Defense Intelligence Agency (DIA)

Angelo Codevilla — The Ruling Class vs. Country Class — Videos

Posted on June 16, 2018. Filed under: American History, Blogroll, Books, Central Intelligence Agency (CIA), College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Cult, Culture, Data, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Economics, Education, Elections, Employment, Entertainment, Essays, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, Friends, government, government spending, Heroes, history, History of Economic Thought, Law, liberty, Life, Links, Macroeconomics, Mastery, media, Movies, Movies, National Security Agency (NSA), National Security Agency (NSA_, Newspapers, Non-Fiction, People, Philosophy, Photos, Politics, Radio, Radio, Raves, Raymond Thomas Pronk, Security, Speech, Spying, State, Strategy, Success, Talk Radio, Tax Policy, Television, Television, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , |

See the source imageImage result for angelo codevilla the ruling classSee the source imageSee the source image

Charles Kesler Introduces Angelo Codevilla

1. America’s Ruling Class

3. What’s Wrong with the CIA?

The Revolution of America’s Regime

Angelo Codevilla – Does America Have a Ruling Class?

456. The Iron Fist of the Ruling Class | Angelo Codevilla

The Role of Intelligence in American National Security

Conservatism in the Trump Era: American Statecraft

See the source image

 

  • ANGELO M. CODEVILLA

July 16, 2010, 10:09 am

After the Republic

September 27, 2016

In today’s America, a network of executive, judicial, bureaucratic, and social kinship channels bypasses the sovereignty of citizens. Our imperial regime, already in force, works on a simple principle: the president and the cronies who populate these channels may do whatever they like so long as the bureaucracy obeys and one third plus one of the Senate protects him from impeachment. If you are on the right side of that network, you can make up the rules as you go along, ignore or violate any number of laws, obfuscate or commit perjury about what you are doing (in the unlikely case they put you under oath), and be certain of your peers’ support. These cronies’ shared social and intellectual identity stems from the uniform education they have received in the universities. Because disdain for ordinary Americans is this ruling class’s chief feature, its members can be equally certain that all will join in celebrating each, and in demonizing their respective opponents.

And, because the ruling class blurs the distinction between public and private business, connection to that class has become the principal way of getting rich in America. Not so long ago, the way to make it here was to start a business that satisfied customers’ needs better than before. Nowadays, more businesses die each year than are started. In this century, all net additions in employment have come from the country’s 1,500 largest corporations. Rent-seeking through influence on regulations is the path to wealth. In the professions, competitive exams were the key to entry and advancement not so long ago. Now, you have to make yourself acceptable to your superiors. More important, judicial decisions and administrative practice have divided Americans into “protected classes”—possessed of special privileges and immunities—and everybody else. Equality before the law and equality of opportunity are memories. Co-option is the path to power. Ever wonder why the quality of our leaders has been declining with each successive generation?

Moreover, since the Kennedy reform of 1965, and with greater speed since 2009, the ruling class’s immigration policy has changed the regime by introducing some 60 million people—roughly a fifth of our population—from countries and traditions different from, if not hostile, to ours. Whereas earlier immigrants earned their way to prosperity, a disproportionate percentage of post-1965 arrivals have been encouraged to become dependents of the state. Equally important, the ruling class chose to reverse America’s historic practice of assimilating immigrants, emphasizing instead what divides them from other Americans. Whereas Lincoln spoke of binding immigrants by “the electric cord” of the founders’ principles, our ruling class treats these principles as hypocrisy. All this without votes or law; just power.

Foul is Fair and Fair is Foul

In short, precisely as the classics defined regime change, people and practices that had been at society’s margins have been brought to its center, while people and ideas that had been central have been marginalized.

Fifty years ago, prayer in the schools was near universal, but no one was punished for not praying. Nowadays, countless people are arrested or fired for praying on school property. West Point’s commanding general reprimanded the football coach for his team’s thanksgiving prayer. Fifty years ago, bringing sexually explicit stuff into schools was treated as a crime, as was “procuring abortion.” Nowadays, schools contract with Planned Parenthood to teach sex, and will not tell parents when they take girls to PP facilities for abortions. Back then, many schools worked with the National Rifle Association to teach gun handling and marksmanship. Now students are arrested and expelled merely for pointing their finger and saying “bang.” In those benighted times, boys who ventured into the girls’ bathroom were expelled as perverts. Now, girls are suspended for objecting to boys coming into the girls’ room under pretense of transgenderism. The mainstreaming of pornography, the invention of abortion as the most inalienable of human rights and, most recently, the designation of opposition to homosexual marriage as a culpable psychosis—none of which is dictated by law enacted by elected officials—is enforced as if it had been. No surprise that America has experienced a drastic drop in the formation of families, with the rise of rates of out-of-wedlock births among whites equal to the rates among blacks that was recognized as disastrous a half-century ago, the near-disappearance of two-parent families among blacks, and the social dislocations attendant to all that.

Ever since the middle of the 20th century our ruling class, pursuing hazy concepts of world order without declarations of war, has sacrificed American lives first in Korea, then in Vietnam, and now throughout the Muslim world. By denigrating Americans who call for peace, or for wars unto victory over America’s enemies; by excusing or glorifying those who take our enemies’ side or who disrespect the American flag; our rulers have drawn down the American regime’s credit and eroded the people’s patriotism.

As the ruling class destroyed its own authority, it wrecked the republic’s as well. This is no longer the “land where our fathers died,” nor even the country that won World War II. It would be surprising if any society, its identity altered and its most fundamental institutions diminished, had continued to function as before. Ours sure does not, and it is difficult to imagine how it can do so ever again. We can be sure only that the revolution underway among us, like all others, will run its unpredictable course.

All we know is the choice that faces us at this stage: either America continues in the same direction, but faster and without restraint, or there’s the hazy possibility of something else.

Imperial Alternatives

The consequences of empowering today’s Democratic Party are crystal clear. The Democratic Party—regardless of its standard bearer—would use its victory to drive the transformations that it has already wrought on America to quantitative and qualitative levels that not even its members can imagine. We can be sure of that because what it has done and is doing is rooted in a logic that has animated the ruling class for a century, and because that logic has shaped the minds and hearts of millions of this class’s members, supporters, and wannabes.

That logic’s essence, expressed variously by Herbert Croly and Woodrow Wilson, FDR’s brains trust, intellectuals of both the old and the new Left, choked back and blurted out by progressive politicians, is this: America’s constitutional republic had given the American people too much latitude to be who they are, that is: religiously and socially reactionary, ignorant, even pathological, barriers to Progress. Thankfully, an enlightened minority exists with the expertise and the duty to disperse the religious obscurantism, the hypocritical talk of piety, freedom, and equality, which excuses Americans’ racism, sexism, greed, and rape of the environment. As we progressives take up our proper responsibilities, Americans will no longer live politically according to their prejudices; they will be ruled administratively according to scientific knowledge.

Progressivism’s programs have changed over time. But its disdain for how other Americans live and think has remained fundamental. More than any commitment to principles, programs, or way of life, this is its paramount feature. The media reacted to Hillary Clinton’s remark that “half of Trump’s supporters could be put into a ‘basket of deplorables’” as if these sentiments were novel and peculiar to her. In fact, these are unremarkable restatements of our ruling class’s perennial creed.

The pseudo-intellectual argument for why these “deplorables” have no right to their opinions is that giving equal consideration to people and positions that stand in the way of Progress is “false equivalence,” as President Obama has put it. But the same idea has been expressed most recently and fully by New York TimesCEO Mark Thompson, as well as Times columnists Jim Rutenberg, Timothy Egan, and William Davies. In short, devotion to truth means not reporting on Donald Trump and people like him as if they or anything they say might be of value.

If trying to persuade irredeemable socio-political inferiors is no more appropriate than arguing with animals, why not just write them off by sticking dismissive names on them? Doing so is less challenging, and makes you feel superior. Why wrestle with the statistical questions implicit in Darwin when you can just dismiss Christians as Bible-thumpers? Why bother arguing for Progressivism’s superiority when you can construct “scientific” studies like Theodor Adorno’s, proving that your opponents suffer from degrees of “fascism” and other pathologies? This is a well-trod path. Why, to take an older example, should General Omar Bradley have bothered trying to refute Douglas MacArthur’s statement that in war there is no substitute for victory when calling MacArthur and his supporters “primitives” did the trick? Why wrestle with our climate’s complexities when you can make up your own “models,” being sure that your class will treat them as truth?

What priorities will the ruling class’s notion of scientific truth dictate to the next Democratic administration? Because rejecting that true and false, right and wrong are objectively ascertainable is part of this class’s DNA, no corpus of fact or canon of reason restrains it or defines its end-point. Its definition of “science” is neither more nor less than what “scientists say” at any given time. In practice, that means “Science R-Us,” now and always, exclusively. Thus has come to pass what President Dwight Eisenhower warned against in his 1960 Farewell address: “A steadily increasing share [of science] is conducted for, by, or at the direction of, the Federal government.… [T]he free university, historically the fountainhead of free ideas and scientific discovery, has experienced a revolution…a government contract becomes virtually a substitute for intellectual curiosity.” Hence, said Ike, “The prospect of domination of the nation’s scholars by Federal employment, project allocations, and the power of money is ever present—and is gravely to be regarded.” The result has been that academics rise through government grants while the government exercises power by claiming to act on science’s behalf. If you don’t bow to the authority of the power that says what is and is not so, you are an obscurantist or worse.

Under our ruling class, “truth” has morphed from the reflection of objective reality to whatever has “normative pull”—i.e., to what furthers the ruling class’s agenda, whatever that might be at any given time. That is the meaning of the term “political correctness,” as opposed to factual correctness.

It’s the Contempt, Stupid!

Who, a generation ago, could have guessed that careers and social standing could be ruined by stating the fact that the paramount influence on the earth’s climate is the sun, that its output of energy varies and with it the climate? Who, a decade ago, could have predicted that stating that marriage is the union of a man and a woman would be treated as a culpable sociopathy, or just yesterday that refusing to let certifiably biological men into women’s bathrooms would disqualify you from mainstream society? Or that saying that the lives of white people “matter” as much as those of blacks is evidence of racism? These strictures came about quite simply because some sectors of the ruling class felt like inflicting them on the rest of America. Insulting presumed inferiors proved to be even more important to the ruling class than the inflictions’ substance.

How far will our rulers go? Because their network is mutually supporting, they will go as far as they want. Already, there is pressure from ruling class constituencies, as well as academic arguments, for morphing the concept of “hate crime” into the criminalization of “hate speech”—which means whatever these loving folks hate. Of course this is contrary to the First Amendment, and a wholesale negation of freedom. But it is no more so than the negation of freedom of association that is already eclipsing religious freedom in the name of anti-discrimination. It is difficult to imagine a Democratic president, Congress, and Supreme Court standing in the way.

Above all, these inflictions, as well as the ruling class’s acceptance of its own members’ misbehavior, came about because millions of its supporters were happy, or happy enough, to support them in the interest of maintaining their own status in a ruling coalition while discomfiting their socio-political opponents. Consider, for example, how republic-killing an event was the ruling class’s support of President Bill Clinton in the wake of his nationally televised perjury. Subsequently, as constituencies of supporters have effectively condoned officials’ abusive, self-serving, and even outright illegal behavior, they have encouraged more and more of it while inuring themselves to it. That is how republics turn into empires from the roots up.

But it is also true, as Mao Tse-Tung used to say, “a fish begins to rot at the head.” If you want to understand why any and all future Democratic Party administrations can only be empires dedicated to injuring and insulting their subjects, look first at their intellectual leaders’ rejection of the American republic’s most fundamental principles.

The Declaration of Independence says that all men “are endowed by their Creator with certain unalienable rights” among which are “life, liberty, and the pursuit of happiness.” These rights—codified in the Constitution’s Bill of Rights—are not civil rights that governments may define. The free exercise of religion, freedom of speech and assembly, keeping and bearing arms, freedom from warrantless searches, protection against double jeopardy and self-incrimination, trial by jury of one’s peers, etc., are natural rights that pertain to human beings as such. Securing them for Americans is what the United States is all about. But today’s U.S. Civil Rights Commission advocates truncating the foremost of these rights because, as it stated in a recent report, “Religious exemptions to the protections of civil rights based upon classifications such as race, color, national origin, sex, disability status, sexual orientation, and gender identity, when they are permissible, significantly infringe upon those civil rights.” The report explains why the rights enumerated in the Declaration of Independence and the Bill of Rights should not be permissible: “The phrases ‘religious liberty’ and ‘religious freedom’ will stand for nothing except hypocrisy so long as they remain code words for discrimination, intolerance, racism, sexism, homophobia, Islamophobia, Christian supremacy, or any form of intolerance.”

Hillary Clinton’s attack on Trump supporters merely matched the ruling class’s current common sense. Why should government workers and all who wield the administrative state’s unaccountable powers not follow their leaders’ judgment, backed by the prestige press, about who are to be treated as citizens and who is to be handled as deplorable refuse? Hillary Clinton underlined once again how the ruling class regards us, and about what it has in store for us.

Electing Donald Trump would result in an administration far less predictable than any Democratic one. In fact, what Trump would or would not do, could or could not do, pales into insignificance next to the certainty of what any Democrat would do. That is what might elect Trump.

The character of an eventual Trump Administration is unpredictable because speculating about Trump’s mind is futile. It is equally futile to guess how he might react to the mixture of flattery and threats sure to be leveled against him. The entire ruling class—Democrats and Republicans, the bulk of the bureaucracy, the judiciary, and the press—would do everything possible to thwart him; and the constituencies that chose him as their candidate, and that might elect him, are surely not united and are by no means clear about the demands they would press. Moreover, it is anyone’s guess whom he would appoint and how he would balance his constituencies’ pressures against those of the ruling class.

Never before has such a large percentage of Americans expressed alienation from their leaders, resentment, even fear. Some two-thirds of Americans believe that elected and appointed officials—plus the courts, the justice system, business leaders, educators—are leading the country in the wrong direction: that they are corrupt, do more harm than good, make us poorer, get us into wars and lose them. Because this majority sees no one in the political mainstream who shares their concerns, because it lacks confidence that the system can be fixed, it is eager to empower whoever might flush the system and its denizens with something like an ungentle enema.

Yet the persons who express such revolutionary sentiments are not a majority ready to support a coherent imperial program to reverse the course of America’s past half-century. Temperamentally conservative, these constituencies had been most attached to the Constitution and been counted as the bedrock of stability. They are not yet wholly convinced that there is little left to conserve. What they want, beyond an end to the ruling class’s outrages, has never been clear. This is not surprising, given that the candidates who appeal to their concerns do so with mere sound bites. Hence they chose as the presidential candidate of the nominal opposition party the man who combined the most provocative anti-establishment sounds with reassurance that it won’t take much to bring back good old America: Donald Trump. But bringing back good old America would take an awful lot. What could he do to satisfy them?

Trump’s propensity for treating pronouncements on policy as flags to be run up and down the flagpole as he measures the volume of the applause does not deprive them of all significance—especially the ones that confirm his anti-establishment bona fides. These few policy items happen to be the ones by which he gained his anti-establishment reputation in the first place: 1) opposition to illegal immigration, especially the importation of Muslims whom Americans reasonably perceive as hostile to us; 2) law and order: stop excusing rioters and coddling criminals; 3) build a wall, throw out the illegals, let in only people who are vetted and certified as supporters of our way of life (that’s the way it was when I got my immigrant visa in 1955), and keep out anybody we can’t be sure isn’t a terrorist. Trump’s tentative, partial retreat from a bit of the latter nearly caused his political standing to implode, prompting the observation that doing something similar regarding abortion would end his political career. That is noteworthy because, although Trump’s support of the pro-life cause is lukewarm at best, it is the defining commitment for much of his constituency. The point here is that, regardless of his own sentiments, Trump cannot wholly discount his constituencies’ demands for a forceful turn away from the country’s current direction.

Trump’s slogan—“make America great again”—is the broadest, most unspecific, common denominator of non-ruling-class Americans’ diverse dissatisfaction with what has happened to the country. He talks about reasserting America’s identity, at least by controlling the borders; governing in America’s own interest rather than in pursuit of objectives of which the American people have not approved; stopping the export of jobs and removing barriers to business; and banishing political correctness’s insults and injuries. But all that together does not amount to making America great again. Nor does Trump begin to explain what it was that had made this country great to millions who have known only an America much diminished.

In fact, the United States of America was great because of a whole bunch of things that now are gone. Yes, the ruling class led the way in personal corruption, cheating on tests, lowering of professional standards, abandoning churches and synagogues for the Playboy Philosophy and lifestyle, disregarding law, basing economic life on gaming the administrative state, basing politics on conflicting identities, and much more. But much of the rest of the country followed. What would it take to make America great again—or indeed to make any of the changes that Trump’s voters demand? Replacing the current ruling class would be only the beginning.

Because it is difficult to imagine a Trump presidency even thinking about something so monumental as replacing an entire ruling elite, much less leading his constituency to accomplishing it, electing Trump is unlikely to result in a forceful turn away from the country’s current direction. Continuing pretty much on the current trajectory under the same class will further fuel revolutionary sentiments in the land all by itself. Inevitable disappointment with Trump is sure to add to them.

We have stepped over the threshold of a revolution. It is difficult to imagine how we might step back, and futile to speculate where it will end. Our ruling class’s malfeasance, combined with insult, brought it about. Donald Trump did not cause it and is by no means its ultimate manifestation. Regardless of who wins in 2016, this revolution’s sentiments will grow in volume and intensity, and are sure to empower politicians likely to make Americans nostalgic for Donald Trump’s moderation.

http://www.claremont.org/crb/basicpage/after-the-republic/

Senior Executive Service (United States)

From Wikipedia, the free encyclopedia

Jump to navigationJump to search

Senior Executive Service
SES Emblem.svg

Seal of the U.S. Senior Executive Service
Flag of the United States Senior Executive Service.svg

Flag of the U.S. Senior Executive Service

The Senior Executive Service (SES) is a position classification in the civil service of the United States federal government, somewhat analogous to general officer or flag officer ranks in the U.S. Armed Forces. It was created in 1979 when the Civil Service Reform Act of 1978 went into effect under President Jimmy Carter.

Origin and attributes

According to the Office of Personnel Management, the SES was designed to be a corps of executives selected for their leadership qualifications, serving in key positions just below the top Presidential appointees as a link between them and the rest of the Federal (civil service) workforce. SES positions are considered to be above the GS-15 level of the General Schedule, and below Level III of the Executive Schedule. Career members of the SES ranks are eligible for the Presidential Rank Awards program.

Up to 10% of SES positions can be filled as political appointments rather than by career employees.[1] About half of the SES is designated “Career Reserved”, which can only be filled by career employees. The other half is designated “General”, which can be filled by either career employees or political appointments as desired by the administration. Due to the 10% limitation, most General positions are still filled by career appointees.[2]

Senior level employees of several agencies are exempt from the SES but have their own senior executive positions; these include the Federal Bureau of InvestigationCentral Intelligence AgencyDefense Intelligence AgencyNational Security AgencyTransportation Security AdministrationFederal Aviation AdministrationGovernment Accountability OfficeMembers of the Foreign Service, and government corporations.

Pay rates

(Effective on the first day of the first applicable pay period beginning on or after January 1, 2015)[3]
Minimum Maximum
Agencies with a Certified SES Performance Appraisal System $121,956 $183,300
Agencies without a Certified SES Performance Appraisal System $121,956 $168,700

Unlike the General Schedule (GS) grades, SES pay is determined at agency discretion within certain parameters, and there is no locality pay adjustment.

The minimum pay level for the SES is set at 120 percent of the basic pay for GS-15 Step 1 employees ($121,956 for 2015). The maximum pay level depends on whether or not the employing agency has a “certified” SES performance appraisal system:[4]

  • If the agency has a certified system, the maximum pay is set at Level II of the Executive Schedule ($183,300 for 2015).
  • If the agency does not have a certified system, the maximum pay is set at Level III of the Executive Schedule ($168,700 for 2015).

Total aggregate pay is limited to the salary of the Vice President of the United States ($230,700 for 2015).

Prior to 2004, the SES used a six-level system. It was replaced with the current open band system on January 1, 2014.[5]

See also

References

  1. Jump up^ Piaker, Zach (2016-03-16). “Help Wanted: 4,000 Presidential Appointees”Partnership for Public Service Center for Presidential Transition. Retrieved 2016-11-16.
  2. Jump up^ “United States Government Policy and Supporting Positions (The Plum Book)” (PDF). U.S. House of Representatives Committee on Oversight and Government Reform. 2012-12-01. p. 201. Retrieved 2016-11-16.
  3. Jump up^ Obama, Barack (2014-12-19). “ADJUSTMENTS OF CERTAIN RATES OF PAY” (PDF). EXECUTIVE ORDER 13686. The White House. Retrieved 2015-09-18.
  4. Jump up^ “Performance & Compensation – Salary”U.S. Office of Personnel Management. Retrieved 2011-09-24.
  5. Jump up^ “Senior Executive Service Pay and Performance Awards”U.S. Office of Personnel Management. 2004. Retrieved 2018-03-31.

External links

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show — Week in Review — September 16-22, 2017

Posted on September 25, 2017. Filed under: American History, Bomb, College, Congress, Constitution, Crime, Defense Intelligence Agency (DIA), Demographics, Diasters, Earthquake, Education, Elections, Employment, Energy, Faith, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Friends, Genocide, government, government spending, Health, Health Care, history, Illegal, Immigration, Investments, IRS, Islam, Islam, Journalism, Language, Law, Legal, liberty, Life, Links, Macroeconomics, media, Monetary Policy, Money, National Security Agency (NSA_, Natural Gas, Newspapers, Nuclear, Obamacare, People, Philosophy, Photos, Police, Political Correctness, Politics, Presidential Candidates, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religious, Security, Shite, Spying, Success, Sunni, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, The Pronk Pops Show, Trade Policiy, Video, Wahhabism, War, Wealth, Weapons of Mass Destruction, Weather, Welfare, Wisdom, Work | Tags: , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 970, September 22, 2017

Pronk Pops Show 969, September 21, 2017

Pronk Pops Show 968, September 20, 2017

Pronk Pops Show 967, September 19, 2017

Pronk Pops Show 966, September 18, 2017

Pronk Pops Show 965, September 15, 2017

Pronk Pops Show 964, September 14, 2017

Pronk Pops Show 963, September 13, 2017

Pronk Pops Show 962, September 12, 2017

Pronk Pops Show 961, September 11, 2017

Pronk Pops Show 960, September 8, 2017

Pronk Pops Show 959, September 7, 2017

Pronk Pops Show 958, September 6, 2017

Pronk Pops Show 957, September 5, 2017

Pronk Pops Show 956, August 31, 2017

Pronk Pops Show 955, August 30, 2017

Pronk Pops Show 954, August 29, 2017

Pronk Pops Show 953, August 28, 2017

Pronk Pops Show 952, August 25, 2017

Pronk Pops Show 951, August 24, 2017

Pronk Pops Show 950, August 23, 2017

Pronk Pops Show 949, August 22, 2017

Pronk Pops Show 948, August 21, 2017

Pronk Pops Show 947, August 16, 2017

Pronk Pops Show 946, August 15, 2017

Pronk Pops Show 945, August 14, 2017

Pronk Pops Show 944, August 10, 2017

Pronk Pops Show 943, August 9, 2017

Pronk Pops Show 942, August 8, 2017

Pronk Pops Show 941, August 7, 2017

Pronk Pops Show 940, August 3, 2017

Pronk Pops Show 939, August 2, 2017

Pronk Pops Show 938, August 1, 2017

Pronk Pops Show 937, July 31, 2017

Pronk Pops Show 936, July 27, 2017

Pronk Pops Show 935, July 26, 2017

Pronk Pops Show 934, July 25, 2017

Pronk Pops Show 934, July 25, 2017

Pronk Pops Show 933, July 24, 2017

Pronk Pops Show 932, July 20, 2017

Pronk Pops Show 931, July 19, 2017

Pronk Pops Show 930, July 18, 2017

Pronk Pops Show 929, July 17, 2017

Pronk Pops Show 928, July 13, 2017

Pronk Pops Show 927, July 12, 2017

Pronk Pops Show 926, July 11, 2017

Pronk Pops Show 925, July 10, 2017

Pronk Pops Show 924, July 6, 2017

Pronk Pops Show 923, July 5, 2017

Pronk Pops Show 922, July 3, 2017

Pronk Pops Show 921, June 29, 2017

Pronk Pops Show 920, June 28, 2017

Pronk Pops Show 919, June 27, 2017

Pronk Pops Show 918, June 26, 2017

Pronk Pops Show 917, June 22, 2017

Pronk Pops Show 916, June 21, 2017

Pronk Pops Show 915, June 20, 2017

Pronk Pops Show 914, June 19, 2017

Pronk Pops Show 913, June 16, 2017

Pronk Pops Show 912, June 15, 2017

Pronk Pops Show 911, June 14, 2017

Pronk Pops Show 910, June 13, 2017

Pronk Pops Show 909, June 12, 2017

Pronk Pops Show 908, June 9, 2017

Pronk Pops Show 907, June 8, 2017

Pronk Pops Show 906, June 7, 2017

Pronk Pops Show 905, June 6, 2017

Pronk Pops Show 904, June 5, 2017

Pronk Pops Show 903, June 1, 2017

Image result for president trump addresses the united nationsImage result for china trade with north korea by year through 2016
Image result for earthquake Magnitude 7.1 in Mecico september 20, 2017 map

Image result for President Trump tweet on London terrerorist Attack Parson Green September 15, 2017

The Pronk Pops Show 970

September 22, 2017

Breaking Story 1: Rocket Man Kim Jong-Un Promises To Explode Hydrogen Bomb Over Pacific Ocean —

Story 2: The Democratic and Republican Party Failure To Completely Repeal Obamacare Including Repealing The Patient Protection and Affordable Care Act (ACA) and All Related Mandates, Regulations, Taxes, Spending and Subsidies — Obamacare Collapsing — Replace Obamacare With Free Enterprise Market Capitalism Health Insurance — Keep The Federal Government Out Of The Health Insurance and Health Care Business — Videos —

Story 3: Obama’s Secret Surveillance Spy State Scandal — Misuse of Intelligence Community For Political Purposes — Gross Abuse of Power and Political Conspiracy — Violation of Fourth Amendment — Videos —

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/22/the-pronk-pops-show-970-september-22-2017-breaking-story-1-rocket-man-kim-jong-un-promises-to-explode-hydrogen-bomb-over-pacific-ocean-story-2-the-democratic-and-republican-party-failure-to-co/

The Pronk Pops Show 969

September 21, 2017

Story 1: President Trump Signs Executive Order Targeting Institutions and People Doing Business With North Korea — Communist China Trades With and Enabled North Korea Nuclear Weapon and Missile Programs — Waiting For Embargo Banning All Trade and Investment in Communist China — Videos —

Story 2: Fed To Start Quantitative Tightening In October 2017 by Selling Some ($10 Billion Per Month or $120 Billion Per Year) of $4,500 Billion Bond Portfolio As U.S. Economy Slows in 2017? — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/21/the-pronk-pops-show-969-september-21-2017-story-1-president-trump-signs-executive-order-targeting-institutions-and-people-doing-business-with-north-korea-communist-china-trades-with-and-enabled/

September 23, 2017 12:13 PM PDT

The Pronk Pops Show 968

September 20, 2017

Breaking and Developing — Story 1: 7.1 Richter Scale Earthquake Kills Over 200 In Mexico — Videos —

Story 2: Category 4 Hurricane Marie With 155 Miles Per Hour Winds, 10 Foot Flood Surge and 20 Plus Inches of Rainfall Turns Lights Out in Puerto Rico with Widespread Flooding and Damages — Videos —

Story 3: Yes The Obama Administration Was Wiretapping The Trump Campaign and Former Trump  Campaign Manager Paul Manafort — Trump Was Right and Big Lie Media Lied Again — Obama Spying Scandal Bigger Than Watergate — Videos —

Story 4:  Illegal Aliens Shout Down House Minority Leader Nancy Pelosi Calling Her A Liar — When Will American Citizens Shout Down President Trump Calling Him A Liar? … President Trump and Republican Party Want Touch Back Amnesty and Pathway to  Citizenship For Illegal Aliens — Majority of American People Want All Immigration Laws Enforced — Deport and Remove All 30-60 Million Illegal Aliens In United States To Country of Origin — No Republican Re-importing of Illegal Aliens With Expedited Visas and Touch Back Amnesty and Pathway to Citizenship — Employ American Citizens Not Illegal Aliens — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/20/the-pronk-pops-show-968-september-20-2018-breaking-and-developing-story-1-7-1-richter-scale-earthquake-kills-over-200-in-mexico-videos-story-2-category-4-hurricane-marie-with-155-miles-per/

September 20, 2017 07:13 PM PDT

The Pronk Pops Show 967

September 19, 2017

Story 1: President Trump United Nations Speech Names North Korea and Iran As Threats to World Peace and Critical of Those Nations (China) Who Trade With Them –Totally Destroy North Korea And The Rocket Man Mr. Kim — Videos —

Story 2: Major 7.1 Richter Scale Killer Earthquake Hits Central Mexico — 76 Miles Southwest of Mexico City Centered in Puebla state town of Raboso,  — Damages and Collapses Buildings — Over 150 Deaths — Videos —

Story 3: Category 5 Hurricane Marie With Sustained Winds of 165 Miles Per Hour and Wind Gust 195 MPH Hits Puerto Rico, British and American Virgin Islands, Dominica, Dominican Republic, Guadeloupe — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/19/the-pronk-pops-show-967-september-19-2017-story-1-president-trump-united-nations-speech-names-north-korea-and-iran-as-threats-to-world-peace-and-critical-of-those-nations-china-who-trade-with-th/

September 19, 2017 05:33 PM PDT

The Pronk Pops Show 966

September 18, 2017

Story 1: Two Islamic Terrorists Arrested For London Train Attack — United Kingdom Threat Level Lowered From Critical To Severe — Elderly Couple Took In Several Hundred Forster Children Over The Years Including Two Suspected Terrorists — Trump: “Loser Terrorist” And “Sick And Demented” — 21-Year-Old Syrian Refugee Yahyah Farroukh Named Suspect — Videos —

Story 2: Trump Wants To Increase CIA Drone Attacks — Videos —

Story 3: Third Night Of Violence In St. Louis — Protesters And Vandals Damage Property With Over 120 Arrests And 11 Police Injured — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/19/the-pronk-pops-show-966-september-18-2017-story-1-two-islamic-terrorists-arrested-for-london-train-attack-united-kingdom-threat-level-lowered-from-critical-to-severe-elderly-couple-took-in/

September 18, 2017 07:42 PM PDT

The Pronk Pops Show 965

September 15, 2017

Breaking Story 1: Radical Islamic Terrorist Attack — Improvised Bucket Bomb Device Explodes In United Kingdom Parson Green Tube Train Station in West London During Morning Rush Hour — 29 Injured None Seriously including Children — Threat Level Raised From Severe To Critical By Prime Minister May — Videos —

Story 2: North Korea Fires Another Ballistic Missile Over Japan — Videos —

Story 3: Conservative Commentator Ben Shapiro Allowed To Speak At University of California, Berkeley, Police Arrested Nine of The Protesters –Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/15/the-pronk-pops-show-965-september-15-2017-breaking-story-1-radical-islamic-terrorist-attack-bucket-bomb-device-explodes-in-united-kingdom-parson-green-tube-train-station-in-west-london-during-rush/

September 16, 2017 01:45 PM PDT

The Pronk Pops Show 964

September 14, 2017

Story 1: Did President Trump Betray His Supporters By Promising Citizenship or Pathway To Citizenship For Illegal Alien “Dreamers”? — Big Lie Media and Lying Lunatic Left Losers (Senate Democratic Leader Chuck Schumer and House Democratic Leader Nancy Pelosi ) Say They Have A Deal or Understanding and Rollover Republicans Support Trump (Senate Majority Leader Mitch McConnell and House Speaker Paul Ryan) — No Wall and No Deportation For 30-60 Million Illegal Aliens Including “Dreamers” — You Were Warned Not To Trust Trump — Rollover Republicans Want Touch-back Amnesty For Illegal Aliens — Hell No — Illegal Aliens Must Go — Trump Has 48 Hours To Confirm or Deny! — Political Suicide Watch Countdown — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/14/the-pronk-pops-show-964-september-14-2017-story-1-did-president-trump-betray-his-supporters-by-promising-citizenship-or-pathway-to-citizenship-for-illegal-alien-dreamers-big-lie-media-and/

September 14, 2017 08:25 PM PDT

The Pronk Pops Show 963

September 13, 2017

Story 1: American Collectivism (Resistance Is Futile) Vs. American Individualism (I Have Not Yet Begun To Fight!) — Federal Income, Capital Gains, Payroll,Estate And Gift Taxes, Budget Deficits, National Debt, Unfunded Liabilities, Democratic And Republican Parties, Two Party Tyranny Of The Warfare And Welfare State And American Empire Are The Past — The Future Is Fair Tax Less, Surplus Budgets, No Debts, No Unfunded Liabilities, And American Independence Party With A Peace And Prosperity Economy, Representative Constitutional American Republic Are The Future — Lead, Follow Or Get Out Of The Way — Those Without Power Cannot Defend Freedom — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/13/the-pronk-pops-show-963-september-13-2017-story-1-american-collectivism-resistance-is-futile-vs-american-individualism-i-have-not-yet-begun-to-fight-federal-income-capital-gains-payrol/

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 970-971

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show — Week In Review — July 20-27, 2017 — Videos

Posted on July 29, 2017. Filed under: American History, Articles, Blogroll, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, Constitution, Crime, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Economics, Education, Employment, External Hard Drives, Farming, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, Friends, government, government spending, Health Care, history, Internal Revenue Service (IRS), Investments, IRS, Islam, Journalism, Law, liberty, Life, Links, Literacy, media, Narcissism, National Security Agency (NSA), National Security Agency (NSA_, Newspapers, Obamacare, People, Philosophy, Photos, Political Correctness, Politics, Press, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Security, Spying, Strategy, Success, Supreme Court, Talk Radio, Tax Policy, Taxes, Technology, Television, Terrorism, Transportation, Unemployment, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 936,  July 27, 2017

Pronk Pops Show 935,  July 26, 2017

Pronk Pops Show 934,  July 25, 2017

Pronk Pops Show 934,  July 25, 2017

Pronk Pops Show 933,  July 24, 2017

Pronk Pops Show 932,  July 20, 2017

Pronk Pops Show 931,  July 19, 2017

Pronk Pops Show 930,  July 18, 2017

Pronk Pops Show 929,  July 17, 2017

Pronk Pops Show 928,  July 13, 2017

Pronk Pops Show 927,  July 12, 2017

Pronk Pops Show 926,  July 11, 2017

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

 

Image result for branco cartoons r repeal of obamacareImage result for branco cartoons big government republicans failure to repeal obamacare

Image result for branco cartoons big government republicans failure to repeal obamacare

Image result for cartoons obama, rice, brennan spied on trump and american people

The Pronk Pops Show 936

July 27, 2017

Story 1surprisedbama Spy Scandal: Obama Administration Officials Including National Security Adviser Rice, CIA Director Brennan and United Nations Ambassador Power Spied On American People and Trump Campaign By Massive Unmasking Using Intelligence Community For Political Purposes — An Abuse of Power and Felonies Under U.S. Law — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/28/the-pronk-pops-show-936-story-1obama-spy-scandal-obama-administration-officials-including-national-security-adviser-rice-cia-director-brennan-and-united-nations-ambassador-power-spied-on-american/

July 28, 2017 07:12 PM PDT

The Pronk Pops Show 935

July 26, 2017

Story 1: Trump Targets Transgender Troops — No More Gender Reassignment Surgeries In Military and Veterans Hospital — Cuts Spending By Millions Per Year — What is Next? — No More Free Viagra — Tranny Boys/Girls No More — Videos —

Story 2: Senate Fails To Pass Senator Rand Paul’s Total Repeal Amendment — Tea Party Revival Calling For Primary Challenge Against Rollover Republican Senators Shelley Moore Capito of West Virginia, Susan Collins of Maine, Dick Heller of Nevada, John McCain of Arizona, Rob Portman of Ohio, Lamar Alexander of Tennessee and Lisa Murkowski of Alaska — All Republicans in Name Only — Really Big Government Democrats — Videos —

Story 3: Trump Rally in Ohio — Neither A Rally Nor A Movement Is Not A Political Party That Votes in Congress — New Viable and Winning American Independence Party Is What Is Needed –Videos

For additional information and videos:

https://wordpress.com/post/pronkpops.wordpress.com/26375

July 27, 2017 02:28 PM PDT

The Pronk Pops Show 934

July 26, 2017

Story 1: Pence Breaks Tie — Senate Will Debate How To Proceed With Obamacare Repeal and Replace — Videos —

Story 2: Congress Overwhelming Passes New Sanctions on Russia, Iran and North Korea — Long Overdue — Videos —

Story 3: Trump Again Critical Of Attorney General Sessions Apparently For Not Prosecuting Leakers and Going After Clinton Foundation Crimes — What about Obama Administration’s Spying On Trump — An Abuse of Power Using Intelligence Community for Political Purposes — Will Trump Dump Sessions? If He Does Trump Will Start To Lose His Supporters in Talk Radio and Voter Base — Direct Deputy Attorney Rod Rosenstein To Fire Mueller — If He Won’t Fire Him — Fire Both Mueller and Rosenstein —  Punish Your Enemies and Reward Your Friends President Trump! — “In Your Guts You Know He is Nuts” —  Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/25/the-pronk-pops-show-934-july-24-2017-breaking-breaking-story-1-pence-breaks-tie-senate-will-debate-how-to-proceed-with-obamacare-repeal-and-replace-videos-story-2-congress-overwhel/

July 26, 2017 07:00 PM PDT

The Pronk Pops Show 933

July 24, 2017

Story 1: The American People Do Not Care About Phony Russian/Trump Collusion Conspiracy of The Lying Lunatic Left, Delusional Democrats and Big Lie Media — They’re Coming To Take You Away To The Funny Farm To Play with Your Ding-a-Ling — Videos —

Story 2: Trump Should Read Saul Alinski Rules For Radicals To Understand What Is Going On — Then Have Department of Justice Investigate The Clinton Charitable Foundation For Public Corruption and  Obama Administration For Abuse of Power Using Intelligence Community for Political Purposes And Then  Fire Mueller For Conflicts of Interests — The Sooner The Better — Go On Offense Stop Playing Defense — Just Do It! — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/24/the-pronk-pops-show-923-july-24-2017-story-1-the-american-people-do-not-care-about-phony-russiantrump-collusion-conspiracy-of-the-lying-lunatic-left-delusional-democrats-and-big-lie-media-the/

July 22, 2017 01:17 PM PDT

The Pronk Pops Show 932

July 20, 2017

Story 1: O.J. Simpson Granted Parole When Eligible — The Juice Will Soon Be Loose — Videos —

Story 2: President Trump’s First Six Months — Videos —

Story 3: President Trump Will Keep Attorney General Sessions For Now — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/20/the-pronk-pops-show-932-story-1-o-j-simpson-granted-parole-when-eligible-the-juice-will-soon-be-loose-videos-story-2-president-trumps-first-six-months-videos-story-3-president-tr/

July 22, 2017 10:49 AM PDT

The Pronk Pops Show 931

July 19, 2017

Story 1: “Obamacare Failed” Says President Trump — Wants Obamacare Completely  Repealed and Replaced Sooner or Later — Obama Lied To American People — Does President Trump Understand The Relationship Between Pre-existing Conditions, Guaranteed Issue, Community Rating and Adverse Selection — Many Doubt Trump Really Understands The Relationship That Is The Real Reason Obamacare Was Designed To Fail From The Beginning So It Could Be Replaced By Single Payer Government Health Care — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/20/the-pronk-pops-show-931-july-19-2017-story-1-obamacare-failed-says-president-trump-wants-obamacare-completely-repealed-and-replaced-sooner-or-later-obama-lied-to-american-people/

July 19, 2017 07:34 PM PDT

The Pronk Pops Show 930

July 18, 2017

Story 1: Will Trump Challenge The Washington Establishment To Achieve His Promises? You Betcha. Will He Win? Long Shot –A Movement Is Not A Viable Political Party That Can Beat The Democratic Party and Republican Party and Their Allies In The Big Government Bureaucracies, Big Lie Media and The Owner Donor Class — Votes Count — Independence Party???– Videos —

Story 2: Replace Republicans With D and F Conservative Review Grades and Scores Root and Branch With Real Conservatives, Classical Liberals and Libertarians Until New Political Party Is Formed and Becomes A Viable Party — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/19/the-pronk-pops-show-970-july-18-2017-story-1-will-trump-challenge-the-washington-establishment-to-achieve-his-promises-yes-will-he-win-long-shot-a-movement-is-not-a-viable-political-party-tha/

July 19, 2017 01:38 PM PDT

The Pronk Pops Show 929

July 17, 2017

Story 1: Downsizing The Federal Government or Draining The Swap: Trump Should Permanently Close 8 Departments Not Appoint People To Run Them — Cut All Other Department Budgets by 20% — Video —

Story 2: Federal Spending Breaks $4 Trillion for Fiscal Year 2017 —

Story 3: The American People and President Trump Vs. Political Elitist Establishment of The Big Government Democratic and Republican Parties — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/18/the-pronk-pops-show-929-july-17-2017-story-1-downsizing-the-federal-government-or-draining-the-swap-trump-should-permanently-close-8-departments-not-appoint-people-to-run-them-cut-all-other-de/

July 17, 2017 08:21 PM PDT

The Pronk Pops Show 928

July 13, 2017

Story 1: Senate Revised Republican Repeal and Replacement Bill A Betrayal of Voters Who Gave Republicans Control of Senate and House — Does Not Repeal All Obamacare Mandates, Regulations and Taxes but Does Bailout Insurance Industry and States Who Extended Medicaid Benefits — Trump Should Veto This Betrayal By Republican Establishment of Republican Voters — Videos —

Story 2: Estimated insolvency date of Social Security’s Trust fund is 2034 — and Medicare’s Hospital Trust Fund is 2029 —  Social Security and Medicare Benefits Will Be Cut or Taxes Raised or Combination of Benefit Cuts and Tax Increases — Videos —

Story 3: Trump’s Broken Promises and Kept Promises — Good Intentions are Not Enough — Only Results Count — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/15/the-pronk-pops-show-928-july-13-2017-story-1-senate-revised-republican-repeal-and-replacement-bill-a-betray-of-voters-who-gave-republicans-control-of-senate-and-house-does-not-repeal-all-obamac/

July 14, 2017 05:00 PM PDT

The Pronk Pops Show 927

July 12, 2017

Story 1: Putin’s Sting — How Russian Intelligence Service (FSB) Played The Washington Political Elitist Establishment (Democrats and Republicans) And Big Lie Media And How They Fell Hook, Line and Sinker for Russian Intelligence Disinformation Campaign — Russian Trump Dossier — The Dangers of Opposition Research, Confirmation Bias, True Believers, Useful Idiots, Blind Ambition and Two Party Tyranny — The Sting Redux — Videos —

Story 2: Republican Sellout The Republican Voter Base By Not Repealing Obamacare Completely — Leaves Many Obamacare Regulations, Subsidies, and Taxes In Place –Republican Replacement of Obamacare  Is A Big Bailout Bill of Insurance Industry — The Stupid Republican Party About To Commit Political Suicide — Rest In Peace — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/13/the-pronk-pops-show-927-july-12-2017-story-1-putins-sting-how-russian-intelligence-played-the-washington-political-elitist-establishment-democrats-and-republicans-and-big-lie-media-and-the/

July 12, 2017 08:04 PM PDT

The Pronk Pops Show 926

July 11, 2017

Story 1: Much Ado About Nothing — What Dirt Did The Russians Have On Hillary Clinton? — Donald Trump Jr. Wanted To Know — Smells Like A Russian Setup and/or Democrat Dirty Trick — Who Leaked The Emails To New York Times? — American People Ignoring Paranoid Progressive Propaganda of Big Lie Media — Still Waiting For Any Evidence of Trump/Russian/Putin Collusion — Clinton Collusion Conspiracy Crashing — Desperate Delusional Democrat Deniers of Reality — Videos —

Story 2: When Will Attorney General Sessions Appoint A Special Counsel To Investigate Intelligence Community Leaks and Hillary Clinton Mishandling of Classified Documents and Related Pay for Play Public Corruption of Clinton Foundation? — Was Democratic Hired Opposition Research firm Fusion GPS and Christopher Steel Formerly of British Intelligent MI-6 Agent A Cutout For The Russian Disinformation Campaign Included in The Donald Trump — Russia Dossier? — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/12/the-pronk-pops-show-926-july-11-2017-story-1-much-ado-about-nothing-what-dirt-did-the-russians-have-on-hillary-clinton-donald-trump-jr-wanted-to-know-smells-like-a-russian-setup-andor/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 926-936

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

National Security Agency Is Spying On All American Who Use The Internet and Telephone System and They Collect and Store All Your Communications — Includes Trump and Associates — No Warrant Required If President Obama Designates You A Target — Congress Is Enabling The Turnkey Two Party Tyranny — Warrentless Searches — Congress Does Nothing To Stop It! — Videos

Posted on March 17, 2017. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Data, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, European History, External Hard Drives, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Friends, government spending, Heroes, history, Illegal, Immigration, Internal Revenue Service (IRS), IRS, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Sociology, Space, Spying, Strategy, Supreme Court, Systems, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for NSA utah data center

Image result for NSA utah data centerImage result for NSA utah data centerImage result for National security agencyImage result for National security agency

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Published on Jul 8, 2013

The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

If you think you can handle the truth, well here it is folks

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show] 

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

Polygraphin

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting[edit]

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]

Computing[edit]

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[168]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[171] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[175] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[176] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[177] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[175]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[174]

Following the signing in 1946–1956[178] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[179] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[180] New Zealand.[181]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[192]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[193] Today it is a legacy system, and several NSA stations are closing.[175]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[194] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[195]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[206]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[219]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[224] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[225] based on documentation provided by former AT&T technician Mark Klein.[226]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235] Rasmussen Reports found that 59% of Americans disapprove,[236] Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]

July 2015 – WikiLeaks: Espionage against German federal ministries[edit]

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]

Suspected responsibility for hacking operations by the Equation Group[edit]

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31

Software backdoors

Linux kerne

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[263]However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[264]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
Microsoft Windows
Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]

Role in scientific research and development[

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[278]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[279][280]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[281]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[280]
  • KY-57 VINSON tactical radio voice encryptor[281]
  • KG-84 Dedicated Data Encryption/Decryption[281]
  • STU-III secure telephone unit,[281] phased out by the STE[282]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]

Legality

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs

In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

https://en.wikipedia.org/wiki/National_Security_Agency

Read Full Post | Make a Comment ( None so far )

President Trump Accuses Obama of Wiretapping Trump Tower — Abuse by National Security Agency — What did Obama know and When Did He Know It? — Arrogance and Abuse of Presidential Powers — Obama’s Towergate! — Turnkey Two Party Totalitarian Tyranny of Secret Surveillance Spying Security State — Videos

Posted on March 4, 2017. Filed under: American History, Blogroll, Communications, Congress, Crime, Crisis, Cult, Culture, Data, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, history, Law, liberty, Life, Links, media, National Security Agency (NSA), National Security Agency (NSA_, People, Philosophy, Photos, Radio, Rants, Raves, Security, Strategy, Taxation, Taxes, Television, Terrorism, Video, War, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , |

Image result for cartoons on obama scandals

Image result for cartoons on obama scandals

Image result for obama many scandals

Image result for obama caught wiretapping trump

Image result for cartoons obama wiretapping trump towerMark Levin Provides ProofObama Admin Wiretapped Trump Tower | Fox & Friends

Published on Mar 5, 2017

LIKE | COMMENT | SUBSCRIBE

Mark Levin Provides Proof Obama Admin Wiretapped Trump Tower | Fox & Friends

Trump Accuses Obama of Wiretapping – Is there any evidence of Collusion?

Intelligence Officer Claims Obama Was Involved In The Wiretapping

Bombshell! Trump Tweets, Obama Wire Tapped Trump Tower! “He Is Bad And Sick”! Dwarf’s Watergate!

Did President Obama Spy On Donald Trump? | True News

What Would It Mean If Former President Obama Wiretapped Trump Tower? | TODAY

News Trump ‘Donald Trump started this’ Host loses it with Sarah Huckabee Sanders’ wiretapping spin

Lindsey Graham on President Trump accuses Obama of wiretapping him Trump Tower phones

TOWERGATE UPDATE: Obama Faces Indictment for Wiretapping Trump Tower Says Fox

No, Presidents Can’t Order Wiretaps | AM Joy | MSNBC

Obama Wiretapped Trump Phone Before Election?

Obama Explains NSA Wiretapping

NSA wiretapping — a 4th Amendment violation? Blake Norvell at TEDxSMU

John Brennan, Obama involved in bugging Trump Campaign during election

NSA whistleblower Edward Snowden “My Greatest Fear … is turnkey tyranny”

EDWARD SNOWDEN Everything about Donald Trump

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

United States of Secrets: William Binney

NSA Whistleblower William Binney: The Future of FREEDOM

IF THE FEDS DID WIRETAP TRUMP TOWER, IT’S NOT OBAMA WHO SHOULD WORRY

Republican president-elect Donald Trump

Early Saturday morning, President Trump fired off a series of tweets accusing, without evidence, former President Barack Obama of wiretapping Trump Tower in the month before the election. Trump compared the alleged snooping to “Nixon/Watergate,” and intimated legal action.

Is it legal for a sitting President to be “wire tapping” a race for president prior to an election? Turned down by court earlier. A NEW LOW!

What makes the broader allegation so extraordinary isn’t that it is new. Quite the contrary. Various reports that the Foreign Intelligence Surveillance Court granted Justice Department investigators a warrant to probe the Trump campaign’s ties with Russia surfaced in November. What makes Trump’s Twitter tirade so striking is what prompted it, and what it might imply if it’s true.

Anatomy of an Allegation

Baffling as it may be, it appears Trump’s accusation stems from a recent article published on Breitbart, the conservative news outlet formerly run by White House senior adviser Stephen Bannon.

“This is a somewhat stunning, in so far as the president of the United States doesn’t need to get his information about classified activity from Breitbart,” says Cato Institute fellow Julian Sanchez.

That story, “Mark Levin to Congress: Investigate Obama’s ‘Silent Coup’ Vs. Trump,” rehashes comments the titular conservative radio host made Thursday equating the previously reported FISA warrant with a “police state,” and accuses Obama of a politically motivated, covert attempt to undermine Trump and his associates.

It’s unclear just what prompted Levin’s rant, or why Trump glommed onto it. Although no one has confirmed a FISA investigation, or wiretaps in Trump Tower, several news outlets have reported the former’s existence. The most detailed account thus far, from the BBC in January, provided a timeline: The Justice Department sought a FISA warrant in June to intercept communications from two Russian banks suspected of facilitating donations to the Trump campaign. The judge reportedly rejected the warrant, as well as a narrower version sought in July. A new judge granted the order in mid-October, according to the BBC.

However strongly Trump feels that he’s right, he’d better hope he’s wrong.

None of this necessarily makes Trump’s allegations true. Even if a FISA warrant exists, it does not mean Trump Tower is tapped or that Trump specifically is the target. Further complicating things, the existence of a wiretap would not necessarily confirm the existence of a FISA warrant. Almost half of the building’s 58 floors are dedicated to commercial and office space, and any one of them—not to mention the building’s residents—could be the target of an investigation unrelated to international espionage or election tampering.

“If he has evidence that he was wiretapped without a proper FISA order being sought, that would be a huge scandal, and he should produce whatever evidence he’s got,” says Sanchez. “It’s a pretty serious claim, and it’s striking he would make it without anything solid to back it up.”

Republican Senator Ben Sasse called on the president to clarify his claims, stating that “we are in the midst of a civilization-warping crisis of public trust.” Obama spokesperson Kevin Lewis strongly denied extra-judicial surveillance of any US citizens to Politico in response to the claims..

Look past the president’s conspiracy theories, though, and one fact stands out: However strongly Trump feels that he’s right, he’d better hope he’s wrong.

Tower of FISA

If nothing else, Trump’s tweets show he doesn’t understand how the FISA system works. If he did, he may have limited himself to tweeting about Arnold Schwartzenegger quitting The Apprentice this morning.

“While the order would have been requested by some part of the executive branch, Obama can’t order anything. Nor can Trump,” says former NSA lawyer April Doss, who stresses that her comments are based only on public information. “The order has to come from the court, and the court operates independently.”

FISA court judges serve seven-year appointments, so the court’s composition doesn’t ebb and flow with the political tides. What’s more, specific laws adopted in the wake of Watergate prevent the very activity Trump accuses Obama of.

“You can’t tap the phones of a political candidate for political purposes,” says Doss.

What you could tap them for? Acting as a foreign power, or as an agent of a foreign power. In other words, spying against US interests with both knowledge and intent.

Clearing that bar is difficult, by design. FISA warrants don’t allow for broad wiretaps of, say, every call going in and out of a specific office in a 58-story Manhattan skyscraper. Federal authorities must demonstrate not just probable cause, but that a given phone line serves primarily to undermine US interests. It’s difficult, for instance, to obtain a warrant to wiretap a shared office, for fear of picking up innocent third-party conversations.

“I have high confidence that a FISA court judge would not have authorized any warrant unless it met all the requirements under the statute,” says Doss.

Trump’s wiretap claims, then, carry presumably inadvertent implications. First, based on previous reporting and the nature of FISA courts, any wiretaps within Trump Tower would be legal. And they would stem from overwhelming evidence that the Trump campaign, or someone within it, has unsavory ties to Russia or another foreign power. Otherwise, it’s unlikely those wiretaps would exist at all.

If federal authorities did have cause to listen in on Trump Tower, though, and they provided enough evidence for a FISA court to approve the snooping, Obama is not the one who ought to worry.

With additional reporting by Andy Greenberg.

This story has been updated to include responses from Obama spokesperson Kevin Lewis and GOP Senator Ben Sasse, and to reflect that FISA court judges serve seven-year terms, not lifetime tenure.

https://www.wired.com/2017/03/feds-wiretap-trump-tower-not-obama-worry/

 

Trump asks Congress to probe alleged illicit campaign investigations

AFPMarch 5, 2017
US President Donald Trump pictured during a meeting with parents and teachers at Saint Andrew Catholic School in Orlando, Florida, on March 3, 2017
US President Donald Trump pictured during a meeting with parents and teachers at Saint Andrew Catholic School in Orlando, Florida, on March 3, 2017 (AFP Photo/Nicholas KAMM)
More

Washington (AFP) – President Donald Trump is asking Congress to probe “potentially politically motivated investigations” during the 2016 campaign, the White House said Sunday.

The announcement came one day after Trump took to Twitter to accuse his predecessor Barack Obama of tapping his phones ahead of the November election, without providing evidence of the explosive charge.

An Obama spokesman has denied Trump’s accusation as “simply false.”

Related Video:

For more news videos visit Yahoo View, available now on iOS and Android.

In his statement, White House Press Secretary Sean Spicer referred to unspecified reports of “potentially politically motivated investigations immediately ahead of the 2016 election” as “very troubling.”

“President Donald J. Trump is requesting that as part of their investigation into Russian activity, the congressional intelligence committees exercise their oversight authority to determine whether executive branch investigative powers were abused in 2016,” Spicer said.

He added that there would be no more comment on the matter from Trump or the White House.

Trump leveled his charges against Obama early Saturday, at the end of a week in which his administration was battered by controversy over communications between Russian officials and some of his senior aides including Attorney General Jeff Sessions.

“I’d bet a good lawyer could make a great case out of the fact that President Obama was tapping my phones in October, just prior to Election!” Trump wrote.

“How low has President Obama gone to tapp (sic) my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!” he wrote in another tweet, referring to the political scandal that toppled president Richard Nixon in 1974.

https://www.yahoo.com/news/trump-asks-congress-probe-alleged-illicit-campaign-investigations-143333695.html

President Barack Obama and President-elect Donald J. Trump on Inauguration Day. Mr. Trump has praised Mr. Obama repeatedly since taking office. But on Saturday, he called his predecessor a “bad (or sick) guy.”CreditDamon Winter/The New York Times

WEST PALM BEACH, Fla. — President Trump on Saturday accused former President Barack Obama of tapping his phones at Trump Tower the month before the election, taking to Twitter to call his predecessor a “bad (or sick) guy.”

Without offering any evidence or providing the source of his information, Mr. Trump fired off a series of Twitter messages claiming that Mr. Obama “had my ‘wires tapped.’ ” He likened the supposed tapping to “Nixon/Watergate” and “McCarthyism.”

A spokesman for Mr. Obama said any suggestion that the former president had ordered such surveillance was “simply false.”

Mr. Trump’s aides declined to clarify whether the president’s explosive allegations were based on briefings from intelligence or law enforcement officials — which could mean that Mr. Trump was revealing previously unknown details about an investigation — or on something else, like a news report.

His decision to lend the power of his office to such a charged claim against his predecessor — without offering any initial proof — was remarkable, even for a leader who has repeatedly shown himself willing to make assertions that are false or based on dubious sources.

It would have been difficult for federal agents, working within the law, to obtain a wiretap order to target Mr. Trump’s phone conversations. It would have meant that the Justice Department had gathered sufficient evidence to persuade a federal judge that there was probable cause to believe he had committed a serious crime or was an agent of a foreign power, depending on whether it was a criminal investigation or a foreign intelligence one.

Former officials pointed to longstanding laws and procedures intended to ensure that presidents cannot wiretap a rival for political purposes.

“A cardinal rule of the Obama administration was that no White House official ever interfered with any independent investigation led by the Department of Justice,” said Kevin Lewis, a spokesman for Mr. Obama. “As part of that practice, neither President Obama nor any White House official ever ordered surveillance on any U.S. citizen.”

But a senior White House official said that Donald F. McGahn II, the president’s chief counsel, was working on Saturday to secure access to what Mr. McGahn believed was an order issued by the Foreign Intelligence Surveillance Court authorizing some form of surveillance related to Mr. Trump and his associates.

The official offered no evidence to support the notion that such an order exists. If one does, it would be highly unusual for a White House to order the Justice Department to turn over such an investigative document, given the traditional independence of law enforcement matters.

It has been widely reported that there is a federal investigation, which began during the 2016 presidential campaign, into links between Trump associates and the Russians. That issue has dogged Mr. Trump for months.

In one message, which Mr. Trump sent from his Palm Beach, Fla., estate at 6:35 a.m., the president said he had “just found out” that his phones had been tapped before the election. Mr. Trump’s reference to “wires tapped” raised the possibility that he was referring to some other type of electronic surveillance and was using the idea of phone tapping loosely.

Two people close to Mr. Trump said they believed he was referring to a Breitbart News article, which aides said had been passed around among his advisers. Mark Levin, a conservative radio host, had also embraced the theory recently in a push against what right-leaning commentators have been calling the “deep state.”

The Breitbart article, published on Friday, claimed that there was a series of “known steps taken by President Barack Obama’s administration in its last months to undermine Donald Trump’s presidential campaign and, later, his new administration.”

If Mr. Trump was motivated to take to Twitter after reading the Breitbart article or listening to Mr. Levin, he was using a presidential megaphone to spread dark theories of a broad conspiracy aimed at undermining his presidential ambitions, and later his presidency.

Even with the Breitbart article circulating, several of Mr. Trump’s advisers were stunned by the president’s morning Twitter outburst. Those advisers said they were uncertain about what specifically Mr. Trump was referring to; one surmised that he may also have been referring to a months-old news report about a secret surveillance warrant for communications at his New York offices.

One senior law enforcement official from the Obama administration, who has direct knowledge of the F.B.I. investigation into Russia and of government wiretapping, said that it was “100 percent untrue” that the government had wiretapped Mr. Trump. The official, who asked for anonymity to discuss matters related to investigations and intelligence, said the White House owed the American people an explanation for the president’s allegations.

Ben Rhodes, a former top national security aide to Mr. Obama, said in a Twitter message directed at Mr. Trump on Saturday that “no president can order a wiretap” and added, “Those restrictions were put in place to protect citizens from people like you.”

The House and Senate Intelligence Committees are moving forward with their own investigations into Russia’s efforts to influence the election, and they have said they will examine links between Mr. Trump’s associates and the Russians.

Senator Chris Coons, Democrat of Delaware, said on Friday that he believed there were “transcripts” that would help document those contacts, though he said he had not yet seen them.

Photo

Mr. Trump claimed the Obama administration ordered the phoned at his building in New York tapped. CreditVictor J. Blue for The New York Times

“There are transcripts that provide very helpful, very critical insights into whether or not Russian intelligence or senior Russian political leaders — including Vladimir Putin — were cooperating, were colluding, with the Trump campaign at the highest levels to influence the outcome of our election,” Mr. Coons told Andrea Mitchell on MSNBC. “I believe they exist.”

In a written statement on Saturday, a spokesman for Mr. Coons said that the senator “did not imply that he is aware of transcripts indicating collusion between the Trump campaign and the Russians.” The spokesman, Sean Coit, said Mr. Coons “simply stated that a full review of all relevant transcripts and intelligence intercepts is necessary to determine if collusion took place.”

The New York Times reported in January that among the associates whose links to Russia are being scrutinized are Paul Manafort, Mr. Trump’s onetime campaign chairman; Carter Page, a businessman and foreign policy adviser to the campaign; and Roger Stone, a longtime Republican operative who said he was in touch with WikiLeaks at one point before it released a trove of emails from John D. Podesta, Hillary Clinton’s campaign chairman, last August. Mr. Stone later said he had communicated with WikiLeaks through an intermediary.

Mr. Trump appeared on Saturday to suggest that warrants had been issued by the Foreign Intelligence Surveillance Court. He claimed that the Obama administration had once been “turned down by court” in its supposed efforts to listen in on conversations by Mr. Trump and his associates.

In the fall, the F.B.I. examined computer data showing an odd stream of activity between a Trump Organization server and Alfa Bank, one of Russia’s biggest banks, whose owners have longstanding ties to Mr. Putin. While some F.B.I. officials initially believed that the computer activity indicated an encrypted channel between Moscow and New York, the bureau ultimately moved away from that view. The activity remains unexplained.

There is no confirmed evidence that the F.B.I. obtained a court warrant to wiretap the Trump Organization or was capturing communications directly from the Trump Organization.

During the transition, the F.B.I. — which uses FISA warrants to eavesdrop on the communications of foreign leaders inside the United States — overheard conversations between the Russian ambassador to the United States and Michael T. Flynn, whom Mr. Trump had named national security adviser.

Mr. Trump has pointedly and repeatedly questioned in conversations how it was that Mr. Flynn’s conversations were recorded, and wondered who could have issued a warrant.

After The Washington Post reported that Mr. Flynn and the ambassador, Sergey I. Kislyak, had discussed sanctions that the Obama administration had just imposed on Russia, Mr. Flynn was pushed out of his post by the White House because he had lied to Vice President Mike Pence about the nature of the calls.

The Breitbart article cited mainstream news reports and concluded — going beyond the public record — that the Obama administration had “obtained authorization to eavesdrop on the Trump campaign; continued monitoring the Trump team even when no evidence of wrongdoing was found; then relaxed the N.S.A. rules to allow evidence to be shared widely within the government.”

Mr. Levin, a day earlier, railed about what he called a “much bigger scandal,” claiming — again with no evidence — that Mr. Obama and his aides had used “the instrumentalities of the federal government, intelligence activity, to surveil members of the Trump campaign and put that information out in the public.”

Several senior members of Mr. Trump’s White House staff, including his spokesman, Sean Spicer, did not respond to an email requesting on-the-record responses to more than a half-dozen questions about Mr. Trump’s Twitter posts.

Representative Adam B. Schiff, the top Democrat on the House Intelligence Committee, denounced the “willingness of the nation’s chief executive to make the most outlandish and destructive claims without providing a scintilla of evidence to support them.”

Even some Republican lawmakers questioned Mr. Trump’s accusations. Senator Ben Sasse of Nebraska issued a statement demanding that the president reveal everything he knows about any wiretaps or warrants.

“The president today made some very serious allegations, and the informed citizens that a republic requires deserve more information,” Mr. Sasse said, adding that “we are in the midst of a civilization-warping crisis of public trust.”

Taping calls seems to hold a spot in Mr. Trump’s consciousness. He spent many years taping his own phone calls as a businessman. During the campaign, Mr. Trump’s staff members told reporters they feared that their offices were being bugged.

But Mr. Trump’s latest allegations represented a sharp change in his tone toward Mr. Obama.

The current president has frequently spoken about how much he admires Mr. Obama for the gracious way he handled the transition. But since taking office, Mr. Trump has frequently clashed with the intelligence agencies over the Russia inquiries, including efforts to examine the attempts by that country to influence the presidential election and the contacts between Mr. Trump’s aides and the Russian government.

In recent days, the president has appeared increasingly angry about leaks of information that he believes are coming from law enforcement and intelligence officials who are holdovers or recently departed from Mr. Obama’s administration.

People close to Mr. Trump have described him as determined to stop those people from sabotaging his administration. One adviser said on Friday that the president had been discussing a possible plan to try to prevent leaks from occurring. The adviser declined to elaborate on what the plan might entail.

Two senior administration officials said Mr. Trump had tried for two days to find a way to be on an offensive footing against the news articles resulting from leaks; one person close to Mr. Trump said his explosive claim was a result of that.

Mr. Trump’s mood was said to be volatile even before he departed for his weekend in Florida, with an episode in which he vented at his staff. The president’s ire was trained in particular on Mr. McGahn, his White House counsel, according to two people briefed on the matter.

Mr. Trump was said to be frustrated about the decision by Jeff Sessions, his attorney general, to recuse himself from participating in any investigations of connections between the Trump campaign and Russia. Mr. Trump has said there were no such connections. Mr. Trump, who did not learn that Mr. Sessions was recusing himself until after the decision was made, told aides that it gave an opening to his critics on the Russia issue.

Read Full Post | Make a Comment ( None so far )

Edward Snowden — Videos

Posted on September 21, 2016. Filed under: American History, Blogroll, Central Intelligence Agency (CIA), College, Communications, Computers, Computers, Congress, Constitution, Corruption, Crime, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Drones, Education, External Hard Drives, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, government spending, history, Investments, Language, Law, liberty, Life, Links, Literacy, media, Media Streamers, Mobile Phones, Money, National Security Agency (NSA), National Security Agency (NSA_, People, Philosophy, Photos, Police, Political Correctness, Politics, Psychology, Raves, Raymond Thomas Pronk, Regulations, Resources, Spying, Strategy, Systems, Talk Radio, Technology, Television, Terrorism, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for National security agency

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for National security agency Prism slides

Image result for edward snownden

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

DOCUMENTARY: Edward Snowden – Terminal F (2015)

Edward Snowden Live From Russia

Edward Snowden Speaks About Hillary Clinton Emails, Trump And Freedom

The Truth About Edward Snowden

America’s Surveillance State (Full, Pt. 1-6)

NSA Secrets Uncovered Snowden Coverup 2015 FULL Documentary

The Silent Order NSA Sees Everything Hears Everything Documentary HD

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

NSA Whistleblower William Binney: The Future of FREEDOM

People Who Control America ? Mind Blowing Documentary HQ

The New World Order – Fall of the Republic 2016 Freedom or Slavery

Enemy of the State – Will Smith, Gene Hackman, Jon Voight Movies

Read Full Post | Make a Comment ( None so far )

Why is the Wealth of Nations So Damn Long? — Increasing Returns For Pinheads — Videos

Posted on August 20, 2016. Filed under: Articles, Blogroll, Books, College, Data, Defense Intelligence Agency (DIA), Documentary, Economics, Education, Elections, Employment, Macroeconomics, Microeconomics, Monetary Policy, Trade Policiy | Tags: , , , , , , , , , , , , , , , , |

Four Horsemen – Feature Documentary – Official Version

The Real Adam Smith: Ideas That Changed The World – Full Video

The Real Adam Smith: Morality and Markets – Full Video

Adam Smith and the Birth of Economics | Lawrence Reed

The Division of Labor and Social Order | Jörg Guido Hülsmann

The Pin Factory

How Its Made Needles and Pins

Cato Events – On the Wealth of Nations

Increasing Returns and the New World of Business

The Law of Increasing Returns

By Ronald A. Bailey
This essay originally appeared in the National Interest.

Two hundred years after Thomas Robert Malthus published An Essay on the Principle of Population, demographers, ecologists, economists, biologists and policymakers still debate his theory of population. Leading foundations spend scores of millions of dollars on population programs, while the United Nations holds international conferences on the topic and even has a specialized agency, the United Nations Population Fund, devoted to the issue. Last year the Fund portentously declared that the world’s population reached six billion on October 12. Every year, hundreds of weighty studies and books pour from the universities and think tanks discussing what is to be done.Malthus advanced two propositions that he regarded as completely self-evident. First, that “food is necessary for the existence of man”, and second, that “the passion between the sexes is necessary and will remain nearly in its present state.” Based on these propositions, Malthus famously concluded that “the power of population is indefinitely greater than the power in the earth to produce subsistence for man. Population, when unchecked, increases in a geometrical ratio. Subsistence increases only in an arithmetical ratio. A slight acquaintance with numbers will show the immensity of the first power in comparison with the second.”

Malthus illustrated his hypothesis using two sets of numbers: “the human species would increase in the ratio of—1, 2, 4, 8, 16, 32, 64, 128, 256, 512, &c. and subsistence as—1, 2, 3, 4, 5, 6, 7, 8, 9, 10, &c.” He further asserted that “population does invariably increase where there are the means of subsistence.” Malthus’ dismal summary of the situation in which humanity finds itself is that some portion of mankind must forever be starving to death; and, further, efforts to aid the starving will only lead to more misery, as those initially spared from famine bear too many children to feed with existing food supplies.

In his first edition of the Essay, Malthus argued that there were two “checks” on population, “preventive” and “positive.” Preventive checks, those that prevent births, include abortion, infanticide and prostitution; positive checks include war, pestilence and famine. In later editions, he added a third check that he called “moral restraint”, which includes voluntary celibacy, late marriage and the like. Moral restraint is basically just a milder version of the earlier preventive check. If all else fails to keep human numbers under control, Malthus chillingly concludes,

“Famine seems to be the last, the most dreadful resource of nature. The power of population is so superior to the power in the earth to produce subsistence for man, that premature death must in some shape or other visit the human race. The vices of mankind are active and able ministers of depopulation. They are the precursors in the great army of destruction, and often finish the dreadful work themselves. But should they fail in this war of extermination, sickly seasons, epidemics, pestilence, and plague, advance in terrific array, and sweep off their thousands and ten thousands. Should success be still incomplete, gigantic inevitable famine stalks in the rear, and with one mighty blow, levels the population with the food of the world.”

Malthus’ principle of population has proved to be one of the most influential and contested theories in history. It provided a crucial insight for Charles Darwin as he was developing his theory of natural selection. In his autobiography, Darwin wrote that in October 1838,

“I happened to read for amusement Malthus on Population, and being well prepared to appreciate the struggle for existence which everywhere goes on, from long-continued observation of the habits of animals and plants, it at once struck me that under these circumstances favourable variations would tend to be preserved, and unfavourable ones would be destroyed. The result of this would be the formation of a new species. Here, then, I had at last got a theory by which to work.”

Naturalists, biologists and ecologists have since applied Malthusian theory not only to animals and plants, but to humans as well. Undeniably, his principle of population has an appealing simplicity, and has proved a fruitful hypothesis for ecology and population biology. It undergirds such biological concepts as carrying capacity, which is a measure of the population that a given ecosystem can support. The Kaibab Plateau deer, for example, is a famous case of an animal population outstripping its food supply. In the 1920s, the deer population expanded dramatically. In the absence of predators, a forage shortage ensued, which in turn led to a dramatic reduction of the deer population.

If the concept of carrying capacity can explain fluctuations in animal populations, some intellectuals have reasoned in the second half of the twentieth century, it should apply equally well to human populations. As Stanford University entomologist Paul Ehrlich has explained: “To ecologists who study animals, food and population often seem like sides of the same coin. If too many animals are devouring it, the food supply declines; too little food, the supply of animals declines… . Homo sapiens is no exception to that rule, and at the moment it seems likely that food will be our limiting resource.”

In the late 1960s, Ehrlich was one of many biologists and agronomists who began to issue dire warnings about human “overpopulation”, the most famous of which appeared in his book, The Population Bomb (1968). “The battle to feed all of humanity is over”, Ehrlich wrote. “In the 1970s, the world will undergo famines—hundreds of millions of people are going to starve to death in spite of any crash programs embarked on now.” Later, in an article for the first Earth Day in 1970, Ehrlich outlined a horrific scenario in which 65 million Americans and 4 billion other people would die of starvation in a “Great Die-Off” between 1980 and 1989. And in 1990 Ehrlich and his wife Anne published The Population Explosion, where they once again asserted that, “One thing seems safe to predict: starvation and epidemic disease will raise the death rates over most of the planet.” In these gloomy forecasts, Ehrlich was far from alone. In 1967, William and Paul Paddock asserted in their book, Famine 1975!, that, “The famines which are now approaching … are for a surety, inevitable… . In fifteen years the famines will be catastrophic.” Today, the Worldwatch Institute, a Washington, dc environmentalist advocacy group chaired by Lester Brown, still has a solid Malthusian focus.

Food is not the only resource said to be in short supply. In 1972 the Club of Rome, a group of politicians, businessmen and senior international bureaucrats, famously commissioned The Limits to Growth report, which concluded: “If the present growth trends in world population, industrialization, pollution, food production, and resource depletion continue unchanged, the limits to growth on this planet will be reached sometime in the next one hundred years. The probable result will be a rather sudden and uncontrollable decline in both population and industrial capacity.”

This is Malthus writ large: not only will humanity run out of food, but it will also run out of non-renewable resources like minerals and fossil fuels… .

The Primacy of Ideas

For decades, economists essentially used a two-factor model in which economic growth was accounted for by adding more labor and more capital to create more goods. The problem with this model is that over time growth must halt when the marginal value of the goods produced equals the cost of the labor and capital used to produce them. This neoclassical model of economic growth was elaborated in the 1950s by Nobelist Robert Solow and his colleagues, and was later incorporated into The Limits to Growth computer model. Relying on it, MIT researchers predicted eventual collapse as the inevitable result of continued economic and population growth.

In the last two decades, economic forecasters, following the lead of economist Paul Romer, have made a conceptual breakthrough that has enabled them to describe more rigorously and accurately—and differently—how economic growth occurs and how, with the proper social institutions, it can continue for the foreseeable future. Romer explains this approach, which has come to be known as the New Growth Theory:

“New growth theorists now start by dividing the world into two fundamentally different types of productive inputs that can be called ‘ideas’ and ‘things. ’ Ideas are nonrival goods that could be stored in a bit string. Things are rival goods with mass (or energy). With ideas and things, one can explain how economic growth works. Nonrival ideas can be used to rearrange things, for example, when one follows a recipe and transforms noxious olives into tasty and healthful olive oil. Economic growth arises from the discovery of new recipes and the transformation of things from low to high value configurations.”

Decoding the clunky economic terminology, “rival” goods are simply things that cannot be used by two or more persons at once, e.g., cars, drill presses, computers, even human bodies and brains. “Nonrival” goods can be used by any number of people simultaneously, e.g., recipes for bread, blueprints for houses, techniques for growing corn, formulas for pharmaceuticals, scientific principles like the law of gravity, and computer programs.

To understand the potency of ideas, consider that a few decades ago silicon was used primarily to make glass. Today it is a crucial component in microchips and optical fibers. Again, until fairly recently petroleum was known mainly as a nuisance for people engaged in drilling water wells; its use as a cheap lighting replacement for increasingly scarce whale oil only began in the 1890s, and soon after came the internal combustion engine.

We make ourselves better off, then, not by increasing the amount of resources on planet earth—that is, of course, fixed—but by rearranging resources we already have available so that they provide us with more of what we want. This process of improvement has been going on ever since the first members of our species walked the earth. We have moved from heavy earthenware pots to ultrathin plastics and lightweight aluminum cans. To cook our food we have shifted from wood-intensive campfires to clean, efficient natural gas. By using constantly improving recipes, humanity has avoided the Malthusian trap while at the same time making the world safer and more comfortable for an ever larger portion of the world’s population.

In fact, increasing, rather than diminishing, returns characterize many economic activities. For example, it may cost $150 million to develop the first vial of a new vaccine to prevent Lyme disease. Yet every vial after that is essentially free. The same is true for computer programs: it may cost Microsoft $500 million for the first copy of Windows 98, but each subsequent copy is merely the cost of the disk on which it is stored. Or in the case of telecommunications, laying a fiber optic network may cost billions of dollars, but once operational it can transmit millions of messages at virtually no added cost. And the low costs of each of these inventions make it possible for the people who buy them to be even more productive in their own activities—by avoiding illness, expediting word processing, and drastically increasing the tempo of information exchanges.

What modern Malthusians who fret about the depletion of resources miss is that it is not oil that people want; they want to cool and heat their homes. It is not copper telephone lines that people want; they want to communicate quickly and easily with friends, family and businesses. They do not want paper; they want a convenient and cheap way to store written information. In short, what is important is not the physical resource but the function to be performed; and for that, ideas are the crucial input. Robert Kates notes that technological discoveries have “transformed the meaning of resources and increased the carrying capacity of the Earth”; economist Gale Johnson concludes that history has clearly confirmed that “no exhaustible resource is essential or irreplaceable”; and economist Dwight Lee asserts that “the relevant resource base is defined by knowledge, rather than by physical deposits of existing resources.”

Romer sums it up this way: “Every generation has perceived the limits to growth that finite resources and undesirable side effects would pose if no new recipes or ideas were discovered. And every generation has underestimated the potential for finding new recipes and ideas. We consistently fail to grasp how many ideas remain to be discovered. The difficulty is the same one we have with compounding. Possibilities do not add up. They multiply.”

This, it should be noted, is the mirror image of Malthus’ argument about exponential growth. Here, however, ideas grow much faster than population.

By using a number of simple calculations, Romer illustrates the point that the number of possible discoveries and inventions is incomprehensibly vast. Take, for example, the chemical combinations one can derive from the periodic table of elements. There are about 100 different elements and if one serially combined any four, one would get about 94 million combinations. Romer further assumes that these elements could be combined in differing proportions ranging from 1 to 10. This yields 3,500 proportions times 94 million combinations and provides 330 billion different recipes in total. At the rate of 1,000 recipes per day, it would take scientists nearly a million years to evaluate them all. What is more, this vastly underestimates the actual number of combinations available, since one could combine more than four elements, in different proportions, at different temperatures and pressures—and so on and on.

Again, consider the number of computer programs that could be installed on a single computer hard disk drive. Romer calculates that the number of distinct software programs that can be put on a one-gigabyte hard disk is roughly one followed by 2.7 billion zeros. By comparison, the total number of seconds that have elapsed since the beginning of the universe is only about 1 followed by 17 zeros, and the total number of atoms in the universe is equal to about 1 followed by 100 zeros.

In short, then, people possess a nearly infinite capacity to rearrange physical objects by creating new recipes for their use. Yet some committed Malthusians object that Romer and others who hold that economic growth is potentially limitless not only violate the law of diminishing returns but transgress an even more fundamental physical law: the second law of thermodynamics. According to the second law, in a closed system disorder tends to increase. Think of a droplet of ink as a highly ordered pigment that is diluted when it is dropped into a ten-gallon aquarium. When the pigment’s molecules spread evenly throughout the water, disorder is at a maximum—that is, it becomes virtually impossible to reconstitute the droplet. The idea, then, is that the maintenance of order in one part of the system (heating a house) requires an increase of disorder elsewhere (burning oil).

In fact, the solution to the puzzle of life and of a growing economy is that the earth is not a closed system—the energy that drives it comes principally from the sun. It is true that the sun’s energy is being dissipated. But it will not burn out for another four to five billion years. Hence, the recipes that humans could devise for obtaining and using energy are for all practical purposes limitless. Until medieval times, people inefficiently heated and cooked with open fires in their homes. Then someone in Europe invented the chimney, which dramatically increased the efficiency of heating and cooking. In the eighteenth century, Benjamin Franklin invented the cast iron stove, which again boosted efficiency—and so on, to today’s modern electric heat pumps and gas furnaces. And new ideas and designs continue to be developed all the time, among them passive solar homes, solar cells, fuel cells and nuclear power plants. It seems safe to conclude that so long as the sun shines, the second law of thermodynamics is not terribly relevant.

Indeed, trying to forecast today the energy mix for the next hundred years, especially given the current rate of technological innovation, is as fruitless as someone in 1900 trying to predict our current energy requirements. A person in 1900 would surely not have anticipated scores of millions of automobiles and trucks, thousands of jet planes, and millions of refrigerators. Because of this, the wisest course is for humanity to support institutions and incentive systems that will encourage future scientists, inventors and entrepreneurs to discover, finance and build the technologies that will supply human needs and protect the natural world in the coming century.

Reframing the Problems

Insights from New Growth Theory reframe many environmental problems and suggest some surprising solutions. For example, one of the global environmental problems most commonly attributed to population and economic growth is the loss of tropical forests. But is growth really to blame? According to the Consultative Group on International Agricultural Research, the chief factor that drives deforestation in developing countries is not commercial logging but “poor farmers who have no other option to feeding their families other than slashing and burning a patch of forest… . Slash-and-burn agriculture results in the loss or degradation of some 25 million acres of land per year.”

By contrast, the United States today farms less than half of the land that it did in the 1920s but produces far more food now than it did then. The key, of course, is technology. In fact, available farming technology from developed countries could prevent, and in many cases reverse, the loss of tropical forests and other wildlife habitat around the globe. Unfortunately, institutional barriers, the absence of secure property rights, corrupt governments and a lack of education prevent its widespread diffusion and, hence, environmental restoration.

Another environmental problem frequently attributed to population growth is pollution. In 1972 The Limits to Growth computer model projected that pollution would skyrocket as population increased: “Virtually every pollutant that has been measured as a function of time appears to be increasing exponentially.” But once again, the new Malthusians had things exactly backward. Since 1972, America’s population has risen 26 percent and its economy has more than doubled. Western Europe and Japan have experienced similar rates of growth. Yet, instead of increasing as predicted, air pollutants have dramatically declined.

In fact, a growing body of literature suggests that in most cases there are thresholds of wealth at which the amount of a pollutant begins to decline. Department of Interior analyst Indur Goklany calls these thresholds the “environmental transition.” What this means is that when people rise above mere subsistence, they begin demanding amenities such as clean air and water. The first environmental transition is clean drinking water. Goklany has found that the level of fecal coliform bacteria in rivers, which is a good measure of water pollution, peaks when average per capita incomes reach $1,400 per year. The next transition occurs when particulates like smoke and soot peak at $3,200. And again, levels of sulfur dioxide peak at about $3,700.

Not surprisingly, committed Malthusians reject such findings. Paul Ehrlich, for instance, stubbornly insists that, “Most people do not recognize that, at least in rich nations, economic growth is the disease, not the cure.” [emphasis in original] To counteract the “disease” of economic growth, Maurice King recommends that people in the “privileged North” should engage in “the deliberate quest of poverty” to curb their “luxurious resource consumption.”

The favored target of such critiques is the United States, whose citizens are supposedly consuming more than their fair share of the world’s goods and causing more than their fair share of its ills. The average American, however, is not only a consumer but a producer of both goods and ideas. Americans and Europeans get more done with relatively less because of their higher levels of education, greater access to productive tools, superior infrastructure, democratic governments and free markets. As a consequence, output per hour of labor in the United States today is ten times what it was a hundred years ago. Thus, the average Westerner creates far more resources, especially knowledge and technology, than she or he consumes. Thus, too, both Western economies and environments are improving simultaneously.

All that said, if the right social institutions are lacking—democratic governance, secure private property, free markets—it is possible for a nation to fall into the Malthusian trap of rising poverty and increasing environmental degradation. The economies of many countries in Africa are declining, not because of high population growth rates or lack of resources, but because they have failed to implement the basic policies for encouraging economic growth: namely, widespread education, secure property rights and democratic governance.

Democratic governance and open markets have in fact proved indispensable for the prevention of famine in modern times. Nobel Prize-winning economist Amartya Sen notes that “in the terrible history of famines in the world, there is hardly any case in which a famine has occurred in a country that is independent and democratic, with an uncensored press.” Why is this? Because, says Sen, “So long as famines are relatively costless for the government, with no threat to its survival or credibility, effective actions to prevent famines do not have the urgency to make them inescapable imperatives for the government.”6 Along with Romer and other theorists, Sen also argues that general economic growth, not just growth in food output, is crucial to ending the threat of famine in Africa. He calls “for measures to encourage and enhance technical change, skill formation and productivity—both in agriculture and in other fields.”

Contemporary Malthusians liken humanity to a car travelling one hundred miles per hour on a foggy road. And they warn of dire consequences if we do not slow down. But if we adopt institutions and regulations that slow the pace of innovation, we may find ourselves depleting our current energy supplies before they can be replaced by new ones. New Growth Theory suggests that a better analogy might be that human society is an airplane cloaked in clouds flying at a speed of six hundred miles per hour. If the plane slows down, it will lose air speed and may crash before arriving safely at its destination.

We cannot deplete the supply of ideas, designs and recipes. They are immaterial and limitless, and therefore not bound in any meaningful sense by the second law of thermodynamics. Surely no one believes that humanity has already devised all of the methods to conserve, locate and exploit new sources of energy, or that the flow of ideas to improve houses, transportation, communications, medicine and farming has suddenly dried up. Though far too many of our fellow human beings are caught in local versions of the Malthusian trap, we must not mistake the situation of that segment as representing the future of all of humanity and the earth itself; it is, instead, a dwindling remnant of an unhappy past. Misery is not the inevitable lot of humanity, nor is the ruin of the natural world a foregone conclusion.

http://www.cato.org/publications/commentary/law-increasing-returns

Returns to scale

From Wikipedia, the free encyclopedia

In economics, returns to scale and economies of scale are related but different terms that describe what happens as the scale of production increases in the long run, when all input levels including physical capitalusage are variable (chosen by the firm). The term returns to scale arises in the context of a firm’s production function. It explains the behavior of the rate of increase in output (production) relative to the associated increase in the inputs (the factors of production) in the long run. In the long run all factors of production are variable and subject to change due to a given increase in size (scale). While economies of scale show the effect of an increased output level on unit costs, returns to scale focus only on the relation between input and output quantities.

The laws of returns to scale are a set of three interrelated and sequential laws: Law of Increasing Returns to Scale, Law of Constant Returns to Scale, and Law of Diminishing returns to Scale. If output increases by that same proportional change as all inputs change then there are constant returns to scale (CRS). If output increases by less than that proportional change in inputs, there are decreasing returns to scale(DRS). If output increases by more than that proportional change in inputs, there are increasing returns to scale (IRS). A firm’s production function could exhibit different types of returns to scale in different ranges of output. Typically, there could be increasing returns at relatively low output levels, decreasing returns at relatively high output levels, and constant returns at one output level between those ranges.[citation needed]

In mainstream microeconomics, the returns to scale faced by a firm are purely technologically imposed and are not influenced by economic decisions or by market conditions (i.e., conclusions about returns to scale are derived from the specific mathematical structure of the production function in isolation).

Example

When all inputs increase by a factor of 2, new values for output will be:

  • Twice the previous output if there are constant returns to scale (CRS)
  • Less than twice the previous output if there are decreasing returns to scale (DRS)
  • More than twice the previous output if there are increasing returns to scale (IRS)

Assuming that the factor costs are constant (that is, that the firm is a perfect competitor in all input markets), a firm experiencing constant returns will have constant long-run average costs, a firm experiencing decreasing returns will have increasing long-run average costs, and a firm experiencing increasing returns will have decreasing long-run average costs.[1][2][3] However, this relationship breaks down if the firm does not face perfectly competitive factor markets (i.e., in this context, the price one pays for a good does depend on the amount purchased). For example, if there are increasing returns to scale in some range of output levels, but the firm is so big in one or more input markets that increasing its purchases of an input drives up the input’s per-unit cost, then the firm could have diseconomies of scale in that range of output levels. Conversely, if the firm is able to get bulk discounts of an input, then it could have economies of scale in some range of output levels even if it has decreasing returns in production in that output range.

Formal definition

Formally, a production function {\displaystyle \ F(K,L)}\ F(K,L) is defined to have:

  • Constant returns to scale if (for any constant a greater than 0) {\displaystyle \ F(aK,aL)=aF(K,L)}\ F(aK,aL)=aF(K,L)
  • Increasing returns to scale if (for any constant a greater than 1) {\displaystyle \ F(aK,aL)>aF(K,L),}\ F(aK,aL)>aF(K,L),
  • Decreasing returns to scale if (for any constant a greater than 1) {\displaystyle \ F(aK,aL)<aF(K,L)}\ F(aK,aL)<aF(K,L)

where K and L are factors of production—capital and labor, respectively.

In a more general set-up, for a multi-input-multi-output production processes, one may assume technology can be represented via some technology set, call it {\displaystyle \ T}\ T, which must satisfy some regularity conditions of production theory.[4][5][6][7][8] In this case, the property of constant returns to scale is equivalent to saying that technology set {\displaystyle \ T}\ T is a cone, i.e., satisfies the property {\displaystyle \ aT=T,\forall a>0}\ aT=T,\forall a>0. In turn, if there is a production function that will describe the technology set {\displaystyle \ T}\ T it will have to be homogeneous of degree 1.

Formal example

The Cobb-Douglas functional form has constant returns to scale when the sum of the exponents adds up to one. The function is:

{\displaystyle \ F(K,L)=AK^{b}L^{1-b}}\ F(K,L)=AK^{{b}}L^{{1-b}}

where {\displaystyle A>0}A>0 and {\displaystyle 0<b<1}0<b<1. Thus

{\displaystyle \ F(aK,aL)=A(aK)^{b}(aL)^{1-b}=Aa^{b}a^{1-b}K^{b}L^{1-b}=aAK^{b}L^{1-b}=aF(K,L).}\ F(aK,aL)=A(aK)^{{b}}(aL)^{{1-b}}=Aa^{{b}}a^{{1-b}}K^{{b}}L^{{1-b}}=aAK^{{b}}L^{{1-b}}=aF(K,L).

But if the Cobb-Douglas production function has its general form

{\displaystyle \ F(K,L)=AK^{b}L^{c}}\ F(K,L)=AK^{{b}}L^{{c}}

with {\displaystyle 0<c<1,}0<c<1, then there are increasing returns if b + c > 1 but decreasing returns if b + c < 1, since

{\displaystyle \ F(aK,aL)=A(aK)^{b}(aL)^{c}=Aa^{b}a^{c}K^{b}L^{c}=a^{b+c}AK^{b}L^{c}=a^{b+c}F(K,L),}\ F(aK,aL)=A(aK)^{{b}}(aL)^{{c}}=Aa^{{b}}a^{{c}}K^{{b}}L^{{c}}=a^{{b+c}}AK^{{b}}L^{{c}}=a^{{b+c}}F(K,L),

which is greater than or less than {\displaystyle aF(K,L)}aF(K,L) as b+c is greater or less than one.

See also

References

  1. Jump up^ Gelles, Gregory M.; Mitchell, Douglas W. (1996). “Returns to scale and economies of scale: Further observations”. Journal of Economic Education. 27 (3): 259–261. JSTOR 1183297.
  2. Jump up^ Frisch, R. (1965). Theory of Production. Dordrecht: D. Reidel.
  3. Jump up^ Ferguson, C. E. (1969). The Neoclassical Theory of Production and Distribution. London: Cambridge University Press. ISBN 0-521-07453-3.
  4. Jump up^ • Shephard, R.W. (1953) Cost and production functions. Princeton, NJ: Princeton University Press.
  5. Jump up^ • Shephard, R.W. (1970) Theory of cost and production functions. Princeton, NJ: Princeton University Press.
  6. Jump up^ • Färe, R., and D. Primont (1995) Multi-Output Production and Duality: Theory and Applications. Kluwer Academic Publishers, Boston.
  7. Jump up^ Zelenyuk, V. (2013) “A scale elasticity measure for directional distance function and its dual: Theory and DEA estimation.” European Journal of Operational Research 228:3, pp 592–600
  8. Jump up^ Zelenyuk V. (2014) “Scale efficiency and homotheticity: equivalence of primal and dual measures” Journal of Productivity Analysis 42:1, pp 15-24.

Further reading

External links

Read Full Post | Make a Comment ( None so far )

First The CIA Director Now The State Department Contradict Obama’s Islamic State, Syria and Iraq Policies — The Hillary Clinton Support Network Of Lying Lunatic Leftists Throws Obama Under The Bus — Work Place Violence — Hate Crime — Terrorist Act — Radical Islam — Radical Islamic Terrorist — Radical Islamic Terrorist Jihadists — Face Reality and Stopping Lying Obama — Radical Islamists Are A Majority of The World’s 1,600+ Million Muslims And Want Sharia Law — Ban All Radical Islamists From United States Permanently — Videos

Posted on July 2, 2016. Filed under: American History, Ammunition, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), College, Communications, Computers, Congress, Constitution, Corruption, Crime, Crisis, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Diasters, Documentary, Drones, Drug Cartels, Economics, Education, Elections, Employment, European History, External Hard Drives, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, Friends, government, history, Homicide, Illegal, Immigration, Islam, Islam, Language, Law, Legal, liberty, Life, Links, media, Middle East, Missiles, National Security Agency (NSA), National Security Agency (NSA_, Newspapers, Nuclear Proliferation, People, Philosophy, Photos, Pistols, Police, Political Correctness, Politics, Presidential Candidates, Press, Radio, Radio, Raves, Raymond Thomas Pronk, Regulations, Religion, Religious, Religious, Resources, Rifles, Security, Shite, Speech, Spying, Strategy, Sunni, Talk Radio, Television, Trade, Unemployment, Union, Unions, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 701: June 17, 2016

Pronk Pops Show 700: June 16, 2016

Pronk Pops Show 699: June 15, 2016

Pronk Pops Show 698: June 14, 2016

Pronk Pops Show 697: June 13, 2016

Pronk Pops Show 696: June 10, 2016

Pronk Pops Show 695: June 9, 2016

Pronk Pops Show 694: June 8, 2016

Pronk Pops Show 693: June 6, 2016

Pronk Pops Show 692: June 3, 2016

Pronk Pops Show 691: June 2, 2016

Pronk Pops Show 690: June 1, 2016

Pronk Pops Show 689: May 31, 2016

Pronk Pops Show 688: May 27, 2016

Pronk Pops Show 687: May 26, 2016

Pronk Pops Show 686: May 25, 2016

Pronk Pops Show 685: May 24, 2016

Pronk Pops Show 684: May 23, 2016

Pronk Pops Show 683: May 20, 2016

Pronk Pops Show 682: May 19, 2016

Pronk Pops Show 681: May 17, 2016

Pronk Pops Show 680: May 16, 2016

Pronk Pops Show 679: May 13, 2016

Pronk Pops Show 678: May 12, 2016

Pronk Pops Show 677: May 11, 2016

Pronk Pops Show 676: May 10, 2016

Pronk Pops Show 675: May 9, 2016

Pronk Pops Show 674: May 6, 2016

Pronk Pops Show 673: May 5, 2016

Pronk Pops Show 672: May 4, 2016

Pronk Pops Show 671: May 3, 2016

Pronk Pops Show 670: May 2, 2016

Pronk Pops Show 669: April 29, 2016

Pronk Pops Show 668: April 28, 2016

Pronk Pops Show 667: April 27, 2016

Pronk Pops Show 666: April 26, 2016

Pronk Pops Show 665: April 25, 2016

Pronk Pops Show 664: April 24, 2016

Pronk Pops Show 663: April 21, 2016

Pronk Pops Show 662: April 20, 2016

Pronk Pops Show 661: April 19, 2016

Pronk Pops Show 660: April 18, 2016

Pronk Pops Show 659: April 15, 2016

Pronk Pops Show 658: April 14, 2016

Pronk Pops Show 657: April 13, 2016

Pronk Pops Show 656: April 12, 2016

Pronk Pops Show 655: April 11, 2016

Pronk Pops Show 654: April 8, 2016

Pronk Pops Show 653: April 7, 2016

Pronk Pops Show 652: April 6, 2016

Pronk Pops Show 651: April 4, 2016

Pronk Pops Show 650: April 1, 2016

Pronk Pops Show 649: March 31, 2016

Pronk Pops Show 648: March 30, 2016

Pronk Pops Show 647: March 29, 2016

Pronk Pops Show 646: March 28, 2016

Pronk Pops Show 645: March 24, 2016

Pronk Pops Show 644: March 23, 2016

Pronk Pops Show 643: March 22, 2016

Pronk Pops Show 642: March 21, 2016

Pronk Pops Show 641: March 11, 2016

Pronk Pops Show 640: March 10, 2016

Pronk Pops Show 639: March 9, 2016

Pronk Pops Show 638: March 8, 2016

Pronk Pops Show 637: March 7, 2016

Pronk Pops Show 636: March 4, 2016

Pronk Pops Show 635: March 3, 2016

Pronk Pops Show 634: March 2, 2016

Pronk Pops Show 633: March 1, 2016

Story 1: First The CIA Director Now The State Department Contradict Obama’s Islamic State, Syria and Iraq Policies — The Hillary Clinton Support Network Of Lying Lunatic Leftists Throws Obama Under The Bus — Work Place Violence — Hate Crime — Terrorist Act — Radical Islam — Radical Islamic Terrorist — Radical Islamic Terrorist Jihadists — Face Reality and Stopping Lying Obama — Radical Islamists Are A Majority of The World’s 1,600+ Million Muslims And Want Sharia Law — Ban All Radical Islamists From United States Permanently — Videos

Radical Islam: The Most Dangerous Ideology

What ISIS Wants

The rise of ISIS, explained in 6 minutes

The Basics of Islam 8: Robert Spencer on The Meaning of the Word “Jihad”

Robert Spencer Moment: Trump Was Right.

Robert Spencer on Hannity on the Orlando jihad massacre

The Basics of Islam 1: Robert Spencer on “Islamophobia”

What Does Jihad Really Mean? | For the Record

CIA Director Grave Warning: ISLAMIC STATE Dangerous As Ever

Gorka: CIA director no longer spreading Obama’s narrative

CIA CHIEF CONTRADICTS PRESIDENT OBAMA ON ISIS

Robert Spencer speaks on the Syrian refugee crisis and the Islamic idea of hijrah

State Department diplomats slam Obama’s Syria policy

Diplomats slam Obama’s Syria policy

Dozens of State Department officials just revolted against Obama’s Syria policy

How will Trump react to the diplomats’ memo on Syrian war?

Syria’s war: Who is fighting and why

The war in Syria explained in five minutes | Guardian Animations

State Department dissent memo critical of Obama policy on Syria and Assad

State Department Demands Policy Shift In Syria | MSNBC

DHS Whistleblower Phil Haney exposes Obama administration during Press Conference

DHS Whistleblower Exposes Government’s Submission To Jihad (FULL Press Conference)

Government Insider BLOWS WHISTLE on Obama’s ‘Countering Violent Extremism’ Policy

State Dept Under Fire For Including Syria In Top Foreign Policy Moments – America’s Newsroom

Ben Shapiro: The Myth of the Tiny Radical Muslim Minority

Obama gives speech in Orlando

Obama goes on tirade against Trump over ‘dangerous’ Muslim ban, ‘radical Islam’

Obama on ‘Radical Islam’

Speech by President Barack Obama After Counter-ISIL Meeting

President Obama On Orlando Shooting

Top Ex-CIA Agent Has ‘Chilling Warning’ About Obama’s Plans for Islamic State!

CIA Director on Islamic State

CIA Director John Brennan on ISIS and Global Threats at CSIS

CIA Chief Warns Islamic State Isn’t Finished Yet

CIA’S Brennan: Islamic State’s Momentum Blunted in Syria, Iraq

Shariamerica: Islam, Obama, and the Establishment Clause

Full Event: Donald Trump Rally in Dallas, TX (6-16-16)

 

An ’embarrassing’ break: Dozens of State Department officials just revolted against Obama’s Syria policy

 

At least 51 “mid-to-high-level State Department officials” have signed a dissent channel cable breaking with President Barack Obama’s policy on Syria and calling for US airstrikes on the regime of Syrian President Bashar Assad.

The cable was provided to several news outlets on Thursday, including The New York Timesand The Wall Street Journal.

“Failure to stem Assad’s flagrant abuses will only bolster the ideological appeal of groups such as Daesh, even as they endure tactical setbacks on the battlefield,” the cable reads, according to The Journal.

Daesh is an alternate name for ISIS, aka the Islamic State or ISIL.

“We are aware of a dissent channel cable written by a group of State Department employees regarding the situation in Syria,” State Department spokesman John Kirby told The Wall Street Journal.

“We are reviewing the cable now, which came up very recently, and I am not going to comment on the contents,” he said.

The officials who signed the document “range from a Syria desk officer in the Bureau of Near Eastern Affairs to a former deputy to the American ambassador in Damascus,” and have all been involved in formulating or carrying out the administration’s Syria policy.

That policy has largely emphasized defeating the Islamic State over bolstering Syria’s anti-Assad rebel groups.

According to the American Foreign Service Association, the dissent channel is “a serious policy channel reserved only for consideration of responsible dissenting and alternative views on substantive foreign policy issues that cannot be communicated in a full and timely manner through regular operating channels and procedures.”

It is available to all “regular or re-employed annuitant employees” of the State Department and the US Agency for International Development.

The number of officials – at least 50 – who have signed the internal document calling for military action against Assad is unusual, a former State Department official who worked on Middle East policy told The Journal.

“It’s embarrassing for the administration to have so many rank-and-file members break on Syria,” they said.

Fighters of the Syria Democratic Forces (SDF) sit in a look out position in the western rural area of Manbij, in Aleppo Governorate, Syria, June 13, 2016. REUTERS/Rodi SaidFighters of the Syrian Democratic Forces sit in a lookout position in the western rural area of Manbij. Thomson Reuters

The cable calls for the Obama administration to place more emphasis on defeating Assad – whose brutality is seen by many experts as the driver of Syria’s jihadist problem – by arming and regaining the trust of Syria’s moderate opposition.

That, in turn, will “turn the tide of the conflict against the regime [to] increase the chances for peace by sending a clear signal to the regime and its backers that there will be no military solution to the conflict,” the cable reportedly says.

The CIA-backed factions of the Free Syrian Army – the majority of which are Arab and battling forces loyal to Assad – have at times clashed with Pentagon-trained fighters associated with the Syrian Democratic Forces, who are predominantly Kurdish and focused on defeating the Islamic State.

Their divergent military objectives and ethnicities have bred mistrust and fighting that is ultimately counterproductive to the cause of the revolution.

Several high-ranking government officials, moreover – including Robert S. Ford, a former ambassador to Syria, and Obama’s former defense secretary, Chuck Hagel – have left their positions over Obama’s failure to act decisively against Assad, whose brutality continues to fuel a bloody revolution that has left over 400,000 people dead and millions displaced.

“Many people working on Syria for the State Department have long urged a tougher policy with the Assad government as a means of facilitating arrival at a negotiated political deal to set up a new Syrian government,” Ford told The New York Times on Thursday.

Free Syrian Army IdlibProtesters carry Free Syrian Army flags and chant slogans during an antigovernment protest in the town of Marat Numan in Idlib Province, Syria, on March 4. REUTERS/Khalil Ashawi

“The moral rationale for taking steps to end the deaths and suffering in Syria, after five years of brutal war, is evident and unquestionable,” the cable said. ” The status quo in Syria will continue to present increasingly dire, if not disastrous, humanitarian, diplomatic and terrorism-related challenges.”

Assad crossed Obama’s now infamous “red line” for airstrikes in 2013, when he used chemical weapons to kill more than 1,000 people in the eastern Damascus suburb of Ghouta. Obama backed away from that red line when Assad agreed to a Russia-brokered deal to destroy his chemical-weapons stockpile.

Some experts say, however, that the entire stockpile has not been destroyed as promised.

The administration insists that it has maintained throughout the nearly five-year civil war that Assad “must go.” But that stance has been muddled as the administration continues to soften its position on Assad’s future.

“The US’ Syria policy has always been in the head of one man, and one man only: Barack Obama. No one else has ever really had a say in what happens in Syria,” Tony Badran, a Middle East expert and researcher at the Foundation for Defense of Democracies, told Business Insiderin a previous interview.

“Obama has owned it since day one – and from day one, he never intended to remove Assad,” he said.

The cable addresses Russia’s bombing campaign in Syria as well, asserting that Moscow and Assad have not taken past ceasefires and “consequential negotiations” seriously.

Russia entered the war in late September 2015 on behalf of Assad under the guise of fighting ISIS. Russian warplanes have primarily targeted non-jihadist, anti-Assad rebel groups, however, many of which are backed by the US, Turkey, and Saudi Arabia.

Government warplanes bombarded the besieged Syrian town of Darayya with barrel bombs last weekend, shortly after food aid was delivered to the town for the first time in nearly four years.

http://www.businessinsider.com/state-department-officials-call-for-airstrikes-on-assad-2016-6

Chart: Obama Admin. On Pace to Issue One Million Green Cards to Migrants from Majority-Muslim Countries

The Obama Administration is on pace to issue more than a million green cards to migrants from majority-Muslim countries, according to an analysis of Department of Homeland Security data.

A chart released by the Senate Subcommittee on Immigration and the National Interest Friday details the surge in immigration to the U.S. from majority-Muslim countries since President Barack Obama took office in 2009.

Specifically, in the first six fiscal years of Obama’s presidency (FY2009 – FY2014), his administration issued 832,014 green cards to migrants majority-Muslim countries, the most of which were issued to migrants from Pakistan (102,000), Iraq (102,000), Bangladesh (90,000), Iran (85,000), Egypt (56,000), and Somalia (37,000).

The total 832,014 new permanent residents do not include migrants on temporary, nonimmigrant visas — which allow foreign nationals to come to the U.S. temporarily for work, study, tourism and the like. As the subcommittee notes, the number also does not include those migrants who overstayed the terms of their visas.

Obama Admin On Track To Issue 1M GCs (1)

Regardless, as the subcommittee explained in its analysis, the U.S. is playing host to immigrants from majority Muslim countries at an increasing pace.

Between FY 2013 and FY 2014, the number of green cards issued to migrants from Muslim-majority countries increased dramatically – from 117,423 in FY 2013, to 148,810 in FY 2014, a nearly 27 percent increase. Throughout the Obama Administration’s tenure, the United States has issued green cards to an average of 138,669 migrants from Muslim-majority countries per year, meaning that it is nearly certain the United States will have issued green cards to at least 1.1 million migrants from Muslim-majority countries on the President’s watch. It has also been reported that migration from Muslim-majority countries represents the fastest growing class of migrants.

Green cards, or Lawful Permanent Residency, puts immigrants on the path to citizenship and allows for lifetime residency, federal benefits, and work authorization. Included in the totals are refugees, who are required to apply for a green card after one year of residency in the U.S. Unlike other types of immigrants, refugees are immediately eligible for welfare benefits including Temporary Assistance to Needy Families (TANF), food stamps, and Medicaid.

A report from the Office of Refugee Resettlement (ORR) indicated that in FY 2013, 91.4 percent of Middle Eastern refugees (accepted to the U.S. between 2008-2013) received food stamps, 73.1 percent were on Medicaid or Refugee Medical Assistance and 68.3 percent were on cash welfare.

Green Card Totals, FY09-FY14:

Pakistan (102K), Iraq (102K), Bangladesh (90K), Iran (85K), Egypt (56K), Somalia (37K), Uzbekistan (30K), Turkey (26K), Morocco (25K), Jordan (25K), Albania (24K), Afghanistan (21K), Lebanon (20K), Yemen (20K), Syria (18K), Indonesia (17K), Sudan (15K), Sierra Leone (12K), Guinea (9K), Senegal (8K), Saudi Arabia (9K), Algeria (8K), Kazakhstan (8K), Kuwait (6K), Gambia (6K), United Arab Emirates (5K), Azerbaijan (4K), Mali (4K), Burkina Faso (3K), Kyrgyzstan (3K), Kosovo (3K), Mauritania (3K), Tunisia (2K), Tajikistan (2K), Libya (2K), Turkmenistan (1K), Qatar (1K), Chad (1K)

http://www.breitbart.com/big-government/2016/06/17/obama-admin-pace-issue-one-million-green-cards-migrants-majority-muslim-countries/

51% of U.S. Muslims want Sharia; 60% of young Muslims more loyal to Islam than to U.S.

Really, what did you expect? A considerable portion of U.S. domestic and foreign policy is based on the assumption that Islam in the U.S. will be different: that Muslims here believe differently from those elsewhere, and do not accept the doctrines of violence against and subjugation of unbelievers that have characterized Islam throughout its history. But on what is that assumption based? Nothing but wishful thinking. And future generations of non-Muslims will pay the price.

Muslims_Pray_Capitol

“Meanwhile, An Islamic Fifth Column Builds Inside America,” by Paul Sperry, IBD, October 1, 2015 (thanks to Pamela Geller)

In berating GOP presidential hopeful Ben Carson for suggesting a loyalty test for Muslims seeking high office, CNN host Jake Tapper maintained that he doesn’t know a single observant Muslim-American who wants to Islamize America.

“I just don’t know any Muslim-Americans — and I know plenty — who feel that way, even if they are observant Muslims,” he scowled.

Tapper doesn’t get out much. If he did, chances are he’d run into some of the 51% of Muslims living in the U.S. who just this June told Polling Co. they preferred having “the choice of being governed according to Shariah,” or Islamic law. Or the 60% of Muslim-Americans under 30 who told Pew Research they’re more loyal to Islam than America.

Maybe they’re all heretics, so let’s see what the enlightened Muslims think.

If Tapper did a little independent research he’d quickly find that America’s most respected Islamic leaders and scholars also want theocracy, not democracy, and even advocate trading the Constitution for the Quran.

These aren’t fringe players. These are the top officials representing the Muslim establishment in America today.

Hopefully none of them ever runs for president, because here’s what he’d have to say about the U.S. system of government:

• Muzammil Siddiqi, chairman of both the Fiqh Council of North America, which dispenses Islamic rulings, and the North American Islamic Trust, which owns most of the mosques in the U.S.: “As Muslims, we should participate in the system to safeguard our interests and try to bring gradual change, (but) we must not forget that Allah’s rules have to be established in all lands, and all our efforts should lead to that direction.”

• Omar Ahmad, co-founder of the Council on American-Islamic Relations, the top Muslim lobby group in Washington: “Islam isn’t in America to be equal to any other faith, but to become dominant. The Quran should be the highest authority in America, and Islam the only accepted religion on Earth.”

• CAIR spokesman Ibrahim Hooper: “I wouldn’t want to create the impression that I wouldn’t like the government of the United States to be Islamic sometime in the future.”

• Imam Siraj Wahhaj, director of the Muslim Alliance in North America: “In time, this so-called democracy will crumble, and there will be nothing. And the only thing that will remain will be Islam.”

• Imam Zaid Shakir, co-founder of Zaytuna College in Berkeley, Calif.: “If we put a nationwide infrastructure in place and marshaled our resources, we’d take over this country in a very short time. . . . What a great victory it will be for Islam to have this country in the fold and ranks of the Muslims.”…

https://www.jihadwatch.org/2015/10/51-of-u-s-muslims-want-sharia-60-of-young-muslims-more-loyal-to-islam-than-to-u-s

John O. Brennan

From Wikipedia, the free encyclopedia
John O. Brennan
John Brennan CIA official portrait.jpg
Director of the Central Intelligence Agency
Assumed office
March 8, 2013
President Barack Obama
Deputy David Cohen
Preceded by Michael Morell(Acting)
5th United States Homeland Security Advisor
In office
January 20, 2009 – March 8, 2013
President Barack Obama
Preceded by Ken Wainstein
Succeeded by Lisa Monaco
Director of the National Counterterrorism Center
Acting
In office
August 27, 2004 – August 1, 2005
President George W. Bush
Preceded by Position established
Succeeded by John Redd
Personal details
Born John Owen Brennan
September 22, 1955 (age 60)
Jersey City, New Jersey, U.S.
Spouse(s) Kathy Pokluda
Alma mater Fordham University
University of Texas, Austin

John Owen Brennan (born September 22, 1955)[1][2] is an American government official who is the Director of the Central Intelligence Agency. He has served as chief counterterrorism advisor to U.S. President Barack Obama; his title was Deputy National Security Advisor for Homeland Security and Counterterrorism, and Assistant to the President.[1][3][4] His responsibilities included overseeing plans to protect the country from terrorism and respond to natural disasters, and he met with the President daily.[5][6]Previously, he advised President Obama on foreign policy and intelligence issues during the 2008 presidential campaign and transition.[7] Brennan withdrew his name from consideration for Director of the Central Intelligence Agency (CIA) in the first Obama administration over concerns about his support for transferring terror suspects to countries where they may be tortured while serving under President George W. Bush.[3][5] Instead, Brennan was appointed Deputy National Security Advisor, a position which did not require Senate confirmation.[3][5][8]

Brennan’s 25 years with the CIA included work as a Near East and South Asia analyst, as station chief in Saudi Arabia, and as director of the National Counterterrorism Center.[3][5][9]After leaving government service in 2005, Brennan became CEO of The Analysis Corporation, a security consulting business, and served as chairman of the Intelligence and National Security Alliance, an association of intelligence professionals.[10]

President Barack Obama nominated Brennan as his next director of the CIA on January 7, 2013.[11][12][13] The ACLU called for the Senate not to proceed with the appointment until it confirms that “all of his conduct was within the law” at the CIA and White House.[14] John Brennan was approved by the Senate Intelligence Committee on March 5, 2013 to succeedDavid Petraeus as the Director of the CIA by a vote of 12 to 3.[15]

His term as CIA Director coincided with revelations that the U.S. government conducted massive levels of global surveillance, that the CIA had hacked into the computers of U.S. Senate employees, and the release of the U.S. Senate Intelligence Committee report on CIA torture.

Early life and education

Brennan, the son of Irish immigrants from Roscommon, was raised in North Bergen, New Jersey.[9] He attended the Immaculate Heart of Mary Elementary School, and graduated from Saint Joseph of the Palisades High School in West New York, New Jersey before enrolling at Fordham University in New York City.[5]

While riding a bus to class at Fordham, he saw an ad in The New York Times that said the CIA was recruiting, and he felt a CIA career would be a good match for his “wanderlust” and his desire to do public service.[5] He received a B.A. in political science from Fordham in 1977.[3] His studies included a junior year abroad learning Arabic and taking Middle Eastern studies courses at the American University in Cairo.[3][5] He also received a Master of Arts in government with a concentration in Middle Eastern studies from the University of Texas at Austin in 1980.[5] He speaks Arabic fluently.[9]

Brennan is married to Kathy Pokluda Brennan, with whom he has had one son and two daughters.[2][3][16]

Career highlights

Brennan with Kathleen Sebeliusand Rahm Emanuel, White House, April 2009

Brennan began his CIA career as an analyst, presumably in the Washington D.C. area, and spent 25 years with the agency.[1][5][17] At one point in his career, he was a daily intelligence briefer for President Bill Clinton.[5] In 1996 he was CIA station chief in Riyadh, Saudi Arabia when the Khobar Towers bombing killed 19 U.S. servicemen.[5] In 1999 he was appointed chief of staff to George Tenet, then-Director of the CIA.[3][5] Brennan became deputy executive director of the CIA in March 2001.[3] He was director of the newly created Terrorist Threat Integration Center from 2003 to 2004, an office that sifted through and compiled information for President Bush’s daily top secret intelligence briefings and employed the services of analysts from a dozen U.S. agencies and entities.[18] One of the controversies in his career involves the distribution of intelligence to the Bush White House that helped lead to an “Orange Terror Alert“, over Christmas 2003. The intelligence, which purported to list terror targets, was highly controversial within the CIA and was later discredited. An Obama administration official does not dispute that Brennan distributed the intelligence during the Bush era but said Brennan passed it along because that was his job.[19] His last post within the Intelligence Community was as director of the National Counterterrorism Center in 2004 and 2005, which incorporated information on terrorist activities across U.S. agencies.[3][20]

Brennan then left government service for a few years, becoming Chairman of the Intelligence and National Security Alliance (INSA) and the CEO of The Analysis Corporation (TAC). He continued to lead TAC after its acquisition by Global Strategies Group in 2007 and its growth as the Global Intelligence Solutions division of Global’s North American technology business GTEC, before returning to government service with the Obama administration as Homeland Security Advisor on January 20, 2009.[10]

On January 7, 2013, Brennan was nominated by President Barack Obama to be director of the Central Intelligence Agency.[21]

Counterterrorism advisor to President Obama

In late 2008 Brennan was the reported choice for Director of the CIA in the incoming Obama administration. Brennan withdrew his name from consideration because of opposition to his CIA service under President George W. Bush and past public statements he had made in support of enhanced interrogation and the transfer of terrorism suspects to countries where they might be tortured (extraordinary rendition).[3][5][22] President Obama then appointed him to be his chief counterterrorism advisor, a position that did not require Senate confirmation.[3][5][8]

Brennan and President Barack Obama at a meeting of the Homeland Security Council, May 2009

In August 2009, Brennan criticized some Bush-administration anti-terror policies, saying that waterboarding had threatened national security by increasing the recruitment of terrorists and decreasing the willingness of other nations to cooperate with the U.S.[23] He also described the Obama administration’s focus as being on “extremists” and not “jihadists“. He said that using the second term, which means one who is struggling for a holy goal, gives “these murderers the religious legitimacy they desperately seek” and suggests the US is at war with the religion of Islam.[23]

In an early December 2009 interview with the Bergen Record Brennan remarked, “the U.S. intelligence and law enforcement communities have to bat 1.000 every day. The terrorists are trying to be successful just once”.[5] At a press conferences days after the failed Christmas Day bomb attack on Northwest Airlines Flight 253 by Umar Farouk Abdulmutallab, Brennan said U.S. intelligence agencies did not miss any signs that could have prevented the attempt but later said he had let the President down by underestimating a small group of Yemeni terrorists and not connecting them to the attempted bomber.[1][24] Within two weeks after the incident, however, he produced a report highly critical of the performance of U.S. intelligence agencies, concluding that their focus on terrorist attempts aimed at U.S. soil was inadequate.[17] In February 2010, he claimed on Meet the Press that he was tired of Republican lawmakers using national security issues as political footballs, and making allegations where they did not know the facts.[25]

Drone program

In April 2012 Brennan was the first Obama administration official to publicly acknowledge CIA drone strikes in Pakistan, Yemen, Somalia, Libya, Afghanistan, and elsewhere. In his speech he argued for the legality, morality, and effectiveness of the program.[26][27][28] The ACLU and other organizations disagreed. In 2011/2012 he also helped reorganize the process, under the aegis of the Disposition Matrix database, by which people outside of war zones were put on the list of drone targets. According to an Associated Press story, the reorganization helped “concentrate power” over the process inside the White House administration.[29][30][31]

In June 2011, Brennan claimed that US counter-terrorism operations had not resulted in “a single collateral death” in the past year because of the “precision of the capabilities that we’ve been able to develop.”[32][33] Nine months later, Brennan claimed he had said “we had no information” about any civilian, noncombatant deaths during the timeframe in question.[33][34] The Bureau of Investigative Journalism disagreed with Brennan, citing their own research[35] that initially led them to believe that 45 to 56 civilians, including six children, had been killed by ten US drone strikes during the year-long period in question.[33] Additional research led the Bureau to raise their estimate to 76 deaths, including eight children and two women.[33] According to the Bureau, Brennan’s claims “do not appear to bear scrutiny.”[33]The Atlantic has been harsher in its criticism, saying that “Brennan has been willing to lie about those drone strikes to hide ugly realities.”[36]

According to the Bureau of Investigative Journalism, Brennan’s comments about collateral death are perhaps explained by a counting method that treats all military-aged males in a strike zone as combatants unless there is explicit information to prove them innocent.[33][37]

CIA Director (2013–present)

Nomination

Brennan being sworn in as CIA Director, March 8, 2013

United States PresidentBarack Obama twice nominated Brennan to serve as Director of the Central Intelligence Agency.[11][12]

Morris Davis, a former Chief Prosecutor for the Guantanamo Military Commissions compared Brennan to Canadian Omar Khadr, who was convicted of “committing murder in violation of the law of war”.[38] He suggested that Brennan’s role in targeting individuals for CIA missile strikes was no more authorized than the throwing of the grenade Khadr was accused of.

On February 27, 2013, the Senate Intelligence Committee postponed a vote, expected to be taken the next day on the confirmation of Brennan until the following week. On March 5, the Intelligence Committee approved the nomination 12–3. The Senate was set to vote on Brennan’s nomination on March 6, 2013. However, Kentucky Senator Rand Paul began a talking Senate filibuster of the vote, citing President Barack Obama and his administration’s use of combat drones, stating “No one politician should be allowed to judge the guilt, to charge an individual, to judge the guilt of an individual and to execute an individual. It goes against everything that we fundamentally believe in our country.”[39][40] Paul’s filibuster continued for 13 hours, after which Brennan was confirmed by a vote of 63–34.

Brennan was sworn into the office of CIA Director on March 8, 2013.[41]

See also

https://en.wikipedia.org/wiki/John_O._Brennan

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or DownloadShows 695-701

Listen To Pronk Pops Podcast or DownloadShows 685-694

Listen To Pronk Pops Podcast or DownloadShows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

 

Read Full Post | Make a Comment ( None so far )

1,600 Classified Emails With Dozens Designated “Secret” or “Top Secret/SAP.” — Obama Will Never Let Clinton Be Indicted or Charged Will Pardon Her — Trust — Issues — Turnout (TITs) — Will Determine Who Becomes Next President — Videos

Posted on February 20, 2016. Filed under: American History, Articles, Blogroll, Business, Communications, Computers, Crime, Crisis, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Elections, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, government spending, history, Law, liberty, Life, Links, media, National Security Agency (NSA), National Security Agency (NSA_, Newspapers, People, Philosophy, Photos, Political Correctness, Politics, Press, Radio, Rants, Raves, Talk Radio, Television, Terrorism, Video, War, Wealth, Weapons, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 617: February 4, 2016

Pronk Pops Show 616: February 3, 2016

Pronk Pops Show 615: February 1, 2016

Pronk Pops Show 614: January 29, 2016

Pronk Pops Show 613: January 28, 2016

Pronk Pops Show 612: January 27, 2016

Pronk Pops Show 611: January 26, 2016

Pronk Pops Show 610: January 25, 2016

Pronk Pops Show 609: January 22, 2016

Pronk Pops Show 608: January 21, 2016

Pronk Pops Show 607: January 20, 2016

Pronk Pops Show 606: January 19, 2016

Pronk Pops Show 605: January 15, 2015

Pronk Pops Show 604: January 14, 2016

Pronk Pops Show 603: January 13, 2016

Pronk Pops Show 602: January 12, 2016

Pronk Pops Show 601: January 11, 2015

Pronk Pops Show 600: January 8, 2016

Pronk Pops Show 599: January 6, 2016

Pronk Pops Show 598: January 5, 2016

Pronk Pops Show 597: December 21, 2015

Pronk Pops Show 596: December 18, 2015

Pronk Pops Show 595: December 17, 2015

Pronk Pops Show 594: December 16, 2015

Pronk Pops Show 593: December 15, 2015

Pronk Pops Show 592: December 14, 2015 

Pronk Pops Show 591: December 11, 2015 

Pronk Pops Show 590: December 10, 2015 

Pronk Pops Show 589: December 9, 2015 

Pronk Pops Show 588: December 7, 2015 

Pronk Pops Show 587: December 4, 2015 

Pronk Pops Show 586: December 3, 2015 

Pronk Pops Show 585: December 2, 2015 

Pronk Pops Show 584: December 1, 2015 

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

National Security Agency Spies on Congress and Israel — Nothing New Here Move Along — NSA Spies On Everybody All The Time And Collects All Your Communcations And Aggregates It When You Become A Target! — Turnkey Totalitarian Secret Security Surveillance State Is Turned On You — The Fourth Amendment Has Been Destroyed — Encrypt Everything — Video

Posted on December 30, 2015. Filed under: American History, Articles, Blogroll, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Congress, Constitution, Corruption, Crime, Culture, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Economics, Education, Employment, European History, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, Friends, government spending, history, Investments, Life, Links, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Politics, Presidential Candidates, Press, Radio, Rants, Raves, Security, Speech, Systems, Talk Radio, Terrorism, Video, War, Wealth, Welfare, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , |

 

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

 Rand Paul Disgusted at NSA Spying on Congress and Israel | Fox News

Report: NSA captured conversations of Congress members with Israeli leaders

Report Says NSA Captured Conversations Of Congress Members With Israeli Leaders

Report: NSA Wiretapped Conversations Between Israeli PM And Members Of Congress

What NSA Eavesdropping On Israel Reveals About Relations

Wall Street Journal: NSA spied on Israeli leaders

WSJ: NSA Spied Not Only On Israel But Congress During Nuke Talks – America’s Newsroom

NSA spied on Israel amid Iran talks, caught some US lawmakers’ US talks

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

NSA Surveillance and What To Do About It

ShmooCon 2014: The NSA: Capabilities and Countermeasures

Bruce Schneier: “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World”

JACOB APPELBAUM EXPOSES NSA TOOLS HACKING YOUR COMPUTER-BACK DOORS & MALWARE

Jacob Appelbaum Interview – Discusses Edward Snowden, The NSA, TOR, WikiLeaks

William Binney – NSA Hiding Extent of Surveillance From FISA Courts & Congress

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Binney – The Government is Profiling You (The NSA is Spying on You)

William Binney: NSA had 9/11 foreknowledge

NSA Spying on All Americans Part 1

NSA Spying on All Americans Part 2

How the NSA Spies on Americans (Jim Harper)

The NSA: Future Crime Unit (Jim Harper)

NSA Whistleblower William Binney the 3 words that will put you on the NSA List

NSA whistleblower William Binney Keynote at HOPE Number Nine

NSA Whistleblower William Binney: The Future of FREEDOM

Alex Jones interviews William Binney December 22nd 2015

The Alex Jones Show (3rd HOUR-VIDEO Commercial Free) Wednesday December 30 2015: Seymour Hersh

Operation “Toto” Pulling Back The Curtain: Full NSA Interview

FULL Senate Debate On NSA Spying On ALL Americans

Spying on the Homefront-PBS Frontline

State of Surveillance: Police, Privacy and Technology

The USA Freedom Act | True News

Next Future Terrifying Technology Will Blow Your Mind

Enemy of the State Movie Will Smith (1998)

Encryption as Fast As Possible

Why the NSA is breaking our encryption — and why we should care | Matthew Green | TEDxMidAtlantic

U.S. Spy Net on Israel Snares Congress

NSA’s targeting of Israeli leaders swept up the content of private conversations with U.S. lawmakers

Prime Minister Benjamin Netanyahu joined President Barack Obama last month for a meeting in the Oval Office of the White House.

President Barack Obama announced two years ago he would curtail eavesdropping on friendly heads of state after the world learned the reach of long-secret U.S. surveillance programs.

But behind the scenes, the White House decided to keep certain allies under close watch, current and former U.S. officials said. Topping the list was Israeli Prime MinisterBenjamin Netanyahu.

The U.S., pursuing a nuclear arms agreement with Iran at the time, captured communications between Mr. Netanyahu and his aides that inflamed mistrust between the two countries and planted a political minefield at home when Mr. Netanyahu later took his campaign against the deal to Capitol Hill.

The National Security Agency’s targeting of Israeli leaders and officials also swept up the contents of some of their private conversations with U.S. lawmakers and American-Jewish groups. That raised fears—an “Oh-s— moment,” one senior U.S. official said—that the executive branch would be accused of spying on Congress.

The White House kept certain allies including Israeli Prime Minister Benjamin Netanyahu under surveillance after President Obama announced the U.S. would curtail surveillance on friendly heads of state. WSJ’s Adam Entous has details on Lunch Break. Photo: Getty

White House officials believed the intercepted information could be valuable to counter Mr. Netanyahu’s campaign. They also recognized that asking for it was politically risky. So, wary of a paper trail stemming from a request, the White House let the NSA decide what to share and what to withhold, officials said. “We didn’t say, ‘Do it,’ ” a senior U.S. official said. “We didn’t say, ‘Don’t do it.’ ”

WSJ’s Adam Entous explains how the U.S. determined which world leaders to spy on after announcing it would curtail surveillance. Photo: Getty

Stepped-up NSA eavesdropping revealed to the White House how Mr. Netanyahu and his advisers had leaked details of the U.S.-Iran negotiations—learned through Israeli spying operations—to undermine the talks; coordinated talking points with Jewish-American groups against the deal; and asked undecided lawmakers what it would take to win their votes, according to current and former officials familiar with the intercepts.

Before former NSA contractor Edward Snowden exposed much of the agency’s spying operations in 2013, there was little worry in the administration about the monitoring of friendly heads of state because it was such a closely held secret. After the revelations and a White House review, Mr. Obama announced in a January 2014 speech he would curb such eavesdropping.

In closed-door debate, the Obama administration weighed which allied leaders belonged on a so-called protected list, shielding them from NSA snooping. French President François Hollande, German Chancellor Angela Merkel and other North Atlantic Treaty Organization leaders made the list, but the administration permitted the NSA to target the leaders’ top advisers, current and former U.S. officials said. Other allies were excluded from the protected list, including Recep Tayyip Erdogan, president of NATO ally Turkey, which allowed the NSA to spy on their communications at the discretion of top officials.

Privately, Mr. Obama maintained the monitoring of Mr. Netanyahu on the grounds that it served a “compelling national security purpose,” according to current and former U.S. officials. Mr. Obama mentioned the exception in his speech but kept secret the leaders it would apply to.

Israeli, German and French government officials declined to comment on NSA activities. Turkish officials didn’t respond to requests Tuesday for comment. The Office of the Director of National Intelligence and the NSA declined to comment on communications provided to the White House.

The White House stopped directly monitoring the private communications of German Chancellor Angela Merkel but authorized the National Security Agency to eavesdrop on her top advisers. PHOTO: ODD ANDERSEN/AGENCE FRANCE-

This account, stretching over two terms of the Obama administration, is based on interviews with more than two dozen current and former U.S. intelligence and administration officials and reveals for the first time the extent of American spying on the Israeli prime minister.

Taking office

After Mr. Obama’s 2008 presidential election, U.S. intelligence officials gave his national-security team a one-page questionnaire on priorities. Included on the form was a box directing intelligence agencies to focus on “leadership intentions,” a category that relies on electronic spying to monitor world leaders.

The NSA was so proficient at monitoring heads of state that it was common for the agency to deliver a visiting leader’s talking points to the president in advance. “Who’s going to look at that box and say, ‘No, I don’t want to know what world leaders are saying,’ ” a former Obama administration official said.

In early intelligence briefings, Mr. Obama and his top advisers were told what U.S. spy agencies thought of world leaders, including Mr. Netanyahu, who at the time headed the opposition Likud party.

Michael Hayden, who led the NSA and the Central Intelligence Agency during the George W. Bush administration, described the intelligence relationship between the U.S. and Israel as “the most combustible mixture of intimacy and caution that we have.”

The NSA helped Israel expand its electronic spy apparatus—known as signals intelligence—in the late 1970s. The arrangement gave Israel access to the communications of its regional enemies, information shared with the U.S. Israel’s spy chiefs later suspected the NSA was tapping into their systems.

When Mr. Obama took office, the NSA and its Israeli counterpart, Unit 8200, worked together against shared threats, including a campaign to sabotage centrifuges for Iran’s nuclear program. At the same time, the U.S. and Israeli intelligence agencies targeted one another, stoking tensions.

“Intelligence professionals have a saying: There are no friendly intelligence services,” said Mike Rogers, former Republican chairman of the House Intelligence Committee.

Early in the Obama presidency, for example, Unit 8200 gave the NSA a hacking tool the NSA later discovered also told Israel how the Americans used it. It wasn’t the only time the NSA caught Unit 8200 poking around restricted U.S. networks. Israel would say intrusions were accidental, one former U.S. official said, and the NSA would respond, “Don’t worry. We make mistakes, too.”

In 2011 and 2012, the aims of Messrs. Netanyahu and Obama diverged over Iran. Mr. Netanyahu prepared for a possible strike against an Iranian nuclear facility, as Mr. Obama pursued secret talks with Tehran without telling Israel.

Convinced Mr. Netanyahu would attack Iran without warning the White House, U.S. spy agencies ramped up their surveillance, with the assent of Democratic and Republican lawmakers serving on congressional intelligence committees.

By 2013, U.S. intelligence agencies determined Mr. Netanyahu wasn’t going to strike Iran. But they had another reason to keep watch. The White House wanted to know if Israel had learned of the secret negotiations. U.S. officials feared Iran would bolt the talks and pursue an atomic bomb if news leaked.

The NSA had, in some cases, spent decades placing electronic implants in networks around the world to collect phone calls, text messages and emails. Removing them or turning them off in the wake of the Snowden revelations would make it difficult, if not impossible, to re-establish access in the future, U.S. intelligence officials warned the White House.

Instead of removing the implants, Mr. Obama decided to shut off the NSA’s monitoring of phone numbers and email addresses of certain allied leaders—a move that could be reversed by the president or his successor.

There was little debate over Israel. “Going dark on Bibi? Of course we wouldn’t do that,” a senior U.S. official said, using Mr. Netanyahu’s nickname.

One tool was a cyber implant in Israeli networks that gave the NSA access to communications within the Israeli prime minister’s office.

Given the appetite for information about Mr. Netanyahu’s intentions during the U.S.-Iran negotiations, the NSA tried to send updates to U.S. policy makers quickly, often in less than six hours after a notable communication was intercepted, a former official said.

NSA intercepts convinced the White House last year that Israel was spying on negotiations under way in Europe. Israeli officials later denied targeting U.S. negotiators, saying they had won access to U.S. positions by spying only on the Iranians.

By late 2014, White House officials knew Mr. Netanyahu wanted to block the emerging nuclear deal but didn’t know how.

On Jan. 8, John Boehner, then the Republican House Speaker, and incoming Republican Senate Majority Leader Mitch McConnell agreed on a plan. They would invite Mr. Netanyahu to deliver a speech to a joint session of Congress. A day later, Mr. Boehner called Ron Dermer, the Israeli ambassador, to get Mr. Netanyahu’s agreement.

Despite NSA surveillance, Obama administration officials said they were caught off guard when Mr. Boehner announced the invitation on Jan. 21.

Soon after, Israel’s lobbying campaign against the deal went into full swing on Capitol Hill, and it didn’t take long for administration and intelligence officials to realize the NSA was sweeping up the content of conversations with lawmakers.

The message to the NSA from the White House amounted to: “You decide” what to deliver, a former intelligence official said.

NSA rules governing intercepted communications “to, from or about” Americans date back to the Cold War and require obscuring the identities of U.S. individuals and U.S. corporations. An American is identified only as a “U.S. person” in intelligence reports; a U.S. corporation is identified only as a “U.S. organization.” Senior U.S. officials can ask for names if needed to understand the intelligence information.

The Obama administration included French President François Hollande on a so-called protected list, shielding him from NSA snooping. PHOTO: PHILIPPE WOJAZER/REUTERS

The rules were tightened in the early 1990s to require that intelligence agencies inform congressional committees when a lawmaker’s name was revealed to the executive branch in summaries of intercepted communications.

A 2011 NSA directive said direct communications between foreign intelligence targets and members of Congress should be destroyed when they are intercepted. But the NSA director can issue a waiver if he determines the communications contain “significant foreign intelligence.”

The NSA has leeway to collect and disseminate intercepted communications involving U.S. lawmakers if, for example, foreign ambassadors send messages to their foreign ministries that recount their private meetings or phone calls with members of Congress, current and former officials said.

“Either way, we got the same information,” a former official said, citing detailed reports prepared by the Israelis after exchanges with lawmakers.

During Israel’s lobbying campaign in the months before the deal cleared Congress in September, the NSA removed the names of lawmakers from intelligence reports and weeded out personal information. The agency kept out “trash talk,” officials said, such as personal attacks on the executive branch.

Administration and intelligence officials said the White House didn’t ask the NSA to identify any lawmakers during this period.

“From what I can tell, we haven’t had a problem with how incidental collection has been handled concerning lawmakers,” said Rep. Adam Schiff, a California Democrat and the ranking member of the House Permanent Select Committee on Intelligence. He declined to comment on any specific communications between lawmakers and Israel.

The NSA reports allowed administration officials to peer inside Israeli efforts to turn Congress against the deal. Mr. Dermer was described as coaching unnamed U.S. organizations—which officials could tell from the context were Jewish-American groups—on lines of argument to use with lawmakers, and Israeli officials were reported pressing lawmakers to oppose the deal.

“These allegations are total nonsense,” said a spokesman for the Embassy of Israel in Washington.

A U.S. intelligence official familiar with the intercepts said Israel’s pitch to undecided lawmakers often included such questions as: “How can we get your vote? What’s it going to take?”

NSA intelligence reports helped the White House figure out which Israeli government officials had leaked information from confidential U.S. briefings. When confronted by the U.S., Israel denied passing on the briefing materials.

The agency’s goal was “to give us an accurate illustrative picture of what [the Israelis] were doing,” a senior U.S. official said.

Just before Mr. Netanyahu’s address to Congress in March, the NSA swept up Israeli messages that raised alarms at the White House: Mr. Netanyahu’s office wanted details from Israeli intelligence officials about the latest U.S. positions in the Iran talks, U.S. officials said.

A day before the speech, Secretary of State John Kerry made an unusual disclosure. Speaking to reporters in Switzerland, Mr. Kerry said he was concerned Mr. Netanyahu would divulge “selective details of the ongoing negotiations.”

The State Department said Mr. Kerry was responding to Israeli media reports that Mr. Netanyahu wanted to use his speech to make sure U.S. lawmakers knew the terms of the Iran deal.

Intelligence officials said the media reports allowed the U.S. to put Mr. Netanyahu on notice without revealing they already knew his thinking. The prime minister mentioned no secrets during his speech to Congress.

In the final months of the campaign, NSA intercepts yielded few surprises. Officials said the information reaffirmed what they heard directly from lawmakers and Israeli officials opposed to Mr. Netanyahu’s campaign—that the prime minister was focused on building opposition among Democratic lawmakers.

The NSA intercepts, however, revealed one surprise. Mr. Netanyahu and some of his allies voiced confidence they could win enough votes.

https://www.youtube.com/watch?v=kVRFm5Er6OI

Encryption

From Wikipedia, the free encyclopedia
“Encrypt” redirects here. For the film, see Encrypt (film).
This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography.

In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.[1] Encryption does not of itself prevent interception, but denies the message content to the interceptor.[2]:374 In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.[2] For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Types of encryption

Symmetric key encryption

In symmetric-key schemes,[3] the encryption and decryption keys are the same. Communicating parties must have the same key before they can achieve secure communication.

Public key encryption

Illustration of how encryption is used within servers Public key encryption.

In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.[4] Public-key encryption was first described in a secret document in 1973;[5] before then all encryption schemes were symmetric-key (also called private-key).[2]:478

A publicly available public key encryption application called Pretty Good Privacy (PGP) was written in 1991 by Phil Zimmermann, and distributed free of charge with source code; it was purchased by Symantec in 2010 and is regularly updated.[6]

Uses of encryption

Encryption has long been used by military and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage.[7] Encryption can be used to protect data “at rest”, such as information stored on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers’ personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems, which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection), is another somewhat different example of using encryption on data at rest.[8]

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years.[9] Data should also be encrypted when transmitted across networks in order to protect against eavesdropping of network traffic by unauthorized users.[10]

Message verification

Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of amessage authentication code (MAC) or a digital signature. Standards for cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single error in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g., traffic analysis, TEMPEST, or Trojan horse.[11]

Digital signature and encryption must be applied to the ciphertext when it is created (typically on the same device used to compose the message) to avoid tampering; otherwise any node between the sender and the encryption agent could potentially tamper with it. Encrypting at the time of creation is only secure if the encryption device itself has not been tampered with.

See also

References

  1. Jump up^ “What is Encryption? | EFF Surveillance Self-Defense Project.” What is Encryption? | EFF Surveillance Self-Defense Project. Surveillance Self-Defense Project, n.d. Web. 03 Nov. 2014. <https://ssd.eff.org/en/module/what-encryption>.
  2. ^ Jump up to:a b c Goldreich, Oded. Foundations of Cryptography: Volume 2, Basic Applications. Vol. 2. Cambridge university press, 2004.
  3. Jump up^ Symmetric-key encryption software
  4. Jump up^ Bellare, Mihir. “Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.” Springer Berlin Heidelberg, 2000. Page 1.
  5. Jump up^ “Public-Key Encryption – how GCHQ got there first!”. gchq.gov.uk. Archived from the original on May 19, 2010.
  6. Jump up^ “Symantec buys encryption specialist PGP for $300M”. Computerworld. 2010-04-29. Retrieved 2010-04-29.
  7. Jump up^ Robert Richardson, 2008 CSI Computer Crime and Security Survey at 19.i.cmpnet.com
  8. Jump up^ https://www.eff.org/issues/drm
  9. Jump up^ Fiber Optic Networks Vulnerable to Attack, Information Security Magazine, November 15, 2006, Sandra Kay Miller
  10. Jump up^ https://security.berkeley.edu/content/data-encryption-transit-guideline
  11. Jump up^ http://usa.kaspersky.com/internet-security-center/threats/trojans#.VV3oaWDTvfY

Further reading

https://en.wikipedia.org/wiki/Encryption

Read Full Post | Make a Comment ( None so far )

Mass Media Big Lie Campaign To Take Down Trump With Out of Context Propaganda! — Trump Never Said He Wants All Muslims In U.S. To Register– The So-Called “Journalist” Did! — Hit and Run Political Character Assassination Attempt By Hillary Clinton Journalist Supporter — Hunter Walker — Videos

Posted on November 21, 2015. Filed under: Airplanes, American History, Babies, Blogroll, Bomb, Books, British History, Business, Central Intelligence Agency (CIA), College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Cult, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Diasters, Documentary, Drug Cartels, Economics, Education, Elections, Employment, Energy, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Food, Foreign Policy, Fraud, Freedom, Friends, Genocide, government, government spending, Homicide, Illegal, Immigration, Islam, Law, Legal, liberty, Life, Links, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Pistols, Police, Political Correctness, Politics, Presidential Candidates, Press, Radio, Rants, Raves, Religion, Religious, Rifles, Security, Speech, Spying, Strategy, Talk Radio, Tax Policy, Taxation, Technology, Terrorism, Torture, Transportation, Vacations, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

Trump Triumphing with American People — Trump Democrats, Trump Republicans, Trump Independents — President Trump? — Too Soon To Call — Videos

Posted on November 21, 2015. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Congress, Constitution, Corruption, Crisis, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, Economics, Employment, Energy, European History, Faith, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Food, Foreign Policy, Freedom, Genocide, government, Health Care, history, Illegal, Immigration, Islam, Language, Law, Legal, liberty, Life, Links, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Natural Gas, Newspapers, Non-Fiction, Oil, Oil, People, Philosophy, Photos, Police, Political Correctness, Politics, Presidential Candidates, Radio, Radio, Raves, Regulations, Religious, Resources, Security, Shite, Speech, Spying, Sunni, Talk Radio, Taxation, Technology, Television, Terrorism, Torture, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 578: November 19, 2015

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos

Posted on November 1, 2015. Filed under: American History, Ammunition, Articles, Blogroll, Bomb, Books, British History, Business, Central Intelligence Agency (CIA), College, Communications, Computers, Computers, Congress, Constitution, Corruption, Crime, Crisis, Culture, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Diasters, Dirty Bomb, Documentary, Drones, Education, Elections, Employment, Energy, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Homicide, Illegal, Immigration, Investments, Islam, Islam, Language, Law, liberty, Life, Links, media, Middle East, Missiles, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Natural Gas, Newspapers, Non-Fiction, Nuclear, Oil, Oil, People, Philosophy, Photos, Pistols, Police, Political Correctness, Politics, Presidential Candidates, Press, Radio, Radio, Rants, Raves, Regulations, Religion, Religious, Resources, Rifles, Security, Shite, Speech, Spying, Strategy, Sunni, Talk Radio, Taxation, Television, Television, Torture, Video, War, Water, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 559: October 22, 2015 

Pronk Pops Show 558: October 21, 2015

Pronk Pops Show 557: October 20, 2015 

Pronk Pops Show 556: October 19, 2015

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Story 1: House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos

benghazi-four obama_hillary_liars_benghazi_treason

Background Information

Obama and Hillary Blame Youtube Video for Benghazi Terrorist Attack as Coffins Arrive

Our Fallen Heroes

Published on Sep 15, 2012

President Obama speaks about the tragic loss of four of our fellow Americans who were serving in our diplomatic post in Benghazi, Libya. These Americans represented the best of our country; without people like them, we could not sustain our freedoms or security, or provide the leadership that the entire world depends on. During this time of turmoil in many different countries, the President makes it clear that the United States has a profound respect for people of all faiths, but as Commander in Chief, he will never tolerate efforts to harm our fellow Americans and will ensure that those who attack our people find no escape from justice.

Obama and Press Secretary Carney Blame a Video for the Benghazi Attack

YouTube Video Maker Blamed for Benghazi Attacks Breaks Silence on CNN

White House Covers Up Benghazi Terrorist Attack

13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined.

ABC News’ Jon Karl hammers Jay Carney over New bombshell Benghazi emails

Benghazi Whistleblower Embarrassed by Obama Admin Placing Blame on a YouTube Video

Benghazi Gate – Rand Paul and Hillary Clinton – Question & Answer

Email Reveals Obama Advisor Urged Susan Rice to Blame Video for Benghazi

Exclusive: Docs Show Weapons Going From Benghazi To Syria – Benghazi Gate – Happening Now

Breaking: Hillary Clinton Knew About Libyan Arms Shipments to Syria in 2011

Secretary of State Hillary Clinton knew that the US was sending arms from Libya to Syria back in 2011. She denied this during public testimony (under oath) in early 2013 after the Benghazi terrorist attack.

Melvin Goodman on why CIA Director Brennan is dangerous

The show is going to be about the response to CIA director Brennan’s press conference two weeks ago and then an appearance at the Council on Foreign Relations last week, an on the record interview with Charlie Rose in New York about his plans to restructure the CIA to try to bring a more integrity to intelligence and make it less politicized. We are going to hear from today Melvin Goodman. Goodman is a senior fellow at the Center for International Policy and a professor of government at Johns Hopkins University. He is he is a former CIA analyst. Melvin Goodman is the author of Failure of Intelligence: the Decline and Fall of the CIA and the forthcoming book On the Path to Dissent: A Whistleblower at the CIA. Goodman is the national security columnist for Counterpunch, and he said of CIA director ‘s plan to restructure the CIA and I quote “Simply, it takes the CIA further from Truman’s concept and closer to the ability to politicize intelligence. Operations are part of the policy world and not the intelligence world. The Centers have made it too easy to provide the intelligence that the ‘masters’ desire, whether they are the masters on CIA’s 7th floor or the policy masters. Brennan’s world was the Center for Counterintelligence and Counterterrorism, and many of the intelligence errors and operational errors of the past 15 years have emanated from those centers. Organizationally, it makes no sense — what are the directorates of operations and analysis — they sound as if they are HR experts.”

CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels

Retired Lt. Gen. Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi

Clinton Donors Got Weapons Deals From Hillary

Even by the standards of arms deals between the United States and Saudi Arabia, this one was enormous. A consortium of American defense contractors led by Boeing would deliver $29 billion worth of advanced fighter jets to the United States’ oil-rich ally in the Middle East…E

Why is Benghazi still a big issue for Hillary Clinton? BBC News

General Petraeus Testifies Before Congress For The First Time Since Resigning As Director Of CIA

Select Committee on Benghazi Holds First Hearing

Former CIA Director and General David Petraeus (Ret.) testified at a hearing on U.S. policy toward the Middle East and combating ISIS* in the region. He talked about his support for military enclaves in Syria and for greater military action against Syrian President Bashar al-Assad and ISIS. He also gave his assessment of the Russian military build-up in Syria and of the Iran nuclear agreement.

At the beginning of his testimony, General Petraeus apologized for what what he called his “serious mistake” of sharing classified information with his biographer, with whom he also had an extramarital affair.

Select Committee on Benghazi Holds Second Hearing

Select Committee on Benghazi Holds Third Hearing

Rep. Gowdy: Either Petraeus Will Come Before Congressional Committee Or He Will Be Subpoenaed



Benghazi Select Committee (Hearing 4)

House Select Committee on Benghazi

Trey Gowdy Opening Statement Benghazi Committee Hearing. 10/22/2015

Rep. Trey Gowdy addresses Former Secretary of State Hillary Clinton during his opening statement at a hearing Thursday by the House Select Committee on Benghazi. trey gowdy elivers opening statement of benghazi committee hearing with hillary clinton. trey gowdy says ‘We are going to find the #Truth because there is no expiration of it.’ Chairman Trey Gowdy opens #Benghazi hearing: ‘Previous investigations were not thorough. Trey Gowdy to Clinton: Trey Gowdy addressed former Secretary of State Hillary Clinton personally at a high-stakes hearing on Thursday, telling the Democratic presidential candidate that the panel’s investigation is not about her. “Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you,” Gowdy said. “Let me assure you it is not. And let me assure you why it is not. This work is about something much more important than any single person. It is about four U.S. government workers, including our Ambassador, murdered by terrorists on foreign soil. It is about what happened before, during, and after the attacks that killed these four men.” He continued: “It is about what this country owes those who risk their lives to serve it. It is about the fundamental obligation of our government to tell the truth — always — to the American people. Not a single member of this Committee signed up for an investigation into you or your email system. We signed up because we wanted to honor the service and sacrifice of four people sent to a foreign land to represent us – who were killed – and do everything we can to prevent it from happening to others.” Gowdy also presented several key questions he would be asking in his opening statement: Why were there so many requests for more security personnel and equipment, and why were those requests denied in Washington? Why did the State Department compound in Benghazi not even come close to meeting proper security specifications? What policies were we pursuing in Libya that required a physical presence in spite of the escalating violence? Who in Washington was aware of the escalating violence in Libya? What special precautions, if any, were taken on the anniversary of 9-11? What happened in Washington after the first attack and what was the response to that attack? What did the military do or not do? What did our leaders in Washington do or not do and when? Why was the American public given such divergent accounts of what caused these attacks? And why is it so hard to get information from the very government these four men were representing and serving and sacrificing for?

Benghazi panel chair: Investigation not about Hillary Clinton

South Carolina Rep. Trey Gowdy, the chairman of the House Select Committee investigating Benghazi, tells Hillary Clinton in his opening statement that the probe is not singularly focused on the former secretary of state.

Benghazi hearing: Hillary Clinton’s entire statement

Hillary Clinton gave her opening statement to the House Select Committee investigating the 2012 attacks at the U.S. Embassy in Benghazi, Libya.

Benghazi Hearing Committee Chairman on Hillary Clinton’s Emails | The New York Times

Trey Gowdy questions Hillary Clinton (Part 1)

Trey Gowdy questions Hillary Clinton (Part 2)

Clinton to panel: 3 things we learned from Benghazi

Trey Gowdy GRILLS Hillary Clinton Benghazi Committee Hearing

Trey Gowdy GRILLS Hillary Clinton during the Benghazi Committee Hearing. trey gowdy went off on hillary clinton about blumenthal and more. watch the explosive exchange. Hillary Clinton coolly hit back at her Republican interrogators on the Benghazi committee during her long-awaited testimony on Thursday, rebuffing claims she was detached as the situation in Libya deteriorated and asserting she did not use email to conduct the “vast majority” of her work as secretary of state.

The Democratic front-runner told the House Selection Committee on Benghazi, which is 18 months into its probe of the 2012 attacks on the consulate in Libya, that the tragedy does not deserve partisan attacks, while insisting the U.S. needs to stay committed to diplomatic engagement.

“Despite all the previous investigations and all the talk about partisan agendas, I’m here to honor those we lost and to do what I can to aid those who serve us still,” Clinton said, speaking slowly and deliberately during her opening statement. “My challenge to you, members of this committee, is the same challenge I put to myself…. Let’s be worthy of the trust the American people bestow on us… they expect us to rise above partisanship. And I hopes it’s what we’ll strive for today and in the future.”

Republicans questioned Clinton about why numerous requests for additional security never made it Clinton’s attention. She said they went to the right place: to personnel who handled security. And when they pressed her on why she kept the compound open or did not give it additional, she retorted that she never received a recommendation to shut down the mission—even after two attacks on the compound.

The hearing kicked off on Thursday with the partisan sniping that has been the hallmark of the committee’s work, with House Benghazi Committee Chairman Trey Gowdy defended his investigation, assuring Clinton that his probe is not centered on her.
Hour_2_151022_hillary_clinton_2_gty_1160­.jpg

WATCH LIVE: Hillary Clinton testifies before Benghazi Committee

“Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you. Let me assure you it is not,” Gowdy said in his opening statement, adding that it was about the people who were killed.

He also blamed her in part for the fact that the inquiry has dragged on for a year and a half.

The State Department only realized it did not have Clinton’s emails after they requested documents, triggering a lengthy process by which the department had to ask her and her top aides who also sometimes used private email for work purposes to turn them over.

“You had an unusual email arrangement with yourself, which meant the State Department could not produce your emails to us,” Gowdy said. “When you left the State Department you kept those public records to yourself for almost two years….Those decisions were your decisions, not ours… It just took longer to get them and garnered more attention in the process.

Ranking Democrat Elijah Cummings (D-Md.) blasted the committee as a partisan witch-hunt out to get Clinton, saying Republicans formed the panel because they “did not like the answers they got” in previous probe—“so they set up this select committee with no rules, no deadlines and a unlimited budget.”

“They set the noose because you’re running for president,” Cummings said, raising his voice before calling for the panel to disband. “It is time for Republicans to end this …fishing expedition.”

It only took Cummings a few minutes to highlight a number of embarrassing moments for Gowdy in recent weeks, including comments by Majority Leader Kevin McCarthy (R-Calif.), Rep. Richard Hanna (R-N.Y) and a fired GOP Benghazi investigator who all suggested the panel was either out to hurt Clinton or increasingly focused on investigating her.

REP. Martha Roby vs Hillary Clinton at House Select Committee on Benghazi 10/22/15

Rep Jim Jordan Goes After Hillary ‘Where’d the False Narrative Start It Started With You’

REP Trey Gowdy vs Hillary Clinton Round 2 at House Select Committee on Benghazi 102215

Benghazi Select – Gowdy: this is an investigation, not a prosecution

Bickering among Benghazi panel as Clinton looks on silently

Fireworks erupt between Clinton, Republicans at Benghazi hearing



More Background Information

Weekly Address: Carrying on the Work of

America’s intelligence community, explained

THE RECRUIT – Spy School: Inside the CIA Training Program, 1 of 2

THE RECRUIT – Spy School: Inside the CIA Training Program, 2 of 2

Special Activities Division

Published on Aug 15, 2014

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service (NCS) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the government of the United States may deny all knowledge.

Inside America’s New Covert Wars: Navy SEALs, Delta Force, Blackwater, Security Contractors (2013)

The Daring Early Years of the CIA: Covert Ops from WW2 to Vietnam (1995)

How has the CIA been used as a secret Military force? William Blum • BRAVE NEW FILMS

The CIA began as a spy agency after World War Two, but soon the CIA was planning and executing covert operations across the globe without proper congressional oversight. From the removal of the democratically elected leaders of Iran and Guatemala to the attempted invasion of Cuba, to the removal of every secular government in the Middle East, the influence of the agency is insidious. But how can a democratic society tolerate such a secret and lethal institution that works against the very values America seeks to uphold around the world?

CIA Covert Operations in Africa: How Does the U.S. Government Make Decisions?

According to the Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation. It is normally financed by government revenues but in this age of super-empowered individuals and corporations they could become a common tool of power beyond traditional war and diplomacy.

Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action. The CIA’s authority to conduct covert action comes from the National Security Act of 1947. President Ronald Reagan issued Executive Order 12333 titled in 1984. This order defined covert action as “special activities”, both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e). The CIA must have a “Presidential Finding” issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act. These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives. As a result of this framework, the CIA “receives more oversight from the Congress than any other agency in the federal government”. The Special Activities Division (SAD) is a division of the CIA’s National Clandestine Service, responsible for Covert Action and “Special Activities”. These special activities include covert political influence and paramilitary operations. The division is overseen by the United States Secretary of State.

Special Activities Division – Special Operations Group | SAD SOG

Published on Jun 30, 2015

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action. The Special Activities Division reports directly to the Deputy Director of the National Clandestine Service.

Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the United States government may deny all knowledge.

SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU and ISA, as well as other United States special operations forces, such as USNSWC, MARSOC, Special Forces, SEALs and 24th STS.

SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.

REVEALED: If This Is True, Benghazi Is Even Worse Than We Ever Thought

Insiders Come Forward, Proof of Benghazi Stand Down Order, It was Obama

Obama Lies About Libya – Imperial Presidency

Media Silent About Obama’s Undeclared Wars

Did the Military Intervention in Libya Succeed? (Benjamin Friedman)

Drones are Obama’s weapon of choice for waging illegal and undeclared wars

Special Activities Division

From Wikipedia, the free encyclopedia

Seal of the Central Intelligence Agency

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency‘s (CIA) Directorate of Operations (DO) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.[1] The Special Activities Division reports directly to the Deputy Director for the Directorate of Operations.

Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection ofintelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated.[2] As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government.[3] If they are compromised during a mission, the United States government maydeny all knowledge.[4]

SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU, ISA, and 24th STS, as well as other United States special operations forces, such as USNSWC, MARSOC, Green Berets, SEALs, SWCC, Force Recon, Pararescuemen,Combat Controllers, and Army Rangers.

SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.[5]

Political Action Group (PAG) is responsible for covert activities related to political influence, psychological operations and economic warfare. The rapid development of technology has added cyberwarfare to their mission. Tactical units within SAD are also capable of carrying out covert political action while deployed in hostile and austere environments. A large covert operation usually has components that involve many, or all, of these categories, as well as paramilitary operations. Political and Influence covert operations are used to support U.S. foreign policy. Often overt support for one element of an insurgency would be counter-productive due to the impression it would have on the local population. In such cases, covert assistance allows the U.S. to assist without damaging these elements in the process. Many of the other activities (such as propaganda, economic and cyber) support the overall political effort. There have been issues in the past with attempts to influence the US media such as in Operation Mockingbird. However, these activities are now subject to the same oversight as all covert action operations.[6]

Overview

SAD provides the President of the United States with an option when overt military and/or diplomatic actions are not viable or politically feasible. SAD can be directly tasked by the President of the United States or the National Security Council at the President’s direction. This is unlike any other U.S. special mission force. However, SAD/SOG has far fewer members than most of the other special missions units, such as the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force) or Naval Special Warfare Development Group (DEVGRU).[7][8][9]

As the action arm of the DO, SAD/SOG conducts direct action missions such as raids, ambushes, sabotage, targeted killings[10][11][12] and unconventional warfare(e.g., training and leading guerrilla and military units of other countries in combat). SAD/SOG also conducts special reconnaissance, that can be either military orintelligence driven, but is carried out by Paramilitary Officers (also called Paramilitary Operatives) when in “non-permissive environments“. Paramilitary Operations Officers are also fully trained case officers (i.e., “spies”) and as such conduct clandestine human intelligence (HUMINT) operations throughout the world.[13]SAD/SOG officers are selected from the most elite U.S. military units.[9]

The political action group within SAD conducts the deniable psychological operations, also known as black propaganda, as well as “Covert Influence” to effect political change as an important part of any Administration’s foreign policy.[1] Covert intervention in a foreign election is the most significant form of political action. This could involve financial support for favored candidates, media guidance, technical support for public relations, get-out-the-vote or political organizing efforts, legal expertise, advertising campaigns, assistance with poll-watching, and other means of direct action. Policy decisions could be influenced by assets, such as subversion of officials of the country, to make decisions in their official capacity that are in the furtherance of U.S. policy aims. In addition, mechanisms for forming and developing opinions involve the covert use of propaganda.[14]

Propaganda includes leaflets, newspapers, magazines, books, radio, and television, all of which are geared to convey the U.S. message appropriate to the region. These techniques have expanded to cover the internet as well. They may employ officers to work as journalists, recruit agents of influence, operate media platforms, plant certain stories or information in places it is hoped it will come to public attention, or seek to deny and/or discredit information that is public knowledge. In all such propaganda efforts, “black” operations denote those in which the audience is to be kept ignorant of the source; “white” efforts are those in which the originator openly acknowledges himself; and “gray” operations are those in which the source is partly but not fully acknowledged.[14][15]

Some examples of political action programs were the prevention of the Italian Communist Party (PCI) from winning elections between 1948 and the late 1960s; overthrowing the governments of Iran in 1953, and Guatemala in 1954; arming rebels in Indonesia in 1957; and providing funds and support to the trade unionfederation Solidarity following the imposition of martial law in Poland after 1981.[16]

SAD’s existence became better known as a result of the “Global War on Terror“. Beginning in autumn of 2001, SAD/SOG paramilitary teams arrived in Afghanistanto hunt down al-Qaeda leaders, facilitate the entry of U.S. Army Special Forces and lead the United Islamic Front for the Salvation of Afghanistan against the rulingTaliban. SAD/SOG units also defeated Ansar al-Islam in Iraqi Kurdistan prior to the invasion of Iraq in 2003[17][18] and trained, equipped, organized and led theKurdish peshmerga forces to defeat the Iraqi army in northern Iraq.[13][17] Despite being the most covert unit in U.S. Special Operations, numerous books have been published on the exploits of CIA paramilitary officers, including Conboy and Morrison’s Feet to the Fire: CIA Covert Operations in Indonesia,[19] and Warner’sShooting at the Moon: The Story of America’s Clandestine War in Laos.[20] Most experts consider SAD/SOG the premiere force for unconventional warfare (UW), whether that warfare consists of either creating or combating an insurgency in a foreign country.[7][21][22]

SOCOM.jpg

There remains some conflict between the National Clandestine Service and the more clandestine parts of the United States Special Operations Command (USSOCOM),[23] such as the Joint Special Operations Command. This is usually confined to the civilian/political heads of the respective Department/Agency. The combination of SAD and USSOCOM units has resulted in some of the most notable successes of the wars in Iraq and Afghanistan, to include the locating and killing of Osama bin Laden.[22][24] SAD/SOG has several missions. One of these missions is the recruiting, training, and leading of indigenous forces in combat operations.[22] SAD/SOG and its successors have been used when it was considered desirable to have plausible deniability about U.S. support (this is called a covert operation or “covert action”).[13] Unlike other special missions units, SAD/SOG operatives combine special operations and clandestine intelligence capabilities in one individual.[9] These individuals can operate in any environment (sea, air or ground) with limited to no support.[7]

Covert action

Under U.S. law, the CIA is authorized to collect intelligence, conduct counterintelligence and to conduct covert action by the National Security Act of 1947.[1]President Ronald Reagan issued Executive Order 12333 titled “United States Intelligence Activities” in 1984. This order defined covert action as “special activities,” both political and military, that the U.S. government would deny, granting such operations exclusively to the CIA. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and mirrored in Title 50 of the United States Code Section 413(e).[1][22] The CIA must have a presidential findingissued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act.[25]These findings are then monitored by the oversight committees in both the U.S. Senate, called the Senate Select Committee on Intelligence (SSCI) and the U.S. House of Representatives, called the House Permanent Select Committee on Intelligence (HPSCI).[26]

The Pentagon commissioned a study to determine whether the CIA or the U.S. Department of Defense (DoD) should conduct covert action paramilitary operations. Their study determined that the CIA should maintain this capability and be the “sole government agency conducting covert action.” The DoD found that, even under U.S. law, it does not have the legal authority to conduct covert action, nor the operational agility to carry out these types of missions.[27] The operation in May 2011 that resulted in the death of Osama bin Laden was a covert action under the authority of the CIA.[24][28]

Selection and training

SAD/SOG has several hundred officers, mostly former members of special operations forces (SOF) and a majority from theJoint Special Operations Command (JSOC).[29] The CIA has also recruited individuals within the agency.[30] The CIA’s formal position for these individuals is “Paramilitary Operations Officers” and “Specialized Skills Officers.” Paramilitary Operations Officers attend the Clandestine Service Trainee (CST) program, which trains them as clandestine intelligence operatives (known as “Core Collectors” within the Agency). The primary strengths of SAD/SOG Paramilitary Officers are operational agility, adaptability, and deniability. They often operate in small teams, typically made up of six operators (with some operations being carried out by a single officer), all with extensive military special operations expertise and a set of specialized skills that does not exist in any other unit.[9] As fully trained intelligence case officers, Paramilitary Operations Officers possess all the clandestine skills to collect human intelligence—and most importantly—to recruit assets from among the indigenous troops receiving their training. These officers often operate in remote locations behind enemy lines to carry out direct action (including raids and sabotage), counter-intelligence, guerrilla/unconventional warfare, counter-terrorism, and hostage rescue missions, in addition to being able to conduct espionage via HUMINT assets.

There are four principal elements within SAD’s Special Operations Group: the Air Branch, the Maritime Branch, the Ground Branch, and the Armor and Special Programs Branch. The Armor and Special Programs Branch is charged with development, testing, and covert procurement of new personnel and vehicular armor and maintenance of stockpiles of ordnance and weapons systems used by SOG, almost all of which must be obtained from clandestine sources abroad, in order to provide SOG operatives and their foreign trainees with plausible deniability in accordance with U.S. Congressional directives.

Together, SAD/SOG contains a complete combined arms covert military. Paramilitary Operations Officers are the core of each branch and routinely move between the branches to gain expertise in all aspects of SOG.[30] As such, Paramilitary Operations Officers are trained to operate in a multitude of environments. Because these officers are taken from the most highly trained units in the U.S. military and then provided with extensive additional training to become CIA clandestine intelligence officers, many U.S. security experts assess them as the most elite of the U.S. special missions units.[31]

SAD, like most of the CIA, requires a bachelor’s degree to be considered for employment. Many have advanced degrees such as Master’s and law degrees.[32]Many candidates come from notable schools, many from Ivy League institutions and United States Service Academies, but the majority of recruits today come from middle-class backgrounds.[33] SAD officers are trained at Camp Peary, Virginia (also known as “The Farm”) and at privately owned training centers around the United States. They also train its personnel at “The Point” (Harvey Point), a facility outside of Hertford, North Carolina.[34][35] In addition to the eighteen months of training in the Clandestine Service Trainee (CST) Program[36] required to become a clandestine intelligence officer, Paramilitary Operations Officers are trained to a high level of proficiency in the use and tactical employment of an unusually wide degree of modern weaponry, explosive devices and firearms (foreign and domestic), hand to hand combat, high performance/tactical driving (on and off road), apprehension avoidance (including picking handcuffs and escaping from confinement), improvised explosive devices, cyberwarfare, covert channels, Military Free Fall parachuting, combat and commercial SCUBA and closed circuit diving, proficiency in foreign languages, surreptitious entry operations (picking or otherwise bypassing locks), vehicle hot-wiring, Survival, Evasion, Resistance and Escape(SERE), extreme survival and wilderness training, combat EMS medical training, tactical communications, and tracking.

History

World War II

While the World War II Office of Strategic Services (OSS) was technically a military agency under the Joint Chiefs of Staff, in practice it was fairly autonomous of military control and enjoyed direct access to President Franklin D. Roosevelt. Major General William Joseph Donovan was the head of the OSS. Donovan was a soldier and Medal of Honor recipient from World War I. He was also a lawyer and former classmate of FDR at Columbia Law School.[37] Like its successor, the CIA, OSS included both human intelligence functions and special operations paramilitary functions. Its Secret Intelligence division was responsible for espionage, while its Jedburgh teams, a joint U.S.-UK-French unit, were forerunners of groups that create guerrilla units, such as the U.S. Army Special Forces and the CIA. OSS’ Operational Groups were larger U.S. units that carried out direct action behind enemy lines. Even during World War II, the idea of intelligence and special operations units not under strict military control was controversial. OSS operated primarily in the European Theater of Operations (ETO) and to some extent in the China-Burma-India Theater, while General of the Army Douglas MacArthur was extremely reluctant to have any OSS personnel within his area of operations.

From 1943 to 1945, the OSS also played a major role in training Kuomintang troops in China and Burma, and recruited other indigenous irregular forces for sabotage as well as guides for Allied forces in Burma fighting the Japanese army. OSS also helped arm, train and supply resistance movements, including Mao Zedong‘s People’s Liberation Army in China and the Viet Minh in French Indochina, in areas occupied by the Axis powers. Other functions of the OSS included the use ofpropaganda, espionage, subversion, and post-war planning.

One of the OSS’ greatest accomplishments during World War II was its penetration of Nazi Germany by OSS operatives. The OSS was responsible for training German and Austrian commandos for missions inside Nazi Germany. Some of these agents included exiled communists and socialist party members, labor activists, anti-Nazi POWs, and German and Jewish refugees. At the height of its influence during World War II, the OSS employed almost 24,000 people.[38]

OSS Paramilitary Officers parachuted into many countries then behind enemy lines, including France, Norway, Greece and The Netherlands. In Crete, OSS paramilitary officers linked up with, equipped and fought alongside Greek resistance forces against the Axis occupation.

OSS was disbanded shortly after World War II, with its intelligence analysis functions moving temporarily into the U.S. Department of State. Espionage and counterintelligence went into military units, while paramilitary and related functions went into an assortment of ‘ad hoc’ groups, such as the Office of Policy Coordination. Between the original creation of the CIA by the National Security Act of 1947 and various mergers and reorganizations through 1952, the wartime OSS functions generally went into CIA. The mission of training and leading guerrillas generally stayed in the United States Army Special Forces, but those missions required to remain covert were folded into the paramilitary arm of the CIA. The direct descendant of the OSS’ Special Operations is the CIA’s Special Activities Division.

Tibet

After the Chinese invasion of Tibet in October 1950, the CIA inserted SAD paramilitary teams into Tibet to train and lead Tibetan resistance fighters against thePeople’s Liberation Army of China. These teams selected and then trained Tibetan soldiers in the Rocky Mountains of the United States;[39] training occurred atCamp Hale.[40][41] The SAD teams then advised and led these commandos against the Chinese, both from Nepal and India. In addition, SAD Paramilitary Officers were responsible for the Dalai Lama‘s clandestine escape to India, narrowly escaping capture and certain execution by the Chinese government.[39]

According to a book by retired CIA officer John Kenneth Knaus, entitled Orphans Of The Cold War: America And The Tibetan Struggle For Survival, Gyalo Thondup, the older brother of the 14th (and current) Dalai Lama, sent the CIA five Tibetan recruits. These recruits were then trained in paramilitary tactics on the island ofSaipan in the Northern Marianas.[42] Shortly thereafter, the five men were covertly returned to Tibet “to assess and organize the resistance” and selected another 300 Tibetans for training. U.S. assistance to the Tibetan resistance ceased after the 1972 Nixon visit to China, after which the United States and China normalized relations.[43]

Korea

The CIA sponsored a variety of activities during the Korean War. These activities included maritime operations behind North Korean lines. Yong Do Island, connected by a rugged isthmus to Pusan, served as the base for those operations. These operations were carried out by well-trained Korean guerrillas. The four principal U.S. advisers responsible for the training and operational planning of those special missions were Dutch Kramer, Tom Curtis, George Atcheson and Joe Pagnella. All of these Paramilitary Operations Officers operated through a CIA front organization called the Joint Advisory Commission, Korea (JACK), headquartered at Tongnae, a village near Pusan, on the peninsula’s southeast coast.[44] These paramilitary teams were responsible for numerous maritime raids and ambushes behind North Korean lines, as well as prisoner of warrescue operations. These were the first maritime unconventional warfare units that trained indigenous forces as surrogates. They also provided a model, along with the other CIA-sponsored ground based paramilitary Korean operations, for theMilitary Assistance Command, Vietnam-Studies and Observations Group (MACV-SOG) activities conducted by the U.S. military and the CIA/SAD in Vietnam.[7][44] In addition, CIA paramilitary ground-based teams worked directly for U.S. military commanders, specifically with the 8th Army, on the “White Tiger” initiative. This initiative included inserting South Korean commandos and CIA Paramilitary Operations Officers prior to the two major amphibious assaults on North Korea, including the landing at Inchon.[7]

Cuba (1961)

Main article: Bay of Pigs Invasion

Map showing the location of the Bay of Pigs

The Bay of Pigs Invasion (known as “La Batalla de Girón”, or “Playa Girón” in Cuba), was an unsuccessful attempt by a U.S.-trained force of Cuban exiles to invade southern Cuba and overthrow the Cuban government of Fidel Castro. The plan was launched in April 1961, less than three months after John F. Kennedy assumed the presidency of the United States. TheCuban Revolutionary Armed Forces, trained and equipped by Eastern Bloc nations, defeated the exile-combatants in three days.

The sea-borne invasion force landed on April 17, and fighting lasted until April 19, 1961. CIA Paramilitary Operations OfficersGrayston Lynch and William “Rip” Robertson led the first assault on the beaches, and supervised the amphibious landings.[45] Four American aircrew instructors from Alabama Air National Guard were killed while flying attack sorties.[45]Various sources estimate Cuban Army casualties (killed or injured) to be in the thousands (between 2,000 and 5,000).[46] This invasion followed the successful overthrow by the CIA of the Mosaddeq government in Iran in 1953[47] and Arbenz government in Guatemala in 1954,[48] but was a failure both militarily and politically.[49] Deteriorating Cuban-American relations were made worse by the 1962 Cuban Missile Crisis.

Bolivia

The National Liberation Army of Bolivia (ELN-Ejército de Liberación Nacional de Bolivia) was a communist guerrilla force that operated from the remote Ñancahuazú region against the pro-U.S. Bolivian government. They were joined by Che Guevara in the mid-1960s.[50][51] The ELN was well equipped and scored a number of early successes against the Bolivian army in the difficult terrain of the mountainous Camiri region.[52] In the late 1960s, the CIA deployed teams of SAD Paramilitary Operations Officers to Bolivia to train the Bolivian army in order to counter the ELN.[52] These SAD teams linked up with U.S. Army Special Forces and Bolivian Special Forces to track down and capture Guevara, who was a special prize because of his leading role in the Cuban Revolution.[52] On October 9, 1967, Guevara was executed by Bolivian soldiers on the orders of CIA paramilitary operative Félix Rodríguez shortly after being captured, according to CIA documents.[53]

Vietnam and Laos

South Vietnam, Military Regions, 1967

The original OSS mission in Vietnam under Major Archimedes Patti was to work with Ho Chi Minh in order to prepare his forces to assist the United States and their Allies in fighting the Japanese. After the end of World War II, the US agreed at Potsdam to turn Vietnam back to their previous French rulers and in 1950 the US began providing military aid to the French.[54]

CIA Paramilitary Operations Officers trained and led Hmong tribesmen in Laos and Vietnam, and their actions of these officers were not known for several years. Air America was the air component of the CIA’s paramilitary mission in Southeast Asia and was responsible for all combat, logistics and search and rescue operations in Laos and certain sections of Vietnam.[55] The ethnic minority forces numbered in the tens of thousands and they conducted direct actions mission, led by Paramilitary Operations Officers, against the communist Pathet Lao forces and their North Vietnamese allies.[7]

Elements of SAD were seen in the CIA’s Phoenix Program. One component of the Phoenix Program was involved in the capture and killing of suspected Viet Cong (National Liberation Front – NLF) members.[56] Between 1968 and 1972, the Phoenix Program captured 81,740 National Liberation Front of South Vietnam (NLF or Viet Cong) members, of whom 26,369 were killed. This was a large proportion of U.S. killings between 1969 and 1971. The program was also successful in destroying their infrastructure. By 1970, communist plans repeatedly emphasized attacking the government’s “pacification” program and specifically targeted Phoenix agents. The NLF also imposed quotas. In 1970, for example, communist officials near Da Nang in northern South Vietnam instructed their agents to “kill 400 persons” deemed to be government “tyrant[s]” and to “annihilate” anyone involved with the “pacification” program. Several North Vietnamese officials have made statements about the effectiveness of Phoenix.[57][58]

MAC-V SOG (Studies and Observations Group) (which was originally named the Special Operations Group, but was changed for cover purposes), was created and active during the Vietnam War. While CIA was just one part of MAC-V SOG, it did have operational control of some of the programs. Many of the military members of MAC-V SOG joined the CIA after their military service. The legacy of MAC-V SOG continues within SAD’s Special Operations Group.[59]

Maritime activities against the USSR

In 1973, SAD/SOG and the CIA’s Directorate of Science and Technology built and deployed the USNS Glomar Explorer (T-AG-193), a large deep-sea salvage ship, on a secret operation. This operation was called Project Azorian (erroneously called Project Jennifer by the press).[60] Her mission was to recover a sunken Sovietsubmarine, K-129, which had been lost in April 1968.[61][62] A mechanical failure caused two-thirds of the submarine to break off during recovery,[60] but SAD recovered two nuclear-tipped torpedoes, cryptographic machines and the bodies of six Soviet submariners.[63] An alternative theory claims that all of K-129 was recovered[64] and that the official account was an “elaborate cover-up”.[65]

Also in the 1970s, the U.S. Navy, the National Security Agency (NSA) and SAD/SOG [66] conducted Operation Ivy Bells and a series of other missions to place wire taps on Soviet underwater communications cables. These operations were covered in detail in the 1998 book Blind Man’s Bluff: The Untold Story of American Submarine Espionage.[67] In the 1985 edition of “Studies in Intelligence”, the CIA’s in-house journal that outsiders rarely get to see, the CIA describes the “staggering expense and improbable engineering feats” that culminated in the August 1974 mission.[68]

Nicaragua

In 1979, the U.S.-backed Anastasio Somoza Debayle dictatorship in Nicaragua fell to the socialist Sandinistas. Once in power, the Sandinistas disbanded theNicaraguan National Guard, who had committed many human rights abuses, and arrested and executed some of its members. Other former National Guard members helped to form the backbone of the Nicaraguan Counterrevolution or Contra. SAD/SOG paramilitary teams were deployed to train and lead these forces against the Sandinista government. These paramilitary activities were based in Honduras and Costa Rica. Direct military aid by the United States was eventually forbidden by the Boland Amendment of the Defense Appropriations Act of 1983. The Boland Amendment was extended in October 1984 to forbid action by not only the Defense Department, but also to include the Central Intelligence Agency.[69][70]

The Boland Amendment was a compromise because the U.S. Democratic Party did not have enough votes for a comprehensive ban on military aid. It covered only appropriated funds spent by intelligence agencies. Some of Reagan’s national security officials used non-appropriated money of the National Security Council (NSC) to circumvent the Amendment. NSC officials sought to arrange funding by third parties. These efforts resulted in the Iran-Contra Affair of 1987, which concerned Contra funding through the proceeds of arms sales to the Islamic Republic of Iran. No court ever made a determination whether Boland covered the NSC and on the grounds that it was a prohibition rather than a criminal statute, no one was indicted for violating it. Congress later resumed aid to the Contras, totaling over $300 million. The Contra war ended when the Sandinistas were voted out of power by a war-weary populace in 1990.[70][71] Sandinista leader Daniel Ortega was re-elected as President of Nicaragua in 2006 and took office again on January 10, 2007.

El Salvador

CIA personnel were also involved in the Salvadoran civil war.[72] Some allege that the techniques used to interrogate prisoners in El Salvador foreshadowed those later used in Iraq and Afghanistan.[73] In fact, when a similar counter-insurgency program was proposed in Iraq, it was referred to as “the Salvador Option”.[74]

Somalia

Location of Somalia

SAD sent in teams of Paramilitary Operations Officers into Somalia prior to the U.S. intervention in 1992. On December 23, 1992, Paramilitary Officer Larry Freedman became the first casualty of the conflict in Somalia. Freedman was a former ArmyDelta Force operator who had served in every conflict that the U.S. was involved in, both officially and unofficially, since Vietnam.[75] Freedman was killed while conducting special reconnaissance in advance of the entry of U.S. military forces. His mission was completely voluntary, as it required entry into a very hostile area without any support. Freedman was awarded the Intelligence Star on January 5, 1993 for his “extraordinary heroism”.[76]

SAD/SOG teams were key in working with JSOC and tracking high value targets (HVT), known as “Tier One Personalities”. Their efforts, working under extremely dangerous conditions with little to no support, led to several very successful joint JSOC/CIA operations.[77] In one specific operation, a CIA case officer, Michael Shanklin[78] and codenamed “Condor”, working with a CIA Technical Operations Officer from the Directorate of Science and Technology, managed to get a cane with a beacon in it to Osman Ato, a wealthy businessman, arms importer, and Mohammed Aideed, a money man whose name was right below Mohamed Farrah Aidid’s on the Tier One list.

Once Condor confirmed that Ato was in a vehicle, JSOC‘s Delta Force launched a capture operation.

a Little Bird helicopter dropped out of the sky and a sniper leaned out and fired three shots into the car’s engine block. The car ground to a halt as commandos roped down from hovering Blackhawks [sic], surrounded the car and handcuffed Ato. It was the first known helicopter takedown of suspects in a moving car. The next time Jones saw the magic cane, an hour later, Garrison had it in his hand. “I like this cane,” Jones remembers the general exclaiming, a big grin on his face. “Let’s use this again.” Finally, a tier one personality was in custody.[77]

President Bill Clinton withdrew U.S. forces on May 4, 1994.[79]

In June 2006, the Islamic Courts Union seized control of southern Somalia, including the country’s capital Mogadishu, prompting the Ethiopian government to send in troops to try to protect the transitional government. In December, the Islamic Courts warned Ethiopia they would declare war if Ethiopia did not remove all its troops from Somalia. Sheikh Sharif Ahmed, leader of the Islamic Courts, called for a jihad, or holy war, against Ethiopia and encouraged foreign Muslim fighters to come to Somalia. At that time, the United States accused the group of being controlled by al-Qaeda, but the Islamic Courts denied that charge.[80]

In 2009, PBS reported that al-Qaeda had been training terrorists in Somalia for years. Until December 2006, Somalia’s government had no power outside of the town of Baidoa, 150 miles (240 km) from the capital. The countryside and the capital were run by warlords and militia groups who could be paid to protect terrorist groups.[80]

CIA officers kept close tabs on the country and paid a group of Somali warlords to help hunt down members of al-Qaeda according to the New York Times.[citation needed] Meanwhile, Ayman al-Zawahiri, the deputy to al-Qaeda leader Osama bin Laden, issued a message calling for all Muslims to go to Somalia.[80]On January 9, 2007, a U.S. official said that ten militants were killed in one airstrike.[81]

On September 14, 2009, Saleh Ali Saleh Nabhan, a senior al-Qaeda leader in East Africa as well as a senior leader in Shabaab, al Qaeda’s surrogate in Somalia, was killed by elements of U.S. Special Operations. According to a witness, at least two AH-6 Little Bird attack helicopters strafed a two-car convoy. Navy SEALs then seized the body of Nabhan and took two other wounded fighters captive.[82][83] JSOC and the CIA had been trying to kill Nabhan for some time including back in January 2007, when an AC-130 Gunship was called in on one attempt. A U.S. intelligence source stated that CIA paramilitary teams are directly embedded with Ethiopian forces in Somalia, allowing for the tactical intelligence to launch these operations.[84] Nabhan was wanted for his involvement in the 1998 United States embassy bombings, as well as leading the cell behind the 2002 Mombasa attacks.[82][85]

From 2010 to 2013, the CIA set up the Somalia National Intelligence and Security Agency (NISA) by providing training, funding and diplomatic access. In the same time period, the EU and UN has spent millions of dollars for the military training of the Somali National Army (SNA). NISA is considered a professional Somali security force that can be relied upon to neutralize the terrorist threat.[86] This force responded to the complex al-Shabaab attack on the Banadir Regional Courthouse in Mogadishu which killed 25 civilians. NISA’s response however saved 100s and resulted in the death of all the al-Shabaab guerrillas involved.[87]

Significant events during this timeframe included the targeted drone strikes against British al-Qaida operative Bilal el-Berjawi [88] and Moroccan al-Qaida operative Abu Ibrahim.[89] It also included the rescue of U.S. citizen Jessica Buchanan by U.S. Navy SEALs.[90] All likely aided by intelligence collection efforts in Somalia.[91]

Afghanistan

Hamid Karzai with Special Forces and CIA Paramilitary in late 2001.

During the Soviet war in Afghanistan in the 1980s, Paramilitary Operations Officers were instrumental in equippingMujaheddin forces against the Soviet Army. Although the CIA in general, and a Texas congressman named Charlie Wilson in particular, have received most of the attention, the key architect of this strategy was Michael G. Vickers. Vickers was a young Paramilitary Operations Officer from SAD/SOG. The CIA’s efforts have been given credit for assisting in ending the Sovietinvolvement in Afghanistan and bringing Taliban to power.[92]

SAD paramilitary teams were active in Afghanistan in the 1990s in clandestine operations to locate and kill or capture Osama Bin Laden. These teams planned several operations, but did not receive the order to execute from President Bill Clintonbecause the available intelligence did not guarantee a successful outcome weighed against the extraordinary risk to the SAD/SOG teams that would execute the mission.[13] These efforts did however build many of the relationships that would prove essential in the 2001 U.S. Invasion of Afghanistan.[13]

On September 26, 2001, members of the Special Activities Division, led by Gary Schroen, were the first U.S. forces inserted into Afghanistan. The Northern Afghanistan Liaison Team entered the country nine days after the 9/11 attack[93][94] and linked up with the Northern Alliance as part of Task Force Dagger.[95]

They provided the Northern Alliance with resources including cash to buy weapons and prepared for the arrival of USSOCOM forces. The plan for the invasion of Afghanistan was developed by the CIA, the first time in United States history that such a large-scale military operation was planned by the CIA.[96] SAD, U.S. Army Special Forces, and the Northern Alliance combined to overthrow the Taliban in Afghanistan with minimal loss of U.S. lives. They did this without the use of conventional U.S. military ground forces.[13][97][98][99]

The Washington Post stated in an editorial by John Lehman in 2006:

What made the Afghan campaign a landmark in the U.S. Military’s history is that it was prosecuted by Special Operations forces from all the services, along with Navy and Air Force tactical power, operations by the Afghan Northern Alliance and the CIA were equally important and fully integrated. No large Army or Marine force was employed”.[100]

In a 2008 New York Times book review of Horse Soldiers, a book by Doug Stanton about the invasion of Afghanistan, Bruce Barcott wrote:

The valor exhibited by Afghan and American soldiers, fighting to free Afghanistan from a horribly cruel regime, will inspire even the most jaded reader. The stunning victory of the horse soldiers – 350 Special Forces soldiers, 100 C.I.A. officers and 15,000 Northern Alliance fighters routing a Taliban army 50,000 strong – deserves a hallowed place in American military history”.[101]

Small and highly agile paramilitary mobile teams spread out over the countryside to meet with locals and gather information about the Taliban and al-Qa’ida. During that time, one of the teams was approached in a village and asked by a young man for help in retrieving his teenage sister. He explained that a senior Taliban official had taken her as a wife and had sharply restricted the time she could spend with her family. The team gave the man a small hand-held tracking device to pass along to his sister, with instructions for her to activate it when the Taliban leader returned home. The team responded to her emergency signal, capturing the senior Taliban official and rescuing the sister. The siblings’ tearful reunion left the team at a loss for words—a rarity for the normally loud warriors of CIA’s Special Activities Division.[102]

Tora Bora

In December 2001, SAD/SOG and the Army’s Delta Force tracked down Osama bin Laden in the rugged mountains near the Khyber Pass in Afghanistan.[103]Former CIA station chief Gary Berntsen as well as a subsequent Senate investigation claimed that the combined American special operations task force was largely outnumbered by al-Qaeda forces and that they were denied additional US troops by higher command.[104] The task force also requested munitions to block the avenues of egress of bin Laden, but that request was also denied.[105] The team allegedly uncovered evidence in the subsequent site exploration that bin Laden’s ultimate aim was to obtain and detonate a nuclear device in a terrorist attack.[96] According to other press reports, SAD were ineffectual and “Bin Laden and bodyguards walked uncontested out of Tora Bora and disappeared into Pakistan’s unregulated tribal area.”[106]

Surge

In September 2009, the CIA planned on “deploying teams of spies, analysts and paramilitary operatives to Afghanistan, part of a broad intelligence ‘surge’ ordered by President Obama. This will make its station there among the largest in the agency’s history.”[107] This presence is expected to surpass the size of the stations in Iraq and Vietnam at the height of those wars.[107] The station is located at the U.S. Embassy in Kabul and is led “by a veteran with an extensive background in paramilitary operations”.[108] The majority of the CIA’s workforce is located among secret bases and military special operations posts throughout the country.[108][109]

Also in 2009, General Stanley McChrystal, the commander of NATO forces in Afghanistan, planned to request an increase in teams of CIA operatives, including their elite paramilitary officers, to join with U.S. military special operations forces. This combination worked well in Iraq and is largely credited with the success of that surge.[108][110] There have been basically three options described in the media: McChrystal’s increased counterinsurgency campaign; a counter-terror campaign using special operations raids and drone strikes; and withdrawal. The most successful combination in both the wars in Afghanistan and Iraq has been the linking up of SAD and military special forces to fight alongside highly trained indigenous units. One thing all of these options have in common is a requirement for greater CIA participation.[110]

The End Game

According to the current and former intelligence officials, General McChrystal also had his own preferred candidate for the Chief of Station (COS) job, a good friend and decorated CIA paramilitary officer.[111] The officer had extensive experience in war zones, including two previous tours in Afghanistan with one as the Chief of Station, as well as tours in the Balkans, Baghdad and Yemen. He is well known in CIA lore as “the man who saved Hamid Karzai‘s life when the CIA led the effort to oust the Taliban from power in 2001″. President Karzai is said to be greatly indebted to this officer and was pleased when the officer was named chief of station again. According to interviews with several senior officials, this officer “was uniformly well-liked and admired. A career paramilitary officer, he came to the CIA after several years in an elite Marine unit”.[111][112]

General McChrystal’s strategy included the lash up of special operations forces from the U.S. Military and from SAD/SOG to duplicate the initial success and the defeat of the Taliban in 2001[113] and the success of the “Surge” in Iraq in 2007.[114] This strategy proved highly successful and worked very well in Afghanistan with SAD/SOG and JSOC forces conducting raids nearly every night having “superb results” against the enemy.[115]

In 2001, the CIA’s SAD/SOG began creating what would come to be called Counter-terrorism Pursuit Teams (CTPT).[116][117] These units grew to include over 3,000 operatives by 2010 and have been involved in sustained heavy fighting against the enemy. It is considered the “best Afghan fighting force”.

Located at 7,800 feet (2,400 m) above sea level, Firebase Lilley in Shkin serves as a “nerve center for the covert war”.[117] This covert war includes being a hub for these CTPT operations with Firebase Lilley being just one in a constellation of CIA bases across Afghanistan.[117] These units have not only been highly effective in combat operations against the Taliban and al-Qaeda forces, but have also been used to engage with the tribes in areas with no other official government presence.[118]

This covert war also includes a large SOG/CTPT expansion into Pakistan to target senior al-Qaeda and Taliban leadership in the Federally Administered Tribal Area (FATA).[119] CTPT units are the main effort in both the “Counterterrorism plus” and the full “Counterinsurgency” options being discussed by the Obama administration in the December 2010 review.[120] SOG/CTPT are also key to any exit strategy for the U.S. government to leave Afghanistan, while still being able to deny al-Qaeda and other trans-national extremists groups a safehaven both in Afghanistan and in the FATA of Pakistan.[121]

In January 2013, a CIA drone strike killed Mullah Nazir a senior Taliban commander in the South Waziristan area of Pakistan believed responsible for carrying out the insurgent effort against the US military in Afghanistan. Nazir’s death degraded the Taliban.[122]

The U.S. has decided to lean heavily on CIA in general and SAD specifically in their efforts to withdraw from Afghanistan as it did in Iraq.[123] There are plans being considered to have several US Military special operations elements assigned to CIA after the withdrawal.[124]

Yemen

On November 5, 2002, a missile launched from a CIA-controlled Predator drone killed al-Qaeda members traveling in a remote area in Yemen. SAD/SOG paramilitary teams had been on the ground tracking their movements for months and called in this air strike.[125] One of those in the car was Ali Qaed Senyan al-Harthi, al-Qaeda’s chief operative in Yemen and a suspect in the October 2000 bombing of the destroyer USS Cole. Five other people, believed to be low-level al-Qaeda members, were also killed to include an American named Kamal Derwish.[126][127] Former Deputy U.S. Defense Secretary Paul Wolfowitz called it “a very successful tactical operation” and said “such strikes are useful not only in killing terrorists but in forcing al-Qaeda to change its tactics”.[126]

“It’s an important step that has been taken in that it has eliminated another level of experienced leadership from al-Qaeda,” said Vince Cannistraro, former head of counter-terrorism for the CIA and current ABC News consultant. “It will help weaken the organization and make it much less effective.”[128][129] Harithi was on the run, pursued by several security forces who were looking for him and Muhammad Hamdi al-Ahdal, another suspect in the USS Cole bombing case.[130]

In 2009, the Obama administration authorized continued lethal operations in Yemen by the CIA.[131] As a result, the SAD/SOG and JSOC have joined together to aggressively target al-Qaeda operatives in that country, both through leading Yemenese special forces and intelligence driven drone strikes.[131] A major target of these operations is Imam Anwar al-Aulaqi, an American citizen with ties to both Nidal Hassan, the alleged Fort Hood attacker, and Umar Farouk Abdulmutallab, the Christmas 2009 attempted bomber of Northwest Airline flight 253.[132] Imam al-Aulaki was killed on September 30, 2011 by an air attack carried out by the Joint Special Operations Command.[133]

Iraq

SAD paramilitary teams entered Iraq before the 2003 invasion. Once on the ground they prepared the battle space for the subsequent arrival of U.S. military forces. SAD teams then combined with U.S. Army special forces (on a team called the Northern Iraq Liaison Element or NILE).[17] This team organized the KurdishPeshmerga for the subsequent U.S. led invasion. This joint team combined in Operation Viking Hammer to defeat Ansar al-Islam, an Islamist group allied to al-Qaeda, which several battle-hardened fighters from Afghanistan had joined after the fall of the Taliban, in a battle for control over the northeast of Iraq – a battle that turned out being one of the “most intense battles of Special Forces since Vietnam”.[134] This battle was for an entire territory that was completely occupied by Ansar al-Islam and was executed prior to the invasion in February 2003. If this battle had not been as successful as it was, there would have been a considerable hostile force in the rear of the U.S./secular Kurdish force in the subsequent assault on the Iraqi army to the south. The U.S. side was represented by paramilitary operations officers from SAD/SOG and the army’s 10th Special Forces Group (10th SFG). 10th SFG soldiers were awarded three Silver Stars and six Bronze Stars with V for valor for this battle alone [135] and several paramilitary officers were awarded the Intelligence Star for valor in combat.[136] This battle was a significant direct attack and victory on a key U.S. opponent. It resulted in the deaths of a substantial number of militants and the uncovering of a crude laboratory that had traces of poisons and information on chemical weapons at Sargat.[17][137] The team found foreign identity cards, visas, and passports on the enemy bodies. They had come from a wide variety of Middle Eastern and north African countries including Yemen, Sudan, Saudi Arabia, Qatar, Oman, Tunisia, Morocco, and Iran.[135]Sargat was also the only facility that had traces of chemical weapons discovered in the Iraq war.[18][136][138]

The village of Biyara and Base of Ansar al-Islam 2001–2003

In a 2004 U.S. News & World Report article, “A firefight in the mountains”, the author states:

“Viking Hammer would go down in the annals of Special Forces history—a battle fought on foot, under sustained fire from an enemy lodged in the mountains, and with minimal artillery and air support.”[135]

SAD/SOG teams also conducted high risk special reconnaissance missions behind Iraqi lines to identify senior leadership targets. These missions led to the initial assassination attempts against Iraqi President Saddam Hussein and his key generals. Although the initial air strike against Hussein was unsuccessful in killing the dictator, it was successful in effectively ending his ability to command and control his forces. Other strikes against key generals were successful and significantly degraded the command’s ability to react to and maneuver against the U.S.-led invasion force.[17][139] SAD operations officers were also successful in convincing key Iraqi army officers to surrender their units once the fighting started and/or not to oppose the invasion force.[18]

NATO member Turkey refused to allow its territory to be used by the U.S. Army’s 4th Infantry Division for the invasion. As a result, the SAD/SOG, U.S. Army special forces joint teams, the Kurdish Peshmerga and the 173d Airborne Brigade were the entire northern force against the Iraqi army during the invasion. Their efforts kept the 13 divisions of the Iraqi Army in place to defend against the Kurds rather allowing them to contest the coalition force coming from the south.[134] This combined U.S. special operations and Kurdish force defeated the Iraqi Army.[17] Four members of the SAD/SOG team received CIA’s rare Intelligence Star for “extraordinary heroism”.[18]

The mission that captured Saddam Hussein was called “Operation Red Dawn“. It was planned and carried out by JSOC’s Delta Force and SAD/SOG teams (together called Task Force 121). The operation eventually included around 600 soldiers from the 1st Brigade of the 4th Infantry Division.[140][141] Special operations troops probably numbered around 40. Much of the publicity and credit for the capture went to the 4th Infantry Division soldiers, but CIA and JSOC were the driving force. “Task Force 121 were actually the ones who pulled Saddam out of the hole” said Robert Andrews, former deputy assistant Secretary of Defense for special operations and low-intensity conflict. “They can’t be denied a role anymore.”[140]

CIA paramilitary units continued to team up with the JSOC in Iraq and in 2007 the combination created a lethal force many credit with having a major impact in the success of “the Surge“. They did this by killing or capturing many of the key al-Qaeda leaders in Iraq.[142][143] In a CBS 60 Minutes interview, Pulitzer Prize-winning journalist Bob Woodward described a new special operations capability that allowed for this success. This capability was developed by the joint teams of CIA and JSOC.[144] Several senior U.S. officials stated that the “joint efforts of JSOC and CIA paramilitary units was the most significant contributor to the defeat of al-Qaeda in Iraq”.[142][145]

In May 2007, Marine Major Douglas A. Zembiec was serving in SAD Ground Branch in Iraq when he was killed by small arms fire while leading a raid.[146][147]Reports from fellow paramilitary officers stated that the flash radio report sent was “five wounded and one martyred”[148] Major Zembiec was killed while saving his soldiers, Iraqi soldiers. He was honored with an intelligence star for his valor in combat.[149]

On October 26, 2008, SAD/SOG and JSOC conducted an operation in Syria targeting the “foreign fighter logistics network” bringing al-Qaeda operatives into Iraq (See 2008 Abu Kamal raid).[150] A U.S. source told CBS News that “the leader of the foreign fighters, an al-Qaeda officer, was the target of Sunday’s cross-border raid.” He said the attack was successful, but did not say whether or not the al-Qaeda officer was killed.[151] Fox News later reported that Abu Ghadiya, “al-Qa’ida’s senior coordinator operating in Syria”, was killed in the attack.[152] The New York Times reported that during the raid U.S. forces killed several armed males who “posed a threat”.[153]

In September 2014 with the rise of the Islamic State, the U.S. government began aggressive military operations against them in both Iraq and Syria. SAD Ground Branch was placed in charge of the ground war.[154] This is a testament to SAD being the preeminent force for unconventional warfare and their long-standing relationship with the most effective fighting force in the region, the Kurdish Peshmerga.[155]

Pakistan

SAD/SOG has been very active “on the ground” inside Pakistan targeting al-Qaeda operatives for Unmanned Aerial Vehicle (UAV) Predator strikes and along with USSOCOM elements they have been training Pakistani Special Service Group Commandos.[156] Before leaving office, President George W. Bush authorized SAD’s successful killing of eight senior al-Qaeda operatives via targeted air strikes.[157] Among those killed were the mastermind of a 2006 plot to detonate explosives aboard planes flying across the Atlantic Rashid Rauf and the man thought to have planned the Islamabad Marriott Hotel bombing on September 20, 2008 that killed 53 people.[158][159] The CIA Director authorized the continuation of these operations and on January 23, SAD/SOG performed killings of 20 individuals in northwestern Pakistan that were terrorists. Some experts assess that the CIA Director – at that time Leon Panetta – has been more aggressive in conducting paramilitary operations in Pakistan than his predecessor.[160] A Pakistani security official stated that other strikes killed at least 10 insurgents, including five foreign nationals and possibly “a high-value target” such as a senior al-Qaeda or Taliban official.[161] On February 14, the CIA drone killed 27 taliban and al-Qaeda fighters in a missile strike in south Waziristan, a militant stronghold near the Afghan border where al-Qaeda leaders Osama bin Laden and Ayman al-Zawahri were believed to be hiding.[162]

According to the documentary film Drone, by Tonje Schei, since 2002 the U.S. Air Force 17th Reconnaissance Squadronhas been working for the CIA as “customer”, carrying out at least some of the armed missions in Pakistan.[163]

In a National Public Radio (NPR) report dated February 3, 2008, a senior official stated that al-Qaeda has been “decimated” by SAD/SOG’s air and ground operations. This senior U.S. counter-terrorism official goes on to say, “The enemy is really, really struggling. These attacks have produced the broadest, deepest and most rapid reduction in al-Qaida senior leadership that we’ve seen in several years.”[164] President Obama’s CIA Director Leon Panetta stated that SAD/SOG’s efforts in Pakistan have been “the most effective weapon” against senior al-Qaeda leadership.[165][166]

These covert attacks have increased significantly under President Obama, with as many at 50 al-Qaeda militants being killed in the month of May 2009 alone.[167][168][169] In June 2009, sixty Taliban fighters were killed while at a funeral to bury fighters that had been killed in previous CIA attacks.[170] On July 22, 2009, National Public Radio reported that U.S. officials believeSaad bin Laden, a son of Osama bin Laden, was killed by a CIA strike in Pakistan. Saad bin Laden spent years under house arrest in Iran before traveling last year to Pakistan, according to former National Intelligence Director Mike McConnell. It’s believed he was killed sometime in 2009. A senior U.S. counter-terrorism said U.S. intelligence agencies are “80 to 85 percent” certain that Saad bin Laden is dead.[171]

On August 6, 2009, the CIA announced that Baitullah Mehsud was killed by a SAD/SOG drone strike in Pakistan.[172] The New York Times said, “Although President Obama has distanced himself from many of the Bush administration’s counter-terrorism policies, he has embraced and even expanded the C.I.A.’s covert campaign in Pakistan using Predator and Reaper drones”.[172] The biggest loss may be to “Osama bin Laden’s al-Qa’ida”. For the past eight years, al-Qaeda had depended on Mehsud for protection after Mullah Mohammed Omar fled Afghanistan in late 2001. “Mehsud’s death means the tent sheltering Al Qaeda has collapsed,” an Afghan Taliban intelligence officer who had met Mehsud many times told Newsweek. “Without a doubt he was Al Qaeda’s No. 1 guy in Pakistan,” adds Mahmood Shah, a retired Pakistani Army brigadier and a former chief of the Federally Administered Tribal Area, or FATA, Mehsud’s base.[173]

Airstrikes from CIA drones struck targets in the Federally Administered Tribal Areas (FATA) of Pakistan on September 8, 2009. Reports stated that seven to ten militants were killed to include one top al-Qaida leaders. He was Mustafa al-Jaziri, an Algerian national described as an “important and effective” leader and senior military commander for al-Qaida. The success of these operations are believed to have caused senior Taliban leaders to significantly alter their operations and cancel key planning meetings.[174][175]

The CIA is also increasing its campaign using Predator missile strikes on al-Qaeda in Pakistan. The number of strikes in 2009 exceeded the 2008 total, according to data compiled by the Long War Journal, which tracks strikes in Pakistan.[108] In December 2009, the New York Times reported that President Obama ordered an expansion of the drone program with senior officials describing the program as “a resounding success, eliminating key terrorists and throwing their operations into disarray”.[176] The article also cites a Pakistani official who stated that about 80 missile attacks in less than two years have killed “more than 400” enemy fighters, a number lower than most estimates but in the same range. His account of collateral damage was strikingly lower than many unofficial counts: “We believe the number of civilian casualties is just over 20, and those were people who were either at the side of major terrorists or were at facilities used by terrorists.”[176]

On December 6, 2009, a senior al-Qaeda operative, Saleh al-Somali, was killed in a drone strike in Pakistan. He was responsible for their operations outside of the Afghanistan-Pakistan region and formed part of the senior leadership. Al-Somali was engaged in plotting terrorist acts around the world and “given his central role, this probably included plotting attacks against the United States and Europe”.[177][178] On December 31, 2009, senior Taliban leader and strong Haqqani ally Haji Omar Khan, brother of Arif Khan, was killed in the strike along with the son of local tribal leader Karim Khan.[179]

In January 2010, al-Qaeda in Pakistan announced that Lashkar al-Zil leader Abdullah Said al Libi was killed in a drone missile strike. Neither al-Qaeda nor the US has revealed the date of the attack that killed Libi.[180] On January 14, 2010, subsequent to the suicide attack at Camp Chapman, the CIA located and killed the senior Taliban leader in Pakistan, Hakimullah Mehsud. Mehsud had claimed responsibility in a video he made with the suicide bomber Humam Khalil Abu-Mulal al-Balawi.[181]

On February 5, 2010, the Pakistani Inter-Services Intelligence (ISI) and CIA’s SAD/SOG conducted a joint raid and apprehended Mullah Abdul Ghani Baradar. Baradar was the most significant Taliban figure to be detained since the beginning of the Afghan War more than eight years ago until that date. He ranked second to Mullah Muhammad Omar, the Taliban’s founder and was known to be a close associate of Osama bin Laden. Mullah Baradar was interrogated by CIA and ISI officers for several days before news of his capture was released.[182] This capture sent the message that the Taliban leadership is not safe in Afghanistan or Pakistan.[183] “The seizure of the Afghan Taliban’s top military leader in Pakistan represents a turning point in the U.S.-led war against the militants”, U.S. officials and analysts said.[184] Per Pakistani Interior Minister Rehman Malik, several raids in Karachi in early February netted dozens of suspected Afghan militants.[184] In other joint raids that occurred around the same time, Afghan officials said that the Taliban “shadow governorsP for two provinces in northern Afghanistan had also been detained. Mullah Abdul Salam, the Taliban’s leader in Kunduz, and Mullah Mir Mohammed of Baghlan were captured in Akora Khattack.[185]

On February 20, Muhammad Haqqani, son of Jalaluddin Haqqani, was one of four people killed in the drone strike in Pakistan’s tribal region in North Waziristan, according to two Pakistani intelligence sources.[186]

On May 31, 2010, the New York Times reported that Mustafa Abu al Yazid (AKA Saeed al Masri), a senior operational leader for Al Qaeda, was killed in an American missile strike in Pakistan’s tribal areas.[187]

From July to December 2010, predator strikes killed 535 suspected militants in the FATA to include Sheikh Fateh Al Misri, Al-Qaeda’s new third in command on September 25.[188] Al Misri was planning a major terrorist attack in Europe by recruiting British Muslims who would then go on a shooting rampage similar to what transpired in Mumbai in November 2008.[189]

Operation Neptune Spear

File:President Obama on Death of Osama bin Laden.ogv

President Barack Obama‘s address(Text)

On May 1, 2011, President Barack Obama announced that Osama bin Laden had been killed earlier that day in Abbottabad, Pakistan by “a small team of Americans” acting under his direct orders during a CIA operation under Director Leon Panetta.[24][28][190] The helicopter raid was executed from a CIA forward operating base in Afghanistan by the elements of the U.S. Naval Special Warfare Development Group (assigned to the CIA) and CIA paramilitary operatives.[191] [192][193]

The operation in the Bilal military cantonment area in the city of Abbottabad resulted in the acquisition of extensive intelligence on the future attack plans of al-Qaeda.[194][195][196] The body of bin Laden was flown to Afghanistan to be identified and then out to the USS Carl Vinson for a burial at sea.[197] DNA from bin Laden’s body, compared with DNA samples on record from his dead sister, confirmed his identity.

The operation was a result of years of intelligence work that included the Inter-Services Intelligence (ISI), the CIA, the DSS, and the Delta Force‘s, apprehension and interrogation of Khalid Sheik Mohammad (KSM),[198][199][200] the discovery of the real name of the courier disclosed by KSM, the tracking, via signal intelligence, of the courier to the Abbottobad compound by paramilitary operatives and the establishment of a CIA safe house that provided critical advance intelligence for the operation.[201][202][203][203]

The material discovered in the raid indicated that bin Laden was still in charge of his Al-Qaeda organization and was developing plans and issuing orders at the time of his death. There is considerable controversy over claims that elements of the Pakistani government, particularly the ISI, may have been concealing the presence of Osama bin Laden in Pakistan.[204][205][206] Bin Laden’s death has been labeled a “game changer” and a fatal blow to Al-Qaeda, by senior U.S. officials.[207]

Iran

In the early 1950s, the Central Intelligence Agency and Britain’s Secret Intelligence Service were ordered to overthrow the government of Iran, Prime MinisterMohammed Mosaddeq, and re-install deposed Shah Mohammad Reza Pahlavi.[208] This event was called Operation Ajax.[209][210] The senior CIA officer was Kermit Roosevelt, Jr., the grandson of American president Theodore Roosevelt. The operation utilized all of SAD’s components to include political action, covert influence and paramilitary operations. The paramilitary component included training anti-Communist guerrillas to fight the Tudeh Party if they seized power in the chaos of Operation Ajax.[211] Although a significant tactical/operational success, Operation Ajax is considered very controversial with many critics.[212]

In November 1979, a group of Islamist students and militants took over the American embassy in support of the Iranian Revolution.[213] Operation Eagle Claw was the unsuccessful United States military operation that attempted to rescue the 52 hostages from the U.S. Embassy in Tehran, Iran on April 24, 1980. Several SAD/SOG teams infiltrated into Tehran to support this operation.[214]

On March 9, 2007 alleged CIA Agent Robert Levinson was kidnapped from Iran’s Kish Island. On July 7, 2008, Pulitzer Prize winning investigative journalist and author Seymour Hersh wrote an article in the New Yorker stating that the Bush Administration had signed a Presidential Finding authorizing the CIA to begin cross border paramilitary operations from Iraq and Afghanistan into Iran. These operations would be against Quds Force, the commando arm of the Iranian Revolutionary Guard, public and private sector strategic targets, and “high-value targets” in the war on terror. Also enrolled to support CIA objectives were the Mujahideen-e-Khalq, known in the West as the M.E.K.,and the Baluchis insurgents. “The Finding was focused on undermining Iran’s nuclear ambitions and trying to undermine the government through regime change,” a person familiar with its contents said, and involved “working with opposition groups and passing money.”[215] Any significant effort against Iran by the Obama Administration would likely come directly from SAD.[216] and in July 2010, Director Panetta chose a former chief of SAD as the new NCS Director.[217]

Libya

After the Arab Spring movements overthrew the rulers of Tunisia and Egypt, its neighbours to the west and east respectively, Libya had a major revolt beginning in February 2011.[218][219] In response, the Obama administration sent in SAD paramilitary operatives to assess the situation and gather information on the opposition forces.[220][221] Experts speculated that these teams could be determining the capability of these forces to defeat the Muammar Gaddafi regime and whether Al-Qaeda had a presence in these rebel elements.

U.S. officials had made it clear that no U.S. troops would be “on the ground”, making the use of covert paramilitary operatives the only alternative.[222] During the early phases of the Libyan offensive of U.S. led air strikes, paramilitary operatives assisted in the recovery of a U.S. Air Force pilot who had crashed due to mechanical problems.[223] [224] There was speculation that President Obama issued a covert action finding in March 2011 that authorizes the CIA to carry out a clandestine effort to provide arms and support to the Libyan opposition.[225]

Syria

CIA paramilitary teams have been deployed to Syria to report on the uprising, to access the rebel groups, leadership and to potentially train, equip and lead one of those rebel groups against the Bashar al-Assad regime.[226] In early September 2013, President Obama told U.S. Senators that the CIA had trained the first 50-man insurgent element and that they had been inserted into Syria.[227] The deployment of this unit and the supplying of weapons may be the first tangible measure of support since the U.S. stated they would begin providing assistance to the opposition.[228][229]

In October 2013, SAD was tasked with overthrowing the Syrian government of Bashar al-Assad. This program was considered too limited to have the desired outcome.[230] However, with the rise of the Islamic State, SAD was given the overall command and control of the ground fight against them. This fight will cross the borders between Iraq and Syria.[154][231]

Worldwide mission

Khalid Sheikh Mohammed after his capture

The CIA has always had a Special Activities Division, which secretly carries out special operations mission. However, since September 11, 2001 the US government has relied much more on SAD/SOG because fighting terrorists does not usually involve fighting other armies. Rather, it involves secretly moving in and out of countries like Pakistan, Iran and Somaliawhere the American military is not legally allowed to operate.[232]

If there are missions in these countries that are denied to U.S. military special operations forces, SAD/SOG units are the primary national special missions units to execute those operations.[233]

In the War on Terror, SAD has the lead in the covert war being waged against al Qaeda.[11][234] SAD/SOG paramilitary teams have apprehended many of the senior leaders. These include: Abu Zubaydah,[235] the chief of operations for al-Qaeda;Ramzi bin al-Shibh,[236] the so-called the “20th hijacker”;[237] Khalid Sheikh Mohammed, the mastermind of the September 11, 2001 attacks on New York City and Washington, D.C.;[238] Abd al-Rahim al-Nashiri, alleged to be the mastermind of theUSS Cole bombing and leader of al Qaeda operations in the Persian Gulf prior to his capture in November 2002;[239] Abu Faraj al-Libi, al Qaeda’s “field general” believed to have taken the role of No. 3 in al Qaeda following the capture of Khalid Sheikh Mohammed in Pakistan;[240] andMullah Abdul Ghani Baradar, the number two taliban commander and the highest level taliban commander apprehended in the Afghan War.[241] Prior to the beginning of the “War on Terror”, SAD/SOG located and captured many notable militants and international criminals, including Abimael Guzman and Carlos the Jackal. These were just three of the over 50 caught by SAD/SOG just between 1983 and 1995.[242]

In 2002, the George W. Bush Administration prepared a list of “terrorist leaders” the CIA is authorized to kill in a targeted killing, if capture is impractical and civilian casualties can be kept to an acceptable number. The list includes key al Qaeda leaders like Osama bin Laden (deceased) and his chief deputy, Ayman al-Zawahiri, as well as other principal figures from al Qaeda and affiliated groups. This list is called the “high value target list”.[243] The U.S. president is not legally required to approve each name added to the list, nor is the CIA required to obtain presidential approval for specific attacks, although the president is kept well informed about operations.[243]

SAD/SOG teams have been dispatched to the country of Georgia, where dozens of al Qaeda fugitives from Afghanistan are believed to have taken refuge withChechen separatists and thousands of refugees in the Pankisi Gorge. Their efforts have already resulted in 15 Arab militants linked to al Qaeda being captured.[125]

The SAD/SOG teams have also been active in the Philippines, where 1,200 U.S. military advisers helped to train local soldiers in “counter-terrorist operations” against Abu Sayyaf, a radical Islamist group suspected of ties with al Qaeda. Little is known about this U.S. covert action program, but some analysts believe that “the CIA’s paramilitary wing, the Special Activities Division (SAD), has been allowed to pursue terrorist suspects in the Philippines on the basis that its actions will never be acknowledged”.[125]

On July 14, 2009, several newspapers reported that DCIA Leon Panetta was briefed on a CIA program that had not been briefed to the oversight committees in Congress. Panetta cancelled the initiative and reported its existence to Congress and the President. The program consisted of teams of SAD paramilitary officers organized to execute targeted killing operations against al Qaeda operatives around the world in any country. According to the Los Angeles Times, DCIA Panetta “has not ruled out reviving the program”.[11] There is some question as to whether former Vice President Dick Cheney instructed the CIA not to inform Congress.[244]Per senior intelligence officers, this program was an attempt to avoid the civilian casualties that can occur during predator drone strikes using Hellfire missiles.[245][246]

According to many experts, the Obama administration has relied on the CIA and their paramilitary capabilities, even more than they have on U.S. military forces, to maintain the fight against terrorists in the Afghanistan and Pakistan region, as well as places like Yemen, Somalia and North Africa.[247][248] Ronald Kessler states in his book The CIA at War: Inside the Secret War Against Terror, that although paramilitary operations are a strain on resources, they’re winning the war against terrorism.[247][249]

SAD/SOG paramilitary officers executed the clandestine evacuation of U.S. citizens and diplomatic personnel in Somalia, Iraq (during the Persian Gulf War) andLiberia during periods of hostility, as well as the insertion of Paramilitary Operations Officers prior to the entry of U.S. military forces in every conflict since World War II.[250] SAD officers have operated covertly since 1947 in places such as North Korea, Vietnam, Laos, Cambodia, Lebanon, Iran, Syria, Libya, Iraq, El Salvador,Guatemala, Colombia, Mexico, Nicaragua, Honduras, Chile, Bosnia and Herzegovina, Serbia, Somalia, Kosovo, Afghanistan and Pakistan.[251]

Innovations in special operations

The Fulton system in use

The Fulton surface-to-air recovery system (STARS) is a system developed in the early 1950s by CIA paramilitary officers for retrieving persons on the ground from a MC-130E Combat Talon I aircraft. It uses a harness and a self-inflating balloon that carries an attached lift line. An MC-130E engages the line with its V-shaped yoke and the individual is reeled on board.[252]Project COLDFEET was a very successful mission in 1962 in which two military officers parachuted into a remote abandoned Soviet site in the Arctic. The two were subsequently extracted by the Fulton sky hook. The team gathered evidence of advanced research on acoustical systems to detect under-ice US submarines and efforts to develop Arctic anti-submarine warfare techniques.[253]

Sergeant Major (SgtMaj) Billy Waugh was a Special Forces soldier attached to CIA in the 1960s. During his time at MACV-SOG in Vietnam, he developed and conducted the first combat High Altitude-Low Opening (HALO) jump, “In October 1970, my team made a practice Combat Infiltration into the NVA owned War Zone D, in South Vietnam, for reassembly training, etc. This was the first one in a combat zone.”[254] HALO is a method of delivering personnel, equipment, and supplies from a transport aircraft at a high altitude via free-fall parachute insertion. HALO andHAHO (High Altitude-High Opening) are also known as Military Free Fall (MFF). In the HALO technique, the parachutist opens his parachute at a low altitude after free-falling for a period of time to avoid detection by the enemy. Waugh also led the last combat special reconnaissance parachute insertion into enemy territory occupied by communist North Vietnamese Army (NVA) troops on June 22, 1971.[255]

Notable paramilitary officers

On October 25, 2003, paramilitary officers Christopher Mueller and William “Chief” Carlson were killed while conducting an operation to kill/capture high level al-Qa’ida leaders near Shkin, Afghanistan. Both these officers were honored with Stars on the CIA Memorial Wall at their Headquarters in Langley, Virginia.[256] “The bravery of these two men cannot be overstated,” Director of Central Intelligence George J. Tenet told a gathering of several hundred Agency employees and family members. “Chris and Chief put the lives of others ahead of their own. That is heroism defined.” Mueller, a former US Navy SEAL and Carlson, a former Army Special Forces soldier, Delta Force operator, and member of the Blackfeet Nation in Montana, died while on this covert operation. Both officers saved the lives of others, including Afghan soldiers, during the engagement with al-Qa’ida forces.[256][257][258] In Oliver North’s book American Heroes in Special Operations, a chapter is devoted to their story.[259]

Notable political action officers

  • Virginia Hall Goillot started as the only female paramilitary officer in the OSS. She shot herself in the leg while hunting in Turkey in 1932, which was then amputated below the knee. She parachuted into France to organize the resistance with her prosthesis strapped to her body. She was awarded theDistinguished Service Cross. She married an OSS officer named Paul Goillot and the two joined the CIA as paramilitary operations officers in SAD. Once aboard, Mrs. Goillot made her mark as a political action officer playing significant roles in the Guatemala and Guyana operations. These operations involved the covert removal of the governments of these two countries, as directed by the President of the United States.[260]
  • E. Howard Hunt (October 9, 1918 – January 23, 2007) was an Ivy league educated Naval officer who joined the CIA in 1949 after serving with the OSS in World War II. Hunt was a political action officer in what came to be called their Special Activities Division.[261] He became station chief in Mexico City in 1950, and supervised William F. Buckley, Jr., (Not to be confused with a famous SAD Paramilitary Officer of the same name) who worked for the CIA in Mexico during the period 1951–1952. Buckley, another SAD political action specialist, only served briefly in the CIA and went on to be considered the father of the modern American conservative movement. Buckley and Hunt remained lifelong friends.[262] Hunt ran Operation PBSUCCESS, which overthrew the government in Guatemala in 1954, was heavily involved in theBay of Pigs Invasion operation, frequently mentioned in the JFK assassination, and was one of the operatives in the Watergate scandal.[263]Hunt was also a well-known author with over 50 books to his credit. These books were published under several alias names and several were made into motion pictures.[264]
  • David Atlee Phillips Perhaps the most famous propaganda officer ever to serve in CIA, Phillips began his career as a journalist and amateur actor in Buenos Aires, Argentina. He joined the Agency in the 1950s and was one of the chief architects of the operation to overthrow Communist president Arbenz in Guatemala in 1954. He was later heavily engaged as a principal member of the Bay of Pigs Task Force at Langley, and in subsequent anti-Castro operations throughout the 1960s. He founded the Association of Former Intelligence Officers (AFIO) after successfully contesting a libel suit against him.

CIA Memorial Wall

Main article: CIA Memorial Wall

The CIA Memorial Wall is located at CIA headquarters in Langley, Virginia. It honors CIA employees who died in the line of duty.[265] As of August 6, 2012, there were 103 stars carved into the marble wall,[266] each one representing an officer. A majority of these were paramilitary officers.[265] A black book, called the “Book of Honor”, lies beneath the stars and is encased in an inch-thick plate of glass.[266] Inside this book are stars, arranged by year of death, and the names of 77 employees who died in CIA service alongside them.[265][266] The other names remain secret, even in death.[265]

See also

Declaration of war by the United States

From Wikipedia, the free encyclopedia

Franklin D. Roosevelt signs the declaration of war against Japan on December 8, 1941

A declaration of war is a formal declaration issued by a national government indicating that a state of war exists between that nation and another. The document Declarations of War and Authorizations for the Use of Military Force: Historical Background and Legal Implications gives an extensive listing and summary of statutes which are automatically engaged upon the US declaring war.

For the United States, Article One, Section Eight of the Constitution says “Congress shall have power to … declare War”. However, that passage provides no specific format for what form legislation must have in order to be considered a “declaration of war” nor does the Constitution itself use this term. Many[who?] have postulated “Declaration(s) of War” must contain that phrase as or within the title. Others oppose that reasoning. In the courts, the United States Court of Appeals for the First Circuit, in Doe v. Bush, said: “[T]he text of the October Resolution itself spells out justifications for a war and frames itself as an ‘authorization’ of such a war.”[1] in effect saying an authorization suffices for declaration and what some may view as a formal Congressional “Declaration of War” was not required by the Constitution.

This article will use the term “formal declaration of war” to mean Congressional legislation that uses the phrase “declaration of war” in the title. Elsewhere, this article will use the terms “authorized by Congress”, “funded by Congress” or “undeclared war” to describe other such conflicts.

History

The United States has formally declared war against foreign nations five separate times, each upon prior request by the President of the United States. Four of those five declarations came after hostilities had begun.[2] James Madison reported that in the Federal Convention of 1787, the phrase “make war” was changed to “declare war” in order to leave to the Executive the power to repel sudden attacks but not to commence war without the explicit approval of Congress.[3] Debate continues as to the legal extent of the President’s authority in this regard.

After Congress repealed the Gulf of Tonkin Resolution in January 1971 and President Richard Nixon continued to wage war in Vietnam, Congress passed the War Powers Resolution (Pub.L. 93–148) over the veto of Nixon in an attempt to rein in some of the president’s claimed powers. The War Powers Resolution proscribes the only power of the president to wage war which is recognized by Congress.

Declarations of war

Formal

The table below lists the five wars in which the United States has formally declared war against eleven foreign nations.[4] The only country against which the United States has declared war more than once is Germany, against which the United States has declared war twice (though a case could be made for Hungary as asuccessor state to Austria-Hungary).

In World War II, the Japanese attacked Pearl Harbor on December 7, 1941. Germany and Italy, led respectively by Adolf Hitler and Benito Mussolini, declared war on the United States, and the U.S. Congress responded in kind.[5][6]

War Declaration Opponent(s) Date of declaration Votes President Result
Senate House
War of 1812 Declaration of War upon the U.K.  United Kingdom June 18, 1812 19–13 79–49 James Madison Treaty of Ghent(December 24, 1814)
Mexican–American War “An Act providing for the Prosecution of the existing War between the United States and the Republic of Mexico.”[7] Mexico May 13, 1846 40–2 173–14 James K. Polk Treaty of Guadalupe Hidalgo (February 2, 1848)
Spanish–American War Declaration of War upon Spain  Spain April 25, 1898 42–35 310–6 William McKinley Treaty of Paris(December 10, 1898)
World War I Declaration of War upon Germany  Germany April 6, 1917 82–6 373–50 Woodrow Wilson Treaty of Berlin (August 25, 1921)
Declaration of War upon Austria-Hungary[8][9]  Austria-Hungary December 7, 1917 74–0 365–1 1921 U.S.–Austrian Peace Treaty (August 24, 1921), 1921 U.S.-Hungarian Peace Treaty (August 29, 1921)
World War II Declaration of War upon Japan  Japan December 8, 1941 82–0 388–1 Franklin D. Roosevelt V-J Day, Japanese Instrument of Surrender(September 2, 1945),Treaty of San Francisco(September 8, 1951)
Declaration of War upon Germany  Germany December 11, 1941 88–0 393–0 V-E Day, German Instrument of Surrender(May 8, 1945), Treaty on the Final Settlement with Respect to Germany (September 12, 1990), Treaty of Vienna with Austria (May 15, 1955)
Declaration of War upon Italy  Italy 90–0 399–0 Paris Peace Treaty(February 10, 1947)
Declaration of War upon Bulgaria  Bulgaria June 5, 1942 73–0 357–0
Declaration of War upon Hungary[8]  Hungary 360–0
Declaration of War upon Romania[8]  Romania 361-0

Military engagements authorized by Congress

In other instances, the United States has engaged in extended military combat that was authorized by Congress.

War or conflict Opponent(s) Initial authorization Votes President Result
U.S. Senate U.S. House
Quasi-War France Act Further to Protect the Commerce of the United States
July 9, 1798
18-4 John Adams Treaty of Mortefontaine
First Barbary War Tripoli February 6, 1802[10] Thomas Jefferson War ended 1805
Second Barbary War Algiers May 10, 1815[11] James Madison War ended 1816
Enforcing 1808 slave trade ban; naval squadron sent to African waters to apprehend illegal slave traders Slave traders and pirates “Act in addition to the acts prohibiting the Slave Trade” 1819 James Monroe 1822 first African-American settlement founded in Liberia, 1823 U.S. Navy stops anti-trafficking patrols
Redress for attack on U.S. Navy‘sUSS Water Witch  Paraguay 1858.[12] James Buchanan
Occupation of Veracruz  Mexico H.J.R. 251, 38 Stat. 770
April 22, 1914
337–37 Woodrow Wilson Force withdrawn after six months. However, the Joint Resolution was likely used to authorize the Pancho Villa Expedition. In the Senate, “when word reached the Senate that the invasion had gone forward before the use-of-force resolution had been approved, Republicans reacted angrily” saying it was a violation of the Constitution, but eventually after the action had already started, a resolution was passed after the action to “justify” it since Senators did not think it was a declaration of war.[13][14]
Intervention during the Russian Civil War  Russia 1918 [15] Woodrow Wilson
Lebanon crisis of 1958 Lebanese opposition, led by
Al-Mourabitoun
Progressive Socialist Party
H.J. Res. 117, Public Law 85-7, Joint Resolution “To promote peace and stability in the Middle East”, March 9, 1957[16] 72–19 355–61 Dwight D. Eisenhower U.S. forces withdrawn, October 25, 1958
Vietnam War Viet Cong
North Vietnam
Gulf of Tonkin Resolution, August 7, 1964 88–2 416–0 John F. Kennedy, Lyndon B. Johnson, Richard M. Nixon U.S. forces withdrawn under terms of the Paris Peace Accords signed January 27, 1973
Multinational Force in Lebanon Shia and Druze militias; Syria S.J.R. 159
September 29, 1983
54–46 253–156 Ronald W. Reagan Forces withdrawn in 1984
Persian Gulf War Iraq H.R.J. Res. 77
January 12, 1991.
52–47 250–183 George H.W. Bush The United Nations Security Council drew up terms for the cease-fire, April 3, 1991
War in Afghanistan Afghanistan
al-Qaeda
S.J. Res. 23
September 14, 2001
98–0 420–1 George W. Bush War ended on December 28, 2014
Iraq War[17] Iraq H.J. Res. 114,
March 3, 2003
77–23 296–133 George W. Bush Ba’athist Iraqi government deposed April 2003. U.S. combat operations ended August 31, 2010. War ended December 15, 2011. Destabilization of Iraq and emergence of ISIL in the region 2011–present.[18]

Military engagements authorized by United Nations Security Council Resolutions and funded by Congress

In many instances, the United States has engaged in extended military engagements that were authorized by United Nations Security Council Resolutions and funded by appropriations from Congress.

Military engagement Opponent(s) Initial authorization President Result
Korean War  North Korea
 China
UNSCR 84, 1950 Harry S. Truman Korean Armistice Agreement,[19] 1953
Multinational Force in Lebanon Shia militias, Druzemiltias, Syria UNSCR 425, 1978UNSCR 426, 1978 Jimmy Carter, Ronald Reagan U.S. forces withdrew in 1984
Persian Gulf War Iraq UNSCR 678, 1990 George H. W. Bush UNSCR 689, 1991
Bosnian War Republika Srpska UNSCR 770, 1992
UNSCR 776, 1992
UNSCR 836, 1993
Bill Clinton Reflagged as IFOR in 1995, Reflagged as SFORin 1996, Completed in 2004
Second Liberian Civil War Peacekeeping UNSCR 1497, 2003 George W. Bush U.S. forces are withdrawn in 2003 after theUNMIL is established.
Haitian coup d’état UNSCR 1529, 2004UNSCR 1542, 2004 2004
Libyan Civil War Libya UNSCR 1973, 2011 Barack Obama Debellation of the Libyan Arab Jamahiriya, October 31, 2011

Other undeclared wars

On at least 125 occasions, the President has acted without prior express military authorization from Congress.[20] These include instances in which the United States fought in the Philippine–American War from 1898–1903, in Nicaragua in 1927, as well as the NATO bombing campaign of Yugoslavia in 1999.

The United States’ longest war was fought between approximately 1840 and 1886 against the Apache Nation. During that entire 46-year period, there was never more than 90 days of peace.[citation needed]

The Indian Wars comprise at least 28 conflicts and engagements. These localized conflicts, with Native Americans, began with European colonists coming to North America, long before the establishment of the United States. For the purpose of this discussion, the Indian Wars are defined as conflicts with the United States of America. They begin as one front in the American Revolutionary War in 1775 and had concluded by 1918. The United States Army still maintains a campaign streamer for Pine Ridge 1890–1891 despite opposition from certain Native American groups.[21]

The American Civil War was not an international conflict under the laws of war, because the Confederate States of America was not a government that had been granted full diplomatic recognition as a sovereign nation by other sovereign states.[22][23] The CSA was recognized by the United States government as a belligerent power, a different status of recognition that authorized Confederate warships to visit non-U.S. ports. This recognition of the CSA’s status as a belligerent power did not impose any duty upon the United States to recognize the sovereignty of the Confederacy, and the United States never did so.

The War Powers Resolution

In 1973, following the withdrawal of most American troops from the Vietnam War, a debate emerged about the extent of presidential power in deploying troops without a declaration of war. A compromise in the debate was reached with the War Powers Resolution. This act clearly defined how many soldiers could be deployed by the President of the United States and for how long. It also required formal reports by the President to Congress regarding the status of such deployments, and limited the total amount of time that American forces could be deployed without a formal declaration of war.

Although the constitutionality of the act has never been tested, it is usually followed, most notably during the Grenada Conflict, the Panamanian Conflict, the Somalia Conflict, the Persian Gulf War, and the Iraq War[clarification needed]. The only exception was President Clinton’s use of U.S. troops in the 78-day NATO air campaign against Yugoslavia during the Kosovo War.[citation needed] In all other cases, the President asserted the constitutional authority to commit troops without the necessity of Congressional approval, but in each case the President received Congressional authorization that satisfied the provisions of the War Powers Act.

On March 21, 2011, a number of lawmakers expressed concern that the decision of President Barack Obama to order the U.S. military to join in attacks of Libyan air defenses and government forces exceeded his constitutional authority because the decision to authorize the attack was made without Congressional permission.[24]

See also

References

  1. Jump up^ Doe v. Bush, 03-1266, (March 13, 2003)”. FindLaw. Retrieved 20 June 2013.
  2. Jump up^ Henderson, Phillip G. (2000). The presidency then and now. Rowman & Littlefield. p. 51. ISBN 978-0-8476-9739-7.
  3. Jump up^ The Debates in the Federal Convention of 1787 reported by James Madison : August 17,The Avalon Project, Yale Law School, retrieved Feb 13, 2008
  4. Jump up^ Official Declarations of War by Congress
  5. Jump up^ BBC News, On This Day
  6. Jump up^ Whereas the Government of Germany has formally declared war against the government and the people of the United States of America… the state of war between the United States and the Government of Germany which has thus been thrust upon the United States is hereby formally declared. The War Resolution
  7. Jump up^ United States Congress (May 13, 1846). “An Act providing for the Prosecution of the existing War between the United States and the Republic of Mexico.” (PDF).Government of the United States of America. Government of the United States of America. Retrieved August 10, 2006.
  8. ^ Jump up to:a b c https://fas.org/sgp/crs/natsec/RL31133.pdf
  9. Jump up^ H.J.Res.169: Declaration of War with Austria-Hungary, WWI, United States Senate
  10. Jump up^ Key Events in the Presidency of Thomas Jefferson, Miller Center of Public Affairs, University of Virginia, (retrieved on August 10, 2010).
  11. Jump up^ Key Events in the Presidency of James Madison, Miller Center of Public Affairs, University of Virginia, (retrieved on August 10, 2010).
  12. Jump up^ Expenses – Paraguay Expedition, House of Representatives, 36th Congress, 1st Session, Mis. Doc. No. 86 (May 11, 1860), p. 142
  13. Jump up^ http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA416074
  14. Jump up^ http://www.wilsoncenter.org/sites/default/files/ACF18F1.pdf
  15. Jump up^ A History of Russia, 7th Edition, Nichlas V. Riasanovsky & Mark D. Steinberg, Oxford University Press, 2005.
  16. Jump up^ http://www.shafr.org/wp-content/uploads/2011/11/U.S.-Congress-Approval-of-the-Eisenhower-Doctrine-1957.pdf
  17. Jump up^ http://www.msnbc.msn.com/id/38944049/ns/politics-white_house
  18. Jump up^ Londoño, Ernesto (August 19, 2010). “Operation Iraqi Freedom ends as last combat soldiers leave Baghdad”. The Washington Post.
  19. Jump up^ s:Korean Armistice Agreement
  20. Jump up^ The President’s Constitutional Authority To Conduct Military Operations Against Terrorists and Nations Supporting Them
  21. Jump up^ Army Continues to Parade Wounded Knee Battle Streamer, National Congress of American Indians.
  22. Jump up^ “Preventing Diplomatic Recognition of the Confederacy, 1861–1865”. U.S. Department of State.
  23. Jump up^ McPherson, James M. (2007). This Mighty Scourge: Perspectives on the Civil War. Oxford University Press US. p. 65. ISBN 978-0-19-531366-6.
  24. Jump up^ Obama Attacked for No Congressional Consent on Libya, New York Times.

Further reading

External links

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 556-559

Listen To Pronk Pops Podcast or Download Show 546-555

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Biden Out, Clinton Face-off With Benghazi Committee, Ryan (Open Borders) Fading With Conservatives, Trump Surging In The Polls — Videos

Posted on October 22, 2015. Filed under: American History, Ammunition, Blogroll, Bomb, British History, Business, Central Intelligence Agency (CIA), Communications, Congress, Constitution, Coptic Christian, Corruption, Crime, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Drones, Education, Employment, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Foreign Policy, Fraud, Freedom, Friends, Genocide, government, government spending, history, Homicide, Immigration, Islam, Law, liberty, Life, Links, media, Middle East, Missiles, National Security Agency (NSA_, Nuclear, People, Philosophy, Photos, Pistols, Police, Politics, Radio, Rants, Raves, Religion, Religious, Rifles, Security, Shite, Speech, Strategy, Sunni, Talk Radio, Terrorism, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Weather, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 558: October 21, 2015

Pronk Pops Show 557: October 20, 2015 

Pronk Pops Show 556: October 19, 2015

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Story 1: Biden Out, Clinton Face-off With Benghazi Committee, Ryan (Open Borders) Fading With Conservatives, Trump Surging In The Polls — Videos

Latest Election Polls

Wednesday, October 21
Race/Topic   (Click to Sort) Poll Results Spread
2016 Republican Presidential Nomination ABC/Wash Post Trump 32, Carson 22, Rubio 10, Cruz 6, Bush 7, Fiorina 5, Huckabee 3, Paul 2, Christie 3, Kasich 2, Santorum 0, Graham 1, Pataki 1, Jindal 0 Trump +10
New Hampshire 2016 Democratic Primary WBUR Clinton 38, Sanders 34, Biden 9, Webb 2, O’Malley 1, Chafee 0 Clinton +4
New Hampshire Republican Presidential Primary Bloomberg Trump 24, Carson 17, Bush 10, Rubio 8, Fiorina 7, Kasich 7, Cruz 4, Paul 4, Christie 5, Huckabee 1, Santorum 1, Graham 1, Jindal 0, Pataki 0 Trump +7
New Hampshire Republican Presidential Primary Boston Herald Trump 28, Carson 16, Bush 9, Rubio 6, Fiorina 10, Kasich 6, Cruz 5, Paul 5, Christie 3, Huckabee 2, Santorum 0, Graham 0, Jindal 1, Pataki 0 Trump +12

http://www.realclearpolitics.com/epolls/latest_polls/elections/

Joe Biden Not Running For President: 2016 Window Has ‘Closed’ | MSNBC

Lyndon Johnson – Remarks on Decision to not seek Reelection

The Daily Wrap | Trump Continues To Surge In Polls

Dr Ben Carson reacts to surging ahead of Trump in new poll

Howard Kurtz: Paul Ryan, Insufficiently Conservative?

Ann Coulter: RINO Speaker Candidates And Illegal Aliens

House Divided – Will Conservatives Accept Paul Ryan as Speaker of the House?

Mark Levin Blasts Paul Ryan On Immigration: “I’ve Had Enough Of This Crap!”

Paul Ryan: The Man Who Would be King

Pro-Amnesty Rep. Gutiérrez Supports Paul Ryan For Speaker Of The House

Paul Ryan on Immigration Reform

Ben Swann vs Paul Ryan – Reality Check: Paul Ryan is Actually a Big Spender Just Like Mitt Romney

Paul Ryan The Conservative Sold Out

Tom Woods: Is Paul Ryan a real fiscal conservative?

Donald Trump Leads in Expectations, Shows Strength on Attributes (POLL)

Paul Ryan’s bid for House speaker splinters conservative Freedom Caucus

Lisa Mascaro

e conditions that Rep. Paul Ryan has set to become the next House speaker are driving a wedge in the fiery House Freedom Caucus, potentially weakening the unity of the conservative group that pushed out the current speaker.

Conservatives appear torn over the offer posed Tuesday by Ryan, the popular Wisconsin Republican, who has given his GOP colleagues until Friday to decide whether they are willing to end their infighting and unite around him.

The Freedom Caucus has so far maintained powerful cohesion as a 40-plus bloc of votes — a force that nudged Speaker John A. Boehner’s early retirement and then blocked the rise of Majority Leader Kevin McCarthy (R-Bakersfield). But that unity is showing signs of fraying.

Some members of the caucus said Ryan’s bid for speaker offered a compelling solution to the GOP’s leadership struggle. Others, though, appeared unwilling to yield to Ryan’s various conditions — a position amplified by conservative groups outside the Capitol.

Signs of division inside the caucus were already apparent.

Two lawmakers recently exited the group; one, California Rep. Tom McClintock, among the most conservative Republicans in the House, detailed the caucus’ “many missteps that have made it counterproductive to its stated goals.”

Deepening the wedge in the influential conservative caucus may become central to finding a new GOP speaker who can lead the divided majority and end the cycle of dysfunction that is damaging the party’s standing with voters ahead the 2016 presidential election.

On the other hand, if the Freedom Caucus unites against Ryan or withholds enough votes it would almost certainly prolong the chaotic leadership struggle.

“Listen, I think Paul is going to get the support he’s looking for,” Boehner said Wednesday after a closed-door party meeting. “But this decision is up to the members.”

Ryan, the party’s former vice presidential nominee, has said he is willing to take on the job to replace Boehner if the House majority’s three main factions pledge support.

His chief obstacle remains the Freedom Caucus, which had thrown its support to one of its own, a little known newcomer, Rep. Daniel Webster (R-Fla.).

With party elections set for Oct. 28, Ryan — like Boehner and McCarthy – would be expected to easily win a majority from within the House GOP. But the challenge will come the next day, when a full House floor vote poses a less certain outcome if all Republicans do not unite against Democrats.

Even if Ryan does not win the official support of the Freedom Caucus, he may be able to peel away enough votes to assure success, and some caucus members are already voicing support for him.

“We’re not a monolithic group by any stretch,” said Rep. Mick Mulvaney (R-S.C.), a leader of the Freedom Caucus, who warned that it may be difficult for the group to change its endorsement. “So the fact we have a difference of opinion amongst the various members is not at all unusual.”

Rep. Cynthia Lummis (R-Wyo.), a Freedom Caucus member who backed Rep. Jason Chaffetz (R-Utah) for speaker rather Webster, was leaning toward Ryan. Chaffetz dropped out of the running Tuesday and threw his support to Ryan.

“I’m not sure that Paul Ryan could walk on water today,” Lummis said after hearing his pitch, “but give him 10 days.”

Outside conservative groups, though, have already turned against Ryan and revved up their attacks.

And Republican voters appear to be in a fighting mood. Polling released Wednesday showed they want a new speaker who is not quick to compromise. Among GOP voters, 62% prefer a speaker who sticks to conservative principles, even if that leads to a government shutdown, according to the Associated Press-GfK poll.

Although Ryan is willing to consider some of the rules changes conservatives want to weaken the speaker’s grip on power, he has several demands of his own that the Freedom Caucus is hesitant to support.

Top among them is making it harder for conservatives to deploy one of their most powerful tools: calling a procedural vote to oust the speaker, which led to Boehner’s early retirement and warned McCarthy off the job.

Ryan told fellow Republicans he was willing to take “arrows in the chest, but not in the back,” according to those familiar with his remarks to the private meeting Tuesday evening.

That will be a tough sell for conservatives who see the motion to “vacate the chair” as the strongest leverage they have over the leadership.

Some changes, such as raising the threshold for bringing such a motion to the floor or approving it, could be acceptable.

Conservative radio talk show host Laura Ingraham raised particular objection over Ryan’s condition that he wouldn’t travel as much for the party as Boehner had so that he could spend more time at home with his family.

“George Washington left the luxury and beauty of Mount Vernon for Valley Forge,” she tweeted, referring to the Washington’s role in the Revolutionary War. “He even worked wkends & morning workouts for his people.”

The Freedom Caucus held a private meeting with Ryan later Wednesday. The group, which includes newer members of Congress as well as more veteran conservatives, is guided by internal rules that require 80% support to endorse a candidate, which Webster was able to win.

But the endorsement of Webster was binding only through the internal party election, meaning lawmakers in the group would be free to vote as they wish on the floor.

Ryan had indicated to his colleagues that he wanted the support from all three caucuses — the Freedom Caucus, the conservative Republican Study Committee and a small moderate GOP wing.

It’s unlikely that Ryan will settle for a promise that the Freedom Caucus will support him during the floor vote if it keeps its previous endorsement for his rival. A Ryan aide said he wants the full caucus’ formal endorsement now.

http://www.latimes.com/nation/politics/la-na-ryan-speaker-20151021-story.html

Paul Ryan is still talking to conservatives about supporting his speaker bid

Rep. Paul Ryan has apparently not yet been able to secure the support of House conservatives for his bid for speaker, despite the confident assertion by the man he hopes to succeed that Ryan will be able to unite the fractious Republican conference.

“I think Paul is going to get the support that he is looking for,” speaker John Boehner told reporters Wednesday after a meeting of House Republicans. Boehner announced that Republicans will choose a new speaker next week, voting in conference next Wednesday to pick their nominee and on the House floor next Thursday.

But after an hour-long meeting with the rebellious Freedom Caucus Wednesday, Ryan shrugged off questions about whether he had won the group’s endorsement. “We had a nice meeting, a good chat,” Ryan said. Asked if he got a commitment, he said, “we just had an exchange of ideas” and a conversation about “how to make Congress work better.”

Members of the Freedom Caucus said they planned to meet again Wednesday night to talk about Ryan’s bid.

“We’re not done yet,” said Rep. Tim Huelskamp, R-Kan. “Everything’s still being discussed.”

Ryan announced Tuesday night that he will run for the top leadership job if he gets the support of all GOP factions. The Wisconsin Republican gave his colleagues until Friday to decide whether they can support him. Ryan, chairman of the Ways and Means Committee and the 2012 Republican nominee for vice president, had repeatedly said he did not want the job but was pressed to run by Republicans who see him as the best candidate to unite the GOP conference.

“We as a conference should unify now,” Ryan told reporters Tuesday night after meeting with his Republican colleagues. “What I told members is if you can agree to these requests and if I can truly be a unifying figure, then I will gladly serve, and if I am not unifying, that is fine as well — I will be happy to stay where I am.”

The Freedom Caucus, a group of about 40 conservative members, has been the most nettlesome. The group helped force Boehner into retirement by threatening to call a no-confidence vote on his speakership. Boehner plans to leave Congress at the end of next week, assuming that House members have elected a new speaker.

The influential group also convinced Majority Leader Kevin McCarthy, R-Calif., to withdraw his bid to become speaker when it became clear he could not win their support. The Freedom Caucus has already endorsed Rep. Daniel Webster, R-Fla., to be the next speaker.

The Caucus is seeking changes to House rules that will allow them to offer more amendments, get more conservative bills on the floor and restore the independence of committee chairmen. Those changes would diminish the speaker’s power. “The next speaker must follow House rules and commit to an open process for debating and amending legislation,” the Freedom Caucus said in a recent Twitter post. “Let the House work its will.”

Before the meeting, Rep. Mick Mulvaney, R-S.C., a member of the group, sounded skeptical that Ryan could win the group’s support. For the Freedom Caucus to endorse, 80 percent of the group’s 40 members have to agree, Mulvaney said, adding that is a “very difficult” bar to meet.

Mulvaney said one of his questions for Ryan will be whether he really wants to serve as speaker. “If you listen to Paul, what you hear is ‘I don’t want the job’,” Mulvaney said.

Ryan said Tuesday he is willing to consider rule changes to give all members a greater voice in the House. But he also said he wants to ensure that “we do not experience constant leadership challenges and crises.”

Boehner said Wednesday that Republicans already know Ryan well. “He works hard; he’s very bright.”

http://www.usatoday.com/story/news/politics/2015/10/21/boehner-predicts-ryan-get-support-hes-seeking-become-speaker/74323092/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 556-558

Listen To Pronk Pops Podcast or Download Show 546-555

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Benghazi Scandal Is A Massive Cover-up of President Obama’s Secret Finding For Central Intelligence Agency’s Covert Operations In Libya and Syria — American People Demand Declassification And Release of Entire CIA Covert Operations Finding For Libya and Syria and Public Testimony By Former CIA Director General Petraeus, CIA Director Brennan, CIA Libya Station Chief and Chief of Mission and CIA Employees in Benghazi, Libya On September 11, 2012 — Massive Scandal and Foreign Policy Disaster — Stop The Cover-up, Stonewalling and Slow-walking! — “Why Was The United States in Libya?” — No More Behind Closed Doors — Videos

Posted on October 22, 2015. Filed under: American History, Ammunition, Blogroll, Bomb, British History, Business, Central Intelligence Agency (CIA), Communications, Congress, Constitution, Corruption, Crime, Crisis, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Diasters, Dirty Bomb, Documentary, Drones, Employment, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Foreign Policy, Fraud, Freedom, Genocide, government, government spending, Homicide, Islam, Islam, Language, Law, liberty, Life, Links, media, Middle East, Missiles, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Oil, People, Philosophy, Pistols, Politics, Rants, Raves, Resources, Rifles, Security, Shite, Sunni, Talk Radio, Taxation, Terrorism, Unemployment, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 557: October 20, 2015 

Pronk Pops Show 556: October 19, 2015

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

 Story 1: Benghazi Scandal Is A Massive Cover-up of President Obama’s Secret Finding For Central Intelligence Agency’s Covert Operations In Libya and Syria — American People Demand Declassification And Release of Entire CIA Covert Operations Finding For Libya and Syria and Public Testimony By  Former CIA Director General Petraeus, CIA Director Brennan, CIA Libya Station Chief and Chief of Mission and CIA Employees in Benghazi, Libya On September 11, 2012  — Massive Scandal and Foreign Policy Disaster — Stop The Cover-up, Stonewalling and Slow-walking! — “Why Was The United States in Libya?” — No More Behind Closed Doors — Videos

2014-05-02-CBS-EN-Benghazi_Graphicbenghazi_north_africa62870604_benghazi_us_consbenghazi-compound650px-U.S._mission_and_annex_map_for_2012_Benghazi_attack   good_map_benghazi  compound002b
consulate-real-w-discriptors  smcannex_mapbenghazi-cover-up-what-difference-does-it-makethe-benghazigate-scandal-deepens-battaile-politicsMedia Benghazi CoverupRAMclr-010713-nytimes-IBD-COLOR-FINAL_gifOctober non-surprise _Benghaziobama nixon

IT TAKES TREY GOWDY JUST THREE MINUTES TO SILENCE THE MEDIA

Trey Gowdy: Congress’ Benghazi probe not aimed at Clinton

Benghazi timeline: “We are under attack”

Malzberg | Clare Lopez, member of the Citizens’ Commission on Benghazi

Media Silent About Obama’s Undeclared Wars

U.S. fighting undeclared wars with six countries? – FoxNews 110610

Wesley Clark ( US 4 Star General ) US will attack 7 countries in 5 years

END WAR: Brzezinski Debates Why Libya War Right Choice, Goal Is Regime Change With A United Libya

Vijay Prashad Urges Re-Evaluation of NATO Attack on Libya in Debate Over Syria Intervention

How Will History Judge U.S., Coalition Intervention in Libya?

Did the Military Intervention in Libya Succeed? (Benjamin Friedman)

Life After Qaddafi — Libya: A Broken State

Libya War: What They Don’t Want You to Know

OBAMA CONFRONTED ON BENGHAZI – Stutters Through Response

Gaddafi gold-for-oil, dollar-doom plans behind Libya ‘mission’?

Where is All the Worlds Gold?(full documentary) HD

Ex-CIA officer: Obama fools himself, Muslims see US bombing Libya

U.S. Intelligence knew in 2012: Rise of ISIS, Arms shipments from Libya to Syria

Ex-CIA Agent: America creates its own enemies

Benghazi US consulate attack: why is no one talking about the CIA mission?

Breaking: CNN Reports CIA Engaged in Massive Intimidation Campaign to Keep Benghazi a Secret

August 1, 2013 – Breaking: CNN Reports CIA Engaged in Massive Intimidation Campaign to Keep Benghazi a Secret — This is HUGE. Basically the CIA is reportedly giving polygraph tests EVERY MONTH to more than a dozen CIA employees that were on the ground in Benghazi during the attack, to ensure that none of them talk about what happened that night. CNN — CNN has uncovered exclusive new information about what

Kevin Shipp at AIM’s Citizens Commission on Benghazi Conference

Roger Aronoff Speaks about the newly formed Citizens Commission on Benghazi

Admiral James Lyons Speaks at the Citizens Commission on Benghazi

Lt. General Thomas McInerney Speaks at the Citizens Commission on Benghazi

Ken Timmerman at AIM’s Citizens Commission on Benghazi Conference

Benghazi Attack Cover Up! Obama Armed Al Qaeda?

Bachmann Challenges Former CIA Director on Benghazi

Bachmann: Administration misled public on Benghazi

Benghazi Bombshell – Whistleblower’s Lawyer: 400 Surface To Air Missiles Stolen – Wake Up America

Attorney for Benghazi Whistleblower says 400 missiles stolen during attack

Published on Aug 13, 2013

An attorney for the Benghazi whistleblowers says that some 400 surface to air missles (SAMs) were ‘taken from Libya’ during the terror attack on the U.S. consulate in Benghazi.
He added that the U.S. intelligence community is terrified they might be used to shoot down airliners.

Joe diGenova, whose wife Victoria Toensing — a former deputy assistant attorney general — also represents Benghazi witnesses and others with knowledge of the terror attack, told WMAL radio that the loss of those missiles is also one the reasons the U.S. State Department shut down 19 embassies across the Middle East last week.

‘A lot of people have come forward to share information with us,’ he said during the radio station’s ‘Mornings On The Mall’ program Monday morning.

‘We have learned that one of the reasons the administration is so deeply concerned’ is that ‘there were 400 surface-to-air missiles stolen, and that they are … in the hands of many people, and that the biggest fear in the U.S. intelligence community is that one of these missiles will be used to shoot down an airliner. 400 missiles, surface-to-air missiles, taken from Libya.’

Asked if the missiles are now ‘in the hands of al-Qaeda operatives,’ DiGenova replied, ‘That is what these people are telling us.’

DiGenova said his sources are ‘former intelligence officials who stay in constant contact with people in the Special Ops and intelligence community.’

‘And it’s pretty clear that the biggest concern right now are 400 missiles which have been diverted in Libya and have gotten in the hands of some very ugly people.’

diGenova said that while he was uncertain whether the stolen weapons were being kept at the U.S. Consulate’s CIA annex, ‘it is clear that the annex was somehow involved in the process of the distribution of those missiles.’

‘They were afraid that there was going to be a missile attack on one of the embassies. Remember, you can take a shoulder-held missile and shoot it into an embassy. Not just into the sky.’ ‘That’s what this was all about,’ he insisted. ‘That’s why they’re so worried. That’s why they have lied repeatedly about what happened in Benghazi, because they are now responsible for all of the stepchildren of violence that happens as a result of this. This is a very serious matter.’

FSA rocket shoots down Assad helicopter – Truthloader

White House Knew at 6:07 PM EST That Ansar Al-Sharia Was Behind the Benghazi Attack

Death And Deceit In Benghazi – Did Obama Amind Try Hide The Truth? – W Bret Bair

CIA operators were denied request for help during Benghazi attack, sources say

The Benghazi Select Committee: Many Questions Remain Unanswered

The House Select Committee on Benghazi is gearing up to investigate the many unanswered questions surrounding the attack on the U.S. diplomatic facility on September 11, 2012. Contrary to the Obama Administration’s assertions, numerous questions remain unanswered about what happened that fateful day both in Benghazi and here in Washington. This, despite the determined efforts of members of Congress to extract answered from a reluctant White House and State Department. Yet, in order to prevent a recurrence of unnecessary loss of American lives, systemic failures must be addressed, as well as the lack of accountability among those responsible for diplomatic security. Equally importantly, the families of the victims and indeed Americans need to know why no retaliation or justice has been visited upon those who killed U.S. diplomats.

“Peace President” Obama Let Benghazi Happen

As the Mail Online out it, “The Citizens Commission on Benghazi, a self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented — if the U.S. hadn’t been helping to arm al-Qaeda militias throughout Libya a year earlier.”

Obama “Switched Sides” in War on Terror

Former CIA officer Clare Lopez argues: Libya in 2011 marks the place and the time that the United States (U.S.) and the Obama administration formally switched sides in the Global War on Terror (GWOT). A mere 10 years after al-Qa’eda (supported by Hizballah and Iran) attacked the American homeland in the worst act of terrorism ever suffered by this country, U.S. leadership decided to facilitate the provision of weapons to jihadist militias known to be affiliated with al-Qa’eda and the Muslim Brotherhood in order to bring down a brutal dictator who also just happened to be a U.S. ally in the GWOT at the time.

Obama Let Them Die at Benghazi

Wayne Simmons spent 27 years working with the CIA to combat terrorism, narco-terrorism and narcotics trafficking, arms smuggling, counterfeiting, cyber-terrorists, and industrial and economic espionage. He sits on the Advisory Council for the Intelligence Summit, and is a contributor to the conservative publication Human Events.

“Dark Forces” at Benghazi and Muslim Brotherhood Infiltration

Dark Forces Kenneth-Timmerman

Why didn’t the U.S. military respond in time in Benghazi

Benghazi Victim’s Mother: ‘Why Isn’t Hillary Out Here?’

Rand Paul Questions Hillary Clinton on Benghazi (Flashback)

Benghazi ➡Hillary gave ‘stand down’ order – Cover Up & Deceive America 2016

13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined.

Benghazi, Victims’ Families & Investigators Testify At House Hearing On Benghazi – Lou Dobbs

9-19-2013 “Reviews of the Benghazi Attack and

Unanswered Questions” Part I

9-19-2013 “Reviews of the Benghazi Attack and Unanswered Questions” Part II

9-19-2013 “Reviews of the Benghazi Attack and Unanswered Questions” Part III

Benghazi Scandal Review Of The Benghazi Attack & Questions That Remain Unanswered

Rep. Gowdy Talks Obamacare and Benghazi with Lou Dobbs

Chairman Issa’s Opening Statement Benghazi

Chaffetz Questions Adm. Mullen About Military Capability During Attack In Benghazi

Chaffetz to Families of Benghazi Victims: “We have a duty to find out the truth.”

Benghazi Victim’s Mother ‘Why Isn’t Hillary Out Here’

Congressman Mica questions Administration on Benghazi

In an exchange with witnesses during our Congressional Oversight Hearing, Congressman John Mica explains to Administration officials that most Americans believe the State Department report on responsibility for the Bengazhi attack was a “whitewash”. Those conducting the review were appointed by Secretary of State Hillary Clinton who they failed to interview along with other top State and Administration officials. Mica stated that this looks like an inside job where no one was held accountable, fired and none of the killers captured or brought to justice.

Benghazi Scandal – “It Was Clear Pretty Quickly” – General: Benghazi Was No Demonstration!

Independent Benghazi Review Briefed Clinton, Mills on Report Before Released

House Of Scandals Obama Gives Speech To Distract Americans – Rand Paul (R-KY)- Hannity

The Benghazi Testimony Fox Doesn t Want You To See

Rep. Meehan Questions Officials Responses to Location of Embassy in Benghazi

CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels

Obama authorized CIA covert operation in Libya

SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria

The Daring Early Years of the CIA: Covert Ops from WW2 to Vietnam (1995)

CIA Covert Operations and U.S. Interventions Since World War II Full documentary

DC Scandals – Time To Testify? – Issa: We Call Hillary Clinton Back! – Benghazi Scandal

Benghazi Scandal Investigation Widening Lawmakers Seek Interviews Of 13 Top Officials

Benghazi Scandal Is Obama Admin Trying To Hide Something! Force Into Silence! OReilly

David Petraeus Scandal: Benghazi Attack Testimony Behind Closed Doors

The former CIA head will go behind closed doors to give testimony on the terror attacks.

General Petraeus leaked secret info on Benghazi attack to his mistress?

Glenn Beck: Military Action In Syria Is Designed To Cover Up Benghazi

REVEALED: If This Is True, Benghazi Is Even Worse Than We Ever Thought

Explosive: Rep. Trey Gowdy Unloads Unreleased Email Exposing Benghazi Coverup

YouTube Video Maker Blamed for Benghazi Attacks Breaks Silence on CNN

Issa: Getting the Facts on US Diplomatic Security and the Benghazi, Libya Terrorist Attack

Benghazi Attack: “We Were Fighting A losing Battle. We Couldn’t Even Keep What We Had”

Oversight Hearing Part 1 – “The Security Failures of Benghazi”

Benghazi Whistleblower Hearing part 1

Benghazi Whistleblower Hearing part 2

Benghazi Whistleblower Hearing part 3

Rep. Frank Wolf on Benghazi – Politicizing the FBI & the CIA

Chairman Gowdy Questions State Department and CIA at Benghazi Select Committee Hearing

Trey Gowdy grills at NEW Benghazi hearing (complete testimony) “Why Were We in Libya?”

Benghazi Hearing Trey Gowdy Awesomeness

Rep. Trey Gowdy GRILLS Adm. Mullen on why he didn’t interview Hillary Clinton over Benghazi

House Rules Committee Hearing on Benghazi Select Committee

The House Rules Committee holds a hearing on establishing a special committee to investigate the 2012 attack on the U.S. consulate in Benghazi, Libya.

The Benghazi select committee hearing begins at 41:00.

Benghazi Select Committee Holds First Public Hearing Trey Gowdy On The Record

Select Committee on Benghazi Holds First Hearing

Select Committee on Benghazi Holds Second Hearing

Chairman Gowdy’s Opening Statement at Third Benghazi Select Committee Hearing

Chairman Gowdy’s Opening Statement at Third Benghazi Select Committee Hearing

CHARLIE RICH Behind Closed Doors

How Obama Ignored Congress, and Misled America, on War in Libya

CONOR FRIEDERSDORF

The feature story that Michael Lewis just published about President Obama’s decisionmaking prior to the war in Libya includes a lot of details that inspire confidence in his leadership. By all accounts he’s intelligent, sober-minded, and inclined to seek out an array of perspectives. And he’s frequently forced to make extraordinarily difficult tradeoffs with imperfect information. I don’t envy his job.

But the article also raises serious questions about his honesty and regard for the constitution. Let’s take them in turn.

INCONSISTENT EXPLANATIONS

On March 28, 2011, Obama gave a televised address about Libya. It included this passage about his actions:

Confronted by this brutal repression and a looming humanitarian crisis, I ordered warships into the Mediterranean. European allies declared their willingness to commit resources to stop the killing. The Libyan opposition, and the Arab League, appealed to the world to save lives in Libya. At my direction, America led an effort with our allies at the United Nations Security Council to pass an historic Resolution that authorized a No0Fly Zone to stop the regime’s attacks from the air, and further authorized all necessary measures to protect the Libyan people.

In his telling, (a) America led the effort to establish the No-Fly Zone; and (b) the No-Fly Zone would stop the Libyan regime’s attacks from the air.

Compare these assertions to the inside account reported by Lewis (which wasvetted by the White House prior to publication):

If you were president just then and you turned your television to some cable news channel you would have seen many Republican senators screaming at you to invade Libya and many Democratic congressmen hollering at you that you had no business putting American lives at risk in Libya. If you flipped over to the networks on March 7 you might have caught ABC White House correspondent Jake Tapper saying to your press secretary, Jay Carney, “More than a thousand people have died, according to the United Nations. How many more people have to die before the United States decides, O.K., we’re going to take this one step of a no-fly zone?”

By March 13, Qaddafi appeared to be roughly two weeks from getting to Ben­gha­zi. On that day the French announced they were planning to introduce a resolution in the United Nations to use U.N. forces to secure the skies over Libya in order to prevent Libyan planes from flying. A “no-fly zone” this was called, and it forced Obama’s hand. The president had to decide whether to support the no-fly-zone resolution or not. At 4:10 p.m. on March 15 the White House held a meeting to discuss the issue. “Here is what we knew,” recalls Obama, by which he means here is what I knew. “We knew that Qaddafi was moving on Benghazi, and that his history was such that he could carry out a threat to kill tens of thousands of people. We knew we didn’t have a lot of time–somewhere between two days and two weeks. We knew they were moving faster than we originally anticipated. We knew that Europe was proposing a no-fly zone.”

That much had been in the news. One crucial piece of information had not. “We knew that a no-fly zone would not save the people of Ben­gha­zi,” says Obama. “The no-fly zone was an expression of concern that didn’t real­ly do anything.” European leaders wanted to create a no-fly zone to stop Qaddafi, but Qaddafi wasn’t flying. His army was racing across the North African desert in jeeps and tanks. Obama had to have wondered just how aware of this were these foreign leaders supposedly interested in the fate of these Libyan civilians. He didn’t know if they knew that a no-fly zone was pointless, but if they’d talked to any military leader for five minutes they would have. And that was not all. “The last thing we knew,” he adds, “is that if you announced a no-fly zone and if it appeared feckless, there would be additional pressure for us to go further. As enthusiastic as France and Britain were about the no-fly zone, there was a danger that if we participated the U.S. would own the operation. Because we had the capacity.”

To summarize, (a) America did not lead the effort to establish a no-fly zone — it reluctantly signed on to the idea after its hand was forced by the French; (b) the no-fly zone wouldn’t stop the regime’s attacks because they weren’t coming from the air. It was, rather, a preamble to escalation.

Due to the nature of the Libya conflict, these misrepresentations weren’t nearly as consequential as, say, the way George W. Bush spoke out about weapons of mass destruction before the Iraq war. It is nevertheless an example of the president deliberately misleading the American people in order to facilitate false impressions about foreign military actions that he finds convenient.

ZERO REGARD FOR CONGRESSIONAL APPROVAL

It’s long been established that Obama failed to secure a congressional declaration of war, as the constitution and Senator Obama’s understanding of it dictated; and that he violated the War Powers Resolution. It is nevertheless worth revisiting the subject given these new details about his thought process:

Obama insists that he still had not made up his mind what to do when he returned to the Situation Room — that he was still considering doing nothing at all. A million people in Ben­gha­zi were waiting to find out whether they would live or die, and he honestly did not know. There were things the Pentagon might have said to deter him, for instance. “If somebody had said to me that we could not take out their air defense without putting our fliers at risk in a significant way; if the level of risk for our military personnel had been ratcheted up–that might have changed my decision,” says Obama. “Or if I did not feel Sarkozy or Cameron were far enough out there to follow through. Or if I did not think we could get a U.N resolution passed.” Once again he polled the people in the room for their views. Of the principals only Susan Rice (enthusiastically) and Hil­lary Clinton (who would have settled for a no-fly zone) had the view that any sort of intervention made sense. “How are we going to explain to the American people why we’re in Libya,” asked William Daley, according to one of those pres­ent. “And Daley had a point: who gives a shit about Libya?”

From the president’s point of view there was a certain benefit in the indifference of the American public to whatever was happening in Libya. It enabled him to do, at least for a moment, pretty much whatever he wanted to do. Libya was the hole in the White House lawn.

Obama made his decision: push for the U.N resolution and effectively invade another Arab country. Of the choice not to intervene he says, “That’s not who we are,” by which he means that’s not who I am. The decision was extraordinarily personal. “No one in the Cabinet was for it,” says one witness. “There was no constituency for doing what he did.” Then Obama went upstairs to the Oval Office to call European heads of state and, as he puts it, “call their bluff.” Cameron first, then Sarkozy. It was three a.m. in Paris when he reached the French president, but Sarkozy insisted he was still awake. (“I’m a young man!”) In formal and stilted tones the European leaders committed to taking over after the initial bombing. The next morning Obama called Medvedev to make sure that the Russians would not block his U.N. resolution. There was no obvious reason why Russia should want to see Qad­da­fi murder a city of Libyans, but in the president’s foreign dealings the Russians play the role that Republicans currently more or less play in his domestic affairs. The Russians’ view of the world tends to be zero-sum: if an American president is for it, they are, by definition, against it. Obama thought that he had made more prog­ress with the Russians than he had with the Republicans; Medvedev had come to trust him, he felt, and believed him when he said the United States had no intention of moving into Libya for the long term. A senior American official at the United Nations thought that perhaps the Russians let Obama have his resolution only because they thought it would end in disaster for the United States.

And it could have. All that exists for any president are the odds. On March 17 the U.N. gave Obama his resolution. The next day he flew to Brazil and was there on the 19th, when the bombing began. A group of Democrats in Congress issued a statement demanding Obama withdraw from Libya; Ohio Democratic congressman Dennis Kucinich asked if Obama had just committed an impeachable offense. All sorts of people who had been hounding the president for his inaction now flipped and questioned the wisdom of action. A few days earlier Newt Gingrich, busy running for president, had said, “We don’t need the United Nations. All we have to say is that we think slaughtering your own citizens is unacceptable and that we’re intervening.” Four days after the bombing began, Gingrich went on the Today show to say he wouldn’t have intervened and was quoted on Politico as saying, “It is impossible to make sense of the standard of intervention in Libya except opportunism and news media publicity.” The tone of the news coverage shifted dramatically, too. One day it was “Why aren’t you doing anything?” The next it was “What have you gotten us into?” As one White House staffer puts it, “All the people who had been demanding intervention went nuts after we intervened and said it was outrageous. That’s because the controversy machine is bigger than the reality machine.”

Put more succinctly, going to war in Libya was a close call; there are things various folks could have said to deter him; he ran the decision through executive branch and international channels; most people told him not to do it; but if Congress came into the picture at all, it wasn’t enough to merit mention in the retelling, and certainly not enough to follow the constitution and put the prospective war to a vote. The people’s representatives were excluded.

The imperial presidency is so well entrenched that a journalist like Michael Lewis needn’t really question circumventing Congress to feel as though he’s including all the crucial parts of the story about going to war.

That remains a scandal.

And it is telling that Michael Lewis, one of America’s finest journalists, didn’t even ask Obama about failing to put the decision about Libya before Congress. He didn’t ask despite the plain language of the Constitution, Obama’s prior statements indicating he fully understood his legal obligations, and the fact that various members of Congress complained about his unilateral action. The imperial presidency is so well entrenched that a journalist like Lewis needn’t really question those things to feel as though he’s including all the crucial parts of the story about going to war.

That is quite a precedent Obama has set. And Mitt Romney is ready to exploit it if he wins. As he put it: “I can assure you if I’m president, the Iranians will have no question but that I will be willing to take military action if necessary to prevent them from becoming a nuclear threat to the world. I don’t believe at this stage, therefore, if I’m president that we need to have a war powers approval or special authorization for military force. The president has that capacity now.”

http://www.theatlantic.com/politics/archive/2012/09/how-obama-ignored-congress-and-misled-america-on-war-in-libya/262299/

Why the Libyan War Is Unconstitutional

War is commonly defined as “a state of usually open and declared armed hostile conflict between states or nations.” By that definition, the United States and its allies have been at war with Libya since late last week. “At my direction,” President Obama told Congress, “U.S. military forces commenced operations” in Libya.

Article I, section 8 of the United States Constitution states that “Congress shall have the power … to declare war…” Since Congress has not declared war on Libya, is American involvement in the Libyan war unconstitutional?

Some members of Congress think so. Rep. Scott Ringell, a freshman from Virginia, said that the Libya hostilities “should trigger a debate within Congress and [among] the American people about proper interpretation and application of [the] Constitution. I’m surprised more conservatives aren’t speaking out about this issue.” Some Democrats have spoken out questioning the validity of the action. In the past, Senators Obama and Biden both said the president lacks the authority to do what President Obama has done.

The question of the constitutionality of the Libyan effort depends on the original public meaning of Article I, section 8 of the Constitution. Vice President (then Senator) Joseph Biden recalled that meaning in a speech on the Senate floor on July 30, 1998. He noted that the original draft of the Constitution would have empowered Congress to “make war.” James Madison and Elbridge Gerry moved that the language be changed to “declare war” so that the president would have the power “to repel sudden attacks.” Biden pointed out that only one framer, Pierce Butler of South Carolina, thought the president should have the power to initiate war.

Biden concluded that under the Constitution, the president could not use force without prior authorization unless it was necessary to “repel a sudden attack.” Presidential candidate Barack Obama agreed in 2007: “the President does not have power under the Constitution to unilaterally authorize a military attack in a situation that does not involve stopping an actual or imminent threat to the nation.”

Senator Biden also expounded on the framers’ reasons for limiting presidential discretion:

The rationale for vesting the power to launch war in Congress was simple. The Framers’ views were dominated by their experience with the British King, who had unfettered power to start wars. Such powers the Framers were determined to deny the President.

Of course, in 1998 and today, some claim the president has broad powers to initiate and carry on war under the “executive power” and the commander-in-chief clauses of Article II. But the framers rejected this “monarchist view” of the presidency.

The framers of the Constitution knew that the English king possessed certain prerogatives or discretionary powers to act for the public interest. Among these prerogatives was the power to declare war. He could also carry on undeclared wars. Yet the framers explicitly gave Congress the power to declare war. Apart from repelling sudden attacks, the Constitution is silent on the president’s power to conduct undeclared wars. Read against the English background, the text of the Constitution creates a constrained executive for the new nation.

What does this history imply for the present? President Obama told Congress that the use of force in Libya was intended “to prevent a humanitarian catastrophe and address the threat posed to international peace and security by the crisis in Libya.” But the framers did not empower the president to initiate war to prevent humanitarian catastrophes, deal with threats to international peace and security, or protect the lives of foreign nationals. The framers stated that the Constitution was instituted to provide for the common defense of We, the People, not the defense of people everywhere.

They did recognize a limited power to repel sudden attacks. The Libyan regime did not suddenly attack the United States or its citizens. There is nothing to repel. America’s war in Libya thus cannot be constitutional.

What now? The Supreme Court is unlikely to invalidate presidential actions in Libya. The task of vindicating the Constitution falls to Congress. It needs to hear from its conservatives, those who believe in the original meaning of the Constitution. Congress also needs to hear from its liberals, those who believe what Senators Biden and Obama once said about presidential power. Together members of Congress could finally live up to their constitutional obligations and impose restraints on a president who has become too much of a king.

John Samples directs the Cato Institute’s Center for Representative Government and is the author of The Struggle to Limit Government: A Modern Political History.

The Complete Chronology of the Benghazi Deception

by PETER KIRSANOW

March 2011: U.S. secretly approves arms shipments from Qatar to Libyan rebels.

May 2011: Al-Qaeda flags raised over Benghazi. November 2011: Rebel leader Abdel-Hakim al-Hasidi admits a significant number of Libyan rebels were al-Qaeda fighters who fought American troops in Iraq.

April 19, 2012: State Department rejects ambassador to Libya’s request for more security personnel.

June 20, 2012: Assassination attempt on the British Ambassador to Libya.

July 9, 2012: Ambassador Stevens asks the State Department for more security personnel.

August 8, 2012: The number of security personnel at Benghazi reduced by State Department.

August 16, 2012: U.S. Site Security in Benghazi alerts the State Department that conditions are perilous. September 4, 2012: Gallup presidential tracking poll: Obama 47 percent; Romney 46 percent. September 4–6, 2012: Democratic National Convention (“al-Qaeda decimated; bin Laden is dead and GM is alive; al-Qaeda is on the run”).

September 11, 2012: Ambassador Stevens alerts the State Department that conditions in Benghazi are deteriorating.

3:40 p.m. (D.C. time): Stevens calls deputy chief of mission Greg Hicks in Tripoli and alerts him that the consulate in Benghazi is under attack.

4:00 p.m.: The White House is advised that the consulate is under attack. 10th Special Forces Group in Croatia is three hours away; Brigadier General (Ret.) Robert Lovell, Deputy Director of Intelligence for AFRICOM, later testifies that intelligence knew immediately that it was not a protest but a terrorist attack; no request for aid comes from the State Department.

5:00 p.m.: Defense Secretary Leon Panetta discusses attack with President Obama.

6:00 p.m.: U.S. Embassy in Tripoli advises the White House and the State Department that al-Qaeda affiliate Ansar al-Sharia has claimed responsibility for the attack. CIA deputy director Mike Morrell later testifies that “analysts knew from the get-go that al Qaeda was involved with this attack.”

8:00 p.m.: Greg Hicks calls Clinton and tells her that consulate is under terrorist attack.

10:00 p.m.: Clinton and Obama talk.

10:30 p.m.: Clinton issues a statement linking the attack to an inflammatory internet video.

11:00–11:30 p.m.: Former Navy SEALs Glen Doherty and Ty Woods killed.

September 12, 2012: Redacted e-mail from a State Department official says the official advised the Libyan government that the attack was carried out by Ansar al-Sharia. No mention of video.

September 12–15, 2012: CIA drafts several iterations of talking points; contains no known references to video as cause of the attack.

September 13, 2012: State Department memo blames the attack on terrorists.

September 13, 2012: Defense Intelligence Agency assigns blame for the attack on Ansar al-Sharia in Libya. No mention of a video.

September 13, 2012: Clinton condemns violence against U.S. consulate in Libya due to a video. September 13, 2012: Jay Carney condemns attack due to a video.

September 14, 2012: State Department says the attack was a spontaneous demonstration due to a video.

September 14, 2012: Obama and Clinton receive the families of the fallen as their caskets arrive at Andrews Air Force Base; blame the attack on a video. Clinton tells Ty Woods’s father, Charles, that they will “get” the producer of the video.

September 14, 2012: Jay Carney blames the video.

September 14, 2012, 8:00 p.m.: Deputy national-security adviser Ben Rhodes sends an e-mail regarding the preparation of Susan Rice for the Sunday talk shows, advising Rice to underscore the video and that the attack is “not a broader failure of policy.” September 15, 2012: Obama blames the video.

September 16, 2012: Susan Rice appears on five Sunday talk shows and characterizes the attacks as a spontaneous reaction due to a video. September 16, 2012: Libyan president disputes Rice’s comments, asserting Benghazi was a planned attack.

September 18, 2012: Obama appears on the David Letterman show, blames the video.

September 19, 2012: The head of the National Counterterrorism Center testifies that the attack was not a protest but a terrorist attack.

September 20, 2012: Obama blames the video. September 20, 2012: Obama and Clinton run an ad on Pakistani TV apologizing for the video.

September 21, 2012: Clinton says it was a terrorist attack.

September 24, 2012: Obama appears on The View, blames the video.

October 4, 2012: Clinton establishes the Accountability Review Board (“ARB”) to examine the circumstances surrounding the loss of personnel in Benghazi. Clinton not interviewed by ARB.

October 11, 2012: At the vice-presidential debate, Joe Biden claims the administration was not informed about requests for more security at the consulate in Benghazi.

October 16, 2012: Obama, in a response to a question from a reporter about whether he denied requests for aid to Benghazi on September 11 responds, “The minute I found out this was going on, I gave three directives. Number one, make sure we are securing our personnel and doing whatever we need to. Number two, we are going to investigate exactly what happened and make sure it doesn’t happen again. Number three, find out who did this so that we can bring them to justice.”

October 18, 2012: Judicial Watch makes a Freedom of Information Act request to the administration for talking points and communications regarding the events in Benghazi. The administration ignores the request.

October 20, 2012: Obama claims that he was not aware of any requests for additional security in Benghazi.

January 23, 2013: Clinton asks, “What difference, at this point, does it make whether it was a terrorist attack or a spontaneous demonstration?”

June 21, 2013: Judicial Watch sues the administration for unlawfully withholding documents pertaining to Benghazi.

July 25, 2013: Obama slams the “endless parade of distractions, political posturing, and phony scandals.”

August 2013: The House Committee on Oversight and Government Reform requests Benghazi e-mails. The Ben Rhodes e-mail is not among those produced.

April 18, 2014: Federal court orders the administration to turn over documents to Judicial Watch. 41 documents are released, including the Ben Rhodes e-mail.

May 1, 2014: Tommy Vietor tells Fox News the president was not in the Situation Room on September 11, 2012.

May 2, 2014: Speaker John Boehner announces a vote to form a select committee on Benghazi.

May 4, 2014: Representative Adam Schiff (D.., Calif.), member of the House Intelligence Committee, suggests Democrats boycott the House select committee as a “colossal waste of time.”

May 5, 2014: Carney will not say whether White House will cooperate with the select committee. (Clearly, much remains to be filled in by the select committee. Numerous questions and lines of inquiry are prompted by the above. The chronology is based on congressional testimony and reports from, among others, the Wall Street Journal, the Washington Post, the Washington Times, the New York Times, the New York Post and Fox News, and the reporting of Steve Hayes and Jennifer Griffin.)

http://www.nationalreview.com/corner/377370/complete-chronology-benghazi-deception-peter-kirsanow

Benghazi Timeline

The long road from “spontaneous protest” to premeditated terrorist attack.

Summary

The question won’t go away: Did President Obama and administration officials mislead the public when they initially claimed that the deadly Sept. 11 attack on the U.S. consulate in Benghazi began “spontaneously” in response to an anti-Muslim video?

The question surfaced again on Oct. 25 — more than six weeks after the incident — when government emails showed the White House and the State Department were told even as the attack was going on that Ansar al-Sharia, a little-known militant group, had claimed credit for it.

We cannot say whether the administration was intentionally misleading the public. We cannot prove intent. There is also more information to come — both from the FBI, which is conducting an investigation, and Congress, which has been holding hearings.

But, at this point, we do know that Obama and others in the administration were quick to cite the anti-Muslim video as the underlying cause for the attack in Benghazi that killed four U.S. diplomats, including U.S. Ambassador to Libya Chris Stevens. And they were slow to acknowledge it was a premeditated terrorist attack, and they downplayed reports that it might have been.

What follows is a timeline of events that we hope will help put the incident into perspective. We call attention in particular to these key facts:

  • There were no protesters at the Benghazi consulate prior to the attack, even though Obama and others repeatedly said the attackers joined an angry mob that had formed in opposition to the anti-Muslim film that had triggered protests in Egypt and elsewhere. The State Department disclosed this fact Oct. 9 — nearly a month after the attack.
  • Libya President Mohamed Magariaf insisted on Sept. 16 — five days after the attack — that it was a planned terrorist attack, but administration officials continued for days later to say there was no evidence of a planned attack.
  • Magariaf also said the idea that the attack was a “spontaneous protest that just spun out of control is completely unfounded and preposterous.” This, too, was on Sept. 16. Yet, Obama and others continued to describe the incident in exactly those terms — including during the president’s Sept. 18 appearance on the “Late Show With David Letterman.”
  • Matt Olsen, director of the National Counterterrorism Center, was the first administration official to call it “a terrorist attack” during a Sept. 19 congressional hearing. Secretary of State Hillary Clinton did the same on Sept. 20. Even so, Obama declined opportunities to call it a terrorist attack when asked at a town hall meeting on Sept. 20 and during a taping of “The View” on Sept. 24.

Here is our timeline:

Analysis

Sept. 11: The Attack

2:30 p.m. Eastern Daylight Time (8:30 p.m. Benghazi time): U.S. Ambassador to Libya Chris Stevens steps outside the consulate to say goodbye to a Turkish diplomat. There are no protesters at this time. (“Everything is calm at 8:30,” a State Department official would later say at an Oct. 9 background briefing for reporters. “There’s nothing unusual. There has been nothing unusual during the day at all outside.”)

3 p.m.: Ambassador Stevens retires to his bedroom for the evening. (See Oct. 9 briefing.)

Approximately 3:40 p.m. A security agent at the Benghazi compound hears “loud noises” coming from the front gate and “gunfire and an explosion.” A senior State Department official at the Oct. 9 briefing says that “the camera on the main gate reveals a large number of people – a large number of men, armed men, flowing into the compound.”

About 4 p.m.: This is the approximate time of attack that was given to reporters at a Sept. 12 State Department background briefing. An administration official identified only as “senior administration official one” provides an official timeline of events at the consulate, but only from the time of the attack — not prior to the attack. The official says, “The compound where our office is in Benghazi began taking fire from unidentified Libyan extremists.” (Six of the next seven entries in this timeline — through 8:30 p.m. EDT — all come from the Sept. 12 briefing. The exception being the 6:07 p.m. entry, which comes from Reuters.)

About 4:15 p.m.: “The attackers gained access to the compound and began firing into the main building, setting it on fire. The Libyan guard force and our mission security personnel responded. At that time, there were three people inside the building: Ambassador Stevens, one of our regional security officers, and Information Management Officer Sean Smith.”

Between 4:15 p.m.-4:45 p.m.: Sean Smith is found dead.

About 4:45 p.m.: “U.S. security personnel assigned to the mission annex tried to regain the main building, but that group also took heavy fire and had to return to the mission annex.”

About 5:20 p.m.: “U.S. and Libyan security personnel … regain the main building and they were able to secure it.”

Around 6 p.m.: “The mission annex then came under fire itself at around 6 o’clock in the evening our time, and that continued for about two hours. It was during that time that two additional U.S. personnel were killed and two more were wounded during that ongoing attack.”

6:07 p.m.: The State Department’s Operations Center sends an email to the White House, Pentagon, FBI and other government agencies that said Ansar al-Sharia has claimed credit for the attack on its Facebook and Twitter accounts. (The existence of the email was not disclosed until Reuters reported it on Oct. 24.)

About 8:30 p.m.: “Libyan security forces were able to assist us in regaining control of the situation. At some point in all of this – and frankly, we do not know when – we believe that Ambassador Stevens got out of the building and was taken to a hospital in Benghazi. We do not have any information what his condition was at that time. His body was later returned to U.S. personnel at the Benghazi airport.”

About 10:00 p.m.: Secretary of State Hillary Clinton issues a statement confirming that one State official was killed in an attack on the U.S. consulate in Benghazi. Her statement, which MSNBC posted at 10:32 p.m., made reference to the anti-Muslim video.

Clinton: Some have sought to justify this vicious behavior as a response to inflammatory material posted on the Internet. The United States deplores any intentional effort to denigrate the religious beliefs of others. Our commitment to religious tolerance goes back to the very beginning of our nation. But let me be clear: There is never any justification for violent acts of this kind.

Sept.12: Obama Labels Attack ‘Act of Terror,’ Not ‘Terrorism’

Sept. 12: Clinton issues a statement confirming that four U.S. officials, not one, had been killed. She called it a “violent attack.”

Clinton: All the Americans we lost in yesterday’s attacks made the ultimate sacrifice. We condemn this vicious and violent attack that took their lives, which they had committed to helping the Libyan people reach for a better future.

Sept. 12: Clinton delivers a speech at the State Department to condemn the attack in Benghazi and to praise the victims as “heroes.” She again makes reference to the anti-Muslim video in similar language.

Clinton: Some have sought to justify this vicious behavior, along with the protest that took place at our Embassy in Cairo yesterday, as a response to inflammatory material posted on the Internet. America’s commitment to religious tolerance goes back to the very beginning of our nation. But let me be clear — there is no justification for this, none.

Sept. 12: Obama delivers a morning speech in the Rose Garden to address the deaths of U.S. diplomats in Libya. He said, “No acts of terror will ever shake the resolve of this great nation, alter that character, or eclipse the light of the values that we stand for.” He also makes reference to the anti-Muslim video when he says: “Since our founding, the United States has been a nation that respects all faiths. We reject all efforts to denigrate the religious beliefs of others. But there is absolutely no justification to this type of senseless violence. None.” He uses the term “act of terror” later that night when talking about the attack at a campaign event in Las Vegas.

Sept. 12: After his Rose Garden speech, Obama tapes an interview for “60 Minutes.” Obama says he didn’t use the word “terrorism” in his Rose Garden speech because “it’s too early to know exactly how this came about.” Steve Kroft, the show’s host, wonders how the attack could be described as a “mob action” since the attackers were “very heavily armed.” Obama says “we’re still investigating,” but he suspects “folks involved in this . . . were looking to target Americans from the start.”

Kroft: Mr. President, this morning you went out of your way to avoid the use of the word terrorism in connection with the Libya attack.

Obama: Right.

Kroft: Do you believe that this was a terrorist attack?

Obama: Well, it’s too early to know exactly how this came about, what group was involved, but obviously it was an attack on Americans and we are going to be working with the Libyan government to make sure that we bring these folks to justice one way or the other.

Kroft: It’s been described as a mob action. But there are reports that they were very heavily armed with grenades. That doesn’t sound like your normal demonstration.

Obama: As I said, we’re still investigating exactly what happened. I don’t want to jump the gun on this. But you’re right that this is not a situation that was exactly the same as what happened in Egypt. And my suspicion is, is that there are folks involved in this, who were looking to target Americans from the start.

Sept. 12: Senior administration officials, who did not permit use of their names, hold a briefing with reporters to answer questions about the attack. Twice officials characterize those involved in the attack as “extremists.” In one case, an official identified only as “senior administration official one” is asked by Fox News reporter Justin Fishel if the administration had ruled out the possibly that the attack was in response to the anti-Muslim video. The official says, “We just don’t know.”

Senior administration official one: With regard to whether there is any connection between this Internet activity and this extremist attack in Benghazi, frankly, we just don’t know. We’re not going to know until we have a chance to investigate. And I’m sorry that it is frustrating for you that so many of our answers are “We don’t know,” but they are truthful in that.

NBC’s Andrea Mitchell asks officials to address news reports that the attack has been “linked to a terror attack, an organized terror attack,” possibly al Qaeda. The official refers to it as a “complex attack,” but says it is “too early to say who they were” and their affiliation.

Senior administration official one: Frankly, we are not in a position to speak any further to the perpetrators of this attack. It was clearly a complex attack. We’re going to have to do a full investigation. We are committed to working with the Libyans both on the investigation and to ensure that we bring the perpetrators to justice. The FBI is already committed to assisting in that, but I just – we’re – it’s just too early to speak to who they were and if they might have been otherwise affiliated beyond Libya.

Sept. 12, 4:09 p.m.: At a press briefing en route to Las Vegas, White House Press Secretary Jay Carney is asked, “Does the White House believe that the attack in Benghazi was planned and premeditated?” He responds, “It’s too early for us to make that judgment. I think — I know that this is being investigated, and we’re working with the Libyan government to investigate the incident. So I would not want to speculate on that at this time.”

Sept. 12: Libya’s deputy ambassador to London, Ahmad Jibril, tells the BBC that Ansar al-Sharia was behind the attack. The little-known militant group issues a statement that says it “didn’t participate as a sole entity,” neither confirming nor denying the report.

Sept. 12, 6:06 p.m.: Beth Jones, the acting assistant secretary of state for the Near East, sends an email to top State Department officials that reads in part: “[T]he group that conducted the attacks, Ansar al-Sharia, is affiliated with Islamic extremists.” (An excerpt of Jones’ email was read by Rep. Trey Gowdy at the May 8, 2013, House oversight hearing.)

Sept. 12: Citing unnamed “U.S. government officials,” Reuters reports that “the Benghazi attack may have been planned in advance” and that members of Ansar al-Sharia “may have been involved.” Reuters quotes one of the U.S. officials as saying: “It bears the hallmarks of an organized attack.”

Sept. 13: ‘Clearly Planned’ or ‘Spontaneous’ Attack?

Sept. 13: Clinton meets with Ali Suleiman Aujali — the Libyan ambassador to the U.S. — at a State Department event to mark the end of Ramadan. Ambassador Aujali apologizes to Clinton for what he called “this terrorist attack which took place against the American consulate in Libya.” Clinton, in her remarks, does not refer to it as a terrorist attack. She condemns the anti-Muslim video, but adds that there is “never any justification for violent acts of this kind.”

Clinton: Religious freedom and religious tolerance are essential to the stability of any nation, any people. Hatred and violence in the name of religion only poison the well. All people of faith and good will know that the actions of a small and savage group in Benghazi do not honor religion or God in any way. Nor do they speak for the more than 1 billion Muslims around the world, many of whom have shown an outpouring of support during this time.

Unfortunately, however, over the last 24 hours, we have also seen violence spread elsewhere. Some seek to justify this behavior as a response to inflammatory, despicable material posted on the Internet. As I said earlier today, the United States rejects both the content and the message of that video. The United States deplores any intentional effort to denigrate the religious beliefs of others. At our meeting earlier today, my colleague, the foreign minister of Morocco, said that all prophets should be respected because they are all symbols of our humanity, for all humanity.

But both of us were crystal clear in this paramount message: There is never any justification for violent acts of this kind. And we look to leaders around the world to stand up and speak out against violence, and to take steps to protect diplomatic missions from attack.

Sept. 13: At a daily press briefing, State Department spokeswoman Victoria Nuland was asked if the Benghazi attack was “purely spontaneous or was premeditated by militants.” She declined to say, reiterating that the administration did not want to “jump to conclusions.”

Nuland: Well, as we said yesterday when we were on background, we are very cautious about drawing any conclusions with regard to who the perpetrators were, what their motivations were, whether it was premeditated, whether they had any external contacts, whether there was any link, until we have a chance to investigate along with the Libyans. So I know that’s going to be frustrating for you, but we really want to make sure that we do this right and we don’t jump to conclusions.

That said, obviously, there are plenty of people around the region citing this disgusting video as something that has been motivating. As the Secretary said this morning, while we as Americans, of course, respect free speech, respect free expression, there’s never an excuse for it to become violent.

Sept. 13: Clinton met with Moroccan Foreign Minister Saad-Eddine Al-Othmani. She condemned what she called the “disgusting and reprehensible” anti-Muslim video and the violence that it triggered. She said, “Islam, like other religions, respects the fundamental dignity of human beings, and it is a violation of that fundamental dignity to wage attacks on innocents. As long as there are those who are willing to shed blood and take innocent life in the name of religion, the name of God, the world will never know a true and lasting peace.”

Sept. 13: At a campaign event in Colorado, Obama again uses the phrase “act of terror.” He says: “I want people around the world to hear me: To all those who would do us harm, no act of terror will go unpunished.”

Sept. 13: CNN reports that unnamed “State Department officials” say the incident in Benghazi was a “clearly planned military-type attack” unrelated to the anti-Muslim movie.

CNN: “It was not an innocent mob,” one senior official said. “The video or 9/11 made a handy excuse and could be fortuitous from their perspective but this was a clearly planned military-type attack.”

Sept. 14: White House Says No Evidence of Planned Attack

Sept. 14: Clinton spoke at Andrews Air Force Base at a ceremony to receive the remains of those killed in Benghazi. She remarked that she received a letter from the president of the Palestinian Authority praising Stevens and “deploring — and I quote — ‘an act of ugly terror.’ ” She, however, did not call it an act of terror or a terrorist attack and neither did the president.

Sept. 14: At a State Department press briefing, spokeswoman Nuland says the department will no longer answer any questions about the Benghazi attack. “It is now something that you need to talk to the FBI about, not to us about, because it’s their investigation.”

Sept. 14: At a White House press briefing, Press Secretary Carney denies reports that it was a preplanned attack. “I have seen that report, and the story is absolutely wrong. We were not aware of any actionable intelligence indicating that an attack on the U.S. mission in Benghazi was planned or imminent. That report is false.” Later in that same briefing, Carney is told that Pentagon officials informed members of Congress at a closed-door meeting that the Benghazi attack was a planned terrorist attack. Carney said the matter is being investigated but White House officials “don’t have and did not have concrete evidence to suggest that this was not in reaction to the film.”

Question: Jay, one last question — while we were sitting here — [Defense] Secretary [Leon] Panetta and the Vice Chair of the Joint Chiefs briefed the Senate Armed Services Committee. And the senators came out and said their indication was that this, or the attack on Benghazi was a terrorist attack organized and carried out by terrorists, that it was premeditated, a calculated act of terror. Levin said — Senator Levin — I think it was a planned, premeditated attack. The kind of equipment that they had used was evidence it was a planned, premeditated attack. Is there anything more you can — now that the administration is briefing senators on this, is there anything more you can tell us?

Carney: Well, I think we wait to hear from administration officials. Again, it’s actively under investigation, both the Benghazi attack and incidents elsewhere. And my point was that we don’t have and did not have concrete evidence to suggest that this was not in reaction to the film. But we’re obviously investigating the matter, and I’ll certainly — I’m sure both the Department of Defense and the White House and other places will have more to say about that as more information becomes available.

Sept. 14: Defense Secretary Leon Panetta meets with the Senate Armed Services Committee. Roll Call, a Capitol Hill newspaper, reports that Republicans and Democrats came away with the conclusion that the Benghazi attack was a planned terrorist attack.

The Hill: Senators spoke with Panetta about the response to the situation in Libya. Four Americans were killed in an attack Tuesday on the U.S. consulate in Benghazi, including Ambassador Chris Stevens.

Senators said it has become clearer the attack was coordinated, although they would not say anything specific about any connection to the broader protests that came after an anti-Muslim video was released.

“I think it was a planned, premeditated attack,” Senate Armed Services Chairman Carl Levin (D-Mich.) said. He added he did not know the specific group responsible for the assault on the complex.

[Sen. John] McCain expressed a similar view.“People don’t go to demonstrate and carry RPGs and automatic weapons,” he said, adding that the facts suggest “this was not a ‘mob’ action [or] a group of protesters.”

Sept. 15-16: Susan Rice Contradicts Libyan President

Sept. 15: Obama discusses the Benghazi attack in his weekly address. He makes no mention of terror, terrorists or extremists. He does talk about the anti-Muslim film and “every angry mob” that it inspired in pockets of the Middle East.

Obama: This tragic attack [in Benghazi] takes place at a time of turmoil and protest in many different countries. I have made it clear that the United States has a profound respect for people of all faiths. We stand for religious freedom. And we reject the denigration of any religion — including Islam.

Yet there is never any justification for violence. There is no religion that condones the targeting of innocent men and women. There is no excuse for attacks on our Embassies and Consulates.

Sept. 16: Libya President Mohamed Magariaf says on CBS News’ “Face the Nation” that the attack on the U.S. consulate was planned months in advance. But Susan Rice, the U.S. ambassador to the United Nations, tells CBS News’ Bob Schieffer: “We do not have information at present that leads us to conclude that this was premeditated or preplanned.” She says it began “spontaneously … as a reaction to what had transpired some hours earlier in Cairo,” and “extremist elements” joined in the protest. (It was later learned that Rice received her information from talking points developed by the CIA.)

Update, May 16, 2013: The talking points given to Rice were extensively revised, largely at the request of the State Department. The original CIA talking points said, “We do know that Islamic extremists with ties to al-Qa’ida participated in the attack.” And they said that “[i]nitial press reporting linked the attack to Ansar al-Sharia.” References to al-Qaeda and Ansar al-Sharia were removed. However, all of the drafts say the attack began “spontaneously” in response to the Cairo protest. Read our article “Benghazi Attack, Revisited” for more information on what changes were made to the talking points.

Update, May 2, 2014: Two days before Rice’s appearance on the Sunday talk show circuit, Deputy National Security Adviser for Strategic Communications Ben Rhodes sent an email to other administration officials, including White House Press Secretary Jay Carney, with the subject line “PREP CALL with Susan: Saturday at 4:00 pm ET.” Rhodes’ email outlined four “goals” for Rice’s TV appearances. One of the goals: “To underscore that these protests are rooted in an Internet video, and not a broader failure of policy.” The email contained a mock Q&A session, and the third question asked whether the Benghazi attack was “an intelligence failure.” The answer in the email parroted — nearly word for word — Rice’s talking points when it said: “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the US Embassy in Cairo and evolved into a direct assault against the US Consulate and subsequently its annex.” The Rhodes email was released April 29 by Judicial Watch, a conservative watchdog group that obtained 41 State Department documents under the Freedom of Information Act.

Schieffer: Was this a long-planned attack, as far as you know? Or what– what do you know about that?

Magariaf: The way these perpetrators acted and moved … this leaves us with no doubt that this has preplanned, determined– predetermined.

Schieffer: And you believe that this was the work of al Qaeda and you believe that it was led by foreigners. Is that — is that what you are telling us?

Magariaf: It was planned — definitely, it was planned by foreigners, by people who — who entered the country a few months ago, and they were planning this criminal act since their — since their arrival. …

Schieffer: And joining us now, Susan Rice, the U.N. ambassador, our U.N. ambassador. Madam Ambassador, [Magariaf] says this is something that has been in the planning stages for months. I understand you have been saying that you think it was spontaneous? Are we not on the same page here?

Rice: Bob, let me tell you what we understand to be the assessment at present. First of all, very importantly, as you discussed with the president, there is an investigation that the United States government will launch led by the FBI, that has begun and —

They are not on the ground yet, but they have already begun looking at all sorts of evidence of — of various sorts already available to them and to us. And they will get on the ground and continue the investigation. So we’ll want to see the results of that investigation to draw any definitive conclusions.

But based on the best information we have to date, what our assessment is as of the present is in fact what began spontaneously in Benghazi as a reaction to what had transpired some hours earlier in Cairo where, of course, as you know, there was a violent protest outside of our embassy — sparked by this hateful video. But soon after that spontaneous protest began outside of our consulate in Benghazi, we believe that it looks like extremist elements, individuals, joined in that– in that effort with heavy weapons of the sort that are, unfortunately, readily now available in Libya post-revolution. And that it spun from there into something much, much more violent.

Schieffer: But you do not agree with him that this was something that had been plotted out several months ago?

Rice: We do not– we do not have information at present that leads us to conclude that this was premeditated or preplanned.

Schieffer: Do you agree or disagree with him that al Qaeda had some part in this?

Rice: Well, we’ll have to find out that out. I mean I think it’s clear that there were extremist elements that joined in and escalated the violence. Whether they were al Qaeda affiliates, whether they were Libyan-based extremists or al Qaeda itself I think is one of the things we’ll have to determine.

Sept. 16: Magariaf says in an interview with NPR: “The idea that this criminal and cowardly act was a spontaneous protest that just spun out of control is completely unfounded and preposterous. We firmly believe that this was a precalculated, preplanned attack that was carried out specifically to attack the U.S. consulate.”

Sept. 17: State Defends Rice and ‘Initial Assessment’

Sept. 17: Nuland, the State Department spokeswoman, is asked about Rice’s comments on “Face the Nation” and four other Sunday talk shows. Nuland says, “The comments that Ambassador Rice made accurately reflect our government’s initial assessment.” Nuland uses the phrase “initial assessment” three times when discussing Rice’s comments.

Sept. 18: Obama Says ‘Extremists’ Used Video As ‘Excuse’

Sept. 18: Obama was asked about the Benghazi attack on “The Late Show with David Letterman.” The president said, “Here’s what happened,” and began discussing the impact of the anti-Muslim video. He then said, “Extremists and terrorists used this as an excuse to attack a variety of our embassies, including the consulate in Libya.” He also said, “As offensive as this video was and, obviously, we’ve denounced it and the United States government had nothing to do with it. That’s never an excuse for violence.”

Sept. 18: Asked about Magariaf’s assessment that the video had nothing to do with the terrorist attack in Benghazi, the White House spokesman says Obama “would rather wait” for the investigation to be completed. “But at this time, as Ambassador Rice said and as I said, our understanding and our belief based on the information we have is it was the video that caused the unrest in Cairo, and the video and the unrest in Cairo that helped — that precipitated some of the unrest in Benghazi and elsewhere,” Carney says. “What other factors were involved is a matter of investigation.”

Sept. 18: After meeting with Mexican Secretary of Foreign Relations Patricia Espinosa, Clinton speaks with reporters and is asked if the Libyan president is “wrong” that “this attack was planned for months.” Clinton says, “The Office of the Director of National Intelligence has said we had no actionable intelligence that an attack on our post in Benghazi was planned or imminent.” She does not say if Magariaf is right or wrong.

Sept. 19: Olsen Calls It a ‘Terrorist Attack’

Sept. 19: Matt Olsen, director of the National Counterterrorism Center, tells a Senate subcommittee (at 1:06:49 in the video) that the four State Department officials in Benghazi “were killed in the course of a terrorist attack on our embassy.” It is the first time an administration official labeled it a “terrorist attack.” But he also tells the senators that he has no “specific evidence of significant advanced planning.”

Olsen: Yes, they were killed in the course of a terrorist attack on our embassy. … The best information we have now, the facts that we have now, indicate that this was an opportunist attack on our embassy. The attack began and evolved and escalated over several hours. … [I]t appears that individuals who were certainly well armed seized on the opportunity presented as the events unfolded. … What we don’t have, at this point, is specific intelligence that there was a significant advanced planning or coordination for this attack.

Sept. 19: At a State Department briefing, the department spokeswoman is asked if she now believes that the attack was a “terrorist attack”? She says, “Well, I didn’t get a chance to see the whole testimony that was given by Matt Olsen of the NCTC, but obviously we stand by comments made by our intelligence community who has first responsibility for evaluating the intelligence and what they believe that we are seeing.”

Sept. 19: The White House spokesman does not call it a “terrorist attack” in his press briefing. Carney says, “Based on the information we had at the time — we have now, we do not yet have indication that it was preplanned or premeditated. There’s an active investigation. If that active investigation produces facts that lead to a different conclusion, we will make clear that that’s where the investigation has led.”

Sept. 20: W.H. Spokesman Calls It a ‘Terrorist Attack’ — Not Obama

Sept. 20: Carney calls it a “terrorist attack” after being asked how the White House now classifies the attack. But he says the White House has no evidence that it was “a significantly preplanned attack” and blames the video for igniting the incident in Benghazi.

Carney: It is, I think, self-evident that what happened in Benghazi was a terrorist attack. Our embassy was attacked violently, and the result was four deaths of American officials. So, again, that’s self-evident. I would point you to a couple of things that Mr. Olsen said, which is that at this point it appears that a number of different elements were involved in the attack, including individuals connected to militant groups that are prevalent in Eastern Libya.

He also made clear that at this point, based on the information he has — and he is briefing the Hill on the most up-to-date intelligence — we have no information at this point that suggests that this was a significantly preplanned attack, but this was the result of opportunism, taking advantage of and exploiting what was happening as a result of reaction to the video that was found to be offensive.

Sept. 20: Obama, at a town hall meeting, says “extremists” took advantage of the “natural protests” to the anti-Muslim video to attack the consulate in Benghazi. He does not call it a “terrorist attack.”

Question: We have reports that the White House said today that the attacks in Libya were a terrorist attack. Do you have information indicating that it was Iran, or al Qaeda was behind organizing the protests?

Obama: Well, we’re still doing an investigation, and there are going to be different circumstances in different countries. And so I don’t want to speak to something until we have all the information. What we do know is that the natural protests that arose because of the outrage over the video were used as an excuse by extremists to see if they can also directly harm U.S. interests.

Sept. 21: Clinton Calls It a ‘Terrorist Attack’

Sept. 21: Clinton, speaking to reporters before a meeting with Pakistani Foreign Minister Hina Rabbani Khar, calls it a “terrorist attack” for the first time. She says, “Yesterday afternoon when I briefed the Congress, I made it clear that keeping our people everywhere in the world safe is our top priority. What happened in Benghazi was a terrorist attack, and we will not rest until we have tracked down and brought to justice the terrorists who murdered four Americans.”

Sept. 24-25: Obama Refuses to Call It a Terrorist Attack

Sept. 24: Clinton meets with the Libyan president and calls the Benghazi attack a “terrorist assault.” She says, “As we all know, the United States lost a great ambassador and the Libyan people lost a true friend when Chris Stevens and three other Americans were killed in the terrorist assault on our consulate in Benghazi.”

Sept. 24: Obama tapes an appearance on “The View,” and he’s asked by co-host Joy Behar whether the Libya attack was an act of terrorism or caused by the anti-Muslim video. He does not call it a terrorist attack and says, “We’re still doing an investigation.”

Joy Behar: It was reported that people just went crazy and wild because of this anti-Muslim movie, or anti-Muhammad, I guess, movie. But then I heard Hillary Clinton say that it was an act of terrorism. Is it? What do you say?

Obama: Well, we’re still doing an investigation. There’s no doubt that the kind of weapons that were used, the ongoing assault, that it wasn’t just a mob action. Now, we don’t have all the information yet, so we’re still gathering it. But what’s clear is that around the world, there’s still a lot of threats out there. That’s why we have to maintain the strongest military in the world, that’s why we can’t let down our guard when it comes to the intelligence work that we do and staying on top of — not just al Qaeda, the traditional al Qaeda in Pakistan and Afghanistan. …

Sept. 25: Obama speaks at the United Nations. He praises Chris Stevens as “the best of America” and condemns the anti-Muslim video as “crude and disgusting.” He does not describe the Benghazi attack as a terrorist attack.

Sept. 26: ‘Let’s Be Clear, It Was a Terrorist Attack’

Sept. 26: Carney is asked at a press briefing aboard Air Force One en route to Ohio why the president has not called the Benghazi incident a “terrorist attack.” He said, “The president — our position is, as reflected by the NCTC director, that it was a terrorist attack. It is, I think by definition, a terrorist attack when there is a prolonged assault on an embassy with weapons. … So, let’s be clear, it was a terrorist attack and it was an inexcusable attack.”

Sept. 26: Deputy Secretary of State William Burns, in an interview with Al Jazeera, is asked whether he agrees with the president of Libya that the Benghazi attack was premeditated and had nothing to do with the anti-Muslim video. He said: “It’s clear that the attack which took the lives of Chris Stevens and three other colleagues was clearly choreographed and directed and involved a fair amount of firepower, but exactly what kind of planning went into that and how it emerged on that awful night, we just don’t know right now. But I’m confident we’ll get to the bottom of it.”

Sept. 27: When Did Administration Know?

Sept. 27: At a press briefing, Defense Secretary Leon Panetta says that “it was a terrorist attack,” but declines to say when he came to that conclusion. “It took a while to really get some of the feedback from what exactly happened at that location,” he said. “As we determined the details of what took place there, and how that attack took place, that it became clear that there were terrorists who had planned that attack.”

Army Gen. Martin E. Dempsey, chairman of the Joint Chiefs of Staff, at the same briefing addresses what the U.S. knew in advance of the Benghazi attack. He says there was “a thread of intelligence reporting that groups in … eastern Libya were seeking to coalesce, but there wasn’t anything specific and certainly not a specific threat to the consulate that I’m aware of.”

Sept. 27: In a report on “Anderson Cooper 360 Degrees,” Fran Townsend, former Homeland Security adviser to President George W. Bush, says the administration knew early on that it was a terrorist attack. “The law enforcement source who said to me, from day one we had known clearly that this was a terrorist attack,” she says.

Sept. 27-28: Intelligence ‘Evolved’

Sept. 27: The White House spokesman is asked yet again why the president has refused to call the incident a terrorist attack. “The president’s position [is] that this was a terrorist attack,” Carney says.

Question: If the president does not call it, label it a terrorist attack as you and others have, is there some legal or diplomatic trigger that that brings? Why hasn’t he said that?

Carney: I think you’re misunderstanding something here. I’m the president’s spokesman. When the head of the National Counterterrorism Center, Matt Olsen, in open testimony in Congress answered a question by saying yes, by the definitions we go by — this is me paraphrasing — this was a terrorist attack — I echoed that, because this president, this administration, everybody looks to the intelligence community for the assessments on this. And it has been since I said so, the president’s position that this was a terrorist attack.

Sept. 28: Shawn Turner, a spokesman for the director of national intelligence, says in a statement that the office’s position on the attack evolved. It was first believed that “the attack began spontaneously,” but it was later determined that “it was a deliberate and organized terrorist attack,” he says.

Turner: In the immediate aftermath, there was information that led us to assess that the attack began spontaneously following protests earlier that day at our embassy in Cairo. We provided that initial assessment to Executive Branch officials and members of Congress, who used that information to discuss the attack publicly and provide updates as they became available. Throughout our investigation we continued to emphasize that information gathered was preliminary and evolving.

As we learned more about the attack, we revised our initial assessment to reflect new information indicating that it was a deliberate and organized terrorist attack carried out by extremists. It remains unclear if any group or person exercised overall command and control of the attack, and if extremist group leaders directed their members to participate.

Oct. 2-3: Clinton Cites ‘Continuing Questions’

Oct. 2: White House spokesman Carney at a press briefing in Nevada: “At every step of the way, the administration has based its public statements on the best assessments that were provided by the intelligence community. As the intelligence community learned more information they updated Congress and the American people on it.”

Oct. 3: Clinton tells reporters after a meeting with Foreign Minister of Kazakhstan Erlan Idrissov: “There are continuing questions about what exactly happened in Benghazi on that night three weeks ago. And we will not rest until we answer those questions and until we track down the terrorists who killed our people.”

Oct. 9: ‘Everything Calm’ Prior to Benghazi Attack, No Protests

Oct. 9: At a background briefing, senior state department officials reveal there were no protests prior to the terrorist attack on the U.S. consulate in Benghazi — contrary to what administration officials have been saying for weeks. A senior department official says “everything is calm at 8:30 p.m.” (Libya time) when Stevens was outside the building to bid a visitor goodbye. The ambassador retired to his bedroom for the evening at 9 p.m. The calm was shattered by 9:40 p.m. when “loud noises” and “gunfire and an explosion” are heard. (The background briefing provided on Sept. 12 also said the attack began at about 10 p.m., or about 4 p.m. EDT, but it did not provide information about what happened prior to the attack.)

A senior official says it was “not our conclusion” that the Benghazi attack started as a spontaneous protest to the anti-Muslim video. He also said “there was no actionable intelligence of any planned or imminent attack.”

Question: What in all of these events that you’ve described led officials to believe for the first several days that this was prompted by protests against the video?

Senior state department official two: That is a question that you would have to ask others. That was not our conclusion. I’m not saying that we had a conclusion, but we outlined what happened. The Ambassador walked guests out around 8:30 or so, there was no one on the street at approximately 9:40, then there was the noise and then we saw on the cameras the – a large number of armed men assaulting the compound.

Oct. 10: Administration Says It Gave Public ‘Best Information’

Oct. 10: Carney, the White House spokesman, is asked at a press briefing why the president and administration officials described the anti-Muslim video as the underlying cause of the attack on Benghazi when the State Department “never concluded that the assault in Benghazi was part of a protest on the anti-Muslim film.” He replied, in part: “Again, from the beginning, we have provided information based on the facts that we knew as they became available, based on assessments by the intelligence community — not opinions — assessments by the IC, by the intelligence community. And we have been clear all along that this was an ongoing investigation, that as more facts became available we would make you aware of them as appropriate, and we’ve done that.”

Oct. 10: After testifying before a House committee, Under Secretary for Management Patrick Kennedy is asked at a press briefing what the State Department should have done differently in releasing information about the Benghazi attack. He said, “We are giving out the best information we have at the time.”

Kennedy: [T]his is obviously an incredibly complicated situation. We’ve always made clear from the very beginning that we are giving out the best information we have at the time we are giving it out. That information has evolved over time. For example, if any Administration official, including any career official, had been on television on Sunday, September 16th, they would have said the same thing that Ambassador Rice would have said. She had information at that point from the intelligence community, and that is the same information I had and this – I would have made exactly the same points. Clearly, we know more today, but we knew what we knew when we knew it.

Oct. 10: The House Committee on Oversight and Government Reform releases State Department memos requesting additional security in Libya. Charlene Lamb, a State Department official who denied those requests, tells the committee that the State Department had been training local Libyans for nearly a year and additional U.S. security personnel were not needed. As reported by Foreign Policy: “We had the correct number of assets in Benghazi on the night of 9/11,” Lamb testified. Others testified differently. “All of us at post were in sync that we wanted these resources,” testified Eric Nordstrom, the top regional security officer in Libya over the summer, Foreign Policy reported.

Oct. 15: Clinton Blames ‘Fog of War’

Oct. 15: Clinton, in an interview on CNN, blamed the “fog of war” when asked why the administration initially claimed the attack began with the anti-Muslim video, even though the State Department never reached that conclusion. “In the wake of an attack like this in the fog of war, there’s always going to be confusion, and I think it is absolutely fair to say that everyone had the same intelligence,” Clinton said. “Everyone who spoke tried to give the information they had. As time has gone on, the information has changed, we’ve gotten more detail, but that’s not surprising. That always happens.”

Oct. 15: The New York Times reports that the Benghazi attack came “without any warning or protest,” but “Libyans who witnessed the assault and know the attackers” say it was “in retaliation for the video.”

Oct. 24: White House, State Department Emails on Ansar al-Sharia

Oct. 24: Reuters reports the White House, Pentagon and other government agencies learned just two hours into the Benghazi attack that Ansar al-Sharia, an Islamic militant group, had “claimed credit” for it. The wire service report was based on three emails from the State Department’s Operations Center. One of the emails said, “Embassy Tripoli reports the group claimed responsibility on Facebook and Twitter and has called for an attack on Embassy Tripol.” The article also noted, “Intelligence experts caution that initial reports from the scene of any attack or disaster are often inaccurate.” (It should be noted that Reuters first reported on Sept. 12 that unnamed U.S. officials believed that Ansar al-Sharia may have been involved.)

Oct. 24: Clinton warns at a press conference that you cannot draw conclusions from the leaked emails because “cherry-picking one story here or one document there” can be misleading. She said, “The independent Accountability Review Board is already hard at work looking at everything — not cherry-picking one story here or one document there — but looking at everything, which I highly recommend as the appropriate approach to something as complex as an attack like this. Posting something on Facebook is not in and of itself evidence, and I think it just underscores how fluid the reporting was at the time and continued for some time to be.”

Oct. 24: Carney, the White House spokesman, says that “within a few hours” of the attack Ansar al-Sharia “claimed that it had not been responsible.” He added, “Neither should be taken as fact — that’s why there’s an investigation underway.”

May 8, 2013: At a hearing of the House Committee on Oversight & Government Reform, Rep. Trey Gowdy reads excerpts of a Sept. 12, 2011, email written by Acting Assistant Secretary of State for the Near East Beth Jones. According to Gowdy, Jones wrote, “I spoke to the Libyan ambassador and emphasized the importance of Libyan leaders to continue to make strong statements,” and “When he said his government suspected that former Qaddafi regime elements carried out the attack, I told him that the group that conducted the attacks, Ansar al-Sharia, is affiliated with Islamic extremists.” Gowdy said the email was sent to several top State Department officials, including Under Secretary for Management Patrick Kennedy. The committee did not release the full contents of the email. House Speaker John Boehner said the State Department did not allow the House to keep a copy of it.)

May 15, 2013: The White House releases 100 pages of emails regarding the CIA’s original talking points that were developed for the House Permanent Select Committee on Intelligence and used by U.S. Ambassador to the United Nations Susan Rice during her Sept. 16 Sunday talk show appearances. The emails show there were extensive changes made at the request of the State Department. (See “Sept. 16″ in our timeline for more information.)

Update, Nov. 6, 2012: This article was updated to add the president’s Sept. 12 interview with “60 Minutes,” which did not release the video and transcript until Nov. 4.

Update, May 9, 2013: This article was updated to include testimony from the May 8, 2013, hearing of the House Committee on Oversight & Government Reform.

— by Eugene Kiely

Sources

National Counterterrorism Center. “Terrorism Definitions.” 27 Aug 2010.

U.S. Department of State. “Briefing by Senior Administration Officials to Update Recent Events in Libya.” 12 Sep 2012.

U.S. Department of State. “Statement on the Attack in Benghazi.” 11 Sep 2012.

Reuters. “U.S. confirms death of official in Benghazi attack.” 11 Sep 2012.

U.S. Department of State. “Statement on the Death of American Personnel in Benghazi, Libya.” 12 Sep 2012.

U.S. Department of State. “Remarks on the Deaths of American Personnel in Benghazi, Libya.” 12 Sep 2012.

White House. “Remarks by the President on the Deaths of U.S. Embassy Staff in Libya.” 12 Sep 2012.

White House. “Remarks by the President at a Campaign Event — Las Vegas, NV.” 12 Sep 2012.

White House. “Press Gaggle by Press Secretary Jay Carney en route Las Vegas, NV.” 12 Sep 2012.

Banerji, Robin. “Did Ansar al-Sharia carry out Libya attack?” 12 Sep 2012.

Roggio, Bill. “Ansar al Shariah issues statement on US Consulate assault in Libya.” 12 Sep 2012.

Spetalnick, Matt and Hadeel Al Shalchi. “Obama vows to track down ambassador’s killers.” Reuters. 12 Sep 2012.

U.S. Department of State. “Remarks at Reception Marking Eid ul-Fitr.” 13 Sep 2012.

U.S. Department of State. “Daily Press Briefing.” 13 Sep 2012.

U.S. Department of State. “Remarks at the Opening Plenary of the U.S.-Morocco Strategic Dialogue.” 13 Sep 2012.

White House. “Remarks by the President in Golden, CO.” 13 Sep 2012.

Aarthun, Sarah. “4 hours of fire and chaos: How the Benghazi attack unfolded.” CNN. 13 Sep 2012.

U.S. Department of State. “Remarks at the Transfer of Remains Ceremony to Honor Those Lost in Attacks in Benghazi, Libya.” 14 Sep 2012.

White House. “Remarks by the President at Transfer of Remains Ceremony for Benghazi Victims.” 14 Sep 2012.

U.S. Department of State. “Daily Press Briefing.” 14 Sep 2012.

White House. “Press Briefing by Press Secretary Jay Carney.” 14 Sep 2012.

Lesniewski, Nils. “Senators Question Leon Panetta About Syria, Libya.” Roll Call. 14 Sep 2012.

CBS News. “Face the Nation.” 16 Sep 2012.

White House. “Weekly Address: Carrying on the Work of Our Fallen Heroes.” 15 Sep 2012.

Fadel, Leila. “Consulate Attack Preplanned, Libya’s President Says.” NPR. 16 Sep 2012.

CBS. “The Late Show with David Letterman.” 17 Sep 2012.

White House. “Press Briefing by Press Secretary Jay Carney.” 18 Sep 2012.

U.S. Department of State. “Remarks With Mexican Secretary of Foreign Relations Patricia Espinosa After Their Meeting.” 18 Sep 2012

U.S. Senate Committee on Homeland Security and Government Affairs. “Homeland Threats and Agency Responses.” 19 Sep 2012

U.S. Department of State. “Daily Press Briefing.” 19 Sep 2012

White House. “Press Briefing by Press Secretary Jay Carney.” 19 Sep 2012

White House. “Remarks by the President at Univision Town Hall with Jorge Ramos and Maria Elena Salinas.” 20 Sep 2012

U.S. Department of State. “Remarks With Pakistani Foreign Minister Hina Rabbani Khar Before Their Meeting.” 21 Sep 2012

U.S. Department of State. “Remarks With Libyan President Mohamed Magariaf Before Their Meeting.” 24 Sep 2012

Knox, Oliver. “Obama: Libya attack ‘wasn’t just a mob action’.” Yahoo News. 24 Sep 2012.

Madhani, Aamer. “Team Romney: Obama fails to call Libya incident terror.” USA Today. 26 Sep 2012.

White House. “Remarks by the President to the UN General Assembly.” 25 Sep 2012.

White House. “Press Gaggle by Press Secretary Jay Carney Aboard Air Force One en route Ohio.” 26 Sep 2012.

U.S. Department of State. “Interview with Al-Jazeera.” 26 Sep 2012.

U.S. Department of Defense. “DOD News Briefing with Secretary Panetta and Gen. Dempsey from the Pentagon.” 27 Sep 2012.

CNN. “Anderson Cooper 360 Degrees.” 26 Sep 2012.

Office of the Director of National Intelligence. “Statement by the Director of Public Affairs for ODNI, Shawn Turner, on the intelligence related to the terrorist attack on the U.S. Consulate in Benghazi, Libya.” 28 Sep 2012

White House. “Press Gaggle by Press Secretary Jay Carney en route Virginia Beach, Virginia.” 27 Sep 2012.

White House. “Press Gaggle by Press Secretary Jay Carney.” 2 Oct 2012.

U.S. Department of State. “Remarks With Foreign Minister of Kazakhstan Erlan Idrissov After Their Meeting.” 3 Oct 2012.

U.S. Department of State. “Background Briefing on Libya.” 9 Oct 2012.

Klapper, Bradley. “State Dept reveals new details of Benghazi attack.” Associated Press. 10 Oct 2012.

White House. “Press Briefing by Press Secretary Jay Carney.” 10 Oct 2012.

U.S. Department of State. “Hearing on Benghazi Security Issues.” 10 Oct 2012.

U.S. Department of State. “Interview with Elise Labott of CNN.” 15 Oct 2012.

Kirkpatrick, David. “Election-Year Stakes Overshadow Nuances of Libya Investigation.” New York Times. 15 Oct 2012.

Hosenball, Mark. “White House told of militant claim two hours after Libya attack: emails.” Reuters. 23 Oct 2012.

U.S. Department of State. “Remarks With Brazilian Foreign Minister Antonio de Aguiar Patriota After Their Meeting.” 24 Oct 2012.

White House. “Press Gaggle by Press Secretary Jay Carney en route Davenport, Iowa.” 24 Oct 2012.

Timeline of the investigation into the 2012 Benghazi attack

From Wikipedia, the free encyclopedia
2012 Benghazi attack
Location Benghazi, Libya
Date September 11–12, 2012
22:00 – 02:00 EET (UTC+02:00)
Target United States consulate and second location (annex)
Attack type
Armed assault, rioting, arson
Deaths 4
(including U.S. Ambassador J. Christopher Stevens)
Non-fatal injuries
10
Suspected perpetrators
Ansar al-Sharia;[1] Al-Qaeda in the Islamic Maghreb[2] Al Qaeda in Iraq[3]

The timeline below details the ongoing investigation into the September 11, 2012 attack upon the American diplomatic mission at Benghazi, in Libya. The attack and the investigation are the subject of much controversy in the American political sphere.

Contents

Timeline

September 2012

September 12 The New York Times reported: “American and European officials said that while many details about the attack remained unclear, the assailants seemed organized, well trained and heavily armed, and they appeared to have at least some level of advance planning.” The article also noted that a senior Obama administration official told reporters that “it was clearly a complex attack,” but provided no details.[4]

CBS News reported that Wanis al-Sharef (also spelled al-Sharif), a Libyan Interior Ministry official in Benghazi, said that an angry mob had gathered outside the consulate to protest a U.S.-made film that ridicules Islam’s Prophet Muhammad. According to al-Sharef, the mob stormed the consulate after the U.S. troops who responded fired rounds into the air to try and disperse the crowd.[5]

CBS News later reported that U.S. officials said the attack was not an out-of-control demonstration as first suspected, but a well-executed assault. From the wording of the report it is unclear whether the protesters were a group distinct from the attackers or were the attackers themselves.[6]

The Guardian published a video interview of a local Libyan on the consulate compound right after the attack, who presumed and empathized that the attack was in response to the anti-Islamic film.[7]

The Washington Post reported that U.S. officials and Middle East analysts said that the attack “may have been planned by extremists and inspired by al-Qaeda.”[8]

In a press release, the Qulliam Foundation, a counter-extremism think tank based in London, stated that the “military assault” was not related to the film but was to “avenge the death of Abu Yahya al-Libi, al-Qaeda’s second in command killed a few months ago.”[9]

BBC reported that Libya’s deputy ambassador to London, Ahmad Jibril, named Ansar al-Sharia, also known as Al-Qaeda in the Arabian Peninsula, as the perpetrators. They also said a Libyan reporter told them that the attack was executed by as many as 80 militiamen “armed with assault rifles, rocket-propelled grenades, mortars and 14.5 mm anti-aircraft machine guns.”[10][11]

Deputy Interior Minister Wanis al-Sharif of the Libyan government told a news conference in Benghazi that it was likely that the perpetrators had been Gaddafi loyalists, suggesting the attack could have been intended as a revenge for the extradition of Abdullah al-Senoussi (Gaddafi’s former intelligence chief) from Mauritania the previous month.[12]

September 13 The FBI opened an investigation into the deaths; a team was sent to investigate, with another team for security.[13] The FBI officials were set to arrive by September 21 in Benghazi to work with Libyan officials.[14]

In a briefing to congressional staffers, State Department Under Secretary Patrick Kennedy said that the attack appeared planned because it was so extensive and because of the “proliferation” of small and medium weapons.[15]

CNN reported that the attackers were part of an Al Qaeda spinoff group. They spoke with Sen. Dianne Feinstein (D-Calif.), who said the killings were possibly linked to the terrorist group blamed for the 9/11 hijackings. According to Sen. Feinstein, “The weapons were somewhat sophisticated, and they blew a big hole in the building and started a big fire.”[16]

September 14 The Senate Armed Services Committee was briefed by Secretary of Defense Leon Panetta about the response to the situation in Libya. Afterwards, Senate Armed Services Chairman Carl Levin (D-MI) was quoted as saying, “I think it was a planned, premeditated attack.” He added that he did not know the group responsible for the attack.[17]
September 15 SITE Intelligence Group released a report that said al-Qaeda claimed that the attack was in revenge for the killing of the network’s number two Sheikh Abu Yahya al-Libi.[18]

Talking points prepared by the CIA, stated “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the U.S. Embassy in Cairo and evolved into a direct assault against the U.S. Consulate and subsequently its annex. There are indications that extremists participated in the violent demonstrations.” [19]

September 16 In an interview with NPR in Benghazi, President Mohammed el-Megarif said that foreigners infiltrated Libya over the past few months, planned the attack, and used Libyans to carry it out.[20] According to el-Megarif: “The idea that this criminal and cowardly act was a spontaneous protest that just spun out of control is completely unfounded and preposterous. We firmly believe that this was a precalculated, preplanned attack that was carried out specifically to attack the U.S. Consulate.” He said the attackers used the protesters outside the consulate as a cover, and there is evidence showing that elements of Ansar al-Sharia, an extremist group in eastern Benghazi, were used by foreign citizens with ties to al-Qaida to attack the consulate.[21]

U.S. Ambassador to the United Nations Susan Rice appeared on several Sunday morning talk shows and stated, “Putting together the best information that we have available to us today our current assessment is that what happened in Benghazi was in fact initially a spontaneous reaction to what had just transpired hours before in Cairo, almost a copycat of– of the demonstrations against our facility in Cairo, which were prompted, of course, by the video. What we think then transpired in Benghazi is that opportunistic extremist elements came to the consulate as this was unfolding. They came with heavy weapons which unfortunately are readily available in post revolutionary Libya. And it escalated into a much more violent episode.”[22][23]

Senator John McCain (R-AZ), the top Republican on the Senate Armed Services Committee, voiced suspicion that the attack was planned in advance and not prompted by the furor over the film. He noted that “[m]ost people don’t bring rocket-propelled grenades and heavy weapons to demonstrations. That was an act of terror.”[24]

September 17 Fox News reported that an “intelligence source on the ground in Libya” said “there was no demonstration outside the U.S. Consulate in Benghazi” before the attack.[25] The source was quoted as saying, “There was no protest and the attacks were not spontaneous.” The source also said that the attack “was planned and had nothing to do with the movie.” The source said the assault came with no warning at about 9:35 p.m. local time and included fire from more than two locations. The information for the time and for multiple directions of the attack corroborates an eyewitness report.[26]

Representative Mike Rogers (R) Michigan, the chairman of the House Intelligence Committee, said in an interview with Real Clear Politics that there were reports that the Consulate sustained “indirect fire, artillery type fire from mortars. They had direct unit action. It was coordinated in a way that was very unusual. They repulsed a quick reaction force that came to the facility….”[27]

September 19 The director of the National Counterterrorism Center, Matthew Olson, appeared before the Senate Homeland Security and Governmental Affairs Committee. During the hearing Olsen said that the Americans killed in Libya died “in the course of a terrorist attack.”[28] But he said that “the facts that we have now indicate that this was an opportunistic attack,” one in which heavily armed militants took advantage of an ongoing demonstration at the Consulate.

Sen. Susan Collins (R-Maine) disagreed with Olsen’s statement that the attack did not appear pre-planned. She said, “Based on the briefings I have had, I’ve come to the opposite conclusion. I just don’t think that people come to protests equipped with RPGs [rocket-propelled grenades] and other heavy weapons. And the reports of complicity—and they are many—with Libyan guards who were assigned to guard the consulate also suggest to me that this was premeditated.” Olsen told committee members that the U.S. is “looking at indications” that some attackers had connections to al-Qaeda or its North African affiliate, al-Qaeda in the Islamic Maghreb.

Fox News reported intelligence sources that the attack was tied to Al Qaeda via the involvement of Abu Sufian bin Qumu, a former Guantanamo Bay detainee.[29][30] However, a US national security official tells Mother Jones that “that report is wrong, there’s no intelligence suggesting that he was leading the attack on the consulate that evening.”[31]

September 20 Reuters reported that U.S. authorities are investigating the prospect of collusion between the militants who launched the attack on the consulate and locally hired Libyan personnel guarding the facility.[32] This corroborates earlier statements by U.S. government officials who stated there were multiple accounts of collusion between the attackers and the Libyan security guards.[28]

Secretary Clinton announced the formation of a panel to investigate the attack,[33] which is separate from the FBI investigation.

White House Press Secretary Jay Carney for the first time called the event “a terrorist attack.” In the same report CNN noted conflicting reports that U.S. Ambassador to Libya Chris Stevens “believed he was on an al Qaeda hit list.”[34]

September 21 U.S. officials said that the heavily armed extremists who laid siege to the consulate used “military-style tactics” in what appeared to be a “sophisticated operation”. Intelligence reports indicated that 50 or more people, many of them masked, took part in the attack and used gun trucks and precise mortar fire.[35] Intelligence reports also indicated that the attackers set up a perimeter to control access in and out of the compound.
September 23 A report in The New York Times has stated that there were two facilities used by the Americans in Benghazi, one for the American mission and an annex a half-mile away [36] and that:

Neither was heavily guarded, and the annex was never intended to be a “safe house,” as initial accounts suggested. Two of the mission’s guards — Tyrone S. Woods and Glen A. Doherty, former members of the Navy SEALs — were killed just outside the villa’s front gate.
September 25 U.S. Senators John McCain (R-AZ), Lindsey Graham (R-SC), Kelly Ayotte (R-NH) and Ron Johnson (R-WI) sent a letter to U.N. Ambassador Susan Rice seeking clarification on statements she made on the five Sunday talk shows on September 16 that the September 11 attack in Benghazi was the result of a “spontaneous reaction.” The senators wrote that the evidence clearly showed the attack was planned and coordinated.[37] Ms. Rice wrote in her reply letter, “I relied solely and squarely on the information the intelligence community provided to me … This information represented the intelligence community’s best, current assessment as of the date of my television appearances.” The four senators replied in a statement: “Elements of the intelligence community apparently told the administration within hours of the attack that militants connected with al Qaeda were involved, yet Ambassador Rice claims her comments five days later reflected the ‘best’ and ‘current’ assessment of the intelligence community. Either the Obama administration is misleading Congress and the American people, or it is blaming the entire failure on the intelligence community.”[38]
September 26 The Daily Beast reported that three separate U.S. intelligence officials knew within 24 hours of the attack that it was “planned and the work of al Qaeda affiliates operating in Eastern Libya.”[39]

Libyan president Mohamed Magariefd, in an interview with NBC News, said that there were no protestors at the site before the attack and that the anti-Islam film had “nothing to do with” the attack.[40] “Reaction should have been, if it was genuine, should have been six months earlier. So it was postponed until the 11th of September,” he said. “They chose this date, 11th of September to carry a certain message.”

Eight Republican Representatives on the House Armed Services Committee sent a letter to President Obama asking him to provide answers to questions in a classified format.[41] Their letter reads in part: “While we appreciate your willingness to provide the House of Representatives with an interagency briefing last week, many of the members’ questions were left unanswered. To that end, we are seeking additional information regarding the intelligence leading up to the attack, the security posture of our embassy, the role former Guantanamo Bay detainees may have played, as well as the way forward in Libya and, indeed, the region.”

September 28 A statement released by the Director of Public Affairs for the Director of National Intelligence, Shawn Turner, on the intelligence related to the terrorist attack on the U.S. Consulate in Benghazi, Libya, read in part:[42] “As we learned more about the attack, we revised our initial assessment to reflect new information indicating that it was a deliberate and organized terrorist attack carried out by extremists. It remains unclear if any group or person exercised overall command and control of the attack, and if extremist group leaders directed their members to participate. However, we do assess that some of those involved were linked to groups affiliated with, or sympathetic to al-Qa’ida. We continue to make progress, but there remain many unanswered questions. As more information becomes available our analysis will continue to evolve and we will obtain a more complete understanding of the circumstances surrounding the terrorist attack.”

October 2012

October 2 In a letter to Secretary of State Clinton, Darrell Issa (R-CA, chairman of the Committee) and Jason Chaffetz (R-UT, chairman of the subcommittee on National Security, Homeland Defense, and Foreign Operations) write that “the attack that claimed the Ambassador’s life was the latest in a long line of attacks on Western diplomats and officials in Libya in the months leading up to September 11, 2012. It was clearly never, as Administration officials once insisted, the result of a popular protest.”[43] The letter goes on to state that the mission in Benghazi was denied increased security they repeatedly requested. Subpoenaed witnesses set to testify before the committee on October 10 are Charlene Lamb, Deputy Assistant Secretary for International Programs, Bureau of Diplomatic Security, U.S. Department of State; Eric Nordstrom, Regional Security Officer, U.S. Department of State; and Lt. Col. Andrew Wood, Utah National Guard, U.S. Army.[44] According to Lt. Col. Wood, his 16-member team and a six-member State Department elite force called a Mobile Security Deployment team left Libya in August, one month before the assault on the diplomatic mission. Wood says that’s despite the fact that U.S. officials in Libya wanted security increased, not decreased.[45]
October 3 The Washington Post reported that the FBI investigation team was in Tripoli and had not reached Benghazi yet.[46]
October 4 The State Department announced an Accountability Review Board “to examine the facts and circumstances of the attacks.”[47]

The Washington Post reported that the FBI team arrived in Benghazi and left after about 12 hours.[48]

October 5 The House Committee on Oversight and Government Reform is conducting its own investigation of the attack.[45] In doing so, the House Oversight Committee issued a subpoena to LTC Andy Wood.[49]
October 9 In an evening briefing to reporters, the State Department said it never concluded that the consulate attack in Libya stemmed from protests over the video.[50][51]

Senate Foreign Relations Committee member Bob Corker (R-TN) met with Libyan officials in Tripoli, and said that investigators are examining video from security cameras at the primary Benghazi compound to help them reconstruct what happened in the attack and identify attack participants.[52]

Senators John McCain (R-AZ), Lindsey Graham (R-SC), Kelly Ayotte (R-NH), and Saxby Chambliss (R-GA) sent letters to Director of National Intelligence James Clapper, CIA Director David Petraeus, and John Brennan, Assistant to the President for Homeland Security and Counterterrorism, asking them to respond to “specific questions regarding the shifting official explanations” about the attack.[53]

October 10

The four witnesses called to testify at the October 10, 2012 hearing of the House Committee on Oversight and Government Reform (l to r) were Lt. Col. Andrew Wood, Utah National Guard, U.S. Army; Eric Nordstrom, Regional Security Officer, U.S. Department of State; Charlene Lamb, Deputy Assistant Secretary for International Programs, Bureau of Diplomatic Security, U.S. Department of State; and Ambassador Patrick Kennedy, Under Secretary for Management, U.S. Department of State. An image of the U.S. compound can be seen behind Ms. Lamb.

The House Committee on Oversight and Government Reform held its hearing, “The Security Failures of Benghazi.”[44] In addition to the three witnesses originally named, a fourth witness testified: Ambassador Patrick Kennedy, Under Secretary for Management, U.S. Department of State.

  • In sworn testimony, Mr. Kennedy said, “…if any administration official, including any career official, were on television on Sunday, September 16th, they would have said what Ambassador Rice said. The information she had at that point from the intelligence community is the same that I had at that point.”[54] However, in a briefing to congressional staffers on September 13, Mr. Kennedy said that the attack appeared planned.[15] With regard to the so-called “talking points” memo UN Ambassador Susan Rice relied upon for information during television interviews following the Benghazi attack, The Guardian reports that on 16 November 2012, former CIA Director David Petraeus told congressional hearings, references to al-Queda had been removed from the memo. The references where remove so as not to give up information which could compromise classified sources. Rice was unaware of al-Qaida ties to the Benghazi attack.[55]
  • During testimony State Department witnesses acknowledged that it rejected appeals for more security at its diplomatic posts in Libya in the months before the attack.[56] The “annex” and “safe house” in the second diplomatic compound was inadvertently revealed to be a U.S. intelligence post.[57][58][59]
  • Charlene Lamb, Deputy Assistant Secretary of State for International Programs, said in her prepared testimony that she had a firm grasp on what happened in Benghazi, starting moments after the assault began. ”When the attack began, a Diplomatic Security agent working in the tactical operations center immediately … alerted the annex U.S. quick reaction security team stationed nearby … and the Diplomatic Security Command Center in Washington. From that point on, I could follow what was happening in almost real-time.”[60]
  • During testimony Representative Issa described the existence of video tape of the attack taken from consulate security cameras; the tape was not available to committee members at the time of the hearing.
October 12 U.S. Senate Committee on Homeland Security and Governmental Affairs announced its plan to conduct a bipartisan investigation. Part of their investigation will seek to determine “why the Administration’s initial public assessments of this attack were subsequently proven inaccurate.”[61]
October 14 Senator Lindsey Graham (R-SC), speaking on CBS’ Face the Nation, said that “[t]he intelligence community on the ground in Libya has told Senator Corker and myself that within twenty-four hours, they communicated up to Washington that this was a terrorist attack.”[62]
October 15 U.S. Secretary of State Hillary Rodham Clinton assumed responsibility for the Benghazi attack, saying that she is in charge of her 60,000-plus staff all over the world and “the president and the vice president wouldn’t be knowledgeable about specific decisions that are made by security professionals. They’re the ones who weigh all of the threats and the risks and the needs and make a considered decision.”[63] Republican Senator John McCain praised her “laudable gesture, especially when the White House is trying to avoid any responsibility whatsoever” but insisted that either there were drastic failures in the national security operation in not keeping the president aware of ongoing threats, or Obama himself knew of the threats and needed to take responsibility for the shortcomings.[64]

In an interview with the Los Angeles Times, the two Libyan militiamen guarding the consulate denied aiding the attackers. The compound was “lazily quiet” in the hours before the assault, they said. Around 9:30 p.m., the guards heard cries of “Allahu akbar!”—”God is great”—three times from outside the walls, then a voice called out in Arabic “You infidels!” and the attackers raced inside.[65]

The New York Times reported that witnesses of the attack knowledgeable of the circumstances were very convinced that it was carried out by a group of local Islamic militants in response to the video. According to local militia leaders familiar with the militant group, it was capable of carrying out the attack on short notice with only a few hour’s planning.[66]

October 17 Libyan officials report that the founder of Libya’s Islamist militia Ansar al-Sharia was at the compound during the attack, but that he remains free a week after those allegations were disclosed to Libyan political leaders and U.S. investigators.[67] The militia commander, identified as Ahmed Abu Khattalah, is a former political prisoner whose fighters were also blamed for assassinating a senior military officer after he defected to the opposition during last year’s revolution against Moammar Kadafi.[68]
October 18 The New York Times reported that Ahmed Abu Khattala, 41, claimed the Benghazi attack had grown out of a peaceful protest against a video made in the United States that mocked the Prophet Muhammad and Islam.[69] On or about 15 June 2014 American military and law enforcement personnel operating in Libya captured Ahmed Abu Khattala, who had been secretly indicted in the U.S. for his alleged role as a mastermind and/or ring-leader in the Benghazi attack.

Senate Committee on Homeland Security & Governmental Affairs made its first request for documents and briefings into the circumstances surrounding the attack. In separate letters to Secretary Hillary Clinton, Director of National Intelligence James Clapper, and Secretary of Defense Leon Panetta, the committee requested a classified briefing for members of the committee. The briefing is to address threat assessments before the attack, security needs, requests for security, description and chronology of the attack, and what the Obama administration knew about the attack in the immediate aftermath and “whether any initial public statements issued by members of the Administration in the days following the attack were inaccurate and, if so, why.”[70]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee, questioned the security at the compound and the initial intelligence surrounding the attack. Feinstein was quoted in an interview: “I think what happened was the director of national intelligence, which we call the DNI, who is a very good individual, the former head of the Defense Intelligence Agency, Gen. Jim Clapper, put out some speaking points on the initial intelligence assessment. I think that was possibly a mistake.”[71]

October 19 Oversight and Government Reform Committee Chairman Darrell Issa and National Security Subcommittee Chairman Jason Chaffetz sent a 10-page letter to President Obama,[72] accompanied by 166 pages of unclassified documents[73] and photos.[74] The committee stated that the “letter requests that the White House respond to questions about its role in the controversial decision to have the U.S. diplomatic mission in Libya pursue a course of ‘normalization’ that was intended to help create the perception of success in Libya and contrast it to U.S. operations in Iraq and Afghanistan.”[75]

Representative Peter T. King (R-NY), Chairman of the House Committee on Homeland Security, sent a letter to President Obama requesting him to release Intelligence Community (1) reporting that led Obama Administration officials to initially characterize the assault as a “spontaneous reaction” to a film and (2) data and intelligence that led the Administration to change its characterization from a “spontaneous reaction” to a “terrorist attack.”[76]

Senators John McCain (R-AZ), Lindsey Graham (R-SC), and Kelly Ayotte (R-NH) renewed their request from 10 days ago that Director of National Intelligence James Clapper, CIA Director David Petraeus and John Brennan, Assistant to the President for Homeland Security and Counterterrorism, answer questions regarding “the shifting official explanations surrounding” the attack. The senators wrote, “Our questions should not be hard to answer, and the American people have a right to learn what our intelligence communities knew about the events of September 11, 2012, and when they knew it.”[77]

U.S. officials told The Associated Press that the CIA station chief in Libya compiled intelligence reports within 24 hours of the attack that indicated there was evidence it was carried out by militants, using the pretext of demonstrations against U.S. facilities in Egypt against the film to cover their intent. The report from the station chief was written late Wednesday, Sept. 12, and reached intelligence agencies in Washington the next day. It was not clear how widely the information was circulated.[78]

October 20 The Washington Post reported that talking points prepared by the CIA on Sept. 15 stated: “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the U.S. Embassy in Cairo and evolved into a direct assault against the U.S. Consulate and subsequently its annex. There are indications that extremists participated in the violent demonstrations.” [19]

CBS News reported Congress members have asked why military assistance was not sent. General Dempsey and Secretary Panetta “looked at available options, and the ones we exercised had our military forces arrive in less than 24 hours, well ahead of timelines laid out in established policies.” An unmanned Predator drone was sent to Benghazi, and the drone observed the final hours of the attack. The Pentagon said it moved a team of special operators from central Europe to Naval Air Station Sigonella; other nearby military forces available were fighter jets and AC-130 gunships. Gary Berntsen stated, “They made zero adjustments in this. They stood and they watched and our people died.”[79]

October 22 The New York Times reported that Ms. Rice, the US ambassador to the UN, “has said that the judgments she offered on the five talk shows on Sept. 16 came from talking points prepared by the C.I.A., which reckoned that the attack that killed Ambassador J. Christopher Stevens and three other Americans had resulted from a spontaneous mob that was angry about an anti-Islamic video that had set off protests elsewhere. That assessment, described to Ms. Rice in briefings the day before her television appearances, was based on intercepted communications, informants’ tips and Libyan press reports, officials said.” [80]
October 23 Media reports indicate that the State Department’s Operations Center sent a “Sensitive but unclassified” email at 4:05 p.m. Washington time (10:05 p.m. Benghazi time) on September 11 titled “U.S. Diplomatic Mission in Benghazi Under Attack” to the White House Situation Room and other U.S. security units and two hours later sent an email titled “Update 2: Ansar al-Sharia Claims Responsibility for Benghazi Attack.”[81][82] The first email reads in part: “approximately 20 armed people fired shots; explosions have been heard as well. Ambassador Stevens, who is currently in Benghazi, and four COM (Chief of Mission/embassy) personnel are in the compound safe haven.”[83] Secretary of State Hillary Rodham Clinton cautioned that those emails are “not in and of itself evidence” that the administration had definitively assessed the assault as a terrorist attack from the beginning.[84] A Tunisian man who was arrested in Turkey earlier this month with reported links to the Benghazi attack has been returned to Tunisia and is facing terrorism charges.[85][86]
October 24 It is reported that both Reuters and Fox News obtained copies of an email sent about 2 hours after the attack in which the White House, Pentagon, and other agencies are told that the Islamist militant group Ansar al-Sharia had “claimed responsibility.”[87]
October 25 A suspected Al-Qaeda member who was believed to have been involved in the Consulate attack was shot dead by Egyptian police, after they received a tip that he was staying in an apartment in Madinat Nasr. Egyptian police also arrested a seven-member cell in Cairo, five of whom are Libyans and the other two Egyptians.[88]
October 26 Republican Senators John McCain, Lindsey Graham, and Kelly Ayotte wrote to Defense Secretary Leon Panetta, CIA Director David Petraeus, and Attorney General Eric Holder requesting they make public the surveillance video taken at the consulate during the attack.[89]Fox News reported that military back-up was denied by the CIA chain of command, and the annex was instructed twice to “stand down”. Woods, and two others, ignored those instructions and evacuated the consulate. Upon returning to the annex, and after beginning to taking fire, the annex requested fire support as they had a laser targeted on the mortar team that was attacking them. A CIA spokeswoman, Jennifer Youngblood, denied the claims.[90]
October 27 The Associated Press published a timeline of the comments by the administration and Libyan officials regarding the Benghazi attack,[91] as well as Libyan witnesses account.[92] The AP article noted that a witness said he militants before the attack gathering around 20 youths from nearby to chant against the anti-Islam film. The article reports that American officials suggest it was a planned militant assault and that the attackers may have used the film controversy as a cover for the attack.
October 31 Former House Speaker Newt Gingrich suggested that “at least two networks have emails from the National Security Adviser’s office telling a counterterrorism group to stand down” in assisting the besieged U.S. consulate in Benghazi.[93] Gingrich said that the bombshell emails could be revealed within the next two days.Fox News reported that a cable marked “SECRET” and addressed to the Office of the Secretary of State Hillary Clinton summarized an “emergency meeting” convened by the U.S. Mission in Benghazi on August 15, 2012. In the meeting the State Department’s regional security officer “expressed concerns with the ability to defend Post in the event of a coordinated attack due to limited manpower, security measures, weapons capabilities, host nation support, and the overall size of the compound.” According to Fox News, “The details in the cable seemed to foreshadow the deadly Sept. 11 attack on the U.S. compound, which was a coordinated, commando-style assault using direct and indirect fire. Al Qaeda in North Africa and Ansar al-Sharia, both mentioned in the cable, have since been implicated in the consulate attack.”[94]

November 2012

November 1 CBS News reported that during the attack the Obama administration did not convene its top interagency counterterrorism resource: the Counterterrorism Security Group, (CSG). A high-ranking government official was quoted: “The CSG is the one group that’s supposed to know what resources every agency has. They know of multiple options and have the ability to coordinate counterterrorism assets across all the agencies. They were not allowed to do their job. They were not called upon.”[95] The article goes on to state that counterterrorism sources and internal emails reviewed by CBS News expressed frustration that key responders were ready to deploy but were not called upon to help in the attack.

Documents found by reporters for the American magazine Foreign Policy on Oct. 26 amid the wreckage of the U.S. consulate indicate there was concern about security at the compound. One letter dated Sept. 11 and addressed to Mohamed Obeidi, the head of the Libyan Ministry of Foreign Affairs’ office in Benghazi, reads in part: “Finally, early this morning at 0643, September 11, 2012, one of our diligent guards made a troubling report. Near our main gate, a member of the police force was seen in the upper level of a building across from our compound. It is reported that this person was photographing the inside of the U.S. special mission and furthermore that this person was part of the police unit sent to protect the mission.”[96] The article states that this accords with a message written by Smith, the IT officer who was killed in the assault, on a gaming forum on Sept. 11. “Assuming we don’t die tonight. We saw one of our ‘police’ that guard the compound taking pictures,” he wrote hours before the assault.

Washington Post published a detailed CIA timeline of the attack described by a senior intelligence official.[97]

November 2 Fifty-three members of the House of Representatives sent a letter to President Obama and Secretary Clinton requesting responses to oversight questions, including questions on the president’s Daily Brief, how the State Department designated the Benghazi compound (and how it affected security requirements), contradictions in the administration’s public statements of the attack as a deliberate terrorist attack or a spontaneous protest, and discrepancies between danger pay increases for mission personnel but denial for additional security.[98]Senior U.S. intelligence officials acknowledged that Woods and Doherty were contracted by the Central Intelligence Agency, not the State Department as originally publicly identified.[99]

Fox News reported that U.S. military intelligence informed senior commanders as early as 7 p.m. ET (that is, less than 4 hours after the attack began) that Ansar al-Sharia carried out the attack. The intelligence was relayed with no caveats, according to a source familiar with the intelligence.[100]

The Pentagon said that two U.S. service members volunteered to join the CIA team that travelled from Tripoli to Benghazi on the rescue mission.[101]

November 3 U.S. Senators John McCain (R-AZ), Lindsey Graham (R-SC) and Kelly Ayotte (R-NH) urged the immediate creation of a temporary Select Committee to investigate the Benghazi attack.[102]Fox News reported that the Blue Mountain Security manager (who was in charge of the local force hired to guard the consulate perimeter) made calls on both two-way radios and cell phones to colleagues in Benghazi warning of problems at least an hour earlier than the attack. Allegedly, those calls were to local security contractors, who say that the annex was also notified much earlier than 9:40 p.m., when the attack started. U.S. military intelligence also said that armed militias were gathering up to 3 hours before the attack.[103]
November 9 David H. Petraeus resigned his position as CIA Director and admitted to having an extramarital affair; he was scheduled to testify before Congress the week of November 12 on the Benghazi attack.[104] As of then it was not clear that General Petraeus would have to testify, and whether he would be disposed to do so if requested or required by Congress, though Senator Dianne Feinstein, D-CA, Chair of the Senate Intelligence Committee, indicated that the Congress would need to interview him. On Wednesday, November 14, 2012, it was made known that he had agreed to testify the following day, Thursday, November 15.[105]
November 10 The Department of Defense released a press release stating they released a detailed timeline yesterday of the Pentagon’s response to the attack.[106]
November 12 Paula Broadwell gave a talk on October 26 at the University of Denver in which she revealed that the CIA annex was used to imprison Libyan militia members.[107] In the same speech, Broadwell speculated that this may have been the motivation behind the attack on the consulate.[108] A Fox News Source confirmed to them that the CIA Annex was used as a detention center for not just militia members, but for prisoners from all parts of Northern Africa and the Middle East. The CIA has denied these allegations.[109]
November 15 U.S. intelligence and counter-terrorism officials testified in congressional public and closed hearings today.[110] CNN reported that legislators saw “real-time film (showing) exactly what happened”, starting before the attack began up “through the incident and the exodus,” according to Sen. Dianne Feinstein. The video was reported to be from “a combination of video from a surveillance camera and a drone.”[111]
November 16 Former CIA Director David Petraeus testified in closed hearings to both congressional intelligence committees. Speaking with reporters after the hearing, Representative Peter T. King (R-NY), Chairman of the House Committee on Homeland Security, said that Petraeus testified that he knew that the attack was a terrorist attack linked to al-Qaeda affiliates and not sparked by a protest over an anti-Islam video, as White House officials and President Obama had said for days afterwards.[112] “The original talking points put out by the CIA were different from what was later put out,” King said. “Petraeus says his initial assessment was from the start it was a terrorist attack.” King said a CIA analyst specifically told lawmakers that the al-Qaeda affiliates line “was taken out.”[113]

Other House members in attendance at the hearing said that Petraeus made clear that the modifications of the original talking points were not done for political reasons. Petraeus “was adamant there was no politicization of the process, no White House interference or political agenda,” said Rep. Adam Schiff (D-CA). “He completely debunked that idea.” Regarding Ambassador Susan Rice‘s comments during television interviews after the attack, Schiff went on to say that the, according to Petraeus, the comments “reflected the best intelligence at the time that could be released publicly”. “There was an interagency process to draft it, not a political process,” Schiff said. “They came up with the best assessment without compromising classified information or source or methods. So changes were made to protect classified information.”[114] According to Petraeus’s statements during the hearing, administration officials were concerned that, by publicly disclosing the involvement of Al Qaeda affiliates and sympathizers in the attack, those groups would be tipped off that US government agencies were aware of their involvement.[115]

The Washington Post reported that, since the attack, the CIA and other intelligence analysts have settled on a hybrid view of the attack, suggesting that the Cairo protest sparked militants in Libya, who quickly mobilized the assault on U.S. facilities in Benghazi.[116] Details about possible al-Qaeda links were not in initial talking points used by both Petraeus and UN Ambassador Susan Rice because they were preliminary and based on classified sources, intelligence officials said.

November 20 CBS News reported that the Office of the Director of National Intelligence (DNI) cut specific references to “al Qaeda” and “terrorism” from the unclassified talking points given to Ambassador Susan Rice on the attack, with the agreement of the CIA and FBI.[117]
November 27 In a White House press briefing to reporters, Press Secretary Jay Carney told reporters: “There was no protest outside the Benghazi facility. To this day, it is the assessment of this administration and of our intelligence community and certainly the assessment of your colleagues and the press who have interviewed participants on the ground in the assault on our facilities in Benghazi that they acted at least in part in response to what they saw happening in Cairo and took advantage of that situation.”[118]

U.S. Ambassador to the UN Susan Rice testified for about an hour in a closed session with Republican Senators John McCain, Lindsey Graham, and Kelly Ayotte.[119] McCain told reporters after the meeting: “We are significantly troubled by many of the answers that we got, and some that we didn’t get, concerning evidence that was overwhelming leading up to the attack on our consulate…. It is clear that the information that she gave the American people was incorrect when she said that it was a spontaneous demonstration triggered by a hateful video.” Rice later issued a statement saying: “We explained that the talking points provided by the intelligence community, and the initial assessment upon which they were based, were incorrect in a key respect: there was no protest or demonstration in Benghazi…. While, we certainly wish that we had had perfect information just days after the terrorist attack, as is often the case, the intelligence assessment has evolved.”

December 2012

December 7 The House Committee on Foreign Affairs announced that Secretary of State Hillary Clinton will testify, as early as next week, at an open hearing on the Benghazi attack.[120]
December 15 Hillary Clinton faints and suffers a concussion. As a result, her aides announce that they no longer expect her to testify at the hearing on the Benghazi attack.[121]
December 18 An independent inquiry into the attack sharply criticises State Department officials in Washington for ignoring requests for more guards and safety upgrades, and for failing to adapt security procedures to a deteriorating security environment.[122]
December 31 A bipartisan Senate Homeland Security Committee report faults the State Department and Pentagon for providing inadequate protection to the U.S. Consulate. It also criticized the Obama Administration’s handling of the attack.[123]

January 2013

January 23 Hillary Clinton testifies before Congress on the subject of the attack. She decries the “politicization” of incident, and defends the State Department.[124][125] Noteworthy highlights from her testimony include her comment, “What difference, at this point, does it make?” in response to questions about why the Benghazi attack occurred and how the controversial talking points were created. She also stated, in response to Senator Rand Paul‘s question about the U.S. transferring weapons to Turkey from Libya, “I do not know. I don’t have any information on that,” further stating, “you’ll have to direct that question to the agency that ran the annex.”[126]

February 2013

February 07 Leon Panetta and Martin Dempsey testify before Senate Armed Services Committee on the subject of the attack. Under questioning by Lindsey Graham, Panetta and Dempsey said that they both only talked to President Obama one time on the day of the attack.[127][128][129]
February 18 The United States has been denied access to individuals who were detained after a raid in the Nasr City neighborhood of Cairo by Egyptian officials. One of these individuals is Muhammad Jamal al Kashef, who is suspected of establishing training camps where attackers of the Benghazi consulate and CIA annex had trained.[130][131]

April 2013

April 23 House Republicans released a report on the Benghazi attack that was highly critical of the White House and the State Department; the White House dismissed the report, and House Democrats called the report biased.[132]Among dozens of findings, the report[133] states that:

  • “Senior State Department officials knew that the threat environment in Benghazi was high and that the Benghazi compound was vulnerable and unable to withstand an attack, yet the department continued to systematically withdraw security personnel”
  • The “[Obama] Administration willfully perpetuated a deliberately misleading and incomplete narrative that the attacks evolved from a political demonstration caused by a YouTube video.”
  • “… after a White House Deputies Meeting on Saturday, September 15, 2012, the Administration altered the talking points to remove references to the likely participation of Islamic extremists in the attacks. The Administration also removed references to the threat of extremists linked to al-Qa’ida in Benghazi and eastern Libya….”
  • “The Administration deflected responsibility by blaming the IC [intelligence community] for the information it communicated to the public in both the talking points and the subsequent narrative it perpetuated.”

May 2013

May 8 Gregory Hicks, Eric Nordstrom, and Mark Thompson testify before the United States House Committee on Oversight and Government Reform,[134] and were called “whistleblowers” by the committee chairman.[135] Hicks testified that more assistance from the U.S. military could have been provided, that attempts to send additional forces were told to stand down by another authority, and he was demoted for telling his recollection of events; the Defense Department disputed Hicks’ testimony, and the State Department did not respond.[136][137] Hicks further stated that since the Libyan government had called the attack a terrorist attack, and the United States did not, complicated the FBI investigation.[136] Thompson testified that a Foreign Emergency Support Team was not sent due to instructions from the State Department, which the State Department said would have taken too long to be effective; Nordstrom criticized the Accountability Review Board, that it did not look into decisions made by those individuals in higher authority.[136] Furthermore, they testified that their previous attempts to increase security leading up to the attacks were denied.[136] Democrats charged that the Republicans were politicizing the investigation.[138]

August 2013

August 06 The United States Department of Justice filed the first criminal charges in the Benghazi attack against Ahmed Abu Khattala, leader of a Libyan militia. The charges were sealed and their exact nature wasn’t clear, nor was the number of suspects named in the case. The Justice Department declined to comment on specific charges.[139][140]

2014

May 8 House voted 232–186 to establish the United States House Select Committee on Benghazi, with 225 Republicans and 7 Democrats in favor, and 186 Democrats voting against.[141]

2015

May 8 House Select Committee chairman Trey Gowdy releases a 15-page “interim progress report.”[142]
June 16 House Select Committee deposition of Clinton aide Sidney Blumenthal about State Department emails sent on Secretary Clinton’s private email server, linking the Benghazi controversy to the Hillary Clinton email controversy.[143]

External links

https://en.wikipedia.org/wiki/Timeline_of_the_investigation_into_the_2012_Benghazi_attack

Ansar al-Sharia (Libya)

From Wikipedia, the free encyclopedia
Ansar al-Sharia in Libya
أنصار الشريعة بليبيا
Participant in the Factional violence in Libya (2011–14) and the Second Libyan Civil War
Ansar al-Sharia Libya Logo.jpg
Flag of Ansar al-Sharia (Libya).svg
Logo & flag of Ansar al-Sharia

ActiveJune 2012–present[1][2]IdeologyIslamism
Salafist JihadismLeaders

Abu Khalid al Madani[3]

Mohamed al-Zahawi [4]

Area of operationsBenghazi[5]
Other cities in Eastern Libya [6]Strength4,500–5,000+[7]Part ofShura Council of Benghazi Revolutionaries
Shura Council of Mujahideen in Derna
Ajdabiya Shura CouncilOriginated asFebruary 17th Martyrs Brigade
Abu Obayda bin al-Jarah Brigade
Malik Brigade[1]Allies

Ansar al-Sharia (Tunisia)

AQIM[8]
Libya Shield 1
Rafallah al-Sahati Brigade[9]
Abu Salim Martyrs Brigade

OpponentsAl-Saiqa (Libya)
Operation Dignity coalitionBattles and warsSecond Libyan Civil War

Ansar al-Sharia in Libya (ASL, English: Partisans of Islamic Law) is a Salafist Islamist militia group that advocates the implementation of strict Sharia law across Libya.[1] Ansar al-Sharia came into being in 2011, during the Libyan Civil War. Until January 2015, it was led by its “Emir“, Mohamed al-Zahawi.[4] The organization has deliberately targeted both Libyan and American civilians and took part in the 2012 Benghazi attack. The group has been designated as a terrorist organization by the United Nations,[10] Turkey, the UAE, the United Kingdom and the United States.[11]

Contents

Background

Ansar al-Sharia was formed during the Libyan Civil War and rose to prominence after the killing of Muammar Gaddafi. Made up of former rebels from the Abu Obayda Bin Aljarah Brigade, Malik Brigade and February 17th Martyrs Brigade and many more,[7] the Salafist militia initially made their name by posting videos of themselves fighting in the Battle of Sirte, the final battle in the war.[12]

Their first major public appearance occurred on 7 June 2012, when they led a rally of as many as 200 pickup trucks mounted with artillery[13] along Benghazi’s Tahrir Square and demanded the imposition of Sharia law.[14] According to the New York Times, “Western diplomats who watched said they were stunned by the scale and weaponry of the display.”[13]

The leader of Ansar al-Sharia, Sheikh Muhammad al-Zahawi, later gave an interview on a local TV station forbidding participation in Libya’s first post-civil war parliamentary elections on the grounds that they were un-Islamic.[15] The militia went on to provide security to some public property in eastern Libya, including Benghazi’s Al Jala Hospital.[12] The group is reportedly the military arm of Al-Dawa wa Al-Islah, a charitable organization.[16]

Noman Benotman, a former member of the Libyan Islamic Fighting Group and analyst of Libyan Islamism claims that Ansar al Sharia is less an organization than a term applied to an amorphous coalition of Islamist and Salafist groups active in eastern Libya.[17] The logo of the Ansar al-Sharia is a pair of AK-47 assault rifles, a clenched fist with one finger pointed up, an open Koran, and a black flag.[18]

Activities

Fawzi Bukatef, the leader in Benghazi of the rival Islamist militia February 17th Martyrs Brigade, claimed that members of the organisation had been responsible for the assassination of Abdul Fatah Younis, the commander of rebel forces during the Libyan Civil War.[19]

Ansar al-Sharia carried out destruction of Sufi shrines in Benghazi, which they regarded as idolatrous.[20] In November 2011, Libyan Salafis engaged in a series of attacks on Sufi shrines all over the country.[21] Mohamed Yousef el-Magariaf, the president of the General National Congress (GNC) denounced the shrine attacks as “disgraceful acts” and said “those involved were criminals who would be pursued.”[21]

Ansar al-Sharia used its online presence to denounce the 2013 capture and removal from Libya of al-Qaeda operative Abu Anas al-Libi, by American military forces.[22]

Aside from militant activities, Ansar al-Sharia has attempted to gain local support through Dawah (missionary activities), the provision of social services, ranging from security patrols to garbage collection, and the establishment of medical clinics and religious schools.[8] In January 2015, the group introduced Islamic religious police and a sharia court in parts of Benghazi.[23]

2012 U.S. Consulate attack in Benghazi

On 11 September 2012, the United States Department of State Operations Center advised the White House Situation Room and other U.S. security units that Ansar al-Sharia was claiming responsibility for the attack on the U.S. diplomatic mission in Benghazi that had just occurred.[24] Witnesses said they saw vehicles with the group’s logo at the scene of the assault and that fighters there acknowledged at the time that they belonged to Ansar al-Sharia.[19] Witnesses also said they saw Ahmed Abu Khattala, a commander of Ansar al-Sharia, leading the embassy attack, a claim Mr. Khattala denied.[25] According to longwarjournal.org, the group issued a statement asserting that it “didn’t participate as a sole entity” and that the attack “was a spontaneous popular uprising” to the film trailer Innocence of Muslims, widely condemned as anti-Islamic.[26]

As of 6 August 2013, U.S. officials confirmed that Ahmed Abu Khattala, the Libyan leader of Ansar al-Sharia, has been charged with playing a significant role in last year’s attack on the U.S. diplomatic compound in Benghazi. According to NBC, the charges were filed under seal in Washington, D.C. in late July.[27] Khattalah was arrested by U.S. Delta Force special operations personnel in a raid on Libya on 15 June 2014.[28][29] He is being transported to the United States aboard the USS New York aircraft carrier and is expected to face trial in a U.S. criminal court.[30]

Temporary withdrawal and resurgence

On 21 September 2012, after massive anti-militia protests in Benghazi which largely blamed Ansar al-Sharia for the mission attack, hundreds of protesters stormed the militia headquarters, pulled down flags of the militia and torched a vehicle inside the base.[31] The group was forced out of its bases in Benghazi the next day.[32]

A few hours after the attack, Martyrs of February 17, together with Bou Salim Martyrs brigade, allegedly agreed to disband,[33] however about 150-200 militiamen moved from Benghazi to Jebel Akhdar area.[34]

As of December 2012, the group still existed, although it had adopted a low-key position.[35] By March 2013, the group had returned to Benghazi and began patrolling hospitals and manning checkpoints, as well as providing humanitarian services to residents.[36] By late 2013, the group had opened up a branch in Derna, under the slogan “A step toward building the Islamic state”.[37] The group also established a presence in the Libyan cities of Ajdabiya and Sirte.[6]

Second Libyan Civil War

Following prolonged tensions between Islamists and non-Islamists in Libya, on 16 May 2014 military forces loyal to General Khalifa Belqasim Haftar launched a large scale air and ground offensive codenamed Operation Dignity on Islamist militia groups in Benghazi including Ansar al-Sharia.[38][39]

After initial reverses, Ansar al-Sharia, and other Islamist and jihadist militias fighting together as the Shura Council of Benghazi Revolutionaries, launched a counteroffensive against units loyal to Haftar in the following months, largely driving them out of the city by August of the same year.[40][41] After capturing several army bases in this offensive, Ansar al Sharia posted images on the internet of the weapons and equipment that had seized, including D-30 Howitzers, Multiple rocket launchers, Strela 2 Man-portable air-defense systems, large quantities of ammunition and vehicles.[41][42]

In late 2014, the group’s leader, Mohamed al-Zahawi, died of wounds he had received from the fighting.[4] In the months that followed, many members of Ansar al-Sharia, including the majority of its organisation in Sirte, reportedly defected to the Islamic State of Iraq and the Levant in Libya.[43][44] On 30 March 2015, the group’s chief Sharia jurist, Abu Abdullah Al-Libi, pledged allegiance to ISIL,[45] and defected with a number of fighters. Ansar al-Sharia quickly announced that Abu Tamim al Libi has been selected as his replacement.[46] While there have been rumors that the group could pledge allegiance to ISIL, it has retained its independence.[23]

Designation as a terrorist organization

The countries and organizations below have officially listed the Ansar Al Sharia as a terrorist organization.

Country Date References
 United States 10 January 2014 [11]

https://en.wikipedia.org/wiki/Ansar_al-Sharia_%28Libya%29

Covert operation

From Wikipedia, the free encyclopedia
This article is about a particular use of the term connected with military and political organizations. For covert operations in intelligence gathering, organized crime and religious or minor political groups, see Front organization.
“Covert operative” redirects here. For the legal definition of covert agents or operatives, see covert agent.

According to the U.S. Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation.

Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the Congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action.[1] The CIA’s authority to conduct covert action comes from the National Security Act of 1947.[2] President Ronald Reagan issued Executive Order 12333 titled United States Intelligence Activities in 1984. This order defined covert action as “special activities”, both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e).[2][3] The CIA must have a “Presidential Finding” issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act.[1] These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives.[4] As a result of this framework, the CIA “receives more oversight from the Congress than any other agency in the federal government”.[5] The Special Activities Division (SAD) is a division of the CIA’s National Clandestine Service, responsible for Covert Action and “Special Activities”. These special activities include covert political influence and paramilitary operations. The division is overseen by the United States Secretary of State.[2]

Law enforcement

Undercover operations (such as sting operations or infiltration of organized crime groups) are conducted by law enforcement agencies to deter and detect crime and to gather information for future arrest and prosecution.

Military intelligence and foreign policy

See also: Active measures

Covert operations and clandestine operations are distinct. The Department of Defense Dictionary of Military and Associated Terms (Joint Publication JP1-02), defines “covert operation” as “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor. A covert operation differs from a clandestine operation in that emphasis is placed on concealment of identity of sponsor rather than on concealment of the operation.” The United States Department of Defense definition has been used by the United States and NATO since World War II.

In a covert operation, the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means “hidden,” while covert means “deniable.” The term stealth refers both to a broad set of tactics aimed at providing and preserving the element of surprise and reducing enemy resistance and to a set of technologies (stealth technology) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealthy are not used to formally describe types of missions.

Covert operations are employed in situations where openly operating against a target would be disadvantageous. These operations are generally illegal in the target state and are frequently in violation of the laws of the sponsoring country. Operations may be directed at or conducted with allies and friends to secure their support for controversial components of foreign policy throughout the world. Covert operations may include sabotage, assassinations, support for coups d’état, or support for subversion. Tactics include the use of a false flag or front group.

The activity of organizations engaged in covert operations is in some instances similar to, or overlaps with, the activity of front organizations. While covert organizations are generally of a more official military or paramilitary nature, like the DVS German Air Transport School in the Nazi era, the line between both becomes muddled in the case of front organizations engaged in terrorist activities and organized crime.

Examples

Notable covert operators

The following persons are known to have participated in covert operations, as distinct from clandestine intelligence gathering (espionage) either by their own admission or by the accounts of others:

Representations in popular culture

Covert operations have often been the subject of popular novels, films (Zero Dark Thirty, Argo, The Falcon and The Snowman, The Kremlin Letter), TV series, comics, etc. The Company is a fictional covert organization featured in the American television drama/thriller series Prison Break. Also other series that deal with covert operations are Mission: Impossible, Alias, Burn Notice, The Unit, The State Within, Covert Affairs, Air Wolf, and 24, and The Blacklist.

See also

References

  • Executive Secrets: Coved the Presidency, William J. Daugherty, University of Kentucky Press, 2004, page 25.
  • Executive Secrets: Covert Action and the Presidency, William J. Daugherty, University of Kentucky Press, 2004.
  • All Necessary Means: Employing CIA operatives in a Warfighting Role Alongside Special Operations Forces, Colonel Kathryn Stone, Professor Anthony R. Williams (Project Advisor), United States Army War College (USAWC), 7 April 2003, page 7
  • Daugherty, 2004, page 28.
  1. Daugherty, 2004, page 29.

External links

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 556-557

Listen To Pronk Pops Podcast or Download Show 546-555

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Is President Obama Sabotaging The Federal Bureau of Investigation Of Hillary Clinton’s Handling of Classified Documents? American People Want To Know — Will Hillary Clinton Be Indicted or Nominated? Yes Hillary Will Be Indicted For Violation of 18 U.S. Code § 793 and §798 and §1924 — Biden Backup to Replace Hillary Clinton — California Governor Jerry Brown To Enter Race? — Videos

Posted on October 17, 2015. Filed under: American History, Blogroll, Central Intelligence Agency (CIA), College, Communications, Computers, Congress, Corruption, Crime, Crisis, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Education, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, government spending, history, Homicide, Islam, Islam, Law, liberty, Life, Links, Literacy, Money, National Security Agency (NSA_, People, Philosophy, Photos, Police, Politics, Presidential Candidates, Security, Shite, Spying, Strategy, Sunni, Talk Radio, Terrorism, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

 

Story 1: Is President Obama Sabotaging The Federal Bureau of Investigation Of Hillary Clinton’s Handling of Classified Documents? American People Want To Know — Will Hillary Clinton Be Indicted or Nominated? Yes Hillary Will Be Indicted For Violation of 18 U.S. Code § 793 and  §798 and  §1924 — Biden Backup to Replace Hillary Clinton — California Governor Jerry Brown To Enter Race? — Videos

bill and hillary clinton Clinton snowden

Democratic presidential candidate Hillary Rodham Clinton meets with local residents at the Jones St. Java House, Tuesday, April 14, 2015, in LeClaire, Iowa. (AP Photo/Charlie Neibergall)

Hillary-Clinton-Young-Cons Hillary-FBI

FBI Probe: Hillary Clinton Could Face 10 Years In Prison

Obama Calls Clinton Secret Server A “Mistake,” Says Questions About Her Actions “Legitimate”

Firebrand Trey Gowdy Dismantles Ex-Staffer’s Claim That Benghazi Committee Is Partisan

MSNBC Panel: Even The President Says Hillary Clinton’s Emails Are A Legitimate Issue

Top Republican: Hillary Clinton still withholding Benghazi emails

Hillary Clinton’s Favorability Numbers at the Lowest Since 1992

Obama: Criticism Of Hillary Clinton’s Private Email ‘Ginned Up’ Because Of Politics

FBI FURY: OBAMA SABOTAGING HILLARY INVESTIGATION

Rand Paul: Clinton Fired an ambassador for using a private email server; 10-16-2015

Obama Tells ‘60 Minutes’ Hillary Clinton Made Email ‘Mistake’

MSNBC: CIA’s Most Closely Guarded Information Passed Through Clinton Email

Wife of Imprisoned CIA Whistleblower Jeffrey Sterling Speaks Out October 15, 2015

Unprecedented News Conference: Thursday, October 15, 2015, National Press Club, Washington

Jeffrey Sterling was convicted under the Espionage Act as a source for New York Times reporter James Risen’s book State of War. He began serving his three-and-a-half year prison sentence in June. His wife’s news conference was the first time the spouse of a CIA whistleblower has made such an appearance.
National Press Club President John Hughes opened the conference, which featured:
* Thomas Drake
* Delphine Halgand
* Ray McGovern
* Jesselyn Radack

Clinton’s Deleted Emails On ‘Cloud’ Server

The saga over Hillary Clinton’s private use of an email server continues. The FBI is now investigating deleted emails from a “cloud” storage system. On Friday October 2, 2015 Platte River and Clinton’s officials gave written consent for Datto Inc. (a Connecticut-based tech company) to release Clinton’s emails to the FBI. Deputy Press Secretary at the Republican National Committee, Raffi Williams, discusses what this means for Hillary Clinton’s presidential campaign. OANN’s Matt Schuck has this story.

Uh Oh! Hillary’s Emailgate Just Got Worse! MUCH WORSE! FBI Expands…

FBI’s Hillary email net expands

Judge Says Hillary Clinton’s Private Emails Were Classified, Violated Policy – America’s Newsroom

Could Hillary Clinton face prosecution over email scandal?

Minute Memo #174 – Clinton Hiding Benghazi Emails

Newly released emails of Hillary Clinton show new legal trouble up ahead.
According to investigative reporter Sharyl Attkinsson, Clinton deliberately hid information on the Benghazi terror attack in blatant violation of Freedom of Information Act requests.
According to Attkinsson:
“The newly-released batch of Hillary Clinton emails provides further proof that Freedom of Information (FOI) law has been blatantly violated.
The documents include material directly responsive to a FOI request I made back in 2012 after the Benghazi terrorist attacks on the U.S. compounds.
However, the material was not produced at the time, as required by law.
Once again, there appears to be nobody who holds government officials and agencies accountable for their routine violation of this law. So the infractions occur frequently and with impunity.
If nobody polices our government officials and agencies–if they are above the law–then how does a lawful society function?”

Judge Napolitano: FBI Will Recommend Hillary Clinton Be Indicted

Mark Levin: Hillary Clinton in Violation of Espionage Act • Hannity • 9/2/15 •

Newsmax Prime | Alan Dershowitz talks about the FBI investigating Hillary Clinton’s email server

Hillary Jokes About FBI Investigation

September 24, 2015: Sen. Tom Cotton questions NSA Director about Clinton Emails

 

‘Under Penalty of Perjury’: Judge Nap on Latest Twist in Hillary’s Email Scandal

Judge Andrew Napolitano appeared on “The Kelly File” tonight to weigh in on the latest developments in the Hillary Clinton email scandal.

A federal judge has demanded that Clinton and two of her most trusted aides go on the record “under penalty of perjury” regarding the private email server Clinton used during her time as Secretary of State.

Judge Napolitano noted that when the government suspected that Gen. Petraeus kept secure documents in his home, they raided it.

In Clinton’s case, Judge Napolitano pointed out, the government doesn’t suspect she has secure documents. It’s a known fact.

Not only that, but she gave a thumb drive with that secure information to her lawyer, Judge Napolitano added.

“Mrs. Clinton should be treated like anybody else who is obviously violating the law by failing to secure classified documents and keeping them in insecure venues not approved by the government,” Judge Napolitano stated.

He said that the federal judge’s use of the phrase “under penalty of perjury” is extremely significant, because it reminds Clinton that for the first time, she will be under oath.

Morrell confirms at least one foreign country have what was on Hillary’s email server.

Hillary Emails – Trey Gowdy Lays It Out

13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined

White House Covers Up Benghazi Terrorist Attack (INCLUDING NEW REPORTS)

CIA Contractor: I Told State Department Rep. Benghazi Was Terrorist Attack

White House Covers Up Benghazi Terrorist Attack – New BBC Science Documentary HD

Obama LIED About Benghazi Attack!!! (Lt. Col. Tony Shaffer Interview)

CIA Gun Runner: Hillary’s Benghazi Crimes Confirmed

SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria

Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood

Source: FBI probe of Clinton email focused on ‘gross negligence’ provision

By Catherine Herridge, Pamela Browne

Three months after Hillary Clinton’s use of a private email address and server while secretary of state was referred to the FBI, an intelligence source familiar with the investigation tells Fox News that the team is now focused on whether there were violations of an Espionage Act subsection pertaining to “gross negligence” in the safekeeping of national defense information.

Under 18 USC 793 subsection F, the information does not have to be classified to count as a violation. The intelligence source, who spoke on the condition of anonymity citing the sensitivity of the ongoing probe, said the subsection requires the “lawful possession” of national defense information by a security clearance holder who “through gross negligence,” such as the use of an unsecure computer network, permits the material to be removed or abstracted from its proper, secure location.

Subsection F also requires the clearance holder “to make prompt report of such loss, theft, abstraction, or destruction to his superior officer. “A failure to do so “shall be fined under this title or imprisoned not more than ten years, or both.”

The source said investigators are also focused on possible obstruction of justice. “If someone knows there is an ongoing investigation and takes action to impede an investigation, for example destruction of documents or threatening of witnesses, that could be a separate charge but still remain under a single case,” the source said. Currently, the ongoing investigation is led by the Washington Field Office of the FBI.

A former FBI agent, who is not involved in the case, said the inconsistent release of emails, with new documents coming to light from outside accounts, such as that of adviser Sidney Blumenthal, could constitute obstruction. In addition, Clinton’s March statement that there was no classified material on her private server has proven false, after more than 400 emails containing classified information were documented.

Clinton and her team maintain the use of a private account was allowed, and the intelligence was not classified at the time, but later upgraded. The latter claim is disputed by the intelligence community Inspector General, who represents the agencies involved, which concluded the information was classified from the start.

One of Clinton’s primary defenses is that the emails containing classified information, did not carry classification markings, but a leading national security defense attorney says that is no excuse under the law.

“The fact that something’s not marked or that the person may not know that it was classified would not be relevant at all in a prosecution under the Espionage Act,” defense attorney Edward MacMahon Jr. recently told Fox.

It is not known what relevant evidence, if any, has been uncovered by the FBI, or whether any charges will ultimately be brought, but Director James Comey told reporters in Washington D.C. on Oct. 1, “If you know my folks… they don’t give a rip about politics.”

On Thursday, a group of national security whistleblowers held a news conference in Washington at the National Press Club to highlight what they characterized as a double standard in these types of cases.

NSA whistleblower Thomas Drake was indicted in 2010 under the Espionage Act for sharing unclassified material with a Baltimore Sun reporter. Drake, who also went to Congress with his concerns about the NSA, said his goal was to expose government misconduct.

“This is the secretary of state, one of the most targeted individuals by other intelligence entities and agencies in the world using a private server to traffic highly sensitive information and no doubt including classified information and no doubt including info about sources and methods,”Drake said at Thursday’s event.

He added the whistleblowers’ treatment shows there is a law for the average citizen, and apparently a different set of rules for the powerful.

“But hey, I’m secretary of state,” Drake said in a sarcastic tone. ”Even Obama gave her cover.”

The charges against Drake were eventually dropped. He pled guilty to a misdemeanor, but in the process lost his ability to work in national security and depleted his life savings to mount a defense.

Former CIA officer Jeffrey Sterling also went to Congress with his complaints, but was sentenced in May to three-and-a-half years in prison for violating the Espionage Act by giving classified information to a New York Times reporter. Sterling, who is appealing the case, was also convicted on obstruction of justice charges because a single email was missing from his account, even though the government could not show he was responsible for that.

Clinton has acknowledged deleting some 30,000 emails she considered personal.

In 2015, former CIA Director General David Petraeus pled guilty to a misdemeanor admitting he mishandled classified materials by sharing notebooks with his former mistress and biographer, Paula Broadwell.

He also was ordered to pay a $100,000 fine. Sterling’s supporters said he shared far less classified information with the New York Times.

“Powerful and politically connected individuals accused of the same and much worse conduct receive, at most, a slap on the wrist. Like General David Petraeus who gave away more secret information, classified at a much higher level, to his mistress and received a sweetheart plea deal for a minor misdemeanor,”Jesselyn Radack, a whistleblower and former ethics adviser to the Department of Justice, said Thursday.

“Or Hillary Clinton – she got a primetime TV apologist political spin interview from President Obama himself,” Radack added.

http://www.foxnews.com/politics/2015/10/15/source-fbi-probe-clinton-email-focused-on-gross-negligence-provision/

Eight Laws Hillary Clinton Could Be Indicted For Breaking

Kenneth P. Bergquist

Brigadier General, U.S. Army (Ret)

As a former Justice Department official, I have, of late, been asked by both Democratic and Republican friends whether Hillary Clinton could be indicted for her email related actions. The simple answer is yes — she, and perhaps some of her senior staff, could be indicted for violating a number of federal criminal statutes. But for reasons that will be discussed later, it is unlikely that she will be.

Nevertheless, it is well worth discussing the various criminal provisions of federal law that she and others may have been violated based on mainstream news reports. Remember that news reporting can be incorrect or incomplete — and that Hillary Clinton, and anyone else involved, deserves every presumption of innocence. Also keep in mind that an indictment is not a conviction but rather the informed opinion of a grand jury that probable cause exists to believe one or more violations of federal criminal statutes have transpired.

This intellectual and legal research exercise should commence with a brief review of the basics of criminal jurisprudence: There are two elements of a criminal offense: the prohibited conduct as defined in statute; and the mens rea or mental intent of the individual or individuals engaging in the prohibited conduct. Thus, to gain a conviction on a criminal count in an indictment, a prosecutor must prove beyond a reasonable doubt that: (1) the prohibited conduct occurred, (2) the prohibited conduct was undertaken by the defendant, and (3) the defendant had the requisite mens rea or intent at the time.

1.) 18 U.S. Code § 793 – Gathering, transmitting or losing defense information
18 U.S. Code § 798 – Disclosure of classified information

A federal prosecutor would naturally focus first on the most serious allegations: willfully transmitting or willfully retaining Top Secret and Compartmented (TS/SCI) material using a private server system. The individual who transmits and the individual who receives and retains TS/SCI information on a private server jointly share the culpability for risking the compromise and exploitation of the information by hostile intelligence services. The prosecutor’s charging document would likely include felony counts under 18 U.S. Code § 793 and under 18 U.S. Code § 798 against each transmitting individual as well as separate counts against each receiving and retaining individual. Violation of either provision of the U.S. Code cited above is a felony with a maximum prison term of ten years.

The prohibited conduct is the insecure transmission of highly classified information, as well as the receipt and retention of highly classified information in an unapproved manner. The requisite mens rea is the willful commission of the prohibited conduct and the knowledge that compromised information could result in prejudice or injury to the United States or advantage to any foreign nation. Proof of intent to disclose the classified information is not required.

2.) U.S. Code § 1924 – Unauthorized removal and retention of classified documents or material

If the federal prosecutors are of a charitable disposition and an accused person has been cooperative, the felony charges under 18 U.S. Code § 793 and 18 U.S. Code § 798 may be “pled-down” to a single or to multiple misdemeanor counts under 18 U.S. Code § 1924. A misdemeanor conviction would probably result in a period of probation and a less significant fine. The prohibited conduct is the unauthorized removal of classified information from government control or its retention in an unauthorized location. The mens rea required is the intent to remove from government control or the intent to store the classified information in an unauthorized location.
3.) 18 U.S. Code § 2071(b) — Concealment, removal, or mutilation generally

To sustain a charge under 18 U.S. Code § 2071(b), a federal prosecutor need only prove that the accused transferred and held the only copies of official government records (whether classified or not), the very existence of which was concealed from government records custodians. The mens rea required is that an accused knows that official government records were transferred or removed from the control of government records custodians. Violation of 18 U.S. Code § 2071(b) is a felony with a maximum prison term of three years.

4.) 18 U.S. Code § 641 – Public money, property or records

Again, if the federal prosecutors are of a charitable disposition and accused has been cooperative, the felony charges under 18 U.S. Code § 2071(b) can be “pled down” to a misdemeanor under 18 U.S. Code § 641. The prohibited conduct is the conversion of official records (whether classified or not) to the accused’s exclusive use and the mens rea is simply the intent to do so. Conviction on the lesser misdemeanor charge would likely result in a period of probation and the imposition of a fine.

5.) 18 U.S. Code § 1505 – Obstruction of proceedings before departments, agencies, and committees

If it can be proven that an accused destroyed, withheld, or concealed the existence of official records being sought under subpoena by a committee of Congress, the accused can be convicted of obstruction under 18 U.S. Code § 1505. The prohibited conduct includes destruction, concealment and withholding of documents, thereby impeding or obstructing the committee’s rightful pursuit of information. The mens rea is knowledge of the committee’s interest in obtaining the official records in the accused’s custody or control. Violation of 18 U.S. Code § 1505 is a felony with a maximum prison term of five years.

6.) 18 U.S. Code § 1519 — Destruction, alteration, or falsification of records in federal investigations

If it can be proven that an accused knowingly concealed the existence of official records being sought by the Department of State Inspector General (DOS/IG) or by the Federal Bureau of Investigation (FBI), such accused can be convicted of obstruction. The prohibited conduct is the concealment and withholding of documents that impede or obstruct an investigation. The mens rea is the intent to conceal or withhold. Violation of 18 U.S. Code § 1519 is a felony with a maximum prison term of twenty years.

7.) 18 U.S. Code § 1031 — Fraud against the United States
18 U.S. Code § 1343 – Fraud by wire, radio or television
18 U.S. Code § 1346 — Definition of “scheme or artifice to defraud”
18 U.S. Code § 371 – Conspiracy to defraud the United States

If it can be proven that an accused arranged for the Department of State to hire an Information Technology (IT) specialist to primarily administer and maintain a private server system owned by the accused, then the accused can be convicted of conspiracy to commit honest services fraud and probably wire fraud. The prohibited conduct is having the United States pay an employee salary and/or official travel funds for performing private services on behalf of accused. The mens rea is simply the knowledge of the employee’s status as a public servant and that the government was not fully reimbursed for the costs to the government of such services. The wire fraud conviction can be sought if it can be proven that accused used electronic means of communication in undertaking such scheme or artifice to defraud.

8.) 18 U.S. Code § 371 – Conspiracy to commit a federal offense

If any accused and any third party can be proven to have colluded in any violation of federal, criminal law, then all involved can be charged with criminal conspiracy as well as being charged with the underlying offense.

Indictment?

The old adage, that a good prosecutor can get a ham sandwich indicted, is bad news for any public servant who risks the compromise of classified information or otherwise violates any of the other federal criminal statutes listed above. Specifically, this Administration has a history of vigorously prosecuting and winning convictions in the mishandling of classified information and other criminal violations of the public trust.

However, Hillary Clinton is anything but a ham sandwich; and she knows it. She and her senior aides will not even be formally investigated by this Justice Department, much less indicted. The president will allow Hillary Clinton and her aides to “tough it out” for as long it is politically possible. However, if and when the political and public opinion costs of a “tough it out” tactic become too great, President Obama will simply use that famous pen of his to issue a succinct pardon and make formal mockery of the concept of equal justice.

Kenneth Bergquist served as a Deputy Assistant Attorney General in the United States Department of Justice during the Reagan Administration and serves now as pro bono legal counsel to the Special Operations Education Fund (OPSEC).

Read more: http://dailycaller.com/2015/09/21/eight-laws-hillary-clinton-could-be-indicted-for-breaking/#ixzz3omBYzjeq

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 546-555

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

American People’s Verdict On Democratic Socialist Debate: Lying Lunatic Left — Hillary Clinton — Bernie Sanders — Martin O’Malley — Lincoln Chaffee — Guilty As Charged — Indict or Nominate or Pardon Hillary Clinton — Biden Biding Time Until Benghazi Testimony of Clinton — Worse Economic Recovery Since Great Depression and 7 Years of Economic Stagnation Under Obama — No Change — No Hope — Videos

Posted on October 14, 2015. Filed under: American History, Blogroll, Business, Central Intelligence Agency (CIA), Communications, Congress, Constitution, Corruption, Crime, Crisis, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Employment, Faith, Family, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Foreign Policy, Fraud, Freedom, Genocide, government, history, Homicide, Illegal, Immigration, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Money, Narcissism, National Security Agency (NSA), Newspapers, People, Philosophy, Photos, Police, Political Correctness, Politics, Presidential Candidates, Press, Psychology, Radio, Rants, Raves, Regulations, Religious, Resources, Security, Speech, Strategy, Talk Radio, Taxation, Taxes, Television, Terrorism, Unemployment, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Story 1: American People’s Verdict On Democratic Socialist Debate: Lying Lunatic Left — Hillary Clinton — Bernie Sanders — Martin O’Malley — Lincoln Chaffee — Guilty As Charged — Indict or Nominate or Pardon Hillary Clinton —  Biden Biding Time Until Benghazi Testimony of Clinton — Worse Economic Recovery Since Great Depression and 7 Years of Economic Stagnation  Under Obama — No Change — No Hope — Videos

BILL-DAY-HILLARY-PHISHING hillary nsacartoon hillary emails  hillary-clinton-e-mails-cartoon-beeler Hillary-Clinton-s-shadowy-emails hillary-email-cartoon-cole

LAS VEGAS, NV - OCTOBER 13: (L-R) Democratic presidential candidates Jim Webb, U.S. Sen. Bernie Sanders (I-VT), Hillary Clinton, Martin O'Malley and Lincoln Chafee take the stage for a presidential debate sponsored by CNN and Facebook at Wynn Las Vegas on October 13, 2015 in Las Vegas, Nevada. The five candidates are participating in the party's first presidential debate. (Photo by Joe Raedle/Getty Images)

LAS VEGAS, NV – OCTOBER 13: (L-R) Democratic presidential candidates Jim Webb, U.S. Sen. Bernie Sanders (I-VT), Hillary Clinton, Martin O’Malley and Lincoln Chafee take the stage for a presidential debate sponsored by CNN and Facebook at Wynn Las Vegas on October 13, 2015 in Las Vegas, Nevada. The five candidates are participating in the party’s first presidential debate. (Photo by Joe Raedle/Getty Images)

Bernie Sanders vs. Hillary Clinton | Democratic Presidential Debate Analysis

Obama’s message to Democratic debate candidates

In a taped message to the Democratic candidates, President Barack Obama urged Democrats to work hard and fight to keep the White House in 2016.

Who were the winners and losers of the Democratic debate?

Bernie Sanders : People are sick of hearing about Hillary Clinton’s “damn emails”

Mom Of Benghazi Victim Demands Answers While Hillary Clinton Laughs Off Email Scandal

Winners and losers at first Democratic debate

Clinton and Sanders dominate first Democratic debate

The Best Moments From The First Democratic Primary Debate

Democratic debate CNN — democratic debate 2016 Full … Sanders,Clinton,Omalley,Webb,Chafee

Bernie Sanders continues to shock the political world

Hillary & Democrats May Not Cooperate With Benghazi Committee

Dem Debate #1: Mature Adults, Not Lunatics. Did Hillary or Bernie Win?

Emails Show Clinton Worked With George Soros To Run Shadow Gov’t

The real scandal surrounding Democratic presidential hopeful Hillary Clinton’s private email system may be that she was running, in concert with a private consulting firm tied closely to George Soros, an outsourced and parallel State Department answerable only to her and not President Obama, the Congress, or the American people.

INFOWARS Nightly News: CNN Democratic Debate Coverage Tuesday October 13 2015

Who Won The First Democratic Debate In Terms Of Body Language?

Carol Kinsey Goman

The major story of the first televised presidential debate in 1960 became the photogenic appeal of John F. Kennedy versus the sickly look of his opponent, Richard Nixon, who refused to wear makeup although his recent illness had left him with a pallid complexion. In addition, Kennedy looked directly at the camera when answering questions (rather that at the journalists who asked them), which made viewers see him as someone who was talking right to them and giving straight answers. To make matters worse, the cameras caught Nixon wiping perspiration from his forehead while Kennedy was pressing him on the issues.

When the debate ended, a large majority of television viewers recognized Kennedy as the winner. Radio listeners, who heard the debate but hadn’t seen it, gave the victory to Nixon.

Never again would politicians under estimate the importance of physical appearance and body language – especially when appearing on television. Today’s political figures are fully aware of, and heavily coached on, the impact of nonverbal communication.

And when it comes to nonverbal cues, everything matters: Gender, age, skin color, hair style, attractiveness, height, clothing, facial expressions, hand gestures, posture — audiences judge it all. Superficial? Maybe. But this potent (and often unconscious) process is also hardwired in the human brain.
There are two sets of nonverbal signals that are especially important for candidates to project: warmth and authority. Warmth cues project likeability and candor and authority cues denote power and status. The most appealing politicians (at least from a body language standpoint) are those whose behaviors encompass both sets of signals.

Which brings me to the first Democratic debate of the 2016 election cycle — and how I would grade the body language of the debaters.

Hillary Clinton, former secretary of state

Grade: A-

How she did it: Clinton is often described, by both supporters and critics, as strong, tough, and aggressive. So it was no surprise to see those qualities exhibited in her body language through expansive gestures, erect posture, and well-prepared responses.

Recommended by Forbes
MOST POPULAR Photos: The World’s Top-Earning YouTube Stars 2015
TRENDING ON FACEBOOK Bernie Sanders Clearly Won Tuesday’s Debate — On Twitter
SungardASVoice: How Cloud Orchestration Keeps Cloud Computing In Perfect Harmony

Leadership Presence And The GOP Debate
Hits And Misses From The Second GOP Debate
So, Who Won The First Republican Primary Debate of 2012? -Media Training

But Clinton’s body language won the debate by doing more than displaying authority. She successfully “warmed up” her image, with smiles, head nods in agreement/support of other’s comments, and (at one point) even laughter.

Visually, being the only woman on stage was also to her advantage. The contrast between Clinton and the rest of the (white, male) candidates was visually striking – especially for someone who wants to show how she would be different from previous presidents.

Bernie Sanders, senator of Vermont

Grade: B+

How he did it: Unlike Clinton, who (for better or worse) is a known national figure, Sanders needed to give the audience a clear picture of who he is and what he stands for – and he was very effective doing so last night. Sanders was animated and used gestures (like finger pointing and palms rotated down) to effectively emphasize his resolve – although at times, his movements were a bit jerky, instead of smooth. And for those who were wondering if a 74-year old could keep his energy high for two hours, the answer was a resounding “yes.”

Sanders nonverbal negatives include his leaning too often on the lectern (as if he needed physical support) and in his lack of warm cues. He is much more expressive when showing anger, disgust, and impatience – but rarely does he display joy or express optimism.

Martin O’Malley, former governor Maryland

Grade: C

How he did it: While he never had the “break through” moment his campaign was hoping for, nonverbally O’Malley had a significant nonverbal advantage: He looked fit and athletic – and he was the tallest person in the line up. Don’t discount the effect of these seemingly trivial facts. We are biased toward attractive, healthy people, and we unconsciously attribute leadership characteristics to tall people. (The effects of this are seen not only in politics, but in business. For example, in the U.S. population, 14.5% men are 6’ tall and over, but with CEOs of Fortune 500 companies, that statistic climbs to 58%.) But his softer, slower communication style often lacked the energy and passion needed to support his rhetoric. And his deadpan, almost angry expression when other candidates were speaking was tweeted about as the “death stare” – not a good look for someone who is usually seen as upbeat and happy.

Jim Webb, former senator of Virginia

Grade C-

How he did it: Webb is known as being “gruff” and “stiff,” and both of those qualities were displayed nonverbally: Outside of a slight lean backward and a shoulder shrug now and then, he rarely moved his body – adding to his stoic image.

Lincoln Chaffee, former governor of Rhode Island

Grade: D

How he did it: Chafee’s body language was filled with nervous facial gestures (lip licking was especially prevalent) and conflicting nonverbal messages, the most noticeable being a smile with tightened or compressed lips that made the otherwise warm signal look forced and inauthentic.

The only missing contender in last night’s debate was Vice President Joe Biden, who hasn’t declared his intention to run. Too bad. He is passionate and expressive. He would have been interesting to watch.

https://www.youtube.com/watch?v=DvjU0xLWrv4

 

EVIDENCE SHOWS CLINTON RAN A PARALLEL, OUTSOURCED STATE DEPT.

Clinton received help from George Soros to run shadow gov’t
The real scandal surrounding Democratic presidential hopeful Hillary Clinton’s private email system may be that she was running, in concert with a private consulting firm tied closely to George Soros, an outsourced and parallel State Department answerable only to her and not President Obama, the Congress, or the American people.

The media has tried to separate two dubious operations of Mrs. Clinton while she was at the State Department. The first is the private email server located in her Chappaqua, New York residence. The second is the fact that her government-paid State Department personal assistant, Huma Abedin, wife of disgraced New York “sexting” congressman Anthony Weiner, was simultaneously on the payroll of Teneo, a corporate intelligence firm that also hired former President Bill Clinton and former British Prime Minister Tony Blair as advisers. Abedin has been linked to the Muslim Brotherhood, which has recently buried the hatchet with longtime rival Saudi Arabia and common cause against the Assad government in Syria, the Houthi rebels in Yemen, and Iran.

It is clear that Mrs. Clinton used her private email system to seek advice on major foreign policy issues, from her friend and paid Clinton Foundation adviser Sidney Blumenthal providing private intelligence on Libya’s post-Qaddafi government and possible business ventures to Clinton friend Lanny Davis seeking favors from Mrs. Clinton. It should be noted that Davis was a paid lobbyist for the military junta of Honduras that overthrew democratically-elected President Manuel Zelaya in 2009. It also should be noted that Mrs. Clinton voiced her personal dislike for the late Libyan leader Muammar Qaddafi, when, after he was assassinated by U.S.-armed jihadist rebels, boasted, “We came, we saw, he died!”

It was highly unusual for Abedin to receive a U.S. government paycheck while also receiving a consultant’s salary from Teneo. Teneo was founded in 2011 by Doug Band, a former counselor to Bill Clinton. Teneo, which is as much a private intelligence firm as it is an investment company and “governance” consultancy, has its headquarters in New York and branches in Washington DC, Brussels, São Paulo, London, Dublin, Dubai, Hong Kong, Beijing, and Melbourne. With the exception of its investment arm, Teneo closely resembles the former CIA-connected firm where Barack Obama worked after he graduated from Columbia, Business International Corporation (BIC). Teneo’s marketing claims match those made by BIC during its heyday: Teneo works “exclusively with the CEOs and senior leaders of many of the world’s largest and most complex companies and organizations.”

Teneo has staked a position in the international news media with its recent purchase of the London-based firm Blue Rubicon, formed in part by the former home news editor for Channel 4 News in the United Kingdom. Teneo also recently acquired London’s Stockwell Group, which provides consultancy services to the National Bank of Greece and Pireaus Bank. It appears that Mrs. Clinton’s friends are cashing in on the global banking austerity being levied against Greece.

The head of Teneo Intelligence is Jim Shinn, a former assistant secretary for Asia for the Defense Department. What is troubling is that Teneo has been offering statements to the media designed to heighten tensions between NATO and Turkey on one side and Russia on the other over Russia’s military attacks on the Islamic State in Syria. Shinn’s intelligence chief in Teneo’s London office, Wolfgango Piccoli, who has worked for the Soros-linked Eurasia Group consultancy, told CNN that Russia’s “reinforcement of the Assad regime and the consolidation of separate areas of control is more likely to prolong the conflict by forcing a stalemate.” The Teneo statement came in a CNN report that suggests members of the Bashar al Assad government in Syria and Russian President Vladimir Putin and his government could be charged by international or “national” tribunals for war crimes in a manner similar to those convened on members of the Yugoslavian and Serbian governments.

The entire International Criminal Court (ICC) in The Hague and in Africa has fallen under the control of George Soros and his operatives. Soros has made no secret of his support for overthrowing Assad and Putin and he has resorted to a “weapon of mass migration” of Syrian, Iraqi, and other refugees into Europe in order to destabilize the entire continent and endanger its Christian culture and social democratic traditions. Mrs. Clinton and Soros extensively used Mrs. Clinton’s private email system to exchange, among other things, information on the political situation in Albania, a country where Soros’s operatives are plentiful and powerful. Soros is a major donor to the Clinton Foundation and Mrs. Clinton’s presidential campaign.

Soros also pressed Mrs. Clinton for State Department support for his American University of Central Asia, which, as seen with Soros’s Central European University in Budapest and its graduate ranks of pro-U.S. leaders throughout central and eastern Europe, is designed to manufacture a new generation of pro-U.S. leaders in the Central Asian states of the former Soviet Union.
The “wiping” of Mrs. Clinton’s email systems’ hard drives appear to be part of a classic case of an intelligence operation destroying data after being exposed.

The Clinton outsourcing of U.S. foreign policy not only involves Teneo but also the Clinton Foundation, for which Mrs. Clinton solicited donations from foreign sources while she served as Secretary of State. Moreover, in a classic example of racketeering, Bill Clinton was paid by Teneo as an adviser while his Clinton Foundation hired Teneo as as a consultant. The Clinton Foundation is directed by Bill and Hillary Clinton, along with their daughter Chelsea Clinton Mezvinsky. Mrs. Clinton’s private email use also extended to Clinton Foundation chief financial officer Andrew Kessel and longtime Bill Clinton friend Bruce Lindsey.

One of the emails sent via Mrs. Clinton’s private system was from her State Department counsel Cheryl Mills to Amitabh Desai, the head of foreign policy for the Clinton Foundation. Mills wanted Desai to arrange a meeting between Rwandan dictator Paul Kagame with the Democratic Republic of Congo strongman Joseph Kabila during Kagame’s visit to Kinshasa in 2012. This effort was conducted outside the State Department with the sole exception that Assistant Secretary of State for African Affairs Johnnie Carson, a close friend of Mrs. Clinton, was involved in the email exchange with Mills and Desai.

Other private email use involved Hollywood magnate Haim Saban, Loews heir Andrew Tisch, and Lynn de Rothschild, all of whom were peddling Israel’s interests to Hillary and Bill Clinton in return for sizable donations to the Clinton Foundation and Mrs. Clinton’s presidential campaign.

Under the Clinton Giustra Enterprise Partnership, the Clinton Foundation received generous financial support totaling some $31 million from Frank Giustra, a Canadian uranium mining magnate. Giustra relied on the Clintons to use their influence to open up lucrative uranium exploitation opportunities in places like Kazakhstan and Africa.

Senator Chuck Grassley (R-IA) has been stonewalled in his attempt to obtain more information about Teneo’s relationship with Mrs. Clinton, the Clinton Foundation, and Bill Clinton.

Wayne Madsen is an investigative journalist who consistently exposes cover-ups from deep within the government. Want to be the first to learn the latest scandal? Go to WayneMadsenReport.com subscribe today!

http://www.infowars.com/evidence-suggests-clinton-ran-a-parallel-outsourced-state-dept/

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 546-553

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Obama The Tyrant Races To Have The United Nations Security Council Pass The Traitorous Terrorist Treaty Before Congress Votes It Down — Congress and President Betray The United States Constitution –Just Walk Way From Both Political Parties — Never Again Fasicism — Videos

Posted on July 20, 2015. Filed under: American History, Ammunition, Articles, Babies, Banking, Blogroll, Bomb, Books, British History, Bunker Busters, Business, Central Intelligence Agency (CIA), College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Defense Intelligence Agency (DIA), Diasters, Dirty Bomb, Documentary, Drones, Economics, Education, Ethic Cleansing, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government Budget, Fiscal Policy, Fraud, Freedom, Friends, Genocide, government, government spending, Illegal, Immigration, Islam, Language, Law, Legal, liberty, Life, media, Middle East, Missiles, Monetary Policy, Money, Music, National Security Agency (NSA_, Natural Gas, Non-Fiction, Nuclear, Nuclear Proliferation, Oil, Philosophy, Photos, Pistols, Police, Politics, Press, Public Sector, Radio, Rants, Raves, Regulations, Religious, Resources, Securities and Exchange Commission, Security, Speech, Talk Radio, Tax Policy, Taxation, Taxes, Terrorism, Unemployment, Union, Unions, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Pronk Pops Show 496: June 30, 2015

Pronk Pops Show 495: June 29, 2015

Pronk Pops Show 494: June 26, 2015

Pronk Pops Show 493: June 25, 2015

Pronk Pops Show 492: June 24, 2015

Pronk Pops Show 491: June 23, 2015

Pronk Pops Show 490: June 22, 2015

Pronk Pops Show 489: June 19, 2015

Pronk Pops Show 488: June 18, 2015

Pronk Pops Show 487: June 17, 2015

Pronk Pops Show 486; June 16, 2015

Pronk Pops Show 485: June 15, 2015

Pronk Pops Show 484: June 12, 2015

Pronk Pops Show 483: June 11, 2015

Pronk Pops Show 482; June 10, 2015

Pronk Pops Show 481: June 9, 2015

Pronk Pops Show 480: June 8, 2015

Pronk Pops Show 479: June 5, 2015

Pronk Pops Show 478: June 4, 2015

Pronk Pops Show 477: June 3, 2015

Pronk Pops Show 476: June 2, 2015

Pronk Pops Show 475: June 1, 2015

Pronk Pops Show 474; May 29, 2015

Pronk Pops Show 473: May 28, 2015

Pronk Pops Show 472: May 27, 2015

Pronk Pops Show 471: May 26, 2015

Pronk Pops Show 470: May 22, 2015

Pronk Pops Show 469: May 21, 2015

Pronk Pops Show 468: May 20, 2015

Pronk Pops Show 467: May 19, 2015

Pronk Pops Show 466: May 18, 2015

Pronk Pops Show 465: May 15, 2015

Pronk Pops Show 464; May 14, 2015

Pronk Pops Show 463; May 13, 2015

Pronk Pops Show 462: May 8, 2015

Pronk Pops Show 461: May 7, 2015

Pronk Pops Show 460; May 6, 2015

Pronk Pops Show 459: May 4, 2015

Pronk Pops Show 458: May 1, 2015

Pronk Pops Show 457: April 30, 2015

Pronk Pops Show 456: April 29, 2015

Pronk Pops Show 455: April 28, 2015

Pronk Pops Show 454: April 27, 2015

Pronk Pops Show 453: April 24, 2015

Pronk Pops Show 452: April 23, 2015

Pronk Pops Show 451: April 22, 2015

Pronk Pops Show 450: April 21, 2015

Pronk Pops Show 449: April 20, 2015

Pronk Pops Show 448: April 17, 2015

Pronk Pops Show 447: April 16, 2015

Pronk Pops Show 446: April 15, 2015

Pronk Pops Show 445: April 14, 2015

Pronk Pops Show 444: April 13, 2015

Pronk Pops Show 443: April 9, 2015

Pronk Pops Show 442: April 8, 2015

Pronk Pops Show 441: April 6, 2015

Pronk Pops Show 440: April 2, 2015

Pronk Pops Show 439: April 1, 2015

Story 1: Obama The Tyrant Races To Have The United Nations Security Council Pass The Traitorous Terrorist Treaty Before Congress Votes It Down — Congress and President Betray The United States Constitution — Just Walk Way From Both Political Parties — Never Again Fasicism — Videos

Incredible! New George S Patton speech! Iran & modern warfare

The Iran nuclear deal. Good deal or bad deal?

George Pataki: Iran deal is bad for civilized world

White House, Democrats divided over Iran nuclear deal

KEY POINTS OF HISTORIC IRAN NUCLEAR DEAL

Bolton: Nuke Deal ‘Paves the Way’ for Iran to Get Nuclear Weapons

Mitch McConnell Fox News Sunday. McConnell On Iran Deal, Ted Cruz, Donald Trump

July 14, 2015 Fiorina on nuclear deal with Iran: Bad behavior pays

Trump reacts to Obama’s Iran deal presser, El Chapo’s escape

Key Republican Senator Corker Angry Over Iran Nuclear Deal

Blackburn: Iran Nuclear Deal is Bad for the United States

Levin: ‘U.S. Senate Just Capitulated To Obama,’ And Rewrote The Constitution’s Treaty Provision

Just Walk Way From Both Political Parties

Discusses Iran Nuclear Agreement Review Act on FOX News Channel’s “The O’Reilly Factor”

“TREATY” – The Word Congress Won’t Use

Judge Napolitano : Obama pushes World Government by signing U.N. Arms Trade Treaty (Sep 26, 2013)

Obama Bringing Iran Deal to UN, Bypassing Congress

The Four Tops Walk Away Renee

Four Tops – It’s The Same Old Song (1966)

UN ENDORSES IRAN NUCLEAR DEAL WITH 6 WORLD POWERS

The U.N. Security Council on Monday unanimously endorsed the landmark nuclear deal between Iran and six world powers and authorized a series of measures leading to the end of U.N. sanctions that have hurt Iran’s economy.

But the measure also provides a mechanism for U.N. sanctions to “snap back” in place if Iran fails to meet its obligations.

Both U.S. Ambassador Samantha Power and Iran’s U.N. Ambassador Gholamali Khoshroo called the agreement an important achievement for diplomacy, the Iranian promising to be “resolute in fulfilling its obligations” and the American pledging to be vigilant in ensuring they are carried out.

The resolution had been agreed to by the five veto-wielding council members, who along with Germany negotiated the nuclear deal with Iran. It was co-sponsored by all 15 members of the Security Council. The European Union’s foreign ministers endorsed the agreement later Monday in Brussels and pledged to implement it.

Under the agreement, Iran’s nuclear program will be curbed for a decade in exchange for potentially hundreds of billions of dollars’ worth of relief from international sanctions. Many key penalties on the Iranian economy, such as those related to the energy and financial sectors, could be lifted by the end of the year.

Iran insists its nuclear program is purely peaceful, aimed at producing nuclear energy and medical isotopes, but the United States and its Western allies believe Tehran’s real goal is to build atomic weapons. U.S. President Barack Obama has stressed that all of Iran’s pathways to a nuclear weapon are cut off for the duration of the agreement and Iran will remove two-thirds of its installed centrifuges and get rid of 98 percent of its stockpile of uranium.

Britain’s U.N. Ambassador Matthew Rycroft said “the world is now a safer place in the knowledge that Iran cannot now build a nuclear bomb.” But Israel’s U.N. Ambassador Ron Prosor told reporters immediately after the vote that the Security Council had “awarded a great prize to the most dangerous country in the world,” calling it “a very sad day” not only for Israel but the entire world.

The document specifies that seven resolutions related to U.N. sanctions will be terminated when Iran has completed a series of major steps to curb its nuclear program and the International Atomic Energy Agency has concluded that “all nuclear material in Iran remains in peaceful activities.”

All provisions of the U.N. resolution will terminate in 10 years, including the “snap back” provision on sanctions.

But last week the six major powers – the U.S., Russia, China, Britain, France and Germany – and the European Union sent a letter, seen by The Associated Press, informing U.N. Secretary-General Ban Ki-moon that they have agreed to extend the snap back mechanism for an additional five years. They asked Ban to send the letter to the Security Council.

Obama told reporters the vote will send a strong message of international support for the agreement as the best way to ensure “that Iran does not get a nuclear weapon.” He faces strong opposition in the Republican-controlled Congress and expressed hope that members will pay attention to the vote.

Power, the U.S. ambassador, said the nuclear deal doesn’t change the United States’ “profound concern about human rights violations committed by the Iranian government or about the instability Iran fuels beyond its nuclear program, from its support for terrorist proxies to repeated threats against Israel to its other destabilizing activities in the region.”

She urged Iran to release three “unjustly imprisoned” Americans and to determine the whereabouts of Robert Levinson, a former FBI agent who vanished in Iran in 2007.

The message that diplomacy can work ran through many speeches from council members.

Iran’s Khoshroo stressed that only if commitments are fully honored “can diplomacy prevail over conflict and war in a world that is replete with violence, suffering and oppression.”

Russia’s U.N. Ambassador Vitaly Churkin said the agreement “clearly demonstrates that where there’s a political will based on realism and respect for legitimate mutual interests of the international community, the most complex tasks can be resolved.”

“Today, the Security Council has confirmed the inalienable right of Iran to develop its peaceful nuclear program, including to enrich uranium, while ensuring the comprehensive control by the IAEA,” Churkin said.

http://hosted.ap.org/dynamic/stories/U/UN_UNITED_NATIONS_IRAN_NUCLEAR_DEAL?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2015-07-20-12-04-13

 

Article II, Section 2, Clause 2 of the United States Constitution, includes the Treaty Clause, which empowers the President of the United States to propose and chiefly negotiate agreements, which must be confirmed by the Senate, between the United States and other countries, which become treaties between the United States and other countries after the advice and consent of a supermajority of the United States Senate.

Full text of the clause

[The President] shall have Power, by and with the Advice and Consent of the Senate, to make Treaties, provided two thirds of the Senators present concur…

One of three types of international accord

In the United States, the term “treaty” is used in a more restricted legal sense than in international law. U.S. law distinguishes what it calls treaties from congressional-executive agreements and sole-executive agreements.[1] All three classes are considered treaties under international law; they are distinct only from the perspective of internal United States law. Distinctions among the three concern their method of ratification: by two-thirds of the Senate, by normal legislative process, or by the President alone, respectively. The Treaty Clause [2] empowers the President to make or enter into treaties with the “advice and consent” of two-thirds of theSenate. In contrast, normal legislation becomes law after approval by simple majorities in both the Senate and the House of Representatives.

Throughout U.S. history, the President has also made international “agreements” through congressional-executive agreements (CEAs) that are ratified with only a majority from both houses of Congress, or sole-executive agreements made by the President alone.[1] Though the Constitution does not expressly provide for any alternative to the Article II treaty procedure, Article I, Section 10 of the Constitution does distinguish between treaties (which states are forbidden to make) and agreements (which states may make with the consent of Congress).[3] The Supreme Court of the United States has considered congressional-executive and sole-executive agreements to be valid, and they have been common throughout American history. Thomas Jefferson explained that the Article II treaty procedure is not necessary when there is no long-term commitment:

It is desirable, in many instances, to exchange mutual advantages by Legislative Acts rather than by treaty: because the former, though understood to be in consideration of each other, and therefore greatly respected, yet when they become too inconvenient, can be dropped at the will of either party: whereas stipulations by treaty are forever irrevocable but by joint consent….[4]

A further distinction embodied in U.S. law is between self-executing treaties, which do not require additional legislative action, and non-self-executing treaties which do require the enactment of new laws.[1][5] These various distinctions of procedure and terminology do not affect the binding status of accords under international law. Nevertheless, they do have major implications under U.S. domestic law. In Missouri v. Holland, the Supreme Court ruled that the power to make treaties under the U.S. Constitution is a power separate from the other enumerated powers of the federal government, and hence the federal government can use treaties to legislate in areas which would otherwise fall within the exclusive authority of the states. By contrast, a congressional-executive agreement can only cover matters which the Constitution explicitly places within the powers of Congress and the President.[1] Likewise, a sole-executive agreement can only cover matters within the President’s authority or matters in which Congress has delegated authority to the President.[1] For example, a treaty may prohibit states from imposing capital punishment on foreign nationals, but a congressional-executive agreement or sole-executive agreement cannot.

In general, arms control agreements are often ratified by the treaty mechanism.[6] At the same time, trade agreements (such as the North American Free Trade Agreement and United States accession to the World Trade Organization) are generally voted on as a CEA, and such agreements typically include an explicit right to withdraw after giving sufficient written notice to the other parties.[7] If an international commercial accord contains binding “treaty” commitments, then a two-thirds vote of the Senate may be required.[8]

Between 1946 and 1999, the United States completed nearly 16,000 international agreements. Only 912 of those agreements were treaties, submitted to the Senate for approval as outlined in Article II of the United States Constitution. Since the Franklin Roosevelt presidency, only 6% of international accords have been completed as Article II treaties.[1] Most of these executive agreements consist of congressional-executive agreements.

Repeal

American law is that international accords become part of the body of U.S. federal law.[1] Consequently, Congress can modify or repeal treaties by subsequent legislative action, even if this amounts to a violation of the treaty under international law. This was held, for instance, in the Head Money Cases. The most recent changes will be enforced by U.S. courts entirely independent of whether the international community still considers the old treaty obligations binding upon the U.S.[1]

Additionally, an international accord that is inconsistent with the U.S. Constitution is void under domestic U.S. law, the same as any other federal law in conflict with the Constitution. This principle was most clearly established in the case of Reid v. Covert.[9] The Supreme Court could rule an Article II treaty provision to be unconstitutional and void under domestic law, although it has not yet done so.

In Goldwater v. Carter,[10] Congress challenged the constitutionality of then-president Jimmy Carter‘s unilateral termination of a defense treaty. The case went before the Supreme Court and was never heard; a majority of six Justices ruled that the case should be dismissed without hearing an oral argument, holding that “The issue at hand … was essentially a political question and could not be reviewed by the court, as Congress had not issued a formal opposition.” In his opinion, Justice Brennan dissented, “The issue of decision making authority must be resolved as a matter of constitutional law, not political discretion; accordingly, it falls within the competence of the courts”. Presently, there is no official ruling on whether the President has the power to break a treaty without the approval of Congress, and the courts also declined to interfere when President George W. Bush unilaterally withdrew the United States from the ABM Treaty in 2002, six months after giving the required notice of intent.[11]

Scope of presidential powers

Presidents have regarded the Article II treaty process as necessary where an international accord would bind a future president. For example, Theodore Roosevelt explained:

The Constitution did not explicitly give me power to bring about the necessary agreement with Santo Domingo. But the Constitution did not forbid my doing what I did. I put the agreement into effect, and I continued its execution for two years before the Senate acted; and I would have continued it until the end of my term, if necessary, without any action by Congress. But it was far preferable that there should be action by Congress, so that we might be proceeding under a treaty which was the law of the land and not merely by a direction of the Chief Executive which would lapse when that particular executive left office. I therefore did my best to get the Senate to ratify what I had done.[12]

A sole-executive agreement can only be negotiated and entered into through the president’s authority (1) in foreign policy, (2) as commander-in-chief of the armed forces, (3) from a prior act of Congress, or (4) from a prior treaty.[1] Agreements beyond these competencies must have the approval of Congress (for congressional-executive agreements) or the Senate (for treaties).

In 1972, Congress passed legislation requiring the president to notify Congress of any executive agreements that are formed.[13]

Although the nondelegation doctrine prevents Congress from delegating its legislative authority to the executive branch, Congress has allowed the executive to act as Congress’s “agent” in trade negotiations, such as by setting tariffs, and, in the case of Trade Promotion Authority, by solely authoring the implementing legislation for trade agreements. The constitutionality of this delegation was upheld by the Supreme Court in Field v. Clark (1892).

See also

Further reading

Warren F. Kimball, Alliances, Coalitions, and Ententes – The American alliance system: an unamerican tradition

https://www.youtube.com/watch?v=atT1erLYbOE

 

HAMILTON’S WARNING AGAINST OBAMA AND THE IRAN DEAL – FEDERALIST NO. 75

“An ambitious man might make his own aggrandizement, by the aid of a foreign power, the price of his treachery to his constituents.” Thus did Alexander Hamilton warn the American people, in Federalist No. 75, against allowing the president to make treaties alone.

Hamilton, while a supporter of executive power, nevertheless argued for the Senate’s treaty role, because “it would be utterly unsafe and improper to intrust that power to an elective magistrate of four years’ duration.”

It would be unsafe, he said, because even the most virtuous individuals, with the best of intentions, would fall prey to the temptations that negotiations with foreign powers would certainly provide.

How much more so does his advice apply to a president of lesser virtue, such as Barack Obama, who intends to decrease the power of the United States as a matter of ideological conviction, and who seeks narcissistic satisfaction in the attention a deal with Iran would temporarily provide!

Hamilton also anticipated the greed allegedly displayed by Hillary Clinton as Secretary of State, whose perambulations around the globe in service of the president’s dubious foreign policy agenda coincided with generous donations from foreign governments to her family’s personal foundation.

“An avaricious man might be tempted to betray the interests of the state to the acquisition of wealth,” Hamilton warns, prescribing the review powers of the Senate as the remedy.

And lest apologists for Obama argue that the nuclear deal with Iran is not actually a “treaty,” but merely an “executive agreement,” Hamilton leaves no doubt as to the scope of arrangements to which the Senate’s review power applies.

“The power of making treaties,” he says, concerns “CONTRACTS with foreign nations, which have the force of law, but derive it from the obligations of good faith” (original emphasis).

Congress should heed Hamilton’s warning before it is too late.

http://www.breitbart.com/big-government/2015/03/28/alexander-hamiltons-warning-against-obama-and-the-iran-deal/

 

The President… shall have Power, by and with the Advice and Consent of the Senate, to make Treaties, provided two thirds of the Senators present concur….

ARTICLE II, SECTION 2, CLAUSE 2

Teacher’s Companion Lesson (PDF)

The Treaty Clause has a number of striking features. It gives the Senate, in James Madison’s terms, a “partial agency” in the President’s foreign-relations power. The clause requires a supermajority (two-thirds) of the Senate for approval of a treaty, but it gives the House of Representatives, representing the “people,” no role in the process.

Midway through the Constitutional Convention, a working draft had assigned the treaty-making power to the Senate, but the Framers, apparently considering the traditional role of a nation-state’s executive in making treaties, changed direction and gave the power to the President, but with the proviso of the Senate’s “Advice and Consent.” In a formal sense, then, treaty-making became a mixture of executive and legislative power. Most people of the time recognized the actual conduct of diplomacy as an executive function, but under Article VI treaties were, like statutes, part of the “supreme Law of the Land.” Thus, as Alexander Hamilton explained in The Federalist No. 75, the two branches were appropriately combined:

The qualities elsewhere detailed as indispensable in the management of foreign relations point out the executive as the most fit in those transactions; while the vast importance of the trust and the operation of treaties as laws plead strongly for the participation of the whole or a portion of the legislative body in the office of making them.

Another reason for involving both President and Senate was that the Framers thought American interests might be undermined by treaties entered into without proper reflection. The Framers believed that treaties should be strictly honored, both as a matter of the law of nations and as a practical matter, because the United States could not afford to give the great powers any cause for war. But this meant that the nation should be doubly cautious in accepting treaty obligations. As James Wilson said, “Neither the President nor the Senate, solely, can complete a treaty; they are checks upon each other, and are so balanced as to produce security to the people.”

The fear of disadvantageous treaties also underlay the Framers’ insistence on approval by a two-thirds majority of the Senate. In particular, the Framers worried that one region or interest within the nation, constituting a bare majority, would make a treaty advantageous to it but prejudicial to other parts of the country and to the national interest. An episode just a year before the start of the Convention had highlighted the problem. The United States desired a trade treaty with Spain, and sought free access to the Mississippi River through Spanish-controlled New Orleans. Spain offered favorable trade terms, but only if the United States would give up its demands on the Mississippi. The Northern states, which would have benefited most from the trade treaty and cared little about New Orleans, had a majority, but not a supermajority, in the Continental Congress. Under the Articles of Confederation, treaties required assent of a supermajority (nine out of thirteen) of the states, and the South was able to block the treaty. It was undoubtedly that experience that impelled the Framers to carry over the supermajority principle from the Articles of Confederation.

At the Convention, several prominent Framers argued unsuccessfully to have the House of Representatives included. But most delegates thought that the House had substantial disadvantages when it came to treaty-making. For example, as a large body, the House would have difficulty keeping secrets or acting quickly. The small states, wary of being disadvantaged, also preferred to keep the treaty-making power in the Senate, where they had proportionally greater power.

The ultimate purpose, then, of the Treaty Clause was to ensure that treaties would not be adopted unless most of the country stood to gain. True, treaties would be more difficult to adopt than statutes, but the Framers realized that an unwise statute could simply be repealed, but an unwise treaty remained a binding international commitment, which would not be so easy to unwind.

Other questions, however, remained. First, are the provisions of the clause exclusive—that is, does it provide the only way that the United States may enter into international obligations?

While the clause does not say, in so many words, that it is exclusive, its very purpose—not to have any treaty disadvantage one part of the nation—suggests that no other route was possible, whether it be the President acting alone, or the popularly elected House having a role. On the other hand, while the Treaty Clause was, in the original understanding, the exclusive way to make treaties, the Framers also apparently recognized a class of less-important international agreements, not rising to the level of “treaties,” which could be approved in some other way. Article I, Section 10, in describing restrictions upon the states, speaks of “Treat[ies]” and “Agreement[s]…with a foreign Power” as two distinct categories. Some scholars believe this shows that not all international agreements are treaties, and that these other agreements would not need to go through the procedures of the Treaty Clause. Instead, the President, in the exercise of his executive power, could conclude such agreements on his own. Still, this exception for lesser agreements would have to be limited to “agreements” of minor importance, or else it would provide too great an avenue for evasion of the protections the Framers placed in the Treaty Clause.

A second question is how the President and Senate should interact in their joint exercise of the treaty power. Many Framers apparently thought that the President would oversee the actual conduct of diplomacy, but that the Senate would be involved from the outset as a sort of executive council advising the President. This was likely a reason that the Framers thought the smaller Senate was more suited than the House to play a key role in treaty-making. In the first effort at treaty-making under the Constitution, President George Washington attempted to operate in just this fashion. He went to the Senate in person to discuss a proposed treaty before he began negotiations. What is less clear, however, is whether the Constitution actually requires this process, or whether it is only what the Framers assumed would happen. The Senate, of course, is constitutionally authorized to offer “advice” to the President at any stage of the treaty-making process, but the President is not directed (in so many words) as to when advice must be solicited. As we shall see, this uncertainty has led, in modern practice, to a very different procedure than some Framers envisioned. It seems clear, however, that the Framers expected that the Senate’s “advice and consent” would be a close review and not a mere formality, as they thought of it as an important check upon presidential power.

A third difficult question is whether the Treaty Clause implies a Senate power or role in treaty termination. Scholarly opinion is divided, and few Framers appear to have discussed the question directly. One view sees the power to make a treaty as distinct from the power of termination, with the latter being more akin to a power of implementation. Since the Constitution does not directly address the termination power, this view would give it to the President as part of the President’s executive powers to conduct foreign affairs and to execute the laws. When the termination question first arose in 1793, Washington and his Cabinet, which included Hamilton and Thomas Jefferson, embraced this view. All of them thought Washington could, on his own authority, terminate the treaty with France if necessary to keep the United States neutral.

A second view holds that, as a matter of the general eighteenth-century understanding of the legal process, the power to take an action (such as passing a statute or making a treaty) implies the power to undo the action. This view would require the consent of the President and a supermajority of the Senate to undo a treaty. There is, however, not much historical evidence that many Framers actually held this view of treaty termination, and it is inconsistent with the common interpretation of the Appointments Clause (under which Senate approval is required to appoint but not to remove executive officers).

The third view is that the Congress as a whole has the power to terminate treaties, based on an analogy between treaties and federal laws. When the United States first terminated a treaty in 1798 under John Adams, this procedure was adopted, but there was little discussion of the constitutional ramifications.

Finally, there is a question of the limits of the treaty power. A treaty presumably cannot alter the constitutional structure of government, and the Supreme Court has said that executive agreements—and so apparently treaties—are subject to the limits of the Bill of Rights just as ordinary laws are. Reid v. Covert (1957). InGeofroy v. Riggs (1890), the Supreme Court also declared that the treaty power extends only to topics that are “properly the subject of negotiation with a foreign country.” However, at least in the modern world, one would think that few topics are so local that they could not, under some circumstances, be reached as part of the foreign-affairs interests of the nation. Some have argued that treaties are limited by the federalism interests of the states. The Supreme Court rejected a version of that argument in State of Missouri v. Holland (1920), holding that the subject matter of treaties is not limited to the enumerated powers of Congress. The revival of interest in federalism limits on Congress in such areas as state sovereign immunity, see Seminole Tribe of Florida v. Florida (1996), and the Tenth Amendment, see Printz v. United States (1997), raises the question whether these limits also apply to the treaty power, but the Court has not yet taken up these matters.

Turning to modern practice, the Framers’ vision of treaty-making has in some ways prevailed and in some ways been altered. First, it is not true—and has not been true since George Washington’s administration—that the Senate serves as an executive council to advise the President in all stages of treaty-making. Rather, the usual modern course is that the President negotiates and signs treaties independently and then presents the proposed treaty to the Senate for its approval or disapproval. Washington himself found personal consultation with the Senate to be so awkward and unproductive that he abandoned it, and subsequent Presidents have followed his example.

Moreover, the Senate frequently approves treaties with conditions and has done so since the Washington administration. If the President makes clear to foreign nations that his signature on a treaty is only a preliminary commitment subject to serious Senate scrutiny, and if the Senate takes seriously its constitutional role of reviewing treaties (rather than merely deferring to the President), the check that the Framers sought to create remains in place. By going beyond a simple “up-or-down” vote, the Senate retains some of its power of “advice”: the Senate not only disapproves the treaty proposed by the President but suggests how the President might craft a better treaty. As a practical matter, there is often much consultation between the executive and members of the Senate before treaties are crafted and signed. Thus modern practice captures the essence of the Framers’ vision that the Senate would have some form of a participatory role in treaty-making.

A more substantial departure from the Framers’ vision may arise from the practice of “executive agreements.” According to the Restatement of Foreign Relations Law of the United States, the President may validly conclude executive agreements that (1) cover matters that are solely within his executive power, or (2) are made pursuant to a treaty, or (3) are made pursuant to a legitimate act of Congress. Examples of important executive agreements include the Potsdam and Yalta agreements of World War II, the General Agreement on Tariffs and Trade, which regulated international trade for decades, and the numerous status-of-forces agreements the United States has concluded with foreign governments.

Where the President acts pursuant to a prior treaty, there seems little tension with the Framers’ vision, as Senate approval has, in effect, been secured in advance. Somewhat more troublesome is the modern practice of so-called congressional–executive agreements, by which some international agreements have been made by the President and approved (either in advance or after the fact) by a simple majority of both houses of Congress, rather than two-thirds of the Senate. Many of these agreements deal particularly with trade-related matters, which Congress has clear constitutional authority to regulate. Congressional–executive agreements, at least with respect to trade matters, are now well established, and recent court challenges have been unsuccessful. Made in the USA Foundation v. United States (2001). On the other hand, arguments for “complete interchangeability”—that is, claims that anything that can be done by treaty can be done by congressional–executive agreement—seem counter to the Framers’ intent. The Framers carefully considered the supermajority rule for treaties and adopted it in response to specific threats to the Union; finding a complete alternative to the Treaty Clause would in effect eliminate the supermajority rule and make important international agreements easier to adopt than the Framers wished.

The third type of executive agreement is one adopted by the President without explicit approval of either the Senate or the Congress as a whole. The Supreme Court and modern practice embrace the idea that the President may under some circumstances make these so-called sole executive agreements. United States v. Belmont (1937); United States v. Pink (1942). But the scope of this independent presidential power remains a serious question. The Pink and Belmont cases involved agreements relating to the recognition of a foreign government, a power closely tied to the President’s textual power to receive ambassadors (Article II, Section 3). The courts have consistently permitted the President to settle foreign claims by sole executive agreement, but at the same time have emphasized that the Congress has acquiesced in the practice. Dames & Moore v. Regan (1981);American Insurance Ass’n v. Garamendi (2003). Beyond this, the modern limits of the President’s ability to act independently in making international agreements have not been explored. With respect to treaty termination, modern practice allows the President to terminate treaties on his own. In recent times, President James Earl Carter terminated the U.S.–Taiwan Mutual Defense Treaty in 1977, and President George W. Bush terminated the ABM Treaty with Russia in 2001. The Senate objected sharply to President Carter’s actions, but the Supreme Court rebuffed the Senate in Goldwater v. Carter (1979). President Bush’s action was criticized in some academic quarters but received general acquiescence. In light of the consensus early in Washington’s administration, it is probably fair to say that presidential termination does not obviously depart from the original understanding, inasmuch as the Framers were much more concerned about checks upon entering into treaties than they were about checks upon terminating them.

Profile photo of Michael D. Ramsey

Michael D. Ramsey
Professor of Law
University of San Diego School of Law

http://www.heritage.org/constitution#!/articles/2/essays/90/treaty-clause

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 500-508

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

First Official Explosive Documentation From Defense Intelligence Agency (DIA) — Profiles in Deceit — Obama And Clinton Lying To The Families That Died in Benghazi and The American People — Why? Coverup of CIA Covert Operation Including Supervision of Arms Shipments Through Third Party Cutout To Syrian Rebels Including Al Qaeda and Islamic Jihadist Terrorists (Now Islamic State) And Win Second Term For Obama and First Term For Hillary Clinton — Both Incompetent and Untrustworthy Leftist Liars — Impeach Obama Now! — Videos

Posted on May 22, 2015. Filed under: Ammunition, Articles, Blogroll, Business, Central Intelligence Agency (CIA), Communications, Constitution, Corruption, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Drones, Economics, Energy, Faith, Family, Federal Government, government, government spending, Islam, Law, liberty, Life, Links, media, Natural Gas, Natural Gas, Oil, Oil, People, Philosophy, Pistols, Quotations, Rants, Raves, Religion, Resources, Rifles, Security, Shite, Sunni, War, Wealth, Weapons, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 467 May 19, 2015 

Pronk Pops Show 466 May 18, 2015

Pronk Pops Show 465 May 15, 2015

Pronk Pops Show 464 May 14, 2015

Pronk Pops Show 463 May 13, 2015

Pronk Pops Show 462 May 8, 2015

Pronk Pops Show 461 May 7, 2015

Pronk Pops Show 460 May 6, 2015

Pronk Pops Show 459 May 4, 2015 

Pronk Pops Show 458 May 1, 2015 

Pronk Pops Show 457 April 30, 2015 

Pronk Pops Show 456: April 29, 2015 

Pronk Pops Show 455: April 28, 2015

Pronk Pops Show 454: April 27, 2015

Pronk Pops Show 453: April 24, 2015

Pronk Pops Show 452: April 23, 2015 

Pronk Pops Show 451: April 22, 2015

Pronk Pops Show 450: April 21, 2015

Pronk Pops Show 449: April 20, 2015

Pronk Pops Show 448: April 17, 2015

Pronk Pops Show 447: April 16, 2015

Pronk Pops Show 446: April 15, 2015

Pronk Pops Show 445: April 14, 2015

Pronk Pops Show 444: April 13, 2015

Pronk Pops Show 443: April 9, 2015

Pronk Pops Show 442: April 8, 2015

Pronk Pops Show 441: April 6, 2015

Pronk Pops Show 440: April 2, 2015

Pronk Pops Show 439: April 1, 2015

Pronk Pops Show 438: March 31, 2015

Pronk Pops Show 437: March 30, 2015 

Pronk Pops Show 436: March 27, 2015 

Pronk Pops Show 435: March 26, 2015

Pronk Pops Show 434: March 25, 2015

Pronk Pops Show 433: March 24, 2015

Pronk Pops Show 432: March 23, 2015

Pronk Pops Show 431: March 20, 2015

Pronk Pops Show 430: March 19, 2015

Pronk Pops Show 429: March 18, 2015

Pronk Pops Show 428: March 17, 2015 

Pronk Pops Show 427: March 16, 2015

Pronk Pops Show 426: March 6, 2015

Pronk Pops Show 425: March 4, 2015

Pronk Pops Show 424: March 2, 2015

Pronk Pops Show 423: February 26, 2015

Pronk Pops Show 422: February 25, 2015 

Pronk Pops Show 421: February 20, 2015

Pronk Pops Show 420: February 19, 2015

Pronk Pops Show 419: February 18, 2015

Pronk Pops Show 418: February 16, 2015

Pronk Pops Show 417: February 13, 2015

Pronk Pops Show 416: February 12, 2015

Pronk Pops Show 415: February 11, 2015

Pronk Pops Show 414: February 10, 2015

Pronk Pops Show 413: February 9, 2015

Pronk Pops Show 412: February 6, 2015

Pronk Pops Show 411: February 5, 2015

Pronk Pops Show 410: February 4, 2015

Pronk Pops Show 409: February 3, 2015

Pronk Pops Show 408: February 2, 2015

Story 1: First Official Explosive  Documentation From Defense Intelligence Agency (DIA)  — Profiles in Deceit — Obama And Clinton Lying To The Families That Died in Benghazi and The American People — Why? Coverup of CIA Covert Operation Including Supervision of Arms Shipments Through Third Party Cutout To Syrian Rebels Including Al Qaeda and Islamic Jihadist Terrorists (Now Islamic State) And Win Second Term For Obama and First Term For Hillary Clinton — Both Incompetent and Untrustworthy Leftist Liars — Impeach Obama Now! — Videos

Defense Intelligence Agency (DIA), dated September 12, 2012, the day after the Benghazi attack

The attack was planned ten or more days prior on approximately 01 September 2012. The intention was to attack the consulate and to kill as many Americans as possible to seek revenge for U.S. killing of Aboyahiye ((ALALIBY)) in Pakistan and in memorial of the 11 September 2001 atacks on the World Trade Center buildings.

Weapons from the former Libya military stockpiles were shipped from the port of Benghazi, Libya to the Port of Banias and the Port of Borj Islam, Syria. The weapons shipped during late-August 2012 were Sniper rifles, RPG’s, and 125 mm and 155mm howitzers missiles.

During the immediate aftermath of, and following the uncertainty caused by, the downfall of the ((Qaddafi)) regime in October 2011 and up until early September of 2012, weapons from the former Libya military stockpiles located in Benghazi, Libya were shipped from the port of Benghazi, Libya to the ports of Banias and the Port of Borj Islam, Syria. The Syrian ports were chosen due to the small amount of cargo traffic transiting these two ports. The ships used to transport the weapons were medium-sized and able to hold 10 or less shipping containers of cargo.

The weapons shipped from Syria during late-August 2012 were Sniper rifles, RPG’s and 125mm and 155mm howitzers missiles.  The numbers for each weapon were estimated to be: 500 Sniper rifles, 100 RPG launchers with 300 total rounds, and approximately 400 howitzers missiles [200 ea – 125mm and 200ea – 155 mm.]

The deterioration of the situation has dire consequences on the Iraqi situation and are as follows:

This creates the ideal atmosphere for AQI [al Qaeda Iraq] to return to its old pockets in Mosul and Ramadi, and will provide a renewed momentum under the presumption of unifying the jihad among Sunni Iraq and Syria, and the rest of the Sunnis in the Arab world against what it considers one enemy, the dissenters. ISI could also declare an Islamic state through its union with other terrorist organizations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory.

US Intel knew about weapons going from Benghazi to Syria

Daily News Collective For May 19, 2015

Hillary Clinton Fires Back Over Benghazi Select Committee On The Record

Hillary’s Benghazi Lies Exposed!

Hillary Clinton feigned ignorance when she was questioned about the Benghazi gun-running program by Senator Rand Paul in January 2013.

However, explosive new documents obtained by Judicial Watch prove conclusively that US intelligence agencies were fully aware weapons were being transferred from Libya to Syria before the attack.

That’s not the only Benghazi fact given the spin by the Obama Administration.

Help us spread the word about the liberty movement, we’re reaching millions help us reach millions more. Share the free live video feed link with your friends & family: http://www.infowars.com/show

Military intel predicted rise of ISIS in 2012, detailed arms shipments from Benghazi to Syria

Rep. Mike Pompeo Discusses 13 Hours At Benghazi

(FULL) 13 Hours in Benghazi: Fox News Special Report

Benghazi: The Truth Behind the Smokescreen

Herridge: Fmr. CIA Director Morell May Have Altered Benghazi Talking Points to Benefit Obama Admin

The Truth About How The US Will Save Syria

CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels

Retired Lt Gen Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi

SYRIA CNBC: Benghazi Is Not About Libya But An Operation To Put Arms & Men In Syria

Former CIA Spy: Benghazi Was CIA Operation

Benghazi Bombshell: Insiders Confirm CIA Sent Missiles to FSA Rebels

Judge Jeanine Pirro Opening Statement President Obama’s Benghazi Attack Claims

Judicial Watch: Defense, State Department Documents Reveal Obama Administration Knew that al Qaeda Terrorists Had Planned Benghazi Attack 10 Days in Advance

Administration knew three months before the November 2012 presidential election of ISIS plans to establish a caliphate in Iraq 

Administration knew of arms being shipped from Benghazi to Syria

(Washington, DC) – Judicial Watch announced today that it obtained more than 100 pages of previously classified “Secret” documents from the Department of Defense (DOD)and the Department of State revealing that DOD almost immediately reported that the attack on the U.S. Consulate in Benghazi was committed by the al Qaeda and Muslim Brotherhood-linked “Brigades of the Captive Omar Abdul Rahman” (BCOAR), and had been planned at least 10 days in advance. Rahman is known as the Blind Sheikh, and is serving life in prison for his involvement in the 1993 World Trade Center bombing and other terrorist acts.  The new documents also provide the first official confirmation that shows the U.S. government was aware of arms shipments from Benghazi to Syria.  The documents also include an August 2012 analysis warning of the rise of ISIS and the predicted failure of the Obama policy of regime change in Syria.

The documents were released in response to a court order in accordance with a May 15, 2014, Freedom of Information Act (FOIA) lawsuit filed against both the DOD and State Department seeking communications between the two agencies and congressional leaders “on matters related to the activities of any agency or department of the U.S. government at the Special Mission Compound and/or classified annex in Benghazi.”

Spelling and punctuation is duplicated in this release without corrections.

Defense Department document from the Defense Intelligence Agency (DIA), dated September 12, 2012, the day after the Benghazi attack, details that the attack on the compound had been carefully planned by the BOCAR terrorist group “to kill as many Americans as possible.”  The document was sent to then-Secretary of State Hillary Clinton, then-Defense Secretary Leon Panetta, the Joint Chiefs of Staff and the Obama White House National Security Council.  The heavily redacted Defense Department “information report” says that the attack on the Benghazi facility “was planned and executed by The Brigades of the Captive Omar Abdul Rahman (BCOAR).”  The group subscribes to “AQ ideologies:”

The attack was planned ten or more days prior on approximately 01 September 2012. The intention was to attack the consulate and to kill as many Americans as possible to seek revenge for U.S. killing of Aboyahiye ((ALALIBY)) in Pakistan and in memorial of the 11 September 2001 atacks on the World Trade Center buildings.

“A violent radical,” the DIA report says, is “the leader of BCOAR is Abdul Baset ((AZUZ)), AZUZ was sent by ((ZAWARI)) to set up Al Qaeda (AQ) bases in Libya.”  The group’s headquarters was set up with the approval of a “member of the Muslim brother hood movement…where they have large caches of weapons.  Some of these caches are disguised by feeding troughs for livestock.  They have SA-7 and SA-23/4 MANPADS…they train almost every day focusing on religious lessons and scriptures including three lessons a day of jihadist ideology.”

The Defense Department reported the group maintained written documents, in “a small rectangular room, approximately 12 meters by 6 meters…that contain information on all of the AQ activity in Libya.”

(Azuz is again blamed for the Benghazi attack in an October 2012 DIA document.)

The DOD documents also contain the first official documentation that the Obama administration knew that weapons were being shipped from the Port of Benghazi to rebel troops in Syria. An October 2012 report confirms:

Weapons from the former Libya military stockpiles were shipped from the port of Benghazi, Libya to the Port of Banias and the Port of Borj Islam, Syria. The weapons shipped during late-August 2012 were Sniper rifles, RPG’s, and 125 mm and 155mm howitzers missiles.

During the immediate aftermath of, and following the uncertainty caused by, the downfall of the ((Qaddafi)) regime in October 2011 and up until early September of 2012, weapons from the former Libya military stockpiles located in Benghazi, Libya were shipped from the port of Benghazi, Libya to the ports of Banias and the Port of Borj Islam, Syria. The Syrian ports were chosen due to the small amount of cargo traffic transiting these two ports. The ships used to transport the weapons were medium-sized and able to hold 10 or less shipping containers of cargo.

The DIA document further details:

The weapons shipped from Syria during late-August 2012 were Sniper rifles, RPG’s and 125mm and 155mm howitzers missiles.  The numbers for each weapon were estimated to be: 500 Sniper rifles, 100 RPG launchers with 300 total rounds, and approximately 400 howitzers missiles [200 ea – 125mm and 200ea – 155 mm.]

The heavily redacted document does not disclose who was shipping the weapons.

Another DIA report, written in August 2012 (the same time period the U.S. was monitoring weapons flows from Libya to Syria), said that the opposition in Syria was driven by al Qaeda and other extremist Muslim groups: “the Salafist, the Muslim Brotherhood, and AQI are the major forces driving the insurgency in Syria.” The growing sectarian direction of the war was predicted to have dire consequences for Iraq, which included the “grave danger” of the rise of ISIS:

The deterioration of the situation has dire consequences on the Iraqi situation and are as follows:

This creates the ideal atmosphere for AQI [al Qaeda Iraq] to return to its old pockets in Mosul and Ramadi, and will provide a renewed momentum under the presumption of unifying the jihad among Sunni Iraq and Syria, and the rest of the Sunnis in the Arab world against what it considers one enemy, the dissenters. ISI could also declare an Islamic state through its union with other terrorist organizations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory.

Some of the “dire consequences” are blacked out but the DIA presciently warned one such consequence would be the “renewing facilitation of terrorist elements from all over the Arab world entering into Iraqi Arena.”

From a separate lawsuit, the State Department produced a document created the morning after the Benghazi attack by Hillary Clinton’s offices, and the Operations Center in the Office of the Executive Secretariat that was sent widely through the agency, including to Joseph McManus (then-Hillary Clinton’s executive assistant).  At 6:00 am, a few hours after the attack, the top office of the State Department sent a “spot report” on the “Attack on U.S. Diplomatic Mission in Benghazi” that makes no mention of videos or demonstrations:

Four COM personnel were killed and three were wounded in an attack by dozens of fighters on the U.S. Diplomatic Mission in Benghazi beginning approximately 1550 Eastern Time….

The State Department has yet to turn over any documents from the secret email accounts of Hillary Clinton and other top State Department officials.

“These documents are jaw-dropping. No wonder we had to file more FOIA lawsuits and wait over two years for them.  If the American people had known the truth – that Barack Obama, Hillary Clinton and other top administration officials knew that the Benghazi attack was an al-Qaeda terrorist attack from the get-go – and yet lied and covered this fact up – Mitt Romney might very well be president. And why would the Obama administration continue to support the Muslim Brotherhood even after it knew it was tied to the Benghazi terrorist attack and to al Qaeda? These documents also point to connection between the collapse in Libya and the ISIS war – and confirm that the U.S. knew remarkable details about the transfer of arms from Benghazi to Syrian jihadists,” stated Tom Fitton, Judicial Watch president.  “These documents show that the Benghazi cover-up has continued for years and is only unraveling through our independent lawsuits. The Benghazi scandal just got a whole lot worse for Barack Obama and Hillary Clinton.”

http://www.judicialwatch.org/press-room/press-releases/judicial-watch-defense-state-department-documents-reveal-obama-administration-knew-that-al-qaeda-terrorists-had-planned-benghazi-attack-10-days-in-advance/

The Worst Day of Hillary Clinton’s Campaign

So far!

8:04 AM, MAY 19, 2015 • BY STEPHEN F. HAYES
Hillary Clinton had a very bad day.

In fact, she’s had a series of bad days since she announced her presidential bid April 12. But Monday was the worst of them.

In a bombshell report, the New York Times reported that Clinton, as secretary of state, used her private email to share private intelligence reports from noted conspiracy theorist and political hitman Sidney Blumenthal, at a time when Blumenthal was being paid by the Clinton Foundation and liberal political organizations that helped lay the groundwork for Clinton’s presidential campaign.

The emails included reports on Libya at a time when Blumenthal was seeking business in the country and included dubious information. The Times reported that Clinton nonetheless “took Mr. Blumenthal’s advice seriously” and “continued to pass around his emails even after other senior diplomats concluded that Mr. Blumenthal’s assessments were often unreliable.”

A second story about Clinton and Libya broke the same day, this one casting further doubt on the Obama administration’s narrative about the attacks on U.S. facilities in Benghazi on September 11, 2012, and specifically on claims Clinton made about nature of those attacks and motivations of the attackers. An intelligence report prepared by the Defense Intelligence Agency and sent to Clinton and other senior administration officials on September 12, 2012, just one day after the attacks, concluded that the attack “was planned ten or more days” in advance and was meant to “kill as many Americans as possible.” The report identifies al Qaeda-linked terrorists believed to have been involved in the assault.

Despite this, the Obama administration crafted a public narrative that the attack had evolved from a “spontaneous” protest over a YouTube video and included a wide range of individuals. Clinton cited the video in remarks at a memorial service on September 14, 2012, for those killed in the attacks. She told members of the victims’ families that the administration would bring to justice those responsible for the video. The DIA report and several other Benghazi-related documents were released to Judicial Watch pursuant to a court order in response to a FOIA request.

The DIA report further undermines the administration’s already-tattered claims that its public case was based on intelligence assessments. Emails released in response to a previous Judicial Watch requestshowed that the White House had drafted a set of political talking points that sought to blame the video and not administration policy.

That the DIA report was not released as a result of any previous Benghazi investigations raises additional questions about the administration’s unwillingness to turn over documents related to the attacks and how comprehensive those previous investigations have been. Many of the revelations that have undermined administration claims about Benghazi have come outside of the regular congressional oversight efforts, in part because of the administration’s disinclination to cooperate and in part because of the half-hearted inquiries led by the committees of jurisdiction.

Administration defenders and many in the media claimed that an additional investigation of Benghazi would be unnecessary because of these previous efforts. But these recent revelations validate the decision of House speaker John Boehner to create a select committee and make clear that there is still much more to learn. The State Department only recently turned over documents related to the State Department’s Administrative Review Board examination of Benghazi. The House Oversight Committee first requested those documents more than two years ago – on January 28, 2013. The Benghazi Select Committee is still waiting for reams of documents from the White House, the Pentagon, and the State Department.

Beyond that, of course, are questions about emails and documents that the public may never see because Hillary Clinton used private emails to circumvent the record retention requirements of the U.S. government. The committee is examining all options in its attempt to find or recover those discarded emails.

It has been nearly a month since Hillary Clinton took questions from the media. And with the growing stench of scandal it’s likely that she’ll continue to seek to avoid circumstances that might require her to provide answers. That’s a short-term solution to a long-term problem. And even a media that is ideologically sympathetic is showing signs of frustration with her games.

Hillary Clinton has more bad days ahead.

http://www.weeklystandard.com/blogs/worst-day-hillary-clintons-campaign_950416.html?page=2

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 464-467

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...