remnant. It is a good job, an interesting job, much more interesting than serving the masses; and moreover it is the only job in our whole civilization, as far as I know, that offers a virgin field.
Albert Jay Nock (1870–1945) was an influential American libertarian author, educational theorist, and social critic. Murray Rothbard was deeply influenced by him, and so was that whole generation of free-market thinkers. See Nock’s The State of the Union.
Throughout his life, Nock was a deeply private man who shared few of the details of his personal life with his working partners. He was born in Scranton, Pennsylvania (U.S.), to a father who was both a steelworker and an Episcopal priest, and he was raised in Brooklyn, New York. Nock attended St. Stephen’s College (now known as Bard College) from 1884–1888, where he joined Sigma Alpha Epsilon Fraternity. After graduation he had a brief career playing minor league baseball, then attended a theological seminary and was ordained as an Episcopal priest in 1897. Nock married Agnes Grumbine in 1900 and had two children, Francis and Samuel (both of whom became college professors), but separated from his wife after only a few years of marriage. In 1909, Nock left the clergy and became a journalist.
However, while Nock was a lifelong admirer of Henry George, he was frequently at odds with the left-leaning movement that claimed his legacy. Further, Nock was deeply influenced by the anti-collectivist writings of theGerman sociologist Franz Oppenheimer, whose most famous work, Der Staat, was published in English translation in 1915. In his own writings, Nock would later build on Oppenheimer’s claim that the pursuit of human ends can be divided into two forms: the productive or economic means and the parasitic, political means.
His editorials during the three brief years of the Freeman set a mark that no other man of his trade has ever quite managed to reach. They were well-informed and sometimes even learned, but there was never the slightest trace of pedantry in them. –H.L. Mencken
“The Myth of a Guilty Nation,” which came out in 1922, was Albert Jay Nock’s first anti-war book, a cause he backed his entire life as an essential component of a libertarian outlook. The burden of the book is to prove American war propaganda to be false. The purpose of the war, according to Nock, was not to liberate Europe and the world from German imperialism and threats. If there was a conspiracy, it was by the allied powers to broadcast a public message that was completely contradicted by its own diplomatic cables. Along with that came war propaganda designed to make Germany into a devil nation. The book has been in very low circulation ever since. In fact, until a recent release by the Mises Institute, it had been very difficult to obtain in physical form.
In the mid-1920s, a small group of wealthy American admirers funded Nock’s literary and historical work to enable him to follow his own interests. Shortly thereafter, he published his biography of Thomas Jefferson. When Jefferson was published in 1928, Mencken praised it as “the work of a subtle and highly dexterous craftsman” which cleared “off the vast mountain of doctrinaire rubbish that has risen above Jefferson’s bones and also provides a clear and comprehensive account of the Jeffersonian system,” and the “essence of it is that Jefferson divided all mankind into two classes, the producers and the exploiters, and he was for the former first, last and all the time.” Mencken also thought the book to be accurate, shrewd, well-ordered and charming.
In his two 1932 books, On the Disadvantages of Being Educated and Other Essays and Theory of Education in the United States, Nock launched a scathing critique of modern government-run education.
In his 1936 article “Isaiah’s Job”, which appeared in the Atlantic Monthly and was reprinted in pamphlet form in July 1962 by The Foundation for Economic Education, Nock expressed his complete disillusionment with the idea of reforming the current system. Believing that it would be impossible to convince any large portion of the general population of the correct course and opposing any suggestion of a violent revolution, Nock instead argued that libertarians should focus on nurturing what he called “the Remnant“.
The Remnant, according to Nock, consisted of a small minority who understood the nature of the state and society, and who would become influential only after the current dangerous course had become thoroughly and obviously untenable, a situation which might not occur until far into the future. Nock’s philosophy of the Remnant was influenced by the deep pessimism and elitism that social critic Ralph Adams Cram expressed in a 1932 essay, “Why We Do Not Behave Like Human Beings”. In his Memoirs of a Superfluous Man, Nock makes no secret that his educators:
did not pretend to believe that everyone is educable, for they knew, on the contrary, that very few are educable, very few indeed. They saw this as a fact of nature, like the fact that few are six feet tall. [...] They accepted the fact that there are practicable ranges of intellectual and spiritual experience which nature has opened to some and closed to others.
In 1941, Nock published a two-part essay in the Atlantic Monthly titled “The Jewish Problem in America”. The article was part of a multi-author series, assembled by the editors in response to recent anti-Semitic unrest in Brooklyn and elsewhere “in the hope that a free and forthright debate will reduce the pressure, now dangerously high, and leave us with a healthier understanding of the human elements involved.”
Nock’s argument was that the Jews were an Oriental people, acceptable to the “intelligent Occidental” yet forever strangers to “the Occidental mass-man.”Furthermore, the mass-man “is inclined to be more resentful of the Oriental as a competitor than of another Occidental;” the American masses are “the great rope and lamppost artists of the world;” and in studying Jewish history, “one is struck with the fact that persecutions never have originated in an upper class movement”. This innate hostility of the masses, he concluded, might be exploited by a scapegoating state to distract from “any shocks of an economic dislocation that may occur in the years ahead.” He concluded, “If I keep up my family’s record of longevity, I think it is not impossible that I shall live to see the Nuremberg laws reenacted in this country and enforced with vigor” and affirmed that the consequences of such a pogrom “would be as appalling in their extent and magnitude as anything seen since the Middle Ages.”
Despite this obvious dread of anti-Semitism, the article was itself declared by some to be anti-Semitic, and Nock was never asked to write another article, effectively ending his career as a social critic.
Against charges of anti-Semitism, Nock answered, “Someone asked me years ago if it were true that I disliked Jews, and I replied that it was certainly true, not at all because they are Jews but because they are folks, and I don’t like folks.”
In 1943, two years before his death, Nock published his autobiography, Memoirs of a Superfluous Man, the title of which expressed the degree of Nock’s disillusionment and alienation from current social trends. After the publication of this autobiography, Nock became the sometime guest of oilman William F. Buckley, Sr., whose son, William F. Buckley, Jr., would later become a celebrated author and speaker.
Nock died of leukemia in 1945, at the Wakefield, Rhode Island home of his longtime friend, Ruth Robinson, the illustrator of his 1934 book, “A Journey into Rabelais’ France”. He is buried in Riverside Cemetery, in Wakefield.
Describing himself as a philosophical anarchist, Nock called for a radical vision of society free from the influence of the political state. He described the state as that which “claims and exercises the monopoly of crime”. He opposed centralization, regulation, the income tax, and mandatory education, along with what he saw as the degradation of society. He denounced in equal terms all forms of totalitarianism, including “Bolshevism… Fascism, Hitlerism, Marxism, [and] Communism” but also harshly criticized democracy. Instead, Nock argued, “The practical reason for freedom is that freedom seems to be the only condition under which any kind of substantial moral fiber can be developed. Everything else has been tried, world without end. Going dead against reason and experience, we have tried law, compulsion and authoritarianism of various kinds, and the result is nothing to be proud of.”
During the 1930s, Nock was one of the most consistent critics of Franklin Roosevelt‘s New Deal programs. In Our Enemy, the State, Nock argued that the New Deal was merely a pretext for the federal government to increase its control over society. He was dismayed that the president had gathered unprecedented power in his own hands and called this development an out-and-out coup d’état. Nock criticized those who believed that the new regimentation of the economy was temporary, arguing that it would prove a permanent shift. He believed that the inflationary monetary policy of the Republican administrations of the 1920s was responsible for the onset of the Great Depression and that the New Deal was responsible for perpetuating it.
Nock was also a passionate opponent of war and what he considered the US government’s aggressive foreign policy. He believed that war could bring out only the worst in society and argued that it led inevitably to collectivization and militarization and “fortified a universal faith in violence; it set in motion endless adventures inimperialism, endless nationalist ambitions,” while, at the same time, costing countless human lives. During the First World War, Nock wrote for The Nation, which was censored by the Wilson administration for opposing the war.
Despite his distaste for communism, Nock harshly criticized the Allied intervention in the Russian Civil War following the parliamentary revolution and Bolshevik coup in that country. Before the Second World War, Nock wrote a series of articles deploring what he saw as Roosevelt’s gamesmanship and interventionism leading inevitably to US involvement. Nock was one of the few who maintained a principled opposition to the war throughout its course.
Jump up^Harris, Michael R. (1970). Five Counterrevolutionists in Higher Education: Irving Babbitt, Albert Jay Nock, Abraham Flexner, Robert Maynard Hutchins, Alexander Meiklejohn, Oregon State University Press, p. 97.
Rep. Justin Amash cosponsored an amendment that would have defunded the National Security Agency’s unwarranted bulk collection of Americans’ phone data. The measure failed narrowly, but has re-energized the legislative struggle for civil liberties. Amash believes that James Clapper, the Director of National Intelligence, should be prosecuted for lying to Congress. He also says he doesn’t appreciate the “condescending” tone of New Jersey Gov. Chris Christie with respect to the debate over national security.
Glenn Beck Justin Amash Interview On Nsa Surveillance
Congress’s Abdication on NSA Oversight (U.S. Rep. Justin Amash (R-MI))
Justin Amash: President Obama Was ‘Highly Misleading’ In Claiming There’s No Domestic Spying Program
House committee passes NSA reform bill
The House Judiciary Committee passed the National Security Agency reforming “USA Freedom Act” 31-0 Wednesday. The first major piece of legislation seeking to curb the NSA’s collection of electronic information, the bill which has undergone major changes will now proceed to the full House of Representatives. It will be competing with another reform bill that is expected to be approved by the House Intelligence Committee Thursday. RT’s Sam Sacks breaks down the bill and the chances for instituting real reform.
“USA Freedom Act” Bill To Put NSA “Out Of Business”
Fox News Reporting The NSA’s Secret War Who’ The Enemy? 1 of 6
Fox News Reporting The NSA’s Secret War Who’ The Enemy Controversy Not The First Time 2 of
Fox News Reporting The NSA’s Secret War Who’ The Enemy? Controversy? 9 11 3 of 6
Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Phone Records – 4 of 6
Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Edward Snowden & Security – 5 of 6
Fox News Reporting – The NSA’s Secret War Who’ The Enemy? – Day Of Reckoning At Hand? – 6 of 6
C-SPAN Callers On The Future Of The National Security Agency (NSA)
James Bamford Says NSA “Exploiting” U.S. Citizens With Info About Their Online Porno Viewing Habits
Yesterday, C4L sent a letter to members of the House Judiciary Committee strongly opposing the Manager’s Amendment to H.R. 3361, the USA FREEDOM Act.
The original version of the act was sold to Americans as a way to rein in the NSA’s domestic surveillance programs, and it would have been a first step towards real reform of the surveillance state since 9/11.
But, that’s seldom the way Congress works. In an effort to “pass something this year,” the Judiciary Committee watered down the legislation and it passed out of the committee unanimously.
What’s more likely, that Rogers and Ruppersberger had a change of heart on the NSA? Or that Judiciary watered down the USA FREEDOM Act enough to the point that its “reform” is devoid of any substantive changes?
The bill is now earning plaudits from the same guys who said the original version would “make America less safe,” and from the administration that never wanted you to know they were spying on you in the first place.
Read Campaign for Liberty’s letter to the Judiciary Committee below:
Six months after it was written to restrain the National Security Agency’s sweeping domestic surveillance, a privacy bill cleared a major legislative obstacle on Wednesday, even as its advocates worried that the compromises made to advance the bill have weakened its constraints on mass data collection.
The USA Freedom Act, designed to prevent the US government from collecting US phone data in bulk, passed the House Judiciary Committee by a 32 to zero bi-partisan vote, making it the first surveillance reform bill to proceed out of committee and to the House floor.
But an internal committee breakthrough on Monday that won the support of chairman Bob Goodlatte, a Virginia Republican, significantly recast the bill, softening its prohibitions on aspects of bulk collection and requiring transparency around it.
The bill’s architect, Republican James Sensenbrenner of Wisconsin, who also wrote the 2001 Patriot Act, said the bill “makes it crystal clear that Congress does not support bulk collection.”
While changes to the bill now permit the government to gather call records up to two degrees of separation away from a specific target – potentially millions of records – Sensenbrenner urged his colleagues “not to make the perfect the enemy of the good,” expressing confidence that the revamped USA Freedom Act was on “the fast track to passage.”
Supporters in and outside of Congress concede the latest compromises have left the USA Freedom Act less protective of civil liberties than it was when introduced in October. Its distinctions from a rival bill written by the leaders of the House intelligence committee, the NSA’s strongest Capitol Hill advocates, are somewhat blurred, prompting civil libertarians to become less enthusiastic of a measure they have championed as a fix to the broad NSA powers exposed by whistleblower Edward Snowden.
Representative John Conyers, a Michigan Democrat and longtime USA Freedom Act supporter, said that the new version of the bill was a “less than perfect compromise” that still makes “important, vital, substantive changes” to US surveillance.
The revised USA Freedom Act, “while still better than any other proposal on the board, is a setback from the original,” said Amie Stepanovich of Access, a human rights and digital rights advocacy group.
While the USA Freedom Act has nearly 150 House co-sponsors, and a stalled Senate companion commands 20 votes in the upper chamber, it was clear on Wednesday that the House intelligence committee will continue attempts to outmaneuvre its rival.
The chairman of the intelligence committee, until now a fervent critic of the USA Freedom Act, is now praising a bill he has long criticized, and which several congressional sources said he attempted to influence ahead of Wednesday’s vote.
Representative Mike Rogers, a Michigan Republican who is retiring this year, called the changes to the USA Freedom Act a “huge improvement,” adding in an interview with Foreign Policy magazine that the bill’s architects have “come a lot closer [and] now we’re just trying to work out the wording.”
Rogers is scheduled to mark up his alternative bill, the Fisa Transparency and Modernization Act, on Thursday, a decision USA Freedom Act supporters view as a desperation move. But on Wednesday, Rogers’ committee announced it will also mark up the USA Freedom Act on Thursday, prompting Capitol Hill speculation that Rogers will attempt to merge his bill with the Freedom Act rather than attempt to rally more votes.
House Speaker John Boehner of Ohio had earlier thrown his support behind Rogers’ bill. But now Boehner is said to be monitoring the committe process and keeping his options open. Congressional sources expected Boehner to schedule a vote on a surveillance proposal – of whatever form – as early as the week of 19 May, so the issue does not derail the annual defense budget authorization, though nothing is scheduled yet.
Both bills as originally crafted prevent the NSA from collecting US phone data in bulk, as it has done in secret since 2001, a position that President Barack Obama now embraces. The major difference between the two bills remains the role of judges in authorizing data collection. The Rogers bill permits the government to collect phone and email data absent a judges’ prior order, which the revised USA Freedom Act requires in all but emergency cases.
Additionally, the revised USA Freedom Act permits the government to get phone data two “hops,” or degrees of separation, from the target of the order, which can mean millions of call records reaped from a single court order. The legal standard for that order, for counterterrorism purposes, will be “reasonable articulable suspicion” of connection to an agent of a foreign power, the NSA’s desired framework.
Significantly, the new version of the USA Freedom Act all but stripped out a provision preventing the NSA from combing through its foreign communications dragnets for Americans’ information, something Senator Ron Wyden of Oregon dubbed the “backdoor search provision,” an absence that has deeply upset supporters. Those dragnets exist pursuant to a major 2008 piece of legislation, known as Section 702 of the Fisa Amendments Act.
Congressional sources pointed to new language tightening up prohibitions on the NSA intentionally targeting Americans’ communications at the outset as a palliative. But they conceded the absence of the backdoor search ban was a major change – one they said the NSA’s advocates fought hard for, an indication of how central the NSA considers a power it has rarely forthrightly acknowledged using. They indicated that USA Freedom Act supporters lacked the votes within the committee to pass the bill that retained the backdoor search prohibition.
An attempt by Representative Zoe Lofgren, a California Democrat, to restore the backdoor search provision failed Wednesday. Goodlatte said restoring it would “disrupt this bipartisan agreement.”
Kevin Bankston of the Open Technology Institute said he was “incredibly disappointed” at the new USA Freedom Act’s effective blessing of backdoor searches.
“Especially when we’re expecting the government’s own surveillance watchdog, the Privacy and Civil Liberties Oversight Board, to issue a report on just that issue within a month or so, closing the door to reform on Section 702 of the Fisa Amendments Act would be premature,” Bankston said in a statement.
But the Judiciary Committee restored a provision initially struck from the original USA Freedom Act permitting increased transparency for companies receiving surveillance orders for their customers’ data, the absence of which had alarmed supporters.
The language, added back to the bill Wednesday by Representative Suzan Delbene of Washington, had been cut in order to codify a January deal the Justice Department reached with phone and Internet companies allowing them to list received orders only in bands of 1,000 and with a time lag. Congressional sources said companies lobbied hard to restore transparency language.
The Obama administration has withheld endorsement of either bill in public, confusing supporters. But in recent weeks, its guidance to Capitol Hill on surveillance reform included a requirement for up-front judicial authorization for data requests, which only the USA Freedom Act possesses.
“At this stage, I think I’d just say we will be watching closely as these bills go through the process,” said Caitlin Hayden, a White House spokeswoman said shortly before the vote.
Hours after the vote, Hayden issued a statement welcoming the USA Freedom Act as “a very good first step”:
“In March the president laid out his proposal to reform Section 215, and called upon Congress to act quickly to pass implementing legislation. We applaud the House Judiciary Committee for approaching this issue on a bipartisan basis. The Judiciary Committee passed bill is a very good first step in that important effort, and we look forward to House Permanent Select Committee on Intelligence action on it tomorrow,” Hayden said.
Section 215 of the Patriot Act is the provision cited by the NSA and blessed by the secret Fisa Court for bulk data collection.
Some legislators, distressed by the changes to the USA Freedom Act, are considering a different option for surveillance reform.
As amended, the USA Freedom Act would push back the expiration of Section 215 to the end of 2017, when Section 702 is set to expire. The current expiration is 1 June of next year. Some legislators are already whispering that allowing Section 215 to expire wholesale in 2015 is a preferable reform.
But Representative Jerrold Nadler of New York, a Democrat, said the USA Freedom Act was “the first, best and perhaps only chance in a decade” to constrain widespread surveillance.
“This is our chance. We have to seize it,” Nadler said on Wednesday.
Patrick Leahy, the Vermont Democrat who sponsored the USA Freedom Act in the Senate, hailed the committee vote, but said he was concerned that the text does not reform the Federal Bureau of Investigation’s national-security letters and makes insufficient changes on transparency and to the Fisa Court.
“I will continue to push for those reforms when the Senate Judiciary Committee considers the USA Freedom Act this summer,” Leahy said in a statement.
The USA Freedom Act, formally titled the Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection and Online Monitoring Act, is a bill that was introduced in both houses of the U.S. Congress on October 29, 2013.
The USA Freedom Act would end the bulk collection of Americans’ metadata, end the secret laws created by the FISA court, and introduce a “Special Advocate” to represent public and privacy matters. Other proposed changes include limits to programs like PRISM, which “incidentally” retains Americans’ Internet data, and greater transparency by allowing companies such as Google and Facebook to disclose information about government demands for information.
Representative Jim Sensenbrenner, who introduced the bill, stated that its purpose was:
To rein in the dragnet collection of data by the National Security Agency (NSA) and other government agencies, increase transparency of the Foreign Intelligence Surveillance Court (FISC), provide businesses the ability to release information regarding FISA requests, and create an independent constitutional advocate to argue cases before the FISC.
According to the bill’s sponsors, their legislation would amend Section 215 of the Patriot Act to ensure that any phone records obtained by the government were essential in an investigation that involved terrorism or espionage, thereby ending bulk collection, while preserving “the intelligence community’s ability to gather information in a more focused way.” A May 2014 amended version of the bill would also extend thecontroversial USA PATRIOT Act through the end of 2017. The Electronic Privacy Information Center (EPIC) has criticized the Patriot Act as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”.
Many members of Congress believed that in the wake of the Snowden disclosures, restoration of public trust would require legislative changes. More than 20 bills have been written since the disclosures began with the goal of reining in government surveillance powers.
Sensenbrenner, who introduced the USA PATRIOT Act (H.R. 3162) in 2001 following the September 11 terrorist attacks to give more power to US intelligence agencies, and who has described himself as “author of the Patriot Act”, declared that it was time to put the NSA’s “metadata program out of business”. With its bulk collection of Americans’ phone data, Sensenbrenner asserted that the intelligence community “misused those powers”, had gone “far beyond” the original intent of the legislation, and had “overstepped its authority”.
An opinion piece by Leahy and Sensenbrenner, published in Politico, described the impetus for proposed changes, saying:
The intelligence community has failed to justify its expansive use of [the FISA and Patriot Act] laws. It is simply not accurate to say that the bulk collection of phone records has prevented dozens of terrorist plots. The most senior NSA officials have acknowledged as much in congressional testimony. We also know that the FISA court has admonished the government for making a series of substantial misrepresentations to the court regarding these programs. As a result, the intelligence community now faces a trust deficit with the American public that compromises its ability to do its job. It is not enough to just make minor tweaks around the edges. It is time for real, substantive reform.
Markup in House Judiciary Committee
In May 2014, the U.S. House Judiciary Committee posted a “Manager’s Amendment” on its website. Title VII of the Amendment read “Section 102(b)(1) of the USA Patriot Improvement and Reauthorization Act of 2005 (50 U.S.C. 1805 note) is amended by striking “June 1, 2015″ and inserting “December 31, 2017″, extending the controversial USA PATRIOT Act through the end of 2017. The Electronic Privacy Information Center(EPIC) has criticized the Patriot Act as unconstitutional, especially when “the private communications of law-abiding American citizens might be intercepted incidentally”. James Dempsey, of the CDT, believes that the Patriot Act unnecessarily overlooks the importance of notice under the Fourth Amendment and under a Title III wiretap, while the American Library Association became so concerned that they formed a resolution condemning the USA PATRIOT Act, and which urged members to defend free speech and protect patrons’ privacy against the Act.
The Guardian wrote “civil libertarians on the Judiciary Committee had to compromise in order to gain support for the act. Significantly, the government will still be able to collect phone data on Americans, pending a judge’s individualized order based on ‘reasonable articulable suspicion‘ – a standard preferred by the NSA – of wrongdoing, and can collect call records two degrees or ‘hops’ of separation from the individual suspected”. Kara Brandeisky of ProPublica said “some worry that the bill does not unequivocally ban bulk collection of American records. Again, a lot depends on how the Foreign Intelligence Surveillance Court interprets the statute”.
The Electronic Frontier Foundation (EFF) stated it remained “concerned that this bill omits important transparency provisions found in the USA FREEDOM Act, which are necessary to shed light on surveillance abuses”. In addition, the EFF said it believed “this bill should do more to address mass surveillance under Section 702 of Foreign Intelligence Surveillance Amendments Act, a section of law used to collect the communications of users worldwide”. The Open Technology Institute commented “several other key reforms—such as provisions allowing Internet and phone companies to publish more information about the demands they receive, which OTI and a coalition of companies and organizations have been pressing for since last summer—have been removed, while the bill also provides for a new type of court order that the President has requested, allowing for continuous collection by the government of specified telephone records.”
Despite the criticism from civil liberties groups, Mike Rogers, a defender of the NSA‘s surveillance practices and the chairman of the House Intelligence Committee, praised the amendments. Rogers, who had his own bill which would codify the NSA’s surveillance practices in to law, called the proposed amendments a “huge improvement”. Foreign Policy wrote “any compromise to the Judiciary bill risks an insurrection from civil libertarians in Congress. Michigan Republican Justin Amash led such a revolt last year when he offered an NSA amendment to a defense appropriations bill that would have stripped funding for the NSA’s collection program.” “Just a weakened bill or worse than status quo? I’ll find out,” Representative Amash said.
The Act has bipartisan support, evenly split between Democrats and Republicans. As of May 8, 2014, it had 150 co-sponsors in the House and 21 in the Senate. Viewed as one of the most comprehensive of the similar bills introduced since the NSA leaks, the USA Freedom Act has support or qualified support from a diverse range of groups such as the ACLU, Mozilla, and the NRA.
Representative Justin Amash, author of the narrowly-defeated Amash Amendment, a proposal that would have de-funded the NSA, backed the legislation. “It’s getting out of control” he commented, “[Courts are issuing] general warrants without specific cause…and you have one agency that’s essentially having superpowers to pass information onto others”.
According to Deputy Attorney General James Cole, even if the Freedom Act becomes law, the NSA could continue its bulk collection of American’s phone records. He explained that “it’s going to depend on how the [FISA] court interprets any number of the provisions” contained within the legislation.Jennifer Granick, Director of Civil Liberties at Stanford Law School, stated:
Opponents of global surveillance have called for the bill to be strengthened. The Electronic Frontier Foundation (EFF) released a statement saying “we consider this bill to be a floor, not a ceiling”. The ACLU wrote that “although the USA Freedom Act does not fix every problem with the government’s surveillance authorities and programs, it is an important first step and it deserves broad support.”
International human rights groups remain somewhat skeptical of specific provisions of the bill. For example, Human Rights Watch expressed its concern that the “bill would do little to increase protections for the right to privacy for people outside the United States, a key problem that plagues U.S. surveillance activities. Nor would the bill address mass surveillance or bulk collection practices that may be occurring under other laws or regulations, such as Section 702 of the FISA Amendments Act or Executive Order 12333. These practices affect many more people and include the collection of the actual content of internet communications and phone calls, not just metadata”. Zeke Johnson, Director of Amnesty International‘s Security and Human Rights Program, agreed that “any proposal that fails to ban mass surveillance, end blanket secrecy, or stop discrimination against people outside the U.S. will be a false fix”.
As amended, the USA Freedom Act would push back the expiration of Section 215 to the end of 2017, when Section 702 is set to expire. The current expiration is 1 June of next year. Some legislators are already whispering that allowing Section 215 to expire wholesale in 2015 is a preferable reform.
The program’s existence was publicly revealed in July 2013 by Edward Snowden in The Sydney Morning Herald and O Globo newspapers, though the codename is mentioned in earlier articles, and like many other codenames can also be seen in job postings, and in the online resumes of employees.
XKeyscore is a complicated system and various authors have different interpretations about its actual capabilities. Edward Snowden and Glenn Greenwald explained XKeyscore as being a system which enables almost unlimited surveillance of anyone anywhere in the world, while NSA said that usage of the system is limited and restricted.
According to The Washington Post and national security reporter Marc Ambinder, XKeyscore is an NSA data-retrieval system which consists of a series of user interfaces, backend databases, servers and software that selects certain types of data and metadata that the NSA has already collected using other methods.
According to Snowden and Greenwald
On January 26, 2014, the German broadcaster Norddeutscher Rundfunk asked Edward Snowden in its TV interview: “What could you do if you would use XKeyscore?” and he answered:
“You could read anyone’s email in the world, anybody you’ve got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you’re tracking: you can follow it as it moves from place to place throughout the world. It’s a one-stop-shop for access to the NSA’s information.”
“…You can tag individuals… Let’s say you work at a major German corporation and I want access to that network, I can track your username on a website on a form somewhere, I can track your real name, I can track associations with your friends and I can build what’s called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.”
According to The Guardian’s Glenn Greenwald, low-level NSA analysts can via systems like XKeyscore “listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst.”
He added that the NSA’s databank of collected communications allows its analysts to listen “to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future”.
In an official statement from July 30, 2013, the NSA said there is no “unchecked analyst access to NSA collection data. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks.” The NSA also states that there are “stringent oversight and compliance mechanisms built in at several levels. One feature is the system’s ability to limit what an analyst can do with a tool, based on the source of the collection and each analyst’s defined responsibilities.”
The agency defended the program, stressing that it was only used to legally obtain information about “legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests. [...] XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system. [...] These types of programs allow us to collect the information that enables us to perform our missions successfully — to defend the nation and to protect U.S. and allied troops abroad.”
Slide from a 2008 NSA presentation about XKeyscore, showing a worldmap with the locations of XKeyscore servers
Slide from a 2008 NSA presentation about XKeyscore, showing the query hierarchy
An NSA presentation about XKeyscore from 2008 says that it’s a “DNI Exploitation System/Analytic Framework”. DNI stands for Digital Network Intelligence, which means intelligence derived from internet traffic. In an interview with the German Norddeutscher Rundfunk, Edward Snowden said about XKeyscore: “It’s a front end search engine”.
XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data, like “US and allied military and other facilities as well as US embassies and consulates” in many countries around the world. Among the facilities involved in the program are four bases in Australia and one in New Zealand.
According to an NSA presentation from 2008, these XKeyscore servers are fed with data from the following collection systems:
F6 (Special Collection Service) – joint operation of the CIA and NSA that carries out clandestine operations including espionage on foreign diplomats and leaders
FORNSAT – which stands for “foreign satellite collection”, and refers to intercepts from satellites
Third party – foreign partners of the NSA such as the (signals) intelligence agencies of Belgium, Denmark, France, Germany, Italy, Japan, the Netherlands, Norway, Sweden, etc.
From these sources, XKeyscore stores “full-take data”, which are indexed by plug-ins that extract certain types of metadata (like phone numbers, e-mail addresses, log-ins, and user activity) and index them in metadata tables, which can be queried by analysts. XKeyscore has been integrated with MARINA, which is NSA’s database for internet metadata.
However, the system continuously gets so much Internet data that it can be stored only for short periods of time. Content data remain on the system for only three to five days, while metadata is stored for up to 30 days. A detailed commentary on an NSA presentation published in The Guardian in July 2013 cites a document published in 2008 declaring that “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”
Slide from a 2008 NSA presentation about XKeyscore, showing the differences between the various NSA database systems
For analysts, XKeyscore provides a “series of viewers for common data types”, which allows them to query terabytes of raw data gathered at the aforementioned collection sites. This enables them to find targets that cannot be found by searching only the metadata, and also to do this against data sets that otherwise would have been dropped by the front-end data processing systems. According to a slide from an XKeyscore presentation, NSA collection sites select and forward less than 5% of the internet traffic to the PINWALE database for internet content.
Because XKeyscore holds raw and unselected communications traffic, analysts can not only perform queries using “strong selectors” like e-mail addresses, but also using “soft selectors”, like keywords, against the body texts of e-mail and chat messages and digital documents and spreadsheets in English, Arabic and Chinese.
This is useful because “a large amount of time spent on the web is performing actions that are anonymous” and therefore those activities can’t be found by just looking for e-mail addresses of a target. When content has been found, the analyst might be able to find new intelligence or a strong selector, which can then be used for starting a traditional search.
Besides using soft selectors, analysts can also use the following other XKeyscore capabilities:
Look for the usage of Google Maps and terms entered into a search engine by known targets looking for suspicious things or places.
Look for “anomalies” without any specific person attached, like detecting the nationality of foreigners by analyzing the language used within intercepted emails. An example would be a German speaker in Pakistan. The Brazilian paper O Globo claims that this has been applied to Latin America and specifically to Colombia, Ecuador, Mexico and Venezuela.
Detect people who use encryption by do searches like “all PGP usage in Iran”. The caveat given is that very broad queries can result in too much data to transmit back to the analyst.
Track the source and authorship of a document that has passed through many hands.
Most of these things cannot be detected by other NSA tools because they operate with strong selectors (like e-mail and IP addresses and phone numbers) and the raw data volumes are too high to forward them to other NSA databases.
In 2008, it was planned to add a number of new capabilities in the future, like:
The NSA slides published in The Guardian during 2013 claimed that XKeyscore had played a role in capturing 300 terrorists by 2008. This claim could not be substantiated as the redacted documents do not cite instances of terrorist interventions.
A 2011 report from the NSA unit in Griesheim (Germany) says that XKeyscore made it easier and more efficient to target surveillance. Previously, analysis often accessed data they were not interested in. XKeyscore allowed them to focus on the intended topics, while ignoring unrelated data. XKeyscore also proved to be an outstanding tool for tracking active groups associated with the Anonymous movement in Germany, because it allows for searching on patterns, rather than particular individuals. An analyst is able to determine when targets research new topics, or develop new behaviors.
To create additional motivation, the NSA incorporated various features from computer games into the program. For instance, analysts who were especially good at using XKeyscore could acquire “skilz” points and “unlock achievements.” The training units in Griesheim were apparently successful and analysts there had achieved the “highest average of skilz points” compared with all other NSA departments participating in the training program.
Usage by foreign partners of the NSA
Excerpt of an NSA document leaked by Edward Snowden that reveals the BND‘s usage of the NSA’s XKeyscore to wiretap a German domestic target
According to documents Der Spiegel acquired from Snowden, the German intelligence agencies BND (foreign intelligence) and BfV (domestic intelligence) were also allowed to use the XKeyscore system. In those documents the BND agency was described as the NSA’s most prolific partner in information gathering. This led to political confrontations, after which the directors of the German intelligence agencies briefed members of the German parliamentary intelligence oversight committee on July 25, 2013. They declared that XKeyscore has been used by the BND since 2007 and that the BfV uses a test version since 2012. The directors also explained that this program is not for collecting data, but only for analyzing them.
As part of the UKUSA Agreement, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand for the purpose of intelligence collaboration and data sharing. According to documents leaked by Snowden, the National Defence Radio Establishment (FRA) has been granted access to XKeyscore.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.
While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.
The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.
Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”
“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
No Domestic Use Seen
There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s.
“N.S.A.’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”
Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
President Obama is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services.
Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.
Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”
“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”
From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.’s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.
A Focus on Defense
In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States.
“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.
“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”
If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.
The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australia’s help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit.
Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers. When the Chinese place surveillance software on American computer systems — and they have, on systems like those at the Pentagon and at The Times — the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. Obama laid out America’s complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June.
At that session, Mr. Obama tried to differentiate between conducting surveillance for national security — which the United States argues is legitimate — and conducting it to steal intellectual property.
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Published on Dec 30, 2013
Through a PRISM, Darkly
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.
Speaker: Kurt Opsahl
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Glenn Becks “SURVEILLANCE STATE”
Inside the NSA
Ed Snowden, NSA, and Fairy Tales
AT&T Spying On Internet Traffic
For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”
NSA Whistle-Blower Tells All – Op-Docs: The Program
The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Benny – The Government is Profiling You (The NSA is Spying on You)
‘After 9/11 NSA had secret deal with White House’
The story of Whistleblower Thomas Drake
Whistleblowers, Part Two: Thomas Drake
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Meet Edward Snowden: NSA PRISM Whistleblower
The Truth About Edward Snowden
N.S.A. Spying: Why Does It Matter?
Inside The NSA~Americas Cyber Secrets
NSA Whistleblower Exposes Obama’s Dragnet
AT&T whistleblower against immunity for Bush spy program-1/2
AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program
The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.
AT&T whistleblower against immunity for Bush spy program-2/2
Enemy Of The State 1998 (1080p) (Full movie)
Background Articles and Videos
Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau. The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001. Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.
The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity. William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.
There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.
During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”. One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.
In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon. The article suggested that the otherwise dispatched Stellar Wind is actually an active program.
PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[Notes 1]PRISM is a government codename for a data collection effort known officially as US-984XN. It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA). The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.” The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012. The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.
According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum. Clapper issued a statement and “fact sheet” to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.
Slide showing that much of the world’s communications flow through the US
Details of information collected via PRISM
PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC). PRISM was authorized by an order of the FISC. Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017. According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.
PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden. The leaked documents included 41 PowerPoint slides, four of which were published in news articles. The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012). The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”
The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States. The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.
According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally. Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”
Response from companies
The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.
Initial Public Statements
Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports. Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:
Slide listing companies and the date that PRISM collection began
Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”
Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.” “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”
Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”
Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.” “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”
Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”
Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”
In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.” “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.
“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.
Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.
On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant. Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”
The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.” The other companies held discussions with national security personnel on how to make data available more efficiently and securely. In some cases, these companies made modifications to their systems in support of the intelligence collection effort. The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel. These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers” and the companies’ denials.
While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission. Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said. Facebook, for instance, built such a system for requesting and sharing the information. Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.
Post-PRISM Transparency Reports
In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.
On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000″ user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.
Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.
Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.
Response from United States government
Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats. The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.” He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.” Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.” On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans. In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.
Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”
On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.” The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”
The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”
The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.” He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”
In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.
In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification, and others said that they had not been aware of the program. After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:
Senator John McCain (R-AZ)
June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee
June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.
June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”
June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”
Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee
June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”
Representative John Boehner (R-OH), Speaker of the House of Representatives
June 11 “He’s a traitor” (referring to Edward Snowden)
Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act
June 9, “This is well beyond what the Patriot Act allows.” “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”
Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.
June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”
June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”
Senator Mark Udall (D-CO)
June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.
Representative Todd Rokita (R-IN)
June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,
Senator Rand Paul (R-KY)
June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”
June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”
Representative Luis Gutierrez (D-IL)
June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”
The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.
Applicable law and practice
On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).” Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.” In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.” When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.” They do not need to specify which facilities or property that the targeting will be directed at.
After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret. The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.
If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.
If the provider rejects the directive, the A.G. may request an order from FISC to enforce it. A provider that fails to comply with FISC’s order can be punished with contempt of court.
Finally, a provider can petition FISC to reject the directive. In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order. The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.
The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”
Involvement of other countries
The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.
Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”
Germany did not receive any raw PRISM data, according to a Reuters report.
Israeli newspaper Calcalist discussed the Business Insider article about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.
In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”
In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)
The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,” and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”
Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.” Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.” He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.
In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case. An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.” Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.” Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.” In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.
In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers; the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.” George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.
The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.
On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.
Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California. When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”. The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style. Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”
Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.
Protests at Checkpoint Charlie in Berlin
The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”. He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.
The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.
William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.” David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.” Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority. The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”
Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”
Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.” The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.
Russia has offered to consider an asylum request from Edward Snowden.
Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”
A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”
A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority. The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections. A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail. It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation. The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens. Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000. SAIC had also hired a former NSA director to its management; Bobby Inman. SAIC also participated in the concept definition phase of Trailblazer.
Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. 
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” 
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.” The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule. In 2006 the program was shut down, after having cost billions of US Dollars. Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.
The new project replacing Trailblazer is called Turbulence.
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying. A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy. Drake gave info to DoD during its investigation of the matter. Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed. She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.
Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.
In 2003, the NSA IG (not the DoD IG) had declared Trailblazer an expensive failure. It had cost more than $1 billion.
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative. Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun. Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union. None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917, part of President Barack Obama’s crackdown on whistleblowers and “leakers”. The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.
Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities. It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian. According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.
Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.
Slide showing that much of the world’s communications flow through the US.
Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).
NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.
Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian. The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.
According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.
Legality and FISA Amendments Act of 2008
The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.
The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”
Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS and Five Eyes). It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.
The system has been reported in a number of public sources. Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001, and by author James Bamford in his books on the National Security Agency of the United States. The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
the Government Communications Headquarters of the United Kingdom,
the National Security Agency of the United States,
the Communications Security Establishment of Canada,
the Defence Signals Directorate of Australia, and
the Government Communications Security Bureau of New Zealand.
the National SIGINT Organisation (NSO) of The Netherlands
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic. During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication, and could be intercepted at great distances. The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber. The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%. Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video. Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt. A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.
See also: Industrial espionage
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes. Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon and the speech technology developed by the Belgian firm Lernout & Hauspie. An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.” The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK. At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.
The 2001 European Parliamentary (EP) report lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
Hong Kong (since closed)
Australian Defence Satellite Communications Station (Geraldton, Western Australia)
Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)
Misawa Air Base (Japan) Map
GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
Sugar Grove (West Virginia, U.S.) Map
Yakima Training Center (Washington, U.S.) Map
GCSB Waihopai (New Zealand)
GCSB Tangimoana (New Zealand)
CFS Leitrim (Ontario, Canada)
Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
Ayios Nikolaos (Cyprus – U.K.)
Bad Aibling Station (Bad Aibling, Germany – U.S.)
relocated to Griesheim in 2004
deactivated in 2008
Buckley Air Force Base (Aurora, Colorado)
Fort Gordon (Georgia, U.S.)
Gander (Newfoundland & Labrador, Canada)
Guam (Pacific Ocean, U.S.)
Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
Lackland Air Force Base, Medina Annex (San Antonio, Texas)
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.
Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T. The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.” Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.
The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.
The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T. Klein claims he was told that similar black rooms are operated at other facilities around the country.
Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.
Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case. A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.
PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States
Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security. The data mostly comes from the NSA, FBI, CIA, as well as other government sources.
‘Duck Dynasty’ Reversal Shows GLAAD Has an Expiration Date
A few years ago, I couldn’t imagine a network disregarding GLAAD’s recommendations
By Brandon Ambrosino
Phil v. The Gays. With which will we side? Or rather, against which will we side? This is the question that society demands we answer. Are we anti-Phil or anti-gay or anti-GLAAD or anti-A&E or anti- … ?
Perhaps no other word sums up the Duck Dynasty fiasco as aptly as the word “anti.”
Whenever I hear that someone is anti-this or that, I immediately think of the old quip about MADD – are there any mothers for drunk driving? – and ask myself if anyone is really in favor of the particular thing being protested. Since GLAAD has recently taken a hard-line stance against Phil Robertson’s “anti-gay” comments, I’ve been asking myself a similar question about defamation: Who among us is for it? Most of us are decidedly against defamation, although we choose not to publicly participate in institutional demonstrations to prove how against it we are. But, of course, GLAAD is an institution, and therefore their criticism reverberates at systemic levels.
Founded in 1985 in the wake of the AIDS crisis, GLAAD was formed to protest skewed coverage of LGBT issues and “to put pressure on media organizations to end homophobic reporting.” The original name was an acronym for “Gay & Lesbian Alliance Against Defamation,” and although the organization has recently rebranded itself by deciding that the letters G-L-A-A-D aren’t actually going to stand for anything any more, their reputation for protesting defamatory speech is well known both within and without the LGBT community.
It goes without saying that GLAAD has done a great deal of good for the LGBT community, and for that they deserve our applause and honor. As they noted in their announcement heralding their name change, their work continues to educate and influence the greater culture. Historically they’ve been a symbol of inclusion and tolerance, and they’ve worked tirelessly to infuse these values into our controlling media discourses. Frankly, though, I don’t think their hasty reaction to Phil Robertson displayed our LGBT community’s best values.
Before many of us even learned that Phil Robertson was interviewed by GQ, GLAAD had already convinced us that Phil’s words were vile and offensive, and called upon A&E “to re-examine their ties to someone with such public disdain for LGBT people and families.” (I still wonder how many of us – commentators included – have read the actual story in GQ.) A&E offered its own kneejerk response to GLAAD’s kneejerk response, and placed Phil on “indefinite” hiatus, which then prompted some Evangelicals to offer up their own kneejerk response which had something to do with the freedom of speech and now – did I hear this correctly? – Chick-fil-A. In the end, after carefully reviewing all of the responses, A&E issued a final response explaining their decision to lift Phil’s suspension, which resulted in yet another predictable response from GLAAD. I’m not sure how we do it, but we manage to craft responses to our opponents without ever having actual conversations with them.
It isn’t shocking that a conservative Christian duck-hunter from Louisiana has opinions that GLAAD deemed “anti-gay,” and it isn’t shocking that A&E immediately kowtowed to GLAAD at the first drop of the word “homophobic.” What is shocking, however, is that A&E lifted Phil’s hiatus in spite of the fact that they knew GLAAD wasn’t going to be happy about it. A few years ago, I couldn’t imagine a network disregarding GLAAD’s recommendations. A&E is certainly setting a precedent – which makes me wonder about where we are today with queer politics.
In the ’80s and ’90s, GLAAD was necessary, if only because top media outlets needed to be reminded that journalistic ethics applied to AIDS coverage, too. But in 2014, how necessary is GLAAD? I don’t mean to suggest that the organization isn’t doing some good for our world – as I’ve already noted, they are! But as America edges closer and closer to unqualified and full inclusion of LGBT persons, I wonder if an organization whose raison d’etre is to find and shame instances of discrimination isn’t just a bit archaic.
If our goal is to progress beyond defamation against LGBT persons, then that means GLAAD has a sell-by date. To put it in a different, albeit cheekier way: Defamation is good for GLAAD’s business. To bankrupt our society of LGBT defamation would certainly put GLAAD out of work. It’s hard for me to imagine I’m the only one who’s wondered about this. In fact, GLAAD’s recent name-change only confirms that their leadership has been reexamining and revising their purposes moving forward. Again, I’m not suggesting our world doesn’t need GLAAD: There certainly is a place for them. But A&E’s latest reversal should make us question what exactly that place is. http://ideas.time.com/2013/12/28/duck-dynasty-reversal-shows-glaad-has-an-expiration-date/
Related Posts On Pronk Palisades
God Is Behind Going Duck Crazy — Duck Dynasty Phil Robertson Suspended From Show For Expressing Views On Gays — Will Not Inherit The Kingdom of God — I’m With Phil — Photos & Videos
Segment 0: HIM Obama, HIM Obama, HIM Obama — His Imperial Majesty — Monarch of Marxism, Czar of Communism, Shah of Socialism, and Pharaoh of Progressivism — His Imperial Majesty Obama — HIM Obama, HIM Obama, HIM Obama — HIM That Must Be Obeyed — If You Like Your Plan You Can Keep Your Plan For One More Year — Videos
A Montage of Obama’s “If You Like Your Plan Keep It” Lies
President Obama describing how to reach single payer flashback
Barack Obama: ‘We Fumbled the Roll Out on This Health Care Law,’ ‘That’s on Me’ – 11-14-2013
Barack Obama Full Speech on Obamacare Disaster & Keep Your Plan Promise – November 14, 2013
Obama wants it both ways on single payer
Obama’s Single Payer Health Care System : New World Order ( NWO )
President Obama Wants A Single Payer Health Care System
Obama on single payer health insurance
Barack Obama and single payer health care
Obama On Single Payer Health Care
President Obama answers question on Health Care Website (C-SPAN Clip)
Obama Town Hall 1st Question? Single Payer
Obama In ’09: Medicare “Is Going Broke”
Trustees say long-run Medicare, Social Security deficit is $66 trillion
Social Security and Medicare – the two largest federal programs – are on track to generate $66 trillion in deficits over time, according to the latest analysis from the programs’ trustees.
Taken together, the reports underscore the fact that whatever modest improvement there has been in the near-term deficit outlook, the nation still faces deep long-term fiscal challenges.
In 2013, Social Security’s trustees expect the program to pay out $79 billion more in benefits than the government collects in Social Security taxes, and anticipate the program running deficits in perpetuity. This is despite the expiration of the 2011-12 payroll tax holiday and the improvement in the economy. Back when President Bush advocated Social Security reform, the program wasn’t supposed to start running annual deficits until 2018.
Typically, the media places emphasis on the Social Security “trust fund.” That is, in past years in which the government was collecting more in Social Security taxes than it cost to provide benefits, it spent the surplus on other government functions and issued IOUs to the Social Security system. Though the distinction is silly given that the money all has to come from the same bank account, the trustees estimate that these IOUs will now run out in 2033, at which point, absent other changes, the federal government would have to automatically cut Social Security benefits by 23 percent. When Bush was advocating Social Security reform, this wasn’t projected to happen until 2042. Put another way, the trust fund exhaustion date that was 37 years away during the Bush era when liberals denied the existence of a Social Security crisis, is now just 20 years away.
Under the trustees’ “infinite horizon” estimates that project the cost of Social Security over time in present dollars, the program is running a long-term deficit of $23.1 trillion.
When it comes to Medicare, the outlook is even grimmer, because the demographics of an expanding older generation, which challenge the finances of Social Security, interact with rising health care costs.
The finances of Medicare are also more complicated, because the program has several different funding streams. The hospital payment program, Medicare Part A, like Social Security, is financed by a payroll tax, in addition to general federal revenue. Medicare Part B (which covers services such as doctors visits and lab tests in addition to equipment such as wheelchairs) and Medicare Part D (which covers prescription drugs) are financed by a combination of collecting premiums from beneficiaries and general revenue.
Over time, the trustees project the hospital fund has $3.5 trillion in unfunded obligations, Part B will require $25 trillion in general revenue to finance, and Part D — passed by a Republican Congress and signed by Bush — will require an injection of $14.4 trillion. All told, Medicare will run $42.9 trillion short. Combined with Social Security, the long-term deficit of the two programs is $66 trillion.
This, however, likely understates the true extent of the financial problems facing Medicare. The reason is that these projections assume that all of the Medicare cuts in President Obama’s health care law will be fully implemented and that Congress will allow scheduled cuts to doctors’ payments to go into effect, even though lawmakers routinely vote to delay such cuts.
Paul Spitalnic, the acting chief actuary of the Centers for Medicare and Medicaid Services, in a statement at the end of the report, cautioned that the projections were ultimately “implausible.” For instance, they would require a cut to Medicare physicians’ payments of nearly 25 percent this January.
“Further, while the Affordable Care Act makes important changes to the Medicare program and substantially improves its financial outlook, there is a strong likelihood that certain of these changes will not be viable in the long range,” Spitalnic wrote. He continued: “Without unprecedented changes in health care delivery systems and payment mechanisms, the prices paid by Medicare for health services are very likely to fall increasingly short of the costs of providing these services. By the end of the long-range projection period, Medicare prices for hospital, skilled nursing facility, home health, hospice, ambulatory surgical center, diagnostic laboratory, and many other services would be less than half of their level without consideration of the productivity price reductions. Medicare prices would be considerably below the current relative level of Medicaid prices, which have already led to access problems for Medicaid enrollees, and far below the levels paid by private health insurance. Well before that point, Congress would have to intervene to prevent the withdrawal of providers from the Medicare market and the severe problems with beneficiary access to care that would result. Overriding the productivity adjustments, as Congress has done repeatedly in the case of physician payment rates, would lead to substantially higher costs for Medicare in the long range than those projected under current law.”
According to an alternate set of assumptions in which Congress undoes these cuts, the trustees estimate that the Medicare program could cost about 50 percent more over a 75-year period.
On paper, the Medicare hospital “trust fund” won’t be exhausted until 2026, which is two years later than last year and nine years later than before the passage of Obamacare. But, this estimate is based on the same unreasonable assumptions. Additionally, it’s misleading, because the projected Medicare savings are really supposed to be used to help finance the health care law’s new spending rather than extend the solvency of Medicare.
The dirty little not-so-secret behind President Obama’s much-lobbied-for, illegal and strategically incompetent war against Syria is that it’s not about Syria at all. It’s about Iran—and Israel. And it has been from the start.
By “the start,” I mean 2011, when the Obama administration gradually became convinced that it could deal Iran a mortal blow by toppling President Bashar al-Assad of Syria, a secular, Baathist strongman who is, despite all, an ally of Iran’s. Since then, taking Iran down a peg has been the driving force behind Obama’s Syria policy.
Not coincidentally, the White House plans to scare members of Congress into supporting the ill-conceived war plan by waving the Iranian flag in their faces. Even liberal Democrats, some of whom are opposing or questioning war with Syria, blanch at the prospect of opposing Obama and the Israel lobby over Iran.
At first glance, the festering Syria crisis seems bad news for diplomatic efforts to keep Iran from developing nuclear capabilities. In actuality, however, achieving U.S. objectives in the Syria crisis is an opportunity to pressure Iran into making hard choices not only in Syria, but regarding its nuclear program as well. More U.S. involvement to achieve its objectives in Syria will inevitably run counter to Tehran’s interests, be it to punish the Assad regime for chemical weapons use or to show support for the Syrian opposition in changing Assad’s calculus and forcing him to “step aside” at the negotiating table or on the battlefield.
Many in U.S. policymaking circles have viewed containing swelling Iranian influence in Syria and preventing Iran from going nuclear as two distinct policy discussions, as the Obama Administration only has so much “bandwidth” to deal with Middle East threats. But the recent deepening of cooperation between Tehran, Hezbollah and the Assad regime, combined with their public acknowledgement of these activities, indicates that they themselves see these activities as furthering the efficacy of the “resistance axis.”
Like every alliance, its members will only make hard policy choices if the costs of its current policies far outweigh the benefits. U.S. strikes on the Assad regime, if properly calibrated as part of an overall plan to degrade the regime, would force Tehran to become more involved in Syria in order to rescue its stalwart ally. This would be costly for Iran financially, militarily and politically. Those costs would make the Iranian regime and its people reassess aspirations to go nuclear.
Needless to say, such a strategy is bound to be counterproductive, since—by slamming Syria, never mind toppling Assad—Washington is likely to undermine doves and bolster hawks in Tehran and undermine the chances for successful negotiations with Iran’s new president, Hassan Rouhani, who’ll be speaking at the UN General Assembly later this month.
In fact, both Russia and Iran have signaled recently, in the wake of Syria’s obvious deployment and use of sarin gas and other deadly weapons that they might be getting ready to join the rest of the world in condemning Syria’s chemical warfare, and that makes it far more likely that the much-postponed US-Russia “Geneva II” peace conference on Syria might work. The hawkish Washington Post today notes Rouhani’s new administration in Tehran is softening its tone on Syria, and it reports that the new Iranian foreign minister, Javad Zarif, has acknowledged the Syria has erred, saying: “We believe that the government in Syria has made grave mistakes that have, unfortunately, paved the way for the situation in the country to be abused.”
Meanwhile, Russia’s President Vladimir Putin, while issuing scathing denunciations of the coming U.S. attack on Syria, has dropped broad hints that he might be willing to join with other nations if and when the United Nations weapons team concludes that Assad used nerve gas, suggesting that Russia might not block a UN Security Council resolution against Syria. In his much-reported interview with the Associated Press, Putin insisted on waiting for the UN report:
“If there is evidence that chemical weapons have been used, and used specifically by the regular army, this evidence should be submitted to the U.N. Security Council. And it ought to be convincing. It shouldn’t be based on some rumors and information obtained by intelligence agencies through some kind of eavesdropping, some conversations and things like that.”
He said he “doesn’t exclude” backing the use of force against Syria at the United Nations if there is objective evidence proving that Assad’s regime used chemical weapons against its people. But he strongly warned Washington against launching military action without U.N. approval, saying it would represent an aggression. Russia can veto resolutions at the U.N. Security Council and has protected Syria from punitive actions there before.
But a change in tone on the part of Russia and Iran—the latter of whom the Obama administration still refuses to invite to Geneva II if and when it occurs—won’t mean a thing if the object of war with Syria is to send a message to Iran. As Jeffrey Goldberg, writing for Bloomberg, says, for Israel it’s all about Iran:
Prime Minister Benjamin Netanyahu of Israel would prefer that Obama enforce his red line on chemical weapons use, because he would like to see proof that Obama believes in the red lines he draws. From Netanyahu’s perspective, Israel isn’t unduly threatened by Assad. Syria constitutes a dangerous, but ultimately manageable, threat.
Netanyahu believes, of course, that Iran, Syria’s primary sponsor, poses an existential threat to his country, and so would like the Iranians to understand very clearly that Obama’s red lines are, in fact, very red. As Robert Satloff, the executive director of the Washington Institute for Near East Policy, told me last night, the formula is simple: “If the Iranians do not fear Obama, then the Israelis will lose confidence in Obama.”
In his round-robin television appearances on Sunday, Secretary of State John Kerry—now the administration’s über-hawk—repeatedly said that bombing Syria would send a message to Iran. As he told Fox News on Sunday:
“The fact is that if we act and if we act in concert, then Iran will know that this nation is capable of speaking with one voice on something like this, and that has serious, profound implications, I think, with respect to the potential of a confrontation over their nuclear program. That is one of the things that is at stake here.”
Former US secretary of state says information he provided leading to the invasion of Iraq is a “blot” on his record.
Colin Powell, the former US secretary of state, has said he regrets providing misleading intelligence that led the US to invade Iraq, believing it had weapons of mass destruction.
Powell, the first secretary of state in the administration of George W. Bush, the former US president, which declared war on Iraq in 2003, told Al Jazeera on the 10th anniversary of the worst terror attacks on US soil that the information was a “blot on my record”.
“It turned out, as we discovered later, that a lot of sources that had been attested to by the intelligence community were wrong,” Powell said in Washington, DC.
“I understood the consequences of that failure and, as I said, I deeply regret that the information – some of the information, not all of it – was wrong,” said the former chairman of the Joint Chiefs of Staff.
“It has blotted my record, but – you know – there’s nothing I can do to change that blot. All I can say is that I gave it the best analysis that I could.”
Powell, who was secretary of state from 2002 to 2005, gave an elaborate description of Iraq’s weapons programme in the run-up to the war, saying “ambition and hatred” were enough to bring Iraq and al-Qaeda together and build more sophisticated bombs.
“I gave that speech on a four days’ notice based on an intelligence estimate that had been done months before and provided to Congress, and every word in that speech was gone over by the director of the Central intelligence Agency (CIA) and his deputy director and all experts,” he said.
In the United Kingdom, a traditional ally of the US which backed the military campaign, Tony Blair, who was prime minister at the time of the invasion, said Iraq had the capacity to deploy weapons of mass destruction in 45 minutes.
Blair has since been criticised for allegedly exaggerating that claim and for presenting intelligence that overstated the case for going to war. But Powell said he did not exaggerate the information he presented to Congress.
“There is nothing that I made up; there’s nothing that I stuck in there,” he said.
“Some people tried to stick extra things in there that the intelligence community wouldn’t verify and I said ‘no’.
“And so when I presented that information, it was information that the president believed in; information that my colleagues in government believed in.”
Powell said he “presented the best evidence that we had” and that the United Kingdom and other nations believed it.
The US invaded Iraq about 18 months after commercial airliners were hijacked by 19 men affiliated to al-Qaeda and flown into the twin towers of the World Trade Centre in New York.
Up to 3,000 people were killed by the hijackers who also targeted the Pentagon.
The war in Iraq, in which the US lost 6,000 of its soldiers, was preceded by the invasion in 2001 of Afghanistan by Washington.
Afghanistan was then home to Osama bin Laden, the mastermind of the 9/11 attacks and leader of al-Qaeda who was killed in May in Pakistan by US forces after a manhunt lasting nearly a decade.
The Iraq war was based on a lie, and Iran is too
Dead Wrong: Colin Powell’s UN Speech
Conversations w/Great Minds – Craig Unger – Karl Rove’s Secret Kingdom of Power P1
Top GOP Strategist Karl Rove Loses Cool Under Questioning By “Boss Rove” Author Craig Unger
Craig Unger on New Book, “Boss Rove: Inside Karl Rove’s Secret Kingdom of Power.” 2 of 2
Ben Bernanke Is The Most Dangerous Man In US History
US BOND BUBBLE’S READY TO BURST!
Max Keiser: Propped Up Bond Market Set To Burst In April
U.S. Government Bond Bubble to Burst, Faber Says
James Grant and James Turk discuss gold, the Fed and the fiscal situation of the USA
USA Will Die – Economic Collapse 2013 – Jim Rogers
JIM ROGERS – 2013 to Be Bad, ‘God Knows What Will Happen in 2014′
Jim Rogers Predicts Global Depression In 2013-2014
Peter Schiff on Max Keiser – Stopping the Global Financial Crisis
Keiser Report: Psyops & Debt Diets
Max Keiser: Will the next crash be on Bonds?
MAX KEISER: Colossal Collapse Coming! Keiser Report
MAX KEISER: Colossal Collapse Coming! Keiser Report
ALEX JONES & Max Keiser 2013, Year of The GREAT CRASH!
Peter Schiff – Dollar Could Collapse This Fall 2013
Peter Schiff – Economic Collapse 2013
Fed Will Keep Printing Until The Dollar Collapses~ Jim Rickards
Jim Rickards Gold is Money ($7,000 Gold Price)
James Rickards Predicts US Inflation in 2013 due to the Devaluation of the US dollar
Currency Wars: Jim Rickards
Financial Pearl Harbor’ is a Real Threat Warns a Pentagon Adviser
CNBC Global Recession Is Coming – Marc Faber
Dr. Marc Faber – US is in 50-100 trillion worth of debt!
Marc Faber ‘We Are in the End Game’ Part 1
Marc Faber ‘We Are in the End Game Part 2
Marc Faber – We Could See a 1987-Like Market Crash – Be Prepared and Get OUT!
Marc Faber-No Government Complies With Anything
Total Economic Collapse, Death of the Dollar, Impovershment, WWIII, Marc Faber Interview
Gerald Celente Deal Or No Debt Deal, The Debt Still Exists
Bill Gross: Economy Faces Structural Headwinds, “I Think We Are Facing Bubbles Almost Everywhere”
ECONOMIC CRASH WORLDWIDE STARTING
Harry Dent predicts global economic crash in 2013
Planned Economic Collapse 2013-2014
Background Articles and Videos
Meltdown (pt 1-4) The Secret History of the Global Financial Collapse 2010
Meltdown (pt 2-4) The Secret History of the Global Financial Collapse 2010
Meltdown (pt 3-4) The Secret History of the Global Financial Collapse.2010
Meltdown – pt 4-4 The Secret History of the Global Financial Collapse (2010)
The Fall of Lehman Brothers
Goldman Sachs: Power and Peril – Documentary
The Ascent of Money: A Financial History of The World by Niall Ferguson Epsd. 1-5 (Full Documentary)
The Fall of the Dollar – The Death of a Fiat Currency part 1
The Fall of the Dollar – The Death of a Fiat Currency part 2
The First 12 Hours of a US Dollar Collapse
LIFE HIDDEN TRUTH 2013 GLOBAL FINANCIAL CRISIS
Billionaires Dumping Stocks, Economist Knows Why
Despite the 6.5% stock market rally over the last three months, a handful of billionaires are quietly dumping their American stocks . . . and fast.
Warren Buffett, who has been a cheerleader for U.S. stocks for quite some time, is dumping shares at an alarming rate. He recently complained of “disappointing performance” in dyed-in-the-wool American companies like Johnson & Johnson, Procter & Gamble, and Kraft Foods.
In the latest filing for Buffett’s holding company Berkshire Hathaway, Buffett has been drastically reducing his exposure to stocks that depend on consumer purchasing habits. Berkshire sold roughly 19 million shares of Johnson & Johnson, and reduced his overall stake in “consumer product stocks” by 21%. Berkshire Hathaway also sold its entire stake in California-based computer parts supplier Intel.
With 70% of the U.S. economy dependent on consumer spending, Buffett’s apparent lack of faith in these companies’ future prospects is worrisome.
Unfortunately Buffett isn’t alone.
Fellow billionaire John Paulson, who made a fortune betting on the subprime mortgage meltdown, is clearing out of U.S. stocks too. During the second quarter of the year, Paulson’s hedge fund, Paulson & Co., dumped 14 million shares of JPMorgan Chase. The fund also dumped its entire position in discount retailer Family Dollar and consumer-goods maker Sara Lee.
Finally, billionaire George Soros recently sold nearly all of his bank stocks, including shares of JPMorgan Chase, Citigroup, and Goldman Sachs. Between the three banks, Soros sold more than a million shares.
So why are these billionaires dumping their shares of U.S. companies?
After all, the stock market is still in the midst of its historic rally. Real estate prices have finally leveled off, and for the first time in five years are actually rising in many locations. And the unemployment rate seems to have stabilized.
It’s very likely that these professional investors are aware of specific research that points toward a massive market correction, as much as 90%.
One such person publishing this research is Robert Wiedemer, an esteemed economist and author of the New York Times best-selling book Aftershock.
Before you dismiss the possibility of a 90% drop in the stock market as unrealistic, consider Wiedemer’s credentials.
In 2006, Wiedemer and a team of economists accurately predicted the collapse of the U.S. housing market, equity markets, and consumer spending that almost sank the United States. They published their research in the book America’s Bubble Economy.
The book quickly grabbed headlines for its accuracy in predicting what many thought would never happen, and quickly established Wiedemer as a trusted voice.
A columnist at Dow Jones said the book was “one of those rare finds that not only predicted the subprime credit meltdown well in advance, it offered Main Street investors a winning strategy that helped avoid the forty percent losses that followed . . .”
The chief investment strategist at Standard & Poor’s said that Wiedemer’s track record “demands our attention.”
And finally, the former CFO of Goldman Sachs said Wiedemer’s “prescience in (his) first book lends credence to the new warnings. This book deserves our attention.”
In the interview for his latest blockbuster Aftershock, Wiedemer says the 90% drop in the stock market is “a worst-case scenario,” and the host quickly challenged this claim.
Wiedemer calmly laid out a clear explanation of why a large drop of some sort is a virtual certainty.
It starts with the reckless strategy of the Federal Reserve to print a massive amount of money out of thin air in an attempt to stimulate the economy.
“These funds haven’t made it into the markets and the economy yet. But it is a mathematical certainty that once the dam breaks, and this money passes through the reserves and hits the markets, inflation will surge,” said Wiedemer.
“Once you hit 10% inflation, 10-year Treasury bonds lose about half their value. And by 20%, any value is all but gone. Interest rates will increase dramatically at this point, and that will cause real estate values to collapse. And the stock market will collapse as a consequence of these other problems.”
Conservative savior of UK’s economy, Margaret Thatcher dead at 87
By Raymond Thomas Pronk
“Some Socialists seem to believe that people should be numbers in a State computer. We believe they should be individuals. We are all unequal. No one, thank heavens, is like anyone else, however much the Socialists may pretend otherwise. We believe that everyone has the right to be unequal but to us every human being is equally important.”
~Margaret Thatcher, Speech to Conservative Party Conference, October 10, 1975
Ceremonial funeral services with military honors for Margaret Thatcher, former prime minister of the United Kingdom, known as Maggie to her friends and “the Iron Lady” to her opponents, will be held this Wednesday at St Paul’s Cathedral, according to Prime Minister David Cameron’s office.
Her legacy was to change her country’s dominant ideology from collectivist state socialism implemented in decades of Labour Party policies to an individualist market capitalism implemented in Conservative Party policies. In the process she returned the U.K. to eight years of economic growth and prosperity in the 1980s.
Thatcher supported President Ronald Reagan and the United States in defeating communism in the Soviet Union and winning the Cold War.
Thatcher had been in declining health for a number of years and died peacefully in her sleep the morning of April 8 following a stroke.
British Prime Minister David Cameron said of Thatcher, “As our first woman prime minister, Margaret Thatcher succeeded against all the odds and the real thing about Margaret Thatcher is that she didn’t just lead our country, she saved our country, and I believe she’ll go down as the greatest British peacetime prime minister.”
President Barack Obama said, “The world has lost one of the great champions of freedom and liberty and America has lost a true friend.” Obama said she had taught “our daughters that there is no glass ceiling that can’t be shattered.”
John Boehner, speaker of the house, said, “The greatest peacetime prime minister in British history is dead. Margaret Thatcher, a grocer’s daughter, stared down elites, union bosses and communists to win three consecutive elections, establish conservative principles in Western Europe and bring down the Iron Curtain. There was no secret to her values – hard work and personal responsibility – and no nonsense in her leadership.”
Nancy Reagan, widow of former President Ronald Reagan said: “Ronnie and Margaret were political soul mates, committed to freedom and resolved to end Communism. As Prime Minister, Margaret had the clear vision and strong determination to stand up for her beliefs at a time when so many were afraid to ‘rock the boat.’ As a result, she helped to bring about the collapse of the Soviet Union and the liberation of millions of people.”
In 1975 Thatcher was elected leader of the Conservative Party. She was subsequently elected prime minister of the United Kingdom on May 4, 1979. Thatcher served three terms from 1979 to 1990 becoming Britain’s longest-serving prime minister in over a century as well as the most dynamic, inspirational and controversial.
When Thatcher took office, the British economy was in shambles and in recession, inflation was rising and the government faced possible bankruptcy. This was a direct result of many years of Labour Party socialistic policies of out-of-control government spending, confiscatory taxation and the nationalization or state control of many industries including coal, steel, railways, gas, electricity, water, trucking, airlines and telecommunications.
The writings of Austrian economist and political philosopher, Friedrick A. Hayek, winner of the 1973 Nobel Prize in Economics, in particular his book, “The Road to Serfdom”, inspired and guided Thatcher’s economic policies.
Thatcher turned the economy around and made Britain governable again by taking on and taming the trade unions with labor reform legislation. No longer were the unions able to dictate the nation’s economic policies. Under Thatcher the British government pursued a policy of selling state assets with privatization of industry, thus reversing the Labour Party’s nationalization of industry.
When the Argentina government under the fascist junta invaded the British protectorate of the Falkland Islands in April 1982, she led the U.K. to victory. The Argentinians soon toppled the military junta.
In October 1984 there was an assassination attempt on her life when a hotel in Brighton where she and her husband and other members of her cabinet were staying was bombed by Irish Republican Army (IRA) terrorists.
Thatcher supported Reagan in opposing communism and confronting the “evil empire” of the Soviet Union. She was instrumental in the introduction of cruise missiles in Britain to counter the Soviet military threat. She allied the United Kingdom with the United States against the communist expansion and subversion in the West and the winning of the Cold War with the Soviet Union.
A concise biography of her life can be found at the Margaret Thatcher Foundation web site http://www.margaretthatcher.org/essential/biography.asp. An excellent critical biography is Claire Berlinsky’s “There is No Alternative: Why Thatcher Matters” and related interview on YouTube video titled, “Thatcher & More with Claire Berlinski.”
An excellent multi-part documentary about Thatcher produced in 2008 by the conservative paper, The Daily Telegraph, can be viewed on YouTube as well as an entertaining movie about her early political career titled, “Margaret Thatcher – The Long Walk to Finchley.”
Her husband of more than 50 years, Denis Thatcher, died in June 2003. She is survived by her twin son, Mark, and daughter, Carol, born in 1953.
Thatcher remains a controversial figure in Britain. She was loved and revered by many as well as loathed and reviled by some. She will be remembered by all who value economic freedom and individual liberty.
“Freedom to choose is something we take for granted—until it is in danger of being taken away. Socialist governments set out perpetually to restrict the area of choice, Conservative governments to increase it. We believe that you become a responsible citizen by making decisions yourself, not by having them made for you.”
~Margaret Thatcher, Speech to Conservative Party Conference, October 10, 1975
David Cameron’s Commons tribute to Margaret Thatcher in full
Margaret Thatcher – Falklands War – YouTube
MARGARET THATCHER – Pt 1 The Making of Margaret (Telegraph Documentary)
MARGARET THATCHER – Pt 2 The Falklands (Telegraph Documentary)
MARGARET THATCHER – Pt 3 World Stage (Telegraph Documentary)
MARGARET THATCHER – Pt 4 The Age of Dissent (Telegraph Documentary)
MARGARET THATCHER – Pt 5 Taking on the Unions (Telegraph Documentary)
MARGARET THATCHER – Pt 6 Public Image, Private Life. (Telegraph Documentary)
MARGARET THATCHER – Pt 7 The Fall (Telegraph Documentary)
MARGARET THATCHER – Pt 8 The Legacy (Telegraph Documentary)
Margaret Thatcher – The Long Walk To Finchley Full Movie
Getting free over the air HDTV with Mohu Leaf Plus Indoor Antenna
Getting free over the air full 1080i and 720p HDTV with Mohu Leaf Plus Indoor Antenna
Know How… 17: Get Free HDTV
Satellite Direct Reviews – The Shocking Truth About Satellite Direct.
Satellite Direct TV, Ultimate IPTV
Satellite Direct TV PC Preview Complete Walk Through
SatelliteDirect Review — Is it for real or just another scam?
SatelliteDirect™’s software technology taps into more than 3,500 TV channels worldwide right over the Internet. Now you can enjoy more channels than your cable and satellite TV combined for a one-time fee less than one month of your monthly cable bill.
You don’t need a satellite dish, receiver or any other equipment to use our software. All you need is a computer and an internet connection. Simply download our software and you are ready to enjoy over 3,500 channels worldwide.
You can watch TV right from your laptop or desktop computer anytime or anywhere in the world. Or connect your computer directly to your TV set – once you are a member we will show you how!
Passerby pushes suicide jumper off bridge in frustration
China bridge jumper ‘gets a push’ 1
The Deal with Jack Hunter: Ignoring Rand Paul’s Budget
Sen. Rand Paul: People in Congress Don’t Deserve to Manage Any More Money
Rand Paul: We Should Let Dems Raise Taxes And Then Let Them Own It -
Rand Paul: We Should Let Democrats Raise Taxes
Rand Paul On The Fiscal Cliff: Spending Cuts Are Fiction, The Tax Increases Should Be Too
Sen. Rand Paul on $500B in Spending Cuts: The American People Are Ready
Senator Rand Paul on Neil Cavuto about $500 Billion spending cut S.162
TEA PARTY THE ANSWER TO GOVT. SPENDING?: Sen. Rand Paul: $500 billion budget cuts
Rand Paul: I’m Mad At My Dad! I Had 500 Billion In Cuts, Now He Comes Out With A Trillion!
Since President Obama wants to grow government and make all Americans dependent upon the Government and Democratic Party, let the Democratic Party and Obama jump from the fiscal cliff.
They will own the resulting recession and will be committing political suicide.
Do not negotiate with a person or party that wants to jump off the cliff by raising taxes on all Americans.
The Republican Party should stop negotiating with the person responsible with the massive spending problem resulting in huge deficits and over $5 trillion of new national debt.
Neither the Democratic Party led by President Obama, Senate Majority Leader Harry Reid and House Minority Leader Nancy Pelosi nor the Republican Party led by House Speaker Boehner, House Majority Leader Eric Cantor and Senate Minority Leader Mitch McConnell, are capable of balancing the budget of the U.S. government.
The table below summarizes the failed 10 year record of both political parties in controlling government spending that have produced massive fiscal-year deficits and an ever increasing national debt.
Summary of Tax Receipts and Spending Outlays of theUnited States Government for Fiscal Years 2002-2012[in million of dollars]
Deficits (+) or Surplus (-)
Source: Department of the Treasury, Final Monthly Treasury Statements of Receipts and Outlays of the United States Government for Fiscal Years 2002-2012, table 1.
Simply tell the American people that the Republican Party wants no tax increase for any American and is willing to have a Fiscal Year 2014 budget of $3 trillion that represents a real spending cut of over $500 billion.
Obama rejected the proposal and jumped. Rest in peace.
Pass Senator Rand Paul’s $500 billion spending cuts for Fiscal Year 2014!
FINANCIAL MANAGEMENT SERVICE STAR - TREASURY FINANCIAL DATABASE TABLE 1. SUMMARY OF RECEIPTS, OUTLAYS AND THE DEFICIT/SURPLUS BY MONTH OF THE U.S. GOVERNMENT (IN MILLIONS) ACCOUNTING DATE: 11/12 PERIOD RECEIPTS OUTLAYS DEFICIT/SURPLUS (-) + ____________________________________________________________ _____________________ _____________________ _____________________ PRIOR YEAR OCTOBER 163,072 261,539 98,466 NOVEMBER 152,402 289,704 137,302 DECEMBER 239,963 325,930 85,967 JANUARY 234,319 261,726 27,407 FEBRUARY 103,413 335,090 231,677 MARCH 171,215 369,372 198,157 APRIL 318,807 259,690 -59,117 MAY 180,713 305,348 124,636 JUNE 260,177 319,919 59,741 JULY 184,585 254,190 69,604 AUGUST 178,860 369,393 190,533 SEPTEMBER 261,566 186,386 -75,180 YEAR-TO-DATE 2,449,093 3,538,286 1,089,193 CURRENT YEAR OCTOBER 184,316 304,311 119,995 NOVEMBER 161,730 333,841 172,112 YEAR-TO-DATE 346,045 638,152 292,107 - - - - - - - - 0REPORT ID: STM0P081 USER ID : DATE: 2012-12-10 TIME: 18.47.19 PAGE http://www.fms.treas.gov/mts/mts1112.txt
HD 2K 4K Video Time Lapse Stock Footage Showreel 2011 – Night Rush Around the World 2
Ultra High Definition Television: Threshold of a new age
A look at 4K TV, with Tech Expert Marc Saltzman at CES 2012
Sony Bravia KD-84X9005 84-inch 4K HDTV (IFA 2012)
VIDEO: Sony’s Ultra High-Definition 84-Inch Television
SONY 84 INCH 4K UHD TV WTF?!?!
Sony’s Ultra High Definition TV will come with world’s first 4K delivery system
Démo TV Sony 4K Ultra HD 84″ (214cm)
Ultra high-definition 84-inch TV coming to the U.S. with a $25,000 (£15,614) price tag
Sony is releasing its first ultra-high-definition television, a massive 84-inch set that retails for $25,000 (£15,614) and features nearly four times the resolution of typical high-definition TVs
Ultra HD is widely regarded as the next evolution in TV technology
“…The new, restored and rebooted films from Sony Pictures are among the content coming pre-loaded on a video player bundled with Sony’s first ultra-high-definition television, a massive 84-inch set that retails for $25,000 (£15,614) and features nearly four times the resolution of typical high-definition TVs.
‘People ask the question, “Do I need to get a bigger house to fit an 84-inch TV?”’ said Chris Cookson, president of Sony Pictures Technologies.
‘The answer is that 25 inches was right for standard definition; 50 inches was right for high-definition; and 84 inches is right now that we’re going ultra-high-def.’
Ultra HD is widely regarded as the next evolution in TV technology, but there’s currently a lack of content that takes advantage of the vast resolution, though Ultra HD sets are equipped to upscale lower resolution video.
Sony Corp. is hoping to overcome that pitfall that with this new player.
The Japanese electronics giant debuted the hard-disc server – hidden in a cabinet underneath the behemoth television – at a posh invite-only party Thursday at a private mansion in Santa Monica that featured a performance by John Legend.
The video player will include 4K content such as short films, concerts and 10 feature-length movies, including ‘The Other Guys,’ ‘Salt’ and ‘The Bridge on the River Kwai.’
Sony’s TV will also come with an Xperia Tablet S, which can be used as a touchscreen remote control.