Archive for December, 2014

James Bamford — The Shadow Factory The Ultra Secret NSA from 911 to the Eavesdropping on America — Videos

Posted on December 27, 2014. Filed under: Blogroll, Books, College, Communications, Constitution, Corruption, Crime, Data, Demographics, Diasters, Documentary, Economics, Education, Energy, Family, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Fraud, Freedom, government, government spending, Inflation, Investments, Language, Law, liberty, Life, Links, Literacy, media, National Security Agency (NSA_, Natural Gas, Non-Fiction, Nuclear Power, Oil, People, Philosophy, Photos, Press, Psychology, Radio, Rants, Raves, Regulations, Resources, Strategy, Talk Radio, Taxes, Terrorism, Unemployment, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom, Writing | Tags: , , , , , , , , , , , , |


9/11 NSA + CIA : James Bamford’s documentary

James Bamford Describes His NEW Interview With Edward Snowden

James Bamford on NSA Leaks – Charlie Rose 06/13/2013

James Bamford: Inside the NSA’s Largest Secret Domestic Spy Center

James Bamford The Shadow Factory The Ultra Secret NSA from 911 to the Eavesdropping on America 2008

DIGITAL AGE – Was 9/11 A Digital Failure? – James Bamford – March 8, 2009

James Bamford on Declassified History, NSA & the Need for More Investigative Journalism

James Bamford – Confronting the Surveillance Society (2007)

“The NSA Is Lying”: U.S. Government Has Copies of Most of Your Emails Says NSA Whistleblower

An Inside Look at the NSA With Whistleblower William Binney (Part 1 of 2)

An Inside Look at the NSA With Whistleblower William Binney (Part 2 of 2)

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA whistleblower William Binney Keynote at HOPE Number Nine

He told you so: Bill Binney talks NSA leaks

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

PBS Nova S36E11 The Spy Factory Full Documentary

Inside The NSA~Americas Cyber Secrets

Full Documentaries – National Security Agency Secrets – (NSA) Special Documentary

NSA can spy on 98 percent of the world

Glenn Becks “SURVEILLANCE STATE”

Glenn Greenwald on Domestic Surveillance: NSA Warrantless Wiretapping Controversy (2006)

Enemy of the State Full Movie Streaming

http://omomovie.com/play/play.php?movie=0120660

Yahoo Releases Documents Proving NSA Forced Them To Violate User Privacy

The Shadow Factory

James Bamford

V. James Bamford (born September 15, 1946) is an American bestselling author and journalist noted for his writing about United Statesintelligence agencies, especially the National Security Agency (NSA).[1] Bamford has taught at the University of California, Berkeley, as a distinguished visiting professor and has written for The New York Times Magazine, The Atlantic, Harper’s, and many other publications. In 2006, he won the National Magazine Award for Reporting for his article, “The Man Who Sold The War,” published in Rolling Stone

Biography

Bamford was born on September 15, 1946 and raised in Natick, Massachusetts. During the Vietnam War, he spent three years in the United States Navy as an intelligence analyst. He was assigned to a National Security Agency unit in Hawaii — as part of his three years of active duty in the Navy during the Vietnam War. With the G.I. Bill he would earn his law degree as Juris Doctor, International Law from Suffolk University Law School in Boston, Massachusetts.[2] Then, as a reservist in law school, he blew the whistle on the NSA when he stumbled across a program that involved illegally eavesdropping on US citizens. He testified about the program in a closed hearing before the Church Committee, the congressional investigation that led to sweeping reforms of US intelligence abuses in the 1970s.[3][4]

After graduation, he decided to write his first book about the NSA: The Puzzle Palace in 1982. At several points he was threatened with prosecution under the Espionage Act, a 1917 law. Those threats had no basis and were never carried out. Rather than practice law, he entered the field of journalism, becoming an expert on the then highly secretive NSA. His book was researched through the extensive use of the Freedom of Information Act (FOIA).[5] As a then super-secret agency, NSA was concerned about its unveiling to the world; accordingly, the government reclassified certain documents in an effort to stop publication.[6][7] The publication of his book resulted in threats of prosecution, when the Department of Justice claimed that he was holding classified documents. His counter argument was that the documents had been given to him under review by the Carter Administration and were declassified when he got them; under an Executive Order in place at the time, documents that had been declassified could not be “reclassified”. President Ronald Reagan later issued a new Executive Order to make it possible to reclassify documents, but that could not be applied against Bamford due to Constitutional prohibition against ex post facto law.[8][9]

He next published Body of Secrets, also about the NSA, in 2001, and A Pretext for War (2004). His 2008 book, The Shadow Factory, became a New York Times best-seller and was named by The Washington Post as one of “The Best Books of 2008.” It was the third book in his NSA trilogy and focused on the NSA involvement in the 9/11 investigations and intelligence failures. The NOVA‘s The Spy Factory[10] was based on this book.

Bamford now lectures nationally in the United States and was a distinguished visiting professor at the University of California, Berkeley. He also spent nearly a decade as the Washington investigative producer for ABC‘s World News Tonight. In 2006, he received the National Magazine Award for Reporting, the top prize in magazine writing.

Bamford was also a consultant for the defense of NSA whistle blower Thomas Andrews Drake.[11]

In 2014, Bamford conducted the lengthiest in person interview to date with NSA whistleblower Edward Snowden in Moscow. The interview was published in Wired magazine in August of that year with the title “The Most Wanted Man In the World”.[12]

Publication

Books

Articles

Date Publication Title
8/9/82 Newsday (Viewpoints Section) “The UN: A Gold Mine for U.S. Intelligence”
11/6/82 The Nation “How I Got the NSA Files . . . How Reagan Tried to Get Them Back”
12/82 The New York Times Book Review “On the Trail of a Mole”
9/9/83 The Boston Globe (Op-Ed Section) “Victim of the Long Electronic War”
10/83 Boston Observer “How We Know What We Know About KAL 007”
12/4/83 The Washington Post Magazine “Big Brother is Listening”
1/8/84 The Washington Post Magazine “The Last Flight of KAL 007: How the U.S. Watches The Soviets in the Far East”
1/13/85 The New York Times Magazine “America’s Supersecret Eyes in Space”
4/21/85 Los Angeles Times Book Review “Black Box: KAL 007 and the Superpowers; KAL Flight 007: The Hidden Story”
6/9/85 The Washington Post Book World “Stansfield Turner and the Secrets of the CIA”
4/6/86 The Washington Post Book World “The Spy Plane That Flew Into History”
5/86 Proceedings (U.S. Naval Institute) “Naval Review Issue, The Walker Spy Case: Navy Medicine, Maritime Terrorism”
5/24/86 The Boston Globe (Op-Ed Section) “U.S. Satellite Photos of Plant Should Have Been Released”
7/6/86 Los Angeles Times (Op-Ed Section) “Searching for Security, Casey Fires at the Press”
7/13/86 The New York Times Book Review “Keeping Intelligence Smart”
8/3/86 The New York Times Book Review “When Ideology Was Thicker Than Money”
9/28/86 Los Angeles Times Book Review “Shootdown, The Target is Destroyed”
10/5/86 Los Angeles Times (Op-Ed Section) “CIA Gets Billing Again in Nicaragua, as Covert Action Becomes the Norm”
11/9/86 Los Angeles Times (Op-Ed Section) “Satellites Show a World of Secrets, to Rival Powers and Now the Press”
1/4/87 Los Angeles Times (Op-Ed Section) “Reagan CIA: Arrogance Instead of Oversight”
1/18/87 The New York Times Magazine “Carlucci And The N.S.C.”
2/8/87 Los Angeles Times (Op-Ed Section) “An Aspirin for the CIA, But Major Surgery Needed”
2/8/87 The Washington Post Book World “Bankrolling International Murder and Extortion”
6/14/87 Los Angeles Times (Op-Ed Section) “Ghosts of CIA Haunt Hearings”
10/11/87 Los Angeles Times Magazine “They Also Serve Who Watch and Listen”
10/18/87 The Washington Post Book World “The Nugan Hand Affair: Banking on Espionage”
11/29/87 Los Angeles Times (Op-Ed Section) “Carlucci: Big Man About Intelligence”
2/21/88 Los Angeles Times (Op-Ed Section) “FBI: If It’s Under Cover, It May Be Out of Control”
3/6/88 Los Angeles Times Magazine “Taking on The Mob”
5/29/88 Los Angeles Times (Op-Ed Section) “Fighting the Drug War, Congress Opens Door to Intelligence Misdeeds”
6/88 Proceedings (U.S. Naval Institute) “Book Review, Merchants of Treason”
6/26/88 Los Angeles Times (Op-Ed Section) “A Pentagon of Impurity”
7/3/88 The Washington Post Book World “Where Secret Armies Clash By Night”
8/7/88 The New York Times Book Review “A Mole Without Portfolio”
9/9/88 The New York Times (Op-Ed Section) Reagan’s Done Nothing to Stop the Spies
2/9/92 The New York Times Book Review “Of Cabals and Coups”
1/29/95 The New York Times Book Review “The View From the KGB”
3/3/96 Los Angeles Times (Op-Ed Section) “Has a 30-Year Mystery Unraveled?”
8/20/98 The New York Times (Op-Ed Section) “Our Best Spies are in Space”
8/26/99 The New York Times (Op-Ed Section) “Spy Stories”
11/14/99 The Washington Post (Sunday Outlook Section) “Loud and Clear: The Most Secret of Secret Agencies Operates Under Outdated Laws”
3/18/01 The New York Times Magazine “My Friend The Spy: Robert Hanssen is Accused of Deceiving the FBI. If so, He Deceived Me Too.”
4/5/01 The New York Times (Op-Ed Section) “The Danger of Spy Planes”
4/12/01 USA Today (Op-Ed Section) “Rethink Spy Missions”
8/8/01 The Guardian (London) “Attack on the USS Liberty”
8/9/01 The Guardian (London) “The Cover-Up”
8/28/01 The New York Times (Op-Ed Section) “Guard the Secrets, Then Catch the Spies”
9/18/01 The New York Times “Of Atomic Secrets, Loyalty and Bitter Deceit”
12/01 Nieman Reports (Harvard) “Is The Press Up to The Task of Reporting The Stories of September 11?”
1/20/02 The Washington Post Book World “The Wrong Man”
2/7/02 The New York Times “A Former CIA Cowboy and His Disillusioning Ride”
6/2/02 The Washington Post (Sunday Outlook Section) “Intelligence Failures”
7/19/02 USA Today (Op-Ed Section) “Linguist Reserve Corp Answers Terror Need”
8/27/02 The New York Times (Week in Review Section) “Washington Bends The Rules”
8/29/02 USA Today (Op-Ed Section) Bush Wrong to Use Pretext as Excuse to Invade Iraq
9/8/02 The New York Times (Week in Review Section) “War of Secrets”
9/8/02 The Washington Post Book World “Strategic Thinking”
9/14/02 The Guardian (London) “What Big Ears You Have”
9/17/02 USA Today (Op-Ed Section) “Untested Administration Hawks Clamor for War”
10/24/02 USA Today (Op-Ed Section) “Maintain CIA’s Independence”
11/24/02 The New York Times (Week in Review Section) “How To (De-)Centralize Intelligence”
12/15/02 The Washington Post Book World “Shadow Warriors”
3/23/03 Los Angeles Times Book Review “Ike as Spymaster: Secrets on High”
4/27/03 The Washington Post Book World “A Look Over My Shoulder: Richard Helms at the CIA”
7/4/03 The New York Times “The Labyrinthine Morass of Spying in the Cold War”
2/29/04 The Washington Post Book World “Sowing the Whirlwind”
5/9/04 Los Angeles Times Book Review “Secret Warriors: The Great Game”
6/13/04 The New York Times (Op-Ed Section) “This Spy For Rent”
2/20/05 The Washington Post Book World “We’re Watching Them”
3/28/05 The American Conservative “Breeding Terror: The Intelligence Community Analyzes a Counterproductive War”
12/1/05 Rolling Stone “The Man Who Sold The War”
12/25/05 The New York Times (Week in Review Section) “The Agency That Could Be Big Brother”
1/9/06 The New York Times “Where Spying Starts and Stops”
4/1/06 The Atlantic Monthly “Big Brother is Listening”
8/10/06 Rolling Stone “The Next War: Iran”
8/20/06 The New York Times Book Review “Intelligence Test”
12/12/06 The Washington Post ‘Curveball’ And A Slam Dunk
1/31/07 The New York Times Bush Is Not Above the Law
3/15/12 Wired The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)”
6/12/13 Wired The Secret War
10/2/14 First Look Media The NSA and Me

See also

References

  1. Jump up^ Scott Shane (October 10, 2008). “Decades on the Trail of a Shadowy Agency”. The New York Times. Retrieved 2011-03-08. For 30 years, on a sometimes lonely hunt, James Bamford has pursued that great white whale of American intelligence, the National Security Agency. It has been a jarring ride at times.
  2. Jump up^ “James Bamford”. Random House. Retrieved 2011-03-08. James Bamford was raised in Natick, Massachusetts, and spent three years in the Navy before attending law school in Boston on the G.I Bill. After graduation, intrigued by the machinations of the Watergate scandal, he gravitated toward journalism. However, rather than pursue a newspaper career he decided instead to write a book. …
  3. Jump up^ The Most Wanted Man In the World
  4. Jump up^ Bamford, “The NSA and Me,” The Intercept, 10/02/2014.https://firstlook.org/theintercept/2014/10/02/the-nsa-and-me/
  5. Jump up^ National Security Agency: “American-Cryptology-during-the-Cold-War-1945-1989-Book-IV-Cryptologic-Rebirth-1981-1989”
  6. Jump up^ “Bamford, J. The Puzzle Palace. 1982”. NameBase. Archived from the original on 2012-01-16. Retrieved 2010-08-12.
  7. Jump up^ “Report on a James Bamford Talk at Berkeley”. Lewrockwell.com. 2002-02-11. Retrieved 2010-08-12.
  8. Jump up^ James Bamford: Inside the NSA’s Largest and Most Expansive Secret Domestic Spy Center 2 of 2 on YouTube, Democracy Now, Bamford interview with Amy Goodman and Nermeen Shaikh. 2012 Mar 12 (via youtube)
  9. Jump up^ [1]|Bamford, “The NSA and Me,” The Intercept, 10/02/2014.
  10. Jump up^ PBS Spy Factory web page
  11. Jump up^ Drake pleads guilty to misdemeanor in NSA espionage case, Tricia Bishop, 6 10 2011
  12. Jump up^ The Most Wanted Man In the World

External links

.http://en.wikipedia.org/wiki/James_Bamford

National Security Agency

The National Security Agency (NSA) is a United States intelligence agency responsible for global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes – a discipline known as Signals intelligence (SIGINT). NSA is also charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] The agency is authorized to accomplish its mission through clandestine means,[10] among which are bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13]

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by Harry S. Truman in 1952. Since then, it has become one of the largest of U.S. intelligence organizations in terms of personnel and budget,[6][14] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreignhuman espionage, the NSA has no authority to conduct human-source intelligence gathering, although it is often portrayed doing so in popular culture. Instead, the NSA is entrusted with coordination and deconfliction of SIGINT components of otherwise non-SIGINT government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[15] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service(CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on prominent anti-Vietnam warleaders or economic espionage. In 2013, the extent of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide and tracks the movement of hundreds of millions of people using cellphones. It has also created or maintained security vulnerabilities in most software and encryption, leaving the majority of the Internet susceptible to cyber attacks from the NSA and other parties. Internationally, in addition to the various data sharing concerns that persist, research has pointed to the NSA’s ability to surveil the domestic internet traffic of foreign countries through “boomerang routing”.[16]

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipherdecryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau and Military Intelligence Branch, Section 8 (MI-8). It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[17][18]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[19]

MI-8 also operated the so-called “Black Chamber“.[20] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuadedWestern Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[21]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[22]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[19]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[23] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[23]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[23] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[24] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[24] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[24] In December 1951, President Harry S. Trumanordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[25]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[26] Since President Truman’s memo was a classified document,[26] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[27]

Vietnam War

Main article: Project MINARET

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyerUSS Maddox during the Gulf of Tonkin incident.[28]

A secret operation code-named “MINARET” was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders including Dr. Martin Luther King, and prominent U.S. journalists and athletes who criticized the Vietnam War.[29] However the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal.”[29]

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate Scandal, a congressional hearing in 1975 led by Sen. Frank Church[30] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agencyGovernment Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[31] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[32] Senator Frank Churchuncovered previously unknown activity,[32] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[33] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[34]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[32]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[35][36]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[37] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[38] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[38] NSA employees must be retired for more than fifteen years to qualify for the memorial.[38]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[39]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a ‘privacy mechanism’; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[40]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004; it was late, over budget, and didn’t do what it was supposed to do. The Baltimore Sun ran articles about this in 2006–07. The government then raided the whistleblowers’ houses. One of them, Thomas Drake, was charged with violating 18 U.S.C. § 793(e) in 2010 in an unusual use of espionage law. He and his defenders claim that he was actually being persecuted for challenging the Trailblazer Project. In 2011, all 10 original charges against Drake were dropped.[41][42]

Turbulence started in 2005. It was developed in small, inexpensive ‘test’ pieces rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[42] It was to be a realization of information processing at higher speeds in cyberspace.[43]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.Main article: Global surveillance disclosures (2013-present)

Scope of surveillance

It was revealed that the NSA intercepts telephone and internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[44] and “commercial secrets”.[45] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[46][47][48] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion”(RAS).[46][49]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[50] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[51][52]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing them to map people’s movements and relationships in detail.[53] It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[54] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[55] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[56][57]

Domestically, the NSA collects and stores metadata records of phone calls,[58] including over 120 million US Verizon subscribers[59] as well as internet communications,[54] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[60] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[61]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[62]

According to a report in The Washington Post in July 2014, relying on information furnished by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, message texts, and online accounts, that support the claim.[63]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[64] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[65] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[66] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[67] and that NSA officers have even used data intercepts to spy on love interests.[68] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[69] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[70][71] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign internet intercepts was “fundamentally different from what the court had been led to believe”.[69] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[55]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December, 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[72]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[73]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[74]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and internet traffic are collected, but no actual message contents.[75] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[65]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[76] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[77][78][79]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[80][81] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[82][83] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[84]

Organizational structure

Keith B. Alexander, the former director of the National Security Agency

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[85]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[86]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[87][88]

Structure

As of 2013 NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit. New information about NSA units was revealed in top secret documents leaked byEdward Snowden since June 2013.

The main elements of the organizational structure of the NSA are:[89]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as buggingcomputers throughout the world, using the expertise of both agencies.[90]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[91]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[92]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[93]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[94] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[94] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[95]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[96]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[97]

There’s also an office of Information Sharing Services (ISS), led by a chief and a deputy chief.[98]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[99]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[100]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[101]

In 2012, the NSA said more than 30,000 employees worked at Ft. Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[102] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[103]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the House Armed Services Committee revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[104] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[104]

Edward Snowden‘s leaking of PRISM in 2013 caused the NSA to institute a “two-man rule” where two system administrators are required to be present when one accesses certain sensitive information.[103] Snowden claims he suggested such a rule in 2009.[105]

Polygraphing

Defense Security Service(DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[106] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[106] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts aperiodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[107]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[107] NSA’s brochure states that the average test length is between two and four hours.[108] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[109] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[106]

In 2010 the NSA produced a video explaining its polygraph process.[110] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the website of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[111] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[110] George Maschke, the founder of the website, accused the NSA polygraph video of being “Orwellian“.[111]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[112]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee, the Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[104]

Insignia and memorials

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[113] The eagle represents the agency’s national mission.[113] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[113] The key is taken from the emblem of Saint Peter and represents security.[113]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[114] The agency adopted its first of two emblems in 1963.[114] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[115]

The NSA’s flag consists of the agency’s seal on a light blue background.

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[116] The USS Liberty incident in 1967 andUSS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[116]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[117] It is made of black granite, and has 171 names (as of 2013) carved into it.[117] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[117]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[118] and 25 mi (40 km) northeast of Washington, DC.[119] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[120][121] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[122]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[123] Built on 350 acres (140 ha; 0.55 sq mi)[124] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[125] the site has 1,300 buildings and an estimated 18,000 parking spaces.[119][126]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[127] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[127] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[127]

The facility has over 100 watchposts,[128] one of them being the visitor control center, a two-story area that serves as the entrance.[127] At the entrance, a white pentagonal structure,[129] visitor badges are issued to visitors and security clearances of employees are checked.[130] The visitor center includes a painting of the NSA seal.[129]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[131] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[129] NSA headquarters has its own post office, fire department, and police force.[132][133][134]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[135]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[123]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[136]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[137] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[123] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[136]

One estimate put the potential for power consumption by the new Utah Data Center at $40 million per year.[138]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C.. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[139]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[140]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[140] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[141] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[140] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[142] The four NSA buildings became known as the “Big Four.”[142] The NSA director moved to 2B when it opened.[142]

Computing

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[143]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[144] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[132] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[132] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[132] and initially uses 60 megawatts of electricity.[145]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[132] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[132]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[138] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[138] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[138]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[146] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[135][138]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[147] It is expected to be operational by September 2013.[138]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[148] the latter expansion expected to be completed by 2015.[149]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[150] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[151] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[152]As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[150]

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[149]

International stations

Following the signing in 1946–1956[153] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and Echelon,[154] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton,Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[155] New Zealand.[156]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[157] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[158]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, nearFrankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[159]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe inWiesbaden, Germany.[160] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[160]

Operations

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[161]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[162]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes andciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[163]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[164] Today it is a legacy system, and several NSA stations are closing.[150]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[165] was reported to be in command of the operation of the so-called Echelon system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[166]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[167] Investigative journalist Duncan Campbell reported in 1988 on the Echelon surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[168] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[169]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[170][171]

Data mining

Protesters against NSA data mining in Berlin wearing Bradley Manning andEdward Snowden masks.

The Real Time Regional Gateway was a data collection program introduced in 2005 in Iraq by NSA during the Iraq War. It consisted of gathering all Iraqi electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[172] Glenn Greenwald of The Guardian believes that the “collect it all” strategy introduced by NSA director Alexander shows that “the NSA’s goal is to collect, monitor and store every telephone and internet communication” worldwide.[173] The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[174]

The NSA began the PRISM electronic surveillance and data mining program in 2007.[175][176] PRISM gathers communications data on foreign targets from nine major U.S. internet-based communication service providers: Microsoft,[177] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube andApple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers. Another program, Boundless Informant, employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA, including that gathered by way of the PRISM program.[178]

Encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of encryption standards that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[179] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[180] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[179]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor, the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts, and readers of the Linux Journal.[181][182]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[citation needed]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[183] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[184] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[184]

These activities, especially the publicly acknowledged domestic telephone tapping and call database programs, have prompted questions about the extent of the NSA’s activities and concerns about threats to privacy and the rule of law.[citation needed]

George W. Bush administration

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[185]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[186]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[187]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[188][189]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[190] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[191] based on documentation provided by former AT&T technician Mark Klein.[192]

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[193]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[194]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[195] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on 11 April that NSA had no advance knowledge of Heartbleed.[196]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[197][198]

Domestic surveillance under Barack Obama

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[199] United States Attorney General Eric Holderresumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[200]

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[201][202]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[203]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[204]

Polling

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[205] Rasmussen Reports found that 59% of Americans disapprove,[206] Gallupfound that 53% disapprove,[207] and Pew found that 56% are in favor of NSA data collection.[208]

Terrorist Attacks prevented by Domestic Surveillance

2009 New York City Subway bomb plot

According to General Keith Alexander, the director of the NSA, in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack. The NSA tagged Zazi as a possible threat because he was contacting people affiliated with terrorist activity through emails, which the NSA was able to obtain through one of PRISM’s dragnets. The NSA tipped off the FBI, which began a program called Operation High-Rise. Operation High-Rise discovered that Zazi was planning to suicide bomb the New York City subway. Zazi called off the attacks after receiving a tip about law-enforcement inquiries and was later arrested.[209][210]

International activity

Telecommunication records

Edward Snowden revealed in June 2013 that between 8 February and 8 March 2013 NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, including in Germany, United Kingdom and France. NSA made 70.3 million recordings of French citizens’ telephone data from 10 December 2012 to 8 January 2013.[211]

Software backdoors

Linux kernel

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on 18 September 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[212]However later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[213]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

Nils TorvaldsLIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[214]

Microsoft Windows

Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[215][216]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic internet traffic of foreign countries.[16] Boomerang routing occurs when an internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian internet service providers.[16]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald’s book No Place to Hide details how the agency’sTailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[217]

Role in scientific research and development

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[218]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991-97

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and publicblock cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[219][220] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[221]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to DES, the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[222] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[223]

NSA encryption systems

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[224]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[225][226]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[227]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[226]

STU-III secure telephones on display at the National Cryptologic Museum

The NSA oversees encyption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NISTand are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[223]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[233]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[234][235] since fundamental modifications have been made to Keccak in order to turn it into a standard.[236] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[234]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of abackdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[237]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[238][239] Both NIST and RSA are now officially recommending against the use of this PRNG.[240][241]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[242] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[243] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[244][245]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[246][247] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[248][249] It is funded by theComprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[250] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[251]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[252]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[253] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[254]

NSANet (NSA’s Intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access toSIPRNET, GWAN, NSANET, andJWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[255] It is a classified network,[256] for information up to the level ofTS/SCI[257] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[258]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[259]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[260] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[261] Some universities that do highly sensitive research are allowed to connect to it.[262]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[263]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[264] NCSC was part of NSA,[265] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot highRainbow Series of books that detailed trusted computing and network platform specifications.[266] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[266]

On July 18, 2013, Greenwald said that Snowden held “detailed blueprints of how the NSA does what they do”, thereby sparking fresh controversy.[267]

See also

References

Notes

  1. Jump up^ Thomas L. Burns, The Origins of the National Security Agency, p. 97
  2. ^ Jump up to:a b “60 Years of Defending Our Nation” (PDF). National Security Agency. 2012. p. 3. Retrieved July 6, 2013. “On November 4, 2012, the National Security Agency (NSA) celebrates its 60th anniversary of providing critical information to U.S. decision makers and Armed Forces personnel in defense of our Nation. NSA has evolved from a staff of approximately 7,600 military and civilian employees housed in 1952 in a vacated school in Arlington, VA, into a workforce of more than 30,000 demographically diverse men and women located at NSA headquarters in Ft. Meade, MD, in four national Cryptologic Centers, and at sites throughout the world.”
  3. Jump up^ Priest, Dana (July 21, 2013). “NSA growth fueled by need to target terrorists”. The Washington Post. Retrieved July 22, 2013. “Since the attacks of Sept. 11, 2001, its civilian and military workforce has grown by one-third, to about 33,000, according to the NSA. Its budget has roughly doubled.”
  4. ^ Jump up to:a b c d Introverted? Then NSA wants you.FCW. April 2012. Retrieved July 1, 2013.
  5. ^ Jump up to:a b “Prism Exposed: Data Surveillance with Global Implications”. Spiegel Online International. June 10, 2013. p. 2. “How can an intelligence agency, even one as large and well-staffed as the NSA with its 40,000 employees, work meaningfully with such a flood of information?”
  6. ^ Jump up to:a b Gellman, Barton; Greg Miller (August 29, 2013). “U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”. The Washington Post. p. 3. RetrievedAugust 29, 2013.
  7. Jump up^ Shane, Scott (August 29, 2013). “New Leaked Document Outlines U.S. Spending On Intelligence Agencies”. The New York Times. Retrieved August 29, 2013.
  8. Jump up^ “About NSA: Mission”. National Security Agency. Retrieved September 14, 2014.
  9. ^ Jump up to:a b Ellen Nakashima (January 26, 2008). “Bush Order Expands Network Monitoring: Intelligence Agencies to Track Intrusions”. The Washington Post. Retrieved February 9, 2008.
  10. Jump up^ Executive Order 13470[1] 2008 Amendments to Executive Order 12333], United States Intelligence Activities, July 30, 2008 (PDF)
  11. Jump up^ Malkin, Bonnie. NSA surveillance: US bugged EU offices. The Daily Telegraph, June 30, 2013
  12. Jump up^ Ngak, Chenda. NSA leaker Snowden claimed U.S. and Israel co-wrote Stuxnet virus, CBS, July 9, 2013
  13. Jump up^ Bamford, James. The Secret War, Wired Magazine, June 12, 2013.
  14. Jump up^ Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency,Random House Digital, Inc., December 18, 2007
  15. Jump up^ Executive Order 134702008 Amendments to Executive Order 12333, United States Intelligence Activities, Section C.2, July 30, 2008
  16. ^ Jump up to:a b c Obar, Jonathan A.; Clement, Andrew (2013). “Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty”. TEM 2013: Proceedings of the Technology & Emerging Media Track – Annual Conference of the Canadian Communication Association (Victoria, June 5–7, 2012). Retrieved 3 June 2014.
  17. Jump up^ “The National Archives, Records of the National Security Agency”. Retrieved November 22,2013.
  18. Jump up^ “The Many Lives of Herbert O. Yardley”. Retrieved December 5, 2013.
  19. ^ Jump up to:a b Hastedt, Glenn P.; Guerrier, Steven W. (2009). Spies, wiretaps, and secret operations: An encyclopedia of American espionage. ABC-CLIO. p. 32. ISBN 1851098070.
  20. Jump up^ Yardley, Herbert O. (1931). The American black chamber. Annapolis, MD: Naval Institute Press.ISBN 1591149894.
  21. Jump up^ James Bamford. “Building America’s secret surveillance state”. Reuters. RetrievedNovember 9, 2013.
  22. Jump up^ “Roman Empire to the NSA: A world history of government spying”. BBC. November 1, 2013. Retrieved November 9, 2013. Across Europe, they established departments called “black chambers” (from the French, cabinet noir) to read the letters of targeted individuals.
  23. ^ Jump up to:a b c “Army Security Agency Established, 15 September 1945”. United States Army. RetrievedNovember 9, 2013.
  24. ^ Jump up to:a b c Burns, Thomas L. “The Origins of the National Security Agency 1940–1952 (U)” (PDF). National Security Agency. p. 60. Retrieved August 11, 2010.
  25. Jump up^ “The Creation of NSA – Part 2 of 3: The Brownell Committee” (PDF). National Security Agency. Retrieved July 2, 2013.
  26. ^ Jump up to:a b Truman, Harry S. (October 24, 1952). “Memorandum” (PDF). National Security Agency. Retrieved July 2, 2013.
  27. Jump up^ Anne Gearan (June 7, 2013). “‘No Such Agency’ spies on the communications of the world”.The Washington Post. Retrieved 9 November 2013.
  28. Jump up^ SCOTT SHANE (October 31, 2005). “Vietnam Study, Casting Doubts, Remains Secret”. The New York Times. The National Security Agency has kept secret since 2001 a finding by an agency historian that during the Tonkin Gulf episode, which helped precipitate the Vietnam War
  29. ^ Jump up to:a b “Declassified NSA Files Show Agency Spied on Muhammad Ali and MLK Operation Minaret Set Up in 1960s to Monitor Anti-Vietnam Critics, Branded ‘Disreputable If Not Outright Illegal’ by NSA Itself” The Guardian, 26 Sept. 2013
  30. Jump up^ Pre-Emption – The Nsa And The Telecoms | Spying On The Home Front | FRONTLINE | PBS
  31. Jump up^ Cohen, Martin. No Holiday: 80 Places You Don’t Want to Visit. New York: Disinformation Company Ltd. ISBN 978-1-932857-29-0. Retrieved March 14, 2014.
  32. ^ Jump up to:a b c Bill Moyers Journal (October 26, 2007). “The Church Committee and FISA”. Public Affairs Television. Retrieved June 28, 2013.
  33. Jump up^ “Book IV, Supplementary Detailed Staff Reports on Foreign and Military Intelligence (94th Congress, Senate report 94-755)” (PDF). United States Senate Select Committee on Intelligence. April 23, 1976. p. 67 (72). Retrieved June 28, 2013.
  34. Jump up^ “Book II, Intelligence Activities and the Rights of Americans (94th Congress, Senate report 94-755)” (PDF). United States Senate Select Committee on Intelligence. April 26, 1976. p. 124 (108). Retrieved June 28, 2013.
  35. Jump up^ Seymour M. Hersh (February 22, 1987). “TARGET QADDAFI”. The New York Times. Retrieved January 12, 2014.
  36. Jump up^ David Wise (May 18, 1986). “Espionage Case Pits CIA Against News Media”. The Los Angeles Times. Retrieved January 12, 2014. the President took an unprecedented step in discussing the content of the Libyan cables. He was, by implication, revealing that NSA had broken the Libyan code.
  37. Jump up^ Peggy Becker (October 1999). DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION (Report). STOA, European Parliament. p. 12. Retrieved November 3, 2013.
  38. ^ Jump up to:a b c Staff (June 13, 2003). “NSA honors 4 in the science of codes”. The Baltimore Sun(Tribune Company). Retrieved June 11, 2013.
  39. Jump up^ Tom Carver (8 June 2002). “America’s most powerful spy agency”. BBC. When Osama bin Laden first moved to Afghanistan, the NSA listened in to every phone call he made on his satellite phone. Over the course of two years it is believed they logged more than 2,000 minutes of conversation.
  40. Jump up^ Gorman, Siobhan (May 17, 2006). “NSA killed system that sifted phone data legally”.Baltimore Sun (Tribune Company (Chicago, IL)). Archived from the original on September 27, 2007. Retrieved March 7, 2008. The privacy protections offered by ThinThread were also abandoned in the post–September 11 push by the president for a faster response to terrorism.
  41. Jump up^ See refs of Thomas Andrews Drake article
  42. ^ Jump up to:a b Bamford, Shadow Factory, pp. 325–340.
  43. Jump up^ <http://www.baltimoresun.com/news/nation-world/bal-nsa050607,0,1517618.story>
  44. Jump up^ Laura Poitras, Marcel Rosenbach and Holger Stark. “Ally and Target: US Intelligence Watches Germany Closely”. Der Spiegel. Retrieved August 13, 2013.
  45. Jump up^ DeYoung, Karen (August 12, 2013). “Colombia asks Kerry to explain NSA spying”. The Washington Post. Retrieved August 13, 2013.
  46. ^ Jump up to:a b Memorandum of the United States in Response to the Court’s Order Dated January 28, 2009. Washington DC: Foreign Intelligence Surveillance Court Washington DC. January 28, 2009. p. 11.
  47. Jump up^ Greenberg, Andy. “NSA Secretly Admitted Illegally Tracking Thousands Of ‘Alert List’ Phone Numbers For Years”. Forbes. Retrieved February 25, 2014.
  48. Jump up^ Brandon, Russel. “NSA illegally searched 15,000 suspects’ phone records, according to declassified report”. The Verge. Retrieved February 25, 2014.
  49. Jump up^ Timm, Trevor. “Government Releases NSA Surveillance Docs and Previously Secret FISA Court Opinions In Response to EFF Lawsuit”. Electronic Frontier Foundation. Retrieved February 25,2014.
  50. Jump up^ Greg Miller and Julie Tate, October 17, 2013, “Documents reveal NSA’s extensive involvement in targeted killing program“, The Washington Post. Retrieved October 18, 2013.
  51. Jump up^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger Stark. “Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen aus“. Der Spiegel (in German). Retrieved June 29, 2013.
  52. Jump up^ US-Geheimdienst hörte Zentrale der Vereinten Nationen ab“. Der Spiegel (in German). Retrieved August 25, 2013.
  53. Jump up^ Barton Gellman and Ashton Solanti, December 5, 2013, “NSA tracking cellphone locations worldwide, Snowden documents show”, The Washington Post. Retrieved December 7, 2013.
  54. ^ Jump up to:a b Greenwald, Glenn; MacAskill, Ewen (6 June 2013). “NSA Prism program taps in to user data of Apple, Google and others“. The Guardian. Retrieved June 15, 2013.
  55. ^ Jump up to:a b Gellman and Soltani, October 15, 2013 “NSA collects millions of e-mail address books globally“, The Washington Post. Retrieved October 16, 2013.
  56. Jump up^ Perlroth, Larson and Shane, “N.S.A. Able to Foil Basic Safeguards of Privacy on Web“, The New York Times September 5, 2013. Retrieved September 23, 2013.
  57. Jump up^ Arthur, Charles “Academics criticise NSA and GCHQ for weakening online encryption“, The Guardian September 16, 2013. Retrieved September 23, 2013.
  58. Jump up^ “Senators: Limit NSA snooping into US phone records”. Associated Press. RetrievedOctober 15, 2013. “Is it the goal of the NSA to collect the phone records of all Americans?” Udall asked at Thursday’s hearing. “Yes, I believe it is in the nation’s best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes,” Alexander replied.
  59. Jump up^ Glenn Greenwald (6 June 2013). “NSA collecting phone records of millions of Verizon customers daily“. The Guardian. Retrieved September 16, 2013.
  60. Jump up^ Court Reveals ‘Secret Interpretation’ Of The Patriot Act, Allowing NSA To Collect All Phone Call Data, September 17, 2013. Retrieved September 19, 2013.
  61. Jump up^ “Exclusive: U.S. directs agents to cover up program used to investigate Americans”. Reuters. August 5, 2013. Retrieved August 14, 2013.
  62. Jump up^ Glenn Greenwald, Ryan Gallagher & Ryan Grim, November 26, 2013, “Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit ‘Radicalizers’“, Huffington Post. Retrieved November 28, 2013.
  63. Jump up^ “Vast majority of NSA spy targets are mistakenly monitored”. Philadelphia News.Net. Retrieved 7 July 2014.
  64. Jump up^ Greenwald, Glen, “Members of Congress denied access to basic information about NSA“,The Guardian, August 4, 2013. Retrieved September 23, 2013.
  65. ^ Jump up to:a b Eddlem, T. The NSA Domestic Surveillance Lie, September 22, 2013. Retrieved September 23, 2013.
  66. Jump up^ Loennig, C., “Court: Ability to police U.S. spying program limited“, Washington Post, August 16, 2013. Retrieved September 23, 2013.
  67. Jump up^ Gellman, B. NSA broke privacy rules thousands of times per year, audit finds, Washington Post, August 15, 2013. Retrieved September 23, 2013.
  68. Jump up^ Gorman, S. NSA Officers Spy on Love Interests, Wall St Journal, August 23, 2013. Retrieved September 23, 2013.
  69. ^ Jump up to:a b Spencer Ackerman, November 19, 2013, “Fisa court documents reveal extent of NSA disregard for privacy restrictions“, The Guardian. Retrieved November 21, 2013.
  70. Jump up^ John D Bates (3 October 2011). “[redacted] “. p. 16.
  71. Jump up^ Ellen Nakashima, Julie Tate and Carol Leonnig (10 September 2013). “Declassified court documents highlight NSA violations in data collection for surveillance“. The Washington Post. Retrieved September 14, 2013.
  72. Jump up^ Richard Leon, December 16, 2013, Memorandum Opinion, Klayman vs. Obama. U.S. District Court for the District of Columbia. Reproduced on The Guardian website. Retrieved February 3, 2013.
  73. Jump up^ Bazzle, Steph (27 December 2013). “Judge Says NSA’s Data Collection Is Legal”. Indyposted. Retrieved December 28, 2013.
  74. Jump up^ Greenwald, Glenn (16 October 2014). “UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights”. Retrieved 23 October 2014.
  75. Jump up^ Kessler, Glen, James Clapper’s ‘least untruthful’ statement to the Senate, June 12, 2013. Retrieved September 23, 2013.
  76. Jump up^ Kube, C., June 27, 2013, “NSA chief says surveillance programs helped foil 54 plots”, US News on nbcnews.com. Retrieved September 27, 2013.
  77. Jump up^ “NSA Confirms Dragnet Phone Records Collection, But Admits It Was Key in Stopping Just 1 Terror Plot”, Democracy Now August 1, 2013. Retrieved September 27, 2013.
  78. Jump up^ “Indictment: USA vs Basaaly Saeed Moalin, Mohamed Mohamed Mohamud and Issa Doreh”. Southern District of California July 2010 Grand Jury. Retrieved September 30, 2013.
  79. Jump up^ “54 Attacks in 20 Countries Thwarted By NSA Collection” (Press release). The Permanent Select Committee on Intelligence. 2013-07-23. Archived from the original on 2013-10-23. Retrieved March 14, 2014.
  80. Jump up^ “Senate caves, votes to give telecoms retroactive immunity”. Ars Technica. 13 February 2008. Retrieved September 16, 2013.
  81. Jump up^ “Forget Retroactive Immunity, FISA Bill is also about Prospective Immunity”. The Progressive. 10 July 2008. Retrieved September 16, 2013.
  82. Jump up^ “Restricted Web access to the Guardian is Armywide, say officials”, Philipp Molnar, Monterey Herald, June 27, 2013. Retrieved 15 October 2014.
  83. Jump up^ Ackerman, Spencer; Roberts, Dan (June 28, 2013). “US Army Blocks Access to Guardian Website to Preserve ‘Network Hygiene’ – Military Admits to Filtering Reports and Content Relating to Government Surveillance Programs for Thousands of Personnel”. The Guardian. Retrieved June 30, 2013.
  84. Jump up^ Ackerman, Spencer (July 1, 2013). “US military blocks entire Guardian website for troops stationed abroad”. The Guardian.
  85. Jump up^ These offices are for example mentioned in a FISA court order from 2011.
  86. Jump up^ “National Security Agency”. fas.org. Retrieved October 9, 2013.
  87. Jump up^ Matthew M. Aid, The Secret Sentry, New York, 2009, p. 130, 138, 156-158.
  88. Jump up^ See also the information about the historical structure of NSA that is archived at FAS.org
  89. Jump up^ TheWeek.com: The NSA’s secret org chart, September 15, 2013
  90. Jump up^ D.B. Grady. “Inside the secret world of America’s top eavesdropping spies”.
  91. Jump up^ Marc Ambinder, Solving the mystery of PRISM, June 7, 2013
  92. Jump up^ National Intelligence – a consumer’s guide (PDF) 2009, p. 34.
  93. Jump up^ Aid, Matthew M. (10 June 2013). “Inside the NSA’s Ultra-Secret China Hacking Group”.Foreign Policy. Retrieved June 11, 2013.
  94. ^ Jump up to:a b Marc Ambinder, How a single IT tech could spy on the world, June 10, 2013
  95. Jump up^ The Special Source Operations logo can be seen on slides about the FAIRVIEW program.
  96. Jump up^ National Security Agency – 60 Years of Defending Our Nation, Anniversary booklet, 2012, p. 96.
  97. Jump up^ Marc Ambinder, 3008 Selectors, June 27, 2013.
  98. Jump up^ This is mentioned in a FISA court order from 2011.
  99. Jump up^ Top Level Telecommunications: Pictures at the NSA’s 60th anniversary
  100. Jump up^ National Security Agency – 60 Years of Defending Our Nation, Anniversary booklet, 2012, p. 102.
  101. Jump up^ Matthew M. Aid, The Secret Sentry, New York, 2009, pp. 128, 148, 190 and 198.
  102. Jump up^ Harvey A. Davis (March 12, 2002). Statement for the Record (Speech). 342 Dirksen Senate Office Building, Washington, D.C. Retrieved November 24, 2009.
  103. ^ Jump up to:a b Drew, Christopher and Somini Sengupta (June 24, 2013). “N.S.A. Leak Puts Focus on System Administrators”. The New York Times. Retrieved June 25, 2013.
  104. ^ Jump up to:a b c David Kahn, The Codebreakers, Scribner Press, 1967, chapter 19, pp. 672–733.
  105. Jump up^ Barton Gellman (December 25, 2013). “Edward Snowden, after months of NSA revelations, says his mission’s accomplished”. The Washington Post.
  106. ^ Jump up to:a b c Bauer, Craig P. (2013). Secret History: The Story of Cryptology. CRC Press. p. 359.ISBN 9781466561861.
  107. ^ Jump up to:a b Bamford. Body of Secrets. p. 538.
  108. Jump up^ “Your Polygraph Examination: An Important Appointment to Keep” (PDF). National Security Agency. Retrieved June 17, 2013.
  109. Jump up^ McCarthy, Susan. “The truth about the polygraph”. Salon. Retrieved July 5, 2013.
  110. ^ Jump up to:a b Nagesh, Gautham (June 14, 2010). “NSA video tries to dispel fear about polygraph use during job interviews”. The Hill. Retrieved June 15, 2013.
  111. ^ Jump up to:a b Stein, Jeff. “NSA lie detectors no sweat, video says.” Washington Post. June 14, 2010. Retrieved July 5, 2013.
  112. Jump up^ Drezner, Daniel. “Tone-Deaf at the Listening Post.” Foreign Policy. December 16, 2013. Retrieved March 1, 2014. “Snowden has also changed the way the NSA is doing business. Analysts have gone from being polygraphed once every five years to once every quarter.”
  113. ^ Jump up to:a b c d “Frequently Asked Questions About NSA: 9. Can you explain the NSA and CSS seals?”. National Security Agency. Retrieved July 18, 2013.
  114. ^ Jump up to:a b “History of The Insignia”. National Security Agency. Retrieved July 18, 2013.
  115. Jump up^ “The National Security Agency Insignia”. National Security Agency via Internet Archive. Archived from the original on 2008-04-13. Retrieved July 18, 2013.
  116. ^ Jump up to:a b “A Dangerous Business: The U.S. Navy and National Reconnaissance During the Cold War” (PDF). National Security Agency. Retrieved June 13, 2013.
  117. ^ Jump up to:a b c “National Cryptologic Memorial (List of Names) – NSA/CSS”. NSA.gov. RetrievedJune 13, 2013.
  118. Jump up^ “Marine Cryptologic Support Battalion: Intelligence Department: Fort Meade, MD: New Joins”. United States Marine Corps. Retrieved June 11, 2013.
  119. ^ Jump up to:a b “Just off the Baltimore-Washington Parkway, about 25 miles northeast of Washington, is a secret city. Fort Meade, in suburban Maryland, is home to the National Security Agency – the NSA, sometimes wryly referred to as No Such Agency or Never Say Anything.” and “It contains almost 70 miles of roads, 1,300 buildings, each identified by a number, and 18,000 parking spaces as well as a shopping centre, golf courses, chain restaurants and every other accoutrement of Anywhere, USA.” in “Free introduction to: Who’s reading your emails?”. The Sunday Times. June 9, 2013. Retrieved June 11, 2013.(subscription required)
  120. Jump up^ Sernovitz, Daniel J. “NSA opens doors for local businesses.” Baltimore Business Journal. August 26, 2010. Updated August 27, 2010. Retrieved June 11, 2013. “But for many more, the event was the first time attendees got the chance to take the “NSA Employees Only” exit off the Baltimore-Washington Parkway beyond the restricted gates of the agency’s headquarters.”
  121. Jump up^ Weiland and Wilsey, p. 208. “[…]housing integration has invalidated Montpelier’s Ivory Pass and the National Security Agency has posted an exit ramp off the Baltimore-Washington Parkway that reads NSA.”
  122. Jump up^ Grier, Peter and Harry Bruinius. “In the end, NSA might not need to snoop so secretly.”Christian Science Monitor. June 18, 2013. Retrieved July 1, 2013.
  123. ^ Jump up to:a b c Barnett, Mark L. (April 26, 2011). “Small Business Brief” (PDF). Office of Small Business Programs, NSA, via The Greater Baltimore Committee. p. 3. Retrieved June 11, 2013.
  124. Jump up^ Gorman, Siobhan (August 6, 2006). “NSA risking electrical overload”. The Baltimore Sun(Tribune Company). Retrieved June 10, 2013.
  125. Jump up^ Dozier, Kimberly (June 9, 2013). “NSA claims know-how to ensure no illegal spying”.Associated Press. Retrieved June 12, 2013.
  126. Jump up^ “Geeks ‘R’ us”. The Baltimore Sun. Tribune Company. January 13, 2010. Retrieved June 11,2013.
  127. ^ Jump up to:a b c d Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 488. “At the heart of the invisible city is NSA’s massive Headquarters/Operations Building. With more than sixty-eight acres of floor space,[…]” and “Entrance is first made through the two-story Visitor Control Center, one[…]”
  128. Jump up^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 488-489. “[…]one of more than 100 fixed watch posts within the secret city manned by the armed NSA police. It is here that clearances are checked and visitor badges are issued.”
  129. ^ Jump up to:a b c Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 490. “And then there is the red badge—[…]and is normally worn by people working in the “Red Corridor”—the drugstore and other concession areas[…]Those with a red badge are forbidden to go anywhere near classified information and are restricted to a few corridors and administrative areas—the bank, the barbershop, the cafeteria, the credit union, the airline and entertainment ticket counters.” and “Once inside the white, pentagonal Visitor Control Center, employees are greeted by a six-foot painting of the NSA seal[…]”
  130. Jump up^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 489. “It is here that clearances are checked and visitor badges are issued.”
  131. Jump up^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 491. “From the Visitor Control Center one enters the eleven-story, million OPS2A, the tallest building in the City. Shaped like a dark glass Rubik’s Cube, the building houses much of NSA’s Operations Directorate, which is responsible for processing the ocean of intercepts and prying open the complex cipher systems.”
  132. ^ Jump up to:a b c d e f Bamford, James (June 12, 2013). “The Secret War”. Wired (Condé Nast). RetrievedJune 12, 2013.
  133. Jump up^ “Career Fields/Other Opportunities/NSA Police Officers section of the NSA website”. Nsa.gov. Retrieved October 9, 2013.
  134. Jump up^ T.C. Carrington, Debra L.Z. Potts, “Protective Services-More Than Meets the Eye. An Overview of NSA’s Protective Services”, National Security Agency Newsletter, volume XLVII, No. 9, September 1999, pp. 8-10.
  135. ^ Jump up to:a b Explore NSA.” (Archive) National Security Agency. Retrieved June 12, 2013. “Other Locations” and “Our employees live along the Colonial-era streets of Annapolis and Georgetown; in the suburban surroundings of Columbia; near the excitement of Baltimore’s Inner Harbor; along rolling hills adjacent to working farms; near the shores of the Chesapeake Bay; and amid the monumental history of Washington, DC.”
  136. ^ Jump up to:a b Sabar, Ariel (January 2, 2003). “NSA still subject to electronic failure”. and “Agency officials anticipated the problem nearly a decade ago as they looked ahead at the technology needs of the agency, sources said, but it was never made a priority, and now the agency’s ability to keep its operations going is threatened.” and “The NSA is Baltimore Gas & Electric’s largest customer, using as much electricity as the city of Annapolis, according to James Bamford….” inGorman, Siobhan (August 6, 2006). “NSA risking electrical overload”. and Gorman, Siobhan (January 26, 2007). “NSA electricity crisis gets Senate scrutiny”. and Gorman, Siobhan (June 24, 2007). “Power supply still a vexation for the NSA”. The Baltimore Sun (Tribune Company). Retrieved June 11, 2013.
  137. Jump up^ “The NSA uses about 65 to 75 megawatt-hours of electricity, The Sun reported last week. Its needs are projected to grow by 10 to 15 megawatt-hours by next fall.” in Staff (January 26, 2007). “NSA electricity crisis gets Senate scrutiny”. The Baltimore Sun (Tribune Company). Retrieved June 11, 2013.
  138. ^ Jump up to:a b c d e f Bamford, James (March 15, 2012). “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)”. Wired (Condé Nast). Retrieved February 26, 2013.
  139. Jump up^ “60 Years of Defending Our Nation” (PDF). National Security Agency. 2012. p. 15. RetrievedJuly 6, 2013.
  140. ^ Jump up to:a b c “60 Years of Defending Our Nation” (PDF). National Security Agency. 2012. p. 10. Retrieved July 6, 2013.
  141. Jump up^ “60 Years of Defending Our Nation” (PDF). National Security Agency. 2012. p. 23. RetrievedJuly 6, 2013.
  142. ^ Jump up to:a b c “60 Years of Defending Our Nation” (PDF). National Security Agency. 2012. p. 39. Retrieved July 6, 2013.
  143. Jump up^ Scott Shane and Tom Bowman (December 4, 1995). “No Such Agency Part Four – Rigging the Game”. The Baltimore Sun. Retrieved February 24, 2013.
  144. Jump up^ Brown, Matthew Hay (May 6, 2013). “NSA plans new computing center for cyber threats”. The Baltimore Sun (Tribune Company). Retrieved June 11, 2013.
  145. Jump up^ “National Security Agency: FY 2014 Military Construction, Defense-Wide” (PDF). Office of the Under Secretary of Defense (Comptroller), USA.gov. pp. 3–4. Retrieved June 13, 2013.
  146. Jump up^ “Fort Meade”. Expeditionary Combat Readiness Center, United States Navy. RetrievedJune 11, 2013.
  147. Jump up^ Steve Fidel (January 6, 2011). “Utah’s billion cyber-security center under way”. Deseret News. Retrieved January 6, 2011.
  148. Jump up^ LaPlante, Matthew D. (July 2, 2009). “New NSA center unveiled in budget documents”. The Salt Lake Tribune (MediaNews Group). Retrieved June 9, 2013.
  149. ^ Jump up to:a b Norton-Taylor, Richard (March 1, 2012). “Menwith Hill eavesdropping base undergoes massive expansion”. The Guardian (London: Guardian News and Media). Retrieved June 10,2013.
  150. ^ Jump up to:a b c “It’s kind of a legacy system, this whole idea, the Echelon,” Bamford said. “Communications have changed a great deal since they built it.” in Muir, Pat (May 27, 2013).“Secret Yakima facility may be outdated, expert says”. Yakima Herald-Republic (Seattle Times). Retrieved June 15, 2013.
  151. Jump up^ Richelson, Jeffrey T. (August 2012). “Eavesdroppers in Disguise”. Air Force Magazine (Air Force Association). Retrieved June 10, 2013.
  152. Jump up^ Troianello, Craig (April 4, 2013). “NSA to close Yakima Training Center facility”. Yakima Herald-Republic. Retrieved June 15, 2013.
  153. Jump up^ “UKUSA Agreement Release: 1940-1956”. National Security Agency. Retrieved July 11, 2013.
  154. Jump up^ Bamford, James (September 13, 2002). “What big ears you have”. The Guardian (London). Retrieved July 11, 2013.
  155. Jump up^ Tangimoana listed in: “Government Communications Security Bureau [GCSB]”. Federation of American Scientists. Retrieved July 11, 2013.
  156. Jump up^ “ECHELON Main Stations”. World-Information.org. Retrieved July 11, 2013.
  157. Jump up^ “UK agrees missile defence request”. BBC News. July 25, 2007. Retrieved June 10, 2013.
  158. Jump up^ Campbell, Duncan (December 6, 1999). “1980 – America’s big ear on Europe”. New Statesman. Retrieved June 15, 2013.
  159. Jump up^ Laura Poitras, Marcel Rosenbach and Holger Stark, Ally and Target: US Intelligence Watches Germany Closely, August 12, 2013.
  160. ^ Jump up to:a b “Snowden Interview: NSA and the Germans ‘In Bed Together'”. Spiegel International. July 7, 2013. and “Snowden: NSA is ‘in bed with the Germans’”. RT News (TV-Novosti). July 7, 2013. Retrieved July 8, 2013.
  161. Jump up^ Bamford, James (December 25, 2005). “The Agency That Could Be Big Brother”. The New York Times. Retrieved September 11, 2005.
  162. Jump up^ Priest, Dana and Arkin, William, A hidden world, growing beyond control, Washington Post
  163. Jump up^ “National Security Agency and the U.S. Department of Homeland Security Form New Partnership to Increase National Focus on Cyber Security Education” (Press release). NSA Public and Media Affairs. April 22, 2004. Retrieved July 4, 2008.
  164. Jump up^ Hager 1996, p. 55
  165. Jump up^ Richelson, Jeffrey T.; Ball, Desmond (1985). The Ties That Bind: Intelligence Cooperation Between the UKUSA Countries. London: Allen & Unwin. ISBN 0-04-327092-1
  166. Jump up^ Patrick S. Poole, Echelon: America’s Secret Global Surveillance Network (Washington, D.C.:Free Congress Foundation, October 1998)
  167. Jump up^ Echelon”, 60 Minutes, February 27, 2000
  168. Jump up^ Campbell, Duncan (August 12, 1988). “They’ve Got It Taped” (PDF). New Statesman via duncancampbell.org. Retrieved June 19, 2007
  169. Jump up^ Bomford, Andrew (November 3, 1999). “Echelon spy network revealed”. BBC. RetrievedJune 7, 2013.
  170. Jump up^ “European Parliament Report on Echelon” (PDF). July 2001. Retrieved July 4, 2008.
  171. Jump up^ “Nicky Hager Appearance before the European Parliament Echelon Committee”. Nicky Hager/ Cryptome Archive. April 2001. Retrieved July 4, 2008.
  172. Jump up^ Ellen Nakashima; Joby Warrick (July 14, 2013). “For NSA chief, terrorist threat drives passion to ‘collect it all,’ observers say”. The Washington Post. Retrieved July 15, 2013. Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it.
  173. Jump up^ Glenn Greenwald (July 15, 2013). “The crux of the NSA story in one phrase: ‘collect it all’: The actual story that matters is not hard to see: the NSA is attempting to collect, monitor and store all forms of human communication”. The Guardian (London). Retrieved July 16, 2013.
  174. Jump up^ Glenn Greenwald (November 26, 2013). “Top-Secret Documents Reveal NSA Spied on Porn Habits as Part of Plan to Discredit ‘Radicalizers'”. The Huffington Post (London). RetrievedMay 6, 2014.
  175. Jump up^ Gellman, Barton; Poitras, Laura (June 7, 2013). “U.S. intelligence mining data from nine U.S. Internet companies in broad secret program”. The Washington Post. Retrieved June 6, 2013.
  176. Jump up^ Greenwald, Glenn (June 6, 2013). “NSA taps in to internet giants’ systems to mine user data, secret files reveal”. The Guardian (London). Retrieved June 6, 2013.
  177. Jump up^ “Microsoft handed the NSA access to encrypted messages”. The Guardian. July 12, 2013. Retrieved September 7, 2013.
  178. Jump up^ The Guardian, June 8, 2013 [title missing][page needed]
  179. ^ Jump up to:a b Perlroth, Nicole, Larson, Jeff, and Shane, Scott (September 5, 2013). “The NSA’s Secret Campaign to Crack, Undermine Internet Security”. ProPublica. This story has been reported in partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald; For the New York Times: Nicole Perlroth, Scott Shane; For ProPublica: Jeff Larson
  180. Jump up^ “Schneier on Security: The Strange Story of Dual_EC_DRBG”. Schneier.com. 2007-11-15. Retrieved October 9, 2013.
  181. Jump up^ J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge (3 July 2014). “NSA targets the privacy-conscious”. Panorama (Norddeutscher Rundfunk). Retrieved 4 July 2014.
  182. Jump up^ Lena Kampf, Jacob Appelbaum and John Goetz, Norddeutscher Rundfunk (July 3, 2014).“Deutsche im Visier des US-Geheimdienstes: Von der NSA als Extremist gebrandmarkt” (in German). ARD.
  183. Jump up^ John D Bates (3 October 2011). “[redacted]”. pp. 73–74.
  184. ^ Jump up to:a b David Alan Jordan. Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol. Boston College Law Review. May 2006. Last access date January 23, 2007
  185. Jump up^ James Risen & Eric Lichtblau (December 16, 2005), Bush Lets U.S. Spy on Callers Without Courts, New York Times
  186. Jump up^ “Gwu.edu”. Gwu.edu. Retrieved October 9, 2013.
  187. Jump up^ “6th Circuit Court of Appeals Decision” (PDF). Retrieved October 9, 2013.
  188. Jump up^ Mike Rosen-Molina (May 19, 2007). “Ex-Guantanamo lawyers sue for recordings of client meetings”. The Jurist. Retrieved May 22, 2007.
  189. Jump up^ “CCR v. Bush”. Center for Constitutional Rights. Retrieved June 15, 2009.
  190. Jump up^ KJ Mullins (September 20, 2008). “Jewel Vs. NSA Aims To Stop Illegal Surveillance”. Digital Journal. Retrieved December 30, 2011.
  191. Jump up^ Jewel v. NSA (complaint). 18 September 2008. Electronic Frontier Foundation. Retrieved December 30, 2011.
  192. Jump up^ Kravets, David (15 July 2009). “Obama Claims Immunity, As New Spy Case Takes Center Stage”. Wired. Retrieved December 30, 2011.
  193. Jump up^ “For Your Eyes Only?”. NOW. February 16, 2007. on PBS
  194. Jump up^ Gorman, Siobahn (March 10, 2008). “NSA’s Domestic Spying Grows As Agency Sweeps Up Data”. The Wall Street Journal Online. Archived from the original on 2009-01-24. RetrievedMarch 14, 2014.
  195. Jump up^ LIBERTY AND SECURITY IN A CHANGING WORLD – Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies, 12 December 2013, 308 pages
  196. Jump up^ Mark Hosenball; Will Dunham (11 April 2014). “White House, spy agencies deny NSA exploited ‘Heartbleed’ bug”. Reuters. Retrieved 16 April 2014.
  197. Jump up^ John Shiffman and Kristina Cooke (August 5, 2013) Exclusive: U.S. directs agents to cover up program used to investigate Americans. Reuters. Retrieved August 12, 2013.
  198. Jump up^ John Shiffman and David Ingram (August 7, 2013) Exclusive: IRS manual detailed DEA’s use of hidden intel evidence. Reuters. Retrieved August 12, 2013.
  199. Jump up^ Lichtblau, Eric and Risen, James (April 15, 2009). “N.S.A.’s Intercepts Exceed Limits Set by Congress”. The New York Times. Retrieved April 15, 2009.
  200. Jump up^ Ackerman, Spencer (April 16, 2009). “NSA Revelations Spark Push to Restore FISA”. The Washington Independent (Center for Independent Media). Retrieved April 19, 2009.
  201. Jump up^ Glenn Greenwald (June 6, 2013). “Revealed: NSA collecting phone records of millions of Americans daily”. The Guardian (London). Retrieved June 6, 2013.
  202. Jump up^ Charlie Savage and Edward Wyatt, “U.S. Is Secretly Collecting Records of Verizon Calls”,New York Times, June 5, 2013. Accessed June 6, 2013.
  203. Jump up^ Savage, Charlie (August 8, 2013). “N.S.A. Said to Search Content of Messages to and From U.S”. The New York Times. Retrieved August 13, 2013.
  204. Jump up^ James Risen and Laura Poitras (31 May 2014). “N.S.A. Collecting Millions of Faces From Web Images”. The New York Times. Retrieved 1 June 2014.
  205. Jump up^ “Statistics on whether the NSA’s Secret Data Collection is Acceptable”. Statista. RetrievedJuly 19, 2013.
  206. Jump up^ “59% Oppose Government’s Secret Collecting of Phone Records”. Rasmussen Reports. June 9, 2013. Retrieved July 19, 2013.
  207. Jump up^ Newport, Frank (June 12, 2013). “Americans Disapprove of Government Surveillance Programs”. Gallup. Retrieved July 19, 2013.
  208. Jump up^ “Majority Views NSA Phone Tracking as Acceptable Anti-terror Tactic”. Pew Research Center. June 10, 2013. Retrieved July 19, 2013.
  209. Jump up^ Burnett, Sara (2 October 2011). “Coloradan Zazi’s coded e-mail started agencies plan to stop N.Y. subway attack”. The Denver Post. Retrieved 20 October 2014.
  210. Jump up^ Angwin, Julia (2014). Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. Times Books / Henry Holt and Company. p. 47. ISBN 978-0-8050-9807-5.
  211. Jump up^ France in the NSA’s crosshair : phone networks under surveillance Le Monde 21 October 2013
  212. Jump up^ http://www.linuxfoundation.org/news-media/news/2013/09/techweekeurope-linus-torvalds-jokes-nsa-wanted-backdoor-linux
  213. Jump up^ http://falkvinge.net/2013/11/17/nsa-asked-linus-torvalds-to-install-backdoors-into-gnulinux/
  214. Jump up^ http://www.europarl.europa.eu/committees/en/libe/events.html
  215. Jump up^ “The Swedes discover Lotus Notes has key escrow!” The Risks Digest, Volume 19, Issue 52, 1997-12-24
  216. Jump up^ Only NSA can listen, so that’s OK Heise, 1999.
  217. Jump up^ Gallagher, Sean (2014-05-14). “Photos of an NSA “upgrade” factory show Cisco router getting implant”. Ars Technica.
  218. Jump up^ Sabar, Ariel (July 20, 2013). “Congress curbs NSA’s power to contract with suppliers”.Baltimore Sun (Tribune Company). Retrieved June 17, 2013.
  219. Jump up^ Davies, D.W.; W.L. Price (1989). Security for computer networks, 2nd ed. John Wiley & Sons.
  220. Jump up^ Robert Sugarman (editor) (July 1979). “On foiling computer crime”. IEEE Spectrum (IEEE).
  221. Jump up^ Thomas R. Johnson (December 18, 2009). “American Cryptology during the Cold War, 1945–1989.Book III: Retrenchment and Reform, 1972–1980, page 232”. NSA, DOCID 3417193 (file released on 2009-12-18, hosted at cryptome.org). Retrieved January 3, 2010.
  222. Jump up^ Weeks, Bryan et al. “Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms” (PDF). National Institute of Standards and Technology. RetrievedJune 29, 2013.
  223. ^ Jump up to:a b “the NIST standards that define Suite B…” in “Suite B Cryptography / Cryptographic Interoperability”. National Security Agency. Retrieved June 29, 2013.
  224. Jump up^ Committee on C4ISR for Future Naval Strike Groups, National Research Council (2006). C4ISR for Future Naval Strike Groups. National Academies Press. p. 167. ISBN 0309096006.
  225. Jump up^ “Adkins Family asked for a pic of the KL-7. Here you go!…” in “NSA – National Cryptologic Museum”. Facebook. March 20, 2013. Retrieved June 30, 2013.
  226. ^ Jump up to:a b “Cryptographic Damage Assessment: DOCID: 3997687” (PDF). National Security Agency. 1968. Retrieved June 30, 2013.
  227. ^ Jump up to:a b c d “Cryptologic Excellence: Yesterday, Today and Tomorrow” (PDF). National Security Agency. 2002. p. 17. Retrieved June 30, 2013.
  228. ^ Jump up to:a b Hickey, Kathleen (January 6, 2010). “NSA certifies Sectera Viper phone for classified communications”. GCN (1105 Media). Retrieved June 30, 2013.
  229. Jump up^ “JITC Networks, Transmissions, and Integration Division Electronic Key Management System (EKMS)”. U.S. Department of Defense: Defense Information Systems Agency: Joint Interoperability Certifier. February 1991. Retrieved June 30, 2013.
  230. Jump up^ “6.2.6 What is Fortezza?”. RSA Laboratories, EMC Corporation. Retrieved June 30, 2013.
  231. Jump up^ “AN/ARC-231 Airborne Communication System”. Raytheon. Retrieved June 30, 2013.
  232. Jump up^ “NSA approves TACLANE-Router”. United Press International. October 24, 2007. RetrievedJune 30, 2013.
  233. Jump up^ Draft NIST SP 800-131, June 2010.
  234. ^ Jump up to:a b Lorenzo, Joseph (2013-09-24). “What the heck is going on with NIST’s cryptographic standard, SHA-3? | Center for Democracy & Technology”. Cdt.org. Retrieved October 9, 2013.
  235. Jump up^ “Twitter / marshray: Believe it or not, NIST is”. Twitter.com. Retrieved October 9, 2013.
  236. Jump up^ “kelsey-invited-ches-0820.pdf – Google Drive”. Docs.google.com. Retrieved October 9, 2013.
  237. Jump up^ Schneier, Bruce (November 15, 2007). “Did NSA Put a Secret Backdoor in New Encryption Standard?”. Wired News. Retrieved July 4, 2008.
  238. Jump up^ Matthew Green (2013-09-18). “A Few Thoughts on Cryptographic Engineering: The Many Flaws of Dual_EC_DRBG”. Blog.cryptographyengineering.com. Retrieved October 9, 2013.
  239. Jump up^ Dual_Ec_Drbg backdoor: a proof of concept at Aris’ Blog – Computers, ssh and rock’n roll
  240. Jump up^ “itlbul2013 09 Supplemental”. ProPublica. Retrieved October 9, 2013.
  241. Jump up^ Matthew Green (2013-09-20). “A Few Thoughts on Cryptographic Engineering: RSA warns developers not to use RSA products”. Blog.cryptographyengineering.com. Retrieved October 9,2013.
  242. Jump up^ Baker, Stewart A. “Don’t Worry Be Happy”. Wired (Condé Nast) (2.06). Retrieved June 28,2013.
  243. Jump up^ “Key Escrow, Key Recovery, Trusted Third Parties & Govt. Access to Keys”. Electronic Frontier Foundation. Retrieved June 28, 2013.
  244. Jump up^ Schneier, Bruce (July 15, 1998). “Declassifying Skipjack”. Crypto-Gram (schneier.com). Retrieved June 28, 2013.
  245. Jump up^ “SKIPJACK and KEA Algorithm Specifications” (PDF). National Institute of Standards and Technology. May 29, 1998. Retrieved June 28, 2013.
  246. Jump up^ NSA Denies It Will Spy on Utilities, Threat Level, Wired.com
  247. Jump up^ Mick, Jason (July 8, 2010). “DailyTech – NSA’s “Perfect Citizen” Program: Big Brother or Cybersecurity Savior?”. DailyTech. Retrieved July 8, 2010.
  248. Jump up^ Whitney, Lance (July 8, 2010). “Report: NSA initiating program to detect cyberattacks”.CNET.com. Retrieved July 8, 2010.
  249. Jump up^ Gorman, Siobhan (2010-07-07). “U.S. Program to Detect Cyber Attacks on Infrastructure”.The Wall Street Journal. Retrieved July 7, 2010.
  250. Jump up^ Robyn Winder and Charlie Speight (April 19, 2013). “Untangling the Web: A Guide to Internet Research”. National Security Agency Public Information. Retrieved May 9, 2013.
  251. Jump up^ Zetter, Kim (May 9, 2013). “Use These Secret NSA Google Search Tips to Become Your Own Spy Agency”. Wired Magazine.
  252. Jump up^ Schneier, Bruce (1996). Applied Cryptography, Second Edition. John Wiley & Sons. pp. 609–610. ISBN 0-471-11709-9.
  253. Jump up^ “United States Patent 6,947,978 – Method for geolocating logical network addresses”. United States Patent and Trademark Office. September 20, 2005. Retrieved July 4, 2008.
  254. Jump up^ James Risen and Eric Lichtblau (June 10, 2013). “How the U.S. Uses Technology to Mine More Data More Quickly”. New York Times. Retrieved June 13, 2013.
  255. Jump up^ National Security Agency (2009). “ARC Registration”. NSA ARC. Retrieved April 13, 2011.
  256. Jump up^ DNI (2009). “2009 National Intelligence Consumer’s Guide”. Director of National Intelligence. Retrieved April 13, 2011.[dead link]
  257. Jump up^ US Army. “Theater Army Operations, Field Manual No. 3-93 (100–7)”. Retrieved April 13,2011.
  258. Jump up^ LACKLAND SECURITY HILL ENTERPRISE INFRASTRUCTURE AND COMPUTER SYSTEMS MANAGEMENT, 1 October 2010, p. 2.
  259. Jump up^ Marc Ambinder, How a single IT tech could spy on the world, June 10, 2013.
  260. Jump up^ Misiewicz (September 1998). “Thesis; Modeling and Simulation of a Global Reachback Architecture …”. Retrieved April 13, 2011.
  261. Jump up^ Joe Jarzombek (2004). “Systems, Network, and Information Integration Context for Software Assurance”. Carnegie Mellon University. Retrieved April 13, 2011.
  262. Jump up^ Dr. Christopher Griffin (2010). “Dealing with Sensitive Data at Penn State’s Applied Research Laboratory: Approach and Examples”. msu.edu. Retrieved April 13, 2011.
  263. Jump up^ NPR.org: Officials: Edward Snowden’s Leaks Were Masked By Job Duties, September 18, 2013.
  264. Jump up^ “The DoD Computer Security Center (DoDCSC) was established in January 1981…” and “In 1985, DoDCSC’s name was changed to the National Computer Security Center…” and “its responsibility for computer security throughout the federal government…” in “A Guide to Understanding Audit in Trusted Systems”. National Computer Security Center via National Institute of Standards and Technology CSRC. Retrieved June 30, 2013.
  265. Jump up^ “NSA and its National Computer Security Center (NCSC) have responsibility for…” in “Computer Systems Laboratory Bulletin”. National Institute of Standards and Technology CSRC. February 1991. Retrieved June 30, 2013.
  266. ^ Jump up to:a b “NSA/NCSC Rainbow Series”. Federation of American Scientists. Retrieved June 30,2013.
  267. Jump up^ “‘Guardian’ journalist: Snowden docs contain NSA ‘blueprint'”. USA Today. Associated Press. July 15, 2013. Retrieved November 28, 2013.

Further reading

External links

http://en.wikipedia.org/wiki/National_Security_Agency

Related Posts on Pronk Palisades

James Bamford — The National Security Agency (NSA) — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Videos

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Read Full Post | Make a Comment ( None so far )

Daniel Yergin — The Quest: The Global Race for Energy, Security and Power and The Prize: The Epic Quest for Oil, Money, Power — Videos

Posted on December 26, 2014. Filed under: Agriculture, American History, Banking, Blogroll, Books, British History, Business, College, Communications, Crisis, Documentary, Economics, Education, Employment, Energy, European History, Faith, Family, Farming, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, government, government spending, history, Inflation, Investments, Islam, Language, Law, liberty, Life, media, Microeconomics, Monetary Policy, Money, Money, Natural Gas, Natural Gas, Non-Fiction, Nuclear Power, Oil, Oil, People, Philosophy, Photos, Politics, Press, Psychology, Rants, Raves, Resources, Reviews, Talk Radio, Tax Policy, Taxes, Technology, Transportation, Unemployment, Video, War, Wealth, Weapons, Weather, Welfare, Wisdom | Tags: , , , , , , , , , , , , , , |

Daniel Yergin on America’s New Energy Reality

Pulitzer Prize winner Daniel Yergin on the next energy revolution

The Evolution of the Canadian Oilsands – An Interview with Daniel Yergin

The Quest: Energy, Security, and the Remaking of the Modern World

An Energy Briefing with Daniel Yergin: Understanding Energy Solutions

Daniel Yergin | Charlie Rose

Daniel Yergin: The Global Quest for Energy

BookTV: After Words: Daniel Yergin, “The Quest”

Fireside Chat with Dan Yergin

World Business: P2P Interview Dan Yergin 28/11/08

 

 

Conversations with History: Energy Security and the Remaking of the Modern World with Daniel Yergin

The Prize (Part 1 of 8) – “Our Plan”

The Prize (Part 2 of 8) – “Empires of Oil”

The Prize (Part 3 of 8) – “Black Giant”

The Prize (Part 4 of 8) – “War and Oil”

The Prize (Part 5 of 8) – “Crude Diplomacy”

The Prize (Part 6 of 8) – “Power to the Producers”

The Prize (Part 7 of 8) – “The Tinderbox”

The Prize (Part 8 of 8) – “New Order of Oil”

 

Read Full Post | Make a Comment ( None so far )

Niall Ferguson — The Ascent of Money: A Financial History of The World, Financial Crisis, Empire, Descent of Money and Beyond The War of The World — Videos

Posted on December 24, 2014. Filed under: American History, Banking, Blogroll, Books, College, Communications, Computers, Corruption, Crisis, Documentary, Education, Employment, Federal Government, Federal Government Budget, Fiscal Policy, Freedom, government, government spending, history, History of Economic Thought, Law, liberty, Life, Links, Macroeconomics, media, Microeconomics, Monetary Policy, Money, Money, People, Philosophy, Photos, Politics, Psychology, Rants, Raves, Tax Policy, Technology, Video, War, Wealth, Welfare, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , |

Ascent_of_Moneyascent of moneyferguson_2164225b

The Ascent of Money: A Financial History of The World by Niall Ferguson Epsd 1 5 Full Documentary

Professor Niall Ferguson – The Descent of Money

Niall Ferguson on importance of civil institutions and more, at Norwegian Nobel Institute

Niall Ferguson on the recent financial meltdown

Niall Ferguson – The Ascent of Money

Niall Ferguson at Charlie Rose 2011

[BBC Parliament] Niall Ferguson Lecture on his new book, The Ascent of Money – 14-12-08

Niall Ferguson Interview: Books, Financial History, Cash Nexus, Economics, Ascent of Money (2004)

Ferguson: Fiscal Crises and Imperial Collapses

Niall Ferguson: Fiscal Crises and Imperial Collapses: Historical Perspective on Current Predicaments

China and the West: Divergence and Convergence

NEED TO KNOW Niall Ferguson on the Tea Party, budget cuts and the economy

Niall Ferguson – Empire: How Britain Made the Modern World – Why Britain? 1/5

Niall Ferguson – Empire: How Britain Made the Modern World – Why Britain? 2/5

Niall Ferguson – Empire: How Britain Made the Modern World – Why Britain? 3/5

Niall Ferguson – Empire: How Britain Made the Modern World – Why Britain? 4/5

Niall Ferguson – Empire: How Britain Made the Modern World – Why Britain? 5/5

Conversations with History: Niall Ferguson

war of the world

The War of the World — Episode 1

The War of the World — Episode 2

The War of the World — Episode 3

The War of the World — Episode 4

The War of the World — Episode 5

The War of the World — Episode 6

 

Niall Ferguson

From Wikipedia, the free encyclopedia
Not to be confused with Niels Ferguson.
Niall Ferguson
Born Niall Campbell Douglas Ferguson
18 April 1964 (age 50)
Glasgow, Scotland
Nationality British
Fields International history, economic history, American and British imperial history
Institutions Harvard University
Stanford
New York University
New College of the Humanities
Jesus College, Oxford
Alma mater Magdalen College, Oxford
Known for Empire: How Britain Made the Modern World
Influences Thomas Hobbes, Norman Stone,A. J. P. Taylor, Kenneth Clark,Adam Smith, Friedrich Hayek,Milton Friedman, John Maynard Keynes, David Landes
Spouse Sue Douglas (1987–2011)
Ayaan Hirsi Ali (2011–present)

Niall Campbell Douglas Ferguson (/ˈnl ˈfɜr.ɡə.sən/; born 18 April 1964)[1] is a Scottish historian. He is the Laurence A. Tisch Professor of History at Harvard University. He is also a Senior Research Fellow of Jesus College, University of Oxford, a Senior Fellow of the Hoover Institution, Stanford University and visiting professor at the New College of the Humanities. His specialties are international history, economic history, particularly hyperinflation and the bond markets, and British and Americanimperialism.[2] He is known for his provocative, contrarian views.[3]

Ferguson’s books include Empire: How Britain Made the Modern World, The Ascent of Money: A Financial History of the World and Civilization: The West and the Rest, all of which he has presented as Channel 4 television series.

In 2004, he was named as one of the 100 most influential people in the world by Time magazine. Since 2011,[dated info] he has been a contributing editor for Bloomberg Television[4][5] and a columnist for Newsweek.

Ferguson was an advisor to John McCain’s U.S. presidential campaign in 2008, and announced his support for Mitt Romney in 2012 and has been a vocal critic of Barack Obama.[6][7]

Early life

Ferguson was born in Glasgow, Scotland, on 18 April 1964. His father was a doctor and his mother a physics teacher.[8][9] He attended The Glasgow Academy.[10] He was brought up as, and remains, an atheist.[11]

Ferguson cites his father as instilling in him a strong sense of self-discipline and of the moral value of work, while his mother encouraged his creative side.[12] His journalist maternal grandfather encouraged him to write.[12] Unable to decide on studying an English or a history degree at university, Ferguson cites his reading of War and Peace as persuading him towards history.[9]

University of Oxford

Ferguson received a Demyship (half-scholarship) at Magdalen College, Oxford.[13] While there he wrote the 90 minute student film ‘The Labours of Hercules Sprote’ and became best friends with Andrew Sullivan, based on a shared affinity for right-wing politics and punk music.[14] He had become a Thatcherite by 1982, identifying the position with “the Sex Pistols‘ position in 1977: it was a rebellion against the stuffy corporatism of the 70s.”[9] While at university “He was very much a Scot on the make … Niall was a witty, belligerent bloke who seemed to have come from an entirely different planet,” according to Simon Winder.[14]Ferguson has stated that “I was surrounded by insufferable Etonians with fake Cockney accents who imagined themselves to be working-class heroes in solidarity with the striking miners. It wasn’t long before it became clear that the really funny and interesting people on campus were Thatcherites.”[14]

He graduated with a first-class honours degree in history in 1985.[13] He received his D.Phil from Magdalen College in 1989, and his dissertation was entitled “Business and Politics in the German Inflation: Hamburg 1914–1924”.[15]

Career

Academic career

Ferguson is a Senior Research Fellow of Jesus College, University of Oxford, and a Senior Fellow of the Hoover Institution, Stanford University. He is a resident faculty member of the Minda de Gunzburg Center for European Studies, and an advisory fellow of the Barsanti Military History Center at the University of North Texas.

In May 2010, he announced that the Education Secretary Michael Gove in the UK’s Conservative/Lib Dem government had invited him to advise on the development of a new history syllabus—”history as a connected narrative”—for schools in England and Wales.[17][18] In June 2011, he joined other academics to set up the New College of the Humanities, a private college in London.[19]

Fellow academics have questioned Ferguson’s commitment to scholarship. Benjamin Wallace-Wells, an editor of The Washington Monthly, comments that

The House of Rothschild remains Ferguson’s only major work to have received prizes and wide acclaim from other historians. Research restrains sweeping, absolute claims: Rothschild is the last book Ferguson wrote for which he did original archival work, and his detailed knowledge of his subject meant that his arguments for it couldn’t be too grand.”[20]

John Lewis Gaddis, a Cold War era historian, characterised Ferguson as having unrivaled “range, productivity and visibility” at the same time as criticising his work as being “unpersuasive”. Gaddis goes on to state that “several of Ferguson’s claims, moreover, are contradictory”.[21]

Marxist historian Eric Hobsbawm has praised Ferguson as an excellent historian.[22] However, he has also criticised Ferguson, saying, on the BBC Radio programme Start the Week, that he was a “nostalgist for empire”.[23] Ferguson responded to the above criticisms in a Washington Post “Live Discussions” online forum in 2006.[24] [clarification needed]

Business career

In 2007, Ferguson was appointed as an investment management consultant by GLG Partners, focusing on geopolitical risk as well as current structural issues in economic behaviour relating to investment decisions.[25] GLG is a UK-based hedge fund management firm headed by Noam Gottesman.[26]

Career as commentator

In October 2007, Ferguson left The Sunday Telegraph to join the Financial Times where he was a contributing editor.[27][28] He also writes for Newsweek.[17]

Ferguson has often described the European Union as a disaster waiting to happen,[29] and has criticised President Vladimir Putin of Russia for authoritarianism. In Ferguson’s view, certain of Putin’s policies, if they continue, may stand to lead Russia to catastrophes equivalent to those that befell Germany during the Nazi era.[30]

Books

The Cash Nexus

In his 2001 book, The Cash Nexus, which he wrote following a year as Houblon-Norman Fellow at the Bank of England,[28] Ferguson argues that the popular saying, “money makes the world go ’round”, is wrong; instead he presented a case for human actions in history motivated by far more than just economic concerns.

Colossus and Empire

In his books Colossus and Empire, Ferguson presents a reinterpretation of the history of the British Empire and in conclusion proposes that the modern policies of the United Kingdom and the United States, in taking a more active role in resolving conflict arising from the failure of states, are analogous to the ‘Anglicization’ policies adopted by the British Empire throughout the 19th century.[31][32] In Colossus, Ferguson explores the United States’ hegemony in foreign affairs and its future role in the world.[33][34]

War of the World

The War of the World, published in 2006, had been ten years in the making and is a comprehensive analysis of the savagery of the 20th century. Ferguson shows how a combination of economic volatility, decaying empires, psychopathic dictators, and racially/ethnically motivated (and institutionalised) violence resulted in the wars and the genocides of what he calls “History’s Age of Hatred”. The New York Times Book Reviewnamed War of the World one of the 100 Notable Books of the Year in 2006, while the International Herald Tribune called it “one of the most intriguing attempts by an historian to explain man’s inhumanity to man“.[35]Ferguson addresses the paradox that, though the 20th century was “so bloody”, it was also “a time of unparalleled [economic] progress”. As with his earlier work Empire,[36] War of the World was accompanied by aChannel 4 television series presented by Ferguson.[37]

The Ascent of Money

Published in 2008, The Ascent of Money examines the long history of money, credit, and banking. In it he predicts a financial crisis as a result of the world economy and in particular the United States using too much credit. Specifically he cites the ChinaAmerica dynamic which he refers to as Chimerica where an Asian “savings glut” helped create the subprime mortgage crisis with an influx of easy money.[38] While researching this book, in early 2007, he attended a conference in Las Vegas where a hedge fund manager stated there would never be another recession, Ferguson stood up and challenged him on it. Later the 2 agreed a 7 to 1 bet, that there would be another recession, for $14,000, with Ferguson paying that amount if he lost and winning $98,000. “I said, ‘Never is a very bad timeframe,'” Ferguson said. “‘Let’s say five years.'” Ferguson collected his winnings as he knew having researched the book and written several papers on economics in history, so knew another recession would definitely occur and with this bet placed a timeline of it occurring before 2012.[39]

Civilization

Published in 2011, Civilization: The West and the Rest examines what Ferguson calls the most “interesting question” of our day: “Why, beginning around 1500, did a few small polities on the western end of the Eurasian landmass come to dominate the rest of the world?” He attributes this divergence to the West’s development of six “killer apps” largely missing elsewhere in the world – “competition, science, the rule of law, medicine, consumerism and the work ethic”.[17] A related documentary Civilization: Is the West History? was broadcast as a six-part series on Channel 4 in March and April 2011.[40]

Opinions and research

World War I

In 1998, Ferguson published the critically acclaimed The Pity of War: Explaining World War One, which with the help of research assistants he was able to write in just five months.[13][14] This is an analytic account of what Ferguson considered to be the ten great myths of the Great War. The book generated much controversy, particularly Ferguson’s suggestion that it might have proved more beneficial for Europe if Britain had stayed out of the First World War in 1914, thereby allowing Germany to win.[41] Ferguson has argued that the British decision to intervene was what stopped a German victory in 1914–15. Furthermore, Ferguson expressed disagreement with the Sonderweg interpretation of German history championed by some German historians such as Fritz Fischer, Hans-Ulrich Wehler, Hans Mommsen and Wolfgang Mommsen, who argued that the German Empire deliberately started an aggressive war in 1914. Likewise, Ferguson has often attacked the work of the German historian Michael Stürmer, who argued that it was Germany’s geographical situation in Central Europe that determined the course of German history.

On the contrary, Ferguson maintained that Germany waged a preventive war in 1914, a war largely forced on the Germans by reckless and irresponsible British diplomacy. In particular, Ferguson accused the British Foreign Secretary Sir Edward Grey of maintaining an ambiguous attitude to the question of whether Britain would enter the war or not, and thus confusing Berlin over just what was the British attitude towards the question of intervention in the war.[42] Ferguson accused London of unnecessarily allowing a regional war in Europe to escalate into a world war. Moreover, Ferguson denied that the origins of National Socialismcould be traced back to Imperial Germany; instead Ferguson asserted the origins of Nazism could only be traced back to the First World War and its aftermath.

Ferguson attacked a number of ideas which he called “myths” in the book. They are listed here, (with his counter-arguments in parentheses):

  • Germany was a highly militarist country before 1914. (Ferguson argued that Germany was Europe’s most anti-militarist country when compared to countries like Britain and France.)[43]
  • The naval threat posed by Germany drove Britain into an informal alliance with France and Russia before 1914. (Ferguson argues that the British decided to align themselves with Russia and France seeing them as more influential and powerful than Germany.)[44]
  • British policy was due to a legitimate fear of Germany. (Ferguson shows how Germany posed no significant threat to Britain and British fears were driven by propaganda and economic self interest.)[45]
  • The pre-1914 arms race was consuming increasingly larger portions of national budgets at an unsustainable rate. (Ferguson demonstrates using actual budget information of the European powers that the only limitations on more military spending before 1914 were political, not economic.)[46]
  • That World War I was an act of aggression on the part of Germany that provoked the British to stop Germany from conquering Europe. (Ferguson infers that if Germany had been victorious over France and Russia, something like the European Union would have been created in 1914. It would have been for the best if Britain had chosen to opt out of war in 1914, as Germany just wanted its “place in the sun.”)[47]
  • Most people were enthusiastic when the war started in 1914. (Ferguson claims that most Europeans were saddened by the start of war, especially when it dragged on long after it was supposed to end.)[48]
  • That propaganda was successful in making men wish to fight. (Ferguson states that propaganda was not nearly as effective as most experts argue.)[49]
  • The Allies utilized their economic resources to the fullest. (Ferguson argues that the allies made poor use of their vast economic resources such as those coming from their colonies as well as corruption in the war time governments. France and Britain both possessed huge colonial possessions that offered a plethora of resources as well as man power.)[50]
  • That the British and the French possessed better armies than the central powers. (Ferguson claims that the German Army was superior, with better equipment and leadership.)[51]
  • The Allies were better at killing Germans throughout the war. (Ferguson statistically shows that the Germans were actually far superior in exacting casualties than the Allies, this is due to German strategy and use of poison gas.)[52]
  • The majority of soldiers hated fighting in the war due to intolerable conditions. (Ferguson asserts that most soldiers fought due to nationalism and a sense of duty.)[53]
  • The British treated German prisoners more humanely than the Germans did. (Ferguson cites numerous occasions in which British officers ordered the killing of German prisoners of war.)[54]
  • Germany was faced with reparations that could not be paid except at the expense of the German economy. (Ferguson attempts to prove that Germany could have paid reparations if they had been willing.)[55]

Another controversial aspect of The Pity of War is Ferguson’s use of counterfactual history also known as “speculative” or “hypothetical” history. In the book, Ferguson presents a hypothetical version of Europe being, under Imperial German domination, a peaceful, prosperous, democratic continent, without ideologies like communism or fascism.[56] In Ferguson’s view, had Germany won World War I, then the lives of millions would have been saved, something like the European Union would have been founded in 1914, and Britain would have remained an empire as well as the world’s dominant financial power.[56]

Rothschilds

Ferguson wrote two volumes about the prominent Rothschild family:

  • The House of Rothschild: Volume 1: Money’s Prophets: 1798–1848[57]
  • The House of Rothschild: Volume 2: The World’s Banker: 1849–1999[58]

The books won the Wadsworth Prize for Business History and were also short-listed for the Jewish Quarterly-Wingate Literary Award and the American National Jewish Book Award.[28]

Counterfactual history

Ferguson sometimes champions counterfactual history, also known as “speculative” or “hypothetical” history, and edited a collection of essays, titled Virtual History: Alternatives and Counterfactuals (1997), exploring the subject.

Ferguson likes to imagine alternative outcomes as a way of stressing the contingent aspects of history. For Ferguson, great forces don’t make history; individuals do, and nothing is predetermined. Thus, for Ferguson, there are no paths in history that will determine how things will work out. The world is neither progressing nor regressing; only the actions of individuals determine whether we will live in a better or worse world.

His championing of the method has been controversial within the field.[59]

In a 2011 review of Ferguson’s book Civilization: The West and the Rest, Noel Malcolm (Senior Research Fellow in History at All Souls College at Oxford University) stated that: “Students may find this an intriguing introduction to a wide range of human history; but they will get an odd idea of how historical argument is to be conducted, if they learn it from this book.”[60]

Henry Kissinger

In 2003, former U.S. Secretary of State Henry Kissinger provided Ferguson with access to his White House diaries, letters, and archives for what Ferguson calls a “warts-and-all biography” of Kissinger.[61]

Colonialism

Ferguson is critical of what he calls the “self-flagellation” that he says characterises modern European thought.

“The moral simplification urge is an extraordinarily powerful one, especially in this country, where imperial guilt can lead to self-flagellation,” he told a reporter. “And it leads to very simplistic judgments. The rulers of western Africa prior to the European empires were not running some kind of scout camp. They were engaged in the slave trade. They showed zero sign of developing the country’s economic resources. Did Senegal ultimately benefit from French rule? Yes, it’s clear. And the counterfactual idea that somehow the indigenous rulers would have been more successful in economic development doesn’t have any credibility at all.”[17]

Richard Drayton, Rhodes Professor of Imperial History at the University of London, has stated that it is correct to associate “Ferguson with an attempt to ‘rehabilitate empire’ in the service of contemporary great power interests”.[62]

Bernard Porter attacked Empire in The London Review of Books as a “panegyric to British colonialism”.[63] Ferguson in response to this drew Porter’s attention to the conclusion of the book, where he writes: “No one would claim that the record of the British Empire was unblemished. On the contrary, I have tried to show how often it failed to live up to its own ideal of individual liberty, particularly in the early era of enslavement, transportation and the ‘ethnic cleansing’ of indigenous peoples.” Ferguson argues however that the British Empire was preferable to the alternatives:

‘The 19th-century empire undeniably pioneered free trade, free capital movements and, with the abolition of slavery, free labour. It invested immense sums in developing a global network of modern communications. It spread and enforced the rule of law over vast areas. Though it fought many small wars, the empire maintained a global peace unmatched before or since. In the 20th century too the empire more than justified its own existence. For the alternatives to British rule represented by the German and Japanese empires were clearly – and they admitted it themselves – far worse. And without its empire, it is inconceivable that Britain could have withstood them.’[63]

Exchange with Pankaj Mishra

In November 2011 Pankaj Mishra reviewed Civilisation: The West and the Rest unfavourably in the London Review of Books.[64] Ferguson demanded an apology and threatened to sue Mishra on charges of libel due to allegations of racism.[65]

Islam and “Eurabia”

Matthew Carr wrote in Race & Class that

“Niall Ferguson, the conservative English [sic] historian and enthusiastic advocate of a new American empire, has also embraced the Eurabian idea in a widely reproduced article entitled ‘Eurabia?’,”[66]

in which he laments the ‘de-Christianization of Europe’ and its culture of secularism that leaves the continent ‘weak in the face of fanaticism’.” Carr adds that

“Ferguson sees the recent establishment of a department of Islamic studies in his Oxford college as another symptom of ‘the creeping Islamicization of a decadent Christendom”,

and that in a 2004 lecture at the American Enterprise Institute entitled ‘The End of Europe?’,[67]

“Ferguson struck a similarly Spenglerian note, conjuring the term ‘impire’ to depict a process in which a ‘political entity, instead of expanding outwards towards its periphery, exporting power, implodes – when the energies come from outside into that entity’. In Ferguson’s opinion, this process was already under way in a decadent ‘post-Christian’ Europe that was drifting inexorably towards the dark denouement of a vanquished civilisation and the fatal embrace of Islam.”[68]

Iraq War

Ferguson supported the 2003 Iraq War, and he is on record as not necessarily opposed to future western incursions around the world.

“It’s all very well for us to sit here in the West with our high incomes and cushy lives, and say it’s immoral to violate the sovereignty of another state. But if the effect of that is to bring people in that country economic and political freedom, to raise their standard of living, to increase their life expectancy, then don’t rule it out”.[17]

Economic policy

In its 15 August 2005 edition, The New Republic published “The New New Deal”, an essay by Ferguson and Laurence J. Kotlikoff, a professor of economics at Boston University. The two scholars called for the following changes to the American government’s fiscal and income security policies:

  • Replacing the personal income tax, corporate income tax, Federal Insurance Contributions Act tax (FICA), estate tax, and gift tax with a 33% Federal Retail Sales Tax (FRST), plus a monthly rebate, amounting to the amount of FRST that a household with similar demographics would pay if its income were at the poverty line. See also: FairTax
  • Replacing the old age benefits paid under Social Security with a Personal Security System, consisting of private retirement accounts for all citizens, plus a government benefit payable to those whose savings were insufficient to afford a minimum retirement income
  • Replacing Medicare and Medicaid with a Medical Security System that would provide health insurance vouchers to all citizens, the value of which would be determined by one’s health
  • Cutting federal discretionary spending by 20%

In November 2012, Ferguson stated in a video with CNN that the U.S. has enough energy resources to move towards energy independence and could possibly enter a new economic golden age due to the related socio-economic growth—coming out of the post-world economic recession doldrums.[69]

Ferguson was an attendee of the 2012 Bilderberg Group meeting, where he was a speaker on economic policy.[70]

Exchanges with Paul Krugman

In May 2009, Ferguson became involved in a high-profile exchange of views with economist Paul Krugman (2008 Nobel Laureate in Economics) arising out of a panel discussion hosted by PEN/New York Review on 30 April 2009, regarding the U.S. economy. Ferguson contended that the Obama administration’s policies are simultaneously Keynesian and monetarist, in an “incoherent” mix, and specifically claimed that the government’s issuance of a multitude of new bonds would cause an increase in interest rates.[71]

Krugman argued that Ferguson’s view is “resurrecting 75-year old fallacies” and full of “basic errors”. He also stated that Ferguson is a “poseur” who “hasn’t bothered to understand the basics, relying on snide comments and surface cleverness to convey the impression of wisdom. It’s all style, no comprehension of substance.”[72][73][74][75]

In 2012, Jonathan Portes, the director of the National Institute of Economic and Social Research, said that subsequent events had shown Ferguson to be wrong: “As we all know, since then both the US and UK have had deficits running at historically extremely high levels, and long-term interest rates at historic lows: as Krugman has repeatedly pointed out, the (IS-LM) textbook has been spot on.”[76]

Later in 2012, after Ferguson wrote a cover story for Newsweek arguing that Mitt Romney should be elected in the upcoming US presidential election, Krugman wrote that there were multiple errors and misrepresentations in the story, concluding “We’re not talking about ideology or even economic analysis here – just a plain misrepresentation of the facts, with an august publication letting itself be used to misinform readers. The Times would require an abject correction if something like that slipped through. Will Newsweek?”[77] Ferguson denied that he had misrepresented the facts in an online rebuttal.[78] Matthew O’Briencountered that Ferguson was still distorting the meaning of the CBO report being discussed, and that the entire piece could be read as an effort to deceive.[79]

In 2013, Ferguson, naming Dean Baker, Josh Barro, Brad DeLong, Matthew O’Brien, Noah Smith, Matthew Yglesias and Justin Wolfers, attacked “Krugman and his acolytes,” in his three-part essay on why he hates Paul Krugman,[80] whose title is originally made by Noah Smith.[81]

Remarks on Keynes’ sexual orientation

At a May 2013 investment conference in Carlsbad, California, Ferguson was asked about his views on economist John Maynard Keynes‘s quotation that “in the long run we are all dead.” Ferguson stated that Keynes was indifferent to the future because he was gay and did not have children.[82]

The remarks were widely criticised for being offensive, factually inaccurate, and a distortion of Keynes’ ideas.[83][84]

Ferguson posted an apology for these statements shortly after reports of his words were widely disseminated, saying his comments were “as stupid as they were insensitive”.[85] In the apology, Ferguson stated: “My disagreements with Keynes’s economic philosophy have never had anything to do with his sexual orientation. It is simply false to suggest, as I did, that his approach to economic policy was inspired by any aspect of his personal life.”[86]

Personal life

Ferguson married journalist Susan Douglas, whom he met in 1987 when she was his editor at the Daily Mail. They have three children.[87]

In February 2010, news media reported that Ferguson had separated from Douglas and started dating former Dutch MP Ayaan Hirsi Ali.[88][89][90] Ferguson and Douglas divorced in 2011.

Ferguson married Hirsi Ali in September 2011[91] and Hirsi Ali gave birth to their son in December 2011.[92][93][94]

Ferguson dedicated his book Civilization to “Ayaan”. In an interview with The Guardian, Ferguson spoke about his love for Ali, who, he writes in the preface, “understands better than anyone I know what Western civilisation really means – and what it still has to offer the world”.[17] Ali, he continued,

…grew up in the Muslim world, was born in Somalia, spent time in Saudi Arabia, was a fundamentalist as a teenager. Her journey from the world of her childhood and family to where she is today is an odyssey that’s extremely hard for you or I [sic] to imagine. To see and hear how she understands western philosophy, how she understands the great thinkers of the Enlightenment, of the 19th-century liberal era, is a great privilege, because she sees it with a clarity and freshness of perspective that’s really hard for us to match. So much of liberalism in its classical sense is taken for granted in the west today and even disrespected. We take freedom for granted, and because of this we don’t understand how incredibly vulnerable it is.[17]

Ferguson’s self confessed workaholism has placed strains on his personal relations in the past. Ferguson has commented that:

…from 2002, the combination of making TV programmes and teaching at Harvard took me away from my children too much. You don’t get those years back. You have to ask yourself: “Was it a smart decision to do those things?” I think the success I have enjoyed since then has been bought at a significant price. In hindsight, there would have been a bunch of things that I would have said no to.[12]

Ferguson was the inspiration for Alan Bennett‘s play The History Boys (2004), particularly the character of Irwin, a history teacher who urges his pupils to find a counterintuitive angle, and goes on to become a television historian.[8] Bennett’s character “Irwin” gives the impression that “an entire career can be built on the trick of contrariness.”[8]

Bibliography

Publications

As contributor

  • “Let Germany Keep Its Nerve”, The Spectator, 22 April 1995, pages 21–23[95]
  • “Europa nervosa”, in Nader Mousavizadeh (ed.), The Black Book of Bosnia (New Republic/Basic Books, 1996), pp. 127–32
  • “The German inter-war economy: Political choice versus economic determinism” in Mary Fulbrook (ed.), German History since 1800 (Arnold, 1997), pp. 258–278
  • “The balance of payments question: Versailles and after” in Manfred F. Boemeke, Gerald D. Feldman and Elisabeth Glaser (eds.), The Treaty of Versailles: A Reassessment after 75 Years (Cambridge University Press, 1998), pp. 401–440
  • “‘The Caucasian Royal Family’: The Rothschilds in national contexts” in R. Liedtke (ed.), ‘Two Nations’: The Historical Experience of British and German Jews in Comparison (J.C.B. Mohr, 1999)
  • “Academics and the Press”, in Stephen Glover (ed.), Secrets of the Press: Journalists on Journalism (Penguin, 1999), pp. 206–220
  • “Metternich and the Rothschilds: A reappraisal” in Andrea Hamel and Edward Timms (eds.), Progress and Emancipation in the Age of Metternich: Jews and Modernisation in Austria and Germany, 1815–1848(Edwin Mellen Press, 1999), pp. 295–325
  • “The European economy, 1815–1914” in T.C.W. Blanning (ed.), The Short Oxford History of Europe: The Nineteenth Century (Oxford University Press, 2000), pp. 78–125
  • “How (not) to pay for the war: Traditional finance and total war” in Roger Chickering and Stig Förster (eds.), Great War, Total War: Combat and Mobilization on the Western Front (Cambridge University Press, 2000), pp. 409–34
  • “Introduction” in Frederic Manning, Middle Parts of Fortune (Penguin, 2000), pp. vii–xviii
  • “Clashing civilizations or mad mullahs: The United States between informal and formal empire” in Strobe Talbott (ed.), The Age of Terror (Basic Books, 2001), pp. 113–41
  • “Public debt as a post-war problem: The German experience after 1918 in comparative perspective” in Mark Roseman (ed.), Three Post-War Eras in Comparison: Western Europe 1918-1945-1989 (Palgrave-Macmillan, 2002), pp. 99–119
  • “Das Haus Sachsen-Coburg und die europäische Politik des 19. Jahrhunderts”, in Rainer von Hessen (ed.), Victoria Kaiserin Friedrich (1840–1901): Mission und Schicksal einer englischen Prinzessin in Deutschland (Campus Verlag, 2002), pp. 27–39
  • “Max Warburg and German politics: The limits of financial power in Wilhelmine Germany”, in Geoff Eley and James Retallack (eds.), Wilhelminism and Its Legacies: German Modernities, Imperialism and the Meaning of Reform, 1890–1930 (Berghahn Books, 2003), pp. 185–201
  • “Introduction”, The Death of the Past by J. H. Plumb (Palgrave Macmillan, 2003), pp. xxi–xlii
  • “Globalization in historical perspective: The political dimension”, in Michael D. Bordo, Alan M. Taylor and Jeffrey G. Williamson (eds.), Globalisation in Historical Perspective (National Bureau of Economic Research Conference Report) (University of Chicago Press, 2003)
  • “Introduction to Tzvetan Todorov” in Nicholas Owen (ed.), Human Rights, Human Wrongs: Oxford Amnesty Lectures (Amnesty International, 2003)
  • “The City of London and British imperialism: New light on an old question”, in Youssef Cassis and Eric Bussière (eds.), London and Paris as International Financial Centres in the Twentieth Century (Oxford University Press, 2004), pp. 57–77
  • “A bolt from the blue? The City of London and the outbreak of the First World War”, in Wm. Roger Louis (ed.), Yet More Adventures with Britainnia: Personalities, Politics and Culture in Britain (I.B. Tauris, 2005), pp. 133–145
  • “The first ‘Eurobonds’: The Rothschilds and the financing of the Holy Alliance, 1818–1822”, in William N. Goetzmann and K. Geert Rouwenhorst (eds.), The Origins of Value: The Financial Innovations that Created Modern Capital Markets (Oxford University Press, 2005), pp. 311–323
  • “Prisoner taking and prisoner killing in the age of total war”, in George Kassemiris (ed.), The Barbarization of Warfare (New York University Press, 2006), pp. 126–158
  • “The Second World War as an economic disaster”, in Michael Oliver (ed.), Economic Disasters of the Twentieth Century (Edward Elgar, 2007), pp. 83–132
  • “The Problem of Conjecture: American Strategy after the Bush Doctrine”, in Melvyn Leffler and Jeff Legro (eds.), To Lead the World: American Strategy After the Bush Doctrine (Oxford University Press, 2008)

Television documentaries

BBC Reith Lectures

Niall Ferguson recording the third of his 2012 BBC Reith Lecture atGresham College

In May 2012 the BBC announced Niall Ferguson was to present its annual Reith Lectures – a prestigious series of radio lectures which were first broadcast in 1948. These four lectures, titled The Rule of Law and its Enemies, examine the role man-made institutions have played in the economic and political spheres.[96]

In the first lecture, held at the London School of Economics, titled The Human Hive, Ferguson argues for greater openness from governments, saying they should publish accounts which clearly state all assets and liabilities. Governments, he said, should also follow the lead of business and adopt the Generally Accepted Accounting Principlesand, above all, generational accounts should be prepared on a regular basis to make absolutely clear the inter-generational implications of current fiscal policy. In the lecture, Ferguson says young voters should be more supportive of government austerity measures if they do not wish to pay further down the line for the profligacy of the baby boomergeneration.[97]

In the second lecture, The Darwinian Economy, Ferguson reflects on the causes of the global financial crisis, and erroneous conclusions that many people have drawn from it about the role of regulation, such as whether it is in fact “the disease of which it purports to be the cure”.

The Landscape of Law was the third lecture, delivered at Gresham College. It examines the rule of law in comparative terms, asking how far the common law‘s claims to superiority over other systems are credible, and whether we are living through a time of ‘creeping legal degeneration’ in the English-speaking world.

The fourth and final lecture, Civil and Uncivil Societies, focuses on institutions (outside the political, economic and legal realms) designed to preserve and transmit particular knowledge and values. It asks whether the modern state is quietly killing civil society in the Western world, and what non-Western societies can do to build a vibrant civil society.

The first lecture was broadcast on BBC Radio 4 and the BBC World Service on Tuesday, 19 June 2012.[98] The series is available as a BBC podcast.[99]

See also

References

Notes

  1. Jump up^ Biography Niall Ferguson
  2. Jump up^ “Harvard University History Department — Faculty: Niall Ferguson”. History.fas.harvard.edu. Retrieved 15 September 2013.
  3. Jump up^ “Turning Points”. The New York Times. Retrieved 16 September2013.
  4. Jump up^ “Niall Ferguson Says China `Hard Landing’ Unlikely”. bloomberg.com. 29 September 2011. Retrieved 17 June 2012.
  5. Jump up^ “Spain Bank Crisis Is Not Over, Niall Ferguson Says”. bloomberg.com. 11 June 2012. Retrieved 17 June 2012.
  6. Jump up^ “Why Obama Needs to Go,” Newsweek, 9 August 2012
  7. Jump up^ “Newsweek’s anti-Obama cover story: Has the magazine lost all credibility?” The Week, 21 August 2012
  8. ^ Jump up to:a b c Smith, David (18 June 2006). “Niall Ferguson: The empire rebuilder”. The Observer (Guardian News and Media).
  9. ^ Jump up to:a b c Templeton, Tom (18 January 2009). “This much I know: Niall Ferguson, historian, 44, London”. The Observer (Guardian News and Media).
  10. Jump up^ Tassel, Janet (2007). “The Global Empire of Niall Ferguson”.Harvard Magazine. Retrieved 17 June 2012.
  11. Jump up^ Ferguson, Niall (4 January 2008). “Niall Ferguson on Belief”. Big Think. Retrieved 17 June 2012. Recorded on: October 31, 2007
  12. ^ Jump up to:a b c Duncan, Alistair (19 March 2011). “Niall Ferguson: My family values”. The Guardian (Guardian News and Media).
  13. ^ Jump up to:a b c Niall Ferguson, Senior Fellow Hoover Institution, 30 November 2011
  14. ^ Jump up to:a b c d Robert Boynton Thinking the Unthinkable: A profile of Niall Ferguson The New Yorker, 12 April 1999
  15. Jump up^ Dissertation Abstracts International: The Humanities and Social sciences 53. University Microfilms. 1993. p. 3318.
  16. Jump up^ “LSE IDEAS appoints Professor Niall Ferguson to chair in international history”. London School of Economics. 25 March 2009. Archived from the original on 28 March 2010. Retrieved 17 June2012. Philippe Roman Chair in History and International Affairs, for 2010–2011
  17. ^ Jump up to:a b c d e f g William Skidelsky (20 February 2011). “Niall Ferguson: ‘Westerners don’t understand how vulnerable freedom is'”. The Observer (Guardian News and Media). Retrieved 24 February 2011.
  18. Jump up^ Higgins, Charlotte (31 May 2010). “Empire strikes back: rightwing historian to get curriculum role”. guardian.co.uk (Guardian News and Media). Retrieved 31 May 2010.
  19. Jump up^ Cook, Chris (5 June 2011). “Star professors set up humanities college”. Financial Times. Retrieved 17 June 2012.(registration required)
  20. Jump up^ Benjamin Wallace-Wells Right Man’s Burden Washington Monthly, June 204
  21. Jump up^ “The Last Empire, for Now”. New York Times. 25 July 2004. Retrieved 5 May 2012.
  22. Jump up^ Globalisation, democracy and terrorism, Eric Hobsbawm (Abacus 2008)
  23. Jump up^ Start the Week BBC Radio 4, 12 June 2006
  24. Jump up^ Ferguson, Niall (7 November 2006). “Book World Live”. The Washington Post. Retrieved 20 May 2010.
  25. Jump up^ “Meet The Hedge Fund Historian”. Forbes.com. 30 September 2007. Retrieved 20 December 2008.
  26. Jump up^ “GLG Company Description”. Retrieved 20 December2008.[dead link]
  27. Jump up^ Tryhorn, Chris (23 October 2007). “Niall Ferguson joins FT”.MediaGuardian (Guardian News and Media). Retrieved 20 May 2010.
  28. ^ Jump up to:a b c “Niall Ferguson: Biography”. Retrieved 14 July 2008.[dead link]
  29. Jump up^ “The End of Europe?”. American Enterprise Institute for Public Policy Research. 4 March 2004.
  30. Jump up^ Ferguson, Niall (1 May 2005). “Look back at Weimar – and start to worry about Russia”. The Telegraph. Retrieved 5 May 2012.
  31. Jump up^ Porter, Andrew (April 2003). “Empire: How Britain Made the Modern World”. Reviews in History. Institute of Historical Research, University of London. Retrieved 17 February 2011.
  32. Jump up^ Wilson, Jon (8 February 2003). “False and dangerous: Revisionist TV history of Britain’s empire is an attempt to justify the new imperial order”. guardian.co.uk (Guardian News and Media). Retrieved17 February 2011.
  33. Jump up^ Waslekar, Sundeep (July 2006). “A Review of: Colossus by Prof Niall Ferguson”. StrategicForesight.com. Strategic Foresight Group. Retrieved 17 February 2011.[dead link]
  34. Jump up^ Roberts, Adam (14 May 2004). “Colossus by Niall Ferguson: An empire in deep denial”. The Independent. Retrieved 17 February2011.
  35. Jump up^ “100 Notable Books of the Year”. The New York Times. 22 November 2006. Retrieved 14 July 2008.
  36. Jump up^ Ferguson, Niall. “Empire and globalisation”. Channel 4. Retrieved14 July 2008.[dead link]
  37. ^ Jump up to:a b “The War of the World”. Channel 4. Retrieved 14 July2008.[dead link]
  38. Jump up^ McRae, Hamish (31 October 2008). “The Ascent of Money, By Niall Ferguson”. The Independent. Retrieved 30 November 2008.
  39. Jump up^ http://belfercenter.hks.harvard.edu/publication/18873/spotlight.html?breadcrumb=%2Fexperts%2F946%2Fsasha_talcott%3Fback_url%3D%252Fpublication%252F18738%252Fharvard_kennedy_schools_john_p_holdren_named_obamas_science_advisor%26back_text%3DBack%2520to%2520publication%26page%3D3
  40. Jump up^ “Civilization: Is the West History?”. Retrieved 4 April 2011.
  41. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 460–461
  42. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 154–156
  43. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 27–30
  44. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 52–55
  45. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 68–76
  46. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 87–101 & 118–125
  47. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 168–173
  48. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 197–205
  49. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 239–247
  50. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 267–277
  51. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 310–317
  52. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 336–338
  53. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 357–366
  54. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 380–388
  55. Jump up^ Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 412–431
  56. ^ Jump up to:a b Ferguson, Niall The Pity of War, Basic Books: New York, 1998, 1999 pages 168–173 & 460–461
  57. Jump up^ Ferguson, Niall (1999). The House of Rothschild: Money’s Prophets, 1798–1848. Volume 1. New York: Penguin Books. ISBN 0-14-024084-5.
  58. Jump up^ Ferguson, Niall (2000). The House of Rothschild: The World’s Banker 1849–1998. Volume 2. New York: Penguin Books. ISBN 0-14-028662-4.
  59. Jump up^ Kreisler, Harry (3 November 2003). “Conversation with Niall Ferguson: Being a Historian”. Conversations with History. Regents of the University of California. Retrieved 15 July 2008.
  60. Jump up^ Malcolm, Noel (13 March 2011). “Civilisation: The West and the Rest by Niall Ferguson: review”. The Daily Telegraph. The patient testing of evidence must give way to startling statistics, gripping anecdotes and snappy phrase-making. Niall Ferguson is never unintelligent and certainly never dull. Students may find this an intriguing introduction to a wide range of human history; but they will get an odd idea of how historical argument is to be conducted, if they learn it from this book
  61. Jump up^ Hagan, Joe (27 November 2006). “The Once and Future Kissinger”. New York Magazine. Retrieved 14 July 2008.
  62. Jump up^ “Letters: The British empire and deaths in Kenya”. The Guardian. 16 June 2010.
  63. ^ Jump up to:a b Tell me where I’m wrong London Review of Books, 19 May 2005
  64. Jump up^ Mishra, Pankaj (3 November 2011). “Watch this man (review of ‘Civilisation’ by Niall Ferguson)”. London Review of Books 33 (21): 10–12. Retrieved 2 June 2013.
  65. Jump up^ Beaumont, Peter (26 November 2011). “Niall Ferguson threatens to sue over accusation of racism”. The Guardian. Retrieved4 September 2012.
  66. Jump up^ Niall Ferguson The way we live now: 4-4-04; Eurabia? New York Times, 4 April 2004
  67. Jump up^ Niall Ferguson The end of Europe?[dead link] American Enterprise Institute Bradley Lecture, 1 March 2004
  68. Jump up^ Carr, M. (2006). “You are now entering Eurabia”. Race & Class 48: 1–0. doi:10.1177/0306396806066636. edit
  69. Jump up^ “Top News Today | New age of U.S. prosperity? | Home | cnn.com”. Home.topnewstoday.org. 23 November 2012. Retrieved15 September 2013.
  70. Jump up^ http://www.bilderbergmeetings.org/participants2012.html
  71. Jump up^ Joe Weisenthal (6 May 2013). “Niall Ferguson’s Horrible Track Record On Economics”. Business Insider. Retrieved 29 May 2013.
  72. Jump up^ Paul Krugman (2 May 2009). “Liquidity preference, loanable funds, and Niall Ferguson (wonkish)”. New York times.
  73. Jump up^ Paul Krugman (22 May 2009). “Gratuitous ignorance”. New York Times.
  74. Jump up^ The Conscience of a Liberal
  75. Jump up^ Paul Krugman (17 August 2009). “Black cats”. New York Times.
  76. Jump up^ Portes, Jonathan (25 June 2012). “Macroeconomics: what is it good for? [a response to Diane Coyle]”. Retrieved 26 June 2012.
  77. Jump up^ Kavoussi, Bonnie. “Paul Krugman Bashes Niall Ferguson’s Newsweek Cover Story As ‘Unethical'”. The Huffington Post. Retrieved28 August 2012.
  78. Jump up^ Ferguson, Niall. “Ferguson’s Newsweek Cover Rebuttal: Paul Krugman Is Wrong”. The Daily Beast. Retrieved 28 August 2012.
  79. Jump up^ O’Brien, Matthew. “The Age of Niallism: Ferguson and the Post-Fact World”. The Atlantic. Retrieved 28 August 2012.
  80. Jump up^ Niall Ferguson, Krugtron the Invincible, Part 1, Krugtron the Invincible, Part 2, Krugtron the Invincible, Part 3
  81. Jump up^ Noah Smith, KrugTron the Invincible
  82. Jump up^ Paul Harris (4 May 2013): Niall Ferguson apologises for remarks about ‘gay and childless’ Keynes The Guardian, retrieved 7 May 2013
  83. Jump up^ Blodget, Henry. “Harvard’s Niall Ferguson Blamed Keynes’ Economic Philosophy On His Being Childless And Gay”.
  84. Jump up^ Kostigen, Tom. “Harvard Professor Trashes Keynes For Homosexuality”.
  85. Jump up^ Harris, Paul (4 May 2012). “Niall Ferguson apologises for remarks about ‘gay and childless’ Keynes”. guardian.co.uk. Retrieved 5 May2013.
  86. Jump up^ Niall Ferguson (5 May 2013): An Unqualified Apology Homesite, retrieved 7 May 2013
  87. Jump up^ Lynn, Matthew (23 August 2009). “Professor Paul Krugman at war with Niall Ferguson over inflation”. Times Online. Retrieved25 October 2009.(subscription required)
  88. Jump up^ Gray, Sadie (14 February 2010). “PROFILE: Niall Ferguson”.Times Online.(subscription required)
  89. Jump up^ Hale, Beth (8 February 2010). “The historian, his wife and a mistress living under a fatwa”. Mail Online (Associated Newspapers).
  90. Jump up^ “Niall Ferguson and Ayaan Hirsi Ali”. The Independent. 25 February 2010.
  91. Jump up^ Eden, Richard (18 December 2011). “Henry Kissinger watches historian Niall Ferguson marry Ayaan Hirsi Ali under a fatwa”. The Telegraph. Retrieved 27 September 2011.
  92. Jump up^ Numann, Jessica (30 December 2011). “Ayaan Hirsi Ali (42) bevalt van een zoon”. Elsevier. Retrieved 30 December 2011.
  93. Jump up^ “Ayaan Hirsi Ali gives birth to baby boy”. DutchNews.nl (online magazine). 30 December 2011. Retrieved 9 June 2012.
  94. Jump up^ “Ayaan Hirsi Ali is bevallen van zoon Thomas”. Volkskrant. 30 December 2011. Retrieved 9 June 2012.
  95. Jump up^ “Brad DeLong : Keynesian Economics: The Gay Science?”. Delong.typepad.com. 7 May 2013. Retrieved 15 September 2013.
  96. Jump up^ “BBC News — Historian Niall Ferguson named 2012 BBC Reith Lecturer”. Bbc.co.uk. 11 May 2012. Retrieved 15 September 2013.
  97. Jump up^ Niall, Prof (17 June 2012). “BBC News — Viewpoint: Why the young should welcome austerity”. Bbc.co.uk. Retrieved 15 September 2013.
  98. Jump up^ BBC Radio 4 – The Reith Lectures
  99. Jump up^ BBC – Podcasts and Downloads – Reith Lectures

General references

External links

 

Related Posts On Pronk Palisades

The Ascent of Money–Videos

Fouad Ajami–The Foreigner’s Gift–Videos

Michael Barone–Our First Revolution–Videos

Philip Bobbitt–Terror and Consent–Videos

Patrick J. Buchanan–Churchill, Hitler, and The Unnecessary War–Videos

Ron Chernow–Alexander Hamilton–Videos

Thomas J. DiLorenzon–Hamilton’s Curse: How Jefferson’s Arch Enemy Betrayed the American Revolution – And What It Means for Americans Today–Videos

Joseph J. Ellis–His Excellency: George Washington–Videos

Bruce Feiler–Walking the Bible–Videos

Milton Friedman–Free To Choose–On Donahue –Videos

Brigitte Gabriel–Because They Hate: A Survivor of Islamic Terror Warns America–Videos

Brigitte Gabriel–They Must Be Stopped: Why We Must Defeat Radical Islam and How We Can Do It –Videos

Jonah Goldberg–Liberal Fascism–Videos

David Goodwillie–American Subversive–A Novel

Victor Davis Hansen–A War Like No Other–Videos

Peter Huber–The Bottomless Well–Videos

Donald Kagan–On The Origins Of War–Videos

George Lakoff–Videos

Mark Levin–Liberty and Tyranny: A Conservative Manifesto–Videos

Barack Obama Cartoon Concisely Communicates What’s Wrong With Progressive Radical Socialism–Why Do We Need Jobs For?–A Hayek and Mises Moment!

Andrew C. McCarthy–Willful Blindness–Videos

Melanie Phillips–Londonistan–Videos

Melanie Phillips–The World Turned Upside Down: The Global Battle over God, Truth, and Power–Video

James Piereson–Camelot and The Cultural Revolution–Videos

Paul Rahe–Soft Despotism, Democracy’s Drift: Montesquieu, Rousseau, Tocqueville, and the Modern Prospect–Videos

Ayn Rand–Videos

The Fountainhead, Atlas Shrugged and The Ideas of Ayn Rand

Yaron Brook On Capitalism and Atlas Shrugged–Videos

Roy Spencer–The Great Global Warming Blunder: How Mother Nature Fooled the World’s Top Climate Scientists –Videos

Mark Steyn–America Alone: The End of The World As We Know It–Videos

John Stossel On Ayn Rand’s Atlas Shrugged

Daniel Suarez–Daemon and Freedom TM–Videos

Peter Robinson–Conversations With Authors–Videos

Murry Rothbard–For A New Liberty: The Libertarian Manifesto–Audio Book

Murray Rothbard– What Has Government Done to Our Money?–Videos

Amity Shlaes–The Forgotten Man–Videos

Thomas Sowell and Conflict of Visions–Videos

Thomas Sowell–Black Rednecks and White Liberals–The Missing Nobel Laureates–Videos

Thomas Sowell–Intellectuals and Society–Videos

Thomas Sowell On The Housing Boom and Bust–Videos

Marc Thiessen’s Courting Disaster–A Clear and Present Danger To The American People–President Barack Obama!

Thomas E. Woods Jr.–Meltdown–Videos

Read Full Post | Make a Comment ( None so far )

Better Late Than Never — The U.S. Economy in 3rd Quarter Grew At 5% Rate Above Historic Trend of 3.2% — Federal Reserve Has No Exit Strategy — Will Keep On Printing Money Next Year –Videos

Posted on December 23, 2014. Filed under: American History, Banking, Blogroll, British History, College, Documentary, Economics, Education, Energy, Federal Communications Commission, Federal Government, Federal Government Budget, Fiscal Policy, Freedom, government, government spending, history, History of Economic Thought, Illegal, Immigration, Inflation, Investments, Legal, Macroeconomics, Microeconomics, Monetary Policy, Money, Natural Gas, Oil, Tax Policy | Tags: , , , , |

gdp_large

Economic Growth Roars Past Estimates, With Third Quarter GDP Expanding 5%

The Dow Jones has closed above 18,000

Peter Schiff: Fed Caused Oil Crash, Stocks Next

Fed optimistic on US economy

Bbc News-US economy growing at quickest pace for 11 years

Gerald Celente Predictions 2015 | World War 3, US Economic Collapse, Disastrous Christmas

Frank Sinatra – Fly me to the moon (with lyrics)

U.S. Economy Grew 5% in Third Quarter, Its Fastest Rate in More Than a Decade

Read Full Post | Make a Comment ( None so far )

Obama’s Chickens Coming Home To Roost — Hands Up Don’t Shoot — Lying Lunatic Left — “What do we want? Dead cops! When do we want it? Now!” — Islamic Jihadist Terrorist Ismaaiyl Abdullah Brinsley — Black Guerrilla Family – Weather Underground — Ayers — Obama — Videos

Posted on December 22, 2014. Filed under: American History, Blogroll, Communications, Computers, Corruption, Crime, Crisis, Education, Faith, Family, Federal Government, Foreign Policy, Freedom, Friends, government, government spending, Heroes, history, Homicide, Islam, Law, liberty, Life, Links, Literacy, media, People, Philosophy, Photos, Politics, Press, Psychology, Rants, Raves, Security, Talk Radio, Technology, Television, Terrorism, Unemployment, Vacations, Video, Welfare, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , |

booker-t-washington-quote-race-baitersracismjacksonsharptonobamaracebaiterssettingamericabackobamanational action networktwo-nypd-cops-shot

Officers Wenjian Liu and Rafael RamosRamos-and-Liu
nyp4ap_nypd_cops_shot_141220_16x9_992

ap_nypd_officers_shot_memorial_1_jt_141221_4x3_992new-york-city-shootingrespecttdy_gosk_nypd_141222.blocks_desktop_largerest_in_peace

Protesters Want DEAD COPS! Sergeants Benevolent Association Calls Disgusting and Alarming

Ismaaiyl Abdullah Brinsley Shoots TWO New York Police Officers To Death

Community Reacts To NYPD Officers Shot While On Duty

Ismaaiyl Brinsley (NYPD Shooter ) A Member Of (BGF) Black Guerilla Family?

NYPD Cops Warned Militant Group Black Guerilla Family ‘Preparing to SHOOT on-duty Police Officers’

48 Black Guerilla Family gang members indicted

Black Guerrilla Family

Experts testify Black Guerilla Family ordered hit

Communists on Campus: The Weather Underground

The Weather Underground Organization (WUO), commonly known as the Weather Underground, was an American radical left organization founded on the Ann Arbor campus of the University of Michigan. Originally called Weatherman, the group became known colloquially as the Weathermen. Weatherman first organized in 1969 as a faction of Students for a Democratic Society (SDS) composed for the most part of the national office leadership of SDS and their supporters. Their goal was to create a clandestine revolutionary party for the overthrow of the US government.

With revolutionary positions characterized by Black liberation rhetoric,[2] the group conducted a campaign of bombings through the mid-1970s, including aiding the jailbreak and escape of Timothy Leary. The “Days of Rage”, their first public demonstration on October 8, 1969, was a riot in Chicago timed to coincide with the trial of the Chicago Seven. In 1970 the group issued a “Declaration of a State of War” against the United States government, under the name “Weather Underground Organization” (WUO).[4]

The bombing attacks mostly targeted government buildings, along with several banks. Most were preceded by evacuation warnings, along with communiqués identifying the particular matter that the attack was intended to protest. No persons were killed in any of their acts of property destruction, although three members of the group were killed in the Greenwich Village townhouse explosion. For the bombing of the United States Capitol on March 1, 1971, they issued a communiqué saying it was “in protest of the U.S. invasion of Laos”. For the bombing of the Pentagon on May 19, 1972, they stated it was “in retaliation for the U.S. bombing raid in Hanoi”. For the January 29, 1975 bombing of the United States Department of State building, they stated it was “in response to escalation in Vietnam”.[4]

The Weathermen grew out of the Revolutionary Youth Movement (RYM) faction of SDS. It took its name from the lyric “You don’t need a weatherman to know which way the wind blows”, from the Bob Dylan song “Subterranean Homesick Blues”. You don’t need a weatherman to know which way the wind blows was the title of a position paper they distributed at an SDS convention in Chicago on June 18, 1969. This founding document called for a “white fighting force” to be allied with the “Black Liberation Movement” and other radical movements[5] to achieve “the destruction of US imperialism and achieve a classless world: world communism”.[6]

The Weathermen disintegrated after the United States reached a peace accord in Vietnam in 1973, after which the New Left declined.

Larry Grathwohl on Ayers’ plan for American re-education camps and the need to kill millions

OBAMA’s END GAME REVEALED BY KGB – Communist Obama Socialist / Marxist / Leninist

Yuri Bezmenov: Deception Was My Job (Complete)

Tomas Schuman (Yuri Bezmenov) L.A. 1983

Gangs in Prison – National Geographic Documentary

2 New York Police Officers Shot Dead — 2 NYPD Officers Shot, Killed — Gunman Found Dead

“What do we want? Dead cops! When do we want it? Now!”

URGENT: 2 NYPD Cops Shot Dead ‘Execution Style’ In Brooklyn

MALCOLM X: CHICKENS COMING HOME TO ROOST

Malcolm X & John F. Kennedy

Jeremiah Wright: America’s Chickens Are Coming Home To Roost

NY Police Executions by Muslim Terrorist! Christian Video Channel

Has Race War Begun with The Execution of 2 NYPD Officers?

NYPD DECLARES “WARTIME” AFTER SUSPECTED MARXIST BLACK GUERRILLA FAMILY MEMBER EXECUTES COPS

Earlier reports stated members were “preparing to shoot on duty police officers”

by KURT NIMMO | INFOWARS.COM |

The suspected shooter, Ismaaiyl Abdulah Brinsley, is said to have killed the police officers in retaliation for the death of Michael Brown and Eric Garner.

On Saturday evening the New York Daily News reported Brinsley, who reportedly committed suicide after the execution, is suspected of being involved with the Black Guerrilla Family prison gang.

In early December Sergeants Benevolent Association President Ed Mullins said Black Guerrilla Family members were “preparing to shoot on duty police officers.”

The Black Guerrilla Family, also known as the Black Family or the Black Vanguard, was founded by George Jackson in 1966.

Jackson, a criminal serving time at San Quentin in California for armed robbery, became a Marxist and Maoist while in prison. He was killed in 1971 during an escape attempt three days before he was scheduled to go on trial for allegedly killing a prison guard. The authorities continually changed their story about a gun they said Jackson had in his possession.

The Black Guerrilla Family was said to be associated with the Black Liberation Army, Symbionese Liberation Army, the Weather Underground, and other leftist groups.

The Black Liberation Army was infiltrated by the FBI and two members of the Symbionese Liberation Army,William and Emily Harris, are suspected government operatives. The the Weather Underground was also compromised by the FBI, as an informant, the late Larry Grathwohl, admitted in his 1976 book, “Bringing Down America.”

In 1989 a Black Liberation Army member fatally shot and killed Huey P. Newton, the co-founder and leader of the Black Panther Party for Self Defense.

http://www.infowars.com/nypd-declares-wartime-after-suspected-marxist-black-guerrilla-family-member-executes-cops/

NEW YORK POLICE OFFICERS SHOT DEAD IN SQUAD CAR ‘ASSASSINATION’

“It’s difficult to find the words,” New York City Police Commissioner William J. Bratton said Saturday night.

Without provocation, an attacker ambushed officers Wenjian Liu and Rafael Ramos while they sat in their marked patrol car in the Bedford-Stuyvesant Area of Brooklyn at 2:47 in the afternoon. “They were quite simply assassinated,” Bratton said, “targeted for their uniform.”

While Liu and Ramos sat in full uniform in a Critical Response Vehicle in the 84th precinct, a man approached the passenger door, assumed a “shooting stance,” and fired several times through the window. Both officers were struck in the head and died from their wounds.

The Commissioner said that the officers had no warning and may not have had the opportunity to see the assailant, much less reach for their weapons. The attack was entirely unprovoked.

 

The suspected murderer is 28-year-old Ismaaiyl Abdullah Brinsley. Though Brinsley’s last known residence was in Georgia, according to reports, he was in Baltimore earlier in the day.

After the shooting, Brinsley ran from the scene and turned into a G-train subway station, where he descended to the platform. He was pursued by other officers. When he reached the platform, Brinsley shot himself in the head, taking his own life.

At approximately 5:45 AM Saturday morning, according to Bratton, Brinsley shot his former girlfriend in the stomach.

At 2:45 PM, a warning was sent from Baltimore to the New York Police Department and other agencies, moments before Liu and Ramos were murdered.

A visibly shaken Bratton noted that authorities are investigating social media posts that suggest Brinsley had planned to kill police officers to avenge the deaths of Eric Garner and Michael Brown. Garner died while in a chokehold in New York City and Brown was shot dead by a St. Louis police officer. After grand juries decided not to indict the police officers involved, protests broke out and have continued to this day.

Social media posts featuring a silver firearm like the one found at the scene and a plan to kill “pigs” could implicate Brinsley.

suspect instagram 2

“It’s clear that this was an assassination; the officers were shot execution style,” Bill de Blasio told the media. The NYC Mayor went on to describe the ambush as an assault on all New Yorkers and civil society in general: “Our entire city was attacked.”

De Blasio and Bratton called for any  information about this attack or any other like it that may occur in the future. Both men, overcome by emotion, expressed fear that this incident may not be isolated.

Bratton, calling for vigilance, emphasized that the police officers in the NYPD were warned in this instance, but it was too late.

Officer Liu, 32-years-old, had served on the force for two years and was married just two months ago. Bratton said that he spoke with the fallen policeman’s new bride before addressing the press.

Ramos, who turned 40-years-old on December 12, “achieved his dream” of becoming a New York police officer three years prior. He is survived by his wife and 13-year-old son, who “couldn’t comprehend what happened to his father,” according the Commissioner.

This is “not a time for politics or political analysis,” said the New York City Mayor, before concluding his remarks by requesting prayers for the families, for the NYPD, and for the city of New York.

Alexander Marlow contributed to this report.

***

salute after brooklyn shooting

NEW YORK (AP) — A gunman who announced online that he was planning to shoot two “pigs” in retaliation for the chokehold death of Eric Garner ambushed two police officers in a patrol car and shot them to death in broad daylight Saturday before running to a subway station and killing himself, authorities said.

The suspect, Ismaaiyl Brinsley, wrote on an Instagram account: “I’m putting wings on pigs today. They take 1 of ours, let’s take 2 of theirs,” officials said. He used the hashtags Shootthepolice RIPErivGardner (sic) RIPMikeBrown.

Police said he approached the passenger window of a marked police car and opened fire, striking Officers Rafael Ramos and Wenjian Liu in the head. The officers were on special patrol in the Bedford-Stuyvesant section of Brooklyn.

“They were, quite simply, assassinated — targeted for their uniform. … They were ambushed and murdered,” said Police Commissioner William Bratton, who looked pale and shaken at a hospital news conference.

Brinsley took off running and went down to a nearby subway station, where he shot himself. A silver handgun was recovered at the scene.

“This may be my final post,” he wrote in the Instagram post that included an image of a silver handgun.

Bratton confirmed that Brinsley made very serious “anti-cop” statements online but did not get into specifics of the posts. He said they were looking at whether the suspect had attended any rallies or demonstrations. Two city officials with direct knowledge of the case confirmed the posts to The Associated Press. The officials, a senior city official and a law enforcement official, were not authorized to speak publicly on the topic and spoke on condition of anonymity,

The Rev. Al Sharpton said the family of Garner, killed by a police chokehold this year, had no connection to the suspect and denounced the violence.

“Any use of the names of Eric Garner and Michael Brown in connection with any violence or killing of police, is reprehensible and against the pursuit of justice in both cases,” Sharpton said. “We have stressed at every rally and march that anyone engaged in any violence is an enemy to the pursuit of justice for Eric Garner and Michael Brown.”

The shootings come at a tense time. Police in New York are being criticized for their tactics following the death of Garner, who was stopped by police on suspicion of selling loose, untaxed cigarettes. Amateur video captured an officer wrapping his arm around Garner’s neck and wrestling him to the ground. Garner was heard gasping, “I can’t breathe” before he lost consciousness and later died.

“Our city is in mourning. Our hearts are heavy,” said Mayor Bill de Blasio, who spoke softly with moist eyes. “It is an attack on all of us.”

Demonstrators around the country have staged die-ins and other protests since a grand jury decided Dec. 3 not to indict the officer in Garner’s death, a decision that closely followed a Missouri grand jury’s refusal to indict a white officer in the fatal shooting of Brown, an unarmed black 18-year-old.

In a statement Saturday night, Attorney General Eric Holder condemned the shooting deaths as senseless and “an unspeakable act of barbarism.”

Earlier Saturday, Bratton said, Brinsley went to the home of a former girlfriend in the Baltimore area and shot and wounded her. Police there said they noticed Brinsley posting to the woman’s Instagram account about a threat to New York officers. Baltimore-area officials sent a warning flier to New York City police, who received it around the time of the shooting, Bratton said.

A block from the shooting site, a line of about eight police officers stood with a German shepherd blocking the taped-off street. Streets were blocked off even to pedestrians.

The president of the police officers union, Patrick Lynch, and Blasio have been locked in a public battle over treatment of officers following the grand jury’s decision. Just days ago, Lynch suggested police officers sign a petition that demanded the mayor not attend their funerals should they die on the job.

The last shooting death of an NYPD officer came in December 2011, when 22-year veteran Peter Figoski responded to a report of a break-in at a Brooklyn apartment. He was shot in the face and killed by one of the suspects hiding in a side room when officers arrived. The triggerman, Lamont Pride, was convicted of murder and sentenced in 2013 to 45 years to life in prison.

http://www.breitbart.com/big-government/2014/12/20/report-nypd-cops-shot-in-ambush-attack/

Obama’s ‘propaganda’ pushed people to ‘hate the police,’ Giuliani says

ADVERTISEMENT

“We’ve had four months of propaganda starting with the president that everybody should hate the police,” Giuliani said during an appearance on Fox News early Sunday. “The protests are being embraced, the protests are being encouraged. The protests, even the ones that don’t lead to violence, a lot of them lead to violence, all of them lead to a conclusion: The police are bad, the police are racist. That is completely wrong.”
Giuliani said he did not agree with statements like those from Pat Lynch, the president of the largest police union in New York City, who said the current mayor, Bill de Blasio (D), had blood on his hands.

“I think it goes too far to blame the mayor for the murder or to ask for the mayor’s resignation,” Giuliani said.

“I feel bad for the mayor,” Giuliani continued. “He must be heartbroken over the loss of two police officers. I can’t believe this is what he wanted. I don’t think he’s a bad man in any way.”

But, Giuliani said, de Blasio is “pursuing the wrong policies” and should not have given protesters demonstrating against the police killings of Eric Garner and Michael Brown as much leeway.

“I don’t think it goes too far to say the mayor did not properly police the protests,” Giuliani said. “He allowed the protesters to take over the streets. He allowed them to hurt police officers, to commit crimes, and he didn’t arrest them. And when you do that, similar to what happened in Crown Heights, you create a great riot. He should have known better. For that he has to take accountability.”

In a statement Saturday, the president said he “unconditionally” condemned the attack on the police officers and called for the nation to “turn to words that heal.”

“Two brave men won’t be going home to their loved ones tonight, and for that, there is no justification,” the president, vacationing in Hawaii, said in a statement. “The officers who serve and protect our communities risk their own safety for ours every single day — and they deserve our respect and gratitude every single day.”

Read Full Post | Make a Comment ( None so far )

U.S. Response To North Korea Hack of SONY Computers Will Be Proportional — CIA Drone Attack On The Table? — All Options On The Table — Go To The Movies and Watch The Attack — Cyber Warfare Is An Act of War Not A Criminal Act — Videos

Posted on December 19, 2014. Filed under: American History, Blogroll, Central Intelligence Agency (CIA), Communications, Computers, Computers, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, Friends, history, Language, Law, liberty, Life, Links, Literacy, media, National Security Agency (NSA_, People, Philosophy, Photos, Politics, Regulations, Sports, Technology, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 391: December 18, 2014

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Story 1: U.S. Response To North Korea Hack of SONY Computers Will Be Proportional — CIA Drone Attack On The Table? — All Options On The Table — Go To The Movies and Watch The Attack — Cyber Warfare is An Act of War and Not A Criminal Act — Videos

computer hacked hacked

sony

“Yes, I think they made a mistake.” President Obama on Sony Hack (C-SPAN)

U.S. Considering ‘Proportional Response’ to Sony Hack

Sony Attack Sets Table For Unprecedented U.S. Response

North Korea Says Its Supporters May Be Behind Sony Attack

Sony Paralyzed By Hackers ★ Attacked By North Korea?

Sony Hack An Inside Job? North Korea Involved?

Sony Pictures cyberattack: North Korea does not deny involvement


The Interview Official Trailer (2014) – Seth Rogen, James Franco Movie HD

Photo

Workers removed a banner for “The Interview” from a billboard on Thursday in Hollywood, Calif., the day after Sony canceled the release of the comedy that features the fictional assassination of the North Korean leader, Kim Jung-un.CreditRobyn Beck/Agence France-Presse — Getty Images

WASHINGTON — A White House official said on Thursday that the administration was considering a “proportional response” against those who hacked into Sony Pictures computers, a retaliation that could thrust the United States into a direct confrontation with North Korea.

Officials would not describe what such a response might entail, but they stressed that the episode had become a major concern at the upper levels of government, including President Obama, who lately has been discussing the issue with aides every day.

“This is something that’s being treated as a serious national security matter,” Josh Earnest, the White House press secretary, told reporters. “There is evidence to indicate that we have seen destructive activity with malicious intent that was initiated by a sophisticated actor.”

United States officials have privately concluded that North Korea was “centrally involved” in the hacking even as Sony canceled the release of a comedy that features the fictional assassination of the North Korean leader, Kim Jung-un, and that apparently prompted the cyberattack. Mr. Earnest would not confirm the North Korean role at his daily briefing but he did not deny it either, saying that investigators would ultimately report on their findings.

Mr. Earnest said the government did not tell Sony to pull the film, “The Interview,” and expressed support for the studio’s right to make it, even if it would offend some viewers.

“The United States stands squarely on the side of artists and companies that want to express themselves,” he said, “and we believe that that kind of artistic expression is worthy of expression and is not something that should be subjected to intimidation just because you happen to disagree with the views.”

But he was vague about what kind of action the United States might take in response to the cyberattack and even hinted that it may be of a character that was hard to publicly detect. He added that the president and his team would take into consideration that its authors might be trying to stir a response to get attention, a calculation often imputed by Washington to North Korea’s mercurial leadership.

“They would be mindful of the fact that we need a proportional response, and also mindful of the fact that sophisticated actors, when they carry out actions like this, are oftentimes — not always, but often — seeking to provoke a response from the United States of America,” Mr. Earnest said. “They may believe that a response from us in one fashion or another would be advantageous to them. So we want to be mindful of that.”

http://www.nytimes.com/2014/12/19/world/asia/north-korea-confrontation-possible-in-response-to-sony-cyberattack.html?_r=0

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 391 

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Republican Political Elitist Establishment (PEE) Candidate Running For President — Another Big Government Spending Progressive — Jeb Bush — Rubio, Romney and Christie Out — Conservatives, Libertarians and Tea Party Support Cruz, Paul, and Walker — Bush Is Another Republican PEE Loser — Videos

Posted on December 18, 2014. Filed under: Blogroll |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

 Story 1: The Republican Political Elitist Establishment (PEE) Candidate Running For President — Another Big Government Spending Progressive — Jeb Bush — Rubio, Romney and Christie Out — Conservatives, Libertarians and Tea Party Support Cruz, Paul, and Walker — Bush Is Another Republican PEE  Loser — Videos

Jeb Bush exploring 2016 presidential run

Jeb Bush to “actively explore” 2016 run for White House

Jeb Bush Hurts Almost Everybody in 2016 Field: Halperin

On Tuesday, former Florida Gov. Jeb Bush announced that he will “actively explore” a bid for the White House. While Bush has not yet formed a presidential exploratory committee, he’s “running” for president by any practical definition of the term. If he proves to perform poorly in the “invisible primary,” failing to gather support among donors and influential Republicans, he could withdraw later on, before the first votes are cast in Iowa.

What might those influential Republicans think of Bush? He has sometimes been critical of his fellow Republicans, havingquestioned the GOP’s partisanship and lack of tolerance for dissenting viewpoints. He has also staked out moderate policy positions on some issues, particularly immigration and education reform.

But is Bush in the mold of Jon Huntsman and Rudy Giuliani — candidates who generated lots of buzz among the East Coast media elite but proved too moderate for the Republican base? Or is he more like the past two Republican nominees, Mitt Romney and John McCain, who also were accused of being too moderate but won their party’s nomination?

The short answer: We’ll see, and we’ll want to watch for news of Republicans who endorse Bush’s candidacy or criticize it. But he’s probably more like Romney or McCain than like Huntsman or Giuliani.

Last year, we constructed ideological scores for a set of plausible 2016 Republican candidates based on a combination of three statistical indices: DW-Nominate scores (which are based on a candidate’s voting record in Congress), CFscores (based on who donates to a candidate) and OnTheIssues.org scores (based on public statements made by the candidate). None of these methods is perfect — they disagree on how to classify the libertarian-leaning Republican Rand Paul, for example — but they give us some empirical basis to make comparisons. The closer a candidate’s score is to zero under this method, the more moderate he is. And the closer he is to 100, the more conservative. (Liberal candidates would be listed with negative scores.) Here’s how Bush compares:

silver-datalab-jeb-1

Bush scores at a 37 on this scale, similar to Romney and McCain, each of whom scored a 39. He’s much more conservative than Huntsman, who rates at a 17.

Still, Bush is more like his father, George H.W. Bush, who rates as a 33, than his brother George W. Bush, who scores a 46. And the Republican Party has moved to the right since both Poppy and Dubya were elected. The average Republican member in the 2013-14 Congress rated a 51 on this scale, more in line with potential candidates Marco Rubio, Paul Ryan and Mike Huckabee.

So as a rough cut, Bush is not especially moderate by the standard of recent GOP nominees. But the gap has nevertheless widened between Bush and the rest of his party.

On the two issues where he has most outspokenly deviated from his party, immigration and education, his policy positions are not far removed from those Republican voters declare in polls. But these issues may also take on symbolic significance beyond their immediate policy implications, signaling to Republican voters that a candidate is too moderate or too much a part of the establishment. Earlier this year, my colleague Harry Enten found Republican senators who have adopted Bush’s moderate stance on immigration have been especially likely to receive primary challenges.

And Bush has been more like Hunstman than Romney in explicitly critiquing the direction of his party. That may appeal to general-election voters, but it probably isn’t helpful to him in a Republican primary.

Still, parties have shown some historical tendency to nominate successively more moderate candidates the longer they’ve been out of the White House. That could help Bush. While he’s somewhat to the left of the average Republican politician, there’s also less competition on that side of the GOP spectrum; most Republican senators and governors first elected during the past several election cycles have been quite conservative.

That’s not to say he has the field all to himself. Romney has sometimes been considered a 2016 candidate. So has New Jersey Gov. Chris Christie (who rates as being far more moderate than Bush on our scale). New Mexico Gov. Susana Martinez has less of a national profile, but also overlaps ideologically with Bush.

Perhaps more important is the relatively early date of Bush’s announcement. If he builds an early advantage in the “invisible primary,” he could deter some of these candidates from running and make it harder for them to gain momentum if they do. The early announcement will also give Bush more time to calibrate his positions while under comparatively little scrutiny.

There will almost certainly be some credible candidates to Bush’s right, like Ryan or Rubio or Bobby Jindal or Scott Walker. Roughly 31 percent of Republican primary voters describe themselves as moderate or liberal, potentially enough to leave Bush as one of two or three remaining viable nominees after the first few states vote in 2016. That’s when he’d have to do his best campaigning — by pivoting to his right, or by convincing Republicans that his electability outweighs ideological purity. Bush may face more vigorous competition on his right in 2016 than Romney did in the likes of former Pennsylvania Sen. Rick Santorum and then-Texas Gov. Rick Perry in 2012. And to the extent that Republican voters have shifted slightly further to the right over the past four to eight years, that could make his task harder at the margins.

Betting markets put Bush’s chances of winning the Republican nomination at 20 percent to 25 percent, which seems as reasonable an estimate as any. You can get there by assuming there’s a 50 percent chance that he survives the “invisible primary” and the early-voting states intact and a 40 percent to 50 percent chance that he wins the nomination if he does. It’s a strategy that worked well enough for McCain and Romney.

http://fivethirtyeight.com/datalab/jeb-bush-president-republican-primary-2016/

 

Don’t assume Jeb Bush will be the Republican nominee in 2016

By Chris Cillizza

Former Florida governor Jeb Bush hands out holiday food baskets to those in need outside the Little Havana offices of CAMACOL, the Latin American Chamber of Commerce, on Dec. 17 in Miami. (Joe Raedle/Getty Images)
The New York Times tweeted this on Wednesday night:
The piece it linked to — by Nate Cohn, a great talent, who I once tried to hire! –is somewhat more circumspect than the tweet about Jeb Bush’s chances at the Republican presidential nomination but does make the case that, if past is prologue, there is a proven blueprint for Bush to be the nominee. Here’s the key graph:

It’s a path that starts by consolidating the establishment wing of the party in the invisible primary. It ends by winning a protracted fight against an underfunded conservative opponent who can’t break through in the delegate-rich blue states that are often needed to win the party’s nomination, even though the party struggles to win them in presidential elections.

Cohn is absolutely right. A look back at recent contested Republican presidential primary fights suggests that the race typically boils down to one candidate from the establishment lane and one from the tea party/activist conservative lane — with the establishment candidate winning. As he notes, in 2012 Mitt Romney was the clear establishment favorite — especially after Chris Christie said “no,” again, in the fall of 2011 — and wound up beating back a challenge from surprise conservative lane pick Rick Santorum. Four years earlier, John McCain beat out Romney for the establishment mantle and then bested conservative lane pick Mike Huckabee for the nomination. In 2000, the establishment pick also was a sort-of conservative pick (George W. Bush) and he wound up beating McCain, running as sort of the un-candidate, for the nomination.
(Worth noting: The Republican Party of 2000 is not the Republican Party of today or anything close to it. Back then, the tea party didn’t exist and social conservatives were far more powerful. Also, there was a path to a tonal moderate to win the nomination. That is no longer possible — see Rudy Giuliani in 2008. Much more on that below.)

One thing that I think Cohn undervalues in his calculations regarding Jeb Bush’s chances are a) how much the other candidates running matter to the final outcome and b) how much the GOP has changed even from four years ago.

On the first point, I think that the potential 2016 field is significantly stronger — in both the establishment and conservative lanes — than it was in 2008 or 2012. Ted Cruz, say what you will about him, is a gifted speaker and debater who has proven over the past two years an ability to build a national following. The establishment lane is chock full (or could be chock full) of talented and well-known pols: Bush, Christie, Marco Rubio and Scott Walker, to name four. Neither the 2008 mor 2012 field had as much talent.

You might notice I left Rand Paul off that list. That was on purpose. Because the senator from Kentucky is the bridge between points number one and two. He is a candidate who is unlike anyone in either the 2008 or 2012 field in that he is a sort of “cause” candidate — people believe deeply in his libertarian message the same way they did for his father in each of the past two races — and also a plausible winner in that he probably can raise the more than $100 million necessary for the primary and doesn’t scare the hell out of the establishment the way his dad did or Cruz does.

Which gets me to how the Republican Party has changed — and why simply casting the race as the establishment vs. the tea party may be an oversimplification. Yes, the “establishment” lane still very much exists — composed, primarily, of the professional political class, major donors — especially on the East Coast — and fiscal conservatives. But assuming that the “other” lane is the tea party misses some of the nuance that exists within the party. Cruz is a tea partyer, for sure, and one who unites the fiscal and social ends of that movement. But, while Paul is identified at times with the tea party (and has embraced such labeling when it’s politically beneficial) he actually is far more closely aligned with the growing libertarian strain within the GOP.

The GOP is less bifurcated — establishment/social conservatives, establishment/tea party — than in any of the past four presidential campaigns, largely because of the rise of these libertarians but also the result, in some measure, to the waning influence of the tea party. (Its influence may wax again but for the moment, not.)

That reality creates what I think is the most likely scenario in the fight for the GOP nomination in 2016: It won’t be a battle between, say, Bush and whoever the tea party puts up. It is more likely to be a battle between whoever the establishment nominates and Paul, whose hybrid appeal to libertarians, tea partyers and a slice of the fiscally conservative establishment is unlike anyone else in the potential field. And, unlike past conservative lane choices who have never had the fundraising or organization heft to challenge the establishment pick, Paul just might. His activity in the 2016 race suggests he is not Huckabee or Santorum on those fronts.

That’s not to say Paul will be the nominee. But it is to say that the idea that Bush can unite the establishment and, as a result, be the odds-on favorite as the nominee is based on an outdated read of the current state of the party.

http://www.washingtonpost.com/blogs/the-fix/wp/2014/12/18/dont-assume-jeb-bush-will-be-the-republican-nominee-in-2016/

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Breaking News City of Peshawar, Pakistan, Army Run School Attacked, Resulted in Killing of 141 (132 Students) and 200 Wounded or Injured By 7 Taliban Terrorist Wearing Suicide Vests — Videos

Posted on December 17, 2014. Filed under: Blogroll, Bomb, Constitution, Crime, Crisis, Culture, Faith, Family, Federal Government, Foreign Policy, Freedom, Friends, government, government spending, history, Homicide, Islam, Law, liberty, Life, Links, People, Philosophy, Photos, Pistols, Politics, Press, Rants, Raves, Rifles, Terrorism, Video, War, Weapons, Welfare, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Story 1: Breaking News City of Peshawar, Pakistan, Army Run School Attacked, Resulted in Killing of 141 (132 Students) and 200 Wounded or Injured By 7 Taliban Terrorist Wearing Suicide Vests — Videos

Pakistan-School-Attacked-in-Peshawar-650x430pakistan_army_school_attack_624mapTaliban_attack_school_in_PakistanTaliban-attack-on-Pakistan-school-kills-141-mostly-children (6)pakistan-school-attack-2Pakistan-Terror-Attackpeshawar-attack-world-prays-after-violent-school-massacre-pakistan-landov