Computers

Obama’s Non-Transparent Federal Communications Commission Chairman Wheeler Refuses To Testify Before Congress or Publish Online The Proposed Draft Internet Regulations Pertaining To Net Neutrality (332 Page Final Draft) Before Voting on Thursday, February 26, 2015 — Government Bureaucrats Messing With The Internet and Freedom of Speech — Time To Abolish The FCC — It Is All About Money and Power — Videos

Posted on February 26, 2015. Filed under: American History, Articles, Blogroll, Business, Communications, Computers, Computers, Constitution, Corruption, Documentary, Economics, Education, Employment, Family, Federal Communications Commission, Federal Government, Federal Government Budget, Fiscal Policy, Freedom, Friends, government spending, Health Care, history, Homes, Investments, IRS, Law, liberty, Life, Links, Literacy, media, Money, National Security Agency (NSA_, Obamacare, People, Philosophy, Photos, Politics, Press, Programming, Raves, Regulations, Strategy, Talk Radio, Taxes, Technology, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 422: February 25, 2015 

Pronk Pops Show 421: February 20, 2015

Pronk Pops Show 420: February 19, 2015

Pronk Pops Show 419: February 18, 2015

Pronk Pops Show 418: February 16, 2015

Pronk Pops Show 417: February 13, 2015

Pronk Pops Show 416: February 12, 2015

Pronk Pops Show 415: February 11, 2015

Pronk Pops Show 414: February 10, 2015

Pronk Pops Show 413: February 9, 2015

Pronk Pops Show 412: February 6, 2015

Pronk Pops Show 411: February 5, 2015

Pronk Pops Show 410: February 4, 2015

Pronk Pops Show 409: February 3, 2015

Pronk Pops Show 408: February 2, 2015

Pronk Pops Show 407: January 30, 2015

Pronk Pops Show 406: January 29, 2015

Pronk Pops Show 405: January 28, 2015

Pronk Pops Show 404: January 27, 2015

Pronk Pops Show 403: January 26, 2015

Pronk Pops Show 402: January 23, 2015

Pronk Pops Show 401: January 22, 2015

Pronk Pops Show 400: January 21, 2015

Pronk Pops Show 399: January 16, 2015

Pronk Pops Show 398: January 15, 2015

Pronk Pops Show 397: January 14, 2015

Pronk Pops Show 396: January 13, 2015

Pronk Pops Show 395: January 12, 2015

Pronk Pops Show 394: January 7, 2015

Pronk Pops Show 393: January 5, 2015

Pronk Pops Show 392: December 19, 2014

Pronk Pops Show 391: December 18, 2014

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Story 1: Obama’s Non-Transparent Federal Communications Commission Chairman Wheeler Refuses To Testify Before Congress or Publish Online The Proposed Draft Internet Regulations Pertaining To  Net Neutrality (332 Page Final Draft) Before Voting on Thursday, February 26, 2015 — Government Bureaucrats Messing With The Internet and Freedom of Speech — Time To Abolish The FCC — It Is All About Money and Power — Videos

obama-dictator-uniformobama_dictatorobama-dictator

fcc-tom-wheelerfcc-board-members voted for government takeover of internet

Three Democrats Voted For Government Regulation, Taxation and Control of Internet

obama_plans_net_grab

FCC’s Ajit Pai: Net Neutrality is a “Solution That Won’t Work to a Problem That Doesn’t Exist”

Internet Rejoices as FCC Imposes Strict Net Neutrality Rules

Sources: Wheeler Tweaks Net Neutrality Plan After Google Push

GOP Leader Slams FCC Ahead of Net Neutrality Vote

Sen. John Thune hammered the Federal Communications Commission ahead of a vote on net neutrality rules Thursday, which the South Dakota Republican termed a “partisan-line vote.”

“This will be the first time … where the Internet is going to be subject to the heavy-hand of regulation as opposed to the light touch that’s been utilized for so long up until this point,” Thune said. “And I hope that Feb. 26 doesn’t go down in history as the time when the Internet moved from something that was driven by free-market innovation to something that’s driven by bureaucratic decision making.”

The Truth About ‘Net Neutrality’ – FCC Rules Tomorrow. Please watch, & please circulate!

Net Neutrality will destroy the internet

The Truth About Net Neutrality

Limbaugh on “Net Neutrality”: Obama Exploits Ignorance of Young People to Seize Control of Internet

FCC Chairman Details His Net Neutrality Proposal

Federal Communications Commission Chairman Tom Wheeler’s plan would apply to ISPs and wireless carriers. It will go to a full vote later this month.

FCC Chairman Signals New Net Neutrality Rules – IGN News

President Obama’s Statement on Keeping the Internet Open and Free

President Obama Makes Strong Pro Net Neutrality Statement…But Why?

Net Neutrality Explained. Simply and Accurately!

HOUSE CHAIR DEMANDS FCC NET NEUTRALITY GAG ORDER LIFTED

Chairman of the House Oversight Committee Jason Chaffetz (R-Utah) demanded yesterday that the Federal Communications Commission Chairman Tom Wheeler make public the details of the proposed net neutrality regulations that will regulate the Internet under the same rules as the old AT&T monopoly.

Chaffetz also asked the FCC Chair to appear and answer questions at the House Oversight hearing Wednesday, prior to the planned Agency vote on the draft rules now scheduled for Thursday.

The 332-page final draft FCC order was only delivered to the four other FCC commissioners three weeks ago. When Wheeler delivered the document, he took the unusual step of issuing a “gag order” to prevent its release before the FCC vote.

The FCC was forced to revisit “net neutrality” rules because the agency’s egregious 2010 effort at writing “Open Internet Rules” was thrown out in January 2014 by the US Court of Appeals for the District of Columbia Circuit in Verizon v. FCC. Although the appeals court agreed the FCC had the authority to regulate broadband services, they rejected the FCC’s potentially biased micro-managing of the Internet.

Chairman Wheeler tried to ramrod President Obama’s net neutrality proposal through the FCC on May 15, 2014. It was understood at the time that Wheeler was trying to maximize FCC breadth for the new rules by basing the legal authority of his proposal on parts of both Title II of the Communications Act of 1934 and the Telecommunications Act of 1996. But the day before the meeting, his fellow Democratic Commissioners, Jessica Rosenworcel and Mignon Clyburn, pushed back on the rush to regulate after being bombarded by consumers who wanted to preserve an open Internet.

In a blog post at the time, Commissioner Clyburn noted, “over 100,000 Americans have spoken” via email, calls and letters. Commissioner Rosenworcel added that she also wanted the FCC to delay consideration of the rules after the torrent of public response.

Breitbart reported on February 9 in “Republican FCC Member Warns Net Neutrality is Not Neutral” that Ajit Pai, as one of two Republican Commissioners on the FCC, tweeted, “I wish the public could see what’s inside.” Pai included a selfie of himself holding the huge document in front of a picture of Obama. The posture of the photo was clearly meant to depict the president as George Orwell’s “Big Brother.”

Pai later released a statement: “President Obama’s plan marks a monumental shift toward government control of the Internet. It gives the FCC the power to micromanage virtually every aspect of how the Internet works,” he said. “The plan explicitly opens the door to billions of dollars in new taxes on broadband… These new taxes will mean higher prices for consumers and more hidden fees that they have to pay.”

The Breitbart article generated over 4,600 comments and set off a firestorm on the Drudge Report as the public realized that the FCC process seemed fundamentally biased due to a lack of transparency and full disclosure prior to such an important regulatory vote. The public was also incensed that the free-for-all Internet was about to be subject to up to $16 billion a year in FCC user taxes and fees.

Congressman Chaffetz also sent Wheeler a letter questioning whether the FCC had been “independent, fair and transparent” in fashioning the rules to supposedly protect Internet content. “Although arguably one of the most sweeping new rules in the commission’s history, the process was conducted without using many of the tools at the chairman’s disposal to ensure transparency and public review,” Chaffetz added.

Representative Chaffetz included in the letter that there is a precedent for the FCC Chairman to make rules public before a vote. In 2007, Chairman Kevin Martin released to the public new media ownership rules, and the entire FCC testified in a House hearing prior to the final vote.

An elected official who supported the FCC postponement in 2007, Chaffetz notes, was Senator Barack Obama. “He specifically noted while a certain proposal ‘may pass the muster of a federal court, Congress and the public have the right to review any specific proposal and decide whether or not it constitutes sound policy. And the commission has the responsibility to defend any new proposal in public discourse and debate.”

With political fireworks going off yesterday, Republican FCC commissioners Michael O’Rielly and Ajit Pai late in the day asked Wheeler to postpone Thursday’s vote and release the draft Internet regulatory proposal for a 30 day public comment period.

http://www.breitbart.com/big-government/2015/02/24/house-chair-demands-fcc-net-neutrality-gag-order-lifted/

Dear FCC: Rethink The Vague “General Conduct” Rule

 BY CORYNNE MCSHERRY

For many months, EFF has been working with a broad coalition of advocates to persuade the Federal Communications Commission to adopt new Open Internet rules that would survive legal scrutiny and actually help protect the Open Internet. Our message has been clear from the beginning: the FCC has a role to play, but its role must be firmly bounded.

Two weeks ago, we learned that we had likely managed the first goal—the FCC is going to do the right thing and reclassify broadband as a telecommunications service, giving it the ability to make new, meaningful Open Internet rules.  But we are deeply concerned that the FCC’s new rules will include a provision that sounds like a recipe for overreach and confusion: the so-called “general conduct rule.”

According to the FCC’s own “Fact Sheet,” the proposed rule will allow the FCC to review (and presumably punish) non-neutral practices that may “harm” consumers or edge providers. Late last week, as the window for public comment was closing, EFF filed a letter with the FCC urging it to clarify and sharply limit the scope of any “general conduct” provision:

[T]he Commission should use its Title II authority to engage in light-touch regulation, taking great care to adhere to clear, targeted, and transparent rules. A “general conduct rule,” applied on a case-by- case basis with the only touchstone being whether a given practice “harms” consumers or edge providers, may lead to years of expensive litigation to determine the meaning of “harm” (for those who can afford to engage in it). What is worse, it could be abused by a future Commission to target legitimate practices that offer significant benefits to the public . . .

Accordingly, if the Commission intends to adopt a “general conduct rule” it should spell out, in advance, the contours and limits of that rule, and clarify that the rule shall be applied only in specific circumstances.

Unfortunately, if a recent report from Reuters is correct, the general conduct rule will be anything but clear. The FCC will evaluate “harm” based on consideration of seven factors: impact on competition; impact on innovation; impact on free expression; impact on broadband deployment and investments; whether the actions in question are specific to some applications and not others; whether they comply with industry best standards and practices; and whether they take place without the awareness of the end-user, the Internet subscriber.

There are several problems with this approach.  First, it suggests that the FCC believes it has broad authority to pursue any number of practices—hardly the narrow, light-touch approach we need to protect the open Internet. Second, we worry that this rule will be extremely expensive in practice, because anyone wanting to bring a complaint will be hard-pressed to predict whether they will succeed. For example, how will the Commission determine “industry best standards and practices”? As a practical matter, it is likely that only companies that can afford years of litigation to answer these questions will be able to rely on the rule at all. Third, a multi-factor test gives the FCC an awful lot of discretion, potentially giving an unfair advantage to parties with insider influence.

We are days away from a final vote, and it appears that many of the proposed rules will make sense for the Internet. Based on what we know so far, however, the general conduct proposal may not. The FCC should rethink this one.

https://www.eff.org/deeplinks/2015/02/dear-fcc-rethink-those-vague-general-conduct-rules

FCC Chair Refuses to Testify before Congress ahead of Net Neutrality Vote

by ANDREW JOHNSON February 25, 2015 10:19 AM

Two prominent House committee chairs are “deeply disappointed” in Federal Communications Commission chairman Tom Wheeler for refusing to testify before Congress as “the future of the Internet is at stake.”

Wheeler’s refusal to go before the House Oversight Committee on Wednesday comes on the eve of the FCC’s vote on new Internet regulations pertaining to net neutrality. The committee’s chairman, Representative Jason Chaffetz (R., Utah), and Energy and Commerce Committee chairman Fred Upton (R., Mich.) criticized Wheeler and the administration for lacking transparency on the issue.

“So long as the chairman continues to insist on secrecy, we will continue calling for more transparency and accountability at the commission,” Chaffetz and Upton said in a statement. “Chairman Wheeler and the FCC are not above Congress.”

The vote on the new Internet regulations is scheduled for Thursday. The FCC’s two Republican commissioners have asked Wheeler to delay the vote to allow more time for review. The changes would allow the commission to regulate the Internet like a public utility, setting new standards that require the provision of equal access to all online content.

http://www.nationalreview.com/corner/414380/fcc-chair-refuses-testify-congress-ahead-net-neutrality-vote-andrew-johnson

 

President Obama Urges FCC to Implement Stronger Net Neutrality Rules

President Obama today asked the Federal Communications Commission (FCC) to take up the strongest possible rules to protect net neutrality, the principle that says Internet service providers (ISPs) should treat all internet traffic equally.

The President has been a strong and consistent advocate of net neutrality since his first presidential campaign.

President Obama’s plan would reclassify consumer broadband services under what’s known as Title II of the Telecommunications Act. It would serve as a “basic acknowledgement of the services ISPs provide to American homes and businesses, and the straightforward obligations necessary to ensure the network works for everyone – not just one or two companies.”

The plan involves four commonsense steps that some service providers already observe:

No blocking. If a consumer requests access to a website or service, and the content is legal, your ISP should not be permitted to block it. That way, every player—not just those commercially affiliated with an ISP — gets a fair shot at your business.

No throttling. Nor should ISPs be able to intentionally slow down some content or speed up others — through a process often called “throttling”—based on the type of service or your ISP’s preferences.

Increased transparency. The connection between consumers and ISPs — the so-called “last mile” — is not the only place some sites might get special treatment. So, I am also asking the FCC to make full use of the transparency authorities the court recently upheld, and if necessary to apply net neutrality rules to points of interconnection between the ISP and the rest of the Internet.

No paid prioritization. Simply put: No service should be stuck in a “slow lane” because it does not pay a fee. That kind of gatekeeping would undermine the level playing field essential to the Internet’s growth. So, as I have before, I am asking for an explicit ban on paid prioritization and any other restriction that has a similar effect.

Ultimately, the FCC is an independent agency and the decision is theirs alone. But President Obama believes his plan is the best way to safeguard the incredible resource the Internet has become for all of us — so that an entrepreneur’s fledgling company has the same chance to succeed as established corporation’s, and so that access to a high school student’s blog isn’t unfairly slowed down to make way for advertisers with more money.

Nearly 4 million public comments were submitted to the FCC as part of the latest comment period, with overwhelming support for the principles the President is calling for.

http://www.whitehouse.gov/blog/2014/11/10/president-obama-urges-fcc-implement-stronger-net-neutrality-rules

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 422 

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Neal Stephenson and J. Frederick George — Interface

Posted on February 25, 2015. Filed under: Blogroll, Books, College, Communications, Computers, Documentary, Economics, Education, Employment, Family, Federal Government, Fiction, Freedom, Friends, history, Investments, Law, liberty, Life, Links, media, Money, People, Photos, Politics, Raves, Resources, Reviews, Systems, Talk Radio, Video, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , |

stephensonInterface-Neal-Stephenson-Paperback15-lge neal-stephenson

Neal Stephenson on Optimism

Neal Stephenson Discusses Why His Novels Haven’t Been Made Into Movies

Neal Stephenson – “We Are All Geeks Now.”

Neal Stephenson on Anathem: The genesis of the novel and its main ideas

Neal Stephenson Creates a New Language for ANATHEM

Authors@Google: Neal Stephenson

Authors Neal Stephenson visits Google’s Headquarters in Mountain View, Ca, to discuss his book “Anathem”. This event took place September 12, 2008, as part of the Authors@google series. For more info, please visit http://www.nealstephenson.com/

Anathem, the latest invention by the New York Times bestselling author of Cryptonomicon and The Baroque Cycle, is a magnificent creation: a work of great scope, intelligence, and imagination that ushers readers into a recognizable—yet strangely inverted—world.

Fraa Erasmas is a young avout living in the Concent of Saunt Edhar, a sanctuary for mathematicians, scientists, and philosophers, protected from the corrupting influences of the outside “saecular” world by ancient stone, honored traditions, and complex rituals. Over the centuries, cities and governments have risen and fallen beyond the concent’s walls. Three times during history’s darkest epochs violence born of superstition and ignorance has invaded and devastated the cloistered mathic community. Yet the avout have always managed to adapt in the wake of catastrophe, becoming out of necessity even more austere and less dependent on technology and material things. And Erasmas has no fear of the outside—the Extramuros—for the last of the terrible times was long, long ago.

Neal Stephenson is the author of seven previous novels. He lives in Seattle, Washington.

Neal Stephenson interview – Reamde

Solve for X: Neal Stephenson on getting big stuff done

Neal Stephenson: 2011 National Book Festival

2012 10 18 LTA Bookclub Neal StephensonHQ

Black Hat USA 2012 – An Interview with Neal Stephenson

Neal Stephenson, Author – Turing Festival 2013 Keynote

ASTC 2013 Keynote – A Conversation with Neal Stephenson

Neal Stephenson is Awesome

 

Neal Stephenson

From Wikipedia, the free encyclopedia
Neal Stephenson
Neal Stephenson 2008 crop.jpg
Stephenson at Science Foo Camp 2008

BornNeal Town Stephenson
October 31, 1959 (age 55)
Fort Meade, Maryland, United StatesPen nameStephen Bury
(with J. Frederick George)OccupationNovelist, short story writer, essayistNationalityAmericanPeriod1984–presentGenreSpeculative fiction, historical fiction, essaysLiterary movementcyberpunk, postcyberpunk,maximalismWebsitenealstephenson.com

Neal Town Stephenson (born October 31, 1959) is an American writer and game designer known for his works of speculative fiction.

His novels have been variously categorized as science fiction, historical fiction, cyberpunk, and “postcyberpunk“. Other labels, such as “baroque“, often appear.

Stephenson explores subjects such as mathematics, cryptography, philosophy, currency, and the history of science. He also writes non-fiction articles about technology in publications such as Wired.

He has worked part-time as an advisor for Blue Origin, a company (funded by Jeff Bezos) developing a manned sub-orbital launch system, and is also a cofounder ofSubutai Corporation, whose first offering is the interactive fiction project The Mongoliad. He has also written novels with his uncle, George Jewsbury (“J. Frederick George”), under the collective pseudonym Stephen Bury.

Life

Born on October 31, 1959 in Fort Meade, Maryland,[1] Stephenson came from a family of engineers and scientists; his father is a professor of electrical engineering while his paternal grandfather was a physics professor. His mother worked in a biochemistry laboratory, and her father was a biochemistry professor. Stephenson’s family moved to Champaign-Urbana, Illinois, in 1960 and then in 1966 to Ames, Iowa. He graduated from Ames High School in 1977.[2]

Stephenson studied at Boston University,[2] first specializing in physics, then switching to geography after he found that it would allow him to spend more time on the university mainframe.[3] He graduated in 1981 with a B.A. in geography and a minor in physics.[2] Since 1984, Stephenson has lived mostly in the Pacific Northwest and currently resides in Seattle with his family.[2]

Career

Discussing Anathem at MIT in 2008

Stephenson’s first novel, The Big U, published in 1984, was a satirical take on life at American Megaversity, a vast, bland and alienating research university beset by chaotic riots.[4][5] His next novel, Zodiac (1988), was a thriller following the exploits of a radical environmentalist protagonist in his struggle against corporate polluters.[4] Neither novel attracted much critical attention on first publication, but showcased concerns that Stephenson would further develop in his later work.[4] The Big U went out of print until 2001, when Stephenson allowed it to be republished after realizing that this book that he considered inferior to his others was being sold at inflated prices for used copies because of its scarcity and collectors’ value.[citation needed]

Stephenson’s breakthrough came in 1992 with Snow Crash,[5] a comic [6] novel in the late cyberpunk or post-cyberpunk tradition fusing memetics, computer viruses, and other high-tech themes with Sumerian mythology, along with a sociological extrapolation of laissez-faire capitalism and collectivism. Snow Crash can be considered to be the first expression of Stephenson’s mature style. Stephenson at this time would later be described by Mike Godwin as “a slight, unassuming grad-student type whose soft-spoken demeanor gave no obvious indication that he had written the manic apotheosis of cyberpunk science fiction.”[7] In 1994, Stephenson joined with his uncle, J. Frederick George, to publish a political thriller, Interface, under the pen name “Stephen Bury”;[8] they followed this in 1996 with The Cobweb.

Stephenson’s next solo novel, published in 1995, was The Diamond Age: or A Young Lady’s Illustrated Primer, which introduced many of today’s real world technological discoveries. Seen back then as futuristic, Stephenson’s novel has broad range universal self-learning nanotechnology, dynabooks, extensive modern technologies, robotics, cybernetics and cyber cities. Weapons implanted in characters’ skulls, near limitless replicators for everything from mattresses to foods, smartpaper, air and blood-sanitizing nanobots, set in a grim future world of limited resources populated by hard edged survivalists, an amalgamation hero is accidentally conceptualized by a few powerful and wealthy creatives, programmers and hackers.

This was followed by Cryptonomicon in 1999, a novel concerned with concepts ranging from computing and Alan Turing‘s research into codebreaking and cryptography during the Second World War at Bletchley Park, to a modern attempt to set up a data haven. It has subsequently been reissued in three separate volumes in some countries, including in French and Spanish translations. In 2013, Cryptonomicon won thePrometheus Hall of Fame Award.

The Baroque Cycle, Stephenson’s next novel, is a series of long historical novels set in the 17th and 18th centuries, and is in some respects a prequel to Cryptonomicon. It was originally published in three volumes of two or three books each – Quicksilver (2003), The Confusion (2004) and The System of the World (2004) – but was subsequently republished as eight separate books: Quicksilver, King of the Vagabonds, Odalisque,Bonanza, Juncto, Solomon’s Gold, Currency, and System of the World. (The titles and exact breakdown varies in different markets.) The System of the World won the Prometheus Award in 2005.

Following this, Stephenson published a novel titled Anathem (2008), a very long and detailed work, perhaps best described as speculative fiction. It is set in an Earthlike world (perhaps in an alternative reality), deals with metaphysics, and refers heavily to Ancient Greek philosophy, while at the same time being a complex commentary on the insubstantiality of today’s society.

In May 2010, the Subutai Corporation, of which Stephenson was named chairman, announced the production of an experimental multimedia fiction project called The Mongoliad, which centered around a narrative written by Stephenson and other speculative fiction authors.[9][10]

REAMDE, a novel, was released on September 20, 2011.[11] The title is a play on the common filename README. This thriller, set in the present, centers around a group of MMORPG developers caught in the middle of Chinese cyber-criminals, Islamic terrorists, and Russian mafia.[12]

On August 7, 2012, Stephenson released a collection of essays and other previously published fiction entitled Some Remarks : Essays and Other Writing.[13] This collection also includes a new essay and a short story created specifically for this volume.

In 2012 Stephenson launched a Kickstarter campaign for CLANG, a realistic swordfighting fantasy game. The game uses motion control to provide an immersive experience. The game will contain a distinctive world and plotline. The campaign’s funding goal of $500,000 was reached by the target date of July 9, 2012 on Kickstarter, but funding options remained open and were still taking contributions to the project on their official site.[14] The project ran out of money in September 2013.[15] This, and the circumstances around it, has angered some backers.[16] There has even been talk, among the backers, of a potential class action lawsuit.[17] The project to develop the game ended in September 2014 without the game being completed. Stephenson took part of the responsibility for the project’s failure, stating that “I probably focused too much on historical accuracy and not enough on making it sufficiently fun to attract additional investment”.[18]

In late 2013, Stephenson claimed to be working on a multi-volume work, historical novels that would “have a lot to do with scientific and technological themes and how those interact with the characters and civilisation during a particular span of history”. He expected the first two volumes to be released in mid-to-late 2014.[19] However, at about the same time, he shifted his attention to a science fiction novel, Seveneves, which was completed about a year later and will be published in May of 2015.[20]

In 2014, Stephenson was hired as Chief Futurist[21] by the Florida-based company Magic Leap. Magic Leap claims to be developing a revolutionary form of augmented reality, not too different from technologies Stephenson previously has described in his science fiction books.

Non-fiction

The science fiction approach doesn’t mean it’s always about the future;
it’s an awareness that this is different.

– Neal Stephenson, September 1999[22]

Stephenson has also written non-fiction. In The Beginning Was The Command Line, an essay on operating systems including the histories of and relationships between DOS, Windows, Linux, and BeOS from both cultural and technical viewpoints and focusing especially on the development of the Graphical User Interface, was published in book form in 2000.[5] Various other essays have been published in magazines such as Wired.

With the 2003 publication of Quicksilver, Applied Minds debuted The Metaweb, an online wiki annotating the ideas and historical period explored in the novel. The project was influenced by the online encyclopaedia Wikipedia, and its content included annotations from Stephenson himself.[23]

Style

In his earlier novels Stephenson deals heavily in pop culture-laden metaphors and imagery and in quick, hip dialogue, as well as in extended narrative monologues. The tone of his books is generally more irreverent and less serious than that of previous cyberpunk novels, notably those of William Gibson.

Stephenson at the Starship Century Symposium at UCSD in 2013

Stephenson’s books tend to have elaborate, inventive plots drawing on numerous technological and sociological ideas at the same time. This distinguishes him from other mainstream science fiction authors who tend to focus on a few technological or social changes in isolation from others. The discursive nature of his writing, together with significant plot and character complexity and an abundance of detail suggests a baroque writing style, which Stephenson brought fully to bear in the three-volume Baroque Cycle.[24] His book The Diamond Age follows a simpler plot but features “neo-Victorian” characters and employs Victorian-era literary conceits. In keeping with the baroque style, Stephenson’s books have become longer as he has gained recognition. For example, the paperback editions of Cryptonomicon are over eleven hundred pages long[25]with the novel containing various digressions, including a lengthy erotic story about antique furniture and stockings.

Works

Stephenson at the National Book Festivalin 2004

Novels

Short fiction

Other fiction projects

  • Project Hieroglyph, founded in 2011, administered by Arizona State University’s Center for Science and the Imagination since 2012. Hieroglyph: Stories and Visions for a Better Future, ed. Ed Finn and Kathryn Cramer, which includes contributions by Stephenson, was published by William Morrow in September, 2014.

Non-fiction

References

  1. Jump up^ Fisher, Lawrence M. (April 17, 1994). “SOUND BYTES; Orwell – Class of 1994″. The New York Times (The New York Times Company). Retrieved December 13, 2010.
  2. ^ Jump up to:a b c d Stephenson, Neal. “Biography”. Neal Stephenson’s Site (MobileMe). Archived from the original on June 28, 2012. Retrieved August 7, 2010.
  3. Jump up^ “Neal Stephenson – Biography”. ElectricInca.com. Retrieved August 7, 2010. He began his higher education as a physics major, then switched to geography when it appeared that this would enable him to scam more free time on his university’s mainframe computer.
  4. ^ Jump up to:a b c Booker, M Keith; Thomas, Anne-Marie, eds. (2009). “Neal Stephenson (1959–)”. The Science Fiction Handbook. Chichester, UK ; Malden, MA: Wiley-Blackwell. p. 173. ISBN 1-4051-6205-8. OCLC 263498124.
  5. ^ Jump up to:a b c Grassian, Daniel (2003). “From modernists to Gen Xers”. Hybrid fictions: American fiction and Generation X. Jefferson: McFarland & Co. pp. 29–30. ISBN 978-0-7864-1632-5. OCLC 52565833.
  6. Jump up^ Westfahl, Gary (2005). The Greenwood Encyclopedia of Science Fiction and Fantasy: Themes, Works, and Wonders, Vol. 3. Greenwood Publishing. p. 1235. ISBN 0-313-32953-2. Retrieved 2009-12-05.
  7. Jump up^ Godwin, Mike (February 2005). “Neal Stephenson’s Past, Present, and Future”. Reason (Reason Foundation). Retrieved December 13, 2010.
  8. Jump up^ “Neal Stephenson: Cryptomancer”. Locus Online. August 1, 1999. Retrieved August 7, 2010. …a thriller written in collaboration with his uncle, George Jewsbury, under pseudonym Stephen Bury
  9. Jump up^ Eaton, Kit (May 26, 2010). “The Mongoliad App: Neal Stephenson’s Novel of the Future?”. Fast Company. Retrieved July 4, 2010.
  10. Jump up^ “Subutai Corporation – Team”. subutai.mn (Subutai Corporation). Retrieved August 7, 2010. Neal Stephenson, Chairman
  11. Jump up^ Anders, Charlie Jane (July 14, 2009). “Neal Stephenson Gets Half A Million Dollars, But Did He Have To Switch Genres To Get It?”. io9. Gawker Media. Retrieved August 7, 2010.
  12. Jump up^ “reamdeDescription”.
  13. Jump up^ Upcoming4.me. “New Neal Stephenson book Some Remarks announced!”. Upcoming4.me. RetrievedJune 26, 2012.
  14. Jump up^ Twitter / subutaicorp: @LordBronco We’re still taking. Twitter.com. Retrieved on 2014-01-14.
  15. Jump up^ Famous Kickstarter Turns Into Complete Disaster. Kotaku.com. Retrieved on 2014-01-14.
  16. Jump up^ THUD: Development Of Neal Stephenson’s CLANG Halted. Rock, Paper, Shotgun. Retrieved on 2014-01-14.
  17. Jump up^ Neal Stephenson Says His Dream Of Making A Video Game Isn’t Dead | Kotaku Australia. Kotaku.com.au. Retrieved on 2014-01-14.
  18. Jump up^ Stephenson, Neal (19 September 2014). “Final Update”. CLANG by Subutai Corporation. Kickstarter. Retrieved 18 October 2014.
  19. Jump up^ Kelion, Leo. (2013-09-17) BBC News – Neal Stephenson on tall towers and NSA cyber-spies. Bbc.co.uk. Retrieved on 2014-01-14.
  20. Jump up^ http://nealstephenson.com/seveneaves.html
  21. Jump up^ http://www.magicleap.com/press/press_release5.pdf
  22. Jump up^ Catherine, Asaro (September 1999). “A Conversation With Neal Stephenson”. SF Site. RetrievedOctober 6, 2010.
  23. Jump up^ McClellan, Jim (November 4, 2004). “Neal Stephenson – the interview”. The Guardian (Guardian Media Group). Retrieved December 13, 2010.
  24. Jump up^ Giuffo, John (October 1, 2004). “Book Capsule Review: The System of the World”. Entertainment Weekly. Time Warner. Retrieved September 22, 2008.
  25. Jump up^ ex: Stephenson, Neal (1999). Cryptonomicon. Avon Books. pp. 1152 p. ISBN 978-0-06-051280-4.
  26. ^ Jump up to:a b c d e f g h Kelly, Mark R. “The Locus Index to SF Awards: Index of Literary Nominees”. Locusmag.com(Locus Publications). Retrieved January 18, 2011.
  27. Jump up^ William Morrow. Harpercollinscatalogs.com. Retrieved on 2014-01-14.
  28. Jump up^ [1]. Nealstephenson.com. Retrieved on 2015-02-10.

External links

http://en.wikipedia.org/wiki/Neal_Stephenson

 

Interface (novel)

From Wikipedia, the free encyclopedia
Interface
First edition cover

First edition cover
credited to Stephen Bury
Author Neal Stephenson and George Jewsbury
Cover artist Bruce Jensen
Country United States
Language English
Genre Thriller, Novel
Publisher Bantam
Publication date
1 April 1994
Media type Print (Paperback)
ISBN ISBN 0-553-37230-0 (first edition, paperback)
OCLC 28148075
813/.54 20
LC Class PS3552.U788 I58 1994

Interface is a 1994 novel by Neal Stephenson and George Jewsbury. It was originally sold with the author pseudonym of Stephen Bury, then reissued as being by Bury and J. Frederick George ,[1] and most recently as being by Stephenson and George.

Interface is a near-future thriller, set in 1996, in which a shadowy coalition bent on controlling the world economy attempts to manipulate a candidate for president of the United States through the use of a computer bio-chip implanted in his brain.

In 2007, it was described by writer Cory Doctorow as an “underappreciated masterpiece”.[2]

Plot summary

The novel opens with the governor of Illinois, William Cozzano, suffering a stroke, and in a separate subplot, a trailer park inhabitant, unemployed African-American, Eleanor Richmond, discovering her husband dead after having committed suicide in their repossessed former home.

As events progress, an underground business coalition, the Network, is arranging for Cozzano to have a biochip implanted and for him to run for President of the United States. The Network is made up of a number of large fictional companies, with parallels in real business entities.

Eleanor Richmond, after publicly attacking a local cable TV Public-access television talk show personality who was running for Senate, has since found herself working in the offices of a Republican Colorado senator, and after an event where she accused the citizens of Colorado of being welfare queens, finds herself in the public eye as one of the candidates for Cozzano’s running mate.

The Network’s ability to perceive public opinion, skewed on the night of the vice presidential debate by a twist of fate, makes them select Richmond as vice presidential candidate, and a canny act of public relations work rescues Cozzano’s campaign, getting him elected as President.

However, Cozzano gets shot at his inauguration by a psychotic former factory worker who has somehow figured out the Network’s plans almost entirely, killing him almost instantly. Richmond ends up as the first black and first female President of the United States.

Characters in “Interface”

  • Eleanor Richmond – unemployed African-American woman, protagonist
  • William Cozzano – governor of Illinois
  • Mary Catherine Cozzano – daughter of governor, neurologist
  • Cy Ogle – campaign manager
  • Dr. Radhakrishnan – neurosurgeon

References

  1. Jump up^ Stephenson, Neal; George, J. Frederick (2005) [1994]. Interface. Bantam Spectra. ISBN 9780553383430.
  2. Jump up^ Interface: Neal Stephenson’s underappreciated masterpiece

http://en.wikipedia.org/wiki/Interface_(novel)

 

Read Full Post | Make a Comment ( None so far )

The Hostile Takeover Of The Internet by Obama — More Taxes, More Regulation, More Control of Freedom of Speech, More Government Intervention into Business — Abolish The Federal Communications Commission (FCC) — Do Not Mess With The Internet — Videos

Posted on February 22, 2015. Filed under: American History, Blogroll, Business, College, Comedy, Communications, Computers, Computers, Constitution, Crisis, Data, Economics, Education, External Hard Drives, Family, Federal Communications Commission, Federal Government, Federal Government Budget, Fiscal Policy, Freedom, government, government spending, history, Inflation, Investments, Law, liberty, Life, Links, media, Mobile Phones, Philosophy, Photos, Politics, Press, Radio, Radio, Rants, Raves, Strategy, Talk Radio, Tax Policy, Taxes, Technology, Video, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 421: February 20, 2015

Pronk Pops Show 420: February 19, 2015

Pronk Pops Show 419: February 18, 2015

Pronk Pops Show 418: February 16, 2015

Pronk Pops Show 417: February 13, 2015

Pronk Pops Show 416: February 12, 2015

Pronk Pops Show 415: February 11, 2015

Pronk Pops Show 414: February 10, 2015

Pronk Pops Show 413: February 9, 2015

Pronk Pops Show 412: February 6, 2015

Pronk Pops Show 411: February 5, 2015

Pronk Pops Show 410: February 4, 2015

Pronk Pops Show 409: February 3, 2015

Pronk Pops Show 408: February 2, 2015

Pronk Pops Show 407: January 30, 2015

Pronk Pops Show 406: January 29, 2015

Pronk Pops Show 405: January 28, 2015

Pronk Pops Show 404: January 27, 2015

Pronk Pops Show 403: January 26, 2015

Pronk Pops Show 402: January 23, 2015

Pronk Pops Show 401: January 22, 2015

Pronk Pops Show 400: January 21, 2015

Pronk Pops Show 399: January 16, 2015

Pronk Pops Show 398: January 15, 2015

Pronk Pops Show 397: January 14, 2015

Pronk Pops Show 396: January 13, 2015

Pronk Pops Show 395: January 12, 2015

Pronk Pops Show 394: January 7, 2015

Pronk Pops Show 393: January 5, 2015

Pronk Pops Show 392: December 19, 2014

Pronk Pops Show 391: December 18, 2014

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Story 3: The Hostile Takeover Of The Internet by Obama — More Taxes, More Regulation, More Control of Freedom of Speech, More Government Intervention into Business — Abolish The Federal Communications Commission (FCC) — Do Not Mess With The Internet — Videos

Sen Ted Cruz (RTX) Warns Of “Obamacare For The Internet” – Net Neutrality – America’s Newsroom

Coming Soon: The Department of the Internet

The Negative Consequences of Net Neutrality Explained in 2 Minutes

Net Neutrality Neuters the Internet

The Truth About Net Neutrality

Advocates say that Net Neutrality means guaranteeing free speech on the Internet. Without it, big telecoms could control what you see and how you see it. But what is the truth about Net Neutrality?

2:00 – Brief Technical Introduction
9:20 – Major Concerns
14:53 – Monopoly History
35:57 – ISP Foul Play
48:05 – Event Timeline
1:02:08 – FCC Corruption
1:09:36 – Conclusions

Sources: http://www.fdrurl.com/net-neutrality

 

Blackburn to Continue Fight Against FCC Net Neutrality in 114th Congress

Last Week Tonight with John Oliver: Net Neutrality (HBO)

Judge Napolitano: Orwellian ‘Net Neutrality’ Anything But Neutral

Mark Cuban: ‘Net Neutrality Is Dumbest Stuff Ever’ | CNBC

Net Neutrality: What’s the Libertarian Position?

[236] Henderson: ‘Net Neutrality won’t work’; Ebeling: ‘The Fed distorts resource allocation’

Obama’s Net Neutrality Plan: Techno Control Grid

What is Net Neutrality In 60 seconds

Net Neutrality as Fast As Possible

Net Neutrality – A Slow but Sure Assault to Takeover the Internet

Net Neutrality: Is the Internet a Public Utility? | Idea Channel | PBS Digital Studios

Will Net Neutrality Save the Internet?

NET NEUTRALITY: Blackburn Discusses on Glenn Beck Program

The Fallacy of Net Neutrality: Thomas Hazlett on the FCC & Consumer Protection

“I’m very confident a hundred years from now we won’t have an FCC,” says Thomas Hazlett, Reason contributor and George Mason economics professor.

Internet service providers are coming under scrutiny from both the FCC and net neutrality supporters who want to ensure unrestricted consumer access to the Web. However, Hazlett points out that the fear over ISPs limiting Web content is unfounded and government “has no idea what the optimal business model is” to effectively regulate.

Hazlett sat down with Reason TV’s Nick Gillespie to discuss net neutrality, the Internet, and and his Encounters Broadside book “The Fallacy of Net Neutrality.”

Hank vs. Hank: The Net Neutrality Debate in 3 Minutes

On Net Neutrality, Time to Regulate the Regulators

by THE EDITORS

The Federal Communications Commission’s decision to effectively convert broadband Internet providers into regulated utility companies, stifling both technological innovation and consumer choice, is the latest example of the footrace dynamic that will dominate national domestic politics from now until January 2016: The Obama administration — or one of its purportedly independent enablers in the FCC and other federal agencies — announces sweeping and unilateral regulatory change, and the Republican-controlled legislative branch hustles to outmaneuver it. Given the respective timelines involved in executive fiat and lawmaking, the administration will almost always have a head start — but that should not stop Congress from catching up as quickly as possible.

At issue here is the question of “net neutrality,” an increasingly elastic term describing how an Internet service provider (ISP) treats any given packet of data moving through its network. On one side of the ideological divide, partisans of “neutrality” insist that every packet be treated in precisely the same way as every other packet, that none be given priority. On the other side is reality, in which the bandwidth demands of sending an e-mail from a home computer are different from those of streaming live video to a wireless device. That Netflix, for example, should be permitted to pay an Internet service provider to fast-lane its videos is, for the ideological neutralists, the first step toward another one of those science-fiction corporate dystopias that the anti-capitalists keep promising us, in this case one in which every Internet service provider becomes a “walled garden” in which consumers are hostage to the self-interested caprices of their ISPs, and therefore customers of an ISP that has an arrangement with Facebook might be relegated to pokey service when trying to use Instagram — or be blocked entirely from accessing certain Facebook competitors.

Internet users will notice that that hasn’t happened, and hasn’t shown any likelihood of happening, despite the absence of FCC regulations forbidding it. Even in the settings that most resemble “walled gardens” — for example, in-flight Internet services that do allow providers to enjoy absolute monopoly, for the duration of the flight at least — the trend has been in the opposite direction: When consumers made it clear that they were annoyed by Gogo’s unwillingness to support YouTube and streaming-video services, new products (notably services provided by the airlines themselves) came into the market to meet consumers’ demand for being able to while away that ORD–JFK segment watching funny cat videos.

The FCC’s move, then, is a typical federal regulatory enterprise: a non-solution to a non-problem.

While mainly motivated by a naïve ideological enthusiasm, net-neutrality activists fear, not without some reason, that the dominant operating model for ISPs will be something like that of cable-television providers. (Indeed, many cable-television providers are ISPs.) Specifically, they fear that ISPs will come to resemble cable companies circa 2010. The irony there is that it is the Internet itself — without any enabling regulation from the FCC — that has provided the beginnings of a solution to the problem of the general awfulness of the American cable company, with gleeful “cord-cutters” replacing their cable services with AppleTV, Hulu, and the like.

Neutrality as an operating principle has largely prevailed among ISPs in the absence of a federal mandate largely because consumers like it that way. But consumers may not always like it that way: For example, those who want faster service for downloading movies at the moment are largely restricted to paying for faster service across the board rather than paying for faster service when they want faster service — imagine the FAA’s insisting that if customers want to fly first-class on one trip, they have to fly first-class all the time. The FCC’s new rules are not aimed at preserving the effective neutrality that prevails today — they are ideologically informed measures aimed at preventing innovations in the marketplace that consumers might prefer to the current model.

To accomplish this, the FCC is reclassifying broadband providers as “telecommunication services” under Title II of the Communications Act . . . of 1934. The FCC’s recourse to a law passed during the administration of Franklin D. Roosevelt should give us all an idea about the sort of cutting-edge thinking that is at work here.

There is much that is unnecessary in these rules. For example, the regulation against blocking access to lawful websites addresses a situation that is largely unknown. (Some providers that serve customers of businesses open to the public do block pornographic sites, which does not seem unreasonable.) Likewise, the call for greater transparency in protocols speaks to a desirable end, though one that is hardly crying out for federal intervention.

On the other hand, the ban on creating “fast lanes” for services that would benefit from them forecloses what might be a fruitful avenue of innovation. More worrisome still is the vast, open-ended powers that federal regulators have granted themselves: The FCC has — with no congressional mandate — just given itself a mandate to forbid anything that it believes to be other than “reasonable,” or anything it judges will “harm consumers or edge providers.” (“Edge providers” essentially means those who create or distribute content.) And, of course, there is cronyism: As Philip Elmer-DeWitt of Fortune reports, Internet-based pay-television services of the sort being contemplated by Sony (and possibly by Apple) would be specifically exempt from the fast-lane rules.

As an Internet-based concern, National Review Online has a strong preference for an open, rambling, largely unregulated Internet. We believe that intense FCC oversight is as likely to undermine those freewheeling ways and “permissionless innovation” as to preserve them — look at any other industry in which the FCC stands athwart commerce. There are measures that can and should be taken to increase competition among ISPs, and, as Julian Sanchez of Cato points out, in the event of truly cumbrous and destructive collusions between ISPs and content providers, then the prudent response would be case-by-case intervention carried out by the Federal Trade Commission rather than preemptive blanket regulation by the FCC. It takes a certain kind of crackedness to believe that “free and open” and “under heavy federal regulation” are synonymous.

Congress has the authority to legally limit the FCC’s ambitions in this matter, and it should do so, even though such efforts would probably run into an Obama veto. That’s a fight worth having. It is high time to regulate the regulators and remind the bureaucrats who in this republic is in fact empowered to make law. Likewise, Jason Chaffetz’s initiation of an Oversight Committee investigation into whether the White House improperly colluded with the FCC in formulating these new rules is to be encouraged — if only for the potential amusement in learning whether improper collusion was instrumental in this crusade against improper collusion.

Far from being dysfunctional, the Internet is one of the critical aspects of life in these United States, one that is brilliantly functional and wonderfully innovative in no small part because of the laissez-faire approach that government has historically taken toward it. Why anybody would want to make it more like a utility company is a mystery — unless one appreciates that, for those suffering from a certain progressive inclination, federal regulation is thought to be desirable in and of itself, and that the freewheeling ways of the Internet are a standing rebuke to those who would regiment and regulate practically every aspect of life.

http://www.nationalreview.com/article/398227/net-neutrality-time-regulate-regulators-editors

Republican lawmakers investigate White House net neutrality push

Congressional Republicans are demanding to know how much the White House influenced the Federal Communications Commission while the agency crafted net neutrality rules.
The FCC has until Monday afternoon to produce unredacted email messages, focused on net neutrality rules, between FCC staff and officials with the Obama administration, U.S. Rep. Jason Chaffetz said in a letter to the FCC Friday. The Utah Republican is chairman of the House Oversight and Government Reform Committee.

Chaffetz’s committee is “investigating the potential involvement of the White House” in the creation of proposed net neutrality rules that the FCC is scheduled to vote on next Thursday, he said in the letter. FCC Chairman Tom Wheeler will propose regulations that would reclassify broadband as a regulated telecommunications service instead of a lightly regulated information service.

An FCC spokeswoman didn’t immediately respond to a request for a comment on Chaffetz’s letter.

Several congressional Republicans have accused the White House of improperly influencing the FCC net-neutrality rule-making process, after Obama called on the agency to reclassify broadband as a regulated public utility in November. Wheeler appeared to change his position and embrace that idea after the president urged the independent agency to do so, critics have said.
But U.S. presidential administrations have repeatedly weighed in on FCC proceedings during the past 30-plus years, net neutrality advocate Public Knowledge has noted.

Chaffetz’s letter to the FCC came just two days after Republican leaders of the House Energy and Commerce Committee told Wheeler they were expanding an investigation into agency rule-making processes.

The Energy and Commerce Committee’s probe covers a wide range of FCC process concerns beyond net neutrality, but new reports detailing White House contact with the FCC on net neutrality raise “additional concerns about whether the commission is managing its affairs with the independence and openness required by its mandate,” committee leaders said in a Wednesday letter to Wheeler.

Republican concerns about Obama administration influence over the FCC were fueled by a Feb. 4 Wall Street Journal report saying the White House last year had set up a “parallel version of the FCC” to push for regulation of broadband providers.

Chaffetz’s letter asks for specific email messages sent by Obama administration officials to the FCC in April. On Friday, Vice.com published an exchange between administration officials and FCC staff that the website obtained through a Freedom of Information Act request.

http://www.computerworld.com/article/2886968/republican-lawmakers-investigate-white-house-net-neutrality-push.html

 

GOP, tech industry mostly out of step over net neutrality issue

By NOAH BIERMAN AND EVAN HALPER contact the reporters Politics and Government U.S. Congress Federal Communications Commission John Thune Ted Cruz Rand Paul

  • Silicon Valley executives and activists are increasingly irritated by the feeling the GOP is not on their side
  • GOP lawmakers argue that FCC net neutrality proposal amounts to a government takeover of the Web
  • GOP lawmakers in Congress are unified in opposition to the administration approach on net neutrality

Thee intensifying debate over how to keep the Internet open and ripe for innovation has heightened tensions between Republican congressional leaders and tech entrepreneurs they have been trying to woo.

As tech firms and cable companies prepare for a fight that each says will shape the future of the Internet, Silicon Valley executives and activists are growing increasingly irritated by the feeling that the GOP is not on their side.

Republican leaders have struggled to explain to their nascent allies in the Bay Area why they are working so hard to undermine a plan endorsed by the Obama administration to keep a level playing field in Internet innovation, enforcing what the administration and its allies call “net neutrality.”

FCC chief seeks to treat Web as public utility in net neutrality fight
Arguments from the GOP that the plan amounts to a government takeover of the Web — “Obamacare for the Internet,” as Sen. Ted Cruz (R-Texas) called it — are falling flat with many tech innovators.

“This is one of the most prominent moments in Internet freedom,” said Julie Samuels, executive director of Engine, a nonpartisan advocacy group that brings policymakers together with tech start-ups. “I don’t think any party can afford to be on the wrong side of this conversation.”

But Republicans, she said, are on the wrong side.

The Federal Communications Commission is expected to vote this month to adopt the net neutrality plan proposed last week by the panel’s chairman, Tom Wheeler. The plan would regulate Internet service providers, such as Comcast Corp. and AT&T Inc., as public utilities and would ban them from offering high-speed lanes to companies that pay more.

Republicans have promised to push legislation to overturn any such move, but most high-tech companies support it.

The fight comes at a time when Republicans had been making gains in Silicon Valley, a constituency of well-heeled donors and coveted millennial-generation voters who have generally been loyal to Democrats.

Prominent Republicans, including House Majority Leader Kevin McCarthy (R-Bakersfield), have taken members of Congress on listening tours of tech companies. Tech money has begun flowing into GOP campaign accounts. Presidential hopefuls, including Sen. Rand Paul (R-Ky.), have made an aggressive case that the GOP better understands the values of privacy and freedom in the digital world.

GOP leaders had hoped to build on those gains at an event in Washington called Reboot Congress, which started Wednesday evening, where top Republican lawmakers plan to join Silicon Valley business leaders to discuss the future of the Internet.

Republicans have hoped to seize on recent Democratic policy moves that riled tech companies, including a push for strict anti-piracy rules and the Obama administration’s continued backing of National Security Agency surveillance of Internet users.
The FCC makes a breakthrough on net neutrality–but the battle isn’t over
But the hot issue in Silicon Valley now is net neutrality. And on that issue, the GOP and the tech industry are mostly out of step.

Republicans argue that intervention by a big government agency is the wrong approach to leveling the playing field for companies that depend on the Internet. That’s especially true now, as conservatives accuse Obama of a broad pattern of regulatory overreach in healthcare, the environment and immigration.

“As is often the case in Washington, those who want more power create the specter of a false threat that is not occurring in the marketplace today,” Cruz said in an interview in which he warned that new regulations could lead to new taxes and put a chill on innovation. “The power of regulation is like a camel’s nose under the tent,” he said.

In Congress, GOP lawmakers are unified in opposition to the administration approach.

That includes tech-savvy California Republicans such as Rep. Darrell Issa (R-Vista), who warns that the administration approach “will result in over-regulation and years of fruitless litigation.” McCarthy joined his House leadership colleagues in warning regulators that imposing net neutrality rules would “deter investment and stifle one of the brightest spots in our economy.”

Many Internet entrepreneurs disagree.

“The argument is a red herring,” said Corynne McSherry, intellectual property director at the Electronic Frontier Foundation, which fights alongside GOP lawmakers on privacy and surveillance issues but is helping lead the attack against them on net neutrality.

“Nobody is talking about wanting the Federal Communications Commission to regulate the Internet. That would be terrible,” McSherry said. “All they would be doing is putting in rules of the road for broadband providers.”

Republicans, she said, are essentially helping big corporations squeeze out innovation. “Politically, this is a real mistake,” she said.

It is unclear to what extent the issue will overshadow other Silicon Valley priorities. But it is certainly making the GOP a tougher sell.

“It is close to a litmus test,” said Paul Sieminski, a Republican who is the general counsel to Automattic, the company that operates Web-making tool WordPress.com.

“It’s such a fundamental issue for the Internet,” said Sieminski, who has been active in fighting for net neutrality. “I guess it is a proxy on where a candidate may stand on a lot of issues related to the Internet.”

The fight goes beyond wealthy entrepreneurs making or seeking their fortunes in start-up companies. Silicon Valley is adept at mobilizing consumers eager to protect what they see as a core value of the digital age.

The FCC received nearly 4 million comments on the net neutrality rules — most urging them to enforce stricter regulations — before Wheeler announced his proposal last week.

Groups such as Fight for the Future, whose donors include technology companies, said they have helped initiate tens of thousands of calls from their members to regulators and lawmakers using technology that bypasses switchboards.

Polls also showed overwhelming support for the concept that big carriers such as Verizon Communications Inc. and Comcast should not be allowed to charge more to companies that want a fast lane.

That may have propelled a shift among some Republicans, who once questioned the need for any new regulations.

Sen. John Thune (R-S.D.) is proposing a bill that would let Congress, rather than regulators, set the terms for net neutrality. In establishing the concept, however, the measure also would take away the FCC’s authority to make any new regulations in the fast-changing broadband marketplace.

Thune and others frame their disagreement with Obama and federal regulators as one over process, asserting that Congress would better protect openness on the Internet yet avoid burdensome regulations.

“I worry that online innovators will be subject to the Mother-may-I system in which startups have to hire regulatory lawyers before they hire engineers,” Thune said Wednesday night as the Reboot conference began at the U.S. Chamber of Commerce headquarters in Washington.

Silicon Valley activists are unimpressed. They don’t trust the GOP-controlled Congress on this issue.

“They’re cynical attempts,” Evan Greer, campaign manager for Fight for the Future, said of the legislative proposals, “last-ditch efforts by cable lobbyists who know they’ve been beat in the court of public opinion.”

http://www.latimes.com/business/la-fi-gop-tech-20150213-story.html#page=1

 

Net neutrality

From Wikipedia, the free encyclopedia

Net neutrality (also network neutrality, Internet neutrality, or net equality) is the principle that Internet service providersand governments should treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, type of attached equipment, or mode of communication. The term was coined by Columbia University media law professor Tim Wu in 2003 as an extension of the longstanding concept of a common carrier.[1][2][3][4]

There has been extensive debate about whether net neutrality should be required by law, particularly in the United States. Debate over the issue of net neutrality predates the coining of the term. Advocates of net neutrality such as Lawrence Lessighave raised concerns about the ability of broadband providers to use their last mile infrastructure to block Internet applications and content (e.g. websites, services, and protocols), and even to block out competitors[5]

Neutrality proponents claim that telecom companies seek to impose a tiered service model in order to control the pipeline and thereby remove competition, create artificial scarcity, and oblige subscribers to buy their otherwise uncompetitive services[citation needed]. Many believe net neutrality to be primarily important as a preservation of current freedoms.[6] Prominent supporters of net neutrality include Vinton Cerf, co-inventor of the Internet Protocol, and Tim Berners-Lee, creator of the Web.[7][8]

Examples of net neutrality violations include when the internet service provider Comcast intentionally slowed peer-to-peercommunications.[9] In 2007, one other company was using deep packet inspection to discriminate against peer-to-peer, file transfer protocol, and online games, instituting a cell-phone style billing system of overages, free-to-telecom value added services, and bundling.[10] Critics of net neutrality argue that data discrimination is desirable for reasons like guaranteeingquality of service. Bob Kahn, co-inventor of the Internet Protocol, called the term net neutrality a slogan and opposes establishing it, but he admits that he is against the fragmentation of the net whenever this becomes excluding to other participants.[11] On 31 January 2015, AP News reported the FCC will present the notion of applying (“with some caveats”) Title II (common carrier) of the Communications Act of 1934 to the internet in a vote expected on 26 February 2015.[12][13][14][15][16]Adoption of this notion would reclassify internet service from one of information to one of telecommunications[17] and, according to Tom Wheeler, chairman of the FCC, ensure net neutrality.[18][19] The Obama administration said that it would not let the public see its 332 page net neutrality plan until after the FCC voted on its implementation.[20]

Definition and related principle

Net neutrality

Network neutrality is the principle that all Internet traffic should be treated equally.[21] According to Columbia Law School professor Tim Wu, the best way to explain network neutrality is as a principle to be used when designing a network: that a public information network will end up being most useful if all content, sites, and platforms are treated equally.[22] A more detailed proposed definition of technical and service network neutrality suggests that service network neutrality is the adherence to the paradigm that operation of a service at a certain layer is not influenced by any data other than the data interpreted at that layer, and in accordance with the protocol specification for that layer.[23]

Open Internet

The idea of an open Internet is the idea that the full resources of the Internet and means to operate on it are easily accessible to all individuals and companies. This often includes ideas such as net neutrality, open standards, transparency, lack of Internet censorship, and low barriers to entry. The concept of the open Internet is sometimes expressed as an expectation of decentralized technological power, and is seen by some as closely related to open-source software.[24]

Proponents often see net neutrality as an important component of an open internet, where policies such as equal treatment of data and open web standards allow those on the Internet to easily communicate and conduct business without interference from a third party.[25] A closed Internet refers to the opposite situation, in which established corporations or governments favor certain uses. A closed Internet may have restricted access to necessary web standards, artificially degradesome services, or explicitly filter out content.

Dumb pipe

Main article: Dumb pipe

The concept of a dumb network made up of dumb pipes has been around since at least the early 1990s. The idea of a dumb network is that the endpoints of a network are generally where the intelligence lies, and that the network itself generally leaves the management and operation of communication to the end users. In 2013 the software company MetroTech Net, Inc. (MTN) coined the term Dumb Wave which is the modern application of the Dumb Pipe concept to the ubiquitous wireless network. If wireless carriers do not provide unique and value added services, they will be relegated to the dumb pipe category where they can’t charge a premium or retain customers.

End-to-end principle

Main article: End-to-end principle

The end-to-end principle is a principle of network design, first laid out explicitly in the 1981 conference paper End-to-end arguments in system design by Jerome H. Saltzer, David P. Reed, and David D. Clark. The principle states that, whenever possible, communications protocol operations should be defined to occur at the end-points of a communications system, or as close as possible to the resource being controlled. According to the end-to-end principle, protocol features are only justified in the lower layers of a system if they are a performance optimization, hence, TCP retransmission for reliability is still justified, but efforts to improve TCP reliability should stop after peak performance has been reached. They argued that reliable systems tend to require end-to-end processing to operate correctly, in addition to any processing in the intermediate system. They pointed out that most features in the lowest level of a communications system have costs for all higher-layer clients, even if those clients do not need the features, and are redundant if the clients have to re-implement the features on an end-to-end basis. This leads to the model of a minimal dumb network with smart terminals, a completely different model from the previous paradigm of the smart network with dumb terminals. Because the end-to-end principle is one of the central design principles of the Internet, and because the practical means for implementing data discrimination violate the end-to-end principle, the principle often enters discussions about net neutrality. The end-to-end principle is closely related, and sometimes seen as a direct precursor to the principle of net neutrality.[26]

Traffic shaping

Main article: Traffic shaping

Traffic shaping is the control of computer network traffic in order to optimize or guarantee performance, improve latency, and/or increase usable bandwidth by delaying packets that meet certain criteria.[27] More specifically, traffic shaping is any action on a set of packets (often called a stream or a flow) which imposes additional delay on those packets such that they conform to some predetermined constraint (a contract or traffic profile).[28] Traffic shaping provides a means to control the volume of traffic being sent into a network in a specified period (bandwidth throttling), or the maximum rate at which the traffic is sent (rate limiting), or more complex criteria such as GCRA.

Over-provisioning

If the core of a network has more bandwidth than is permitted to enter at the edges, then good QoS can be obtained without policing. For example the telephone network employs admission control to limit user demand on the network core by refusing to create a circuit for the requested connection. Over-provisioning is a form of statistical multiplexing that makes liberal estimates of peak user demand. Over-provisioning is used in private networks such as WebEx and the Internet 2 Abilene Network, an American university network. David Isenberg believes that continued over-provisioning will always provide more capacity for less expense than QoS and deep packet inspection technologies.[29][30]

By issue

Discrimination by protocol

Favoring or blocking information based on the communications protocol that the computers are using to communicate.

On 1 August 2008, the FCC formally voted 3-to-2 to uphold a complaint against Comcast, the largest cable company in the United States, ruling that it had illegally inhibited users of its high-speed Internet service from using file-sharing software. FCC chairman Kevin J. Martin said that the order was meant to set a precedent that Internet providers, and indeed all communications companies, could not prevent customers from using their networks the way they see fit unless there is a good reason. In an interview, Martin said, “We are preserving the open character of the Internet”. The legal complaint against Comcast related to BitTorrent, a transfer protocol that is especially apt at distributing large files such as video, music, and software on the Internet.[31] Comcast admitted no wrongdoing[32] in its proposed settlement of up to US$16 dollars per share in December 2009.[33]

Discrimination by IP address

During the early decades of the Internet, creating a non-neutral Internet was technically infeasible.[34] Originally developed to filter malware, the Internet security company NetScreen Technologies released network firewalls in 2003 with so called deep packet inspection. Deep inspection helped make real-time discrimination between different kinds of data possible,[35] and is often used for internet censorship.

In a practice called zero-rating, companies will reimburse data use from certain addresses, favoring use of those services. Examples include Facebook Zero[36] and Google Free Zone, and are especially common in the developing world.[37]

Sometimes ISPs will charge some companies, but not others, for the traffic they cause on the ISP’s network. French telecoms operator Orange, complaining that traffic from YouTube and other Google sites consists of roughly 50% of total traffic on the Orange network, reached a deal with Google, in which they charge Google for the traffic incurred on the Orange network.[38] Some also thought that Orange’s rival ISP Free throttled YouTube traffic. However, an investigation done by the French telecommunications regulatory body revealed that the network was simply congested during peak hours.[39]

Favoring private networks

Favoring communications sent over the private networks run by individual organizations over information sent over the general Internet Protocol. Examples include Comcast’s deal with Xbox.[40]

Peering discrimination

See also: Peering

There is some disagreement about whether peering is a net neutrality issue.[41]

In the first quarter of 2014, streaming website Netflix reached an arrangement with ISP Comcast to improve the quality of its service to Netflix clients.[42] This arrangement was made in response to increasingly slow connection speeds through Comcast over the course of the 2013, where average speeds dropped by over 25% of their values a year before to an all time low. After the deal was struck in January 2014, the Netflix speed index recorded a 66% increase in connection.

Netflix agreed to a similar deal with Verizon in 2014 after Verizon DSL customers connection speed dropped to less than 1 Mbit/s early in the year. Netflix spoke out against this deal with a controversial statement delivered to all Verizon customers experiencing low connection speeds using the Netflix client.[43] This sparked an internal debate between the two companies that led to Verizon obtaining a cease and desist order on June 5, 2014 that forced Netflix to stop displaying this message.

Legal aspects

Main article: Net neutrality law

Legal enforcement of net neutrality principles takes a variety of forms, from provisions that outlaw anti-competitive blocking and throttling of Internet services, all the way to legal enforcement that prevents companies from subsidizing Internet use on particular sites.

Arguments for net neutrality

Proponents of net neutrality include consumer advocates, human rights organizations such as Article 19,[44] online companies and some technology companies.[45]Many major Internet application companies are advocates of neutrality. Yahoo!, Vonage,[46] eBay, Amazon,[47] IAC/InterActiveCorp. Microsoft, along with many other companies, have also taken a stance in support of neutrality regulation.[48] Cogent Communications, an international Internet service provider, has made an announcement in favor of certain net neutrality policies.[49] In 2008, Google published a statement speaking out against letting broadband providers abuse their market power to affect access to competing applications or content. They further equated the situation to that of the telephony market, where telephone companies are not allowed to control who their customers call or what those customers are allowed to say.[4] However, Google’s support of net neutrality has recently been called into question.[50]

Individuals who support net neutrality include Tim Berners-Lee,[51] Vinton Cerf,[52][53] Lawrence Lessig, Robert W. McChesney,[6] Steve Wozniak, Susan P. Crawford, Ben Scott, David Reed,[54] and U.S. President Barack Obama.[55][56] On November 10, 2014, President Obama recommended the FCC reclassify broadband Internet service as a telecommunications service in order to preserve net neutrality.[57][58][59] On November 12, 2014, AT&T stopped build-out of their fiber network until it has “solid net neutrality rules to follow”.[60] On 31 January 2015, AP News reported the FCC will present the notion of applying (“with some caveats”) Title II (common carrier) of the Communications Act of 1934 to the internet in a vote expected on 26 February 2015.[12][13][14][15][16]

Control of data

Supporters of network neutrality want to designate cable companies as common carriers, which would require them to allow Internet service providers (ISPs) free access to cable lines, the model used for dial-up Internet. They want to ensure that cable companies cannot screen, interrupt or filter Internet content without court order.[61] Common carrier status would give the FCC the power to enforce net neutrality rules.[62]

SaveTheInternet.com accuses cable and telecommunications companies of wanting the role of gatekeepers, being able to control which websites load quickly, load slowly, or don’t load at all. According to SaveTheInternet.com these companies want to charge content providers who require guaranteed speedy data delivery…to create advantages for their own search engines, Internet phone services, and streaming video services – and slowing access or blocking access to those of competitors.[63] Vinton Cerf, a co-inventor of the Internet Protocol and current vice president of Google argues that the Internet was designed without any authorities controlling access to new content or new services.[64] He concludes that the principles responsible for making the Internet such a success would be fundamentally undermined were broadband carriers given the ability to affect what people see and do online.[52]

Digital rights and freedoms

Lawrence Lessig and Robert W. McChesney argue that net neutrality ensures that the Internet remains a free and open technology, fostering democratic communication. Lessig and McChesney go on to argue that the monopolization of the Internet would stifle the diversity of independent news sources and the generation of innovative and novel web content.[6]

User intolerance for slow-loading sites

Users with faster Internet connectivity (e.g., fiber) abandon a slow-loading video at a faster rate than users with slower Internet connectivity (e.g., cable or mobile).[65] A “fast lane” in the Internet can irrevocably decrease the user’s tolerance to the relative slowness of the “slow lane”.

Proponents of net neutrality invoke the human psychological process of adaptation where when people get used to something better, they would not ever want to go back to something worse. In the context of the Internet, the proponents argue that a user who gets used to the “fast lane” on the Internet would find the “slow lane” intolerable in comparison, greatly disadvantaging any provider who is unable to pay for the “fast lane”. Video providers Netflix[66] and Vimeo[67] in their comments to FCC in favor of net neutrality use the research[65] of S.S. Krishnan and Ramesh Sitaraman that provides the first quantitative evidence of adaptation to speed among online video users. Their research studied the patience level of millions of Internet video users who waited for a slow-loading video to start playing. Users who had a faster Internet connectivity, such as fiber-to-the-home, demonstrated less patience and abandoned their videos sooner than similar users with slower Internet connectivity. The results demonstrate how users can get used to faster Internet connectivity, leading to higher expectation of Internet speed, and lower tolerance for any delay that occurs. Author Nicholas Carr[68] and other social commentators[69][70] have written about the habituation phenomenon by stating that a faster flow of information on the Internet can make people less patient.

Competition and innovation

Net neutrality advocates argue that allowing cable companies the right to demand a toll to guarantee quality or premium delivery would create an exploitative business model based on the ISPs position as gatekeepers.[71] Advocates warn that by charging websites for access, network owners may be able to block competitor Web sites and services, as well as refuse access to those unable to pay.[6] According to Tim Wu, cable companies plan to reserve bandwidth for their own television services, and charge companies a toll for priority service.[72]

Proponents of net neutrality argue that allowing for preferential treatment of Internet traffic, or tiered service, would put newer online companies at a disadvantage and slow innovation in online services.[45] Tim Wu argues that, without network neutrality, the Internet will undergo a transformation from a market ruled by innovation to one ruled by deal-making.[72] SaveTheInternet.com argues that net neutrality puts everyone on equal terms, which helps drive innovation. They claim it is a preservation of the way the internet has always operated, where the quality of websites and services determined whether they succeeded or failed, rather than deals with ISPs.[63] Lawrence Lessig and Robert W. McChesney argue that eliminating net neutrality would lead to the Internet resembling the world of cable TV, so that access to and distribution of content would be managed by a handful of massive companies. These companies would then control what is seen as well as how much it costs to see it. Speedy and secure Internet use for such industries as health care, finance, retailing, and gambling could be subject to large fees charged by these companies. They further explain that a majority of the great innovators in the history of the Internet started with little capital in their garages, inspired by great ideas. This was possible because the protections of net neutrality ensured limited control by owners of the networks, maximal competition in this space, and permitted innovators from outside access to the network. Internet content was guaranteed a free and highly competitive space by the existence of net neutrality.[6]

Preserving Internet standards

Network neutrality advocates have sponsored legislation claiming that authorizing incumbent network providers to override transport and application layer separation on the Internet would signal the decline of fundamental Internet standards and international consensus authority. Further, the legislation asserts that bit-shaping the transport of application data will undermine the transport layer’s designed flexibility.[73]

Preventing pseudo-services

Alok Bhardwaj argues that any violations to network neutrality, realistically speaking, will not involve genuine investment but rather payoffs for unnecessary and dubious services. He believes that it is unlikely that new investment will be made to lay special networks for particular websites to reach end-users faster. Rather, he believes that non-net neutrality will involve leveraging quality of service to extract remuneration from websites that want to avoid being slowed down.[74]

End-to-end principle

Main article: End-to-end principle

Some advocates say network neutrality is needed in order to maintain the end-to-end principle. According to Lawrence Lessig and Robert W. McChesney, all content must be treated the same and must move at the same speed in order for net neutrality to be true. They say that it is this simple but brilliant end-to-end aspect that has allowed the Internet to act as a powerful force for economic and social good.[6] Under this principle, a neutral network is a dumb network, merely passing packets regardless of the applications they support. This point of view was expressed by David S. Isenberg in his paper, “The Rise of the Stupid Network”. He states that the vision of an intelligent network is being replaced by a new network philosophy and architecture in which the network is designed for always-on use, not intermittence and scarcity. Rather than intelligence being designed into the network itself, the intelligence would be pushed out to the end-user’s device; and the network would be designed simply to deliver bits without fancy network routing or smart number translation. The data would be in control, telling the network where it should be sent. End-user devices would then be allowed to behave flexibly, as bits would essentially be free and there would be no assumption that the data is of a single data rate or data type.[75]

Contrary to this idea, the research paper titled End-to-end arguments in system design by Saltzer, Reed, and Clark[76] argues that network intelligence doesn’t relieve end systems of the requirement to check inbound data for errors and to rate-limit the sender, nor for a wholesale removal of intelligence from the network core.

Arguments against net neutrality

Opposition includes the Cato Institute, the Competitive Enterprise Institute, the Goldwater Institute, Americans for Tax Reform, and the Ayn Rand Institute. Opponents of net neutrality include hardware companies and members of the cable and telecommunications industries, including major telecommunications providers, such as Comcast and AT&T.[77]

A number of these opponents created a website called Hands Off The Internet[78] (which no longer exists) to promote their arguments against net neutrality. Principal financial support for the website came from AT&T, and members included technology firms and pro-market advocacy group Citizens Against Government Waste.[79][80][81][82]

Network neutrality regulations are opposed by Internet engineers such as professor David Farber[83] and TCP inventor and Qualcomm Director[84] Bob Kahn.[11]Robert Pepper is senior managing director, global advanced technology policy, at Cisco Systems, and is the former FCC chief of policy development. He says: “The supporters of net neutrality regulation believe that more rules are necessary. In their view, without greater regulation, service providers might parcel out bandwidth or services, creating a bifurcated world in which the wealthy enjoy first-class Internet access, while everyone else is left with slow connections and degraded content. That scenario, however, is a false paradigm. Such an all-or-nothing world doesn’t exist today, nor will it exist in the future. Without additional regulation, service providers are likely to continue doing what they are doing. They will continue to offer a variety of broadband service plans at a variety of price points to suit every type of consumer”.[85] Bob Kahn, another computer scientist and Director at Qualcomm,[84] has said net neutrality is a slogan that would freeze innovation in the core of the Internet.[11]

Farber has written and spoken strongly in favor of continued research and development on core Internet protocols. He joined academic colleagues Michael Katz,Christopher Yoo, and Gerald Faulhaber in an op-ed for the Washington Post strongly critical of network neutrality, essentially stating that while the Internet is in need of remodeling, congressional action aimed at protecting the best parts of the current Internet could interfere with efforts to build a replacement.[86]

Financing infrastructure improvements

Some opponents of net neutrality argue that prioritization of bandwidth is necessary for future innovation on the Internet.[77] Telecommunications providers such as telephone and cable companies, and some technology companies that supply networking gear, argue telecom providers should have the ability to provide preferential treatment in the form of tiered services, for example by giving online companies willing to pay the ability to transfer their data packets faster than other Internet traffic. The added revenue from such services could be used to pay for the building of increased broadband access to more consumers.[45]

Conversely, opponents say that net neutrality regulation would make it more difficult for Internet service providers (ISPs) and other network operators to recoup their investments in broadband networks.[87] John Thorne, senior vice president and deputy general counsel of Verizon, a broadband and telecommunications company, has argued that they will have no incentive to make large investments to develop advanced fibre-optic networks if they are prohibited from charging higher preferred access fees to companies that wish to take advantage of the expanded capabilities of such networks. Thorne and other ISPs have accused Google and Skype of freeloading or free riding for using a network of lines and cables the phone company spent billions of dollars to build.[77][88][89]

Counterweight to server-side non-neutrality

Those in favor of forms of non-neutral tiered Internet access argue that the Internet is already not a level playing field: large companies achieve a performance advantage over smaller competitors by replicating servers and buying high-bandwidth services. Should prices drop for lower levels of access, or access to only certain protocols, for instance, a change of this type would make Internet usage more neutral, with respect to the needs of those individuals and corporations specifically seeking differentiated tiers of service. Network expert[citation needed] Richard Bennett has written, “A richly funded Web site, which delivers data faster than its competitors to the front porches of the Internet service providers, wants it delivered the rest of the way on an equal basis. This system, which Google calls broadband neutrality, actually preserves a more fundamental inequality.”[90]

Tim Wu, though a proponent of network neutrality, claims that the current Internet is not neutral, because its implementation of best effort generally favors file transfer and other non-time sensitive traffic over real-time communications.[91]

Prevent overuse of bandwidth

Since the early 1990s, Internet traffic has increased steadily. The arrival of picture-rich websites and MP3s led to a sharp increase in the mid-1990s followed by a subsequent sharp increase since 2003 as video streaming and Peer-to-peer file sharing became more common.[92][93] In reaction to companies including YouTube, as well as smaller companies starting to offer free video content, using substantial amounts of bandwidth, at least one Internet service provider (ISP), SBC Communications (now AT&T Inc.), has suggested that it should have the right to charge these companies for making their content available over the provider’s network.[94]

Bret Swanson of the Wall Street Journal wrote in 2007 that the popular websites of that time, including YouTube, MySpace, and blogs, were put at risk by net neutrality. He noted that, at the time, YouTube streamed as much data in three months as the world’s radio, cable and broadcast television channels did in one year, 75 petabytes. He argued that networks were not remotely prepared to handle the amount of data required to run these sites. He also argued that net neutrality would prevent broadband networks from being built, which would limit available bandwidth and thus endanger innovation.[95]

One example of these concerns was the series of tubes analogy, which was presented by US senator Ted Stevens on the floor of the US senate in 2006.

Related issues

Data discrimination

Main article: Data discrimination

Tim Wu, though a proponent of network neutrality, claims that the current Internet is not neutral as its implementation of best effort generally favors file transfer and other non-time-sensitive traffic over real-time communications.[96] Generally, a network which blocks some nodes or services for the customers of the network would normally be expected to be less useful to the customers than one that did not. Therefore, for a network to remain significantly non-neutral requires either that the customers not be concerned about the particular non-neutralities or the customers not have any meaningful choice of providers, otherwise they would presumably switch to another provider with fewer restrictions.[citation needed]

While the network neutrality debate continues, network providers often enter into peering arrangements among themselves. These agreements often stipulate how certain information flows should be treated. In addition, network providers often implement various policies such as blocking of port 25 to prevent insecure systems from serving as spam relays, or other ports commonly used by decentralized music search applications implementing peer-to-peer networking models. They also present terms of service that often include rules about the use of certain applications as part of their contracts with users.[citation needed]

Most consumer Internet providers implement policies like these. The MIT Mantid Port Blocking Measurement Project is a measurement effort to characterize Internet port blocking and potentially discriminatory practices. However, the effect of peering arrangements among network providers are only local to the peers that enter into the arrangements, and cannot affect traffic flow outside their scope.[citation needed]

Jon Peha from Carnegie Mellon University believes it is important to create policies that protect users from harmful traffic discrimination, while allowing beneficial discrimination. Peha discusses the technologies that enable traffic discrimination, examples of different types of discrimination, and potential impacts of regulation.[97]

Quality of service

Main article: Quality of service

Internet routers forward packets according to the diverse peering and transport agreements that exist between network operators. Many networks using Internet protocols now employ quality of service (QoS), and Network Service Providers frequently enter into Service Level Agreements with each other embracing some sort of QoS.

There is no single, uniform method of interconnecting networks using IP, and not all networks that use IP are part of the Internet. IPTV networks are isolated from the Internet, and are therefore not covered by network neutrality agreements.

The IP datagram includes a 3-bit wide Precedence field and a larger DiffServ Code Point that are used to request a level of service, consistent with the notion that protocols in a layered architecture offer services through Service Access Points. This field is sometimes ignored, especially if it requests a level of service outside the originating network’s contract with the receiving network. It is commonly used in private networks, especially those including Wi-Fi networks where priority is enforced. While there are several ways of communicating service levels across Internet connections, such as SIP, RSVP, IEEE 802.11e, and MPLS, the most common scheme combines SIP and DSCP. Router manufacturers now sell routers that have logic enabling them to route traffic for various Classes of Service at “wire-speed”.

With the emergence of multimedia, VoIP, IPTV, and other applications that benefit from low latency, various attempts to address the inability of some private networks to limit latency have arisen, including the proposition of offering tiered service levels that would shape Internet transmissions at the network layer based on application type. These efforts are ongoing, and are starting to yield results as wholesale Internet transport providers begin to amend service agreements to include service levels.[98]

Advocates of net neutrality have proposed several methods to implement a net neutral Internet that includes a notion of quality-of-service:

  • An approach offered by Tim Berners-Lee allows discrimination between different tiers, while enforcing strict neutrality of data sent at each tier: “If I pay to connect to the Net with a given quality of service, and you pay to connect to the net with the same or higher quality of service, then you and I can communicate across the net, with that quality and quantity of service”.[3] “[We] each pay to connect to the Net, but no one can pay for exclusive access to me.”[99]
  • United States lawmakers have introduced bills that would now allow quality of service discrimination for certain services as long as no special fee is charged for higher-quality service.[100]

Alok Bhardwaj has argued that net neutrality preservation through legislation is consistent with implementing quality of service protocols. He argues legislation should ban the charging of fees for any quality of service, which would both allow networks to implement quality of service as well as remove any incentive to abuse net neutrality ideas. He argues that since implementing quality of service doesn’t require any additional costs versus a non-QoS network, there’s no reason implementing quality of service should entail any additional fees.[74] However, the core network hardware needed (with large number of queues, etc.) and the cost of designing and maintaining a QoS network are both much higher than for a non-QoS network.[citation needed]

Pricing models

Broadband Internet access has most often been sold to users based on Excess Information Rate or maximum available bandwidth. If Internet service providers(ISPs) can provide varying levels of service to websites at various prices, this may be a way to manage the costs of unused capacity by selling surplus bandwidth (or “leverage price discrimination to recoup costs of ‘consumer surplus‘”). However, purchasers of connectivity on the basis of Committed Information Rate or guaranteed bandwidth capacity must expect the capacity they purchase in order to meet their communications requirements.

Various studies have sought to provide network providers the necessary formulas for adequately pricing such a tiered service for their customer base. But while network neutrality is primarily focused on protocol based provisioning, most of the pricing models are based on bandwidth restrictions.[101]

Privacy concerns

Some opponents of net neutrality legislation point to concerns of privacy rights that could come about as a result, how those infringements of privacy can be exploited. While some believe it is hyperbole to suggest that ISPs will just transparently monitor transmitted content, or that ISPs will have to alter their content, there is the concern that ISPs may have profit motives to analyze what their subscribers are viewing, and be able to use such information to their financial advantage. For example, an ISP may be able to essentially replicate the “targeting” that has already been employed by companies like Google. To critics such as David Clark, a senior research scientist at Massachusetts Institute of Technology, the proper question is “who has the right to observe everything you do”?[102]

Framing of debate

Former Washington Post columnist, and Fox News commentator, Jeffrey Birnbaum, who currently works for the BGR Group (a lobbying firm which is employed byComcast[103]) has called the debate “vague and misleading.”[104]

See also

References

  1. Jump up^ Tim Wu (2003). “Network Neutrality, Broadband Discrimination”. Journal on telecom and high tech law. Retrieved 23 Apr 2014.
  2. Jump up^ Krämer, J; Wiewiorra, L. & Weinhardt,C. (2013): “Net Neutrality: A progress report”. Telecommunications Policy 37(9), 794–813.
  3. ^ Jump up to:a b Berners-Lee, Tim (21 June 2006). “Net Neutrality: This is serious”. timbl’s blog. Retrieved 26 December 2008.
  4. ^ Jump up to:a b Staff. “A Guide to Net Neutrality for Google Users”. Google. Archived fromthe original on 1 September 2008. Retrieved 7 December 2008.
  5. Jump up^ Lessig, L. 1999. Cyberspace’s Architectural Constitution, draft 1.1, Text of lecture given at www9, Amsterdam, Netherlands
  6. ^ Jump up to:a b c d e f Lawrence Lessig and Robert W. McChesney (8 June 2006). “No Tolls on The Internet”. Columns.
  7. Jump up^ Davidson, Alan (8 November 2005). “Vint Cerf speaks out on net neutrality”. Blogspot.com. Retrieved 25 January 2013.
  8. Jump up^ “MIT.edu”. Dig.csail.mit.edu. 21 June 2006. Retrieved 23 June 2011.
  9. Jump up^ Peter Svensson (19 October 2007). “Comcast Blocks some Subscriber Internet Traffic, AP Testing shows”. Associated Press. Retrieved 25 October 2009.
  10. Jump up^ Anderson, Nate (25 July 2007). “Deep packet inspection meets ‘Net neutrality, CALEA”. Ars Technica. Retrieved 23 June 2011.
  11. ^ Jump up to:a b c Robert Kahn and Ed Feigenbaum (9 January 2007). An Evening with Robert Kahn (WMV). Computer History Museum. Retrieved 26 December 2008. Partial transcript: Hu-Berlin.de[dead link]
  12. ^ Jump up to:a b Lohr, Steve (2 February 2015). “In Net Neutrality Push, F.C.C. Is Expected to Propose Regulating Internet Service as a Utility”. New York Times. Retrieved2 February 2015.
  13. ^ Jump up to:a b Lohr, Steve (2 February 2015). “F.C.C. Chief Wants to Override State Laws Curbing Community Net Services”. New York Times. Retrieved 2 February 2015.
  14. ^ Jump up to:a b Flaherty, Anne (31 January 2015). “Just whose Internet is it? New federal rules may answer that”. AP News. Retrieved 31 January 2015.
  15. ^ Jump up to:a b Fung, Brian (2 January 2015). “Get ready: The FCC says it will vote on net neutrality in February”. Washington Post. Retrieved 2 January 2015.
  16. ^ Jump up to:a b Staff (2 January 2015). “FCC to vote next month on net neutrality rules”. AP News. Retrieved 2 January 2015.
  17. Jump up^ Lohr, Steve (4 February 2015). “F.C.C. Plans Strong Hand to Regulate the Internet”. New York Times. Retrieved 5 February 2015.
  18. Jump up^ Wheeler, Tom (4 February 2015). “FCC Chairman Tom Wheeler: This Is How We Will Ensure Net Neutrality”. Wired (magazine). Retrieved 5 February 2015.
  19. Jump up^ The Editorial Board (6 February 2015). “Courage and Good Sense at the F.C.C. – Net Neutrality’s Wise New Rules”. New York Times. Retrieved 6 February 2015.
  20. Jump up^ FCC’s Pai: Net-neutrality proposal is secret Internet regulation plan, Los Angelese Times, February 10, 2015
  21. Jump up^ Honan, Matthew (12 February 2008). “Inside Net Neutrality: Is your ISP filtering content?”. MacWorld. Retrieved 26 December 2008.
  22. Jump up^ Wu, Tim. “Network Neutrality FAQ”. Retrieved 26 December 2008.
  23. Jump up^ Hagai Bar-El (19 Aug 2014). “Protecting Network Neutrality: Both Important and Hard”. Retrieved 19 Aug 2014.
  24. Jump up^ Mathew Ingram (23 Mar 2012). “Open vs. closed: What kind of internet do we want?”. GigaOm. Retrieved 8 Jun 2014.
  25. Jump up^ “About the Open Internet”. European Commission. Retrieved 23 Apr 2014.
  26. Jump up^ Alexis C. Madrigal and Adrienne LaFrance (25 Apr 2014). “Net Neutrality: A Guide to (and History of) a Contested Idea”. The Atlantic. Retrieved 5 Jun 2014.This idea of net neutrality…[Lawrence Lessig] used to call the principle e2e, for end to end
  27. Jump up^ IETF RFC 2475 “An Architecture for Differentiated Services” section 2.3.3.3 – definition of “Shaper”
  28. Jump up^ tsbmail. “ITU-T I.371 : Traffic control and congestion control in B-ISDN”. Retrieved 14 September 2014.
  29. Jump up^ Isenberg, David (2 July 2007). “Research on Costs of Net Neutrality”. Retrieved26 December 2008.
  30. Jump up^ Anderson, Nate (25 July 2007). “Deep packet inspection meets ‘Net neutrality, CALEA”. Ars Technica. Retrieved 26 December 2008.
  31. Jump up^ Hansell, Saul (2 August 2008). “F.C.C. Vote Sets Precedent on Unfettered Web Usage”. The New York Times.
  32. Jump up^ Duncan, Geoff (23 December 2009). “Comcast to Pay $16 Million for Blocking P2P Applications”. Digital Trends. Retrieved 23 December 2009.
  33. Jump up^ Cheng, Jacqui (22 December 2009). “Comcast settles P2P throttling class-action for $16 million”. Ars Technica (Condé Nast). Retrieved 23 December 2009.
  34. Jump up^ M. Chris Riley and Ben Scott, Free Press (Mar 2009). “Deep Packet Inspection: The end of the Internet as we know it?”. Center for Internet and Society. Retrieved 29 May 2014.
  35. Jump up^ Paul Roberts, IDG News Service (20 Oct 2003). “NetScreen announces deep inspection firewall”. Network World. Retrieved 29 May 2014.
  36. Jump up^ Ben Gilbert (23 Dec 2013). “T-Mobile prepaid offering free data… but only to access Facebook”. Engadget. Retrieved 18 Nov 2014.
  37. Jump up^ Lily Hay Newman (21 Jan 2014). “Net Neutrality Is Already in Trouble in the Developing World”. Slate. Retrieved 18 Nov 2014.
  38. Jump up^ Robertson, Adi (2013-01-19). “French ISP Orange says it’s making Google pay to send traffic over its network”. The Verge. Retrieved 14 January 2014.
  39. Jump up^ “ARCEP closes the administrative inquiry involving several companies, including Free and Google, on the technical and financial terms governing IP traffic routing.”. 19 July 2013. Retrieved 18 January 2014.
  40. Jump up^ Brendan Greeley (21 Jun 2012). “Comcast ‘Invents’ Its Own Private Internet”. Bloomberg. Retrieved 18 Nov 2014.
  41. Jump up^ Joshua Brustein (24 Feb 2014). “Netflix’s Deal With Comcast Isn’t About Net Neutrality—Except That It Is”. Bloomberg. Retrieved 18 Nov 2014.
  42. Jump up^ Waniata, Ryan. “Comcast Jumps up in Netflix Speed Rankings after Payola-style Agreement.” Digital Trends. N.p., 14 Apr. 2014. Web. 15 Aug. 2014.
  43. Jump up^ Waniata, Ryan. “Netflix Calls Verizon out on the Big Red Screen [Update: Netflix Backs Off].” Digital Trends. N.p., 9 June 2014. Web. 15 Aug. 2014.
  44. Jump up^ “Four tenors: Call for Internet Speech Rights”. ARTICLE 19. Retrieved31 August 2012.
  45. ^ Jump up to:a b c Meza, Philip E. (20 March 2007). Coming Attractions?. Stanford University Press. p. 158. ISBN 9780804756600.
  46. Jump up^ Plunkett, Jack W. (2008). Plunkett’s Telecommunications Industry Almanac 2009. Plunkett Research. p. 208. ISBN 9781593921415.
  47. Jump up^ “Defeat for net neutrality backers”. BBC News. 9 June 2006. Retrieved26 December 2008.
  48. Jump up^ “Open letter to the Committee on Energy and Commerce” (PDF). 1 March 2006. Retrieved 26 December 2008.
  49. Jump up^ Cogent Communications, Inc. “Net Neutrality Policy Statement”. Retrieved21 April 2009.
  50. Jump up^ “Google’s Sordid History of Net Neutrality Hypocrisy”. Gizmodo. Retrieved14 September 2014.
  51. Jump up^ Tim Berners-Lee (18 November 2006). Humanity Lobotomy – what will the Internet look like in 10 years?. Retrieved 26 December 2008.
  52. ^ Jump up to:a b Cerf, Vinton (7 February 2006). “The Testimony of Mr. Vinton Cerf, Vice President and Chief Internet Evangelist, Google” (PDF). p. 1. Retrieved5 November 2012.
  53. Jump up^ Cerf, Vinton (July 2009). “The Open Network. What it is, and why it matters”.Telecommunications Journal of Australia 59 (2). doi:10.2104/tja09018/issn.1835-4270.
  54. Jump up^ Dynamic Platform Standards Project. “Preserve the Internet Standards for Net Neutrality”. Retrieved 26 December 2008.
  55. Jump up^ Albanesius, Chloe (22 September 2009). “Obama Supports Net Neutrality Plan”. PC Magazine. Retrieved 25 January 2013.
  56. Jump up^ Broache, Anne (29 October 2007). “Obama pledges Net neutrality laws if elected president”. CNET. Retrieved 25 January 2013.
  57. Jump up^ Wyatt, Edward (November 10, 2014). “Obama Asks F.C.C. to Adopt Tough Net Neutrality Rules”. New York Times. Retrieved November 15, 2014.
  58. Jump up^ NYT Editorial Board (November 14, 2014). “Why the F.C.C. Should Heed President Obama on Internet Regulation”. New York Times. RetrievedNovember 15, 2014.
  59. Jump up^ Sepulveda, Ambassador Daniel A. (January 21, 2015). “The World Is Watching Our Net Neutrality Debate, So Let’s Get It Right”. Wired (website). RetrievedJanuary 20, 2015.
  60. Jump up^ Hardawar, Devindra (12 November 2014). “AT&T halts fiber build-out until net neutrality rules are sorted”. http://www.engadget.com (Reuters). Retrieved12 November 2014.
  61. Jump up^ Phillips, Peter (2006). Censored 2007. Seven Stories Press. p. 34.ISBN 9781583227381.
  62. Jump up^ Robertson, Adi. “Federal court strikes down FCC net neutrality rules”. The Verge. Retrieved 14 January 2014.
  63. ^ Jump up to:a b “Frequently Asked Questions”. SaveTheInternet.com. Archived from the original on 11 December 2008. Retrieved 7 December 2008.
  64. Jump up^ Davidson, Alan (8 November 2005). “Vint Cerf speaks out on net neutrality”.The Official Google Blog. Google.
  65. ^ Jump up to:a b “Video Stream Quality Impacts Viewer Behavior, by Krishnan and Sitaraman, ACM Internet Measurement Conference, Nov 2012.”.
  66. Jump up^ “NetFlix comments to FCC, page 17, Sept 16th 2014″.
  67. Jump up^ “Vimeo Open Letter to FCC, page 11, July 15th 2014″.
  68. Jump up^ “Patience is a Network Effect, by Nicholas Carr, Nov 2012″.
  69. Jump up^ “NPR Morning Edition: In Video-Streaming Rat Race, Fast is Never Fast Enough, October 2012″. Retrieved 2014-07-03.
  70. Jump up^ “Boston Globe: Instant gratification is making us perpetually impatient, Feb 2013″. Retrieved 2014-07-03.
  71. Jump up^ “What Is Net Neutrality? 10 Aug 2010″.
  72. ^ Jump up to:a b Wu, Timothy (1 May 2006). “Why You Should Care About Network Neutrality”. Slate.
  73. Jump up^ Dynamic Platform Standards Project. “Internet Platform for Innovation Act”. Sec. 2.11. Retrieved 26 December 2008.
  74. ^ Jump up to:a b “Against Fee-Based and other Pernicious Net Prejudice: An Explanation and Examination of the Net Neutrality Debate”. Scribd.com. 27 November 2007. Retrieved 23 June 2011.
  75. Jump up^ Isenberg, David (1 August 1996). “The Rise of the Stupid Network”. Retrieved19 August 2006.
  76. Jump up^ J. H. Saltzer; D. P. Reed; D. D. Clark (November 1984). “End-to-end arguments in system design”. ACM Transactions on Computer Systems 2 (4): 277–288.doi:10.1145/357401.357402.
  77. ^ Jump up to:a b c Hart, Jonathan D. (2007). Internet Law. BNA Books. p. 750.ISBN 9781570186837.
  78. Jump up^ “Hands off the Internet”. Archived from the original on 5 January 2009. Retrieved 26 December 2008.
  79. Jump up^ Jeffrey H. Birnbaum, “No Neutral Ground in This Internet Battle”, The Washington Post, 26 July 2006.
  80. Jump up^ “Hands Off the Internet, “Member Organizations,””. Archived from the original on 5 January 2009. Retrieved 4 August 2006.
  81. Jump up^ Anne Veigle, “Groups Spent $42 Million on Net Neutrality Ads, Study Finds”, Communications Daily, 20 July 2006.
  82. Jump up^ SaveTheInternet.com, “One Million Americans Urge Senate to Save the Internet”, at Savetheinternet.com (last visited 4 August 2006).
  83. Jump up^ Farber, David (2 June 2006). “Common sense about network neutrality”.Interesting-People (Mailing list). Retrieved 26 December 2008.
  84. ^ Jump up to:a b “Robert Kahn, Forbes”. Retrieved 11 November 2011.
  85. Jump up^ Pepper, Robert (14 March 2007). “Network Neutrality: Avoiding a Net Loss”.TechNewsWorld. Retrieved 26 December 2008.
  86. Jump up^ David Farber; Michael Katz (19 January 2007). “Hold Off On Net Neutrality”.The Washington Post. Retrieved 26 December 2008.
  87. Jump up^ “FTC to Host Workshop on Broadband Connectivity Competition Policy”. Federal trade Commission. December 2006.
  88. Jump up^ Mohammed, Arshad (February 2007). “Verizon Executive Calls for End to Google’s ‘Free Lunch'”. The Washington Post.
  89. Jump up^ Crowcroft, Jon (2007). Net Neutrality: The Technical Side of the Debate: A White Paper (PDF). University of Cambridge. p. 5. Retrieved 23 June 2009.
  90. Jump up^ “Google’s political Head-fake”. SFGate. 9 July 2008. Retrieved 14 September2014.
  91. Jump up^ “Network neutrality, broadband discrimination by Tim Wu” (PDF). Retrieved23 June 2011.
  92. Jump up^ “Google and cable firms warn of risks from Web TV”. USA Today. 2 July 2007. Retrieved 20 May 2010.
  93. Jump up^ Kelly, Spencer (15 June 2007). “Warning of ‘Internet overload'”. BBC Click.
  94. Jump up^ Banks, Theodore L. (24 May 2002). Corporate Legal Compliance Handbook. Aspen Publishers Online. p. 70. ISBN 9780735533424.
  95. Jump up^ Swanson, Bret (20 January 2007). “The Coming Exaflood”. The Wall Street Journal.
  96. Jump up^ Wu, Tim (2003). “Network Neutrality, Broadband Discrimination”. Journal of Telecommunications and High Technology Law 2: 141. doi:10.2139/ssrn.388863.SSRN 388863.
  97. Jump up^ Jon Peha. “The Benefits and Risks of Mandating Network Neutrality, and the Quest for a Balanced Policy”. Retrieved 1 January 2007.
  98. Jump up^ Sullivan, Mark (14 August 2006). “Carriers Seek IP QOS Peers”. Light Reading. Retrieved 26 December 2008.
  99. Jump up^ Berners-Lee, Tim (2 May 2006). “Neutrality of the Net”. timbl’s blog. Retrieved26 December 2008.
  100. Jump up^ A bill to amend the Communications Act of 1934 to ensure net neutrality, S. 215
  101. Jump up^ “NCSU.edu” (PDF). Retrieved 23 June 2011.
  102. Jump up^ Joch, Alan (October 2009). “Debating Net Neutrality”. Communications of the ACM 52 (10): 14–15. doi:10.1145/1562764.1562773.
  103. Jump up^ Washington Post, Lobbyists find mixed reception running for office, but a few have won elections, By Holly Yeager, Published: 19 May,http://www.washingtonpost.com/politics/lobbyists-find-mixed-reception-running-for-office-but-a-few-have-won-elections/2014/05/18/2d0343de-db74-11e3-b745-87d39690c5c0_story.html
  104. Jump up^ Bimbaum, Jeffrey (26 June 2006). “No Neutral Ground In This Battle”. The Washington Post. Retrieved 15 December 2006.

External links

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

John Twelve Hawks — The Traveler (Fourth Realm Trilogy) — Who is John Twelve Hawks? — Videos

Posted on February 6, 2015. Filed under: American History, Blogroll, Books, Communications, Computers, Constitution, Corruption, Crime, Federal Government, Foreign Policy, Freedom, government spending, history, Law, liberty, Literacy, media, Non-Fiction, People, Philosophy, Photos, Rants, Raves, Reviews, Terrorism, Video, Wealth, Welfare, Wisdom | Tags: , , , , , , , , , , |

Is this John Twelve Hawks?
john twelve Hawks

Michael Cunningham?michael cunninghamtravel novel

trilogy traveller

The Golden City

Realms

Who is John Twelve Hawks?

I AM JOHN TWELVE HAWKS: NYC

The traveler By John Twelve Hawks

SPARK by John Twelve Hawks (REVIEW)

Excerpt from audiobook version, narrated by Scott Brick. This book has been optioned for film by Dreamworks. “Spark” refers to the inner self or identity of a man who lost his sense of being alive after a motorcycle accident, in a future in which robots are taking over jobs and corporations spy on everyone and act as the mafia. Jacob is hired as a hit man for a company wanting to eliminate problems using him as an emotionless zombie-like tool. (He refers to his body as a “shell.”) An excellent dystopian first-person struggle toward regaining humanity in an age we are fast approaching. Scott Brick read  three books of the Fourth Realm Trilogy. I loved his
work then and asked that he read the SPARK audiobook.
John Hawks told me this about narrator Scott Brick: “This was a fairly difficult assignment because it’s a first person novel narrated by a professional killer who thinks that he’s dead. But Scott did a brilliant job…using his voice to convey Underwood’s personality and the unique way that he looks at the world. He conveys the strangeness of Underwood, but also makes it accessible for the listener. I think he’s wonderful!”

An interview with John Twelve Hawks

A Conversation with John Twelve Hawks, author of The Traveler

The Traveler evokes a variety of films and books–everything from George Orwell to the Matrix. Where did you take your inspiration from?
George Orwell is a favorite writer of mine and I liked the first Matrix, but the creation of the novel goes much deeper than that. When I sat down to write The Traveler I didn’t think about being published. I simply wanted to understand the world around me. Sometimes the best way to find the truth is to create a fiction.

Can you describe the differences between the three main character types in the book: Travelers, Harlequins, Tabula?
Travelers are a small group of people who have the ability to send their spirit to other worlds. The Harlequins are an ancient order of warriors who defend The Travelers. The Tabula is an organization that believes that mankind is a tabula rasa — a blank slate that can be scrawled with their ideas. They are determined to destroy The Travelers. These three groups are fictional but their struggle takes place within a very realistic environment.

Is John Twelve Hawks your real name?
I wasn’t given the name John Twelve Hawks at birth. It’s an adopted name — just like the names the Harlequins chose at a certain time of their lives. This name has great personal significance for me, but it’s not relevant to understanding the book.

One of your characters, Gabriel, lives “off the Grid,” avoiding detection by what you call the “Vast Machine.” Can you explain what you mean by this and why you yourself have chosen to live this way as well?
For me, living off the Grid means existing in a way that can’t be tracked by the government or large corporations. The Vast Machine is the very powerful — and very real — computerized information system that monitors all aspects of our lives.

I live off the Grid by choice, but my decision includes one factor that is relevant to the publication of The Traveler. I want people to focus on the book itself and not on its author. The typical “personal slant” of most media arts coverage trivializes the power of ideas — and there are a great many provocative ideas in this novel. Everyone who reads The Traveler is going to be entertained by an exciting story. A smaller group is going to be inspired to see our computerized world in a new way.

How do you correspond with your publisher and how do you plan to correspond with readers?
I have never met my editor or any of the staff at Doubleday. I talk to them using a satellite phone or we communicate through the internet. I haven’t really thought about how I’m going to answer reader questions but it will probably be through a non-traceable website.

Your message in the book about the end of privacy in our society is frightening. How much of what you portray is true and how much is pure invention?
It’s all true — based on years of research. Email messages are scanned by a program called Carnivore and programs linked to surveillance cameras use algorithms to identify you instantly. Some of the facts in The Traveler — such as the description of the new “computational immunology” program developed by the Royal Mail in Britain — have never been described in any book.

What, if any, suggestions do you have for people who are concerned about identity theft, the Patriot Act, phone and internet surveillance and other invasions of everyday privacy? Some of your characters agitate against the Vast Machine. Would you advise this?
This first step is to be aware of what is going on. Most of us have given up our privacy without even knowing it. At some point, we need to express our opinions to our elected officials. The growing power of the Vast Machine is actually not an issue that is tied to a particular political party. A traditional conservative like former Georgia Congressman Robert Barr is on the same side of the privacy issue as the ACLU. The most important thing is that we not succumb to the baseless fear that is used to justify our loss of personal liberty. People objected when the government proposed something called the Total Information Awareness system: a computerized program that would track virtually all of our electronic transactions. When the name of the program was changed to the Terrorist Information Awareness system — just one new word — all the criticism vanished.

The settings in the book are captured in vivid detail–the Charles Bridge in Prague, the California desert, the back alleys of East London. Was travel a big part of your research?
My agent once asked me how long it took me to write The Traveler and I answered: “All my life.” I didn’t do any particular research for the locations in the novel. I simply drew on the memories of different places where I’ve visited, lived or worked. Virtually all the locations in the book are real. For example, there is a system of abandoned missile silos in Arizona and Jeremy Bentham’s dead body is on public display at University College London.

The scenes of violence in the book also seem very real — not Hollywood fantasies.
I studied martial arts for several years and have fought both in tournaments and on the street. Maya and the other Harlequins have been trained since childhood to fight, but they’re not super human; they can be hurt or killed. Readers have told me that they’ve found the scenes of violence in The Traveler to be incredibly exciting because they’re not sure what’s going to happen. This duplicates my own experience creating the book. Every time I began to write a scene that involved fighting I had no idea if my characters were going to survive.

Family seems to be both a blessing and a curse in the novel. As Maya says: “Damned by the flesh. Saved by the blood.” Care to elaborate?
It was only after I finished the first draft of The Traveler that I realized how many of the characters are haunted by their fathers. Maya loved her father, Thorn, but he also destroyed her childhood. Gabriel and Michael Corrigan thought that their father was killed by the Tabula, but now there are signs that his ghost is alive. A crucial secondary character named Lawrence Takawa changes his entire life in honor of a father he has never met.

At one point in the novel, your protagonist Maya explains that there is a secret history of the world, a history of “warriors defending pilgrims or other spiritual seekers.” Do you believe this? What do you think is the role of faith in modern society?

There has been a continual battle throughout history between institutions that try to control our lives and those visionaries who emphasize the value of the human spirit. Right now, there’s a determined attempt to reduce all human behavior to biochemistry. If Joan of Arc was alive today she’d be put on Prozac. Faith can give us a larger perspective on our own lives as well as the world that surrounds us.

You seem to combine Eastern religion, mysticism and new age spirituality in your discussion of Gabriel’s education. The novel also suggests that Jesus, Mohammed, Buddha, even an obscure Rabbi from Poland may have all been Travelers–which begs the question: What (if any) is your religious affiliation?

When I was in my twenties, I was an atheist and proud of it. Now I believe in God and pray every day but I’m not a member of any organized religion. Travelers are guided by teachers called Pathfinders and I’ve dedicated the trilogy to my own personal Pathfinders. I’ve had several and they’ve included a Catholic priest, a Presbyterian minister, a scholar who was an orthodox Jew, and a Buddhist monk. I’m not going to minimize the differences between religions but they all have one thing in common: they teach the power of compassion and encourage that quality in our own hearts.

This is the first book in a trilogy. Any hints for readers about what they can expect from Books Two and Three?
In Book Two, a tough Irish Harlequin named Mother Blessing will enter the story; she’s already forcing her way into my dreams. Expect some surprises involving Maya, Gabriel, and the Tabula mercenary, Nathan Boone. I’m not manipulating these characters to fit a plot. They seem to have their own ideas about what they want to do.

Unless otherwise stated, this interview was conducted at the time the book was first published, and is reproduced with permission of the publisher. This interview may not be reproduced or reprinted without permission in writing from the copyright holder.

https://www.bookbrowse.com/author_interviews/full/index.cfm/author_number/1159/john-twelve-hawks

 

The Traveler (novel)

The Traveler
The-traveler.jpg
Cover of the Doubleday paperback edition

AuthorJohn Twelve HawksCountryUnited StatesLanguageEnglishSeriesThe Fourth RealmGenreScience fiction novelPublisherDoubleday

Publication date

2005Media typePrint (Hardback &Paperback)Pages449 ppISBNISBN 0-593-05430-XOCLC58828401Followed byThe Dark River

The Traveler (The Traveller in the UK) is a 2005 New York Times bestselling novel[1] by John Twelve Hawks. The Dark River, book two of The Fourth Realm Trilogy, was published in July 2007. The final part in the trilogy, The Golden City, was released September 8, 2009. The trilogy has been translated into 25 languages and has sold more than 1.5 million books.[2]

Traveler

The book is set in the near future and lays out a world where the real power lies not with people or governments, but in the hands of a secret organisation who call themselves “the Brethren” but who their enemies refer to as “the Tabula”. The Tabula are a centuries old secret society who believe in the importance of control and stability, making them in essence advocates of a kind of extreme Utilitarianism. Influenced by the ideas of the philosopher Jeremy Bentham the Tabula wish to enforce a Virtual Panopticon: a society where all individuals become so accustomed to being watched and monitored that they act at all times as if they were being observed and are as such completely controllable.

This Virtual Panopticon is made possible through the use of surveillance cameras, centralized databases, RFID-like tags for each citizen, and assorted spy gear (heat sensors, infrared cameras, X-rays, etc…). The Tabula are a relatively small group, operate largely in secret, but they have great power across the planet, in part by manipulating politicians and other powerful individuals/organisation, and in part because of their great wealth and advanced technology, which is in some cases far beyond the technology available to other groups and even governments.

The underlying premise for the realms in which this book is set greatly resembles the cosmology of Tibetan Buddhism (and other eastern cosmologies). Most notably, the second realm is explicitly labelled the realm of the Hungry Ghosts, but each realm in the enumerated hierarchy is associated with a given human shortcoming, much like in Hinduism and Buddhism. The world we inhabit is the fourth realm, and different Travellers can visit one or more of the other realms.

Although the basic plot is not new, the author provides a setting for discussion of larger issues, such as free will, the rapid increase in public surveillance and information gathering, the culture of fear, etc. While the motivations of the Tabula are explored in the book, this is kept at a rather superficial and crude level. Individual members are generally portrayed as either power hungry, psychopathic or deeply prejudiced, and the Tabula are set up as villains set to enslave humanity rather than misguided humanitarians.

The author has written a post-script at the end of the book in which he talks about his reasons for writing the novel and discusses, among other things, the development in western countries regarding surveillance (such as CCTV), data-mining, RFID and GPS, the Information Awareness Office, etc. He claims that all of the technology referred to in the book is either already being used or in the advanced stage of development.

Travelers, Pathfinders and Harlequins

The Travelers are individuals with a special gift, often but not always inherited, which allows them to detach from their bodies and journey through elemental barriers (water, fire etc.) to other realms. They do this by detaching their “light” (internal energy seemingly analogous to the soul but found by the Tabula to be empirically measurable) from their body. Travelers’ experiences and gifts (they can view the world around them with greater speed and clarity than normal people) can lend them great charisma, wisdom and vision. Many Travelers become religious prophets, or opponents of the Tabula, and the random element they add to societies makes them enemies of the Tabula who have hunted them almost to extinction.

The idea that all people possess the “light” within and can travel through other states of consciousness or “realms” is also a basic tenet of Gnosticism.

The Pathfinders are individuals capable of teaching potential Travelers how to break the light free from their body. Pathfinders can be priests and holy men, agnostics or atheists – different Pathfinders will use different teaching methods and have different beliefs, but all can help Travelers to realize their gifts. Pathfinders are also hunted by the Tabula.

The Author

Main article: John Twelve Hawks

The only information one can get on John Twelve Hawks is that he is living “off the grid“. This means that he is invisible to the network of surveillance and authority. He has no fixed home, no bank account or internet connection, and John Twelve Hawks is not his real name.

Plot summary

In the shadows of modern society an epic battle is fought. One woman is standing between those who try to control mankind and those who will risk their lives for the freedom of us all. On one side the Brethren, using high-end surveillance technology for control, supported by officials and politicians. On the other side the Travelers, the gifted ones, who are able to leave our realm and cross over into other realities. Because of their knowledge they are a great threat to the Brethren. The Travelers are supported by the Harlequins, a group only trained to defend the Travelers and to save them from the Brethren. Harlequins are trained since birth by their parents and other Harlequins. They are able to use all kinds of weapons, but their favored arm is a unique Harlequin sword they carry with them all the time.

Maya, a pretty young woman, is trying to live the life of a normal citizen. Her background, on the other hand, is anything but normal. She is the daughter of a famous German Harlequin named Thorn, who had been badly injured in an ambush by the Brethren. On a mission she killed two men of the Yakuza, the Japanese mafia. As a consequence Maya had tried to hide and leave her Harlequin past behind until one day her handicapped father calls for her. When visiting him in Prague, she finds him slaughtered by his enemies.

Fulfilling her father’s last wish, Maya takes a flight to the States supporting Shepherd, the last American Harlequin. She is determined to help him defend the last two Travelers alive. However, Shepherd has become a member of the Brethren. Working for the other side now, he tries to kill Maya. With the help of a young woman named Vikki she is lucky to get away. Vikki is a member of the I. T. Jones Church, a church of followers of the Traveler Isaac T. Jones, who was killed by the Brethren in 1889 with Lion of the temple (known as Zachary Goldman) a harlequin. Together they are able to find an ally, Hollis, a Capoeira trainer from Los Angeles and a former member of the Isaac T. Jones Community. The three of them are able to find the last living Travelers, Michael and Gabriel Corrigan. Before they are able to give them protection, Michael is captured by the Brethren. Instead of killing him immediately they try to convince him to help them. The Brethren recently started a new Program. They were in contact with a technologically advanced civilization dwelling in another realm. Aiming to travel through the realities, they need the help of a guide, someone who is able to travel without technology – like a Traveler.

For achieving help, they offer the Brethren high technology, weapons and plans for a quantum computer. The Brethren want to use a real Traveler that can find this other civilization and guide it to the Earth. By offering Michael power, money and everything else he wants, the Brethren convince him to work for them. With a new drug called 3B3, Michael is able to leave his realm without any usual way a Pathfinder would offer. A Pathfinder is a person that helps a Traveler to cross over. He or she is a teacher, but never a Traveler himself.

While Michael gains his first experiences with other realms, Maya tries to find a Pathfinder for Gabriel. She herself knows little of other realms and the process of crossing over. At all time they must be careful and live “off the grid”, because the Brethren use all their power to get hold of them.

Hollis stays in Los Angeles to place a false track. Within little time the Brethren show up at his house and try to kill him with a new weapon called “Splicer,” some kind of genetically engineered animal designed to search and destroy. But, Hollis defeats them.

In the meantime Maya and Gabriel find a Pathfinder in the desert in Arizona: an old woman researching king snakes in an abandoned missile silo. While teaching Gabriel how to cross over, she tells him everything she knows about the Travelers and the six realms. There is the first realm of a town like hell, the second realm of a city full of “hungry ghosts”, the third is inhabited by animals ignorant of all others, the fourth realm is our own reality, where the sin is desire, the fifth realm is the reality of the “half gods”, where the sin is jealousy, and the sixth realm of the “gods” themselves, where the sin is pride. The “gods” and “half-gods” of the fifth and sixth realm are not meant like God as the creator of all life, but like the Tibetans describe them: human beings from parallel worlds.

The realms are separated each by four barriers: one barrier of fire, one of water, one of earth and one of air. A Traveler that is capable of passing these four barriers is then able to enter one of the five other realms. If his body on earth dies, his soul, called the light, is condemned to stay forever in the realm it visits at that time. Crossing over into other realities, a Traveler can only carry special objects, called talismans, with him. Such an object is the sword Gabriel’s father gave him. Equipped with this sword, he meets his brother in the realm of the hungry ghosts.

His brother tries to convince him to join the Brethren. Gabriel resists the temptation, but he tells his brother where he left his body. As a consequence Gabriel is imprisoned by the Brethren within hours and brought to the research centre where Michael is kept.

Maya realizes that an immediate counterstrike is necessary. After an exciting battle in the Brethren’s research facility, they free Gabriel but have to realize that they can not convince Michael to leave the Brethren. Maya and her allies are able to find refuge in a house on a beach in Cape Cod – but only to recover. At this point the first book of the fourth realm has a cliffhanger ending.

Literary significance and reception

David Pitt in his review for Booklist said that John Twelve Hawks is “a gifted storyteller, makes this surreal and vaguely supernatural good-versus-evil story entirely believable.” About the novel he says that the “pace is fast, the characters intriguing and memorable, the evil dark and palpable, and the genre-bending between fantasy and thriller seamless”.[3] The New York Times reviewer Janet Maslin began her review with the statement: “It takes outlandish nerve and whopping messianic double talk to inaugurate a new science fiction project on the scale of The Traveler.” She then concluded “Amazingly, this novel sustains a new voice even when its roots show. And the list of obvious influences is long indeed. There are traces of Star Wars, The Matrix, Kill Bill and Minority Report. There are echoes of Stephen King, Michael Crichton, Joseph Campbell, Jeremy Bentham, various samurai stories and (could it not have been thus?) The Da Vinci Code.”[4]

Published: June 27, 2005

Film adaptation

On March 23, 2012, Deadline Hollywood announced that Warner Bros. acquired film rights to the Fourth Realm Trilogy.[5]

The Traveler Music Album

In October 2014, British DJ and Bedrock Records producer, John Digweed and his partner Nick Muir released an album inspired by The Traveler.

John Twelve Hawks made the initial contact, sending Digweed his novel with a note saying it had been written while listening to Digweed’s Transitions radio show. After reading The Traveler Digweed immediately emailed Hawks to say how much he’d loved the novel. Eighteen months later Digweed found an email from Hawks in his junk folder and they finally arranged to collaborate. Initial attempts to record Hawks’ narration via Skype failed, forcing Hawks to make a rare personal appearance in the studio. Digweed and Muir met with John Twelve Hawks in the UK and recorded his voice as he read passages from the novel. JTH’s voice was changed electronically and weaved into the 13 tracks.[6]

Reaction to the album was positive. Music critic, Rich Curtis called it “a very engaging and superbly crafted meeting of artistic minds.” [7]

References

  1. Jump up^ “New York Times Bestseller Hardback Fiction List”. July 17, 2005.
  2. Jump up^ “Warner Bros. Acquires ‘Fourth Realm’ Trilogy”. March 23, 2012.
  3. Jump up^ “The Traveler (Book)”. Booklist 101 (17): 1540. 2005-05-01. ISSN 0006-7385.
  4. Jump up^ “It Takes a Superhuman Effort to Escape Human Control”. June 6, 2005.
  5. Jump up^ “Warner Bros. Acquires ‘Fourth Realm’ Trilogy”. March 23, 2012.
  6. Jump up^ “DJ John Digweed Collaborates With Paranoid Author John Twelve Hawks”. October 1, 2014.
  7. Jump up^ “WORLD EXCLUSIVE ALBUM REVIEW: JOHN DIGWEED, NICK MUIR, JOHN TWELVE HAWKS – THE TRAVELER (BEDROCK)”. September 30, 2014.

External links

John Twelve Hawks

John Twelve Hawks (pseudonym) is the author of the 2005 dystopian novel The Traveler and its sequels, The Dark River and The Golden City, collectively comprising the Fourth Realm Trilogy. The trilogy has been translated into 25 languages and has sold more than 1.5 million books.[1] The trilogy was followed five years later by a fourth book, Spark (novel by John Twelve Hawks), and a non-fiction eBook, Against Authority. “John Twelve Hawks” is a pseudonym and his real identity is unknown.[2]

Reason and origin of his name

In “Against Authority” Twelve Hawks describes writing The Traveler. His decision to use a different name was triggered by a combination of personal and political reasons:

“For the first drafts of the book, I kept my birth name off the title page. The old me wasn’t writing this book. Something was different. Something had changed. I had always admired George Orwell, and had read his collected essays and letters countless times. When Eric Blair became Orwell, he was set free, liberated from his Eton education and colonial policeman past. And there was another factor about the title page that troubled me. I was telling my readers that this new system of information technology was going to destroy our privacy, and that they should resist this change. It seemed hypocritical to go on a book tour or appear on a talk show blabbing about my life when our private lives were under attack.” [3]

During an online conversation he had with his fans on the We Speak for Freedom website he explained the origin of his name:[4]

The real story is this …I was walking through a forest and encountered a hawk nesting area. Twelve hawks circled around my head for about ten minutes …so close that the tip of their wings brushed the side of my head. That was why I picked the name. REAL hawks. Not symbolic ones.

Information

In the sources listed and in his interviews, he has stated that he was born in the United States. He is a Buddhist who had meditated for most of his life. In the Spiegelinterview he states he is not a Native American.

In the Spiegel interview he talks about visiting East Germany before the fall of the Berlin Wall. In the USA Today article, his response to a question about religion began with, “When I was in my twenties…” and when an editor asked him whether the “realm of hell” could be compared to current conditions in Iraq, Hawks replied “it’s more like Beirut in the ’70s“. In the Spiegel interview and in the Daily Telegraph article, Hawks states that he drives a 15-year-old car and that he does not own a television.[5]

The SFF World interview indicates that Twelve Hawks once lived in a commune and learned about literature by stealing books from a restricted university library and then returning the books the next day. In the same interview, he states he wrote The Traveler after passing through some sort of personal crisis. In the interview in SFF World Twelve Hawks claims that he has “no plans to go public” regarding his identity.[6]

According to Twelve Hawks’ agent, “He lives in New York, Los Angeles and London”, and The Traveler sets its story in all three of these locations.[7] In a 2008 interview on Joseph Mallozzi‘s weblog, he answered a series of questions about this life:[8]

QUESTION: Is there a reason for the pen name? One you’d be willing to share, I suppose. As in, is it because you’re actually a secret CIA agent and/or Russian spy, or merely because you don’t ever want your mother knowing what you’ve written?

JTH: My mother and the rest of my family don’t know that I have written the novels. Those people I know who aren’t close friends see me as a failure by the American standards of success. Being a “failure” in such a way has been a continual lesson. It’s helped me realize that we make quick judgments of others based on little real information. We assume so much – but don’t know the secrets held within the heart.

Against Authority

On August 20, 2014, John Twelve Hawks released a free non-fiction book called Against Authority: Freedom and the Rise of the Surveillance States.[9] The book is dedicated to the novelist, Thomas Pynchon. An excerpt from Against Authority was published on Salon.[10]

Against Authority begins with a personal description of the neurological experiments performed on Hawks when he was a child and states that all of us have the ability to reject the “right” of those in power to control our lives. JTH describes how the reaction of governments to the September 11 attacks led to the Patriot Act in the United States and the proliferation of Closed-circuit television cameras in London. He references his 2006 essay How We Live Now [11] that was his first published reaction to these systematic attacks on privacy.

The book explains how the Total Information Awareness program developed by John Poindexter at the U.S. Defense Advanced Research Projects Agency (DARPA) led to the expansion of the National Security Agency and the revelations of Edward Snowden. Hawks criticizes the assumption of “mass surveillance” strategies against terrorism and shows how “trickle down surveillance” has spread to small towns and developing countries.

JTH believes that surveillance technology has given those in power a crucial tool for social control. He describes how the culture of surveillance is used to track citizens for commercial reasons and gives examples of how people are now routinely watched at work. In the conclusion, He advocates a strategy of “parallel lives” that allows people to exist in the digital world while protecting their private actions and thoughts.

Spark

Spark was published in October 2014 in the United States and Great Britain.[12]

The book is narrated by Jacob Underwood, a man who suffers from Cotard delusion, a real-life neurological condition in which the afflicted person thinks that he or she is dead. Underwood is hired by a New York investment bank to work as an assassin, eliminating threats to the bank’s clients. “Underwood’s strength as a hired killer is the emotionless, robotic nature that allows him to operate with logical, ruthless precision.” [13] But, when the bank asks him to track down Emily Buchanan, a minor employee who has absconded with financial secrets, Underwood gradually becomes more human and feels moments of empathy. Hawks describes adystopia where people are beginning to be replaced by robots. Underwood’s journey is an exploration into what human values will survive in a world of machines.

Reviews of Spark were generally positive. The Publishers Weekly review mentioned JTH’s writing style: “Twelve Hawks’s prose, cold and clinical at times, yet punctuated with moments of great sensitivity, matches the tone and mood of his setting perfectly.” In a starred review in Booklist, reviewer David Pitt wrote: “It’s been several years since the Fourth Realm trilogy ended, and some readers might have wondered if the author had only one story to tell. But guess what? As good as the Fourth Realm books were, this one may be even more appealing: less fantastic, more grounded in a contemporary real world, with a narrator who is deeply scarred and endlessly fascinating.” [14]

In October, 2013 Deadline Hollywood reported that the film rights to Spark were sold to Dreamworks.[15]

Bibliography

  1. The Traveler (2005)
  2. The Dark River (2007)
  3. The Golden City (2009)
  4. Spark (2014)
  5. Against Authority (2014)

References

  1. Jump up^ “Warner Bros Acquires ‘Fourth Realm’ Trilogy”. March 23, 2012.
  2. Jump up^ “Those remaining literary recluses in full”. The Guardian (London). 1 February 2010.
  3. Jump up^ John Twelve Hawks (2014-08-20). “Against Authority”. johntwelvehawks.com. Retrieved 2014-08-20.
  4. Jump up^ John Twelve Hawks (2009-05-24). “Live chat with John Twelve Hawks”. wespeakforfreedom.com. Retrieved 2009-05-25.
  5. Jump up^ David Thomas (2007-04-01). “Like Dan Brown, but better”. The Daily Telegraph (London). Retrieved 2007-04-01.
  6. Jump up^ Rob Bedford (2005-12-04). “Interview With John Twelve Hawks”. SFFWORLD.COM. Retrieved 2006-08-12.
  7. Jump up^ Carol Memmot (2005-06-27). “Cryptic ‘Traveler’ has book world buzzing”. USA Today. Retrieved 2006-08-12.
  8. Jump up^ Joseph Mallozzi (2008-10-30). “Interview With John Twelve Hawks”. josephmallozzi.wordpress.com. Retrieved 2008-10-30.
  9. Jump up^ John Twelve Hawks (2014-08-20). “Against Authority”. johntwelvehawks.com. Retrieved 2014-08-20.
  10. Jump up^ John Twelve Hawks (2014-09-14). “New Surveillance States Have Placed Us In An Invisible prison”. salon.com. Retrieved 2014-09-14.
  11. Jump up^ John Twelve Hawks (2006-02-01). “How We Live Now”. California State University, Northridge University.
  12. Jump up^ “‘Spark,’ the Latest Dystopian Novel From John Twelve Hawks”. http://www.nytimes.com. 2014-10-06. Retrieved 2014-10-06.
  13. Jump up^ “Spark”. http://www.publishersweekly.com. 2014-08-04. Retrieved 2014-08-04.
  14. Jump up^ David Pitt (2014-09-01). “Review of SPARK”. http://www.booklistonline.com. Retrieved 2014-09-01.
  15. Jump up^ Mike Fleming Jr. (2013-10-14). “DreamWorks Buys John Twelve Hawks Sci-Fi Thriller ‘Spark’”. http://www.deadline.com/hollywood/. Retrieved 2013-10-14.

External links

http://en.wikipedia.org/wiki/John_Twelve_Hawks

 

Who is John Twelve Hawks?

Back in August I wrote a piece about John Twelve Hawks’s so-called thriller The Traveller (aka The Traveler in the US). I thought the book was a dud, but noted, as one would have to, that it was being given a tremendous amount of hype by the publishers, in both the UK and the USA.

I think it was always fairly obvious that John Twelve Hawks was a pseudonym, and I made a brief reference to the kind of person, or persons, who might be involved. But I can’t say that I gave very much serious thought to who the author might really be, largely because I felt that the book was so feeble. And, of course, I was irritated by the fact that, yet again, a publisher was putting enormous weight behind something that really didn’t deserve it.

However, it turns out that that there are in this world a number of people who are giving some fairly detailed consideration to the identity of The Traveller‘s author. And one of them, Janet Rice, has come up with the suggestion that the real author is Michael Cunningham. Yes, that very same Michael Cunningham who won the Pulitzer Prize with The Hours and has recently published Specimen Days, another book which I felt wasn’t worth anyone’s trouble.

Janet Rice first posted her piece of deduction as a comment on my review of The Traveller, and I certainly recommend that you take a look at her detailed reasoning.

I have to say that this linking of Cunningham with the Twelve Hawks identity question is the smartest piece of lateral thinking that I have come across in a long time. Janet has clearly read both The Traveller andSpecimen Days with far greater care than I have, and has come up with several features which the books have in common.

Having written her piece as a comment on my blog, Janet has posted her further thoughts on this issue on the discussion page of Night Shade Books, where you will find several other speculations about the mystery man’s identity.

Janet, please note, is not insisting that she is right; she is simply putting forward the Twelve Hawks = Cunningham idea as a hypothesis, and inviting others to test it out. For my own part, I have to say that I find the idea tolerably convincing.

First of all, both books are, in my opinion, of much the same standard: i.e. just about publishable but no great shakes. Secondly, the existence of a previously ‘successful’ author behind the pseudonym would certainly explain why the publisher was willing to invest so heavily in the book; although, having said that, one also has to say that publishers seem quite ready to invest substantial sums in unknown quantities on every other day of the week.

Perhaps somewhere out there is a computer whizzkid who could do some textual analysis and see how the prose style of Cunningham and Twelve Hawks actually compares. Always bearing in mind, of course, that such analysis was not wonderfully successful in identifying the real author of the Belle de Jour blog/book. And also bearing in mind that an author can deliberately adopt different styles and tones of voice for different books.

Janet also adds some speculation as to why Cunningham — if he is the one — should bother to write a commercial thriller; her own hope is that he was trying to find a way to get his ideas through to a wider audience than he could achieve via his literary work.

Well — ahem — forgive my cynicism, but one should never underestimate the power of the dollar. In publishing, the money is never as much as the hype suggests, whether you’re Cunningham, Twelve Hawks, or anyone else. And in my view it might well be the case that some erstwhile literary chap has got tired of scuffling for a living and has tried to cash in.

I have absolutely no objection, in principle, to a writer going flat out for the money, but perhaps whoever is responsible for The Traveller now understands that writing a successful commercial novel is rather harder to do in practice than the literary elite of this world think it is.

Read Full Post | Make a Comment ( None so far )

Attorney General Nominee Loretta Lynch Says Illegal Aliens Have A Right To Work in America — No They Do Not — They Should Be Deported — It Is The Law — Vote Against Nominee — Who Broke The Immigration System By Not Enforcing The Law — Presidents Bush and Obama — Videos

Posted on January 28, 2015. Filed under: American History, Blogroll, Business, College, Communications, Computers, Constitution, Corruption, Crime, Drug Cartels, Economics, Education, Employment, Federal Government, Fraud, Freedom, government, government spending, history, Homicide, Inflation, Investments, Islam, Language, Law, liberty, Life, People, Philosophy, Politics, Press, Raves, Strategy, Talk Radio, Taxes, Unemployment, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 405: January 28, 2015

Pronk Pops Show 404: January 27, 2015

Pronk Pops Show 403: January 26, 2015

Pronk Pops Show 402: January 23, 2015

Pronk Pops Show 401: January 22, 2015

Pronk Pops Show 400: January 21, 2015

Pronk Pops Show 399: January 16, 2015

Pronk Pops Show 398: January 15, 2015

Pronk Pops Show 397: January 14, 2015

Pronk Pops Show 396: January 13, 2015

Pronk Pops Show 395: January 12, 2015

Pronk Pops Show 394: January 7, 2015

Pronk Pops Show 393: January 5, 2015

Pronk Pops Show 392: December 19, 2014

Pronk Pops Show 391: December 18, 2014

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Story 1: Attorney General Nominee Loretta Lynch Says Illegal Aliens Have A Right To Work in America — No They Do Not — They Should Be Deported — It Is The Law — Vote Against Nominee — Who Broke The Immigration System By Not Enforcing The Law — Presidents Bush and Obama — Videos

Justice Department Officials Announce Charges Against HSBC

AG Nominee: ‘Right To Work Is Shared By Everyone In This Country Regardless’ Of Immigration Status

Senator Sessions, Chairman of the Senate Immigration Subcommittee, questioned Attorney General Nominee Loretta Lynch at today’s Judiciary hearing to consider her nomination. Sessions asked Lynch about the President’s decision to bypass Congress to order an amnesty, and how this action undermined the rights of disadvantaged American workers.

In addition to suspending enforcement for nearly all of the 12 million individuals unlawfully present in the United States, President Obama issue an executive decree on November 20th, 2014, extending work permits, Social Security, Medicare, tax credits, and government identification to 5 million illegal immigrants and illegal visa violators. This would allow illegal immigrants to take any job in America, regardless of chronic high unemployment for Americans—including a 10.4 percent unemployment rate for African-American workers. Peter Kirsanow, a member of the U.S. Commission on Civil Rights, explained—contra AG Holder’s “breathtaking” contention that amnesty was a civil right—that unlawful amnesty for illegal immigrants violated the rights of U.S. citizens to the full protection of their laws, including those laws passed by Congress to protect their jobs and wages from illegal competition. The President’s executive edict (an edict he said previously only an Emperor would deign to issue) voids Americans’ legal protections in law, supplanting them with a new executive policy that Congress and voters have rejected, a policy which forces unemployed Americans to compete against a large and growing illegal workforce.

Senator Sessions Attorney General Comfirmation Hearing jan 28 2015

Sen. Ted Cruz Second Q&A with Attorney General Nominee Loretta Lynch

Sen. Ted Cruz Third Q&A with Attorney General Nominee Loretta Lynch

AG Nominee Lynch: Obama’s Executive Action Did Not Provide Amnesty for Illegal Immigrants

Loretta Lynch, attorney general nominee, defends migrant policy

Loretta Lynch on Waterboarding: “It Is Torture And Illegal”

Attorney General nominee Loretta Lynch on Obama’s comments about marijuana

Lee questions Loretta Lynch on Prosecutorial Discretion, Operation Chokepoint, and Asset Forfeiture

Graham Questions U.S. Attorney General Nominee Loretta Lynch During Confirmation Hearing

Obama’s New Attorney General Nominee Loretta Lynch Hearing, Day 1, Part 1

AG Nominee Loretta Lynch Testifies Before Senate Judiciary Committee

Sen. Sessions Blasts President Obama’s Executive Immigration Order

The Problems with Loretta Lynch

Obama’s New Placeholder: Loretta Lynch

Brooklyn U.S. Attorney Loretta Lynch Picked As Attorney General Nominee

Megyn Kelly: Loretta Lynch Should Be ‘Most Acceptable’ AG Choice for GOP

Opening Statement from Attorney General Nominee Loretta Lynch (C-SPAN)

Speaker John Boehner on Executive Action on Immigration (C-SPAN)

24+ States File Lawsuit Against Obama’s Executive Amnesty

Up to December 10 a total of 24 States have Filed a Lawsuit Against Obama’s Executive Amnesty. Expect the number of states joining this lawsuit to rise over the next weeks. Originally 18 states, led by Texas, filed a lawsuit with the U.S. District Court in the Southern District of Texas challenging President Obama’s executive action on immigration. The suit claims that the White House overstepped its authority by granting amnesty and work permits for 5 million illegal aliens.
After filing the federal suit, Texas Attorney General and Governor-elect Greg Abbott wrote in a statement that President Obama’s executive amnesty “tramples the U.S. Constitution’s Take Care Clause and federal law.”
Also included in Attorney General Abbott’s statement were the states’ legal challenges to President Obama’s executive action:
• The executive action on immigration conflicts with the President’s constitutional duty to “take Care that the Laws be faithfully executed.” The Take Care Clause limits the scope of presidential power and ensures that the chief executive will uphold and enforce Congress’s laws – not unilaterally rewrite them under the cover of “prosecutorial discretion.”
• The DHS Directive failed to comply with the Administrative Procedure Act’s required notice and comment rulemaking process before providing that legal benefits like federal work permits, Medicare, and Social Security be awarded to individuals who are openly violating immigration laws.
• The executive action to dispense with federal immigration law will exacerbate the humanitarian crisis along the southern border, which will affect increased state investment in law enforcement, health care and education.
The other states involved in the suit include: Alabama, Georgia, Idaho, Indiana, Kansas, Louisiana, Maine, Mississippi, Montana, Nebraska, North Carolina, South Carolina, South Dakota, Utah, West Virginia and Wisconsin.
UPDATE: Arizona has joined the lawsuit. In a statement, Arizona Governor Jan Brewer said, “Obama has exceeded his power as clearly defined in the United States Constitution and federal law and deliberately ignored the will of the American people. Such federal overreach cannot stand.”
Florida has joined the lawsuit. In a statement, Florida Attorney General Pam Bondi said, “The President repeatedly said he would not violate the law, then decided to do just that. The powers granted to the President are expressly laid out in the United States Constitution, yet President Obama has decided to ignore those parameters.”
As of December 10, Arkansas, Michigan, North Dakota, Ohio and Oklahoma have also joined the lawsuit.

The governors’ claim is in a 75-page document filed in a Texas federal district court that states “This lawsuit is not about immigration. It is about the rule of law, presidential power and the structural limits of the U.S. Constitution.” President Obama’s unilateral immigration action, which was presented November 20, would allow for work permits and tentative status to nearly five million illegal immigrants, and would protect many others from deportation. However, those not included would not have the same legal standing as the five million officially granted the amnesty.
The governors have said that their reasoning for suing is due to the cost and responsibility that comes with allowing five million people to stay. Their state taxpayers would be required to pay for the expenses entailed with schooling, health care, and police to handle a sudden influx of illegal border crossings. Texas is joined in the lawsuit by the states Alabama, Georgia, North
Carolina, South Carolina, Mississippi, Louisiana, West Virginia, Maine, Nebraska, Kansas, Idaho, Indiana, Montana, Utah, Wisconsin and South Dakota. Attorney General Greg Abbot of Texas leads the charge of spurring lawsuits against immigration amnesty by President Obama. Mr. Abbot has challenged the Obama administration 31 times and this will be his 34th against the federal government. This current lawsuit is being utilized by Republicans as a temporary method to stall President Obama’s amnesty action through the courts.

Jay Sekulow on Fox News: Resetting Obama’s Executive Power

Graham Questions U.S. Attorney General Nominee Loretta Lynch During Confirmation Hearing

Will Loretta Lynch Be Confirmed As Attorney General?

Federal Judge Rules Obama’s Immigration Orders Unconstitutional • Hannity • 12/17/14

December 17th, 2014 • A Federal Judge has ruled that President Obama’s executive actions on immigration are unconstitutional and a violation of the separation of powers clause. Constitutional Law Professor Jonathan Turley examines the ruling with Fox News host Sean Hannity.

Rep. Gowdy’s Floor Speech on Stopping Executive Action on Immigration

Cornyn: Executive Action on Immigration an Unconstitutional Abuse of Power

Is Obama’s executive action on immigration legal?

Gowdy: ‘President Obama is wrong’ on immigration executive action

Brooks and Marcus on immigration executive action precedent

Obama Immigration Reform 2014 Speech: Announcing Executive Action [FULL] Today on November 20th

Weekly Address: Immigration Accountability Executive Action

Cato Connects: Executive Action on Immigration

[FULL] Stewart Jabs Obama for Going All ‘Emperor’ on Immigration Action

 

26 states suing Obama over immigration executive action as Boehner plans his own legal action

It appears the majority of states believe President Obama’s executive action on immigration to be illegal.

A grand total of 26 states have joined a lawsuit led by Texas against Obama for the executive action he announced last November, according to the Huffington Post.

The suit was filed in December and, as of Monday, has gained the support of more half the states in the country.

“The momentum against the president’s lawlessness continues to build with Tennessee and Nevada joining the effort to protect our states from the economic and public safety implications of illegal amnesty,” explained Texas Attorney General Ken Paxton Monday. “As President Obama himself has said numerous times, he lacks the authority to impose amnesty. His actions represent a blatant case of overreach and clear abuse of power.”

Some states — 12 in addition to Washington, D.C., to be precise — have alternatively expressed their support of Obama’s executive action by filing an amicus brief. A group of 30 mayors have done the same.

However, the president certainly does not have the support of the Republican-led Congress on the issue. In fact, House Speaker John Boehner (R-Ohio) told GOP members of the House Tuesday that the government body will also pursue a lawsuit against Obama over his immigration action, as reports CNN.

“We are finalizing a plan to authorize litigation on this issue — one we believe gives us the best chance of success,” he reportedly said, according to a source.

This comes just months after the House filed a suit against the president over his executive action on Obamacare, which was itself seen by many as the House GOP’s response to Obama’s immigration announcement in November.

The 26 states that have joined in the immigration lawsuit are as follows: Alabama, Arizona, Arkansas, Florida, Georgia, Idaho, Indiana, Kansas, Louisiana, Maine, Michigan, Mississippi, Montana, Nebraska, Nevada, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Texas, Utah, West Virginia and Wisconsin.

http://redalertpolitics.com/2015/01/27/26-states-suing-obama-immigration-executive-action-boehner-plans-legal-action/Lynch defends Obama’s immigration policies

 

 

By ERICA WERNER and ERIC TUCKER

 

WASHINGTON (AP) — Challenged by Republicans, Attorney General nominee Loretta Lynch on Wednesday defended President Barack Obama’s decision to shelter millions of immigrants from deportation though they live in the country illegally.

She said that under the administration’s policy, the Department of Homeland Security is focusing its efforts on the removal of “the most dangerous of the undocumented immigrants among us.”

“It seems to be a reasonable way to marshal limited resources to deal with the problem” of illegal immigration, she said.

Lynch made her remarks in the opening moments of a hearing into her appointment as the nation’s first black female attorney general. It is the first confirmation proceeding since Republicans took control of the Senate this month.

Lynch, a daughter of the segregated South, was accompanied at the hearing by about 30 family members and friends. Among them were her father, who is a retired minister, her husband and several members of her college sorority, Delta Sigma Theta, wearing their trademark red.Settling into the witness chair for what promised to be a long day of questioning, Lynch promised a fresh relationship with law enforcement and with Congress.

“I pledge to all of you and to the American people that I will fulfill my responsibilities with integrity and independence,” she said in remarks prepared for the panel led by Republicans who say Attorney General Eric Holder has been too willing to follow President Barack Obama’s political agenda.

Sen. Charles Grassley, the Iowa Republican and committee chairman, said as much in the opening moments of the hearing. He said the department is “deeply politicized. But that’s what happens when the attorney general of the United States views himself, in his own words, as the president’s ‘wingman.'”

Grassley did not press further after Lynch offered her defense of Obama’s immigration policies, even though he said they amount to rewriting the law rather than enforcing it.

Lynch, the U.S. attorney for the Eastern District of New York, is widely expected to win confirmation easily, if only because Republicans are so eager for Holder’s tenure to end. He has been a lightning rod for conservative criticism, clashing with Republicans and becoming the first sitting attorney general held in contempt of Congress.In testimony delivered before she was questioned, Lynch said that if confirmed she would focus on combatting terrorism and cybercrime and would protect the vulnerable from criminal predators.

And she was at pains to promise what Republican critics demanded in advance.

“I look forward to fostering a new and improved relationship with this committee, the United States Senate and the entire United States Congress, a relationship based on mutual respect and constitutional balance,” she said.

Holder also battled the perception from critics that he aligned himself more with protesters of police violence than with members of law enforcement, a charge he and the Justice Department have strongly denied — but one that resonated in the aftermath of high-profile deaths of black men at the hands of white police officers.

In her prepared testimony, Lynch promised a fresh start in that relationship, too.“Few things have pained me more than the recent reports of tension and division between law enforcement and the communities we serve,” Lynch said, pledging to “work to strengthen the vital relationships” if confirmed.

Lynch already has earned praise from several GOP senators for her impressive credentials and accomplishments. But she faced tough questions from Republicans who now control the Senate.

“She certainly has the credentials. We don’t want a repeat of what we had,” said Sen. Orrin Hatch, R-Utah, a senior committee member. “I look upon her as a pretty good appointment, but I have to listen along with everybody else.”

In answer to a question from Hatch, she said Wednesday, “Every lawyer has to be independent, the attorney general even more so, and I pledge to you that I take that independence seriously.”

The Judiciary Committee includes some of the Senate’s most outspoken Republicans, among them Sen. Ted Cruz of Texas, a potential presidential candidate who promised to quiz Lynch on Obama’s executive actions on immigration that granted reprieves from deportation to millions.

“We need an attorney general who will stop being a partisan attack dog and instead get back to the traditions of upholding the Constitution and the law in a fair and impartial manner,” Cruz said.

Lynch’s hearing comes amid a nationwide spotlight on police tactics in the wake of deaths of black men at the hands of white police officers, as well as the slaying last month of two officers in New York City. It’s an issue Lynch, 55, is deeply familiar with.

Lynch helped prosecute the New York City police officers who severely beat and sexually assaulted Haitian immigrant Abner Louima in 1997. Her office in New York is currently leading a civil rights investigation into the police chokehold death of Eric Garner in Staten Island last summer.

Lynch has been the top prosecutor since 2010 for a district that includes Brooklyn, Queens, Staten Island and Long Island, a role she also held from 1999 to 2001.

Lynch grew up with humble beginnings in North Carolina, the daughter of a school librarian and a Baptist minister. She received undergraduate and law degrees from Harvard University. testimony.

http://apnews.myway.com/article/20150128/us–senate-attorney_general-4e5eabfaf6.html

 

Govt tells agents to ID which immigrants not to deport

By ALICIA A. CALDWELL

WASHINGTON (AP) — The Obama administration has ordered immigration agents to ask immigrants they encounter living in the country illegally whether they might qualify under President Barack Obama’s plans to avoid deporting them, according to internal training materials obtained by The Associated Press.

Agents also have been told to review government files to identify any jailed immigrants they might be able to release under the program.

The directives from the Homeland Security Department mark an unusual change for U.S. immigration enforcement, placing the obligation on the government for identifying immigrants who might qualify for lenient treatment. Previously, it was the responsibility of immigrants or their lawyers to assert that they might qualify under rules that could keep them out of jail and inside the United States.

It’s akin to the Internal Revenue Service calling taxpayers to recommend they should have used certain exemptions or deductions.

The training materials apply to agents for Customs and Border Protection and Immigration and Customs Enforcement. They instruct agents “to immediately begin identifying persons in their custody, as well as newly encountered persons” who may be eligible for protection from deportation.One training document includes scenarios describing encounters between agents and immigrants with guidance about how agents should proceed, with a checklist of questions to determine whether immigrants might qualify under the president’s plans. ICE officials earlier began releasing immigrants who qualified for leniency from federal immigration jails.

Obama in November announced a program to allow roughly 4 million parents of U.S. citizens and legal permanent residents to apply for permission to stay in the country for up to three years and get a work permit. The program mirrors one announced in 2012 that provides protection from deportation for young immigrants brought to the country as children.

A spokesman for Customs and Border Protection, Carlos Diaz, said immigrants caught crossing the border illegally remain a top priority for the agency. The training documents for border agents, he said, “provide clear guidance on immigration enforcement operations so that both time and resources are allocated appropriately.”

Crystal Williams, executive director for the American Immigration Lawyers Association in Washington, said the training will help filter people the government said should not be a priority anyway. She said the training marked the first she has heard of officers being directed to screen immigrants for potential leniency before they were arrested.

“Just because it’s a change doesn’t mean it’s anything particularly radical,” Williams said.Rep. Luis Gutierrez, an Illinois Democrat and vocal supporter of Obama’s immigration plans, said having CBP officers screen immigrants out of the deportation line lets the government “move criminals and recent arrivals to the front of the deportation line. The emphasis now is on who should be deported first, not just who can be deported.”

A former deputy assistant attorney general in the Justice Department, John Malcolm, said the new instructions limit immigration agents.

“Agents are being discouraged away from anything other than a cursory view” of an immigrant’s status and qualification for leniency, said Malcolm, who works as a senior legal fellow at the conservative Heritage Foundation think tank in Washington.

Under Obama’s plans, the government is focused on deporting immigrants with serious criminal records or who otherwise pose a threat to national security or public safety. For the most part, under the new policy, immigrants whose only offense is being in the country without permission aren’t supposed to be a priority for immigration officers.

While the administration has estimated that as many as 4 million people will be eligible for protection from deportation, the Congressional Budget Office estimated about 2 million to 2.5 million immigrants are expected to be approved for the program by 2017. As many as 1.7 million young immigrants were estimated to be eligible for the Deferred Action for Childhood Arrivals program, but since its 2012 creation only about 610,000 people have successfully signed up.

http://apnews.myway.com/article/20150128/us–immigration_overload-a135fed8ce.htm
l

 

Three things that are illegal about Obama’s immigration plan

It’s official. By executive fiat, President Obama will grant amnesty to up to 5 million immigrants living illegally in the United States.

How did we get here? Didn’t the president say, even last year, that he couldn’t, and wouldn’t take executive action on immigration?

If Obama ever finds himself in a court of law, he would surely be advised to invoke the Fifth Amendment. He is prone to contradiction and tends to be a good witness against himself.

President Obama’s favorite justification for his executive action is that “Congress failed to act.” No, Mr. President, Congress did not fail to act, it chose not to act in granting amnesty.

Consider his self-incriminating statements on immigration and executive powers. A year ago, when asked if he had the authority to end deportations of illegal aliens he said, “Actually, I don’t.” Three years earlier, when pressed as to why he could not act on his own on immigration he said, “The notion that somehow I can just change the laws unilaterally is just not true.”

Well, now the president says it is true — he can alter the laws unilaterally. Why the metamorphosis? What changed? The law and the Constitution are still the same. Which leaves Obama. When it comes to the truth, inconvenient or otherwise, he is a chameleon like no other politician. He never hesitates to contradict himself, conjuring a new breadth of hypocrisy.

President Obama’s favorite justification for his executive action is that “Congress failed to act.” No, Mr. President, Congress did not fail to act, it chose not to act in granting amnesty.

There is a difference. A determination not to act is, by itself, a deliberate act. This is how the framers constructed our system of government. Congress considers and debates a great many bills. Not all of them pass. This is not “failure” in the conventional sense, but decision by declination. It constitutes a prudent and calculated process.

But the president uses this contrived “failure” as a pretext to arrogate the authority of another branch of government. He wields his pen to legislate by executive decree. He well knows he is exceeding his power. In 2011, he said, “I know some people want me to bypass Congress and change the (immigration) on my own. But that‘s not how our system works. That’s not how our democracy functions. That’s not how our Constitution is written.” He was right. It was a rare moment of clarity for a man who fancies himself a constitutional scholar.

Now, however, by granting legal status to roughly half the nation’s population of illegal immigrants, Obama is twisting the law, ignoring the Constitution, and forsaking his primary responsibility as chief executive. For years, he argued publicly it would be unconstitutional for him to take such action because he said, “I’m president, I’m not king.” Apparently, he now favors a crown on his noggin. In truth, he is king of self-confutation, negating himself with his own words.

Recently, when asked why he disagreed with himself, the president insisted, “Well, actually, my position hasn’t changed”. After the laughter died down, the Washington Post Fact Checker gave Obama an upside-down Pinocchio for his tortured denial of a blatant flip-flop.

The president’s executive action to legalize illegals by nullifying existing law, constitutes a stunning abuse of office: usurping the power of Congress, while abdicating his duty to uphold and enforce the laws. Here are three ways this is happening:

1. Distorting Prosecutorial Discretion 

President Obama claims he is entitled to overhaul immigration laws in the name of  “prosecutorial discretion.” It is one of those wonderfully fungible phrases in the law. Elastic because it is vague and ambiguous. Useful because it can be easily abused. Mr. Obama has appropriated this doctrine to argue he has near boundless discretion to amend, revise, waive or suspend the execution of immigration laws. As chief executive, he is empowering himself to decide what laws may be enforced or ignored and what persons may come or go across our southern border irrespective of what the law actually states.

In past decisions, the U.S. Supreme Court has cautioned the executive branch that its prosecutorial discretion, while broad, is not “unfettered.” It is subject to restrictions. The doctrine may not be used to adopt a sweeping policy of non-enforcement of the law. It applies only to decisions not to prosecute or expelspecific individuals or small groups of people, typically for exigent reasons like war, civil unrest or political persecution.

By contrast, President Obama is bestowing a wholesale, blanket amnesty for an entire class of nearly 5 million people. He is doing so not for the reasons allowed by law, but for purposes that appear to be purely political. This is a flagrant abuse of prosecutorial discretion. His expansive action exceeds his authority in ways that none of his predecessors ever envisioned. And it is a radical departure from any of the executive actions issued by previous presidents.

It is true that President Ronald Reagan utilized executive action in 1987 to grant a limited deportation reprieve to certain spouses and young children of immigrants. But his action was a logical and direct extension of, not a departure from, an existing amnesty law Congress had already passed. His exemption and a subsequent extension by his successor, President George H. W. Bush, were later incorporated into a new law passed by Congress. The point is instructive. The actions by Reagan and Bush are not a supporting precedent for Mr. Obama, but an important limiting principle of presidential authority.

However, President Obama has commandeered this elastic doctrine of prosecutorial discretion and stretched or manipulated it beyond all recognition and reason. It has become his political Gumby toy with which he exerts his will whenever he fails to get his way with Congress. He contorts the word “discretion” to adopt a capacious policy — his own policy — to ban full enforcement of a duly enacted immigration statute. He treats the doctrine as a magical incantation shielding his arbitrariness.

2. Usurping Legislative Authority

Our Constitution clearly delineates a separation of powers. Congress is vested with writing laws and the President is charged with executing those laws. This is especially true when it comes to immigration.

At the end of the 19th century, the Supreme Court declared that Congress had “plenary power” (meaning full and complete) to regulate immigration. Derived from Article 1, Section 8 of the Constitution, the doctrine is based on the concept that immigration is a question of national sovereignty, relating to a nation’s right to define its own borders and restrict entrance therein. As the high court observed, “Over no conceivable subject is the legislative power of Congress more complete.”

Yet President Obama has decided to usurp this power by unilateral directive, unconstrained by established checks and balances. In so doing, he is granting himself extra-constitutional authority and upsetting the carefully balanced separation of powers. He is also subverting the nucleus of our constitutional design: the rule of law.

3. Breaching His Sworn Duty

President Obama’s decision that existing laws shall not be enforced against some 5 million illegal immigrants violates his sworn constitutional duty. Article II, Section 3 requires that the President “shall take Care that the Laws be faithfully executed.” Nowhere is it written that the chief executive is granted the latitude to pick and choose which laws he wants to enforce. He cannot ignore or nullify laws he does not like because the constitution gives him no power not to execute laws. To infer such latitude would invite an authoritarian rule anathema to our founding fathers’ vision. President Obama admitted as much when he said, “The fact of the matter is, there are laws on the books that I have to enforce.” He was specifically talking about immigration laws.

In 1996, Congress passed a law which requires federal immigration agents to deport illegal immigrants, with few exceptions. The statutory language is mandatory. Thus, whatever prosecutorial discretion which may have existed previously, was specifically eliminated by that legislative act. Yet, the President is now, in effect, ordering those agents to break the law. He cannot, on his own, engage in a de facto repeal of this law by executive action. To do so would be, quite simply, lawlessness and a dereliction of his duty.

If President Obama can refuse to enforce a valid federal law affecting millions of people, are there any limits to his powers? After all, he has frequently threatened, “Where Congress won’t act, I will.” What is to stop him from rewriting other laws with which he disagrees? Or to act where Congress has declined or refused to act? Can he abolish certain tax laws because Congress chooses to keep them? Can he banish all sources of energy except renewables to advance his agenda on climate change? If so, why even have a legislative branch of government? What’s the point of a Constitution which enumerates and circumscribes powers and duties?

Men like Madison, Jefferson and Adams were keenly aware of the tyranny and corruption of authority concentrated in too few hands. They knew the thirst for power posed an existential danger to those who cherish freedom. Their genius was in crafting a sustaining document that would end the arrogance of one man rule and protect the inherent rights of all men. They knew that absolute power corrupts.

And they feared future presidents like Mr. Obama.

In the history of our republic, no president has dared turn his high office into an instrument of unrestrained power. They held too much respect for their fellow citizens than to abuse or misuse the principles of our democracy. Even Lincoln’s actions to preserve the nation during the Civil War were grounded in the Constitution and the rule of law.

But, like the title of his autobiography, Mr. Obama’s measure of himself seems defined by the word “audacity.” It is no more evident than now.

http://www.foxnews.com/opinion/2014/11/20/three-things-that-are-illegal-about-obama-immigration-plan/

FACT SHEET:  Immigration Accountability Executive Action

The President’s Immigration Accountability Executive Actions will help secure the border, hold nearly 5 million undocumented immigrants accountable, and ensure that everyone plays by the same rules.  Acting within his legal authority, the President is taking an important step to fix our broken immigration system.

These executive actions crack down on illegal immigration at the border, prioritize deporting felons not families, and require certain undocumented immigrants to pass a criminal background check and pay their fair share of taxes as they register to temporarily stay in the U.S. without fear of deportation.

These are common sense steps, but only Congress can finish the job. As the President acts, he’ll continue to work with Congress on a comprehensive, bipartisan bill—like the one passed by the Senate more than a year ago—that can replace these actions and fix the whole system.

Three critical elements of the President’s executive actions are:

  • Cracking Down on Illegal Immigration at the Border:  The President’s actions increase the chances that anyone attempting to cross the border illegally will be caught and sent back. Continuing the surge of resources that effectively reduced the number of unaccompanied children crossing the border illegally this summer, the President’s actions will also centralize border security command-and-control to continue to crack down on illegal immigration.
  • Deporting Felons, Not Families: The President’s actions focus on the deportation of people who threaten national security and public safety. He has directed immigration enforcement to place anyone suspected of terrorism, violent criminals, gang members, and recent border crossers at the top of the deportation priority list.
  • Accountability – Criminal Background Checks and Taxes: The President is also acting to hold accountable those undocumented immigrants who have lived in the US for more than five years and are parents of U.S. citizens or Lawful Permanent Residents.  By registering and passing criminal and national security background checks, millions of undocumented immigrants will start paying their fair share of taxes and temporarily stay in the U.S. without fear of deportation for three years at a time.

The President’s actions will also streamline legal immigration to boost our economy and will promote naturalization for those who qualify.

For more than a half century, every president—Democratic or Republican—has used his legal authority to act on immigration.  President Obama is now taking another commonsense step. As the Administration implements these executive actions, Congress should finish the job by passing a bill like the bipartisan Senate bill that: continues to strengthen border security by adding 20,000 more Border Patrol agents; cracks down on companies who hire undocumented workers; creates an earned path to citizenship for undocumented immigrants who pay a fine and taxes, pass a background check, learn English and go to  the back of the line; and boosts our economy and keeps families together by cutting red tape to simplify our legal immigration process.

CRACKING DOWN ON ILLEGAL IMMIGRATION AT THE BORDER

Under the Obama Administration, the resources that the Department of Homeland Security (DHS) dedicates to security at the Southwest border are at an all-time high.  Today, there are 3,000 additional Border Patrol agents along the Southwest Border and our border fencing, unmanned aircraft surveillance systems, and ground surveillance systems have more than doubled since 2008. Taken as a whole, the additional boots on the ground, technology, and resources provided in the last six years represent the most serious and sustained effort to secure our border in our Nation’s history, cutting illegal border crossings  by more than half.

And this effort is producing results. From 1990 to 2007, the population of undocumented individuals in the United States grew from 3.5 million to 11 million people.  Since then, the size of the undocumented population has stopped growing for the first time in decades. Border apprehensions—a key indicator of border security— are at their lowest level since the 1970s.  This past summer, the President and the entire Administration responded to the influx of unaccompanied children with an aggressive, coordinated Federal response focused on heightened deterrence, enhanced enforcement, stronger foreign cooperation, and greater capacity for Federal agencies to ensure that our border remains secure.  As a result, the number of unaccompanied children attempting to cross the Southwest border has declined precipitously, and the Administration continues to focus its resources to prevent a similar situation from developing in the future.

To build on these efforts and to ensure that our limited enforcement resources are used effectively, the President has announced the following actions:

  • Shifting resources to the border and recent border crossers. Over the summer, DHS sent hundreds of Border Patrol agents and U.S. Immigration and Customs Enforcement (ICE) personnel to the Southwest border, and the Department of Justice (DOJ) reordered dockets in immigration courts to prioritize removal cases of recent border crossers.  This continued focus will help keep our borders safe and secure. In addition, Secretary Johnson is announcing a new Southern Border and Approaches Campaign Plan which will strengthen the efforts of the agencies who work to keep our border secure.  And by establishing clearer priorities for interior enforcement, DHS is increasing the likelihood that people attempting to cross the border illegally will be apprehended and sent back.
  • Streamlining the immigration court process. DOJ is announcing a package of immigration court reforms that will address the backlog of pending cases by working with DHS to more quickly adjudicate cases of individuals who meet new DHS-wide enforcement priorities and close cases of individuals who are low priorities. DOJ will also pursue regulations that adopt best practices for court systems to use limited court hearing time as efficiently as possible.
  • Protecting victims of crime and human trafficking as well as workers. The Department of Labor (DOL) is expanding and strengthening immigration options for victims of crimes (U visas) and trafficking (T visas) who cooperate in government investigations.  An interagency working group will also explore ways to ensure that workers can avail themselves of their labor and employment rights without fear of retaliation.

DEPORTING FELONS, NOT FAMILIES

By setting priorities and focusing its enforcement resources, the Obama Administration has already increased the removal of criminals by more than 80%.  These actions build on that strong record by:

  • Focusing on the removal of national security, border security, and public safety threats.  To better focus on the priorities that matter, Secretary Johnson is issuing a new DHS-wide memorandum that makes clear that the government’s enforcement activity should be focused on national security threats, serious criminals, and recent border crossers.  DHS will direct all of its enforcement resources at pursuing these highest priorities for removal.
  • Implementing a new Priority Enforcement Program. Effectively identifying and removing criminals in state and local jails is a critical goal but it must be done in a way that sustains the community’s trust. To address concerns from Governors, Mayors, law enforcement and community leaders which have undermined cooperation with DHS, Secretary Johnson is replacing the existing Secure Communities program with a new Priority Enforcement Program (PEP) to remove those convicted of criminal offenses.  DHS will continue to rely on biometric data to verify individuals who are enforcement priorities, and they will also work with DOJ’s Bureau of Prisons to identify and remove federal criminals serving time as soon as possible.

ACCOUNTABILITY – CRIMINAL BACKGROUND CHECKS AND TAXES

Every Democratic and Republican president since Dwight Eisenhower has taken executive action on immigration.  Consistent with this long history, DHS will expand the existing Deferred Action for Childhood Arrivals (DACA) program to include more immigrants who came to the U.S. as children.  DHS will also create a new deferred action program for people who are parents of U.S. Citizens or Lawful Permanent Residents (LPRs) and have lived in the United States for five years or longer if they register, pass a background check and pay taxes.

The President is taking the following actions to hold accountable certain undocumented immigrants:

  • Creating a mechanism that requires certain undocumented immigrants to pass a background check to make sure that they start paying their fair share in taxes. In order to promote public safety, DHS is establishing a new deferred action program for parents of U.S. Citizens or LPRs who are not enforcement priorities and have been in the country for more than 5 years.  Individuals will have the opportunity to request temporary relief from deportation and work authorization for three years at a time if they come forward and register, submit biometric data, pass background checks, pay fees, and show that their child was born before the date of this announcement. By providing individuals with an opportunity to come out of the shadows and work legally, we will also help crack down on companies who hired undocumented workers, which undermines the wages of all workers, and ensure that individuals are playing by the rules and paying their fair share of taxes.
  • Expanding DACA to cover additional DREAMers. Under the initial DACA program, young people who had been in the U.S. for at least five years, came as children, and met specific education and public safety criteria were eligible for temporary relief from deportation so long as they were born after 1981 and entered the country before June 15, 2007.  DHS is expanding DACA so that individuals who were brought to this country as children can apply if they entered before January 1, 2010, regardless of how old they are today.  Going forward, DACA relief will also be granted for three years.

The President’s actions will also streamline legal immigration to boost our economy and promote naturalization by:

  • Providing portable work authorization for high-skilled workers awaiting LPR status and their spouses.  Under the current system, employees with approved LPR applications often wait many years for their visa to become available.  DHS will make regulatory changes to allow these workers to move or change jobs more easily.  DHS is finalizing new rules to give certain H-1B spouses employment authorization as long as the H-1B spouse has an approved LPR application.
  • Enhancing options for foreign entrepreneurs.  DHS will expand immigration options for foreign entrepreneurs who meet certain criteria for creating jobs, attracting investment, and generating revenue in the U.S., to ensure that our system encourages them to grow our economy.  The criteria will include income thresholds so that these individuals are not eligible for certain public benefits like welfare or tax credits under the Affordable Care Act.
  • Strengthening and extending on-the-job training for STEM graduates of U.S universities. In order to strengthen educational experiences of foreign students studying science, technology, engineering, and mathematics (STEM) at U.S. universities, DHS will propose changes to expand and extend the use of the existing Optional Practical Training (OPT) program and require stronger ties between OPT students and their colleges and universities following graduation.
  • Streamlining the process for foreign workers and their employers, while protecting American workers. DHS will clarify its guidance on temporary L-1 visas for foreign workers who transfer from a company’s foreign office to its U.S. office. DOL will take regulatory action to modernize the labor market test that is required of employers that sponsor foreign workers for immigrant visas while ensuring that American workers are protected.
  • Reducing family separation for those waiting to obtain LPR status. Due to barriers in our system, U.S. citizens and LPRs are often separated for years from their immediate relatives, while they wait to obtain their LPR status. To reduce the time these individuals are separated, DHS will expand an existing program that allows certain individuals to apply for a provisional waiver for certain violations before departing the United States to attend visa interviews.
  • Ensuring that individuals with lawful status can travel to their countries of origin. DHS will clarify its guidance to provide greater assurance to individuals with a pending LPR application or certain temporary status permission to travel abroad with advance permission (“parole”).
  • Issuing a Presidential Memorandum on visa modernization. There are many ways in which our legal immigration system can be modernized to reduce government costs, eliminate redundant systems, reduce burdens on employers and families, and eliminate fraud. The President is issuing a Memorandum directing an interagency group to recommend areas for improvement.
  • Creating a White House Task Force on New Americans. The President is creating a White House Task Force on New Americans to create a federal strategy on immigrant integration.
  • Promoting Citizenship Public Awareness: DHS will launch a comprehensive citizenship awareness media campaign in the 10 states that are home to 75 percent of the overall LPR population. USCIS will also expand options for paying naturalization fees and explore additional measures to expand accessibility, including studying potential partial fee waiver for qualified individuals.
  • Ensuring U.S. Citizens Can Serve: To further our military’s needs and support recruitment efforts, DHS will expand an existing policy to provide relief to spouses and children of U.S. citizens seeking to enlist in the military, consistent with a request made by the Department of Defense.

http://www.whitehouse.gov/the-press-office/2014/11/20/fact-sheet-immigration-accountability-executive-action

 

8 U.S. Code § 1227 – Deportable aliens

Current through Pub. L. 113-234. (See Public Laws for the current Congress.)

(a) Classes of deportable aliens

Any alien (including an alien crewman) in and admitted to the United States shall, upon the order of the Attorney General, be removed if the alien is within one or more of the following classes of deportable aliens:

(1) Inadmissible at time of entry or of adjustment of status or violates status

(A) Inadmissible aliens

Any alien who at the time of entry or adjustment of status was within one or more of the classes of aliens inadmissible by the law existing at such time is deportable.

(B) Present in violation of law

Any alien who is present in the United States in violation of this chapter or any other law of the United States, or whose nonimmigrant visa (or other documentation authorizing admission into the United States as a nonimmigrant) has been revoked under section 1201 (i) of this title, is deportable.

(C) Violated nonimmigrant status or condition of entry

(i) Nonimmigrant status violators Any alien who was admitted as a nonimmigrant and who has failed to maintain the nonimmigrant status in which the alien was admitted or to which it was changed under section 1258 of this title, or to comply with the conditions of any such status, is deportable.
(ii) Violators of conditions of entry Any alien whom the Secretary of Health and Human Services certifies has failed to comply with terms, conditions, and controls that were imposed under section 1182 (g) of this title is deportable.

(D) Termination of conditional permanent residence

(i) In general Any alien with permanent resident status on a conditional basis under section 1186a of this title (relating to conditional permanent resident status for certain alien spouses and sons and daughters) or under section 1186b of this title (relating to conditional permanent resident status for certain alien entrepreneurs, spouses, and children) who has had such status terminated under such respective section is deportable.
(ii) Exception Clause (i) shall not apply in the cases described in section 1186a (c)(4) of this title (relating to certain hardship waivers).

(E) Smuggling

(i) In general Any alien who (prior to the date of entry, at the time of any entry, or within 5 years of the date of any entry) knowingly has encouraged, induced, assisted, abetted, or aided any other alien to enter or to try to enter the United States in violation of law is deportable.
(ii) Special rule in the case of family reunification Clause (i) shall not apply in the case of alien who is an eligible immigrant (as defined in section 301(b)(1) of the Immigration Act of 1990), was physically present in the United States on May 5, 1988, and is seeking admission as an immediate relative or under section 1153 (a)(2) of this title (including under section 112 of the Immigration Act of 1990) or benefits under section 301(a) of the Immigration Act of 1990 if the alien, before May 5, 1988, has encouraged, induced, assisted, abetted, or aided only the alien’s spouse, parent, son, or daughter (and no other individual) to enter the United States in violation of law.
(iii) Waiver authorized The Attorney General may, in his discretion for humanitarian purposes, to assure family unity, or when it is otherwise in the public interest, waive application of clause (i) in the case of any alien lawfully admitted for permanent residence if the alien has encouraged, induced, assisted, abetted, or aided only an individual who at the time of the offense was the alien’s spouse, parent, son, or daughter (and no other individual) to enter the United States in violation of law.
(F) Repealed. Pub. L. 104–208, div. C, title VI, § 671(d)(1)(C),Sept. 30, 1996, 110 Stat. 3009–723

(G) Marriage fraud

An alien shall be considered to be deportable as having procured a visa or other documentation by fraud (within the meaning of section 1182 (a)(6)(C)(i) of this title) and to be in the United States in violation of this chapter (within the meaning of subparagraph (B)) if—
(i) the alien obtains any admission into the United States with an immigrant visa or other documentation procured on the basis of a marriage entered into less than 2 years prior to such admission of the alien and which, within 2 years subsequent to any admission of the alien in the United States, shall be judicially annulled or terminated, unless the alien establishes to the satisfaction of the Attorney General that such marriage was not contracted for the purpose of evading any provisions of the immigration laws, or
(ii) it appears to the satisfaction of the Attorney General that the alien has failed or refused to fulfill the alien’s marital agreement which in the opinion of the Attorney General was made for the purpose of procuring the alien’s admission as an immigrant.

(H) Waiver authorized for certain misrepresentations

The provisions of this paragraph relating to the removal of aliens within the United States on the ground that they were inadmissible at the time of admission as aliens described in section 1182 (a)(6)(C)(i) of this title, whether willful or innocent, may, in the discretion of the Attorney General, be waived for any alien (other than an alien described in paragraph (4)(D)) who—

(i)

(I) is the spouse, parent, son, or daughter of a citizen of the United States or of an alien lawfully admitted to the United States for permanent residence; and
(II) was in possession of an immigrant visa or equivalent document and was otherwise admissible to the United States at the time of such admission except for those grounds of inadmissibility specified under paragraphs (5)(A) and (7)(A) of section 1182 (a) of this title which were a direct result of that fraud or misrepresentation.
(ii) is a VAWA self-petitioner.
A waiver of removal for fraud or misrepresentation granted under this subparagraph shall also operate to waive removal based on the grounds of inadmissibility directly resulting from such fraud or misrepresentation.

(2) Criminal offenses

(A) General crimes

(i) Crimes of moral turpitude Any alien who—

(I) is convicted of a crime involving moral turpitude committed within five years (or 10 years in the case of an alien provided lawful permanent resident status under section 1255 (j) of this title) after the date of admission, and
(II) is convicted of a crime for which a sentence of one year or longer may be imposed,

 is deportable.

(ii) Multiple criminal convictions Any alien who at any time after admission is convicted of two or more crimes involving moral turpitude, not arising out of a single scheme of criminal misconduct, regardless of whether confined therefor and regardless of whether the convictions were in a single trial, is deportable.
(iii) Aggravated felony Any alien who is convicted of an aggravated felony at any time after admission is deportable.
(iv) High speed flight Any alien who is convicted of a violation of section 758 of title 18 (relating to high speed flight from an immigration checkpoint) is deportable.
(v) Failure to register as a sex offender Any alien who is convicted under section 2250 of title 18 is deportable.
(vi) Waiver authorized Clauses (i), (ii), (iii), and (iv) shall not apply in the case of an alien with respect to a criminal conviction if the alien subsequent to the criminal conviction has been granted a full and unconditional pardon by the President of the United States or by the Governor of any of the several States.

(B) Controlled substances

(i) Conviction Any alien who at any time after admission has been convicted of a violation of (or a conspiracy or attempt to violate) any law or regulation of a State, the United States, or a foreign country relating to a controlled substance (as defined in section 802 of title 21), other than a single offense involving possession for one’s own use of 30 grams or less of marijuana, is deportable.
(ii) Drug abusers and addicts Any alien who is, or at any time after admission has been, a drug abuser or addict is deportable.

(C) Certain firearm offenses

Any alien who at any time after admission is convicted under any law of purchasing, selling, offering for sale, exchanging, using, owning, possessing, or carrying, or of attempting or conspiring to purchase, sell, offer for sale, exchange, use, own, possess, or carry, any weapon, part, or accessory which is a firearm or destructive device (as defined in section 921 (a) of title 18) in violation of any law is deportable.

(D) Miscellaneous crimes

Any alien who at any time has been convicted (the judgment on such conviction becoming final) of, or has been so convicted of a conspiracy or attempt to violate—
(i) any offense under chapter 37 (relating to espionage), chapter 105 (relating to sabotage), or chapter 115 (relating to treason and sedition) of title 18 for which a term of imprisonment of five or more years may be imposed;
(ii) any offense under section 871 or 960 of title 18;
(iii) a violation of any provision of the Military Selective Service Act (50 App. U.S.C. 451 et seq.) or the Trading With the Enemy Act (50 App. U.S.C. 1 et seq.); or
(iv) a violation of section 1185 or 1328 of this title,
is deportable.

(E) Crimes of domestic violence, stalking, or violation of protection order, crimes against children and

(i) Domestic violence, stalking, and child abuse Any alien who at any time after admission is convicted of a crime of domestic violence, a crime of stalking, or a crime of child abuse, child neglect, or child abandonment is deportable. For purposes of this clause, the term “crime of domestic violence” means any crime of violence (as defined in section 16 of title 18) against a person committed by a current or former spouse of the person, by an individual with whom the person shares a child in common, by an individual who is cohabiting with or has cohabited with the person as a spouse, by an individual similarly situated to a spouse of the person under the domestic or family violence laws of the jurisdiction where the offense occurs, or by any other individual against a person who is protected from that individual’s acts under the domestic or family violence laws of the United States or any State, Indian tribal government, or unit of local government.
(ii) Violators of protection orders Any alien who at any time after admission is enjoined under a protection order issued by a court and whom the court determines has engaged in conduct that violates the portion of a protection order that involves protection against credible threats of violence, repeated harassment, or bodily injury to the person or persons for whom the protection order was issued is deportable. For purposes of this clause, the term “protection order” means any injunction issued for the purpose of preventing violent or threatening acts of domestic violence, including temporary or final orders issued by civil or criminal courts (other than support or child custody orders or provisions) whether obtained by filing an independent action or as a pendente lite order in another proceeding.

(F) Trafficking

Any alien described in section 1182 (a)(2)(H) of this title is deportable.

(3) Failure to register and falsification of documents

(A) Change of address

An alien who has failed to comply with the provisions of section 1305 of this title is deportable, unless the alien establishes to the satisfaction of the Attorney General that such failure was reasonably excusable or was not willful.

(B) Failure to register or falsification of documents

Any alien who at any time has been convicted—
(i) under section 1306 (c) of this title or under section 36(c) of the Alien Registration Act, 1940,
(ii) of a violation of, or an attempt or a conspiracy to violate, any provision of the Foreign Agents Registration Act of 1938 (22 U.S.C. 611 et seq.), or
(iii) of a violation of, or an attempt or a conspiracy to violate, section 1546 of title 18 (relating to fraud and misuse of visas, permits, and other entry documents),
is deportable.

(C) Document fraud

(i) In general An alien who is the subject of a final order for violation of section 1324c of this title is deportable.
(ii) Waiver authorized The Attorney General may waive clause (i) in the case of an alien lawfully admitted for permanent residence if no previous civil money penalty was imposed against the alien under section1324c of this title and the offense was incurred solely to assist, aid, or support the alien’s spouse or child (and no other individual). No court shall have jurisdiction to review a decision of the Attorney General to grant or deny a waiver under this clause.

(D) Falsely claiming citizenship

(i) In general Any alien who falsely represents, or has falsely represented, himself to be a citizen of the United States for any purpose or benefit under this chapter (including section 1324a of this title) or any Federal or State law is deportable.
(ii) Exception In the case of an alien making a representation described in clause (i), if each natural parent of the alien (or, in the case of an adopted alien, each adoptive parent of the alien) is or was a citizen (whether by birth or naturalization), the alien permanently resided in the United States prior to attaining the age of 16, and the alien reasonably believed at the time of making such representation that he or she was a citizen, the alien shall not be considered to be deportable under any provision of this subsection based on such representation.

(4) Security and related grounds

(A) In general

Any alien who has engaged, is engaged, or at any time after admission engages in—
(i) any activity to violate any law of the United States relating to espionage or sabotage or to violate or evade any law prohibiting the export from the United States of goods, technology, or sensitive information,
(ii) any other criminal activity which endangers public safety or national security, or
(iii) any activity a purpose of which is the opposition to, or the control or overthrow of, the Government of the United States by force, violence, or other unlawful means,
is deportable.

(B) Terrorist activities

Any alien who is described in subparagraph (B) or (F) of section 1182 (a)(3) of this title is deportable.

(C) Foreign policy

(i) In general An alien whose presence or activities in the United States the Secretary of State has reasonable ground to believe would have potentially serious adverse foreign policy consequences for the United States is deportable.
(ii) Exceptions The exceptions described in clauses (ii) and (iii) of section 1182 (a)(3)(C) of this title shall apply to deportability under clause (i) in the same manner as they apply to inadmissibility under section1182 (a)(3)(C)(i) of this title.

(D) Participated in Nazi persecution, genocide, or the commission of any act of torture or extrajudicial killing

Any alien described in clause (i), (ii), or (iii) of section 1182 (a)(3)(E) of this title is deportable.

(E) Participated in the commission of severe violations of religious freedom

Any alien described in section 1182 (a)(2)(G) of this title is deportable.

(F) Recruitment or use of child soldiers

Any alien who has engaged in the recruitment or use of child soldiers in violation of section 2442 of title 18is deportable.

(5) Public charge

Any alien who, within five years after the date of entry, has become a public charge from causes not affirmatively shown to have arisen since entry is deportable.

(6) Unlawful voters

(A) In general

Any alien who has voted in violation of any Federal, State, or local constitutional provision, statute, ordinance, or regulation is deportable.

(B) Exception

In the case of an alien who voted in a Federal, State, or local election (including an initiative, recall, or referendum) in violation of a lawful restriction of voting to citizens, if each natural parent of the alien (or, in the case of an adopted alien, each adoptive parent of the alien) is or was a citizen (whether by birth or naturalization), the alien permanently resided in the United States prior to attaining the age of 16, and the alien reasonably believed at the time of such violation that he or she was a citizen, the alien shall not be considered to be deportable under any provision of this subsection based on such violation.

(7) Waiver for victims of domestic violence

(A) In general

The Attorney General is not limited by the criminal court record and may waive the application of paragraph (2)(E)(i) (with respect to crimes of domestic violence and crimes of stalking) and (ii) in the case of an alien who has been battered or subjected to extreme cruelty and who is not and was not the primary perpetrator of violence in the relationship—

(i)   [1] upon a determination that—

(I) the alien was acting is  [2] self-defense;
(II) the alien was found to have violated a protection order intended to protect the alien; or

(III) the alien committed, was arrested for, was convicted of, or pled guilty to committing a crime—

(aa) that did not result in serious bodily injury; and
(bb) where there was a connection between the crime and the alien’s having been battered or subjected to extreme cruelty.

(B) Credible evidence considered

In acting on applications under this paragraph, the Attorney General shall consider any credible evidence relevant to the application. The determination of what evidence is credible and the weight to be given that evidence shall be within the sole discretion of the Attorney General.

(b) Deportation of certain nonimmigrants

An alien, admitted as a nonimmigrant under the provisions of either section 1101 (a)(15)(A)(i) or 1101 (a)(15)(G)(i) of this title, and who fails to maintain a status under either of those provisions, shall not be required to depart from the United States without the approval of the Secretary of State, unless such alien is subject to deportation under paragraph (4) of subsection (a) of this section.

(c) Waiver of grounds for deportation

Paragraphs (1)(A), (1)(B), (1)(C), (1)(D), and (3)(A) of subsection (a) of this section (other than so much of paragraph (1) as relates to a ground of inadmissibility described in paragraph (2) or (3) of section 1182 (a) of this title) shall not apply to a special immigrant described in section 1101 (a)(27)(J) of this title based upon circumstances that existed before the date the alien was provided such special immigrant status.

(d) Administrative stay

(1) If the Secretary of Homeland Security determines that an application for nonimmigrant status under subparagraph (T) or (U) of section 1101 (a)(15) of this title filed for an alien in the United States sets forth a prima facie case for approval, the Secretary may grant the alien an administrative stay of a final order of removal under section 1231 (c)(2) of this title until—

(A) the application for nonimmigrant status under such subparagraph (T) or (U) is approved; or
(B) there is a final administrative denial of the application for such nonimmigrant status after the exhaustion of administrative appeals.
(2) The denial of a request for an administrative stay of removal under this subsection shall not preclude the alien from applying for a stay of removal, deferred action, or a continuance or abeyance of removal proceedings under any other provision of the immigration laws of the United States.
(3) During any period in which the administrative stay of removal is in effect, the alien shall not be removed.
(4) Nothing in this subsection may be construed to limit the authority of the Secretary of Homeland Security or the Attorney General to grant a stay of removal or deportation in any case not described in this subsection.

Loretta Lynch

For other uses, see Loretta Lynch (disambiguation).
Loretta Lynch
Loretta Lynch.jpg
United States Attorney for the
Eastern District of New York
Incumbent
Assumed office
May 8, 2010
Appointed by Barack Obama
Preceded by Benton Campbell
In office
June 1999 – May 2001
Appointed by Bill Clinton
Preceded by Zachary Carter
Succeeded by Roslynn Mauskopf
Personal details
Born Loretta Elizabeth Lynch
May 21, 1959 (age 55)
Greensboro, North Carolina,U.S.
Political party Democratic
Spouse(s) Stephen Hargrove
Alma mater Harvard University (A.B., J.D.)

Loretta Elizabeth Lynch[1] (born May 21, 1959) is the current United States Attorney for the Eastern District of New York. Her current tenure as U.S. Attorney began in 2010, and she previously held the position from 1999−2001. As U.S. Attorney for the Eastern District of New York, Lynch oversees federal prosecutions in Brooklyn, Queens, Staten Island and Long Island. On November 8, 2014, President Barack Obama nominated her to succeed Eric Holder as Attorney General of the United States.[2]

Early life and education

Lynch was born in Greensboro, North Carolina on May 21, 1959. Her mother was a school librarian and her father was a Baptist minister.[3][4] As a child, she spent hours with her father, watching court proceedings in the courthouse of Durham, North Carolina. Her early fascination with court proceedings was compounded by stories of her grandfather, also a pastor, who in the 1930s helped people move to the north to escape persecution under the Jim Crow laws of the time.[5] Lynch earned a Bachelor of Arts in English and American literature from Harvard College in 1981 and a Juris Doctor from Harvard Law School in 1984.[6][7]

Career

Lynch’s first legal job was as a litigation associate for Cahill Gordon & Reindel.[8] She joined the Eastern District as a drug and violent-crime prosecutor in the U.S. Attorney’s office in 1990. From 1994 to 1998, she served as the chief of the Long Island office and worked on several political corruption cases involving the government of Brookhaven, New York. From 1998 to 1999, she was the chief assistant U.S. Attorney in the Eastern District and headed the Brooklyn office. In 1999, she was nominated by President Bill Clinton to serve as the U.S. Attorney for the Eastern District of New York.[9] During her term as U.S. Attorney, Lynch oversaw prosecution of New York City police officers in the Abner Louima case.

In 2001, Lynch left the U.S. Attorney’s office to become a partner at Hogan & Hartson (later Hogan Lovells). She remained there until January 20, 2010, when President Barack Obama nominated Lynch to again serve as United States Attorney for the Eastern District of New York.[7][10] From 2003 to 2005, she was a member of the board of the Federal Reserve Bank of New York.[11]

Following the July 2014 death of Eric Garner, an unarmed man who died of a heart attack after resisting arrest and being held in a department-prohibited chokehold by a New York City police officer, Lynch agreed to meet with Garner’s family to discuss possible federal prosecution of the officer believed to be responsible in his death.[12][13]

Lynch’s office indicted Republican congressman Michael Grimm; prosecuted Democratic politicians Pedro Espada Jr. and William Boyland, Jr.; investigated Citigroup over mortgage securities sold by the bank, resulting in a US$7 billion settlement; and was involved in the US$1.2 billion settlement with HSBC over violations of the Bank Secrecy Act.[14][15][16]

On November 8, 2014, President Barack Obama nominated Lynch for the position of U.S. Attorney General, succeeding Eric Holder, who had previously announced his resignation pending confirmation of his replacement. If confirmed by the U.S. Senate, she would be the first African-American woman; the second African-American, after Holder; and the second woman, after Janet Reno; to hold this office.[17][18]

Personal

Lynch and her husband, Stephen Hargrove, married in 2007. In her personal life she uses her married name, Loretta Lynch Hargrove. Her husband has two children from a previous marriage.[19][20]

http://en.wikipedia.org/wiki/Loretta_Lynch

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 400-405

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Historic Progressive Politicians and Media Snow Job — Man-Made Computer Model Consensus Weather Forecast Busted — Never Mind — Dallas Hits 75 Degrees — Blame It On Global Warming — Give Me A Break — It Is Called Winter, Stupid — Both Weather and Climates Change — Videos

Posted on January 27, 2015. Filed under: Blogroll, College, Communications, Computers, Computers, Constitution, Crisis, Cult, Culture, Documentary, Economics, Education, Employment, Energy, Enivornment, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Food, Freedom, Friends, Geology, government, government spending, history, liberty, Life, Links, Literacy, media, Money, Music, Music, Natural Gas, Natural Gas, Nuclear Power, Oil, Oil, People, Philosophy, Photos, Politics, Radio, Rants, Raves, Regulations, Resources, Science, Strategy, Systems, Tablet, Talk Radio, Tax Policy, Taxes, Technology, Video, Water, Wealth, Welfare, Writing | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 404: January 27, 2015

Pronk Pops Show 403: January 26, 2015

Pronk Pops Show 402: January 23, 2015

Pronk Pops Show 401: January 22, 2015

Pronk Pops Show 400: January 21, 2015

Pronk Pops Show 399: January 16, 2015

Pronk Pops Show 398: January 15, 2015

Pronk Pops Show 397: January 14, 2015

Pronk Pops Show 396: January 13, 2015

Pronk Pops Show 395: January 12, 2015

Pronk Pops Show 394: January 7, 2015

Pronk Pops Show 393: January 5, 2015

Pronk Pops Show 392: December 19, 2014

Pronk Pops Show 391: December 18, 2014

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Story 1: Historic Progressive Politicians and Media Snow Job — Man-Made Computer Model Consensus Weather Forecast Busted — Never Mind — Dallas Hits 75 Degrees — Blame It On Global Warming — Give Me A Break — It Is Called Winter, Stupid — Both Weather and Climates Change — Videos

global-warming-winter-storm-political-cartoonglobal-warming-cartooncartoons-warmingibd_jpgClimate-Model-Comparison-1024x921CMIP5-73-models-vs-obs-20N-20S-MT-5-yr-means1CMIP5-global-LT-vs-UAH-and-RSScomputer modelsmod_v_obs_01_16_15Predictions1976-2011

Gilda Radner Miss Emily Litella

The Global Warming Hoax Explained for Dummies

Watermelons

ManBearPig, Climategate and Watermelons: A conversation with author James Delingpole

The World Weather Forecast

National Weather Service apologizes for blizzard forecast miss

Brenda Lee – I’m Sorry

“I’m Sorry”

I’m sorry, so sorry
That I was such a fool
I didn’t know
Love could be so cruel
Oh-oh-oh-oh-oh-oh-oh-yesYou tell me mistakes
Are part of being young
But that don’t right
The wrong that’s been done(I’m sorry) I’m sorry
(So sorry) So sorry
Please accept my apology
But love is blind
And I was too blind toseeOh-oh-oh-oh-oh-oh-oh-yesYou tell me mistakes
Are part of being young
But that don’t right
The wrong that’s been done
Oh-oh-oh-oh-oh-oh-oh-yesI’m sorry, so sorry
Please accept my apology
But love was blind
And I was too blind to see(Sorry)

Winter Storm Juno How US reported blizzard

New York snow: Winter Storm Juno downgraded as ‘one of the largest snowstorms

Winter Storm JUNO 2015 : Blizzard for Historic New York City – RAW VIDEO Compilation

New York blizzard: Winter snow storm ‘Juno’ hits US East Coast, in pictures
A huge snowstorm has slammed into northeastern US, shutting down public transport, cancelling thousands of flights and leaving roads and streets deserted as snow blanketed an area that’s home to tens of millions of people. Authorities ordered drivers off the streets in New York and other cities like Boston in the face of a storm that forecasters warned could reach historic proportions, dumping up to three feet (up to a metre) of snow in some areas

Winter storm looms with record level snow threat; 7,700 flights canceled
Seven states on the Northeast are in watch mode as a potentially record-setting storm is churning up the coast, threatening to dump up to 3 feet of snow in parts and paralyze the region from Philadelphia to Maine.

More than 7,700 flights for Monday and Tuesday have been canceled as of Monday evening, with Boston’s Logan Airport and Providence’s T.F. Green Airport closed outright. Delays and the knock-on effects of stranded planes and lost connections will start hitting the entire nation’s air-travel system Tuesday.

Winter Storm Juno: Blizzard Warnings for New York City, Boston, Parts of 7 States; Potentially Historic Northeast Snowstorm Ahead

Millions of people in the Northeast are bracing for Winter Storm Juno, which threatens to become a major snowstorm Monday through Wednesday with the potential for blizzard conditions and more than 2 feet of snow.

The high confidence in forecast wind and snowfall led the National Weather Service to issue blizzard warnings well in advance of the storm. As of late Sunday evening, those warnings were posted from the New Jersey shore all the way to Downeast Maine, including the cities of New York City, Boston, Providence, Hartford and Portland. The warnings were scheduled to go into full force as early as noon Monday along the Jersey Shore. The aforementioned stretch of Northeast coast will be fully under blizzard warnings by sunrise Tuesday, unless some are downgraded before then. Most of the warnings are set to run through late Tuesday night.

Winter Storm Juno: A Pummeling for the History Books
The East Coast already looks like a snow globe thanks to winter storm Juno, but the worst is yet to come.
NYC Mayor Bill de Blasio said at a press conference Sunday, “This could be the biggest snowstorm in the history of this city.” The National Weather Service (NWS) and Weather Channel meteorologist Chris Dolce have both said the impending storm is “potentially historic.” So, what does historic mean, and how strong is this “potentially”? It depends on your definition, but this storm could be one for the record books, and not just in the highest-3 point-shooting-percentage-in-the-third-q­uarter-with-two-bench-players-on-the-cou­rt-on-a-Tuesday type of statistic.

Based on a new experimental forecast from the NWS, as of Monday morning there is an 80 percent chance that NYC will receive at least 12” of snow. Since record keeping in Central Park began in 1869, there have been 35 events exceeding a foot of snow, so 12″ wouldn’t be a big record. But there is a 62 percent chance for at least 18” of snow, and there have only been 11 events reaching that marker. Despite the seeming endlessness of last year’s winter, only one event (on February 13th and 14th) made the 12”+ snow event list for New York City. New York has only seen snowfall totals above two feet twice, first in December 1947 and more recently in February 2006.

To be recorded in official weather history, what matters most for NYC is the official snowfall in Central Park. This is where the longest period of record is for the city, so it’s what is used for most of the statistics on weather events. While the NWS is calling for 20-30″ in most areas around NYC, local bands of snow will likely cause several more inches in some places. Scientists have difficulty predicting where these bands will occur, but whether such a band forms over Central Park could be the difference between a nuisance-maker and a history-making nuisance.

Blizzard 2015 New York City, Brooklyn, Historic Northeast Blizzard

CNN’s Anderson Cooper looks at some of the biggest nor’easters to hit the East Coast.

Tens of millions of people in the Northeast hunkered down on Monday for a historic blizzard that was expected to drop more than 2 feet of snow, whipped around by winds approaching hurricane..

Blizzard 2015 Airports Begin to Close as Historic Northeast Blizzard NearsBLIZZARD ’15: THE LATEST Nearly 7000 flights have been cancelled. Amtrak has suspended Tuesday service between New.

Tens of millions of people in the Northeast hunkered down on Monday for a historic blizzard that was expected to drop more than 2 feet of snow, whipped around by winds approaching hurricane.

Meteorology 101 – UniversalClass Online Course

 

Jamie Cullum – What A Difference A Day Made

Dinah Washington ‘Difference-complete TV segment

Dinah Washington singing here with the Louis Jordan Band. This is the complete TV Show segment with Dinah singing ‘What A Difference A Day Made’ and ‘Making Whopee’. Louis and Ronald Reagan make the announcements and I love the way Louis calls him ‘Ronnie’! The show was dated March 8th 1960.

Gilda Radner – LIVE FROM NEW YORK!

Storm Fails To Live Up To Predictions In Some Areas As National Weather Service Meteorologist Apologizes

A howling blizzard with wind gusts over 70 mph heaped snow on Boston along with other stretches of lower New England and Long Island on Tuesday but failed to live up to the hype in Philadelphia and New York City, where buses and subways started rolling again in the morning.

Gary Szatkowski, meteorologist-in-charge at the National Weather Service in Mt. Holly, New Jersey, apologized on Twitter for the snow totals being cut back.

“My deepest apologies to many key decision makers and so many members of the general public,” Szatkowski tweeted. “You made a lot of tough decisions expecting us to get it right, and we didn’t. Once again, I’m sorry.”

Jim Bunker at the agency’s Mount Holly office said forecasters will take a closer look at how they handled the storm and “see what we can do better next time.”

In New England, the storm that arrived Monday evening was a bitter, paralyzing blast, while in the New York metro area, it was a bust that left forecasters apologizing and politicians defending their near-total shutdown on travel. Some residents grumbled, but others sounded a better-safe-than-sorry note and even expressed sympathy for the weatherman.

At least 2 feet of snow was expected in most of Massachusetts, potentially making it one of the top snowstorms of all time. The National Weather Service said a 78 mph gust was reported on Nantucket, and a 72 mph one on Martha’s Vineyard.

“It felt like sand hitting you in the face,” Bob Paglia said after walking his dog four times overnight in Whitman, a small town about 20 miles south of Boston.

Maureen Keller, who works at Gurney’s, an oceanfront resort in Montauk, New York, on the tip of Long Island, said: “It feels like a hurricane with snow.”

As of midmorning, the Boston area had 1½ feet of snow, while the far eastern tip of Long Island had more than 2 feet. Snowplows around New England struggled to keep up.

“At 4 o’clock this morning, it was the worst I’ve ever seen it,” said Larry Messier, a snowplow operator in Columbia, Connecticut. “You could plow, and then five minutes later you’d have to plow again.”

In Boston, police drove several dozen doctors and nurses to work at hospitals. Snow blanketed Boston Common, and drifts piled up against historic Faneuil Hall, where Samuel Adams and the Sons of Liberty stoked the fires of rebellion. Adjacent Quincy Market, usually bustling with tourists, was populated only by a few city workers clearing snow from the cobblestones.

As the storm pushed into the Northeast on Monday, the region came to a near standstill, alarmed by forecasters’ dire predictions. More than 7,700 flights were canceled, and schools, businesses and government offices closed.

But as the storm pushed northward, it tracked farther east than forecasters had been expecting, and conditions improved quickly in its wake. By midmorning Tuesday, New Jersey and New York City lifted driving bans, and subways and trains started rolling again, with a return to a full schedule expected Wednesday.

While Philadelphia, New York and New Jersey had braced for a foot or two of snow from what forecasters warned could be a storm of potentially historic proportions, they got far less than that. New York City received about 8 inches, Philadelphia a mere inch or so. New Jersey got up to 8 inches.

SOCIAL MEDIA CALLING BLIZZARD OF 2015 A ‘BUST’

New Jersey Gov. Chris Christie defended his statewide ban on travel as “absolutely the right decision to make” in light of the dire forecast.

And New York Gov. Andrew Cuomo, who drew criticism last fall after suggesting meteorologists hadn’t foreseen the severity of an epic snowstorm in Buffalo, said this time: “Weather forecasters do the best they can, and we respond based to the best information that we have.”

In New York City, Susanne Payot, a cabaret singer whose rehearsal Tuesday was canceled, said the meager snowfall left her bemused: “This is nothing. I don’t understand why the whole city shut down because of this.”

Brandon Bhajan, a security guard at a New York City building, said he didn’t think officials had overreacted.

“I think it’s like the situation with Ebola … if you over-cover, people are ready and prepared, rather than not giving it the attention it needs,” he said

http://connecticut.cbslocal.com/2015/01/27/storm-fails-to-live-up-to-predictions-in-some-areas/

 

National Weather Service to evaluate work after missed call

A National Weather Service official says the agency will evaluate its storm modeling after a storm that was predicted to dump a foot or more of snow on many parts of New Jersey and the Philadelphia region delivered far less than that.

“You made a lot of tough decisions expecting us to get it right, and we didn’t. Once again, I’m sorry,” said meteorologist Gary Szatkowski of the NWS.

Jim Bunker, who leads the weather service’s observing program in the Mount Holly office, says the storm tracked a bit to the east of what forecasting models predicted.

Parts of Long Island and New England are getting slammed. But many parts of New Jersey received less than 4 inches.

Bunker says the agency will evaluate what happened to see how it can do better in the future.

http://www.myfoxny.com/story/27950449/missed-call 

Blame De Blasio and Cuomo and Christie for the Blizzard Snow Job

As politicians rushed to out-serious each other, New Yorkers were whipped into a fear frenzy.

Every modern event has a hashtag and this morning, as New York City takes stock of the #snowmageddon2015 that wasn’t, it’s turning to #snowperbole.

On Monday, as Governor Cuomo, Governor Christie, and Mayor de Blasio rushed to out-serious each other, New Yorkers were whipped into a fear frenzy. Supermarket shelves were stripped bare, photos of Whole Foods depleted of kale circulated, and people stocked up for what would likely be days (maybe weeks!) indoors.

Even as we were doing it, we acknowledged it didn’t make much sense. After all, we’re in New York City. Bodegas never close. Delivery guys on bicycles have been a constant through all previous winter storms. All New Yorkers have their stories. That time we ordered Chinese Food during the snowstorm of 1994. Swimming on Brighton Beach during Hurricane Gloria. Buying Poptarts at the corner bodega during Sandy. Driving from Manhattan to Brooklyn and back again during the blackout of 2003. Yes, those are all mine.

As we waited for the storm deemed “historic,” the only real history was made when the subway shut down for the first time ever in preparation for snow. The real insult came when it was reported later that the trains were indeed still running, empty, as trains needed to keep moving to clear the tracks. Citibike was shut down. Cars were banned from the roads and anyone who didn’t take heed risked being fined.

These are all symptoms of our infantilizing “do something!” culture. Everyone understands the pressure politicians feel to be seen as proactive. But this time they went way too far in the name of protecting us. It’s one thing to warn drivers that conditions are dangerous and that they go out at their own risk. It’s another to shut down all roads in the city that allegedly never sleeps.

The 11 p.m. curfew resulted in lost wages for delivery people who count on larger-than-usual tips during inclement weather. Why couldn’t they make their own decisions about working during the snow? Not everyone makes a salary the way our mayor and governor do. Many workers count on their hourly wage, and their tips, to make their rent each month.

The storm was a dud, but even if had been as severe as predicted, bringing a city like New York to a preemptive standstill makes little sense. The people who keep New York humming take the subway after 11pm and can decide for themselves whether to keep their businesses open. Preparedness doesn’t have to mean panic.

http://time.com/3684240/blame-de-blasio-and-cuomo-and-christie-for-the-blizzard-snow-job/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 400-404

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Man Who Could Bring Obama Down By Telling What The Central Intelligence Agency Was Doing in Benghazi, Libya, Shipping Arms To Syrian Al-Qaida Islamic Jihadist Terrorists, General David H. Petraeus? — Videos

Posted on January 21, 2015. Filed under: American History, Ammunition, Blogroll, Books, Central Intelligence Agency (CIA), Communications, Computers, Corruption, Crime, Crisis, Culture, Demographics, Diasters, Documentary, Ethic Cleansing, European History, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, Friends, government, government spending, history, Islam, Language, Law, liberty, Life, Links, Literacy, Missiles, Narcissism, National Security Agency (NSA_, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Pistols, Politics, Press, Psychology, Radio, Raves, Resources, Rifles, Security, Shite, Strategy, Sunni, Talk Radio, Terrorism, Video, War, Wealth, Weapons, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 399: January 16, 2015

Pronk Pops Show 398: January 15, 2015

Pronk Pops Show 397: January 14, 2015

Pronk Pops Show 396: January 13, 2015

Pronk Pops Show 395: January 12, 2015

Pronk Pops Show 394: January 7, 2015

Pronk Pops Show 393: January 5, 2015

Pronk Pops Show 392: December 19, 2014

Pronk Pops Show 391: December 18, 2014

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Story 1: The Man Who Could Bring Obama Down By Telling What The Central Intelligence Agency Was Doing in Benghazi, Libya, Shipping Arms To Syrian Al-Qaida Islamic Jihadist Terrorists, General David H. Petraeus? — Videos

9781594203183_AllIn_JKF.inddpetraeusDavid-Petraeus-Mistress_-Paula-Broadwell-600x450-600x350david-petraeus-paula-broadwellDavid Petraeus Sworn In As CIA Director
petraeus

U.S. prosecutors recommend criminal charges against Petraeus – N.Y. Times

Former CIA Chief David Petraeus may face criminal charges

FBI, D.O.J. Want To File Charges Against Former Gen. Petraeus

Benghazi Gate Blackmail? – FBI Investigation Hanging Over Fmr CIA Dir David Petraeus – Happening Now

Benghazi Gate Blackmail? – FBI Investigation Hanging Over Former CIA Dir David Petraeus – Happening Now
Witness Intimidation?
Is Obama Admin Trying To Silence Petraeus On Benghazi?

Evidence Obama Allowed Americans In Libya To Die To Cover Up Arms Shipment To Syrian Islamist Groups

Published on Oct 28, 2012

Evidence points to Obama alowing Americans in Libya to die to coverup arms shipment through Turkey to Syrian Islamist groups!

Benghazi – TheBlazeTV – The Glenn Beck Program – 2013.05.06

Benghazi-Gate: Connection between CIA and al-Qaeda in Libya and Syria, with Turkey’s Help

Rand Paul asks Hillary Clinton if the US is Shipping Arms from Libya to Turkey

Benghazi Gate – Rand Paul and Hillary Clinton – Question & Answer

Glenn Greenwald: With Calls to Spare Petraeus, Feinstein Plea Shows that Not All Leaks are Equal

US lawmakers react to Petraeus’testimony on Benghazi

Petraeus Affair – FBI Case – FBI Involvement – CIA Director

SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria

Benghazi Gate – “You Need To Wait” – Ops Say CIA Officer Told Them To Stand Down -North – F&F

Benghazi Whistleblowers Threatened by Obama Administration

LIBYA No US Consulate In Benghazi But CIA Operation, Hired Militia Linked To Extremist

Treason: Benghazi Revelations Could Sink Obama

The Real Reason Petraeus Resigned

The Media Syria Al Nusra John McCain

White House relations with CBS, ABC, NBC – #Benghazi Gun Running

Why Was Gaddafi Overthrown?

Benghazi Attack Cover Up! Obama Armed Al Qaeda?

Stefan Molyneux speaks with Roger Aronoff on the recent findings of the Citizens’ Commission on Benghazi, White House lies, the United States selling weapons to Libyan rebels, Muammar Gaddafi’s desire to surrender, the possibility of Obama’s impeachment, Hillary Clinton’s involvement and the impact this could have on the next presidential election.

Wayne Madsen: Benghazi Bombshell Insiders Confirm CIA Sent Missiles to FSA Rebels

Benghazi Attack Was Cover For Al Qaeda Arms Deal

Rooney Questions CIA on Benghazi: How Did They Know When Attack Would End?

During a House Intelligence Committee hearing on the Benghazi terrorist attacks, Rep. Tom Rooney (FL-17) questioned the former CIA Acting Director on why a decision was made not to send a military response, since the Administration could not have known how long the attack would continue. Rooney also focused on how future attacks could be prevented.

Charges eyed for Petraeus in classified leaks to mistress

FBI and Justice prosecutors recommend felony charges against Petraeus

Benghazi Gate Blackmail? – FBI Investigation Hanging Over Fmr CIA Dir David Petraeus – Happening Now

White House ‘Held Affair Over Petraeus’s Head’ For Favorable Testimony On Benghazi

Syndicated columnist Charles Krauthammer on Tuesday said the White House used David Petraeus’s affair to get the CIA director to give testimony about the attacks on the U.S. consulate in Benghazi, Libya, that was in line with the administration’s position on the matter.

CHARLES KRAUTHAMMER: I think the really shocking news today was that General Petraeus thought and hoped he could keep his job. He thought that it might and it would be kept secret, and that he could stay in his position. I think what that tells us is really important. It meant that he understood that the FBI obviously knew what was going on. He was hoping that those administration officials would not disclose what had happened, and therefore hoping that he would keep his job. And that meant that he understood that his job, his reputation, his legacy, his whole celebrated life was in the hands of the administration, and he expected they would protect him by keeping it quiet.

Peter King, Carl Levin `This Week` Interview: David Petraeus Scandal, Benghazi investigation

Gen. Petraeus knew all about running guns in Bengazi, U.S. in bed with Al Qaeda there (Glenn Beck)

Official: Harassing Emails Led to FBI Probe

CNBC: Benghazi is not about Libya! “It’s An NSC Operation Moving Arms & Fighters Into Syria”

The resignation of CIA Director David Petraeus is not about an extramarital affair with his biographer, reserve Army officer Paula Broadwell. It’s about U.S. policy in the Middle East, the ongoing “color revolutions,” and specifically the operation underway to arm al-Qaeda, the FSA in Syria, and overthrow the al-Assad regime.

Radio talk show host John Baxter told CNBC’s Larry Kudlow the step-down may be part of a deal made by Petraeus to avoid testifying before a closed-door session of the Senate Intelligence Committee next week about the CIA’s role in the September 11 assault on the diplomatic facility and a CIA annex in Benghazi.

The House Intelligence Committee has also scheduled a hearing to grill Petraeus and National Counterterrorism Center Director Matt Olsen.

The chairman of the House committee, Rep. Mike Rogers, has vehemently criticized the Obama administration for its role in the attack that left ambassador Christopher Stevens and three other Americans dead.

“Benghazi is not about Libya, Benghazi is about the policy of the Obama administrtion to involve the United States without clarity to the Americvan people, not only in Libya but throughout the whole of the Arab world now in turmoil,” Baxter told Kudlow. “Benghazi is about the NSC directing an operation that is perhaps shadowy, perhaps a presidential finding, perhaps doesn’t, that takes arms and men and puts them into Syria in the guise of the Free Syria Army (FSA).”

Obama LIED About Benghazi Attack!!! (Lt. Col. Tony Shaffer Interview)

Petraeus affair snares another top General

David Petraeus Scandal: Truth Behind Resignation, Paula Broadwell

Paula Broadwell spilling secret CIA information

David Petraeus Resigns Over Affair With Biographer Paula Broadwell

Alumni Symposium 2012: Paula Broadwell

IRAQ HEARINGS: Sen. Obama Questions Gen. Petraeus

Interesting Benghazi Conspiracy angle – Was there possible involvement with CIA Director Petraeus?

Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood

Patriot Act Used To Spy on CIA Director

OBAMA CONFRONTED ON BENGHAZI – Stutters Through Response

Petraeus is Key Witness to Benghazi Scandal

Prosecutors weigh charges against David Petraeus involving classified information

 

By Sari Horwitz and Adam Goldman January 9
Federal prosecutors have recommended that David H. Petraeus face charges for providing classified documents to his biographer, raising the prospect of criminal proceedings against the retired four-star general and former CIA director.

The recommendation follows a federal probe into how the biographer, Paula Broadwell, apparently obtained classified records several years ago while working on a book about Petraeus. Broadwell was also his mistress, and the documents were discovered by investigators during the scandal that forced Petraeus’s resignation as CIA director in 2012.

Attorney General Eric H. Holder Jr. must decide whether to pursue charges against Petraeus, the former top U.S. commander in Iraq and Afghanistan, according to an official, who spoke on the condition of anonymity because the investigation is ongoing.

The Justice Department and FBI declined to comment, as did Robert B. Barnett, a lawyer for Petraeus.

Both Petraeus and Broadwell have denied in the past that he provided her with classified information. Investigators have previously focused on whether his staff gave her sensitive documents at his instruction.

Prosecutors recommend charges against Petraeus(0:44)
The U.S. federal prosecutors have recommended bringing charges against former CIA chief David Petraeus, raising the prospect of criminal proceedings against him.
The prosecutors’ recommendation was first reported Friday evening on the Web site of the New York Times, which said Petraeus has rejected the possibility of a plea deal.

The FBI has been pushing to resolve several high-profile counterespionage investigations that have lingered for months and in some cases years. In addition to the case involving Petraeus and Broadwell, the bureau wants the Justice Department to decide whether to pursue charges against veteran State Department diplomat Robin Raphel and retired Marine Gen. James E. “Hoss” Cartwright, who until 2011 was vice chairman of the Joint Chiefs of Staff.

Cartwright was the target of a Justice Department investigation into the leak of information about the Stuxnet cyberattack against Iran’s nuclear program. The details of Raphel’s case remain murky, but officials have said classified information was found at her home.

FBI agents believe they have strong cases against all four of them, said another U.S. official, who also spoke on condition of anonymity. Each of the cases is considered sensitive given the involvement of high-ranking officials in the U.S. government.
The Justice Department has also faced political pressure to resolve the Petraeus matter. Sen. John McCain (R-Ariz.), now the chairman of the Senate Armed Services Committee, wrote Holder last month expressing concern the case has continued to linger.

“At this critical moment in our nation’s security, Congress and the American people cannot afford to have this voice silenced or curtailed by the shadow of a long-running, unresolved investigation marked by leaks from anonymous sources,” said McCain, adding that he wasn’t seeking action “on behalf of any particular interest — and don’t presume to judge the outcome of any investigation.”

Federal investigators first searched Broadwell’s home in Charlotte in November 2012 and seized dozens of boxes of records as well as computer equipment. Aides to Petraeus have said they were often tasked to provide military records or other documents to Broadwell for her work on her book about him. That book, “All In,” was published in January 2012.

Any classified information investigators discovered could expose both her and Petraeus to charges. It is a crime to remove classified information from secure, government locations as well as to provide that information to others not authorized to receive it.

Petraeus now spends his time teaching and giving speeches; he also serves as chairman of the KKR Global Institute, a part of the private-equity firm Kohlberg Kravis Roberts.

The 2012 investigation into Petraeus was triggered when Broadwell allegedly sent threatening e-mails to another woman who was a friend of Petraeus, Jill Kelley of Tampa. Kelley alerted an FBI agent she knew to seek protection and to help track down whoever had sent the e-mails.

The FBI traced the messages to Broadwell, a married Army reservist, and in the course of its investigation, uncovered explicit e-mails between Broadwell and Petraeus.

Investigators said they were at first concerned about the possibility that Petraeus, then the director of the CIA, had had his e-mail hacked. Further investigation led to the discovery of the affair with Broadwell.
Petraeus had become CIA director a short time earlier, in September 2011. His resignation cut short his time at the agency and also seemed to scuttle long-rumored presidential aspirations.

http://www.washingtonpost.com/world/national-security/prosecutors-weigh-charges-against-david-petraeus-involving-classified-information/2015/01/09/d6b4bb36-9854-11e4-aabd-d0b93ff613d5_story.html

REPORT: David Petraeus May Be Charged With Leaking Classified Information To His Former Mistress

Former General David Petraeus’s 2012 adultery scandal may end up costing him more than just his job as CIA director.

Citing anonymous government officials, the New York Times is reporting that federal prosecutors with the FBI and the Department of Justice have recommended that Petraeus be charged with a felony for providing classified information to his mistress and biographer, Paula Broadwell, who was also an Army Reserve officer.

Petraeus has been under investigation for unauthorized leaks related to the affair and Broadwell’s book since the scandal broke. Holder was supposed to decide on charging Petraeus by the end of last year. But the legal process has unfolded slowly, with the retired general showing “no interest in a plea deal that would spare him an embarrassing trial,” according to the Times.

The charges would represent a stunning turnabout for the celebrated former US commander in Iraq and Afghanistan and one of the military’s major proponents of counter-insurgency doctrine. As the Times puts it, Attorney General Eric Holder now has to decide “whether to seek an indictment that could send the pre-eminent military officer of his generation to prison.”

Petraeus abruptly resigned as CIA director on Nov. 10, 2012 after admitting that he had carried on an extra-marital affair with Broadwell the year before. For someone in a less sensitive position in government, such marital indiscretions aren’t necessarily a career-ender.

But for the director of the US’s top intelligence agency it’s nothing less than a national security risk. The affair could have provided potential blackmail fodder to foreign intelligence agencies while raising the possibility of just the kind of security breach Petraeus may now be charged with. After all, once classified information is in the hands of a single unauthorized individual, it can leak even further, the people beyond the intended recipient. And as CIA director, Petraeus security clearance was virtually limitless.

The Petraeus scandal quickly took on a tawdry aspect as news of the affair broke in the days after President Barack Obama’s re-election. It turns out the adultery was exposed because Jill Kelley, a friend of Petraeus who lived near US Central Command headquarters in Tampa, Florida and was active in local military support circles, had allegedly received threatening emails from a jealous Broadwell that she later reported to the FBI. The resulting investigation uncovered Petraeus’s affair with Broadwell and ended the retired general’s career in government.

But the possible charges shows that there’s a deeply serious side to this soap opera, with a sitting CIA director possibly violating his security clearance, thus proving that the affair had the potential to endanger US national security.

Business Insider reached out to Robert Barnett, the lawyer Petraeus hired in the aftermath of his resignation, for comment. He declined to comment.

http://www.businessinsider.com/new-york-times-reports-david-petraeus-may-be-charged-with-leaking-classified-information-2015-1

 

Citizen’s Commission on Benghazi Reveals Damning New Report

Editor’s Note – The following is the latest interim report from the Citizens’ Commission on Benghazi. The commission is part of Accuracy in Media(AIM) of which MG Paul E. Vallely, CEO of Stand Up America US is a charter member. The following are also members of the commission:

Roger Aronoff  (Editor, Accuracy in Media)Capt. Larry Bailey, (SEAL), USN (Ret.)Lieutenant Colonel Kenneth Benway, U.S. Army Special Forces (Retired)Col. Dick Brauer Jr., USAF (Ret.)Lt. Col. Dennis B. Haney, USAF (Ret.)B/Gen. Charles Jones, USAF (Ret.)Clare Lopez, former CIA officerAdmiral James Lyons (Ret.)General Thomas McInerney (Ret.)Col. Wayne Morris USMC (Ret.)Chet NagleJohn A. ShawKevin Shipp, former CIA officerWayne Simmons, former CIA officerFormer Congressman and Retired Army Lieutenant Colonel Allen West.

The following story was published in the UK in the Daily Mail. Roger Aronoff also posted a letter to the press that you can read here. Roger Cover Letter Interim Report 4-22-14 (2).

Here is the full 30-page Interim Report published by the commission.

Benghazi attack could have been prevented if US hadn’t ‘switched sides in the War on Terror’ and allowed $500 MILLION of weapons to reach al-Qaeda militants, reveals damning report

  • Citizens Committee on Benghazi claims the US government allowed arms to flow to al-Qaeda-linked militants who opposed Muammar Gaddafi
  • Their rise to power, the group says, led to the Benghazi attack in 2012
  • The group claims the strongman Gaddafi offered to abdicate his presidency, but the US refused to broker his peaceful exit
  • The commission, part of the center-right Accuracy In Media group, concluded that the Benghazi attack was a failed kidnapping plot
  • US Ambassador Chris Stevens was to be captured and traded for ‘blind sheikh’ Omar Abdel-Rahman, who hatched the 1993 WTC bombing plot

By DAVID MARTOSKO, U.S. POLITICAL EDITOR

Published at the Citizens’s Commission on Benghazi and cross-posted at the UK’s Daily Mail

The Citizens Commission on Benghazi, a self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented – if the U.S. hadn’t been helping to arm al-Qaeda militias throughout Libya a year earlier.

‘The United States switched sides in the war on terror with what we did in Libya, knowingly facilitating the provision of weapons to known al-Qaeda militias and figures,’ Clare Lopez, a member of the commission and a former CIA officer, told MailOnline.

She blamed the Obama administration for failing to stop half of a $1 billion United Arab Emirates arms shipment from reaching al-Qaeda-linked militants.

‘Remember, these weapons that came into Benghazi were permitted to enter by our armed forces who were blockading the approaches from air and sea,’ Lopez claimed. ‘They were permitted to come in. … [They] knew these weapons were coming in, and that was allowed..

‘The intelligence community was part of that, the Department of State was part of that, and certainly that means that the top leadership of the United States, our national security leadership, and potentially Congress – if they were briefed on this – also knew about this.’

The weapons were intended for Gaddafi but allowed by the U.S. to flow to his Islamist opposition. (See Video Below)

The Citizens Committee on Benghazi released its interim findings on April 22, 2014 in Washington. Pictured are (L-R) Clare Lopez, Admiral (Ret.) Chuck Kubic, Admiral (Ret.) James 'Ace' Lyons, former CIA officer Wayne Simmons and civil rights attorney John Clarke

On September 11, 2012 armed terror-linked militias attacked U.S. diplomatic outposts in Benghazi, Libya, killing four Americans and driving the United States out of that part of the country

‘The White House and senior Congressional members,’ the group wrote in an interim report released Tuesday, ‘deliberately and knowingly pursued a policy that provided material support to terrorist organizations in order to topple a ruler [Muammar Gaddafi] who had been working closely with the West actively to suppress al-Qaeda.’

‘Some look at it as treason,’ said Wayne Simmons, a former CIA officer who participated in the commission’s research.

Retired Rear Admiral Chuck Kubic, another commission member, told reporters Tuesday that those weapons are now ‘all in Syria.’

‘Gaddafi wasn’t a good guy, but he was being marginalized,’ Kubic recalled. ‘Gaddafi actually offered to abdicate’ shortly after the beginning of a 2011 rebellion.

‘But the U.S. ignored his calls for a truce,’ the commission wrote, ultimately backing the horse that would later help kill a U.S. ambassador.

Kubic said that the effort at truce talks fell apart when the White House declined to let the Pentagon pursue it seriously.

‘We had a leader who had won the Nobel Peace Prize,’ Kubic said, ‘but who was unwilling to give peace a chance for 72 hours.’

In March 2011, Kubic said, U.S. Army Africa Commander General Carter told NBC News that the U.S. military was not actively targeting Muammar Gaddafi. That, Kubic revealed, was a signal to the Libyan dictator that there was a chance for a deal.

Gaddafi responded by ‘verifiably … pull[ing] his forces back from key rebel-held cities such as Benghazi and Misrata.’

Christopher Stevens served as the U.S. Ambassador to Libya from June 2012 to September 11, 2012 when he was killed in the attack

Then-Secretary of State Hillary Clinton told the Senate Foreign Relations Committee in January 23 that it mattered little why the Benghazi diplomatic compound was attacked: 'What difference, at this point, does it make?'

Gaddafi wanted only two conditions to step down: permission to keeo fighting al-Qaeda in the Islamic Maghreb (AQIM), and the lifting of sactions against him, his family, and those loyal to him.

The Obama administration’s unwillingness to help broker a peaceful exit for the Libyan strongman, ‘led to extensive loss of life (including four Americans)’ when al-Qaeda-linked militants attacked U.S. diplomatic facilities in the city of Benghazi,’ the commission told reporters.

Retired Admiral Chuck Kubic said the White House refused to let the Pentagon pursue a peaceful exit for Muammar Gaddafi: 'We had a leader who had won the Nobel Peace Prize, but who was unwilling to give peace a chance for 72 hours'

The White House and the National Security Staff did not immediately respond to questions about the group’s findings.

‘We don’t claim to have all the answers here,’ said Roger Aronoff, whose center-right group Accuracy in Media sponsored the group and its work.

‘We hope you will, please, pursue this,’ he told reporters. ‘Check it out. Challenge us.’

The commission and AIM filed 85 document requests under the Freedom Of Information Act, hitting the Department of Defense, State Department, Federal Bureau of Investigation and Central Intelligence Agency with demand after demand.

But most of its information has come from insiders with deep knowledge of the flow of weapons in Libya and elsewhere in the African Maghreb.

Admiral James ‘Ace’ Lyons told the group that he believes the raid on the Benghazi compound was intended as a kidnapping exercise, aimed at snatching U.S. Ambassador Chris Stevens and demanding a prisoner swap for the ‘blind sheikh’ Omar Abdel-Rahman.

Abdel-Rahman is serving a life sentence in federal prison for planning the 1993 bombing of the World Trade Center garage in New York City. He also masterminded a plan, later foiled, to blow up the United Nations, both the Lincoln and Holland tunnels, the George Washington Bridge and a federal building where the FBI had a base of operations.

A senior FBI source, Lyons said Tuesday, ‘told me that was the plan.’

The attack, history shows, grew in intensity and resulted in the deaths of Stevens and three other U.S. personnel.

Lyons also said U.S. claims that it lacked the resources to mount a counterattack in time to save lives is false.

‘I’m going to tell you that’s not true,’ he said. ‘We had a 130-man unit of forces at Sigonella [AFB in Italy]. They were ready to go.’

‘The flight time from Sigonella to Benghazi is roughly an hour.’

Killed: An image captured by a cellular phone camera shows the arrest of strongman Muammar Gaddafi in Sirte, Libya on October 20, 2011

Former CIA officer Clare Lopez accused the U.S. government of allowing arms to flow to al-Qaeda militants who opposed Gaddafi in 2011, 'switching sides in the war on terror'

Some of the group’s claims strain credibility, including the assertion that the Obama administration’s early effort to blame the Benghazi attack on a protest against a crude anti-Muslim YouTube video ‘appears to have been well-coordinated with U.S.Muslim Brotherhood organizations as well as Islamic state members of the Organization of Islamic Cooperation (OIC).’

Those groups, the commission noted, ‘all joined in condemnation of the video, and, even more troubling, issued calls for restrictions on Americans’ free speech rights.’

But Simmons, the former CIA officer, criticized the Obama administration on the familiar refrain of then-Secretary of State Hillary Clinton exclaiming in a Senate hearing that it mattered little why the Benghazi facilities were struck.

‘They believed they were going to be saved, that they were going to be rescued, but they weren’t,’ Simmons said of the four Americans who died.

‘I know who made the decision, in my heart of hearts, to leave our war fighters there and be blown up. And then to have one of the most powerful politicians in our country sit there and say, “What difference does it make?” – should be an alarm bell for all Americans.

‘It haunts me,’ Simmons said. ‘I play that line over, and over, and over, and over in my mind.’

The group has called for a Select Congressional Committee to investigate the Benghazi episode. A total of 189 House members have signed on to a bill that would create the committee, which would be bipartisan and have sweeping powers to subpoena the executive branch.

House Speaker John Boehner, Lopez said Tuesday, ‘he blocked it. One has to wonder if he and Congress have had some sort of briefing on what happened.’

Kubic insisted that Congress is unable to break logjams in the Obama administration and find out what happened in the days leading up to and following the Benghazi attack without a new committee.

‘If they don’t have strong subpoena power, if they don’t have the ability to do long-term cross examination, it won’t work,’ he said.

 

The Benghazi Scandal Is “Obama’s Watergate” But Worse

This article was first published by Global Research on May 2, 2014.

A trail of emails released Tuesday appears to shed yet more light on the Benghazi cover-up story that continues to nag President Obama and then Secretary of State and current Democratic presidential hopeful Hillary Clinton. The latest exposure indicates that both Obama and Clinton knew that UN Secretary Susan Rice’s claim to the press that the attack on the Benghazi compound killing Libyan Ambassador Christopher Stevens and three other Americans was due to an anti-Muslim youtube video was a complete lie. This latest piece of incriminating evidence is what Republicans are now calling their “smoking gun” despite months that have stretched into years of the Congressional investigation led by Representative Darrel Issa (R-CA). His so called investigation that was supposed to uncover the truth behind that fateful day of September 11th, 2012 has often been labeled “a witch hunt” by Democrats and supporters of Obama and Hillary Clinton.

This week’s news may be the needed breakthrough that will ultimately lead to the unveiling of what many critics of the Obama administration have been claiming all along. And that is Obama and Hillary purposely withheld the truth from the American public for fear that it would derail Obama’s reelection less than two months after the death of the four Americans in Benghazi. In retrospect now Obama’s rush to war in Syria last September is far better understood when taking a hard look at the 2012 Benghazi embassy attack.

The so called Arab spring uprising revolts in Middle Eastern and North African nations in fact have been the result of covert manipulation by the CIA. After getting rid of our one time allies in Iraq’s Saddam Hussein and Egypt’s Hosni Mubarak, next on the US regime-change hit list came Libya’s Muammar Gaddafi. In 2007 retired General Wesley Clark revealed a neocon plan he became privy to a couple weeks after 9/11 of the ambitious Bush administration agenda to take down seven sovereign governments in the next five years that included Afghanistan, Iraq, Sudan, Somalia, Libya, Syria and Iran.

With gusto President Obama inherited this same agenda and proceeded to finish the job in removing Libya’s longtime dictator Gaddafi. And so began the NATO air bombardment of Libya killing many innocent victims that softened the resistance to an all out assault on Gaddafi’s military forces largely spearheaded by al Qaeda mercenaries from all over the Middle East as well as native Libyan al Qaeda affiliated militia groups, some from Benghazi.

In the spring of 2011 even prior to Gaddafi’s capture and killing, as an envoy to the rebel coalition the future Libyan Ambassador Christopher Stevens was sent to Benghazi, a city in eastern Libya that has long been a hotbed of Islamic extremism that includes various Al Qaeda affiliated groups and militias. Stevens spoke Arabic and had twenty years of foreign diplomatic service experience when he was selected to become the Ambassador after the fall of the Gaddafi government. The State Department resent him to work back in Benghazi rather than the Libyan capitol Tripoli to assist the area’s transition to the new puppet government the US had installed. But because Benghazi and eastern Libya had a history of resisting national governance, Stevens faced an uphill struggle and near impossible task. Beginning in June of 2012, a full three months prior to the Benghazi embassy compound attack that killed the Ambassador and three other Americans, Stevens’ requests for increased security began falling on deaf ears in Washington. Stevens’ boss, Secretary of State Hillary Clinton, failed to heed any of his increasingly urgent calls. Just days prior to the embassy onslaught, the British consulate had been attacked and all its diplomatic staff were safely evacuated away.

Last year efforts to blame Stevens for irresponsibly turning down security offered in Benghazi were anonymously leaked, insisting that the ambassador twice had turned down offers of increased military security from AFRICOM commander General Ham.

For obvious reasons the now retired general refuses to discuss what he knew or did not know of the events leading up to the Benghazi attack. However, throughout the aftermath of the Americans’ deaths, Stevens’ own deputy ambassador Gregory Hicks in Tripoli has maintained that he never knew of any such alleged offers made to Stevens for more security.

Since the strategy targeting Ambassador Stevens as the sole reason for the lack of security at his embassy compound clearly backfired, a whitewashed report was released last year by the Accountability Review Board. The two men behind this report are Hillary’s buddies Ambassador Pickering and former Joint Chiefs of Staff Admiral Mullens. Thus no surprise that they decided from the outset that it would not be necessary to even bother to interview Hillary, satisfied to blame it on lower level State Department bureaucrats’ error in judgment not to supply adequate security. The alleged failure to authorize proper military security was because the Benghazi compound was relegated to being a temporary outpost. Of course this is just another feeble attempt to shield Queen Hillary who sent Stevens herself to Benghazi fully aware of it being an al Qaeda trouble spot.

But Benghazi under the cover of the State Department was ideal for the covert CIA and Joint Special Operations Command (JSOC) needed to coordinate arms smuggling that Obama, Hillary and then CIA Director Petraeus were knee deep in. Stevens ultimately may have felt he was being used as the convenient decoy for the clandestine activity he wanted no part of.

Years earlier as a former Peace Corps volunteer and a seasoned career diplomat, becoming a lookout for an immoral criminal gun running operation may not have been what he had signed on for as the Libyan Ambassador. Thus, he very likely voiced his objection to what his bosses in Washington were misusing him for, and as vindictive and petty as Obama and Hillary are, Stevens was likely punished for not going along with their program. Hence, all his urgent pleas that began as early as June 2012, a full three months prior to the September attack, requesting increased security were ignored, including his desperate cry for help moments before his murder on the night of the 11th. Meanwhile, as he and three other Americans lay dying, back in the States Obama was flying out West to another high brow fundraiser so he could self-servingly get reelected.

What is most certain is that this trouble spot region was the hub of activity for special ops units comprised of special forces and a large number of CIA operatives in conjunction with British MI6. The CIA safely defended annex in Benghazi a mere mile and a half from the embassy compound was the largest CIA station in North Africa. The annex housed 35 CIA personnel responsible for coordinating the large arms smuggling operation to Syria, circumventing Congress by calling the CIA mission a liaison operation.

Two former special ops operatives Brandon Webb and Jack Murphy, authors of ‘Benghazi: The Definitive Report,’ have since claimed that a bureaucratic breakdown in communication between CIA and JSOC caused local Benghazi radicals to attack and kill Americans on 9/11/12. They believe that just days before an assassination carried out by Special Operations of a popular Libyan CIA informant had angered an al Qaeda affiliated militia called Ansar al-Sharia to launch the attack as retribution. The former Special Ops boys, one of whom was friends with one of the killed Americans Glen Doherty, speculated that the root cause of the American embassy deaths was the result of the left hand not knowing what the right hand was doing in the over-compartmentalized, ultra-guarded secrecy of competing clandestine intelligence operations and that this problem commonly serves as a major barrier and significant dysfunction of American foreign policy in general. They believe the Ambassador was probably only peripherally aware of the high presence of CIA and JSOC operations in the area but was never directly involved or looped in.

This claim appears to be a disinformation ploy to again absolve the higher ups Obama and Clinton of any responsibility. It did little to quiet the conjecture surrounding the attack that Stevens knew too much and had become a thorn in the side of the hierarchical status quo.

Though the former special ops authors may have offered small minor details on the Benghazi story, obviously far more was going down than they alluded to. On October 26th, 2012 a mere two weeks prior to the David Petraeus-Paula Broadwell affair broke as the scandalous headlines, Broadwell hyping her ‘All In’ biography of the general spoke at the University of Denver divulging her inside scoop on the Benghazi attack that had taken place a month and a half earlier. She claimed the attack on the compound was probable payback for CIA detaining local members from the same Libyan militia responsible for the assault. Or that the attackers may have been attempting to free their prisoners. Though only one news reporter from Fox paid any attention to Paula at the time, once their tryst was exposed a short time afterwards, much speculation raised the issue that Broadwell unwittingly revealed classified information that could well have been leaked through her intimacy with the then CIA Director. That the mistress was privy to such insider lowdown compromising sensitive US intelligence operations headquartered at the CIA Benghazi annex is a very real possibility, especially since classified documents were later uncovered at her North Carolina home.

In view of the CIA’s fervent denial that any prisoners were detained in Benghazi and Obama’s January 2009 executive order outlawing the CIA business of holding prisoners, Paula shooting her mouth off as an insider know-it-all implicated her lover Petraeus and his CIA as criminals engaging in an unlawful operation. But then that illegal activity amounts to small peanuts in comparison to the much bigger crime being committed by her lover CIA boss Petraeus and his crime bosses Obama and Hillary for using the same Libyan al Qaeda militants who murdered the four Americans on 9/11/12 to smuggle guns from Benghazi across international borders to be used against Assad in Syria.

Despite Ambassador Stevens’ repeated requests for more security, it was never given. So when about 150 members of the local militia Ansar al-Sharia stormed the gates of the compound carrying machine guns and rocket propelled grenades (RPG’s), the handful of unarmed Libyan security contractors instantly fled and soon enough the building was engulfed in flames. The nearby annex in Benghazi where thirty-five CIA operatives worked was called during the crisis to assist those Americans at the embassy. CIA security officer Tyrone Woods convinced his supervisor at the annex with five other security personnel to rush to the embassy’s aid. Both Woods and Glen Doherty were former Navy Seals commandos who died from bullet wounds at the second attack at the annex killed by a mortar after Sean Smith, an information officer, and Ambassador Stevens had already died from smoke inhalation. According to authors Webb and Murphy, due to Woods and Doherty’s heroics along with four other CIA analysts, the remaining embassy staff were apparently able to safely escape the burning compound. An overhead surveillance drone had been dispatched above the compound prior to that second attack that occurred at the annex. President Obama, Secretary of State Clinton and CIA Director Petraeus were all informed of the crisis unfolding during the afternoon local Washington time. Yet they chose to not even bother contacting the Marines stationed in the capital Tripoli, allegedly figuring they would take too long to arrive on the scene in Benghazi. So after ignoring the Ambassador’s pleas urging for more security for three straight months, they coldly refused to order any further military assistance at the time the four Americans lost their lives.

Instead they ordered UN Ambassador Susan Rice to later lie to the American public claiming that the attack was instigated by that anti-Moslem youtube video. Under the increasing pressure of Benghazi questions, suddenly Hillary keeled over with a brain clot to conveniently dodge any more heat. And of course Petraeus was soon engulfed in scandal with his mistress Broadwell, retiring from the CIA and out of sight for months thereafter, conveniently ducking from his hot seat. And then soon enough Clinton was resigning as Secretary of State, evading any further scrutiny as the Ambassador’s boss most responsible for the deaths of the four Americans.

Another piece of incriminating evidence is that the FBI team sent in to investigate the Benghazi murders never even arrived at the crime scene until three weeks after the attack, making sure that vital forensic evidence could be conveniently lost, confiscated or destroyed. Despite having videotape that allowed individual attackers to be identified by name, they all still remain free to this day. Eleven months after the attack the US Justice Department last August in a hollow gesture officially charged the alleged suspects in a sealed indictment. But without them in custody, it means nothing.

Clinton strategically figured she would lay low long enough out of the public spotlight to effectively distance herself from Benghazi to make another run for President in 2016. But while briefly still back on the job and those nagging Benghazi questions weren’t going away fast enough, she completely lost it, screaming, “What difference at this point does it make?” – obviously all the difference in the world to her and her buddy Barrack. On 9/11 the year before last, Obama, Clinton and Petraeus sacrificed four American lives that day to preserve their own careers as powerful evil despots who with blind ambition would stop at nothing to remain in power.

President Obama and Hillary Clinton have both gone to great lengths to make sure that their cover-up concealing the truth never gets exposed. With the attack taking place less than two months prior to Obama’s reelection, they are determined that the truth never sees the light of day. However, big cracks are looming in their wall of defense and their lies are falling like a house of cards. Mounting evidence indicates both Obama and Clinton were engaged in a highly covert and illicit arms smuggling operation moving weapons from Libya through Turkey to the anti-Assad rebels in Syria. And at stake for Obama and Clinton was their future plans to win the presidential election in 2012 and 2016.

On August 2nd, 2013 three full weeks prior to the sarin gas attack in the Damascus suburb killing scores of Syrian civilians including children, UK’s Telegraph reporter Damien McElroy wrote an article asserting that Obama and Hillary are guilty as charged, engaging in a gun-running operation that included surface to air missiles and even chemical weapons speculating that a “false flag operation” might occur as a deceptive ploy to make false accusations against Assad. Again, this article came out three weeks PRIOR to Obama accusing Assad of using chemical weapons. No coincidence in the timing. Since then renowned investigative reporter Seymour Hersh who broke the My Lai massacre story and cover-up during the Vietnam War and a host of other journalists have since provided convincing evidence that the chemical attack last August was committed by US backed al Qaeda rebels.

And those 35 CIA agents stationed at the nearby Benghazi annex, word came out that every month since the event they have been required to undergo polygraph tests just to ensure they keep quiet. One insider even told CNN last year, “You jeopardize your family as well if you talk to anyone about what happened.”

Aside from Obama, Hillary and Petraeus evading accountability at all cost, what is most incriminating is that the very same Al Qaeda jihadists armed, financed and supported with American taxpayer dollars during the Libyan regime-change are the exact same individuals who have gotten away with murdering those four Americans in Benghazi. For more than three years now America and Saudi Arabia have been sponsoring and funding al Qaeda affiliated militia groups from all over the Middle East and North Africa fighting Assad forces in Syria in the latest regime-change war. When the murders went down on 9/11/12, Hillary’s State Department had been acting as a cover supporting al Qaeda elements smuggling arms to Syria to fight in that so called civil war. Much of Gaddafi’s huge stash of arms had been looted, falling into the hands of American-backed rebel forces in Libya, including chemical weapons that were never accounted for. By pure accident, the Benghazi tragedy reveals the ongoing war by proxy that the US, Saudi Arabia and Israel have been waging against Syria and its strongest allies Iran and Russia.

As a side note, ex-CIA Director Petraeus was allowed to retain his full status as a retired four star general at full pay despite committing adultery while still serving as Afghanistan War commander when military personnel of lower rank are customarily demoted and forced to retire at a lower pension rate for the exact same offense of adultery. Mistress Paula Broadwell also suffered no formal consequence regarding her retention rank as major in the US Army Reserves. It seems obvious that Petraeus has been rewarded for his loyal silence on the Benghazi incident. Additionally, several days after Petraeus ducked out of sight in disgrace after resigning as CIA Director, Petraeus’ wife as the victim of his adulterous affair was suddenly being promoted by Obama to a new cushy position made especially for her earning near Petraeus’ retirement pension of $200,000 per year.

Then just over a week after his CIA resignation Petraeus was called in to testify before the House Intelligence Committee but given a free pass in his not having to testify under a sworn oath to disclose the full truth of what he knew. So he proceeded to lie before Congress claiming that he consistently said that an al Qaeda affiliated militia group was behind the attack. In fact Petraeus secretly flew to Libya immediately after the attack and upon his return to the US a couple days later Petraeus held the official administration line they knew to be false that the Benghazi attack was due to the bogus anti-Moslem video. Of course with the scandal causing his own presidential ambitions to be thoroughly shattered, Petraeus more recently has gone on public record stating that Hillary Clinton would make “an excellent president.” Clearly he is towing the line as a good little boy for keeping his mouth shut for Hillary and Barrack.

Obama lied when he promised to ensure that those guilty of the attack would be brought to justice. Now going on two years later not one of the attackers has even been apprehended or arrested. With the murderers in the Benghazi assault still at large, many of the attackers afterwards moved on with the arms they were helping to smuggle to join US-supported rebel forces fighting the Assad government in Syria. They may have been silenced by now, secretly killed by judge, jury and executioner President Obama in his lust to kill his enemies with drone missile attacks. In any event, rest assure none of the perpetrators behind the Benghazi attack will ever be captured alive or prosecuted. They simply know too much. Last 9/11/13 barely a peep was heard from the mainstream media on the very first anniversary of the Benghazi tragedy. The reason is all too obvious.

Many of the family members of the murdered Americans felt that Obama and his administration were responsible for their loved ones deaths. Some complained about Obama’s condolences as brusk, insincere and insensitive. They were disturbed further with Obama’s response on a 60 Minutes segment in late January 2013. Obama and Hillary were answering questions about Benghazi when Obama quoted Defense Secretary Robert Gates, “At this moment somewhere, somehow, somebody in the federal government’s screwing up” as he turned to Hillary laughing at his joke about their Benghazi screw-up that killed four Americans. They also had to be upset hearing the president on another occasion callously dismissing the Benghazi tragedy as “a sideshow.”

Not surprisingly, the US installed puppet government in Libya has been of no assistance in its lack of cooperation with revealing any further details of the attack. Last June the chaos, lawlessness and terror in Benghazi only continued as thirty-one Libyans protesting their grievances against an al Qaeda militia group were brutally massacred outside the al Qaeda headquarters. The entire eastern region of Libya today is still not under control of the national government, which has largely been taken over by US backed al Qaeda affiliates. Libya today is in complete shambles steeped in corruption, instability and violence.

Meanwhile, the two American criminals most responsible for the attack, President Obama and presidential heir-apparent Hilary Clinton need to be held accountable for their crimes along with their other partner-in-crime General Petraeus. With the belated truth behind Benghazi slowly coming out, Obama should be impeached and Hillary must never become president. Ironically the crime of Nixon’s Watergate cover-up that brought down the first and only president in US history forced to resign in disgrace pales in comparison to the crimes committed by the likes of the Obama administration.

Joachim Hagopian is a West Point graduate and former Army officer. His written manuscript based on his military experience examines leadership and national security issues and can be consulted at http://www.redredsea.net/westpointhagopian/. After the military, Joachim earned a masters degree in psychology and became a licensed therapist working in the mental health field for more than a quarter century. He now focuses on writing.

http://www.globalresearch.ca/the-benghazi-scandal-is-obamas-watergate-but-worse/5380238

 

Jihadism

 

Jihadism (jihadist movement, jihadi movement and variants) is used to refer to contemporary armed jihad in Islamic fundamentalism. The term “jihadism” is coined in the 2000s and mostly used to cover Islamic insurgency and terrorism since that time, but it has also been extended to cover both Mujahideen guerilla warfare and Islamic terrorism with an international scope since it arose in the 1980s, since the 1990s substantially represented by the al-Qaeda network.

Contemporary jihadism ultimately has its roots in the late 19th and early 20th century ideological developments of Islamic revivalism, developed intoQutbism and related ideologies during the mid 20th century. Its rise was re-enforced by the Soviet invasion of Afghanistan in 1979, and has been propagated in various armed conflicts throughout the 1990s and 2000s. A specifically Salafist jihadism has been diagnosed within the Salafi movement of the 1990s by Gilles Kepel.[citation needed][year needed]

Jihadism with an international, Pan-Islamist scope in this sense is also known as Global Jihadism. Generally the term jihadism denotes SunniIslamist armed struggle. Sectarian tensions led to numerous forms of (Salafist and other Islamist) jihadism in opposition of Shia Islam, Sufi Islamand Ahmadi Islam.

Terminology

Further information: Jihad

The term “jihadism” has been in use since about 2000, reportedly at first in the form “jihadist-Salafism“,[1] and soon reduced to “jihadism”, according to Martin Kramer (2003) first in the Indian and Pakistani media. “At present, jihadism is used to refer to the most violent persons and movements in contemporary Islam, including al-Qaeda.” Gilles Kepel is associated with early usage of the term (French djihadisme), and the term has seen wider use in French media since about 2004.[2] Brachman in his Global jihadism (2008) maintains that the term is “clumsy and controversial”.[3][clarification needed]

The term “Jihadist Globalism” is also often used in relation to Jihadism; Steger (2009) maintains that the concept is “globalist” in nature, stating that “‘jihadist Islamism’ — represented by such groups as Al Qaeda, Jemaa Islamiya, Hamas and Hezbollah — is today’s most spectacular manifestation of religious globalism.” [4]

Jihad Cool is a term used by Western security experts[5] concerning the re-branding of militant Jihadism into something fashionable, or “cool”, to younger people through social media, magazines,[6] rap videos,[7] clothing,[8] toys, propaganda videos,[9] and other means.[10] It is a sub-culture mainly applied to individuals in developed nations who are recruited to travel to conflict zones on Jihad. For example Jihadi rap videos make participants look “more MTV than Mosque”, according to NPR, which was the first to report on the phenomenon in 2010.[5][11]

History

Praying Muhjahideen in Kunar Province, Afghanistan (1987).

Precursor movements

When jihadism is specifically motivated by Pan-Islamism, i.e. the ultimate aim of spreading Islam worldwide under a restored Caliphate, it is often called “Global Jihadism”. But jihadism can also be motivated regionally, in an attempt to establish an Islamic state in a specific homeland. Global Jihadism is usually involved with international Islamic terrorism, while regional jihadism takes the form of guerrilla warfare, possibly also paired with terrorist attacks.

While the western term of “jihadism” was coined only in the early 2000s, and in retrospect applied to developments since the end of the Cold War era, this type of Islamist armed uprising against a secular government goes back to the early 19th century. The transition of this form ofguerilla warfare was the decline of the great Muslim empires of the Early Modern period which could wage war on the scale of a great power and did not need to rely on asymmetric warfare (see Ottoman wars in Europe, Russo-Turkish War (1877–78), Dissolution of the Ottoman Empire). Early jihadist conflicts include:

The Fulani jihad states of West Africa, c. 1830

Modern Islamism developed in the 1920s, and there have been a number of armed “jihads” informed by this movement since then.

Rebels from the militant Islamist sectAnsar Dine in Mali

While the “jihads” waged in the 19th and early-to-mid 20th century occasionally did involve western colonial powers, the phenomenon did remain mostly limited to the Middle East and the wider Muslim World. This changed significantly with the foundation of the state of Israel and the beginning of the Arab–Israeli conflict after the end of World War II. (Islamic Jihad Movement in Palestine 1981–present, Islamic Jihad Organization 1982-1993,Hamas 1987–present). This sparked the beginning of international Islamic terrorism and put “jihadism” on the global agenda.

Islamic revivalism and Salafism (1990s to present)

Main article: Salafi jihadism

The term jihadism (earlier Salafi jihadism) has arisen in the 2000s to refer to the contemporary jihadi movements, the development of which was in retrospect traced to developments of Salafism paired with the origins of Al-Qaeda in the Soviet war in Afghanistan during the 1990s.

Jihadism has been called an “offshoot” of Islamic revivalism of the 1960s and 1970s. The writings of Sayyid Qutb and Muhammad abd-al-Salam Farajprovide inspiration. The Soviet war in Afghanistan (1979–1989) is said to have “amplified the jihadist tendency from a fringe phenomenon to a major force in the Muslim world.[12] It served to produce foot soldiers, leadership and organization. Abdullah Yusuf Azzam provided propaganda for the Afghan cause. After the war veteran jihadists returned to their home countries and dispersed to other sites of Muslim insurgency such as Algeria,Bosnia and Chechnya creating a “transnational jihadist stream.”[13]

Jihad fi sabilillah

A black flag reportedly used byCaucasian jihadists in 2002 displays the phrase al-jihad fi sabilillah above the takbir and two crossed swords.

According to scholar of Islam and Islamic history Rudoph Peters, Traditionalist Muslims “copy phrases of the classical works on fiqh” in their writings on jihad; Islamic Modernists “emphasize the defensive aspect of jihad, regarding it as tantamount to bellum justum in modern international law; and the fundamentalists (Abul Ala Maududi, Sayyid Qutb, Abdullah Azzam, etc.) view it as a struggle for the expansion of Islam and the realization of Islamic ideals.”[14]

Jihad has been propagated in modern fundamentalism beginning in the late 19th century, an ideology that arose in context of struggles against colonial powers in North Africa in the late 19th century, as in the Mahdist War in Sudan, and notably in the mid-20th century by Islamic revivalistauthors such as Sayyid Qutb and Abul Ala Maududi.[15]

Based on this, the phrase is re-used in modern jihadism. Thus, “Fi Sabilillah” armbands were worn by rebels in Xinjiang when battling Soviet forces,[16]and the phrase has been spotted on flags used by jihadists in Caucasia in the 2000s.

Inter-religious

Against Sikhs

A rebel camp was set up in the early 19th century by Sayyid Ahmed Barelvi after leaving India for Afghanistan. There he set up a rebel camp to launch attacks against the Sikh power which was centered in the Punjab before focusing his attention of the British.[17] Waliullah’s teachings directly inspired jihad against Sikhs between 1826 and 1831.[18]

Against Hindus

The Hindu Kush refers to a region in Northwest India and translates as the slaughter of the Hindus. It refers to an incident when Hindus were transported to Muslim courts.[19] Aurangzebsupervised a book called Fatawa al-Hindiyya which dealth with the subject of Jihad.[20] Jihad was also considered by oSIMI in response to the 2002 Gujarat riots.[21]

Against Buddhists

In 1532, Sultan Said Khan launched a jihad against Tibetan Buddhists. He thought that Lhasa was a direction of prayer for all the Chinese and therefore sought to destroy its main temple. The jihadist expedition was led by Mirza Muhammad Haidar Dughlat.[22]

Against Jews

There are references in some hadiths to jihad being launched against Jews.[23] Ayman al-Zawahiri declared a fatwa of jihad against Jews in 1998. One of the earliest Jihads against Jews occurred in 627 AD against the Jewish Banu Qurayza tribe.[24]

Against Zoroastrians

During the Muslim conquest of Persia, Jihadists caused the fall of the largely Zoroastrian Sasanian Empire. Major battles included the Battle of al-Qādisiyyah and Battle of Nahāvand.[25][26]

Against pagans

During Muhammad’s lifetime, there were many battles fought between Muslims and pagans. Examples of these include the Battle of Badr and Battle of the Trench. however after conquest of Makkah in Hijri 8, Muhammad forgave all the pagan enemies which resulted in most of them converting to Islam.

Against atheists

President Reagan meeting withAfghan Mujahideen leaders in the Oval Office in 1983

During the Soviet-Afghan war in the 1980s, many Muslims received calls for a jihad against atheists.[27] Mujahideen were recruited from various countries including Egypt, Pakistan, and Saudi Arabia.[28] The conflict gradually turned from one against occupation to one seen as a jihad.[29]

Against Christians

The European crusaders re-conquered much of the territory seized by the Islamic state, dividing it into four kingdoms, the most important being the state of Jerusalem. The Crusades originally had the goal of recapturing Jerusalem and the Holy Land (former Christian territory) from Muslim rule and were originally launched in response to a call from the Eastern Orthodox Byzantine Empire for help against the expansion of the Muslim Seljuk Turks into Anatolia. There was little drive to retake the lands from the crusaders, save the few attacks made by the Egyptian Fatimids. This changed, however, with the coming of Zangi, ruler of what is today northern Iraq. He took Edessa, which triggered the Second Crusade, which was little more than a 47-year stalemate. The stalemate was ended with the victory of Salah al-Din al-Ayyubi, known in the west as Saladin, over the forces of Jerusalem at the Horns of Hattin in 1187. It was during the course of the stalemate that a great deal of literature regarding Jihad was written.[6] While amassing his armies in Syria, Saladin had to create a doctrine which would unite his forces and make them fight until the bitter end, which would be the only way they could re-conquer the lands taken in the First Crusade. He did this through the creation of Jihad propaganda. It stated that any one who would abandon the Jihad would be committing a sin that could not be washed away by any means. It also put his amirs at the center of power, just under his rule. While this propaganda was successful in uniting his forces for a time, the fervor burned out quickly. Much of Saladin’s teachings were rejected after his death.

Intra-religious

Against Shia

The Syrian Civil War became a focus for Sunni fighters waging jihad on Shia. The al-Nusra Front is the largest jihadist group in Syria.[30] The Muslim Brotherhood in Egypt has called for jihad against the Syrian government and against that government’s Shi’ite allies.[31] Saudi Arabia backs the jihad against the Shia in Syria using proxies.[32] Sunni jihadi converge in Syria from Saudi Arabia, Bahrain, Yemen, Kuwait, Tunisia, Libya, Egypt, Morocco, Jordan, Bosnia, other Arab states, Chechnya, Pakistan, Afghanistan and Western countries.[33]

See also

References

  1. Jump up^ Martin Kramer (Spring 2003). “Coming to Terms: Fundamentalists or Islamists?”. Middle East Quarterly X (2): 65–77. “French academics have put the term into academic circulation as ‘jihadist-Salafism.’ The qualifier of Salafism—an historical reference to the precursor of these movements—will inevitably be stripped away in popular usage. “Jihadist-Salafism” is defined by Gilles Kepel, Jihad: The Trail of Political Islam (Harvard: Harvard University Press, 2002), pp. 219-22; and Guilain Deneoux, “The Forgotten Swamp: Navigating Political Islam,” Middle East Policy, June 2002, pp. 69-71.”
  2. Jump up^ DJIHADISME Une déclaration de guerre contre Moubarak, Courrier International, 14 October 2004;Islamisme radical et djihadisme en ligne Le Monde 28 September 2005.
  3. Jump up^ Brachman 2008, p. 4: “Jihadism is a clumsy and controversial term.”
  4. Jump up^ Steger, Manfred B. Globalization: A Short Introduction. 2009. Oxford University Publishing, p. 127.
  5. ^ Jump up to:a b Laura Italiano (June 20, 2014). “American Muslims flocking to jihadist group”. New York Post. RetrievedAugust 22, 2014.
  6. Jump up^ Steve Emerson (April 15, 2013). “Jihad is Cool: Jihadist Magazines Recruit Young Terrorists”. Family Security Matters. Retrieved August 22, 2014.
  7. Jump up^ J. Dana Stuster (April 29, 2013). “9 Disturbingly Good Jihadi Raps”. Foreign Policy. Retrieved August 22, 2014.
  8. Jump up^ Robert Spencer (August 7, 2014). “India: Imam arrested for distributing Islamic State t-shirts”. Jihad Watch. RetrievedAugust 22, 2014.
  9. Jump up^ Jytte Klausen (2012). “The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign”. Perspectives on Terrorism 6 (1). RetrievedAugust 22, 2014.
  10. Jump up^ Cheryl K. Chumley (June 27, 2014). “Terrorists go ‘Jihad Cool,’ use rap to entice young Americans”. Washington Times. Retrieved August 22, 2014.
  11. Jump up^ Dina Temple-Raston (March 6, 2010). “Jihadi Cool: Terrorist Recruiters’ Latest Weapon”. National Public Radio. Retrieved August 22, 2014.
  12. Jump up^ Commins, David (2009). The Wahhabi Mission and Saudi Arabia. I.B.Tauris. p. 174.
  13. Jump up^ Commins, David (2009). The Wahhabi Mission and Saudi Arabia. I.B.Tauris. pp. 156, 7.
  14. Jump up^ Peters, Rudolph (1996). Jihad in Classical and Modern Islam: A Reader. Princeton: Marcus Wiener. p. 150.
  15. Jump up^ Rudolph Peters, Jihad in modern terms: a reader 2005, p. 107 and note p. 197. John Ralph Willis, “Jihad Fi Sabil Allah”, in: In the path of Allah: the passion of al-Hajj ʻUmar : an essay into the nature of charisma in Islam, Routledge, 1989,ISBN 978-0-7146-3252-0, 29-57. “Gibb [Mohammedanism, 2nd ed. 1953] rightly could conclude that one effect of the renewed emphasis in the nineteenth century on the Qur’an and Sunna in Muslim fundamentalism was to restore to jihad fi sabilillah much of the prominence it held in the early days of Islam. Yet Gibb, for all his perception, did not consider jihad within the context of its alliance to ascetic and revivalist sentiments, nor from the perspectives which left it open to diverse interpretations.” (p. 31)
  16. Jump up^ Andrew D. W. Forbes (1986). Warlords and Muslims in Chinese Central Asia: a political history of Republican Sinkiang 1911-1949. Cambridge, England: CUP Archive. p. 144. ISBN 0-521-25514-7. Retrieved 2010-06-28.
  17. Jump up^ Landscapes of the Jihad: Militancy, Morality, Modernity – Page 36
  18. Jump up^ Partisans of Allah: Jihad in South Asia – Page 57, Ayesha Jalal – 2009
  19. Jump up^ Islamic Economics and the Final Jihad David J. Jonsson – 2006 – Page 87
  20. Jump up^ Understanding Jihad, David Cook – 2005, r 49
  21. Jump up^ Islamism and Democracy in India, p 147, Irfan Ahmad – 2009
  22. Jump up^ Buddhism and Islam on the Silk Road – Page 174, Johan Elverskog – 2011 -
  23. Jump up^ Sahih Muslim 41:6985, Sahih Muslim 41:6981, Sahih Muslim 41:6982
  24. Jump up^ Guillaume, Alfred, The Life of Muhammad: A Translation of Ibn Ishaq’s Sirat Rasul Allah. Oxford University Press, 1955
  25. Jump up^ Iranian History and Politics: The Dialectic of State and Society By Homa Katouzian, pg. 25
  26. Jump up^ The Expansion of the Saracens-The East, C.H. Becker, The Cambridge Medieval History:The Rise of the Saracens and the Foundation of the Western Empire, Vol. 2, ed. John Bagnell Bury, (MacMillan Company, 1913), 348.
  27. Jump up^ The Far Enemy: Why Jihad Went Global – Page 68, Fawaz A. Gerges – 2009 -
  28. Jump up^ Aging Early: Collapse of the Oasis of Liberties – Page 47, Mirza Aman – 2009
  29. Jump up^ Withdrawing Under Fire, Joshua L. Gleis – 2011
  30. Jump up^ “Inside Jabhat al Nusra – the most extreme wing of Syria’s struggle”. 2 December 2012.
  31. Jump up^ Maggie Fick (June 14, 2013). “Egypt Brothers backs Syria jihad, slams Shi’ites”. Reuters.
  32. Jump up^ Robert F. Worth (Jan 7, 2014). “Saudis Back Syrian Rebels Despite Risks”. New York Times.
  33. Jump up^ Mark Hosenball (May 1, 2014). “In Iraq and Syria, a resurgence of foreign suicide bombers”. The Economist.
  34. Jump up^ Darion Rhodes, Salafist-Takfiri Jihadism: the Ideology of the Caucasus Emirate, International Institute for Counter-Terrorism, March 2014

Literature

  • Abbas, Tahir (2007). Islamic Political Radicalism: A European Perspective. Edinburgh University Press. ISBN 978-0-7486-2528-4.
  • Akbarzadeh, Shahram (2010). Islam and Political Violence: Muslim Diaspora and Radicalism in the West. I B Tauris & Co Ltd. ISBN 978-1-84511-473-2.
  • Al-Rasheed, Madawi (2009). Dying for Faith: Religiously Motivated Violence in the Contemporary World. I B Tauris & Co Ltd. ISBN 978-1-84511-687-3.
  • Aslan, Reza (2010). Global Jihadism. ISBN 978-3-639-25006-0.
  • Gilles Kepel, Jihad: The Trail of Political Islam (2000, 2002, 2006).
  • Brachman, Jarret (2008). Global jihadism: theory and practice. vol. 10 of Cass series on political violence, Taylor & Francis. ISBN 978-0-415-45241-0.*The Devolution of Jihadism: From Al Qaeda to Wider Movement. Stratfor. 2010. ISBN 978-1-4537-4664-6.
  • Coolsaet, Rik (2008). Jihadi Terrorism and the Radicalisation Challenge in Europe. Ashgate. ISBN 978-0-7546-7217-3.
  • Hegghammer, Thomas (2010). Jihad in Saudi Arabia: Violence and Pan-Islamism since 1979. Cambridge University Press. ISBN 978-0-521-51858-1.
  • Khosrokhavar, Farhad (2009). Inside Jihadism: Understanding Jihadi Movements Worldwide. Paradigm. ISBN 978-1-59451-616-0.
  • Lahoud, Nelly (2010). The Jihadis’ Path to Self-destruction. C Hurst & Co Publishers Ltd. ISBN 978-1-84904-062-4.
  • Lohlker (ed.), Rüdiger (2013). Jihadism: Online Discourses and Representations. Vienna University Press. ISBN 978-3-8471-0068-3.
  • Lohlker (ed.), Rüdiger (2012). New Approaches to the Analysis of Jihadism. Vienna University Press. ISBN 978-3-89971-900-0.

http://en.wikipedia.org/wiki/Jihadism

 

al-Nusra Front

From Wikipedia, the free encyclopedia
al-Nusra Front
(Arabic: جبهة النصرة لأهل الشام‎)
Participant in the Syrian Civil War, the Syrian Civil War spillover in Lebanon, and the Global War on Terrorism
Flag of the Al-Nusra Front.svg

Flag of the al-Nusra Front
Active 23 January 2012 – present[1]
Ideology Salafist Jihadism[2]
Islamic fundamentalism[3]
Leaders Abu Mohammad al-Julani[4]
Headquarters
Area of operations
Strength 5,115–6,115 (including 50 Khorasan members)[8][9][10]
Part of
Allies
Opponents State opponents
Syria

Lebanon

United States of America

Non-State Opponents

Battles and wars Syrian Civil War

2014 military intervention against ISIL

The al-Nusra Front, or Jabhat al-Nusra, (JN, Arabic: جبهة النصرة لأهل الشامJabhat an-Nuṣrah li-Ahli ash-Shām, “The Support Front for the People of Al-Sham“), sometimes called Tanzim Qa’edat Al-Jihad fi Bilad Al-Sham or al-Qaeda in Syria,[25] is a branch of al-Qaedaoperating in Syria[26] and Lebanon.[27]

The group announced its formation on 23 January 2012, during the Syrian Civil War.[28] Since then, it has been described as both “the most aggressive and successful”[29] and “one of the most effective rebel forces” in Syria.[30] The group has been designated as a terrorist organization by the United Nations,[31] Australia,[32] Canada, New Zealand,[33][34] Russia,[35] Saudi Arabia, the United Kingdom,[36] the United States,[37] and Turkey.

Ideology

al-Nusra aims to overthrow the Assad regime and replace it with a Sunni Islamic state. Although the group is affiliated with al-Qaeda, al-Nusra does not emphasize Western targets or global jihad, focusing instead on the “near enemy” of the Syrian state.[38]

This resistance group is generally made up of native Syrian mujahideen who adhere to Sunni Islam.[39][40] Its goal is to overthrow Bashar al-Assad‘s regime in Syria and create an Islamic Emirate under Sharia law.[41][42]

In early 2014, Dr. Sami Al Oraidi, a top Sharia official in the group, acknowledged that his group is influenced by the teachings of Abu Musab al-Suri. The strategies derived from Abu Musab’s guidelines include: providing services to people, avoid being seen as extremists, maintaining strong relationships with communities and other fighting groups, and putting the focus on fighting the regime.[43]

Members of the group are accused of attacking the religious beliefs of non-Sunnis in Syria, including the Alawis.[44] New York Timesjournalist C. J. Chivers cites “some analysts and diplomats” as noting that al-Nusra Front and the Islamic State of Iraq and the Levant“can appear less focused on toppling” the al-Assad government than on “establishing a zone of influence spanning Iraq’s Anbar Province and the desert eastern areas of Syria, and eventually establishing an Islamic territory under their administration.”[45]

Members of the group have referred to the United States and Israel as enemies of Islam[44] and warned against Western intervention in Syria.[46] Syrian members of the group claim they are only fighting the Assad government and would not attack Western states.[46] The United States accused it of being affiliated with al-Qaeda in Iraq;[47] in April 2013, the leader of al-Qaeda in Iraq released an audio statement affirming this connection.[48][49][50]

Analysis

The leader, a self-proclaimed Emir, of al-Nusra goes by the name of Abu Mohammad al-Julani (also transliterated as: Mohammed and al-Jawlani, or: al-Golani), which implies that he is from the Golan Heights (al-Jawlan, in Arabic). Very little is known about him, with even his nationality unclear.[51] However, in an interview with Al Jazeera, he spoke Classical Arabic with a Syrian accent.[52]

On 18 December 2013, he gave his first television interview, to Tayseer Allouni, a journalist originally from Syria, for Al Jazeera.[52]

The structure of the group varies across Syria. In Damascus the organisation operates in an underground clandestine cell system, while in Aleppo, the group is organized along semi-conventional military lines, with units divided into brigades, regiments, and platoons.[51] All potential recruits must undertake a 10-day religious-training course, followed by a 15-to-20-day military-training program.[1]

Al-Nusra contains a hierarchy of religious bodies, with a small Majlis-ash-Shura (Consultative Council) at the top, making national decisions on behalf of the group. Religious personnel also play an important role in the regional JN leadership, with each region having a commander and a sheikh. The sheikh supervises the commander from a religious perspective and is known as dabet al-shar’i (religious commissioner).[51]

An increasing number of Americans have been attempting to join the fighting in Syria, As MD Ahmad Zarkali and Thayer al-atheim and fifty of friends specifically with al-Nusra.[53] Most recently, Sinh Vinh Ngo Nguyen, also known as Hasan Abu Omar Ghannoum, was arrested in California on 11 October 2013, on charges of attempting to travel to join Al Qaeda after reportedly having fought in Syria.[53]As of November 2013 there had also been five additional publicly disclosed cases of Americans fighting in Syria, three of which were linked to al-Nusrah.[54]

All statements and videos by the al-Nusra Front have been released by its media outlet, al-Manarah al-Bayda (The White Minaret), via the leading jihadist webforum Shamoukh al-Islam.[1]

History

Background

The Quilliam Foundation, in a briefing paper, reports that many of the group’s members are Syrians who were part of Abu Musab al-Zarqawi‘s Islamist network fighting the American forces in Iraq. Many of these Syrians remained in Iraq after the withdrawal of American forces, but upon the outbreak of Syrian civil war in 2011, the Islamic State of Iraq sent the Syrian mujahideen and individual Iraqi experts in guerrilla warfare into Syria. A number of meetings were held between October 2011 and January 2012 in Rif Dimashq and Homs where the objectives of the group were determined.[51]

The al-Nusra Front released its first public statement on January 24, 2012, in which they called for armed struggle against the Syrian government. The group claimed responsibility for the2012 Aleppo bombings, the January 2012 al-Midan bombing, the March 2012 Damascus bombings,[28] the murder of journalist Mohammed al-Saeed,[55] and possibly the 10 May 2012 Damascus bombings.[citation needed]

Iraqi Foreign Minister Hoshyar Zebari has said that al-Qaeda in Iraq members have gone to Syria, where the militants previously received support and weapons, in order to join the al-Nusra Front.[56] They are considered to be the best trained and most experienced fighters among the Syrian rebels.[57] The group has refused calls for a ceasefire in Syria.[58]

US intelligence agencies had originally suspected al-Qaeda in Iraq for the bombings in Aleppo and Damascus.[59] Iraq’s deputy interior minister said early February that weapons and Islamist militants were entering Syria from its country.[60] The Front claimed credit for suicide attacks in the Syrian capital of Damascus al-Zahra al-Zubaydi.[61] A defected diplomat named Nawaf al-Fares stated in an interview with the The Daily Telegraph that jihadis were used by the Syrian government in attacks against civilians so that the government could blame the deaths on Syrian rebels.[62]

Role in the Syrian Civil War

The al-Nusra Front has been a great help to Syrian rebels in the Battle of Aleppo. One rebel said that members of the group “rush to the rescue of rebel lines that come under pressure and hold them […] They know what they are doing and are very disciplined. They are like the special forces of Aleppo.”[58] After the US designated the al-Nusra Front as an al-Qaeda linked terrorist group, several rebel groups defied the US classification and rallied behind the al-Nusra Front, declaring, “We are all Jabhat Al Nusra.”[63] A Free Syrian Army (FSA) leader in Aleppo berated the move, and a FSA spokesman in Aleppo said, “We might not share the same beliefs as Jabhat al-Nusra, but we are fighting the same enemy.”[64] Some FSA fighters defected to the al-Nusra Front.[65]

While some FSA leaders are worried by the al-Nusra Front’s theocratic ideology and plans for Syria’s future, they see foreign extremists as a welcomed boost to the fight against the Assad regime, bringing experience from Iraq and Afghanistan.[46][58] While FSA has consistently stated their disapproval of al-Nusra Front’s use of suicide bombs, they have also thanked them for some suicide operations with strategic benefit, such as the attack on the Menagh Airbase.[58][66] Some disgruntled voices within the FSA accused the al-Nusra Front and others of “hijacking a revolution that began as an uprising to demand a democratic system.”[46] The leader of a rebel group in Idlib Province said “We are not fighting Bashar al-Assad to go from living in an autocratic to a religious prison”.[46] A “senior political official” of the FSA said “Their presence is reducing the popular support that we desperately need in areas where we operate […] I appreciate their motives for coming to Syria. We cannot deny Muslims their right to jihad, but we want them to leave”.[58] In some parts of Syria, “Jihadist and secular rebel groups watch each other’s military bases warily, unclasping the safety catches on their guns as they pass.”[46] Some members of the FSA believe that, after the Assad government has been overthrown, the next war will be between the FSA and the Islamists.[46]

The leader of the National Coalition for Syrian Revolutionary and Opposition Forces, Moaz al-Khatib, called on the US to reconsider its decision to list the al-Nusra Front as a foreign terrorist organization; al-Khatib has stated that all rebel forces whose main goal is “the fall of the regime” should be left alone.[67] After the listing of al-Nusra as a terrorist organisation by the US in December 2012, a group of 29 opposition groups, including both fighting units and civilian organizations signed an online petition calling for demonstrations in its support.[68] On 14 December 2012, thousands of Syrians protested against the US move, under the slogan of “There is no terrorism in Syria except that of Assad.”[69]

Split with Islamic State of Iraq

In April 2013, the leader of the Islamic State of Iraq (ISI), Abu Bakr al-Baghdadi, released a recorded audio message on the Internet, in which he announced that Jabhat al-Nusra was an extension of al-Qaeda in Iraq in Syria.[48] Al-Baghdadi said that Abu Mohammad al-Julani, the leader of Jabhat al-Nusra, had been dispatched by the group along with a group of men to Syria to meet with pre-existing cells in the country. Al-Baghdadi said that the ISI had provided Jabhat al-Nusra with the plans and strategy needed for the Syrian Civil War and had been providing them funding on a monthly basis.[70] Al-Baghdadi then declared that the two groups were officially merging under the name, Islamic State of Iraq and Al-Sham/the Levant (ISIS/ISIL).[70] The next day al-Julani rejected the merger and affirmed the group’s allegiance to Al-Qaeda and its leader, Ayman al-Zawahiri. al-Julani was quoted as saying “We inform you that neither the al-Nusra command nor its consultative council, nor its general manager were aware of this announcement. It reached them via the media and if the speech is authentic, we were not consulted.”[71]

In May 2013, Reuters reported that Abu Bakr al-Baghdadi, leader of the ISI, had traveled from Iraq to Syria’s Aleppo Governorate province and began recruiting members of al-Nusra. There were media reports that many of al-Nusra’s foreign fighters had left to join al-Baghdadi’s Islamic State of Iraq and the Levant (ISIS), while many Syrian fighters left the group to join other Islamist brigades.[72][73][74] Sometime in May 2013, Abu Mohammad al-Julani, the leader of al-Nusra, was injured by an airstrike conducted by the Syrian Regime.[75] In June 2013, Al Jazeera reported that it had obtained a letter written by al-Qaeda leader Ayman Al-Zawahiri, addressed to both Abu Bakr al-Baghdadi and Abu Mohammad al-Julani, in which he ruled against the merger of the two organisations and appointed an emissary to oversee relations between them and put an end to tensions.[76] Later in the same month, an audio message from Abu Bakr al-Baghdadi was released in which he rejected al-Zawahiri’s ruling and declared that the merger of the two organizations into the Islamic State of Iraq and the Levant was going ahead. This sequence of events is said to have caused much confusion and division amongst members of al-Nusra.[72]

Some units of al-Nusra began taking part in clashes against the Islamic State of Iraq and the Levant,[77] and in February 2014, after continued tensions, al-Qaeda publicly disavowed any relations with ISIS.[78] In the same month, al-Julani threatened to go to war with ISIS over their suspected role in the killing of senior Ahrar ash-Sham commander Abu Khaled al-Souri. al-Julani gave ISIS five days to submit evidence that they were innocent in the attack to three imprisoned Jihadist clerics, Abu Muhammad al-Maqdisi, Abu Qatada al-Falastini, and Suleiman al-Alwan.[79] On 16 April 2014, ISIS killed al-Nusra’s Idlib chief Abu Mohammad al-Ansari together with his family, the Syrian Observatory for Human Rights reported.[80] In May 2014, open fighting soon broke out between ISIS and al-Nusra in Deir ez-Zor Governorate, leaving hundreds dead on both sides.[81] By July 2014, al-Nusra had largely been expelled from the province.[82]

In July 2014, an audio recording attributed to al-Julani appeared online, in which he said that al-Nusra planned to establish an Islamic emirate in the areas of Syria that they have a presence. A statement issued on 12 July 2014 by al-Nusra’s media channel affirmed the authenticity of the recording, but stated that they had not yet declared the establishment of an emirate.[83][84][85][86]

Attacks

During the Syrian Civil War, the group launched many attacks, mostly against targets affiliated with or supportive of the Syrian government. As of June 2013, al-Nusra Front had claimed responsibility for 57 of the 70 suicide attacks in Syria during the conflict.[87]

One of the first bombings which al-Nusra was suspected of and the first suicide attack of the war came on 23 December 2011, when two seemingly coordinated bombings occurred in the Syrian capital of Damascus, killing 44 people and wounding 166.[88]

The al-Midan bombings of January 2012 were allegedly carried out by a fighter named Abu al-Baraa al-Shami. Footage of the destruction caused by the blast was released on a jihadist forum.[59] The video asserts that the “martyrdom-seeking operation” was executed “in revenge for our mother Umm Abdullah—from the city of Homs—against whom the criminals of the regime violated her dignity and threatened to slaughter her son,” SITE reported. The video shows “an excerpt of allegiances, operations, and training of the al-Nusra Front” as well as a fighter “amongst the masses in a public demonstration, advising them to do their prayers and adhere to the rituals of Islam.”[citation needed]

The al-Nusra Front announced the formation of the “Free Ones of the Levant Brigades”, in a YouTube video statement that was released on January 23. In the statement, the group claimed that it attacked the headquarters of security in Idlib province.[89] “To all the free people of Syria, we announce the formation of the Free Ones of the Levant Brigades,” the statement said, according to a translation obtained by The Long War Journal. “We promise Allah, and then we promise you, that we will be a firm shield and a striking hand to repel the attacks of this criminal Al Assad army with all the might we can muster. We promise to protect the lives of civilians and their possessions from security and the Shabiha [pro-government] militia. We are a people who will either gain victory or die.”[89]

The 10 May 2012 Damascus bombings were allegedly claimed by al-Nusra Front in an Internet video,[90] however, on 15 May 2012, someone claiming to be a spokesman for the group denied that the organization was responsible for the attack, saying that it would only release information through jihadist forums.[91]

On 29 May 2012, a mass execution was discovered near the eastern city of Deir ez-Zor. The unidentified corpses of 13 men had been discovered shot to death execution-style.[92] On 5 June 2012, the al-Nusra Front claimed responsibility for the killings, stating that they had captured and interrogated the soldiers in Deir ez-Zor and “justly” punished them with death, after they confessed to crimes.[93]

On 17 June 2012, Walid Ahmad al-Ayesh, described by Syrian authorities as the “right hand” of the al-Nusra Front, was killed when Syrian authorities discovered his hiding place. He was reportedly responsible for the making of car bombs that were used to attack Damascus in the previous months.[94] The Syrian authorities reported the killing of another prominent member of the group, Wael Mohammad al-Majdalawi, killed on 12 August 2012 in an operation conducted in Damascus.[95]

On 27 June 2012, a group of Syrian rebels attacked a pro-government TV station in the town of Drousha, just south of the capital Damascus. The station’s studios were destroyed with explosives. Seven people were killed in the attack on Al-Ikhbariya TV, including four guards and three journalists.[96] Al-Nusra claimed responsibility for the attack and published photos of 11 station employees they kidnapped following the raid.[97]

In mid-July 2012, Mohammed al-Saeed, a well-known government TV news presenter, was kidnapped by the group. On 3 August 2012, al-Nusra published a statement saying that al-Saeed had been executed.[55][98]

The scene at Saadallah Al-Jabiri Square after the attacks on 3 October 2012

On 3 October, three suicide car bombs exploded at the eastern corner of the central Saadallah Al-Jabiri Square killing 48 people,[99] as it was announced by the Ministry of interior. More than 122 people were reported to be heavily injured.[100] Al-Nusra claimed responsibility for the attack.[101]The bombs targeted the Officers’ club and the nearby buildings of the Touristic Hotel and the historic “Jouha Café”. The hotel received major damage while the café was entirely destroyed. A small building within the Officers’ club was ruined as well.[102][103]

The al-Nusra Front also claimed responsibility for attacking numerous Syrian military bases, including:

  • Aleppo district: an air defense base, on: 12 October 2012
  • Aleppo city: the Hanano barracks
  • Raqqah: the Suluq barracks

In the air defense base assault they reportedly destroyed buildings and sabotaged radar and rockets after overrunning the base in cooperation with the al-Fajr Islamic Movement and a group of Chechen fighters. During the storming of the Hanano barracks 11 soldiers were killed and they held the complex for six hours before retreating. They also claimed killing 32 soldiers during the raid on the Raqqah base.[104]

In October 2012, they joined other rebels in an attack on the Wadi Deif base around Maraat al Numan, in a prolonged fighting that turned into a siege of the base.[105] They also led an attack on the Taftanaz Air Base in November 2012, an important and strategic base for the Syrian army, containing up to 48 helicopters.[57]

The group seized three army checkpoints around Saraqeb at the end of October 2012, forcing the Syrian Army to withdraw from the area the next day. In the battle, 28 Syrian soldiers were killed as well as five Nusra fighters. Some of the captured soldiers were summarily executed after being called “Assad dogs”. The video of these executions was widely condemned, with the United Nations referring to them as probable war crimes.[106][107]

Members of the al-Nusra Front carried out two suicide attacks in early November 2012. One occurred in a rural development center in Sahl al-Ghab in Hama province, where a car bomb killed two people; while the other occurred in the Mezzeh neighbourhood of Damascus, where a suicide bomber killed 11 people.[108] The SOHR claimed a total of 50 soldiers were killed in the Sahl al-Ghab attack.[109]

Al Jazeera reported on 23 December 2012 that the al-Nusra Front had declared a “no-fly-zone” over Aleppo, using 23 mm and 57 mm anti-aircraft guns to down planes. This would include commercial flights which al-Nusra believed transported military equipment and troops. In a video sent to Al Jazeera, they warned civilians against boarding commercial flights.[110]

In February 2013, Al Nusra fighters were involved in fighting in Safira with regime reinforcements, preventing these forces from reaching their destination of the city of Aleppo. A monitoring group claims this resulted in more than two hundred casualties over a period of two weeks.[111]

Though it was initially reported that Syrian Catholic priest François Murad was beheaded at a church in Gassanieh, he was actually shot dead.[112]

The group has taken part in military operations with the Free Syrian Army.[113] Abu Haidar, a Syrian FSA co-ordinator in Aleppo‘s Saif al-Dawla district said that al-Nusra Front “have experienced fighters who are like the revolution’s elite commando troops.”[114]

In December 2013, al-Nusra abducted 13 nuns from a Christian monastery in Maaloula. They were held in the town of Yabroud until 9 March 2014, The nuns reported they had not been harassed and could keep religious symbols.[115]

As of July 2013, al-Nusra controls Ash-Shaddadeh, a town of roughly 16,000.[116]

On 28 August 2014, militants from the group kidnapped 45 UN peacekeepers from Fiji from Golan Heights in the United Nations Disengagement Observer Force Zone.[117] The group demanded that it be removed from the UN’s list of terrorist organizations in exchange for the lives of the peacekeepers. In addition to UN personnel, the group routinely captures UN vehicles to use as car bombs.[118] At the same time, two groups of UN peacekeepers from Philippines were trapped under fire in nearby Rwihinah.[119] On 31 August, one group of 32 Filipinos soldiers was rescued and the other group of 40 soldiers escaped.[120] The rescue operation was carried out by Irish peacekeepers.[121] Colonel Ezra Enriquez of the Philippines, who over-saw the operations, resigned over disagreements with Indian Lieutenant General Iqbal Singh Singha. Singha had allegedly ordered the Filipinos peacekeepers to surrender arms to ensure the safe release of the Fijian soldiers.[122] On 8 September, Rodrigo Duterte, the mayor of Davao City, called for Singha’s death after he allegedly called the Filipinos soldiers cowards.[123]On 11 September, the kidnapped Fijian soldiers were released.[124]

In late October 2014, al-Nusra began attacking the Free Syrian Army and other moderate Islamist groups that it was formerly allied with, in a bid to establish its own Islamic state in the cities it controlled in the Idlib Governorate and other neighboring Governorates.[125][126]

External support

At least one Arab government[which?] has accused Qatar of helping al-Nusra.[127] The US Government has been sending weapons to rebels in Syria since at least late 2013, and perhaps as early as 2011, during the begininning phases of the conflict. These weapons have been reportedly falling into hands of extremists, such as al-Nusra and ISIL.[128][129]

al-Nusra has also been materially supported by multiple foreign fighters. Most of these fighters are from Europe and the Middle East, as pipelines to Syria from those locations are better established and navigable.[130] However, as of November 2013, there were also 6 publicly disclosed cases of American citizens and permanent residents who joined or attempted to join al-Nusrah in 2013 alone.[131]

Khorasan

Khorasan, also known as the Khorasan Group, refers to a group of senior al-Qaeda members who operate in Syria.[132] The group is reported to consist of a small number of fighters who are all on terrorist watchlists, and coordinate with the al-Nusra Front, al-Qaeda’s affiliate in Syria. At an intelligence gathering in Washington, D.C. on 18 September 2014, Director of National Intelligence James Clapper stated that “in terms of threat to the homeland, Khorasan may pose as much of a danger as ISIS.”[133] The term first appeared in news media in September 2014, although the United States had reportedly been keeping track of the group for two years previously.[134]

Weaponry and tactics

The organisation is believed to have used, at various times and in various places, the following tactics: car-bombs, suicide-attacks, targeting of checkpoints, conventional assault of military bases, assassination of political and military figures and members of the shabiha,[51] targeting (destruction/killing) of pro-government media stations and personnel.

By June 2013, there had been apparently 70 suicide-attacks in Syria. Of these, the group denied responsibility for 13 but claimed responsibility for the other 57. In June 2012, the group attacked the pro-government TV station at Drousha, near Damascus. The following month the government-TV presenter Mohammed al-Saeed disappeared; the group later declared him dead.

In June 2014 Human Rights Watch reported that several rebel groups including al-Nusra have enlisted child soldiers into their ranks.[135]

Chemical weapons

A report surfaced in June 2013 of former Iraqi Ba’ath officials supplying the chemical weapon Sarin to the al-Nusra Front through former Iraqi Brig. Gen. Adnan al-Dulaimi. The report detailed how “several former Iraqi military engineers trained the al-Nusra Front on how to use these chemical weapons” adding that all plans in this connection were prepared by al-Dulaimi and staged after Izzat Ibrahim al-Douri’s approval. The sourcing of this report is said to be an aide to al-Douri.[136]

On 30 May, Turkish newspapers reported that Turkish security forces had arrested al-Nusra fighters in the southern provinces of Mersin and Adana near the Syrian border and confiscated 2 kg of sarin gas.[137][138][139] The governor of Adana claimed that the security forces had not found sarin gas but unknown chemicals, without offering further elaboration.[140] The Turkish Ambassador to Moscow later said that tests showed the chemical seized was anti-freeze, not sarin.[141] In September six of those arrested in May were charged with attempting to acquire chemicals which could be used to produce sarin; the indictment said that it was “possible to produce sarin gas by combining the materials in proper conditions.”[142] The indictment said that “The suspects have pleaded not guilty saying that they had not been aware the materials they had tried to obtain could have been used to make sarin gas. Suspects have been consistently providing conflicting and incoherent facts on this matter.” The suspects were said to be linked to al-Nusra and to Ahrar ash-Sham.[143][144]

Designation as a terrorist organization

Countries and organizations below have officially listed the al-Nusra Front as a terrorist organization.

Country Date References
 Australia 28 June 2013 [145]
 Canada 7 November 2013 [146]
 France [147]
 Russia 29 December 2014 [35][148][149]
 Saudi Arabia 7 March 2014 [150]
 Turkey 4 June 2014 [151]
 United Arab Emirates [152]
 United Kingdom 19 July 2013 [153]
 United States 10 December 2012 [154]

See also

References

  1. ^ Jump up to:a b c “Interview with Official of Jabhat al-Nusra, Syria’s Islamist Militia Group”. Time. 25 December 2012. Retrieved29 November 2013.
  2. Jump up^ “Hezbollah and Al Qaeda Fighters Edging Closer to Full Scale Confrontation”. 10 May 2014. Retrieved November 2014.
  3. Jump up^ “Al-Nusra Front”. 2012. Retrieved November 2014.
  4. Jump up^ “TIME Exclusive: Meet the Islamist Militants Fighting Alongside Syria’s Rebels”. Time. 26 July 2012. Retrieved29 November 2012.
  5. Jump up^ Abdallah Suleiman Ali (12 February 2014). “ISIS losing ground in Syria to Jabhat al-Nusra”. Al-Monitor. Retrieved14 February 2014.
  6. Jump up^ Nick Paton Walsh and Laura Smith-Spark (November 6, 2014). “Report: Airstrikes target another Islamist group in Syria”. CNN. Retrieved November 2014.
  7. Jump up^ “Nusra Front claims Lebanon suicide attack”. Al Jazeera English. 11 January 2015. Retrieved 12 January 2015.
  8. Jump up^ “Why Is Jabhat al-Nusra No Longer Useful to Turkey?”.USNews. 11 June 2014. Retrieved June 11, 2014.
  9. Jump up^ “Airstrikes in Syria That Targeted Khorasan Group Disrupted Plots Against US, Gen. Dempsey Says”. ABC News. 7 October 2014. Retrieved 10 October 2014.
  10. Jump up^ “AP sources: IS, al-Qaida reach accord in Syria”. 2014-11-13. Retrieved 2014-11-13.
  11. Jump up^ “Aleppo: Syria’s Stalingrad?”. National Interest. 22 April 2014. Retrieved 22 May 2014.
  12. Jump up^ “New Syrian jihadist body formed to fight ISIS”. Al Monitor. 28 May 2014. Retrieved 3 June 2014.
  13. ^ Jump up to:a b “Jabhat al-Nusra, IS clash in Daraa”. Al Monitor. 16 December 2014. Retrieved 20 December 2014.
  14. Jump up^ “Syrian insurgents attack government-held town near Israel”. Reuters. 20 November 2014. Retrieved23 November 2014.
  15. Jump up^ “Clashes renewed between Islamist groups near Syria’s Hasaka”. ARA News. 18 March 2014. Retrieved9 November 2014.
  16. Jump up^ O’Bagy, Elizabeth (2012). Middle East Security Report: Jihad in Syria 6. Washington, DC. p. 27.
  17. ^ Jump up to:a b “Former Guantanamo detainee killed while leading jihadist group in Syria”. Long War Journal. 4 April 2014. Retrieved 21 May 2014.
  18. Jump up^ “Syria rebels advance in Hama”. ARA News. 12 July 2014. Retrieved 12 July 2014.
  19. ^ Jump up to:a b McLaughlin, Eliott; Capelouto, Susanna (28 September 2014). “U.S. and its allies strike ISIS tank, refineries and checkpoints”. CNN. Retrieved 28 September 2014.
  20. Jump up^ Mortada, Radwan (19 May 2014). “Hezbollah fighters and the “jihadis:” Mad, drugged, homicidal, and hungry”. al-Akhbar English. Retrieved 9 June 2014.
  21. Jump up^ “Jabhat al-Nusra eyes Idlib for Islamic emirate”. Al-Monitor. Retrieved 14 November 2014.
  22. Jump up^ “Al Qaeda seizes territory from moderate Syrian group”.Reuters. Retrieved 30 October 2014.
  23. Jump up^ Ahmed Marshal. “اشتباكات بين حركة وحزم وجبهة النصرة في ريف حلب الغربي وريف إدلب”. المرصد السورى لحقوق الإنسان. Retrieved30 October 2014.
  24. Jump up^ “Al-Qaeda defeats Syrian moderate rebels in Idlib”. ARA News. 2 November 2014. Retrieved 12 November 2014.
  25. Jump up^ “Al-Qaeda Upgrades Its Presence In Syria”. MEMRI. 25 November 2013. Retrieved 12 December 2013.
  26. Jump up^ “Zawahiri disbands main Qaeda faction in Syria”. GlobalPost. 2013-11-08. Retrieved 2013-11-15.
  27. Jump up^ Al Qaeda-linked group Al Nusra Front claims deadly car bombing in Lebanese capital Beirut ABC, 21 January 2014
  28. ^ Jump up to:a b “Islamist group claims Syria bombs ‘to avenge Sunnis'”. Al Arabiya. 21 March 2012. Retrieved 23 March2012.
  29. Jump up^ Ignatius, David (30 November 2012). “Al-Qaeda affiliate playing larger role in Syria rebellion”. Washington Post. Retrieved 1 December 2012.
  30. Jump up^ Blanford, Nicholas (October 10, 2013). “Jihadis may want to kill Assad. But is he lucky to have them?”. csmonitor.com. Retrieved 7 January 2014.
  31. Jump up^ “UN blacklists Syria’s al-Nusra Front”. Al Jazeera English. 31 May 2013. Retrieved 11 June 2013.
  32. Jump up^ in June 2013 “Australian Government lists anti-Assad Syrian group as terrorist organisation – ABC News (Australian Broadcasting Corporation)”. Abc.net.au. 2013-06-29. Retrieved 2013-11-15.
  33. Jump up^ “Turkey lists al-Nusra Front as terrorist organization”.Hurriyet Daily News. June 3, 2014. Retrieved June 3, 2014.
  34. Jump up^http://www.police.govt.nz/sites/default/files/publications/designated-entities-26-11-2014.pdf
  35. ^ Jump up to:a b “Russia calls on all states to put Islamic State, Jabhat al-Nusra on terrorist lists”. Russian News Agency “TASS”. Retrieved 29 December 2014.
  36. Jump up^ (in July 2013) “Britain bans Syria’s al-Qaida-linked Nusra Front on terrorism grounds”. Fox News. 2013-07-19. Retrieved 2013-11-15.
  37. Jump up^ (in December 2012) “US blacklists Syrian rebel group al-Nusra”. Al Jazeera. 11 December 2012. Retrieved11 December 2012.
  38. Jump up^ “Al-Nusra Front”. 2012. Retrieved November 2014.
  39. Jump up^ “New enemies across Syrian border”. August 2014. Retrieved 2015.
  40. Jump up^ “The Syrian rebel groups pulling in foreign fighters”. 2013. Retrieved 2015.
  41. Jump up^ al-Khatieb, Mohammed (July 2014). “Jabhat al-Nusra, IS compete for foreign fighters”. Al-Monitor. Retrieved 2014.
  42. Jump up^ “Al-Nusra Front not yet dead as its emir devises “Islamic Emirate of the Levant””. al-akhbar. July 2014. Retrieved 2014.
  43. Jump up^ Hassan Hassan (4 March 2014). “A jihadist blueprint for hearts and minds is gaining traction in Syria”. The National.
  44. ^ Jump up to:a b “Profile: Syria’s al-Nusra Front”. BBC News. 15 May 2012. Retrieved 31 July 2012.
  45. Jump up^ Chivers, C. J. (September 5, 2013). “Brutality of Syrian Rebels Posing Dilemma in West”. New York Times. Retrieved 5 September 2013.
  46. ^ Jump up to:a b c d e f g Sherlock, Ruth (2 December 2012). “Inside Jabhat al Nusra – the most extreme wing of Syria’s struggle”. The Daily Telegraph (London). Retrieved2 December 2012.
  47. Jump up^ “Syria Rebels Tied to Al Qaeda Play Key Role in War”.The New York Times. 8 December 2012. Retrieved2012-12-08.
  48. ^ Jump up to:a b “Qaeda in Iraq confirms Syria’s Nusra is part of network”. Agence France-Presse. 9 April 2013. Retrieved9 April 2013.
  49. Jump up^ “Syrian rebels post image of selves by burning US Capitol on Facebook page”. Washington Times. 8 December 2012. Retrieved 2012-12-08.
  50. Jump up^ “Al Qaida-linked group Syria rebels once denied now key to anti-Assad victories”. McClatchy. 8 December 2012. Retrieved 2012-12-08.
  51. ^ Jump up to:a b c d e “Jabhat al-Nusra A Strategic Briefing”. Quilliam Foundation. 8 January 2013. Retrieved 2013-03-31.
  52. ^ Jump up to:a b “Al-Qaeda leader in Syria speaks to Al Jazeera”. Al Jazeera. 2013-12-19. Retrieved 2014-08-02.
  53. ^ Jump up to:a b “California Arrest Underscores Ongoing Concern Over Americans Joining Al Qaeda Abroad”. Access ADL. Anti-Defamation League.
  54. Jump up^ “North Carolina Arrest Marks 6th American In 2013 Associated With Al Qaeda In Syria”. Access ADL. Anti-Defamation League.
  55. ^ Jump up to:a b “Syrian TV presenter executed – Doha Freedom Centre”. dc4mf.org. August 4, 2012.
  56. Jump up^ Karam, Zeina (07/6/2012). “Iraq: Al-Qaeda migrates to Syria”. Associated Press. Check date values in: |date=, |accessdate= (help);
  57. ^ Jump up to:a b “Syria Conflict: Rebels, Army Battle Over Taftanaz Airbase”. Huffington Post. 3 November 2012. Retrieved2013-05-07.
  58. ^ Jump up to:a b c d e “With wary eye, Syrian rebels welcome Islamists into their ranks”. The Times of Israel. 25 October 2012. Retrieved 2012-11-28.
  59. ^ Jump up to:a b “Unknown Islamist group claims suicide attacks in Syria”. English.alarabiya.net. 2012-02-29. Retrieved2012-03-25.
  60. Jump up^ “Jihadists, weapons ‘moving from Iraq to Syria'”. AFP. 2012-02-11. Retrieved 2012-03-25.
  61. Jump up^ Elizabeth O’Bagy (September 2012). “Jihad in Syria”(PDF). Institute for the Study of War. Retrieved 2013-05-07.
  62. Jump up^ Sherlock, Ruth (20 January 2014). “Exclusive interview: why I defected from Bashar al-Assad’s regime, by former diplomat Nawaf Fares”. Telegraph (London). Retrieved 20 January2014.
  63. Jump up^ “Syrian rebels defy US and pledge allegiance to jihadi group”. The Telegraph (London). 10 December 2012. Retrieved 14 December 2012.
  64. Jump up^ “Islamist groups gaining prominence in Syria fight”. USA Today. 10 December 2012. Retrieved 14 December 2012.
  65. Jump up^ “Free Syrian Army rebels defect to Islamist group Jabhat al-Nusra”. The Guardian (London). 8 May 2013.
  66. Jump up^ “Which Insurgents Captured Menagh Airbase”.eaworldview. 7 August 2013. Retrieved 7 August 2013.
  67. Jump up^ “For newly recognized Syrian rebel coalition, a first dispute with US”. Christian Science Monitor. 12 December 2012. Retrieved 16 December 2012.
  68. Jump up^ “Syrian rebels defy US and pledge allegiance to jihadi group”. The Telegraph (London). 10 December 2012. Retrieved 26 December 2012.
  69. Jump up^ “Syrian protesters slam U.S. blacklisting of jihadist group”. Daily Star. AFP. 14 December 2012. Retrieved26 December 2012.
  70. ^ Jump up to:a b “ISI Confirms That Jabhat Al-Nusra Is Its Extension In Syria, Declares ‘Islamic State Of Iraq And Al-Sham’ As New Name Of Merged Group”. MEMRI. 2013-04-08. Retrieved2013-04-10.
  71. Jump up^ “Al-Nusra Commits to al-Qaeda, Deny Iraq Branch ‘Merger'”. Agence France Presse. 10 April 2013. Retrieved18 May 2013.
  72. ^ Jump up to:a b “Iraqi al-Qaeda chief rejects Zawahiri orders”. Al Jazeera. 2013-06-15. Retrieved 2013-06-15.
  73. Jump up^ “Insight: Syria’s Nusra Front eclipsed by Iraq-based al Qaeda”. Reuters. 2013-05-17. Retrieved 2013-05-18.
  74. Jump up^ Spencer, Richard (2013-05-19). “Syria: Jabhat al-Nusra split after leader’s pledge of support for al-Qaeda”. London: The Telegraph. Retrieved 2013-05-21.
  75. Jump up^ “Al-Nusra leader injured by regime bombardment”. Facebook.com. Retrieved 2013-05-16.
  76. Jump up^ “Qaeda chief annuls Syrian-Iraqi jihad merger”. Al Jazeera. 2013-06-09. Retrieved 2013-06-10.
  77. Jump up^ “Factbox: Syria’s rebel groups”. Reuters. 9 January 2014. Retrieved 9 January 2014.
  78. Jump up^ Liz Sly (3 February 2014). “Al-Qaeda disavows any ties with radical Islamist ISIS group in Syria, Iraq”. The Washington Post. Retrieved 7 February 2014.
  79. Jump up^ “Syria: al-Nusra Front declares war on ISIS”. Al Akhbar English. 2014-02-26. Retrieved 2014-08-18.
  80. Jump up^ “Al-Nusra chief killed by rivals in Syria”. 2014-04-16. Retrieved 2014-04-16.
  81. Jump up^ “Hundreds killed as ISIL insurgents gain ground in east Syria”. Reuters. 10 June 2014. Retrieved 12 July 2014.
  82. Jump up^ “Al Qaeda leaves east Syria strongholds to Islamic State -monitor”. Retrieved 24 October 2014.
  83. Jump up^ “Al Qaeda’s rise in southern Syrian pushes moderate rebels to sideline”. Retrieved 24 October 2014.
  84. Jump up^ “Will the ‘Emirate of the Levant’ be announced on Eid al-Fitr?”. Retrieved 24 October 2014.
  85. Jump up^ “Jabhat al-Nusra, IS compete for foreign fighters”. Al-Monitor. Retrieved 24 October 2014.
  86. Jump up^ “Rebels Call on Al Nusra Front to Rethink Establishing its “Emirat”. Syrian National Coalition Of Syrian Revolution and Opposition Forces. Retrieved 24 October 2014.
  87. Jump up^ “Suicide bombers kill 14 in Damascus”. Retrieved24 October 2014.
  88. Jump up^ Jamie Dettmer (2013-01-04). “Jihadists Are Creeping Into Syria’s Rebel Factions”. The Daily Beast. Retrieved2013-05-07.
  89. ^ Jump up to:a b Bill Roggio (2012-02-26). “Al Nusrah Front claims suicide attack in Syria”. The Long War Journal. Retrieved2012-03-25.
  90. Jump up^ “Jihadist group claim responsibility for Damascus blasts”.ITV News. 12 May 2012. Retrieved 12 May 2012.
  91. Jump up^ “Jihadist group denies claiming Damascus bombings”.Dawn. AFP. 2012-05-15. Retrieved 2013-05-07.
  92. Jump up^ Gladstone, Rick (30 May 2012). “U.S. Envoy Sees Grim Outcome for Syria”. New York Times. Retrieved 11 June2013.
  93. Jump up^ “Militant group claims killing of 13 in Syria”. Reuters. 5 June 2012. Retrieved 11 June 2012.
  94. Jump up^ “Terrorist Al-Ayesh, Who Supervised Rigging Car Bombs Detonated in Damascus, Killed”. Retrieved 24 October2014.
  95. Jump up^ http://208.43.232.81/eng/337/2012/08/12/435965.htm
  96. Jump up^ “Seven killed in attack on Syrian TV station”. Mg.co.za. 2012-06-27. Retrieved 2013-05-07.
  97. Jump up^ “Jihadists claim Syria attacks”. Associated Press. 4 July 2012. Retrieved 15 November 2013.
  98. Jump up^ “Syrian TV presenter Mohammad al Saeed has been executed by Islamist armed group Al-Nusra, says rights group”. Blogs.aljazeera.com. 2012-08-04. Retrieved2013-05-07.
  99. Jump up^ “Militant group Al-Nusra claim suicide bombings in Aleppo”. Yahoo! News. 4 October 2012. Retrieved5 November 2012.
  100. Jump up^ “Sada el-Balad”. El-balad.com. 3 October 2012. Retrieved2013-05-07.
  101. Jump up^ “Militant group Al-Nusra claim suicide bombings in Aleppo”. Reuters. 4 October 2012. Retrieved 8 October2012.
  102. Jump up^ “ABC News:Dozens killed in Aleppo bomb blasts”. Abc.net.au. 3 October 2012. Retrieved 2013-05-07.
  103. Jump up^ Albert Aji and Zeina Karam (3 October 2012). “Syrian official: 27 killed in Aleppo bombings”. Associated Press. Retrieved 5 January 2014.