Angelo Codevilla – Does America Have a Ruling Class?
456. The Iron Fist of the Ruling Class | Angelo Codevilla
The Role of Intelligence in American National Security
Conservatism in the Trump Era: American Statecraft
America’s Ruling Class — And the Perils of Revolution
ANGELO M. CODEVILLA
July 16, 2010, 10:09 am
As over-leveraged investment houses began to fail in September 2008, the leaders of the Republican and Democratic parties, of major corporations, and opinion leaders stretching from the National Reviewmagazine (and the Wall Street Journal) on the right to the Nation magazine on the left, agreed that spending some $700 billion to buy the investors’ “toxic assets” was the only alternative to the U.S. economy’s “systemic collapse.” In this, President George W. Bush and his would-be Republican successor John McCain agreed with the Democratic candidate, Barack Obama. Many, if not most, people around them also agreed upon the eventual commitment of some 10 trillion nonexistent dollars in ways unprecedented in America. They explained neither the difference between the assets’ nominal and real values, nor precisely why letting the market find the latter would collapse America. The public objected immediately, by margins of three or four to one.
When this majority discovered that virtually no one in a position of power in either party or with a national voice would take their objections seriously, that decisions about their money were being made in bipartisan backroom deals with interested parties, and that the laws on these matters were being voted by people who had not read them, the term “political class” came into use. Then, after those in power changed their plans from buying toxic assets to buying up equity in banks and major industries but refused to explain why, when they reasserted their right to decide ad hoc on these and so many other matters, supposing them to be beyond the general public’s understanding, the American people started referring to those in and around government as the “ruling class.” And in fact Republican and Democratic office holders and their retinues show a similar presumption to dominate and fewer differences in tastes, habits, opinions, and sources of income among one another than between both and the rest of the country. They think, look, and act as a class.
Although after the election of 2008 most Republican office holders argued against the Troubled Asset Relief Program, against the subsequent bailouts of the auto industry, against the several “stimulus” bills and further summary expansions of government power to benefit clients of government at the expense of ordinary citizens, the American people had every reason to believe that many Republican politicians were doing so simply by the logic of partisan opposition. After all, Republicans had been happy enough to approve of similar things under Republican administrations. Differences between Bushes, Clintons, and Obamas are of degree, not kind. Moreover, 2009-10 establishment Republicans sought only to modify the government’s agenda while showing eagerness to join the Democrats in new grand schemes, if only they were allowed to. Sen. Orrin Hatch continued dreaming of being Ted Kennedy, while Lindsey Graham set aside what is true or false about “global warming” for the sake of getting on the right side of history. No prominent Republican challenged the ruling class’s continued claim of superior insight, nor its denigration of the American people as irritable children who must learn their place. The Republican Party did not disparage the ruling class, because most of its officials are or would like to be part of it.
Never has there been so little diversity within America’s upper crust. Always, in America as elsewhere, some people have been wealthier and more powerful than others. But until our own time America’s upper crust was a mixture of people who had gained prominence in a variety of ways, who drew their money and status from different sources and were not predictably of one mind on any given matter. The Boston Brahmins, the New York financiers, the land barons of California, Texas, and Florida, the industrialists of Pittsburgh, the Southern aristocracy, and the hardscrabble politicians who made it big in Chicago or Memphis had little contact with one another. Few had much contact with government, and “bureaucrat” was a dirty word for all. So was “social engineering.” Nor had the schools and universities that formed yesterday’s upper crust imposed a single orthodoxy about the origins of man, about American history, and about how America should be governed. All that has changed.
Today’s ruling class, from Boston to San Diego, was formed by an educational system that exposed them to the same ideas and gave them remarkably uniform guidance, as well as tastes and habits. These amount to a social canon of judgments about good and evil, complete with secular sacred history, sins (against minorities and the environment), and saints. Using the right words and avoiding the wrong ones when referring to such matters — speaking the “in” language — serves as a badge of identity. Regardless of what business or profession they are in, their road up included government channels and government money because, as government has grown, its boundary with the rest of American life has become indistinct. Many began their careers in government and leveraged their way into the private sector. Some, e.g., Secretary of the Treasury Timothy Geithner, never held a non-government job. Hence whether formally in government, out of it, or halfway, America’s ruling class speaks the language and has the tastes, habits, and tools of bureaucrats. It rules uneasily over the majority of Americans not oriented to government.
The two classes have less in common culturally, dislike each other more, and embody ways of life more different from one another than did the 19th century’s Northerners and Southerners — nearly all of whom, as Lincoln reminded them, “prayed to the same God.” By contrast, while most Americans pray to the God “who created and doth sustain us,” our ruling class prays to itself as “saviors of the planet” and improvers of humanity. Our classes’ clash is over “whose country” America is, over what way of life will prevail, over who is to defer to whom about what. The gravity of such divisions points us, as it did Lincoln, to Mark’s Gospel: “if a house be divided against itself, that house cannot stand.”
The Political Divide
Important as they are, our political divisions are the iceberg’s tip. When pollsters ask the American people whether they are likely to vote Republican or Democrat in the next presidential election, Republicans win growing pluralities. But whenever pollsters add the preferences “undecided,” “none of the above,” or “tea party,” these win handily, the Democrats come in second, and the Republicans trail far behind. That is because while most of the voters who call themselves Democrats say that Democratic officials represent them well, only a fourth of the voters who identify themselves as Republicans tell pollsters that Republican officeholders represent them well. Hence officeholders, Democrats and Republicans, gladden the hearts of some one-third of the electorate — most Democratic voters, plus a few Republicans. This means that Democratic politicians are the ruling class’s prime legitimate representatives and that because Republican politicians are supported by only a fourth of their voters while the rest vote for them reluctantly, most are aspirants for a junior role in the ruling class. In short, the ruling class has a party, the Democrats. But some two-thirds of Americans — a few Democratic voters, most Republican voters, and all independents — lack a vehicle in electoral politics.
Sooner or later, well or badly, that majority’s demand for representation will be filled. Whereas in 1968 Governor George Wallace’s taunt “there ain’t a dime’s worth of difference” between the Republican and Democratic parties resonated with only 13.5 percent of the American people, in 1992 Ross Perot became a serious contender for the presidency (at one point he was favored by 39 percent of Americans vs. 31 percent for G.H.W. Bush and 25 percent for Clinton) simply by speaking ill of the ruling class. Today, few speak well of the ruling class. Not only has it burgeoned in size and pretense, but it also has undertaken wars it has not won, presided over a declining economy and mushrooming debt, made life more expensive, raised taxes, and talked down to the American people. Americans’ conviction that the ruling class is as hostile as it is incompetent has solidified. The polls tell us that only about a fifth of Americans trust the government to do the right thing. The rest expect that it will do more harm than good and are no longer afraid to say so.
While Europeans are accustomed to being ruled by presumed betters whom they distrust, the American people’s realization of being ruled like Europeans shocked this country into well nigh revolutionary attitudes. But only the realization was new. The ruling class had sunk deep roots in America over decades before 2008. Machiavelli compares serious political diseases to the Aetolian fevers — easy to treat early on while they are difficult to discern, but virtually untreatable by the time they become obvious.
Far from speculating how the political confrontation might develop between America’s regime class — relatively few people supported by no more than one-third of Americans — and a country class comprising two-thirds of the country, our task here is to understand the divisions that underlie that confrontation’s unpredictable future. More on politics below.
The Ruling Class
Who are these rulers, and by what right do they rule? How did America change from a place where people could expect to live without bowing to privileged classes to one in which, at best, they might have the chance to climb into them? What sets our ruling class apart from the rest of us?
The most widespread answers — by such as the Times‘s Thomas Friedman and David Brooks — are schlock sociology. Supposedly, modern society became so complex and productive, the technical skills to run it so rare, that it called forth a new class of highly educated officials and cooperators in an ever less private sector. Similarly fanciful is Edward Goldberg’s notion that America is now ruled by a “newocracy”: a “new aristocracy who are the true beneficiaries of globalization — including the multinational manager, the technologist and the aspirational members of the meritocracy.” In fact, our ruling class grew and set itself apart from the rest of us by its connection with ever bigger government, and above all by a certain attitude.
Other explanations are counterintuitive. Wealth? The heads of the class do live in our big cities’ priciest enclaves and suburbs, from Montgomery County, Maryland, to Palo Alto, California, to Boston’s Beacon Hill as well as in opulent university towns from Princeton to Boulder. But they are no wealthier than many Texas oilmen or California farmers, or than neighbors with whom they do not associate — just as the social science and humanities class that rules universities seldom associates with physicians and physicists. Rather, regardless of where they live, their social-intellectual circle includes people in the lucrative “nonprofit” and “philanthropic” sectors and public policy. What really distinguishes these privileged people demographically is that, whether in government power directly or as officers in companies, their careers and fortunes depend on government. They vote Democrat more consistently than those who live on any of America’s Dr. Martin Luther King Jr. Streets. These socioeconomic opposites draw their money and orientation from the same sources as the millions of teachers, consultants, and government employees in the middle ranks who aspire to be the former and identify morally with what they suppose to be the latter’s grievances.
Professional prominence or position will not secure a place in the class any more than mere money. In fact, it is possible to be an official of a major corporation or a member of the U.S. Supreme Court (just ask Justice Clarence Thomas), or even president (Ronald Reagan), and not be taken seriously by the ruling class. Like a fraternity, this class requires above all comity — being in with the right people, giving the required signs that one is on the right side, and joining in despising the Outs. Once an official or professional shows that he shares the manners, the tastes, the interests of the class, gives lip service to its ideals and shibboleths, and is willing to accommodate the interests of its senior members, he can move profitably among our establishment’s parts.
If, for example, you are Laurence Tribe in 1984, Harvard professor of law, leftist pillar of the establishment, you can “write” your magnum opus by using the products of your student assistant, Ron Klain. A decade later, after Klain admits to having written some parts of the book, and the other parts are found to be verbatim or paraphrases of a book published in 1974, you can claim (perhaps correctly) that your plagiarism was “inadvertent,” and you can count on the Law School’s dean, Elena Kagan, to appoint a committee including former and future Harvard president Derek Bok that issues a secret report that “closes” the incident. Incidentally, Kagan ends up a justice of the Supreme Court. Not one of these people did their jobs: the professor did not write the book himself, the assistant plagiarized instead of researching, the dean and the committee did not hold the professor accountable, and all ended up rewarded. By contrast, for example, learned papers and distinguished careers in climatology at MIT (Richard Lindzen) or UVA (S. Fred Singer) are not enough for their questions about “global warming” to be taken seriously. For our ruling class, identity always trumps.
Much less does membership in the ruling class depend on high academic achievement. To see something closer to an academic meritocracy consider France, where elected officials have little power, a vast bureaucracy explicitly controls details from how babies are raised to how to make cheese, and people get into and advance in that bureaucracy strictly by competitive exams. Hence for good or ill, France’s ruling class are bright people — certifiably. Not ours. But didn’t ours go to Harvard and Princeton and Stanford? Didn’t most of them get good grades? Yes. But while getting into the Ecole Nationale d’Administration or the Ecole Polytechnique or the dozens of other entry points to France’s ruling class requires outperforming others in blindly graded exams, and graduating from such places requires passing exams that many fail, getting into America’s “top schools” is less a matter of passing exams than of showing up with acceptable grades and an attractive social profile. American secondary schools are generous with their As. Since the 1970s, it has been virtually impossible to flunk out of American colleges. And it is an open secret that “the best” colleges require the least work and give out the highest grade point averages. No, our ruling class recruits and renews itself not through meritocracy but rather by taking into itself people whose most prominent feature is their commitment to fit in. The most successful neither write books and papers that stand up to criticism nor release their academic records. Thus does our ruling class stunt itself through negative selection. But the more it has dumbed itself down, the more it has defined itself by the presumption of intellectual superiority.
The Faith
Its attitude is key to understanding our bipartisan ruling class. Its first tenet is that “we” are the best and brightest while the rest of Americans are retrograde, racist, and dysfunctional unless properly constrained. How did this replace the Founding generation’s paradigm that “all men are created equal”?
The notion of human equality was always a hard sell, because experience teaches us that we are so unequal in so many ways, and because making one’s self superior is so tempting that Lincoln called it “the old serpent, you work I’ll eat.” But human equality made sense to our Founding generation because they believed that all men are made in the image and likeness of God, because they were yearning for equal treatment under British law, or because they had read John Locke.
It did not take long for their paradigm to be challenged by interest and by “science.” By the 1820s, as J. C. Calhoun was reading in the best London journals that different breeds of animals and plants produce inferior or superior results, slave owners were citing the Negroes’ deficiencies to argue that they should remain slaves indefinitely. Lots of others were reading Ludwig Feuerbach’s rendition of Hegelian philosophy, according to which biblical injunctions reflect the fantasies of alienated human beings or, in the young Karl Marx’s formulation, that ethical thought is “superstructural” to material reality. By 1853, when Sen. John Pettit of Ohio called “all men are created equal” “a self-evident lie,” much of America’s educated class had already absorbed the “scientific” notion (which Darwin only popularized) that man is the product of chance mutation and natural selection of the fittest. Accordingly, by nature, superior men subdue inferior ones as they subdue lower beings or try to improve them as they please. Hence while it pleased the abolitionists to believe in freeing Negroes and improving them, it also pleased them to believe that Southerners had to be punished and reconstructed by force. As the 19th century ended, the educated class’s religious fervor turned to social reform: they were sure that because man is a mere part of evolutionary nature, man could be improved, and that they, the most highly evolved of all, were the improvers.
Thus began the Progressive Era. When Woodrow Wilson in 1914 was asked “can’t you let anything alone?” he answered with, “I let everything alone that you can show me is not itself moving in the wrong direction, but I am not going to let those things alone that I see are going down-hill.” Wilson spoke for the thousands of well-off Americans who patronized the spas at places like Chautauqua and Lake Mohonk. By such upper-middle-class waters, progressives who imagined themselves the world’s examples and the world’s reformers dreamt big dreams of establishing order, justice, and peace at home and abroad. Neither were they shy about their desire for power. Wilson was the first American statesman to argue that the Founders had done badly by depriving the U.S. government of the power to reshape American society. Nor was Wilson the last to invade a foreign country (Mexico) to “teach [them] to elect good men.”
World War I and the chaos at home and abroad that followed it discredited the Progressives in the American people’s eyes. Their international schemes had brought blood and promised more. Their domestic management had not improved Americans’ lives, but given them a taste of arbitrary government, including Prohibition. The Progressives, for their part, found it fulfilling to attribute the failure of their schemes to the American people’s backwardness, to something deeply wrong with America. The American people had failed them because democracy in its American form perpetuated the worst in humanity. Thus Progressives began to look down on the masses, to look on themselves as the vanguard, and to look abroad for examples to emulate.
The cultural divide between the “educated class” and the rest of the country opened in the interwar years. Some Progressives joined the “vanguard of the proletariat,” the Communist Party. Many more were deeply sympathetic to Soviet Russia, as they were to Fascist Italy and Nazi Germany. Not just the Nation, but also the New York Times and National Geographic found much to be imitated in these regimes because they promised energetically to transcend their peoples’ ways and to build “the new man.” Above all, our educated class was bitter about America. In 1925 the American Civil Liberties Union sponsored a legal challenge to a Tennessee law that required teaching the biblical account of creation. The ensuing trial, radio broadcast nationally, as well as the subsequent hit movie Inherit the Wind, were the occasion for what one might have called the Chautauqua class to drive home the point that Americans who believed in the Bible were willful ignoramuses. As World War II approached, some American Progressives supported the Soviet Union (and its ally, Nazi Germany) and others Great Britain and France. But Progressives agreed on one thing: the approaching war should be blamed on the majority of Americans, because they had refused to lead the League of Nations. Darryl Zanuck produced the critically acclaimed movie [Woodrow] Wilson featuring Cedric Hardwicke as Senator Henry Cabot Lodge, who allegedly brought on the war by appealing to American narrow-mindedness against Wilson’s benevolent genius.
Franklin Roosevelt brought the Chautauqua class into his administration and began the process that turned them into rulers. FDR described America’s problems in technocratic terms. America’s problems would be fixed by a “brain trust” (picked by him). His New Deal’s solutions — the alphabet-soup “independent” agencies that have run America ever since — turned many Progressives into powerful bureaucrats and then into lobbyists. As the saying goes, they came to Washington to do good, and stayed to do well.
As their number and sense of importance grew, so did their distaste for common Americans. Believing itself “scientific,” this Progressive class sought to explain its differences from its neighbors in “scientific” terms. The most elaborate of these attempts was Theodor Adorno’s widely acclaimed The Authoritarian Personality (1948). It invented a set of criteria by which to define personality traits, ranked these traits and their intensity in any given person on what it called the “F scale” (F for fascist), interviewed hundreds of Americans, and concluded that most who were not liberal Democrats were latent fascists. This way of thinking about non-Progressives filtered down to college curricula. In 1963-64 for example, I was assigned Herbert McCloskey’s Conservatism and Personality (1958) at Rutgers’s Eagleton Institute of Politics as a paradigm of methodological correctness. The author had defined conservatism in terms of answers to certain questions, had defined a number of personality disorders in terms of other questions, and run a survey that proved “scientifically” that conservatives were maladjusted ne’er-do-well ignoramuses. (My class project, titled “Liberalism and Personality,” following the same methodology, proved just as scientifically that liberals suffered from the very same social diseases, and even more amusing ones.)
The point is this: though not one in a thousand of today’s bipartisan ruling class ever heard of Adorno or McCloskey, much less can explain the Feuerbachian-Marxist notion that human judgments are “epiphenomenal” products of spiritual or material alienation, the notion that the common people’s words are, like grunts, mere signs of pain, pleasure, and frustration, is now axiomatic among our ruling class. They absorbed it osmotically, second — or thirdhand, from their education and from companions. Truly, after Barack Obama described his opponents’ clinging to “God and guns” as a characteristic of inferior Americans, he justified himself by pointing out he had said “what everybody knows is true.” Confident “knowledge” that “some of us, the ones who matter,” have grasped truths that the common herd cannot, truths that direct us, truths the grasping of which entitles us to discount what the ruled say and to presume what they mean, made our Progressives into a class long before they took power.
The Agenda: Power
Our ruling class’s agenda is power for itself. While it stakes its claim through intellectual-moral pretense, it holds power by one of the oldest and most prosaic of means: patronage and promises thereof. Like left-wing parties always and everywhere, it is a “machine,” that is, based on providing tangible rewards to its members. Such parties often provide rank-and-file activists with modest livelihoods and enhance mightily the upper levels’ wealth. Because this is so, whatever else such parties might accomplish, they must feed the machine by transferring money or jobs or privileges — civic as well as economic — to the party’s clients, directly or indirectly. This, incidentally, is close to Aristotle’s view of democracy. Hence our ruling class’s standard approach to any and all matters, its solution to any and all problems, is to increase the power of the government — meaning of those who run it, meaning themselves, to profit those who pay with political support for privileged jobs, contracts, etc. Hence more power for the ruling class has been our ruling class’s solution not just for economic downturns and social ills but also for hurricanes and tornadoes, global cooling and global warming. A priori, one might wonder whether enriching and empowering individuals of a certain kind can make Americans kinder and gentler, much less control the weather. But there can be no doubt that such power and money makes Americans ever more dependent on those who wield it. Let us now look at what this means in our time.
Dependence Economics
By taxing and parceling out more than a third of what Americans produce, through regulations that reach deep into American life, our ruling class is making itself the arbiter of wealth and poverty. While the economic value of anything depends on sellers and buyers agreeing on that value as civil equals in the absence of force, modern government is about nothing if not tampering with civil equality. By endowing some in society with power to force others to sell cheaper than they would, and forcing others yet to buy at higher prices — even to buy in the first place — modern government makes valuable some things that are not, and devalues others that are. Thus if you are not among the favored guests at the table where officials make detailed lists of who is to receive what at whose expense, you are on the menu. Eventually, pretending forcibly that valueless things have value dilutes the currency’s value for all.
Laws and regulations nowadays are longer than ever because length is needed to specify how people will be treated unequally. For example, the health care bill of 2010 takes more than 2,700 pages to make sure not just that some states will be treated differently from others because their senators offered key political support, but more importantly to codify bargains between the government and various parts of the health care industry, state governments, and large employers about who would receive what benefits (e.g., public employee unions and auto workers) and who would pass what indirect taxes onto the general public. The financial regulation bill of 2010, far from setting univocal rules for the entire financial industry in few words, spends some 3,000 pages (at this writing) tilting the field exquisitely toward some and away from others. Even more significantly, these and other products of Democratic and Republican administrations and Congresses empower countless boards and commissions arbitrarily to protect some persons and companies, while ruining others. Thus in 2008 the Republican administration first bailed out Bear Stearns, then let Lehman Brothers sink in the ensuing panic, but then rescued Goldman Sachs by infusing cash into its principal debtor, AIG. Then, its Democratic successor used similarly naked discretionary power (and money appropriated for another purpose) to give major stakes in the auto industry to labor unions that support it. Nowadays, the members of our ruling class admit that they do not read the laws. They don’t have to. Because modern laws are primarily grants of discretion, all anybody has to know about them is whom they empower.
By making economic rules dependent on discretion, our bipartisan ruling class teaches that prosperity is to be bought with the coin of political support. Thus in the 1990s and 2000s, as Democrats and Republicans forced banks to make loans for houses to people and at rates they would not otherwise have considered, builders and investors had every reason to make as much money as they could from the ensuing inflation of housing prices. When the bubble burst, only those connected with the ruling class at the bottom and at the top were bailed out. Similarly, by taxing the use of carbon fuels and subsidizing “alternative energy,” our ruling class created arguably the world’s biggest opportunity for making money out of things that few if any would buy absent its intervention. The ethanol industry and its ensuing diversions of wealth exist exclusively because of subsidies. The prospect of legislation that would put a price on carbon emissions and allot certain amounts to certain companies set off a feeding frenzy among large companies to show support for a “green agenda,” because such allotments would be worth tens of billions of dollars. That is why companies hired some 2,500 lobbyists in 2009 to deepen their involvement in “climate change.” At the very least, such involvement profits them by making them into privileged collectors of carbon taxes. Any “green jobs” thus created are by definition creatures of subsidies — that is, of privilege. What effect creating such privileges may have on “global warming” is debatable. But it surely increases the number of people dependent on the ruling class, and teaches Americans that satisfying that class is a surer way of making a living than producing goods and services that people want to buy.
Beyond patronage, picking economic winners and losers redirects the American people’s energies to tasks that the political class deems more worthy than what Americans choose for themselves. John Kenneth Galbraith’s characterization of America as “private wealth amidst public squalor” (The Affluent Society, 1958) has ever encapsulated our best and brightest’s complaint: left to themselves, Americans use land inefficiently in suburbs and exurbs, making it necessary to use energy to transport them to jobs and shopping. Americans drive big cars, eat lots of meat as well as other unhealthy things, and go to the doctor whenever they feel like it. Americans think it justice to spend the money they earn to satisfy their private desires even though the ruling class knows that justice lies in improving the community and the planet. The ruling class knows that Americans must learn to live more densely and close to work, that they must drive smaller cars and change their lives to use less energy, that their dietary habits must improve, that they must accept limits in how much medical care they get, that they must divert more of their money to support people, cultural enterprises, and plans for the planet that the ruling class deems worthier. So, ever-greater taxes and intrusive regulations are the main wrenches by which the American people can be improved (and, yes, by which the ruling class feeds and grows).
The 2010 medical law is a template for the ruling class’s economic modus operandi: the government taxes citizens to pay for medical care and requires citizens to purchase health insurance. The money thus taken and directed is money that the citizens themselves might have used to pay for medical care. In exchange for the money, the government promises to provide care through its “system.” But then all the boards, commissions, guidelines, procedures, and “best practices” that constitute “the system” become the arbiters of what any citizen ends up getting. The citizen might end up dissatisfied with what “the system” offers. But when he gave up his money, he gave up the power to choose, and became dependent on all the boards and commissions that his money also pays for and that raise the cost of care. Similarly, in 2008 the House Ways and Means Committee began considering a plan to force citizens who own Individual Retirement Accounts (IRAs) to transfer those funds into government-run “guaranteed retirement accounts.” If the government may force citizens to buy health insurance, by what logic can it not force them to trade private ownership and control of retirement money for a guarantee as sound as the government itself? Is it not clear that the government knows more about managing retirement income than individuals?
Who Depends on Whom?
In Congressional Government (1885) Woodrow Wilson left no doubt: the U.S. Constitution prevents the government from meeting the country’s needs by enumerating rights that the government may not infringe. (“Congress shall make no law…” says the First Amendment, typically.) Our electoral system, based on single member districts, empowers individual voters at the expense of “responsible parties.” Hence the ruling class’s perpetual agenda has been to diminish the role of the citizenry’s elected representatives, enhancing that of party leaders as well as of groups willing to partner in the government’s plans, and to craft a “living” Constitution in which restrictions on government give way to “positive rights” — meaning charters of government power.
Consider representation. Following Wilson, American Progressives have always wanted to turn the U.S. Congress from the role defined by James Madison’s Federalist #10, “refine and enlarge the public’s view,” to something like the British Parliament, which ratifies government actions. Although Britain’s electoral system — like ours, single members elected in historic districts by plurality vote — had made members of Parliament responsive to their constituents in ancient times, by Wilson’s time the growing importance of parties made MPs beholden to party leaders. Hence whoever controls the majority party controls both Parliament and the government.
In America, the process by which party has become (almost) as important began with the Supreme Court’s 1962 decision in Baker v. Carr which, by setting the single standard “one man, one vote” for congressional districts, ended up legalizing the practice of “gerrymandering,” concentrating the opposition party’s voters into as few districts as possible while placing one’s own voters into as many as possible likely to yield victories. Republican and Democratic state legislatures have gerrymandered for a half century. That is why today’s Congress consists more and more of persons who represent their respective party establishments — not nearly as much as in Britain, but heading in that direction. Once districts are gerrymandered “safe” for one party or another, the voters therein count less because party leaders can count more on elected legislators to toe the party line.
To the extent party leaders do not have to worry about voters, they can choose privileged interlocutors, representing those in society whom they find most amenable. In America ever more since the 1930s — elsewhere in the world this practice is ubiquitous and long-standing — government has designated certain individuals, companies, and organizations within each of society’s sectors as (junior) partners in elaborating laws and administrative rules for those sectors. The government empowers the persons it has chosen over those not chosen, deems them the sector’s true representatives, and rewards them. They become part of the ruling class.
Thus in 2009-10 the American Medical Association (AMA) strongly supported the new medical care law, which the administration touted as having the support of “the doctors” even though the vast majority of America’s 975,000 physicians opposed it. Those who run the AMA, however, have a government contract as exclusive providers of the codes by which physicians and hospitals bill the government for their services. The millions of dollars that flow thereby to the AMA’s officers keep them in line, while the impracticality of doing without the billing codes tamps down rebellion in the doctor ranks. When the administration wanted to bolster its case that the state of Arizona’s enforcement of federal immigration laws was offensive to Hispanics, the National Association of Chiefs of Police — whose officials depend on the administration for their salaries — issued a statement that the laws would endanger all Americans by raising Hispanics’ animosity. This reflected conversations with the administration rather than a vote of the nation’s police chiefs.
Similarly, modern labor unions are ever less bunches of workers banding together and ever more bundled under the aegis of an organization chosen jointly by employers and government. Prototypical is the Service Employees International Union, which grew spectacularly by persuading managers of government agencies as well as of publicly funded private entities that placing their employees in the SEIU would relieve them of responsibility. Not by being elected by workers’ secret ballots did the SEIU conquer workplace after workplace, but rather by such deals, or by the union presenting what it claims are cards from workers approving of representation. The union gets 2 percent of the workers’ pay, which it recycles as contributions to the Democratic Party, which it recycles in greater power over public employees. The union’s leadership is part of the ruling class’s beating heart.
The point is that a doctor, a building contractor, a janitor, or a schoolteacher counts in today’s America insofar as he is part of the hierarchy of a sector organization affiliated with the ruling class. Less and less do such persons count as voters.
Ordinary people have also gone a long way toward losing equal treatment under law. The America described in civics books, in which no one could be convicted or fined except by a jury of his peers for having violated laws passed by elected representatives, started disappearing when the New Deal inaugurated today’s administrative state — in which bureaucrats make, enforce, and adjudicate nearly all the rules. Today’s legal-administrative texts are incomprehensibly detailed and freighted with provisions crafted exquisitely to affect equal individuals unequally. The bureaucrats do not enforce the rules themselves so much as whatever “agency policy” they choose to draw from them in any given case. If you protest any “agency policy” you will be informed that it was formulated with input from “the public.” But not from the likes of you.
Disregard for the text of laws — for the dictionary meaning of words and the intentions of those who wrote them — in favor of the decider’s discretion has permeated our ruling class from the Supreme Court to the lowest local agency. Ever since Oliver Wendell Holmes argued in 1920 (Missouri v. Holland) that presidents, Congresses, and judges could not be bound by the U.S. Constitution regarding matters that the people who wrote and ratified it could not have foreseen, it has become conventional wisdom among our ruling class that they may transcend the Constitution while pretending allegiance to it. They began by stretching such constitutional terms as “interstate commerce” and “due process,” then transmuting others, e.g., “search and seizure,” into “privacy.” Thus in 1973 the Supreme Court endowed its invention of “privacy” with a “penumbra” that it deemed “broad enough to encompass a woman’s decision whether or not to terminate her pregnancy.” The court gave no other constitutional reasoning, period. Perfunctory to the point of mockery, this constitutional talk was to reassure the American people that the ruling class was acting within the Constitution’s limitations. By the 1990s federal courts were invalidating amendments to state constitutions passed by referenda to secure the “positive rights” they invent, because these expressions of popular will were inconsistent with the constitution they themselves were construing.
By 2010 some in the ruling class felt confident enough to dispense with the charade. Asked what in the Constitution allows Congress and the president to force every American to purchase health insurance, House Speaker Nancy Pelosi replied: “Are you serious? Are you serious?” No surprise then that lower court judges and bureaucrats take liberties with laws, regulations, and contracts. That is why legal words that say you are in the right avail you less in today’s America than being on the right side of the persons who decide what they want those words to mean.
As the discretionary powers of officeholders and of their informal entourages have grown, the importance of policy and of law itself is declining, citizenship is becoming vestigial, and the American people become ever more dependent.
Disaggregating and Dispiriting
The ruling class is keener to reform the American people’s family and spiritual lives than their economic and civic ones. In no other areas is the ruling class’s self-definition so definite, its contempt for opposition so patent, its Kulturkampf so open. It believes that the Christian family (and the Orthodox Jewish one too) is rooted in and perpetuates the ignorance commonly called religion, divisive social prejudices, and repressive gender roles, that it is the greatest barrier to human progress because it looks to its very particular interest — often defined as mere coherence against outsiders who most often know better. Thus the family prevents its members from playing their proper roles in social reform. Worst of all, it reproduces itself.
Since marriage is the family’s fertile seed, government at all levels, along with “mainstream” academics and media, have waged war on it. They legislate, regulate, and exhort in support not of “the family” — meaning married parents raising children — but rather of “families,” meaning mostly households based on something other than marriage. The institution of no-fault divorce diminished the distinction between cohabitation and marriage — except that husbands are held financially responsible for the children they father, while out-of-wedlock fathers are not. The tax code penalizes marriage and forces those married couples who raise their own children to subsidize “child care” for those who do not. Top Republicans and Democrats have also led society away from the very notion of marital fidelity by precept as well as by parading their affairs. For example, in 1997 the Democratic administration’s secretary of defense and the Republican Senate’s majority leader (joined by the New York Times et al.) condemned the military’s practice of punishing officers who had extramarital affairs. While the military had assumed that honoring marital vows is as fundamental to the integrity of its units as it is to that of society, consensus at the top declared that insistence on fidelity is “contrary to societal norms.” Not surprisingly, rates of marriage in America have decreased as out-of-wedlock births have increased. The biggest demographic consequence has been that about one in five of all households are women alone or with children, in which case they have about a four in 10 chance of living in poverty. Since unmarried mothers often are or expect to be clients of government services, it is not surprising that they are among the Democratic Party’s most faithful voters.
While our ruling class teaches that relationships among men, women, and children are contingent, it also insists that the relationship between each of them and the state is fundamental. That is why such as Hillary Clinton have written law review articles and books advocating a direct relationship between the government and children, effectively abolishing the presumption of parental authority. Hence whereas within living memory school nurses could not administer an aspirin to a child without the parents’ consent, the people who run America’s schools nowadays administer pregnancy tests and ship girls off to abortion clinics without the parents’ knowledge. Parents are not allowed to object to what their children are taught. But the government may and often does object to how parents raise children. The ruling class’s assumption is that what it mandates for children is correct ipso facto, while what parents do is potentially abusive. It only takes an anonymous accusation of abuse for parents to be taken away in handcuffs until they prove their innocence. Only sheer political weight (and in California, just barely) has preserved parents’ right to homeschool their children against the ruling class’s desire to accomplish what Woodrow Wilson so yearned: “to make young gentlemen as unlike their fathers as possible.”
At stake are the most important questions: What is the right way for human beings to live? By what standard is anything true or good? Who gets to decide what? Implicit in Wilson’s words and explicit in our ruling class’s actions is the dismissal, as the ways of outdated “fathers,” of the answers that most Americans would give to these questions. This dismissal of the American people’s intellectual, spiritual, and moral substance is the very heart of what our ruling class is about. Its principal article of faith, its claim to the right to decide for others, is precisely that it knows things and operates by standards beyond others’ comprehension.
While the unenlightened ones believe that man is created in the image and likeness of God and that we are subject to His and to His nature’s laws, the enlightened ones know that we are products of evolution, driven by chance, the environment, and the will to primacy. While the un-enlightened are stuck with the antiquated notion that ordinary human minds can reach objective judgments about good and evil, better and worse through reason, the enlightened ones know that all such judgments are subjective and that ordinary people can no more be trusted with reason than they can with guns. Because ordinary people will pervert reason with ideology, religion, or interest, science is “science” only in the “right” hands. Consensus among the right people is the only standard of truth. Facts and logic matter only insofar as proper authority acknowledges them.
That is why the ruling class is united and adamant about nothing so much as its right to pronounce definitive, “scientific” judgment on whatever it chooses. When the government declares, and its associated press echoes that “scientists say” this or that, ordinary people — or for that matter scientists who “don’t say,” or are not part of the ruling class — lose any right to see the information that went into what “scientists say.” Thus when Virginia’s attorney general subpoenaed the data by which Professor Michael Mann had concluded, while paid by the state of Virginia, that the earth’s temperatures are rising “like a hockey stick” from millennial stability — a conclusion on which billions of dollars’ worth of decisions were made — to investigate the possibility of fraud, the University of Virginia’s faculty senate condemned any inquiry into “scientific endeavor that has satisfied peer review standards” claiming that demands for data “send a chilling message to scientists…and indeed scholars in any discipline.” The Washington Posteditorialized that the attorney general’s demands for data amounted to “an assault on reason.” The fact that the “hockey stick” conclusion stands discredited and Mann and associates are on record manipulating peer review, the fact that science-by-secret-data is an oxymoron, the very distinction between truth and error, all matter far less to the ruling class than the distinction between itself and those they rule.
By identifying science and reason with themselves, our rulers delegitimize opposition. Though they cannot prevent Americans from worshiping God, they can make it as socially disabling as smoking — to be done furtively and with a bad social conscience. Though they cannot make Americans wish they were Europeans, they continue to press upon this nation of refugees from the rest of the world the notion that Americans ought to live by “world standards.” Each day, the ruling class produces new “studies” that show that one or another of Americans’ habits is in need of reform, and that those Americans most resistant to reform are pitiably, perhaps criminally, wrong. Thus does it go about disaggregating and dispiriting the ruled.
Meddling and Apologies
America’s best and brightest believe themselves qualified and duty bound to direct the lives not only of Americans but of foreigners as well. George W. Bush’s 2005 inaugural statement that America cannot be free until the whole world is free and hence that America must push and prod mankind to freedom was but an extrapolation of the sentiments of America’s Progressive class, first articulated by such as Princeton’s Woodrow Wilson and Columbia’s Nicholas Murray Butler. But while the early Progressives expected the rest of the world to follow peacefully, today’s ruling class makes decisions about war and peace at least as much forcibly to tinker with the innards of foreign bodies politic as to protect America. Indeed, they conflate the two purposes in the face of the American people’s insistence to draw a bright line between war against our enemies and peace with non-enemies in whose affairs we do not interfere. That is why, from Wilson to Kissinger, the ruling class has complained that the American people oscillate between bellicosity and “isolationism.”
Because our ruling class deems unsophisticated the American people’s perennial preference for decisive military action or none, its default solution to international threats has been to commit blood and treasure to long-term, twilight efforts to reform the world’s Vietnams, Somalias, Iraqs, and Afghanistans, believing that changing hearts and minds is the prerequisite of peace and that it knows how to change them. The apparently endless series of wars in which our ruling class has embroiled America, wars that have achieved nothing worthwhile at great cost in lives and treasure, has contributed to defining it, and to discrediting it — but not in its own eyes.
Rather, even as our ruling class has lectured, cajoled, and sometimes intruded violently to reform foreign countries in its own image, it has apologized to them for America not having matched that image — their private image. Woodrow Wilson began this double game in 1919, when he assured Europe’s peoples that America had mandated him to demand their agreement to Article X of the peace treaty (the League of Nations) and then swore to the American people that Article X was the Europeans’ non-negotiable demand. The fact that the U.S. government had seized control of transatlantic cable communications helped hide (for a while) that the League scheme was merely the American Progressives’ private dream. In our time, this double game is quotidian on the evening news. Notably, President Obama apologized to Europe because “the United States has fallen short of meeting its responsibilities” to reduce carbon emissions by taxation. But the American people never assumed such responsibility, and oppose doing so. Hence President Obama was not apologizing for anything that he or anyone he respected had done, but rather blaming his fellow Americans for not doing what he thinks they should do while glossing over the fact that the Europeans had done the taxing but not the reducing. Wilson redux.
Similarly, Obama “apologized” to Europeans because some Americans — not him and his friends — had shown “arrogance and been dismissive” toward them, and to the world because President Truman had used the atom bomb to end World War II. So President Clinton apologized to Africans because some Americans held African slaves until 1865 and others were mean to Negroes thereafter — not himself and his friends, of course. So assistant secretary of state Michael Posner apologized to Chinese diplomats for Arizona’s law that directs police to check immigration status. Republicans engage in that sort of thing as well: former Soviet dictator Mikhail Gorbachev tells us that in 1987 then vice president George H. W. Bush distanced himself from his own administration by telling him, “Reagan is a conservative, an extreme conservative. All the dummies and blockheads are with him…” This is all about a class of Americans distinguishing itself from its inferiors. It recalls the Pharisee in the Temple: “Lord, I thank thee that I am not like other men…”
In sum, our ruling class does not like the rest of America. Most of all does it dislike that so many Americans think America is substantially different from the rest of the world and like it that way. For our ruling class, however, America is a work in progress, just like the rest the world, and they are the engineers.
The Country Class
Describing America’s country class is problematic because it is so heterogeneous. It has no privileged podiums, and speaks with many voices, often inharmonious. It shares above all the desire to be rid of rulers it regards inept and haughty. It defines itself practically in terms of reflexive reaction against the rulers’ defining ideas and proclivities — e.g., ever higher taxes and expanding government, subsidizing political favorites, social engineering, approval of abortion, etc. Many want to restore a way of life largely superseded. Demographically, the country class is the other side of the ruling class’s coin: its most distinguishing characteristics are marriage, children, and religious practice. While the country class, like the ruling class, includes the professionally accomplished and the mediocre, geniuses and dolts, it is different because of its non-orientation to government and its members’ yearning to rule themselves rather than be ruled by others.
Even when members of the country class happen to be government officials or officers of major corporations, their concerns are essentially private; in their view, government owes to its people equal treatment rather than action to correct what anyone perceives as imbalance or grievance. Hence they tend to oppose special treatment, whether for corporations or for social categories. Rather than gaming government regulations, they try to stay as far from them as possible. Thus the Supreme Court’s 2005 decision in Kelo, which allows the private property of some to be taken by others with better connections to government, reminded the country class that government is not its friend.
Negative orientation to privilege distinguishes the corporate officer who tries to keep his company from joining the Business Council of large corporations who have close ties with government from the fellow in the next office. The first wants the company to grow by producing. The second wants it to grow by moving to the trough. It sets apart the schoolteacher who resents the union to which he is forced to belong for putting the union’s interests above those of parents who want to choose their children’s schools. In general, the country class includes all those in stations high and low who are aghast at how relatively little honest work yields, by comparison with what just a little connection with the right bureaucracy can get you. It includes those who take the side of outsiders against insiders, of small institutions against large ones, of local government against the state or federal. The country class is convinced that big business, big government, and big finance are linked as never before and that ordinary people are more unequal than ever.
Members of the country class who want to rise in their profession through sheer competence try at once to avoid the ruling class’s rituals while guarding against infringing its prejudices. Averse to wheedling, they tend to think that exams should play a major role in getting or advancing in jobs, that records of performance — including academic ones — should be matters of public record, and that professional disputes should be settled by open argument. For such people, the Supreme Court’s 2009 decision in Ricci, upholding the right of firefighters to be promoted according to the results of a professional exam, revived the hope that competence may sometimes still trump political connections.
Nothing has set the country class apart, defined it, made it conscious of itself, given it whatever coherence it has, so much as the ruling class’s insistence that people other than themselves are intellectually and hence otherwise humanly inferior. Persons who were brought up to believe themselves as worthy as anyone, who manage their own lives to their own satisfaction, naturally resent politicians of both parties who say that the issues of modern life are too complex for any but themselves. Most are insulted by the ruling class’s dismissal of opposition as mere “anger and frustration” — an imputation of stupidity — while others just scoff at the claim that the ruling class’s bureaucratic language demonstrates superior intelligence. A few ask the fundamental question: Since when and by what right does intelligence trump human equality? Moreover, if the politicians are so smart, why have they made life worse?
The country class actually believes that America’s ways are superior to the rest of the world’s, and regards most of mankind as less free, less prosperous, and less virtuous. Thus while it delights in croissants and thinks Toyota’s factory methods are worth imitating, it dislikes the idea of adhering to “world standards.” This class also takes part in the U.S. armed forces body and soul: nearly all the enlisted, non-commissioned officers and officers under flag rank belong to this class in every measurable way. Few vote for the Democratic Party. You do not doubt that you are amidst the country class rather than with the ruling class when the American flag passes by or “God Bless America” is sung after seven innings of baseball, and most people show reverence. The same people wince at the National Football League’s plaintive renditions of the “Star Spangled Banner.”
Unlike the ruling class, the country class does not share a single intellectual orthodoxy, set of tastes, or ideal lifestyle. Its different sectors draw their notions of human equality from different sources: Christians and Jews believe it is God’s law. Libertarians assert it from Hobbesian and Darwinist bases. Many consider equality the foundation of Americanism. Others just hate snobs. Some parts of the country class now follow the stars and the music out of Nashville, Tennessee, and Branson, Missouri — entertainment complexes larger than Hollywood’s — because since the 1970s most of Hollywood’s products have appealed more to the mores of the ruling class and its underclass clients than to those of large percentages of Americans. The same goes for “popular music” and television. For some in the country class Christian radio and TV are the lodestone of sociopolitical taste, while the very secular Fox News serves the same purpose for others. While symphonies and opera houses around the country, as well as the stations that broadcast them, are firmly in the ruling class’s hands, a considerable part of the country class appreciates these things for their own sake. By that very token, the country class’s characteristic cultural venture — the homeschool movement — stresses the classics across the board in science, literature, music, and history even as the ruling class abandons them.
Congruent Agendas?
Each of the country class’s diverse parts has its own agenda, which flows from the peculiar ways in which the ruling class impacts its concerns. Independent businesspeople are naturally more sensitive to the growth of privileged relations between government and their competitors. Persons who would like to lead their community rue the advantages that Democratic and Republican party establishments are accruing. Parents of young children and young women anxious about marriage worry that cultural directives from on high are dispelling their dreams. The faithful to God sense persecution. All resent higher taxes and loss of freedom. More and more realize that their own agenda’s advancement requires concerting resistance to the ruling class across the board.
Not being at the table when government makes the rules about how you must run your business, knowing that you will be required to pay more, work harder, and show deference for the privilege of making less money, is the independent businessman’s nightmare. But what to do about it? In our time the interpenetration of government and business — the network of subsidies, preferences, and regulations — is so thick and deep, the people “at the table” receive and recycle into politics so much money, that independent businesspeople cannot hope to undo any given regulation or grant of privilege. Just as no manufacturer can hope to reduce the subsidies that raise his fuel costs, no set of doctors can shield themselves from the increased costs and bureaucracy resulting from government mandates. Hence independent business’s agenda has been to resist the expansion of government in general, and of course to reduce taxes. Pursuit of this agenda with arguments about economic efficiency and job creation — and through support of the Republican Party — usually results in enough relief to discourage more vigorous remonstrance. Sometimes, however, the economic argument is framed in moral terms: “The sum of good government,” said Thomas Jefferson, is not taking “from the mouth of labor the bread it has earned.” For government to advantage some at others’ expense, said he, “is to violate arbitrarily the first principle of association.” In our time, more and more independent businesspeople have come to think of their economic problems in moral terms. But few realize how revolutionary that is.
As bureaucrats and teachers’ unions disempowered neighborhood school boards, while the governments of towns, counties, and states were becoming conduits for federal mandates, as the ruling class reduced the number and importance of things that American communities could decide for themselves, America’s thirst for self-governance reawakened. The fact that public employees are almost always paid more and have more generous benefits than the private sector people whose taxes support them only sharpened the sense among many in the country class that they now work for public employees rather than the other way around. But how to reverse the roles? How can voters regain control of government? Restoring localities’ traditional powers over schools, including standards, curriculum, and prayer, would take repudiating two generations of Supreme Court rulings. So would the restoration of traditional “police” powers over behavior in public places. Bringing public employee unions to heel is only incidentally a matter of cutting pay and benefits. As self-governance is crimped primarily by the powers of government personified in its employees, restoring it involves primarily deciding that any number of functions now performed and the professional specialties who perform them, e.g., social workers, are superfluous or worse. Explaining to one’s self and neighbors why such functions and personnel do more harm than good, while the ruling class brings its powers to bear to discredit you, is a very revolutionary thing to do.
America’s pro-family movement is a reaction to the ruling class’s challenges: emptying marriage of legal sanction, promoting abortion, and progressively excluding parents from their children’s education. Americans reacted to these challenges primarily by sorting themselves out. Close friendships and above all marriages became rarer between persons who think well of divorce, abortion, and government authority over children and those who do not. The homeschool movement, for which the Internet became the great facilitator, involves not only each family educating its own children, but also extensive and growing social, intellectual, and spiritual contact among like-minded persons. In short, the part of the country class that is most concerned with family matters has taken on something of a biological identity. Few in this part of the country class have any illusion, however, that simply retreating into private associations will long save their families from societal influences made to order to discredit their ways. But stopping the ruling class’s intrusions would require discrediting its entire conception of man, of right and wrong, as well as of the role of courts in popular government. That revolutionary task would involve far more than legislation.
The ruling class’s manifold efforts to discredit and drive worship of God out of public life — not even the Soviet Union arrested students for wearing crosses or praying, or reading the Bible on school property, as some U.S. localities have done in response to Supreme Court rulings — convinced many among the vast majority of Americans who believe and pray that today’s regime is hostile to the most important things of all. Every December, they are reminded that the ruling class deems the very word “Christmas” to be offensive. Every time they try to manifest their religious identity in public affairs, they are deluged by accusations of being “American Taliban” trying to set up a “theocracy.” Let members of the country class object to anything the ruling class says or does, and likely as not their objection will be characterized as “religious,” that is to say irrational, that is to say not to be considered on a par with the “science” of which the ruling class is the sole legitimate interpreter. Because aggressive, intolerant secularism is the moral and intellectual basis of the ruling class’s claim to rule, resistance to that rule, whether to the immorality of economic subsidies and privileges, or to the violation of the principle of equal treatment under equal law, or to its seizure of children’s education, must deal with secularism’s intellectual and moral core. This lies beyond the boundaries of politics as the term is commonly understood.
The Classes Clash
The ruling class’s appetite for deference, power, and perks grows. The country class disrespects its rulers, wants to curtail their power and reduce their perks. The ruling class wears on its sleeve the view that the rest of Americans are racist, greedy, and above all stupid. The country class is ever more convinced that our rulers are corrupt, malevolent, and inept. The rulers want the ruled to shut up and obey. The ruled want self-governance. The clash between the two is about which side’s vision of itself and of the other is right and which is wrong. Because each side — especially the ruling class — embodies its views on the issues, concessions by one side to another on any issue tend to discredit that side’s view of itself. One side or the other will prevail. The clash is as sure and momentous as its outcome is unpredictable.
In this clash, the ruling class holds most of the cards: because it has established itself as the fount of authority, its primacy is based on habits of deference. Breaking them, establishing other founts of authority, other ways of doing things, would involve far more than electoral politics. Though the country class had long argued along with Edmund Burke against making revolutionary changes, it faces the uncomfortable question common to all who have had revolutionary changes imposed on them: are we now to accept what was done to us just because it was done? Sweeping away a half century’s accretions of bad habits — taking care to preserve the good among them — is hard enough. Establishing, even reestablishing, a set of better institutions and habits is much harder, especially as the country class wholly lacks organization. By contrast, the ruling class holds strong defensive positions and is well represented by the Democratic Party. But a two to one numerical disadvantage augurs defeat, while victory would leave it in control of a people whose confidence it cannot regain.
Certainly the country class lacks its own political vehicle — and perhaps the coherence to establish one. In the short term at least, the country class has no alternative but to channel its political efforts through the Republican Party, which is eager for its support. But the Republican Party does not live to represent the country class. For it to do so, it would have to become principles-based, as it has not been since the mid-1860s. The few who tried to make it so the party treated as rebels: Barry Goldwater and Ronald Reagan. The party helped defeat Goldwater. When it failed to stop Reagan, it saddled his and subsequent Republican administrations with establishmentarians who, under the Bush family, repudiated Reagan’s principles as much as they could. Barack Obama exaggerated in charging that Republicans had driven the country “into the ditch” all alone. But they had a hand in it. Few Republican voters, never mind the larger country class, have confidence that the party is on their side. Because, in the long run, the country class will not support a party as conflicted as today’s Republicans, those Republican politicians who really want to represent it will either reform the party in an unmistakable manner, or start a new one as Whigs like Abraham Lincoln started the Republican Party in the 1850s.
The name of the party that will represent America’s country class is far less important than what, precisely, it represents and how it goes about representing it because, for the foreseeable future, American politics will consist of confrontation between what we might call the Country Party and the ruling class. The Democratic Party having transformed itself into a unit with near-European discipline, challenging it would seem to require empowering a rival party at least as disciplined. What other antidote is there to government by one party but government by another party? Yet this logic, though all too familiar to most of the world, has always been foreign to America and naturally leads further in the direction toward which the ruling class has led. Any country party would have to be wise and skillful indeed not to become the Democrats’ mirror image.
Yet to defend the country class, to break down the ruling class’s presumptions, it has no choice but to imitate the Democrats, at least in some ways and for a while. Consider: The ruling class denies its opponents’ legitimacy. Seldom does a Democratic official or member of the ruling class speak on public affairs without reiterating the litany of his class’s claim to authority, contrasting it with opponents who are either uninformed, stupid, racist, shills for business, violent, fundamentalist, or all of the above. They do this in the hope that opponents, hearing no other characterizations of themselves and no authoritative voice discrediting the ruling class, will be dispirited. For the country class seriously to contend for self-governance, the political party that represents it will have to discredit not just such patent frauds as ethanol mandates, the pretense that taxes can control “climate change,” and the outrage of banning God from public life. More important, such a serious party would have to attack the ruling class’s fundamental claims to its superior intellect and morality in ways that dispirit the target and hearten one’s own. The Democrats having set the rules of modern politics, opponents who want electoral success are obliged to follow them.
Suppose that the Country Party (whatever its name might be) were to capture Congress, the presidency, and most statehouses. What then would it do? Especially if its majority were slim, it would be tempted to follow the Democrats’ plan of 2009-2010, namely to write its wish list of reforms into law regardless of the Constitution and enact them by partisan majorities supported by interest groups that gain from them, while continuing to vilify the other side. Whatever effect this might have, it surely would not be to make America safe for self-governance because by carrying out its own “revolution from above” to reverse the ruling class’s previous “revolution from above,” it would have made that ruinous practice standard in America. Moreover, a revolution designed at party headquarters would be antithetical to the country class’s diversity as well as to the American Founders’ legacy.
Achieving the country class’s inherently revolutionary objectives in a manner consistent with the Constitution and with its own diversity would require the Country Party to use legislation primarily as a tool to remove obstacles, to instruct, to reintroduce into American life ways and habits that had been cast aside. Passing national legislation is easier than getting people to take up the responsibilities of citizens, fathers, and entrepreneurs.
Reducing the taxes that most Americans resent requires eliminating the network of subsidies to millions of other Americans that these taxes finance, and eliminating the jobs of government employees who administer them. Eliminating that network is practical, if at all, if done simultaneously, both because subsidies are morally wrong and economically counterproductive, and because the country cannot afford the practice in general. The electorate is likely to cut off millions of government clients, high and low, only if its choice is between no economic privilege for anyone and ratifying government’s role as the arbiter of all our fortunes. The same goes for government grants to and contracts with so-called nonprofit institutions or non-governmental organizations. The case against all arrangements by which the government favors some groups of citizens is easier to make than that against any such arrangement. Without too much fuss, a few obviously burdensome bureaucracies, like the Department of Education, can be eliminated, while money can be cut off to partisan enterprises such as the National Endowments and public broadcasting. That sort of thing is as necessary to the American body politic as a weight reduction program is essential to restoring the health of any human body degraded by obesity and lack of exercise. Yet shedding fat is the easy part. Restoring atrophied muscles is harder. Reenabling the body to do elementary tasks takes yet more concentration.
The grandparents of today’s Americans (132 million in 1940) had opportunities to serve on 117,000 school boards. To exercise responsibilities comparable to their grandparents’, today’s 310 million Americans would have radically to decentralize the mere 15,000 districts into which public school children are now concentrated. They would have to take responsibility for curriculum and administration away from credentialed experts, and they would have to explain why they know better. This would involve a level of political articulation of the body politic far beyond voting in elections every two years.
If self-governance means anything, it means that those who exercise government power must depend on elections. The shorter the electoral leash, the likelier an official to have his chain yanked by voters, the more truly republican the government is. Yet to subject the modern administrative state’s agencies to electoral control would require ordinary citizens to take an interest in any number of technical matters. Law can require environmental regulators or insurance commissioners, or judges or auditors to be elected. But only citizens’ discernment and vigilance could make these officials good. Only citizens’ understanding of and commitment to law can possibly reverse the patent disregard for the Constitution and statutes that has permeated American life. Unfortunately, it is easier for anyone who dislikes a court’s or an official’s unlawful act to counter it with another unlawful one than to draw all parties back to the foundation of truth.
How, for example, to remind America of, and to drive home to the ruling class, Lincoln’s lesson that trifling with the Constitution for the most heartfelt of motives destroys its protections for all? What if a country class majority in both houses of Congress were to co-sponsor a “Bill of Attainder to deprive Nancy Pelosi, Barack Obama, and other persons of liberty and property without further process of law for having violated the following ex post facto law…” and larded this constitutional monstrosity with an Article III Section 2 exemption from federal court review? When the affected members of the ruling class asked where Congress gets the authority to pass a bill every word of which is contrary to the Constitution, they would be confronted, publicly, with House Speaker Nancy Pelosi’s answer to a question on the Congress’s constitutional authority to mandate individuals to purchase certain kinds of insurance: “Are you kidding? Are you kidding?” The point having been made, the Country Party could lead public discussions around the country on why even the noblest purposes (maybe even Title II of the Civil Rights Bill of 1964?) cannot be allowed to trump the Constitution.
How the country class and ruling class might clash on each item of their contrasting agendas is beyond my scope. Suffice it to say that the ruling class’s greatest difficulty — aside from being outnumbered — will be to argue, against the grain of reality, that the revolution it continues to press upon America is sustainable. For its part, the country class’s greatest difficulty will be to enable a revolution to take place without imposing it. America has been imposed on enough.
Editor’s Note: This version corrects an error that appears the print edition of this article, which incorrectly lists Barack Obama as a research assistant to Laurence Tribe in 1984. He in fact was an assistant to Tribe in 1988-89.Update: The article has also been changed to correct a quote from Nancy Pelosi.
In today’s America, a network of executive, judicial, bureaucratic, and social kinship channels bypasses the sovereignty of citizens. Our imperial regime, already in force, works on a simple principle: the president and the cronies who populate these channels may do whatever they like so long as the bureaucracy obeys and one third plus one of the Senate protects him from impeachment. If you are on the right side of that network, you can make up the rules as you go along, ignore or violate any number of laws, obfuscate or commit perjury about what you are doing (in the unlikely case they put you under oath), and be certain of your peers’ support. These cronies’ shared social and intellectual identity stems from the uniform education they have received in the universities. Because disdain for ordinary Americans is this ruling class’s chief feature, its members can be equally certain that all will join in celebrating each, and in demonizing their respective opponents.
And, because the ruling class blurs the distinction between public and private business, connection to that class has become the principal way of getting rich in America. Not so long ago, the way to make it here was to start a business that satisfied customers’ needs better than before. Nowadays, more businesses die each year than are started. In this century, all net additions in employment have come from the country’s 1,500 largest corporations. Rent-seeking through influence on regulations is the path to wealth. In the professions, competitive exams were the key to entry and advancement not so long ago. Now, you have to make yourself acceptable to your superiors. More important, judicial decisions and administrative practice have divided Americans into “protected classes”—possessed of special privileges and immunities—and everybody else. Equality before the law and equality of opportunity are memories. Co-option is the path to power. Ever wonder why the quality of our leaders has been declining with each successive generation?
Moreover, since the Kennedy reform of 1965, and with greater speed since 2009, the ruling class’s immigration policy has changed the regime by introducing some 60 million people—roughly a fifth of our population—from countries and traditions different from, if not hostile, to ours. Whereas earlier immigrants earned their way to prosperity, a disproportionate percentage of post-1965 arrivals have been encouraged to become dependents of the state. Equally important, the ruling class chose to reverse America’s historic practice of assimilating immigrants, emphasizing instead what divides them from other Americans. Whereas Lincoln spoke of binding immigrants by “the electric cord” of the founders’ principles, our ruling class treats these principles as hypocrisy. All this without votes or law; just power.
Foul is Fair and Fair is Foul
In short, precisely as the classics defined regime change, people and practices that had been at society’s margins have been brought to its center, while people and ideas that had been central have been marginalized.
Fifty years ago, prayer in the schools was near universal, but no one was punished for not praying. Nowadays, countless people are arrested or fired for praying on school property. West Point’s commanding general reprimanded the football coach for his team’s thanksgiving prayer. Fifty years ago, bringing sexually explicit stuff into schools was treated as a crime, as was “procuring abortion.” Nowadays, schools contract with Planned Parenthood to teach sex, and will not tell parents when they take girls to PP facilities for abortions. Back then, many schools worked with the National Rifle Association to teach gun handling and marksmanship. Now students are arrested and expelled merely for pointing their finger and saying “bang.” In those benighted times, boys who ventured into the girls’ bathroom were expelled as perverts. Now, girls are suspended for objecting to boys coming into the girls’ room under pretense of transgenderism. The mainstreaming of pornography, the invention of abortion as the most inalienable of human rights and, most recently, the designation of opposition to homosexual marriage as a culpable psychosis—none of which is dictated by law enacted by elected officials—is enforced as if it had been. No surprise that America has experienced a drastic drop in the formation of families, with the rise of rates of out-of-wedlock births among whites equal to the rates among blacks that was recognized as disastrous a half-century ago, the near-disappearance of two-parent families among blacks, and the social dislocations attendant to all that.
Ever since the middle of the 20th century our ruling class, pursuing hazy concepts of world order without declarations of war, has sacrificed American lives first in Korea, then in Vietnam, and now throughout the Muslim world. By denigrating Americans who call for peace, or for wars unto victory over America’s enemies; by excusing or glorifying those who take our enemies’ side or who disrespect the American flag; our rulers have drawn down the American regime’s credit and eroded the people’s patriotism.
As the ruling class destroyed its own authority, it wrecked the republic’s as well. This is no longer the “land where our fathers died,” nor even the country that won World War II. It would be surprising if any society, its identity altered and its most fundamental institutions diminished, had continued to function as before. Ours sure does not, and it is difficult to imagine how it can do so ever again. We can be sure only that the revolution underway among us, like all others, will run its unpredictable course.
All we know is the choice that faces us at this stage: either America continues in the same direction, but faster and without restraint, or there’s the hazy possibility of something else.
Imperial Alternatives
The consequences of empowering today’s Democratic Party are crystal clear. The Democratic Party—regardless of its standard bearer—would use its victory to drive the transformations that it has already wrought on America to quantitative and qualitative levels that not even its members can imagine. We can be sure of that because what it has done and is doing is rooted in a logic that has animated the ruling class for a century, and because that logic has shaped the minds and hearts of millions of this class’s members, supporters, and wannabes.
That logic’s essence, expressed variously by Herbert Croly and Woodrow Wilson, FDR’s brains trust, intellectuals of both the old and the new Left, choked back and blurted out by progressive politicians, is this: America’s constitutional republic had given the American people too much latitude to be who they are, that is: religiously and socially reactionary, ignorant, even pathological, barriers to Progress. Thankfully, an enlightened minority exists with the expertise and the duty to disperse the religious obscurantism, the hypocritical talk of piety, freedom, and equality, which excuses Americans’ racism, sexism, greed, and rape of the environment. As we progressives take up our proper responsibilities, Americans will no longer live politically according to their prejudices; they will be ruled administratively according to scientific knowledge.
Progressivism’s programs have changed over time. But its disdain for how other Americans live and think has remained fundamental. More than any commitment to principles, programs, or way of life, this is its paramount feature. The media reacted to Hillary Clinton’s remark that “half of Trump’s supporters could be put into a ‘basket of deplorables’” as if these sentiments were novel and peculiar to her. In fact, these are unremarkable restatements of our ruling class’s perennial creed.
The pseudo-intellectual argument for why these “deplorables” have no right to their opinions is that giving equal consideration to people and positions that stand in the way of Progress is “false equivalence,” as President Obama has put it. But the same idea has been expressed most recently and fully by New York TimesCEO Mark Thompson, as well as Times columnists Jim Rutenberg, Timothy Egan, and William Davies. In short, devotion to truth means not reporting on Donald Trump and people like him as if they or anything they say might be of value.
If trying to persuade irredeemable socio-political inferiors is no more appropriate than arguing with animals, why not just write them off by sticking dismissive names on them? Doing so is less challenging, and makes you feel superior. Why wrestle with the statistical questions implicit in Darwin when you can just dismiss Christians as Bible-thumpers? Why bother arguing for Progressivism’s superiority when you can construct “scientific” studies like Theodor Adorno’s, proving that your opponents suffer from degrees of “fascism” and other pathologies? This is a well-trod path. Why, to take an older example, should General Omar Bradley have bothered trying to refute Douglas MacArthur’s statement that in war there is no substitute for victory when calling MacArthur and his supporters “primitives” did the trick? Why wrestle with our climate’s complexities when you can make up your own “models,” being sure that your class will treat them as truth?
What priorities will the ruling class’s notion of scientific truth dictate to the next Democratic administration? Because rejecting that true and false, right and wrong are objectively ascertainable is part of this class’s DNA, no corpus of fact or canon of reason restrains it or defines its end-point. Its definition of “science” is neither more nor less than what “scientists say” at any given time. In practice, that means “Science R-Us,” now and always, exclusively. Thus has come to pass what President Dwight Eisenhower warned against in his 1960 Farewell address: “A steadily increasing share [of science] is conducted for, by, or at the direction of, the Federal government.… [T]he free university, historically the fountainhead of free ideas and scientific discovery, has experienced a revolution…a government contract becomes virtually a substitute for intellectual curiosity.” Hence, said Ike, “The prospect of domination of the nation’s scholars by Federal employment, project allocations, and the power of money is ever present—and is gravely to be regarded.” The result has been that academics rise through government grants while the government exercises power by claiming to act on science’s behalf. If you don’t bow to the authority of the power that says what is and is not so, you are an obscurantist or worse.
Under our ruling class, “truth” has morphed from the reflection of objective reality to whatever has “normative pull”—i.e., to what furthers the ruling class’s agenda, whatever that might be at any given time. That is the meaning of the term “political correctness,” as opposed to factual correctness.
It’s the Contempt, Stupid!
Who, a generation ago, could have guessed that careers and social standing could be ruined by stating the fact that the paramount influence on the earth’s climate is the sun, that its output of energy varies and with it the climate? Who, a decade ago, could have predicted that stating that marriage is the union of a man and a woman would be treated as a culpable sociopathy, or just yesterday that refusing to let certifiably biological men into women’s bathrooms would disqualify you from mainstream society? Or that saying that the lives of white people “matter” as much as those of blacks is evidence of racism? These strictures came about quite simply because some sectors of the ruling class felt like inflicting them on the rest of America. Insulting presumed inferiors proved to be even more important to the ruling class than the inflictions’ substance.
How far will our rulers go? Because their network is mutually supporting, they will go as far as they want. Already, there is pressure from ruling class constituencies, as well as academic arguments, for morphing the concept of “hate crime” into the criminalization of “hate speech”—which means whatever these loving folks hate. Of course this is contrary to the First Amendment, and a wholesale negation of freedom. But it is no more so than the negation of freedom of association that is already eclipsing religious freedom in the name of anti-discrimination. It is difficult to imagine a Democratic president, Congress, and Supreme Court standing in the way.
Above all, these inflictions, as well as the ruling class’s acceptance of its own members’ misbehavior, came about because millions of its supporters were happy, or happy enough, to support them in the interest of maintaining their own status in a ruling coalition while discomfiting their socio-political opponents. Consider, for example, how republic-killing an event was the ruling class’s support of President Bill Clinton in the wake of his nationally televised perjury. Subsequently, as constituencies of supporters have effectively condoned officials’ abusive, self-serving, and even outright illegal behavior, they have encouraged more and more of it while inuring themselves to it. That is how republics turn into empires from the roots up.
But it is also true, as Mao Tse-Tung used to say, “a fish begins to rot at the head.” If you want to understand why any and all future Democratic Party administrations can only be empires dedicated to injuring and insulting their subjects, look first at their intellectual leaders’ rejection of the American republic’s most fundamental principles.
The Declaration of Independence says that all men “are endowed by their Creator with certain unalienable rights” among which are “life, liberty, and the pursuit of happiness.” These rights—codified in the Constitution’s Bill of Rights—are not civil rights that governments may define. The free exercise of religion, freedom of speech and assembly, keeping and bearing arms, freedom from warrantless searches, protection against double jeopardy and self-incrimination, trial by jury of one’s peers, etc., are natural rights that pertain to human beings as such. Securing them for Americans is what the United States is all about. But today’s U.S. Civil Rights Commission advocates truncating the foremost of these rights because, as it stated in a recent report, “Religious exemptions to the protections of civil rights based upon classifications such as race, color, national origin, sex, disability status, sexual orientation, and gender identity, when they are permissible, significantly infringe upon those civil rights.” The report explains why the rights enumerated in the Declaration of Independence and the Bill of Rights should not be permissible: “The phrases ‘religious liberty’ and ‘religious freedom’ will stand for nothing except hypocrisy so long as they remain code words for discrimination, intolerance, racism, sexism, homophobia, Islamophobia, Christian supremacy, or any form of intolerance.”
Hillary Clinton’s attack on Trump supporters merely matched the ruling class’s current common sense. Why should government workers and all who wield the administrative state’s unaccountable powers not follow their leaders’ judgment, backed by the prestige press, about who are to be treated as citizens and who is to be handled as deplorable refuse? Hillary Clinton underlined once again how the ruling class regards us, and about what it has in store for us.
Electing Donald Trump would result in an administration far less predictable than any Democratic one. In fact, what Trump would or would not do, could or could not do, pales into insignificance next to the certainty of what any Democrat would do. That is what might elect Trump.
The character of an eventual Trump Administration is unpredictable because speculating about Trump’s mind is futile. It is equally futile to guess how he might react to the mixture of flattery and threats sure to be leveled against him. The entire ruling class—Democrats and Republicans, the bulk of the bureaucracy, the judiciary, and the press—would do everything possible to thwart him; and the constituencies that chose him as their candidate, and that might elect him, are surely not united and are by no means clear about the demands they would press. Moreover, it is anyone’s guess whom he would appoint and how he would balance his constituencies’ pressures against those of the ruling class.
Never before has such a large percentage of Americans expressed alienation from their leaders, resentment, even fear. Some two-thirds of Americans believe that elected and appointed officials—plus the courts, the justice system, business leaders, educators—are leading the country in the wrong direction: that they are corrupt, do more harm than good, make us poorer, get us into wars and lose them. Because this majority sees no one in the political mainstream who shares their concerns, because it lacks confidence that the system can be fixed, it is eager to empower whoever might flush the system and its denizens with something like an ungentle enema.
Yet the persons who express such revolutionary sentiments are not a majority ready to support a coherent imperial program to reverse the course of America’s past half-century. Temperamentally conservative, these constituencies had been most attached to the Constitution and been counted as the bedrock of stability. They are not yet wholly convinced that there is little left to conserve. What they want, beyond an end to the ruling class’s outrages, has never been clear. This is not surprising, given that the candidates who appeal to their concerns do so with mere sound bites. Hence they chose as the presidential candidate of the nominal opposition party the man who combined the most provocative anti-establishment sounds with reassurance that it won’t take much to bring back good old America: Donald Trump. But bringing back good old America would take an awful lot. What could he do to satisfy them?
Trump’s propensity for treating pronouncements on policy as flags to be run up and down the flagpole as he measures the volume of the applause does not deprive them of all significance—especially the ones that confirm his anti-establishment bona fides. These few policy items happen to be the ones by which he gained his anti-establishment reputation in the first place: 1) opposition to illegal immigration, especially the importation of Muslims whom Americans reasonably perceive as hostile to us; 2) law and order: stop excusing rioters and coddling criminals; 3) build a wall, throw out the illegals, let in only people who are vetted and certified as supporters of our way of life (that’s the way it was when I got my immigrant visa in 1955), and keep out anybody we can’t be sure isn’t a terrorist. Trump’s tentative, partial retreat from a bit of the latter nearly caused his political standing to implode, prompting the observation that doing something similar regarding abortion would end his political career. That is noteworthy because, although Trump’s support of the pro-life cause is lukewarm at best, it is the defining commitment for much of his constituency. The point here is that, regardless of his own sentiments, Trump cannot wholly discount his constituencies’ demands for a forceful turn away from the country’s current direction.
Trump’s slogan—“make America great again”—is the broadest, most unspecific, common denominator of non-ruling-class Americans’ diverse dissatisfaction with what has happened to the country. He talks about reasserting America’s identity, at least by controlling the borders; governing in America’s own interest rather than in pursuit of objectives of which the American people have not approved; stopping the export of jobs and removing barriers to business; and banishing political correctness’s insults and injuries. But all that together does not amount to making America great again. Nor does Trump begin to explain what it was that had made this country great to millions who have known only an America much diminished.
In fact, the United States of America was great because of a whole bunch of things that now are gone. Yes, the ruling class led the way in personal corruption, cheating on tests, lowering of professional standards, abandoning churches and synagogues for the Playboy Philosophy and lifestyle, disregarding law, basing economic life on gaming the administrative state, basing politics on conflicting identities, and much more. But much of the rest of the country followed. What would it take to make America great again—or indeed to make any of the changes that Trump’s voters demand? Replacing the current ruling class would be only the beginning.
Because it is difficult to imagine a Trump presidency even thinking about something so monumental as replacing an entire ruling elite, much less leading his constituency to accomplishing it, electing Trump is unlikely to result in a forceful turn away from the country’s current direction. Continuing pretty much on the current trajectory under the same class will further fuel revolutionary sentiments in the land all by itself. Inevitable disappointment with Trump is sure to add to them.
We have stepped over the threshold of a revolution. It is difficult to imagine how we might step back, and futile to speculate where it will end. Our ruling class’s malfeasance, combined with insult, brought it about. Donald Trump did not cause it and is by no means its ultimate manifestation. Regardless of who wins in 2016, this revolution’s sentiments will grow in volume and intensity, and are sure to empower politicians likely to make Americans nostalgic for Donald Trump’s moderation.
According to the Office of Personnel Management, the SES was designed to be a corps of executives selected for their leadership qualifications, serving in key positions just below the top Presidential appointees as a link between them and the rest of the Federal (civil service) workforce. SES positions are considered to be above the GS-15 level of the General Schedule, and below Level III of the Executive Schedule. Career members of the SES ranks are eligible for the Presidential Rank Awards program.
Up to 10% of SES positions can be filled as political appointments rather than by career employees.[1] About half of the SES is designated “Career Reserved”, which can only be filled by career employees. The other half is designated “General”, which can be filled by either career employees or political appointments as desired by the administration. Due to the 10% limitation, most General positions are still filled by career appointees.[2]
(Effective on the first day of the first applicable pay period beginning on or after January 1, 2015)[3]
Minimum
Maximum
Agencies with a Certified SES Performance Appraisal System
$121,956
$183,300
Agencies without a Certified SES Performance Appraisal System
$121,956
$168,700
Unlike the General Schedule (GS) grades, SES pay is determined at agency discretion within certain parameters, and there is no locality pay adjustment.
The minimum pay level for the SES is set at 120 percent of the basic pay for GS-15 Step 1 employees ($121,956 for 2015). The maximum pay level depends on whether or not the employing agency has a “certified” SES performance appraisal system:[4]
If the agency has a certified system, the maximum pay is set at Level II of the Executive Schedule ($183,300 for 2015).
If the agency does not have a certified system, the maximum pay is set at Level III of the Executive Schedule ($168,700 for 2015).
Breaking Story 1: Rocket Man Kim Jong-Un Promises To Explode Hydrogen Bomb Over Pacific Ocean —
Story 2: The Democratic and Republican Party Failure To Completely Repeal Obamacare Including Repealing The Patient Protection and Affordable Care Act (ACA) and All Related Mandates, Regulations, Taxes, Spending and Subsidies — Obamacare Collapsing — Replace Obamacare With Free Enterprise Market Capitalism Health Insurance — Keep The Federal Government Out Of The Health Insurance and Health Care Business — Videos —
Story 3: Obama’s Secret Surveillance Spy State Scandal — Misuse of Intelligence Community For Political Purposes — Gross Abuse of Power and Political Conspiracy — Violation of Fourth Amendment — Videos —
Story 1: President Trump Signs Executive Order Targeting Institutions and People Doing Business With North Korea — Communist China Trades With and Enabled North Korea Nuclear Weapon and Missile Programs — Waiting For Embargo Banning All Trade and Investment in Communist China — Videos —
Story 2: Fed To Start Quantitative Tightening In October 2017 by Selling Some ($10 Billion Per Month or $120 Billion Per Year) of $4,500 Billion Bond Portfolio As U.S. Economy Slows in 2017? — Videos
Breaking and Developing — Story 1: 7.1 Richter Scale Earthquake Kills Over 200 In Mexico — Videos —
Story 2: Category 4 Hurricane Marie With 155 Miles Per Hour Winds, 10 Foot Flood Surge and 20 Plus Inches of Rainfall Turns Lights Out in Puerto Rico with Widespread Flooding and Damages — Videos —
Story 3: Yes The Obama Administration Was Wiretapping The Trump Campaign and Former Trump Campaign Manager Paul Manafort — Trump Was Right and Big Lie Media Lied Again — Obama Spying Scandal Bigger Than Watergate — Videos —
Story 4: Illegal Aliens Shout Down House Minority Leader Nancy Pelosi Calling Her A Liar — When Will American Citizens Shout Down President Trump Calling Him A Liar? … President Trump and Republican Party Want Touch Back Amnesty and Pathway to Citizenship For Illegal Aliens — Majority of American People Want All Immigration Laws Enforced — Deport and Remove All 30-60 Million Illegal Aliens In United States To Country of Origin — No Republican Re-importing of Illegal Aliens With Expedited Visas and Touch Back Amnesty and Pathway to Citizenship — Employ American Citizens Not Illegal Aliens — Videos
Story 1: President Trump United Nations Speech Names North Korea and Iran As Threats to World Peace and Critical of Those Nations (China) Who Trade With Them –Totally Destroy North Korea And The Rocket Man Mr. Kim — Videos —
Story 2: Major 7.1 Richter Scale Killer Earthquake Hits Central Mexico — 76 Miles Southwest of Mexico City Centered in Puebla state town of Raboso, — Damages and Collapses Buildings — Over 150 Deaths — Videos —
Story 3: Category 5 Hurricane Marie With Sustained Winds of 165 Miles Per Hour and Wind Gust 195 MPH Hits Puerto Rico, British and American Virgin Islands, Dominica, Dominican Republic, Guadeloupe — Videos
Story 1: Two Islamic Terrorists Arrested For London Train Attack — United Kingdom Threat Level Lowered From Critical To Severe — Elderly Couple Took In Several Hundred Forster Children Over The Years Including Two Suspected Terrorists — Trump: “Loser Terrorist” And “Sick And Demented” — 21-Year-Old Syrian Refugee Yahyah Farroukh Named Suspect — Videos —
Story 2: Trump Wants To Increase CIA Drone Attacks — Videos —
Story 3: Third Night Of Violence In St. Louis — Protesters And Vandals Damage Property With Over 120 Arrests And 11 Police Injured — Videos
Breaking Story 1: Radical Islamic Terrorist Attack — Improvised Bucket Bomb Device Explodes In United Kingdom Parson Green Tube Train Station in West London During Morning Rush Hour — 29 Injured None Seriously including Children — Threat Level Raised From Severe To Critical By Prime Minister May — Videos —
Story 2: North Korea Fires Another Ballistic Missile Over Japan — Videos —
Story 3: Conservative Commentator Ben Shapiro Allowed To Speak At University of California, Berkeley, Police Arrested Nine of The Protesters –Videos
Story 1: Did President Trump Betray His Supporters By Promising Citizenship or Pathway To Citizenship For Illegal Alien “Dreamers”? — Big Lie Media and Lying Lunatic Left Losers (Senate Democratic Leader Chuck Schumer and House Democratic Leader Nancy Pelosi ) Say They Have A Deal or Understanding and Rollover Republicans Support Trump (Senate Majority Leader Mitch McConnell and House Speaker Paul Ryan) — No Wall and No Deportation For 30-60 Million Illegal Aliens Including “Dreamers” — You Were Warned Not To Trust Trump — Rollover Republicans Want Touch-back Amnesty For Illegal Aliens — Hell No — Illegal Aliens Must Go — Trump Has 48 Hours To Confirm or Deny! — Political Suicide Watch Countdown — Videos
Story 1: American Collectivism (Resistance Is Futile) Vs. American Individualism (I Have Not Yet Begun To Fight!) — Federal Income, Capital Gains, Payroll,Estate And Gift Taxes, Budget Deficits, National Debt, Unfunded Liabilities, Democratic And Republican Parties, Two Party Tyranny Of The Warfare And Welfare State And American Empire Are The Past — The Future Is Fair Tax Less, Surplus Budgets, No Debts, No Unfunded Liabilities, And American Independence Party With A Peace And Prosperity Economy, Representative Constitutional American Republic Are The Future — Lead, Follow Or Get Out Of The Way — Those Without Power Cannot Defend Freedom — Videos
Story 1bama Spy Scandal: Obama Administration Officials Including National Security Adviser Rice, CIA Director Brennan and United Nations Ambassador Power Spied On American People and Trump Campaign By Massive Unmasking Using Intelligence Community For Political Purposes — An Abuse of Power and Felonies Under U.S. Law — Videos
Story 1: Trump Targets Transgender Troops — No More Gender Reassignment Surgeries In Military and Veterans Hospital — Cuts Spending By Millions Per Year — What is Next? — No More Free Viagra — Tranny Boys/Girls No More — Videos —
Story 2: Senate Fails To Pass Senator Rand Paul’s Total Repeal Amendment — Tea Party Revival Calling For Primary Challenge Against Rollover Republican Senators Shelley Moore Capito of West Virginia, Susan Collins of Maine, Dick Heller of Nevada, John McCain of Arizona, Rob Portman of Ohio, Lamar Alexander of Tennessee and Lisa Murkowski of Alaska — All Republicans in Name Only — Really Big Government Democrats — Videos —
Story 3: Trump Rally in Ohio — Neither A Rally Nor A Movement Is Not A Political Party That Votes in Congress — New Viable and Winning American Independence Party Is What Is Needed –Videos
Story 1: Pence Breaks Tie — Senate Will Debate How To Proceed With Obamacare Repeal and Replace — Videos —
Story 2: Congress Overwhelming Passes New Sanctions on Russia, Iran and North Korea — Long Overdue — Videos —
Story 3: Trump Again Critical Of Attorney General Sessions Apparently For Not Prosecuting Leakers and Going After Clinton Foundation Crimes — What about Obama Administration’s Spying On Trump — An Abuse of Power Using Intelligence Community for Political Purposes — Will Trump Dump Sessions? If He Does Trump Will Start To Lose His Supporters in Talk Radio and Voter Base — Direct Deputy Attorney Rod Rosenstein To Fire Mueller — If He Won’t Fire Him — Fire Both Mueller and Rosenstein — Punish Your Enemies and Reward Your Friends President Trump! — “In Your Guts You Know He is Nuts” — Videos
Story 1: The American People Do Not Care About Phony Russian/Trump Collusion Conspiracy of The Lying Lunatic Left, Delusional Democrats and Big Lie Media — They’re Coming To Take You Away To The Funny Farm To Play with Your Ding-a-Ling — Videos —
Story 2: Trump Should Read Saul Alinski Rules For Radicals To Understand What Is Going On — Then Have Department of Justice Investigate The Clinton Charitable Foundation For Public Corruption and Obama Administration For Abuse of Power Using Intelligence Community for Political Purposes And Then Fire Mueller For Conflicts of Interests — The Sooner The Better — Go On Offense Stop Playing Defense — Just Do It! — Videos
Story 1: “Obamacare Failed” Says President Trump — Wants Obamacare Completely Repealed and Replaced Sooner or Later — Obama Lied To American People — Does President Trump Understand The Relationship Between Pre-existing Conditions, Guaranteed Issue, Community Rating and Adverse Selection — Many Doubt Trump Really Understands The Relationship That Is The Real Reason Obamacare Was Designed To Fail From The Beginning So It Could Be Replaced By Single Payer Government Health Care — Videos
Story 1: Will Trump Challenge The Washington Establishment To Achieve His Promises? You Betcha. Will He Win? Long Shot –A Movement Is Not A Viable Political Party That Can Beat The Democratic Party and Republican Party and Their Allies In The Big Government Bureaucracies, Big Lie Media and The Owner Donor Class — Votes Count — Independence Party???– Videos —
Story 2: Replace Republicans With D and F Conservative Review Grades and Scores Root and Branch With Real Conservatives, Classical Liberals and Libertarians Until New Political Party Is Formed and Becomes A Viable Party — Videos
Story 1: Downsizing The Federal Government or Draining The Swap: Trump Should Permanently Close 8 Departments Not Appoint People To Run Them — Cut All Other Department Budgets by 20% — Video —
Story 2: Federal Spending Breaks $4 Trillion for Fiscal Year 2017 —
Story 3: The American People and President Trump Vs. Political Elitist Establishment of The Big Government Democratic and Republican Parties — Videos
Story 1: Senate Revised Republican Repeal and Replacement Bill A Betrayal of Voters Who Gave Republicans Control of Senate and House — Does Not Repeal All Obamacare Mandates, Regulations and Taxes but Does Bailout Insurance Industry and States Who Extended Medicaid Benefits — Trump Should Veto This Betrayal By Republican Establishment of Republican Voters — Videos —
Story 2: Estimated insolvency date of Social Security’s Trust fund is 2034 — and Medicare’s Hospital Trust Fund is 2029 — Social Security and Medicare Benefits Will Be Cut or Taxes Raised or Combination of Benefit Cuts and Tax Increases — Videos —
Story 3: Trump’s Broken Promises and Kept Promises — Good Intentions are Not Enough — Only Results Count — Videos
Story 1: Putin’s Sting — How Russian Intelligence Service (FSB) Played The Washington Political Elitist Establishment (Democrats and Republicans) And Big Lie Media And How They Fell Hook, Line and Sinker for Russian Intelligence Disinformation Campaign — Russian Trump Dossier — The Dangers of Opposition Research, Confirmation Bias, True Believers, Useful Idiots, Blind Ambition and Two Party Tyranny — The Sting Redux — Videos —
Story 2: Republican Sellout The Republican Voter Base By Not Repealing Obamacare Completely — Leaves Many Obamacare Regulations, Subsidies, and Taxes In Place –Republican Replacement of Obamacare Is A Big Bailout Bill of Insurance Industry — The Stupid Republican Party About To Commit Political Suicide — Rest In Peace — Videos
Story 1: Much Ado About Nothing — What Dirt Did The Russians Have On Hillary Clinton? — Donald Trump Jr. Wanted To Know — Smells Like A Russian Setup and/or Democrat Dirty Trick — Who Leaked The Emails To New York Times? — American People Ignoring Paranoid Progressive Propaganda of Big Lie Media — Still Waiting For Any Evidence of Trump/Russian/Putin Collusion — Clinton Collusion Conspiracy Crashing — Desperate Delusional Democrat Deniers of Reality — Videos —
Story 2: When Will Attorney General Sessions Appoint A Special Counsel To Investigate Intelligence Community Leaks and Hillary Clinton Mishandling of Classified Documents and Related Pay for Play Public Corruption of Clinton Foundation? — Was Democratic Hired Opposition Research firm Fusion GPS and Christopher Steel Formerly of British Intelligent MI-6 Agent A Cutout For The Russian Disinformation Campaign Included in The Donald Trump — Russia Dossier? — Videos
Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2
Wyden: No to warrantless searches by the FBI through National Security Letters
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
William Binney – The Government is Profiling You (The NSA is Spying on You)
NSA Surveillance and What To Do About It
Taking a Look at the NSA’s Massive Data Center
NSA’s Largest Spy Center Located in Utah (What you need to know)
NSA Whistleblower William Binney: The Future of FREEDOM
‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)
Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’
DOCUMENTARY: Edward Snowden – Terminal F (2015)
NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’
NSA paying US Companies hundreds of millions of dollars for access to data
“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying
Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)
Published on Jul 8, 2013
The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.
During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.
All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.
The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]
After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.
FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying
If you think you can handle the truth, well here it is folks
The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]
Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.
NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]
Contents
[show]
History
Army predecessor
The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]
Black Chamber
Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]
MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]
Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]
Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]
World War II and its aftermath
During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]
On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]
The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]
A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]
The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79
In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]
In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]
In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]
NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]
War on Terror
After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]
In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]
Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.
Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]
The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.
Scope of surveillance
It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]
A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]
The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]
Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]
The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]
Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]
According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]
Legal accountability
Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]
Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]
Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]
An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]
Official responses
On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]
Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]
The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]
NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]
Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.
As of the mid-1990s, the National Security Agency was organized into five Directorates:
The Operations Directorate, which was responsible for SIGINT collection and processing.
The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
The Support Services Directorate, which provided logistical and administrative support activities.[90]
Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]
Structure
As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.
The main elements of the organizational structure of the NSA are:[93]
F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
L – Installation and Logistics
M – Human Resources
Q – Security and Counterintelligence
R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
S1 – Customer Relations
S2 – Analysis and Production Centers, with the following so-called Product Lines:
S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
S3 – Data Acquisition, with these divisions for the main collection programs:
S31 – Cryptanalysis and Exploitation Services (CES)
S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
S34 – Collections Strategies and Requirements Center
S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
T – Technical Directorate (TD)
Directorate for Education and Training
Directorate for Corporate Leadership
Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
Acquisitions and Procurement Directorate
Information Sharing Services (ISS), led by a chief and a deputy chief.[100]
In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]
After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]
A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]
Watch centers
The NSA maintains at least two watch centers:
National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]
Employees
The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]
In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.
The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.
The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]
Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]
The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]
NSA-produced video on the polygraph process
There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]
In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]
After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]
Arbitrary firing
The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]
Insignia and memorials
The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]
When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]
The NSA’s flag consists of the agency’s seal on a light blue background.
National Cryptologic Memorial
Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]
The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]
NSANet (NSA’s intranet)
Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS
NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]
NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]
In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]
The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]
National Computer Security Center
The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]
Facilities
Headquarters
National Security Agency headquarters in Fort Meade, 2013
Headquarters for the National Security Agency is located at 39°6′32″N76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]
NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]
NSA headquarters building in Fort Meade (left), NSOC (right)
The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]
The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]
The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]
Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]
Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]
Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]
One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]
When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]
Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]
On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]
The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]
An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]
NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]
Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149]Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]
On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]
In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]
NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]
The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]
In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]
Thailand
Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.
Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]
The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]
NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]
According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]
The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]
Mission
NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]
According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]
Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).
As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]
Operations
Operations by the National Security Agency can be divided in three types:
Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.
During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]
NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]
The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]
In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]
The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]
BoundlessInformant
Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]
In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209]Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]
XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]
NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]
NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]
George W. Bush administration
George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]
One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]
Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]
On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]
As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.
In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]
Data mining
NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]
A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]
In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]
Barack Obama administration
In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]
Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235]Rasmussen Reports found that 59% of Americans disapprove,[236]Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]
Section 215 metadata collection
On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]
In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]
The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]
Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]
In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.
Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247]Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.
In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]
July 2015 – WikiLeaks: Espionage against German federal ministries[edit]
In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]
Claims of prevented terrorist attacks
Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]
Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.
NSA’s China hacking group
According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]
Syrian internet blackout
In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]
Suspected responsibility for hacking operations by the Equation Group[edit]
The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drivefirmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31
When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.
— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]
Boomerang routing
While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]
Hardware implanting
Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon
A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]
Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]
Role in scientific research and development[
NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.
Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]
NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipheralgorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.
The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]
The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]
The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]
SHA
The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]
A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]
NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]
This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]
Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]
Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.
Academic research
NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]
Patents
NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]
One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]
Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs
In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.
President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.
As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.
Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.
This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.
Mark Levin Provides ProofObama Admin Wiretapped Trump Tower | Fox & Friends
Published on Mar 5, 2017
LIKE | COMMENT | SUBSCRIBE
Mark Levin Provides Proof Obama Admin Wiretapped Trump Tower | Fox & Friends
Trump Accuses Obama of Wiretapping – Is there any evidence of Collusion?
Intelligence Officer Claims Obama Was Involved In The Wiretapping
Bombshell! Trump Tweets, Obama Wire Tapped Trump Tower! “He Is Bad And Sick”! Dwarf’s Watergate!
Did President Obama Spy On Donald Trump? | True News
What Would It Mean If Former President Obama Wiretapped Trump Tower? | TODAY
News Trump ‘Donald Trump started this’ Host loses it with Sarah Huckabee Sanders’ wiretapping spin
Lindsey Graham on President Trump accuses Obama of wiretapping him Trump Tower phones
TOWERGATE UPDATE: Obama Faces Indictment for Wiretapping Trump Tower Says Fox
No, Presidents Can’t Order Wiretaps | AM Joy | MSNBC
Obama Wiretapped Trump Phone Before Election?
Obama Explains NSA Wiretapping
NSA wiretapping — a 4th Amendment violation? Blake Norvell at TEDxSMU
John Brennan, Obama involved in bugging Trump Campaign during election
NSA whistleblower Edward Snowden “My Greatest Fear … is turnkey tyranny”
EDWARD SNOWDEN Everything about Donald Trump
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
William Binney – The Government is Profiling You (The NSA is Spying on You)
United States of Secrets: William Binney
NSA Whistleblower William Binney: The Future of FREEDOM
AUTHOR: BRIAN BARRETT.BRIAN BARRETT SECURITY
IF THE FEDS DID WIRETAP TRUMP TOWER, IT’S NOT OBAMA WHO SHOULD WORRY
IT STARTED, LIKE so many eruptions these days, with a tweet.
Early Saturday morning, President Trump fired off a series of tweets accusing, without evidence, former President Barack Obama of wiretapping Trump Tower in the month before the election. Trump compared the alleged snooping to “Nixon/Watergate,” and intimated legal action.
What makes the broader allegation so extraordinary isn’t that it is new. Quite the contrary. Various reports that the Foreign Intelligence Surveillance Court granted Justice Department investigators a warrant to probe the Trump campaign’s ties with Russia surfaced in November. What makes Trump’s Twitter tirade so striking is what prompted it, and what it might imply if it’s true.
Anatomy of an Allegation
Baffling as it may be, it appears Trump’s accusation stems from a recent article published on Breitbart, the conservative news outlet formerly run by White House senior adviser Stephen Bannon.
“This is a somewhat stunning, in so far as the president of the United States doesn’t need to get his information about classified activity from Breitbart,” says Cato Institute fellow Julian Sanchez.
That story, “Mark Levin to Congress: Investigate Obama’s ‘Silent Coup’ Vs. Trump,” rehashes comments the titular conservative radio host made Thursday equating the previously reported FISA warrant with a “police state,” and accuses Obama of a politically motivated, covert attempt to undermine Trump and his associates.
It’s unclear just what prompted Levin’s rant, or why Trump glommed onto it. Although no one has confirmed a FISA investigation, or wiretaps in Trump Tower, several news outlets have reported the former’s existence. The most detailed account thus far, from the BBC in January, provided a timeline: The Justice Department sought a FISA warrant in June to intercept communications from two Russian banks suspected of facilitating donations to the Trump campaign. The judge reportedly rejected the warrant, as well as a narrower version sought in July. A new judge granted the order in mid-October, according to the BBC.
None of this necessarily makes Trump’s allegations true. Even if a FISA warrant exists, it does not mean Trump Tower is tapped or that Trump specifically is the target. Further complicating things, the existence of a wiretap would not necessarily confirm the existence of a FISA warrant. Almost half of the building’s 58 floors are dedicated to commercial and office space, and any one of them—not to mention the building’s residents—could be the target of an investigation unrelated to international espionage or election tampering.
“If he has evidence that he was wiretapped without a proper FISA order being sought, that would be a huge scandal, and he should produce whatever evidence he’s got,” says Sanchez. “It’s a pretty serious claim, and it’s striking he would make it without anything solid to back it up.”
Republican Senator Ben Sasse called on the president to clarify his claims, stating that “we are in the midst of a civilization-warping crisis of public trust.” Obama spokesperson Kevin Lewis strongly denied extra-judicial surveillance of any US citizens to Politico in response to the claims..
Look past the president’s conspiracy theories, though, and one fact stands out: However strongly Trump feels that he’s right, he’d better hope he’s wrong.
Tower of FISA
If nothing else, Trump’s tweets show he doesn’t understand how the FISA system works. If he did, he may have limited himself to tweeting about Arnold Schwartzenegger quitting The Apprentice this morning.
“While the order would have been requested by some part of the executive branch, Obama can’t order anything. Nor can Trump,” says former NSA lawyer April Doss, who stresses that her comments are based only on public information. “The order has to come from the court, and the court operates independently.”
FISA court judges serve seven-year appointments, so the court’s composition doesn’t ebb and flow with the political tides. What’s more, specific laws adopted in the wake of Watergate prevent the very activity Trump accuses Obama of.
“You can’t tap the phones of a political candidate for political purposes,” says Doss.
What you could tap them for? Acting as a foreign power, or as an agent of a foreign power. In other words, spying against US interests with both knowledge and intent.
Clearing that bar is difficult, by design. FISA warrants don’t allow for broad wiretaps of, say, every call going in and out of a specific office in a 58-story Manhattan skyscraper. Federal authorities must demonstrate not just probable cause, but that a given phone line serves primarily to undermine US interests. It’s difficult, for instance, to obtain a warrant to wiretap a shared office, for fear of picking up innocent third-party conversations.
“I have high confidence that a FISA court judge would not have authorized any warrant unless it met all the requirements under the statute,” says Doss.
Trump’s wiretap claims, then, carry presumably inadvertent implications. First, based on previous reporting and the nature of FISA courts, any wiretaps within Trump Tower would be legal. And they would stem from overwhelming evidence that the Trump campaign, or someone within it, has unsavory ties to Russia or another foreign power. Otherwise, it’s unlikely those wiretaps would exist at all.
If federal authorities did have cause to listen in on Trump Tower, though, and they provided enough evidence for a FISA court to approve the snooping, Obama is not the one who ought to worry.
With additional reporting by Andy Greenberg.
This story has been updated to include responses from Obama spokesperson Kevin Lewis and GOP Senator Ben Sasse, and to reflect that FISA court judges serve seven-year terms, not lifetime tenure.
Washington (AFP) – President Donald Trump is asking Congress to probe “potentially politically motivated investigations” during the 2016 campaign, the White House said Sunday.
The announcement came one day after Trump took to Twitter to accuse his predecessor Barack Obama of tapping his phones ahead of the November election, without providing evidence of the explosive charge.
An Obama spokesman has denied Trump’s accusation as “simply false.”
In his statement, White House Press Secretary Sean Spicer referred to unspecified reports of “potentially politically motivated investigations immediately ahead of the 2016 election” as “very troubling.”
“President Donald J. Trump is requesting that as part of their investigation into Russian activity, the congressional intelligence committees exercise their oversight authority to determine whether executive branch investigative powers were abused in 2016,” Spicer said.
He added that there would be no more comment on the matter from Trump or the White House.
Trump leveled his charges against Obama early Saturday, at the end of a week in which his administration was battered by controversy over communications between Russian officials and some of his senior aides including Attorney General Jeff Sessions.
“I’d bet a good lawyer could make a great case out of the fact that President Obama was tapping my phones in October, just prior to Election!” Trump wrote.
“How low has President Obama gone to tapp (sic) my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!” he wrote in another tweet, referring to the political scandal that toppled president Richard Nixon in 1974.
Trump, Offering No Evidence, Says Obama Tapped His Phones
WEST PALM BEACH, Fla. — President Trump on Saturday accused former President Barack Obama of tapping his phones at Trump Tower the month before the election, taking to Twitter to call his predecessor a “bad (or sick) guy.”
Without offering any evidence or providing the source of his information, Mr. Trump fired off a series of Twitter messages claiming that Mr. Obama “had my ‘wires tapped.’ ” He likened the supposed tapping to “Nixon/Watergate” and “McCarthyism.”
A spokesman for Mr. Obama said any suggestion that the former president had ordered such surveillance was “simply false.”
Mr. Trump’s aides declined to clarify whether the president’s explosive allegations were based on briefings from intelligence or law enforcement officials — which could mean that Mr. Trump was revealing previously unknown details about an investigation — or on something else, like a news report.
His decision to lend the power of his office to such a charged claim against his predecessor — without offering any initial proof — was remarkable, even for a leader who has repeatedly shown himself willing to make assertions that are false or based on dubious sources.
It would have been difficult for federal agents, working within the law, to obtain a wiretap order to target Mr. Trump’s phone conversations. It would have meant that the Justice Department had gathered sufficient evidence to persuade a federal judge that there was probable cause to believe he had committed a serious crime or was an agent of a foreign power, depending on whether it was a criminal investigation or a foreign intelligence one.
Former officials pointed to longstanding laws and procedures intended to ensure that presidents cannot wiretap a rival for political purposes.
“A cardinal rule of the Obama administration was that no White House official ever interfered with any independent investigation led by the Department of Justice,” said Kevin Lewis, a spokesman for Mr. Obama. “As part of that practice, neither President Obama nor any White House official ever ordered surveillance on any U.S. citizen.”
But a senior White House official said that Donald F. McGahn II, the president’s chief counsel, was working on Saturday to secure access to what Mr. McGahn believed was an order issued by the Foreign Intelligence Surveillance Court authorizing some form of surveillance related to Mr. Trump and his associates.
The official offered no evidence to support the notion that such an order exists. If one does, it would be highly unusual for a White House to order the Justice Department to turn over such an investigative document, given the traditional independence of law enforcement matters.
It has been widely reported that there is a federal investigation, which began during the 2016 presidential campaign, into links between Trump associates and the Russians. That issue has dogged Mr. Trump for months.
In one message, which Mr. Trump sent from his Palm Beach, Fla., estate at 6:35 a.m., the president said he had “just found out” that his phones had been tapped before the election. Mr. Trump’s reference to “wires tapped” raised the possibility that he was referring to some other type of electronic surveillance and was using the idea of phone tapping loosely.
Two people close to Mr. Trump said they believed he was referring to a Breitbart News article, which aides said had been passed around among his advisers. Mark Levin, a conservative radio host, had also embraced the theory recently in a push against what right-leaning commentators have been calling the “deep state.”
The Breitbart article, published on Friday, claimed that there was a series of “known steps taken by President Barack Obama’s administration in its last months to undermine Donald Trump’s presidential campaign and, later, his new administration.”
If Mr. Trump was motivated to take to Twitter after reading the Breitbart article or listening to Mr. Levin, he was using a presidential megaphone to spread dark theories of a broad conspiracy aimed at undermining his presidential ambitions, and later his presidency.
Even with the Breitbart article circulating, several of Mr. Trump’s advisers were stunned by the president’s morning Twitter outburst. Those advisers said they were uncertain about what specifically Mr. Trump was referring to; one surmised that he may also have been referring to a months-old news report about a secret surveillance warrant for communications at his New York offices.
One senior law enforcement official from the Obama administration, who has direct knowledge of the F.B.I. investigation into Russia and of government wiretapping, said that it was “100 percent untrue” that the government had wiretapped Mr. Trump. The official, who asked for anonymity to discuss matters related to investigations and intelligence, said the White House owed the American people an explanation for the president’s allegations.
Ben Rhodes, a former top national security aide to Mr. Obama, said in a Twitter message directed at Mr. Trump on Saturday that “no president can order a wiretap” and added, “Those restrictions were put in place to protect citizens from people like you.”
The House and Senate Intelligence Committees are moving forward with their own investigations into Russia’s efforts to influence the election, and they have said they will examine links between Mr. Trump’s associates and the Russians.
Senator Chris Coons, Democrat of Delaware, said on Friday that he believed there were “transcripts” that would help document those contacts, though he said he had not yet seen them.
Mr. Trump claimed the Obama administration ordered the phoned at his building in New York tapped.CreditVictor J. Blue for The New York Times
“There are transcripts that provide very helpful, very critical insights into whether or not Russian intelligence or senior Russian political leaders — including Vladimir Putin — were cooperating, were colluding, with the Trump campaign at the highest levels to influence the outcome of our election,” Mr. Coons told Andrea Mitchell on MSNBC. “I believe they exist.”
In a written statement on Saturday, a spokesman for Mr. Coons said that the senator “did not imply that he is aware of transcripts indicating collusion between the Trump campaign and the Russians.” The spokesman, Sean Coit, said Mr. Coons “simply stated that a full review of all relevant transcripts and intelligence intercepts is necessary to determine if collusion took place.”
The New York Times reported in January that among the associates whose links to Russia are being scrutinized are Paul Manafort, Mr. Trump’s onetime campaign chairman; Carter Page, a businessman and foreign policy adviser to the campaign; and Roger Stone, a longtime Republican operative who said he was in touch with WikiLeaks at one point before it released a trove of emails from John D. Podesta, Hillary Clinton’s campaign chairman, last August. Mr. Stone later said he had communicated with WikiLeaks through an intermediary.
Mr. Trump appeared on Saturday to suggest that warrants had been issued by the Foreign Intelligence Surveillance Court. He claimed that the Obama administration had once been “turned down by court” in its supposed efforts to listen in on conversations by Mr. Trump and his associates.
In the fall, the F.B.I. examined computer data showing an odd stream of activity between a Trump Organization server and Alfa Bank, one of Russia’s biggest banks, whose owners have longstanding ties to Mr. Putin. While some F.B.I. officials initially believed that the computer activity indicated an encrypted channel between Moscow and New York, the bureau ultimately moved away from that view. The activity remains unexplained.
There is no confirmed evidence that the F.B.I. obtained a court warrant to wiretap the Trump Organization or was capturing communications directly from the Trump Organization.
During the transition, the F.B.I. — which uses FISA warrants to eavesdrop on the communications of foreign leaders inside the United States — overheard conversations between the Russian ambassador to the United States and Michael T. Flynn, whom Mr. Trump had named national security adviser.
Mr. Trump has pointedly and repeatedly questioned in conversations how it was that Mr. Flynn’s conversations were recorded, and wondered who could have issued a warrant.
After The Washington Post reported that Mr. Flynn and the ambassador, Sergey I. Kislyak, had discussed sanctions that the Obama administration had just imposed on Russia, Mr. Flynn was pushed out of his post by the White House because he had lied to Vice President Mike Pence about the nature of the calls.
The Breitbart article cited mainstream news reports and concluded — going beyond the public record — that the Obama administration had “obtained authorization to eavesdrop on the Trump campaign; continued monitoring the Trump team even when no evidence of wrongdoing was found; then relaxed the N.S.A. rules to allow evidence to be shared widely within the government.”
Mr. Levin, a day earlier, railed about what he called a “much bigger scandal,” claiming — again with no evidence — that Mr. Obama and his aides had used “the instrumentalities of the federal government, intelligence activity, to surveil members of the Trump campaign and put that information out in the public.”
Several senior members of Mr. Trump’s White House staff, including his spokesman, Sean Spicer, did not respond to an email requesting on-the-record responses to more than a half-dozen questions about Mr. Trump’s Twitter posts.
Representative Adam B. Schiff, the top Democrat on the House Intelligence Committee, denounced the “willingness of the nation’s chief executive to make the most outlandish and destructive claims without providing a scintilla of evidence to support them.”
Even some Republican lawmakers questioned Mr. Trump’s accusations. Senator Ben Sasse of Nebraska issued a statement demanding that the president reveal everything he knows about any wiretaps or warrants.
“The president today made some very serious allegations, and the informed citizens that a republic requires deserve more information,” Mr. Sasse said, adding that “we are in the midst of a civilization-warping crisis of public trust.”
Taping calls seems to hold a spot in Mr. Trump’s consciousness. He spent many years taping his own phone calls as a businessman. During the campaign, Mr. Trump’s staff members told reporters they feared that their offices were being bugged.
But Mr. Trump’s latest allegations represented a sharp change in his tone toward Mr. Obama.
The current president has frequently spoken about how much he admires Mr. Obama for the gracious way he handled the transition. But since taking office, Mr. Trump has frequently clashed with the intelligence agencies over the Russia inquiries, including efforts to examine the attempts by that country to influence the presidential election and the contacts between Mr. Trump’s aides and the Russian government.
In recent days, the president has appeared increasingly angry about leaks of information that he believes are coming from law enforcement and intelligence officials who are holdovers or recently departed from Mr. Obama’s administration.
People close to Mr. Trump have described him as determined to stop those people from sabotaging his administration. One adviser said on Friday that the president had been discussing a possible plan to try to prevent leaks from occurring. The adviser declined to elaborate on what the plan might entail.
Two senior administration officials said Mr. Trump had tried for two days to find a way to be on an offensive footing against the news articles resulting from leaks; one person close to Mr. Trump said his explosive claim was a result of that.
Mr. Trump’s mood was said to be volatile even before he departed for his weekend in Florida, with an episode in which he vented at his staff. The president’s ire was trained in particular on Mr. McGahn, his White House counsel, according to two people briefed on the matter.
Mr. Trump was said to be frustrated about the decision by Jeff Sessions, his attorney general, to recuse himself from participating in any investigations of connections between the Trump campaign and Russia. Mr. Trump has said there were no such connections. Mr. Trump, who did not learn that Mr. Sessions was recusing himself until after the decision was made, told aides that it gave an opening to his critics on the Russia issue.
Four Horsemen – Feature Documentary – Official Version
The Real Adam Smith: Ideas That Changed The World – Full Video
The Real Adam Smith: Morality and Markets – Full Video
Adam Smith and the Birth of Economics | Lawrence Reed
The Division of Labor and Social Order | Jörg Guido Hülsmann
The Pin Factory
How Its Made Needles and Pins
Cato Events – On the Wealth of Nations
Increasing Returns and the New World of Business
W. Brian Arthur
Our understanding of how markets and businesses operate was passed down to us more than a century ago by a handful of European economists—Alfred Marshall in England and a few of his contemporaries on the continent. It is an understanding based squarely upon the assumption of diminishing returns: products or companies that get ahead in a market eventually run into limitations, so that a predictable equilibrium of prices and market shares is reached. The theory was roughly valid for the bulk-processing, smokestack economy of Marshall’s day. And it still thrives in today’s economics textbooks. But steadily and continuously in this century, Western economies have undergone a transformation from bulk-material manufacturing to design and use of technology—from processing of resources to processing of information, from application of raw energy to application of ideas. As this shift has occurred, the underlying mechanisms that determine economic behavior have shifted from ones of diminishing to ones of increasing returns.
Increasing returns are the tendency for that which is ahead to get further ahead, for that which loses advantage to lose further advantage. They are mechanisms of positive feedback that operate—within markets, businesses, and industries—to reinforce that which gains success or aggravate that which suffers loss. Increasing returns generate not equilibrium but instability: If a product or a company or a technology—one of many competing in a market—gets ahead by chance or clever strategy, increasing returns can magnify this advantage, and the product or company or technology can go on to lock in the market. More than causing products to become standards, increasing returns cause businesses to work differently, and they stand many of our notions of how business operates on their head.
Mechanisms of increasing returns exist alongside those of diminishing returns in all industries. But roughly speaking, diminishing returns hold sway in the traditional part of the economy—the processing industries. Increasing returns reign in the newer part—the knowledge-based industries. Modern economies have therefore bifurcated into two interrelated worlds of business corresponding to the two types of returns. The two worlds have different economics. They differ in behavior, style, and culture. They call for different management techniques, strategies, and codes of government regulation.
They call for different understandings.
Alfred Marshall’s World
Let’s go back to beginnings—to the diminishing-returns view of Alfred Marshall and his contemporaries. Marshall’s world of the 1880s and 1890s was one of bulk production: of metal ores, aniline dyes, pig iron, coal, lumber, heavy chemicals, soybeans, coffee—commodities heavy on resources, light on know-how. In that world it was reasonable to suppose, for example, that if a coffee plantation expanded production it would ultimately be driven to use land less suitable for coffee. In other words, it would run into diminishing returns. So if coffee plantations competed, each one would expand until it ran into limitations in the form of rising costs or diminishing profits. The market would be shared by many plantations, and a market price would be established at a predictable level—depending on tastes for coffee and the availability of suitable farmland. Planters would produce coffee so long as doing so was profitable, but because the price would be squeezed down to the average cost of production, no one would be able to make a killing. Marshall said such a market was in perfect competition, and the economic world he envisaged fitted beautifully with the Victorian values of his time. It was at equilibrium and therefore orderly, predictable and therefore amenable to scientific analysis, stable and therefore safe, slow to change and therefore continuous. Not too rushed, not too profitable. In a word, mannerly. In a word, genteel.
With a few changes, Marshall’s world lives on a century later within that part of the modern economy still devoted to bulk processing: of grains, livestock, heavy chemicals, metals and ores, foodstuffs, retail goods—the part where operations are largely repetitive day to day or week to week. Product differentiation and brand names now mean that a few companies rather than many compete in a given market. But typically, if these companies try to expand, they run into some limitation: in numbers of consumers who prefer their brand, in regional demand, in access to raw materials. So no company can corner the market. And because such products are normally substitutable for one another, something like a standard price emerges. Margins are thin and nobody makes a killing. This isn’t exactly Marshall’s perfect competition, but it approximates it.
The Increasing-Returns World
What would happen if Marshall’s diminishing returns were reversed so that there were increasing returns? If products that got ahead thereby got further ahead, how would markets work?
Let’s look at the market for operating systems for personal computers in the early 1980s when CP/M, DOS, and Apple’s Macintosh systems were competing. Operating systems show increasing returns: if one system gets ahead, it attracts further software developers and hardware manufacturers to adopt it, which helps it get further ahead. CP/M was first in the market and by 1979 was well established. The Mac arrived later, but it was wonderfully easy to use. DOS was born when Microsoft locked up a deal in 1980 to supply an operating system for the IBM PC. For a year or two, it was by no means clear which system would prevail. The new IBM PC—DOS’s platform—was a kludge. But the growing base of DOS/IBM users encouraged software developers such as Lotus to write for DOS. DOS’s prevalence—and the IBM PC’s—bred further prevalence, and eventually the DOS/IBM combination came to dominate a considerable portion of the market. That history is now well known. But notice several things: It was not predictable in advance (before the IBM deal) which system would come to dominate. Once DOS/IBM got ahead, it locked in the market because it did not pay for users to switch. The dominant system was not the best: DOS was derided by computer professionals. And once DOS locked in the market, its sponsor, Microsoft, was able to spread its costs over a large base of users. The company enjoyed killer margins.
These properties, then, have become the hallmarks of increasing returns: market instability (the market tilts to favor a product that gets ahead), multiple potential outcomes (under different events in history, different operating systems could have won), unpredictability, the ability to lock in a market, the possible predominance of an inferior product, and fat profits for the winner. They surprised me when I first perceived them in the late 1970s. They were also repulsive to economists brought up on the order, predictability, and optimality of Marshall’s world. Glimpsing some of these properties in 1939, English economist John Hicks warned that admitting increasing returns would lead to “the wreckage of the greater part of economic theory.” But Hicks had it wrong: the theory of increasing returns does not destroy the standard theory—it complements it. Hicks felt repugnance not just because of unsavory properties but also because in his day no mathematical apparatus existed to analyze increasing-returns markets. That situation has now changed. Using sophisticated techniques from qualitative dynamics and probability theory, I and others have developed methods to analyze increasing-returns markets. The theory of increasing returns is new, but it already is well established. And it renders such markets amenable to economic understanding.
In 1939, English economist John Hicks warned that admitting increasing returns would lead to “the wreckage of the greater part of economic theory.” But Hicks had it wrong.
In the early days of my work on increasing returns, I was told they were an anomaly. Like some exotic particle in physics, they might exist in theory but would be rare in practice. And if they did exist, they would last for only a few seconds before being arbitraged away. But by the mid-1980s, I realized increasing returns were neither rare nor ephemeral. In fact, a major part of the economy was subject to increasing returns—high technology.
Why should this be so? There are several reasons:
Up-front Costs.
High-tech products—pharmaceuticals, computer hardware and software, aircraft and missiles, telecommunications equipment, bioengineered drugs, and suchlike—are by definition complicated to design and to deliver to the marketplace. They are heavy on know-how and light on resources. Hence they typically have R&D costs that are large relative to their unit production costs. The first disk of Windows to go out the door cost Microsoft $50 million; the second and subsequent disks cost $3. Unit costs fall as sales increase.
Network Effects.
Many high-tech products need to be compatible with a network of users. So if much downloadable software on the Internet will soon appear as programs written in Sun Microsystems’ Java language, users will need Java on their computers to run them. Java has competitors. But the more it gains prevalence, the more likely it will emerge as a standard.
Customer Groove-in.
High-tech products are typically difficult to use. They require training. Once users invest in this training—say, the maintenance and piloting of Airbus passenger aircraft—they merely need to update these skills for subsequent versions of the product. As more market is captured, it becomes easier to capture future markets.
In high-tech markets, such mechanisms ensure that products that gain market advantage stand to gain further advantage, making these markets unstable and subject to lock-in. Of course, lock-in is not forever. Technology comes in waves, and a lock-in such as DOS’s can last only as long as a particular wave lasts.
Some products—like the IBM PC—start in the increasing-returns world but later in their life cycle become virtual commodities that belong to Marshall’s processing world.
So we can usefully think of two economic regimes or worlds: a bulk-production world yielding products that essentially are congealed resources with a little knowledge and operating according to Marshall’s principles of diminishing returns, and a knowledge-based part of the economy yielding products that essentially are congealed knowledge with a little resources and operating under increasing returns. The two worlds are not neatly split. Hewlett-Packard, for example, designs knowledge-based devices in Palo Alto, California, and manufactures them in bulk in places like Corvallis, Oregon, or Greeley, Colorado. Most high-tech companies have both knowledge-based operations and bulk-processing operations. But because the rules of the game differ for each, companies often separate them—as Hewlett-Packard does. Conversely, manufacturing companies have operations such as logistics, branding, marketing, and distribution, which belong largely to the knowledge world. And some products—like the IBM PC—start in the increasing-returns world but later in their life cycle become virtual commodities that belong to Marshall’s processing world.
The Halls of Production and the Casino of Technology
Because the two worlds of business—processing bulk goods and crafting knowledge into products—differ in their underlying economics, it follows that they differ in their character of competition and their culture of management. It is a mistake to think that what works in one world is appropriate for the other.
There is much talk these days about a new management style that involves flat hierarchies, mission orientation, flexibility in strategy, market positioning, reinvention, restructuring, reengineering, repositioning, reorganization, and re-everything else. Are these new insights or are they fads? Are they appropriate for all organizations? Why are we seeing this new management style?
Let us look at the two cultures of competition. In bulk processing, a set of standard prices typically emerges. Production tends to be repetitive—much the same from day to day or even from year to year. Competing therefore means keeping product flowing, trying to improve quality, getting costs down. There is an art to this sort of management, one widely discussed in the literature. It favors an environment free of surprises or glitches—an environment characterized by control and planning. Such an environment requires not just people to carry out production but also people to plan and control it. So it favors a hierarchy of bosses and workers. Because bulk processing is repetitive, it allows constant improvement, constant optimization. And so, Marshall’s world tends to be one that favors hierarchy, planning, and controls. Above all, it is a world of optimization.
Competition is different in knowledge-based industries because the economics are different. If knowledge-based companies are competing in winner-take-most markets, then managing becomes redefined as a series of quests for the next technological winner—the next cash cow. The goal becomes the search for the Next Big Thing. In this milieu, management becomes not production oriented but mission oriented. Hierarchies flatten not because democracy is suddenly bestowed on the workforce or because computers can cut out much of middle management. They flatten because, to be effective, the deliverers of the next-thing-for-the-company need to be organized like commando units in small teams that report directly to the CEO or to the board. Such people need free rein. The company’s future survival depends upon them. So they—and the commando teams that report to them in turn—will be treated not as employees but as equals in the business of the company’s success. Hierarchy dissipates and dissolves.
Does this mean that hierarchy should disappear in meatpacking, steel production, or the navy? Contrary to recent management evangelizing, a style that is called for in Silicon Valley will not necessarily be appropriate in the processing world. An aircraft’s safe arrival depends on the captain, not on the flight attendants. The cabin crew can usefully be “empowered” and treated as human beings. This approach is wise and proper. But forever there will be a distinction—a hierarchy—between cockpit and cabin crews.
In fact, the style in the diminishing-returns Halls of Production is much like that of a sophisticated modern factory: the goal is to keep high-quality product flowing at low cost. There is little need to watch the market every day, and when things are going smoothly the tempo can be leisurely. By contrast, the style of competition in the increasing-returns arena is more like gambling. Not poker, where the game is static and the players vie for a succession of pots. It is casino gambling, where part of the game is to choose which games to play, as well as playing them with skill. We can imagine the top figures in high tech—the Gateses and Gerstners and Groves of their industries—as milling in a large casino. Over at this table, a game is starting called multimedia. Over at that one, a game called Web services. In the corner is electronic banking. There are many such tables. You sit at one. How much to play? you ask. Three billion, the croupier replies. Who’ll be playing? We won’t know until they show up. What are the rules? Those’ll emerge as the game unfolds. What are my odds of winning? We can’t say. Do you still want to play?
High technology, pursued at this level, is not for the timid.
In fact, the art of playing the tables in the Casino of Technology is primarily a psychological one. What counts to some degree—but only to some degree—is technical expertise, deep pockets, will, and courage. Above all, the rewards go to the players who are first to make sense of the new games looming out of the technological fog, to see their shape, to cognize them. Bill Gates is not so much a wizard of technology as a wizard of precognition, of discerning the shape of the next game.
Adaptation means watching for the next wave and positioning the company to take advantage of it. Adaptation is what drives increasing-returns businesses, not optimization.
We can now begin to see that the new style of management is not a fad. The knowledge-based part of the economy demands flat hierarchies, mission orientation, above all a sense of direction. Not five-year plans. We can also fathom the mystery of what I’ve alluded to as re-everything. Much of this “re-everything” predilection—in the bulk-processing world—is a fancy label for streamlining, computerizing, downsizing. However, in the increasing-returns world, especially in high tech, re-everything has become necessary because every time the quest changes, the company needs to change. It needs to reinvent its purpose, its goals, its way of doing things. In short, it needs to adapt. And adaptation never stops. In fact, in the increasing-returns environment I’ve just sketched, standard optimization makes little sense. You cannot optimize in the casino of increasing-returns games. You can be smart. You can be cunning. You can position. You can observe. But when the games themselves are not even fully defined, you cannot optimize. What you can do is adapt. Adaptation, in the proactive sense, means watching for the next wave that is coming, figuring out what shape it will take, and positioning the company to take advantage of it. Adaptation is what drives increasing-returns businesses, not optimization.
Playing the High-Tech Tables
Suppose you are a player in the knowledge-industry casino, in this increasing-returns world. What can you do to capitalize on the increasing returns at your disposal? How can you use them to capture markets? What strategic issues do you need to think about? In the processing world, strategy typically hinges upon capitalizing on core competencies, pricing competitively, getting costs down, bringing quality up. These are important also in the knowledge-based world, but so, too, are other strategies that make use of the special economics of positive feedbacks.
Two maxims are widely accepted in knowledge-based markets: it pays to hit the market first, and it pays to have superb technology. These maxims are true but do not guarantee success. Prodigy was first into the on-line services market but was passive in building its subscriber base to take advantage of increasing returns. As a result, it has fallen from its leading position and currently lags the other services. As for technology, Steve Jobs’s NeXT workstation was superb. But it was launched into a market already dominated by Sun Microsystems and Hewlett-Packard. It failed. A new product often has to be two or three times better in some dimension—price, speed, convenience—to dislodge a locked-in rival. So in knowledge-based markets, entering first with a fine product can yield advantage. But as strategy, this is still too passive. What is needed is active management of increasing returns.
One active strategy is to discount heavily initially to build up an installed base. Netscape handed out its Internet browser for free and won 70% of its market. Now it can profit from spin-off software and applications. Although such discounting is effective—and widely understood—it is not always implemented. Companies often err by pricing high initially to recoup expensive R&D costs. Yet even smart discounting to seed the market is ineffective unless the resulting installed base is exploited later. America Online built up a lead of more than 4.5 million subscribers by giving away free services. But because of the Internet’s dominance, it is not yet clear whether it can transform this huge base into later profits.
Let’s get a bit more sophisticated. Technological products do not stand alone. They depend on the existence of other products and other technologies. The Internet’s World Wide Web operates within a grouping of businesses that include browsers, online news, E-mail, network retailing, and financial services. Pharmaceuticals exist within a network of physicians, testing labs, hospitals, and HMOs. Laser printers are part of a grouping of products that include computers, publishing software, scanners, and photo-input devices. Unlike products of the processing world, such as soybeans or rolled steel, technological products exist within local groupings of products that support and enhance them. They exist in mini-ecologies.
This interdependence has deep implications for strategy. When, in the mid-1980s, Novell introduced its network-operating system, NetWare, as a way of connecting personal computers in local networks, Novell made sure that NetWare was technically superior to its rivals. It also heavily discounted NetWare to build an installed base. But these tactics were not enough. Novell recognized that NetWare’s success depended on attracting software applications to run on NetWare—which was a part of the ecology outside the company’s control. So it set up incentives for software developers to write for NetWare rather than for its rivals. The software writers did just that. And by building NetWare’s success, they ensured their own. Novell managed these cross-product positive feedbacks actively to lock in its market. It went on to profit hugely from upgrades, spin-offs, and applications of its own.
In the Case of Microsoft…
READ MORE
Another strategy that uses ecologies is linking and leveraging. This means transferring a user base built up upon one node of the ecology (one product) to neighboring nodes, or products. The strategy is very much like that in the game Go: you surround neighboring markets one by one, lever your user base onto them, and take them over—all the time enhancing your position in the industry. Microsoft levered its 60-million-person user base in DOS onto Windows, then onto Windows 95, and then onto Microsoft Network by offering inexpensive upgrades and by bundling applications. The strategy has been challenged legally. But it recognizes that positive feedbacks apply across markets as well as within markets.
In fact, if technological ecologies are now the basic units for strategy in the knowledge-based world, players compete not by locking in a product on their own but by building webs—loose alliances of companies organized around a mini-ecology—that amplify positive feedbacks to the base technology. Apple, in closing its Macintosh system to outsiders in the 1980s, opted not to create such a web. It believed that with its superior technology, it could hold its increasing-returns market to itself. Apple indeed dominates its Mac-based ecology. But this ecology is now only 8% of the personal computer business. IBM erred in the other direction. By passively allowing other companies to join its PC web as clones, IBM achieved a huge user base and locked in the market. But the company itself wound up with a small share of the spoils. The key in web building is active management of the cross-company mutual feedbacks. This means making a careful choice of partners to build upon. It also means that, rather than attempting to take over all products in the ecology, dominant players in a web should allow dependent players to lock in their dependent products by piggybacking on the web’s success. By thus ceding some of the profits, the dominant players ensure that all participants remain committed to the alliance.
Important also to strategy in knowledge-based markets is psychological positioning. Under increasing returns, rivals will back off in a market not only if it is locked in but if they believe it will be locked in by someone else. Hence we see psychological jockeying in the form of preannouncements, feints, threatened alliances, technological preening, touted future partnerships, parades of vaporware (announced products that don’t yet exist). This posturing and puffing acts much the way similar behavior does in a primate colony: it discourages competitors from taking on a potentially dominant rival. No moves need be made in this strategy of premarket facedown. It is purely a matter of psychology.
What if you hold a losing hand? Sometimes it pays to hold on for residual revenue. Sometimes a fix can be provided by updated technology, fresh alliances, or product changes. But usually under heavy lock-in, these tactics do not work. The alternatives are then slow death or graceful exit—relinquishing the field to concentrate on positioning for the next technology wave. Exit may not mean quitting the business entirely. America Online, Compuserve, Prodigy, and Microsoft Network have all ceded dominance of the on-line computer networking market to the Internet. But instead of exiting, they are steadily becoming adjuncts of the Net, supplying content services such as financial quotations or games and entertainment. They have lost the main game. But they will likely continue in a side game with its own competition for dominance within the Net’s ecology.
Above all, strategy in the knowledge world requires CEOs to recognize that a different kind of economics is at work. CEOs need to understand which positive and negative feedback mechanisms are at play in the market ecologies in which they compete. Often there are several such mechanisms—interbraided, operating over different time frames, each needing to be understood, observed, and actively managed.
What About Service Industries?
So far, I’ve talked mainly about high tech. Where do service industries such as insurance, restaurants, and banking fit in? Which world do they belong to? The question is tricky. It would appear that such industries belong to the diminishing-returns, processing part of the economy because often there are regional limits to the demand for a given service, most services do consist of “processing” clients, and services are low-tech.
The truth is that network or user-base effects often operate in services. Certainly, retail franchises exist because of increasing returns. The more McDonald’s restaurants or Motel 6 franchises are out there geographically, the better they are known. Such businesses are patronized not just for their quality but also because people want to know exactly what to expect. So the more prevalent they are, the more prevalent they can become. Similarly, the larger a bank’s or insurance company’s customer base, the more it can spread its fixed costs of headquarters staff, real estate, and computer operations. These industries, too, are subject to mild increasing returns.
So we can say more accurately that service industries are a hybrid. From day to day, they act like bulk-processing industries. But over the long term, increasing returns will dominate—even though their destabilizing effects are not as pronounced as in high tech. The U.S. airline business, for example, processes passengers day to day. So it seemed in 1981 that deregulation should enhance competition, as it normally does under diminishing returns. But over the long term, airlines in fact experience a positive feedback: under the hub-and-spoke system, once an airline gets into trouble, it cannot work the feeder system for its routes properly, its fleet ages, it starts a downward spiral, and it loses further routes. The result of deregulation over the long term has been a steady decline in large carriers, from 15 airlines in 1981 to approximately 6 at present. Some routes have become virtual monopolies, with resulting higher fares. None of this was intended. But it should have been predicted—given increasing returns.
In fact, the increasing-returns character of service industries is steadily strengthening. One of the marks of our time is that in services everything is going software—everything that is information based. So operations that were once handled by people—designing fancy financial instruments or automobiles or fashion goods, processing insurance claims, supplying and inventorying in retail, conducting paralegal searches for case precedents—are increasingly being handled by software. As this reengineering of services plays out, centralized software facilities come to the fore. Service providers become hitched into software networks, regional limitations weaken, and user-base network effects kick in.
This phenomenon can have two consequences. First, where the local character of service remains important, it can preserve a large number of service companies but clustered round a dominant software provider—like the large numbers of small, independent law firms tied in to the dominant computer-search network, Lexis-Nexis. Or physicians tied in to an HMO. Second, where locality is unimportant, network effects can transform competition toward the winner-take-most character we see in high tech. For example, when Internet-based retail banking arrives, regional demand limitations will vanish. Each virtual bank will gain in advantage as its network increases. Barring regulation, consumer banking will then become a contest among a few large banking networks. It will become an increasing-returns business.
Services belong to both the processing and the increasing-returns world. But their center of gravity is crossing over to the latter.
Thoughts for Managers
Where does all this leave us? At the beginning of this century, industrial economies were based largely on the bulk processing of resources. At the close of the century, they are based on the processing of resources and on the processing of knowledge. Economies have bifurcated into two worlds—intertwined, overlapping, and different. These two worlds operate under different economic principles. Marshall’s world is characterized by planning, control, and hierarchy. It is a world of materials, of processing, of optimization. The increasing-returns world is characterized by observation, positioning, flattened organizations, missions, teams, and cunning. It is a world of psychology, of cognition, of adaptation.
Many managers have some intuitive grasp of this new increasing-returns world. Few understand it thoroughly. Here are some questions managers need to ask themselves when they operate in knowledge-based markets:
Do I understand the feedbacks in my market?
In the processing world, understanding markets means understanding consumers’ needs, distribution channels, and rivals’ products. In the knowledge world, success requires a thorough understanding of the self-negating and self-reinforcing feedbacks in the market—the diminishing-and increasing-returns mechanisms. These feedbacks are interwoven and operate at different levels in the market and over different time frames.
Which ecologies am I in?
Technologies exist not alone but in an interlinked web, or ecology. It is important to understand the ecologies a company’s products belong to. Success or failure is often decided not just by the company but also by the success or failure of the web it belongs to. Active management of such a web can be an important magnifier of increasing returns.
Do I have the resources to play?
Playing one of the increasing-returns games in the Casino of Technology requires several things: excellent technology, the ability to hit the market at the right time, deep pockets, strategic pricing, and a willingness to sacrifice current profits for future advantage. All this is a matter not just of resources but also of courage, resolution, will. And part of that resolution, that courage, is also the decisiveness to leave the market when increasing returns are moving against one. Hanging on to a losing position that is being further eroded by positive feedbacks requires throwing reinforcements into a battle already lost. Better to exit with financial dignity.
What games are coming next?
Technology comes in successive waves. Those who have lost out on this wave can position for the next. Conversely, those who have made a killing on this cycle should not become complacent. The ability to profit under increasing returns is only as good as the ability to see what’s coming in the next cycle and to position oneself for it—technologically, psychologically, and cooperatively. In high tech, it is as if we are moving slowly on a ship, with new technologies looming, taking shape, through a fog of unknowingness. Success goes to those who have the vision to foresee, to imagine, what shapes these next games will take.
These considerations appear daunting. But increasing-returns games provide large payoffs for those brave enough to play them and win. And they are exciting. Processing, in the service or manufacturing industries, has its own risks. Precisely because processing is low-margin, operations must struggle to stay afloat. Neither world of business is for the fainthearted.
In his book Microcosm, technology thinker George Gilder remarked, “The central event of the twentieth century is the overthrow of matter. In technology, economics, and the politics of nations, wealth in the form of physical resources is steadily declining in value and significance. The powers of mind are everywhere ascendant over the brute force of things.” As the economy shifts steadily away from the brute force of things into the powers of mind, from resource-based bulk processing into knowledge-based design and reproduction, so it is shifting from a base of diminishing returns to one of increasing returns. A new economics—one very different from that in the textbooks—now applies, and nowhere is this more true than in high technology. Success will strongly favor those who understand this new way of thinking.
A version of this article appeared in the July–August 1996 issue of Harvard Business Review.
W. Brian Arthur is the Dean and Virginia Morrison Professor of Economics and Population Studies at Stanford University in Stanford, California, and Citibank Professor at Santa Fe Institute in Santa Fe, New Mexico. He is the author of Increasing Returns and Path Dependence in the Economy (University of Michigan Press, 1994). His Web site is http://www.santafe.edu/arthur.
Two hundred years after Thomas Robert Malthus published An Essay on the Principle of Population, demographers, ecologists, economists, biologists and policymakers still debate his theory of population. Leading foundations spend scores of millions of dollars on population programs, while the United Nations holds international conferences on the topic and even has a specialized agency, the United Nations Population Fund, devoted to the issue. Last year the Fund portentously declared that the world’s population reached six billion on October 12. Every year, hundreds of weighty studies and books pour from the universities and think tanks discussing what is to be done.Malthus advanced two propositions that he regarded as completely self-evident. First, that “food is necessary for the existence of man”, and second, that “the passion between the sexes is necessary and will remain nearly in its present state.” Based on these propositions, Malthus famously concluded that “the power of population is indefinitely greater than the power in the earth to produce subsistence for man. Population, when unchecked, increases in a geometrical ratio. Subsistence increases only in an arithmetical ratio. A slight acquaintance with numbers will show the immensity of the first power in comparison with the second.”
Malthus illustrated his hypothesis using two sets of numbers: “the human species would increase in the ratio of—1, 2, 4, 8, 16, 32, 64, 128, 256, 512, &c. and subsistence as—1, 2, 3, 4, 5, 6, 7, 8, 9, 10, &c.” He further asserted that “population does invariably increase where there are the means of subsistence.” Malthus’ dismal summary of the situation in which humanity finds itself is that some portion of mankind must forever be starving to death; and, further, efforts to aid the starving will only lead to more misery, as those initially spared from famine bear too many children to feed with existing food supplies.
In his first edition of the Essay, Malthus argued that there were two “checks” on population, “preventive” and “positive.” Preventive checks, those that prevent births, include abortion, infanticide and prostitution; positive checks include war, pestilence and famine. In later editions, he added a third check that he called “moral restraint”, which includes voluntary celibacy, late marriage and the like. Moral restraint is basically just a milder version of the earlier preventive check. If all else fails to keep human numbers under control, Malthus chillingly concludes,
“Famine seems to be the last, the most dreadful resource of nature. The power of population is so superior to the power in the earth to produce subsistence for man, that premature death must in some shape or other visit the human race. The vices of mankind are active and able ministers of depopulation. They are the precursors in the great army of destruction, and often finish the dreadful work themselves. But should they fail in this war of extermination, sickly seasons, epidemics, pestilence, and plague, advance in terrific array, and sweep off their thousands and ten thousands. Should success be still incomplete, gigantic inevitable famine stalks in the rear, and with one mighty blow, levels the population with the food of the world.”
Malthus’ principle of population has proved to be one of the most influential and contested theories in history. It provided a crucial insight for Charles Darwin as he was developing his theory of natural selection. In his autobiography, Darwin wrote that in October 1838,
“I happened to read for amusement Malthus on Population, and being well prepared to appreciate the struggle for existence which everywhere goes on, from long-continued observation of the habits of animals and plants, it at once struck me that under these circumstances favourable variations would tend to be preserved, and unfavourable ones would be destroyed. The result of this would be the formation of a new species. Here, then, I had at last got a theory by which to work.”
Naturalists, biologists and ecologists have since applied Malthusian theory not only to animals and plants, but to humans as well. Undeniably, his principle of population has an appealing simplicity, and has proved a fruitful hypothesis for ecology and population biology. It undergirds such biological concepts as carrying capacity, which is a measure of the population that a given ecosystem can support. The Kaibab Plateau deer, for example, is a famous case of an animal population outstripping its food supply. In the 1920s, the deer population expanded dramatically. In the absence of predators, a forage shortage ensued, which in turn led to a dramatic reduction of the deer population.
If the concept of carrying capacity can explain fluctuations in animal populations, some intellectuals have reasoned in the second half of the twentieth century, it should apply equally well to human populations. As Stanford University entomologist Paul Ehrlich has explained: “To ecologists who study animals, food and population often seem like sides of the same coin. If too many animals are devouring it, the food supply declines; too little food, the supply of animals declines… . Homo sapiens is no exception to that rule, and at the moment it seems likely that food will be our limiting resource.”
In the late 1960s, Ehrlich was one of many biologists and agronomists who began to issue dire warnings about human “overpopulation”, the most famous of which appeared in his book, The Population Bomb (1968). “The battle to feed all of humanity is over”, Ehrlich wrote. “In the 1970s, the world will undergo famines—hundreds of millions of people are going to starve to death in spite of any crash programs embarked on now.” Later, in an article for the first Earth Day in 1970, Ehrlich outlined a horrific scenario in which 65 million Americans and 4 billion other people would die of starvation in a “Great Die-Off” between 1980 and 1989. And in 1990 Ehrlich and his wife Anne published The Population Explosion, where they once again asserted that, “One thing seems safe to predict: starvation and epidemic disease will raise the death rates over most of the planet.” In these gloomy forecasts, Ehrlich was far from alone. In 1967, William and Paul Paddock asserted in their book, Famine 1975!, that, “The famines which are now approaching … are for a surety, inevitable… . In fifteen years the famines will be catastrophic.” Today, the Worldwatch Institute, a Washington, dc environmentalist advocacy group chaired by Lester Brown, still has a solid Malthusian focus.
Food is not the only resource said to be in short supply. In 1972 the Club of Rome, a group of politicians, businessmen and senior international bureaucrats, famously commissioned The Limits to Growth report, which concluded: “If the present growth trends in world population, industrialization, pollution, food production, and resource depletion continue unchanged, the limits to growth on this planet will be reached sometime in the next one hundred years. The probable result will be a rather sudden and uncontrollable decline in both population and industrial capacity.”
This is Malthus writ large: not only will humanity run out of food, but it will also run out of non-renewable resources like minerals and fossil fuels… .
The Primacy of Ideas
For decades, economists essentially used a two-factor model in which economic growth was accounted for by adding more labor and more capital to create more goods. The problem with this model is that over time growth must halt when the marginal value of the goods produced equals the cost of the labor and capital used to produce them. This neoclassical model of economic growth was elaborated in the 1950s by Nobelist Robert Solow and his colleagues, and was later incorporated into The Limits to Growth computer model. Relying on it, MIT researchers predicted eventual collapse as the inevitable result of continued economic and population growth.
In the last two decades, economic forecasters, following the lead of economist Paul Romer, have made a conceptual breakthrough that has enabled them to describe more rigorously and accurately—and differently—how economic growth occurs and how, with the proper social institutions, it can continue for the foreseeable future. Romer explains this approach, which has come to be known as the New Growth Theory:
“New growth theorists now start by dividing the world into two fundamentally different types of productive inputs that can be called ‘ideas’ and ‘things. ’ Ideas are nonrival goods that could be stored in a bit string. Things are rival goods with mass (or energy). With ideas and things, one can explain how economic growth works. Nonrival ideas can be used to rearrange things, for example, when one follows a recipe and transforms noxious olives into tasty and healthful olive oil. Economic growth arises from the discovery of new recipes and the transformation of things from low to high value configurations.”
Decoding the clunky economic terminology, “rival” goods are simply things that cannot be used by two or more persons at once, e.g., cars, drill presses, computers, even human bodies and brains. “Nonrival” goods can be used by any number of people simultaneously, e.g., recipes for bread, blueprints for houses, techniques for growing corn, formulas for pharmaceuticals, scientific principles like the law of gravity, and computer programs.
To understand the potency of ideas, consider that a few decades ago silicon was used primarily to make glass. Today it is a crucial component in microchips and optical fibers. Again, until fairly recently petroleum was known mainly as a nuisance for people engaged in drilling water wells; its use as a cheap lighting replacement for increasingly scarce whale oil only began in the 1890s, and soon after came the internal combustion engine.
We make ourselves better off, then, not by increasing the amount of resources on planet earth—that is, of course, fixed—but by rearranging resources we already have available so that they provide us with more of what we want. This process of improvement has been going on ever since the first members of our species walked the earth. We have moved from heavy earthenware pots to ultrathin plastics and lightweight aluminum cans. To cook our food we have shifted from wood-intensive campfires to clean, efficient natural gas. By using constantly improving recipes, humanity has avoided the Malthusian trap while at the same time making the world safer and more comfortable for an ever larger portion of the world’s population.
In fact, increasing, rather than diminishing, returns characterize many economic activities. For example, it may cost $150 million to develop the first vial of a new vaccine to prevent Lyme disease. Yet every vial after that is essentially free. The same is true for computer programs: it may cost Microsoft $500 million for the first copy of Windows 98, but each subsequent copy is merely the cost of the disk on which it is stored. Or in the case of telecommunications, laying a fiber optic network may cost billions of dollars, but once operational it can transmit millions of messages at virtually no added cost. And the low costs of each of these inventions make it possible for the people who buy them to be even more productive in their own activities—by avoiding illness, expediting word processing, and drastically increasing the tempo of information exchanges.
What modern Malthusians who fret about the depletion of resources miss is that it is not oil that people want; they want to cool and heat their homes. It is not copper telephone lines that people want; they want to communicate quickly and easily with friends, family and businesses. They do not want paper; they want a convenient and cheap way to store written information. In short, what is important is not the physical resource but the function to be performed; and for that, ideas are the crucial input. Robert Kates notes that technological discoveries have “transformed the meaning of resources and increased the carrying capacity of the Earth”; economist Gale Johnson concludes that history has clearly confirmed that “no exhaustible resource is essential or irreplaceable”; and economist Dwight Lee asserts that “the relevant resource base is defined by knowledge, rather than by physical deposits of existing resources.”
Romer sums it up this way: “Every generation has perceived the limits to growth that finite resources and undesirable side effects would pose if no new recipes or ideas were discovered. And every generation has underestimated the potential for finding new recipes and ideas. We consistently fail to grasp how many ideas remain to be discovered. The difficulty is the same one we have with compounding. Possibilities do not add up. They multiply.”
This, it should be noted, is the mirror image of Malthus’ argument about exponential growth. Here, however, ideas grow much faster than population.
By using a number of simple calculations, Romer illustrates the point that the number of possible discoveries and inventions is incomprehensibly vast. Take, for example, the chemical combinations one can derive from the periodic table of elements. There are about 100 different elements and if one serially combined any four, one would get about 94 million combinations. Romer further assumes that these elements could be combined in differing proportions ranging from 1 to 10. This yields 3,500 proportions times 94 million combinations and provides 330 billion different recipes in total. At the rate of 1,000 recipes per day, it would take scientists nearly a million years to evaluate them all. What is more, this vastly underestimates the actual number of combinations available, since one could combine more than four elements, in different proportions, at different temperatures and pressures—and so on and on.
Again, consider the number of computer programs that could be installed on a single computer hard disk drive. Romer calculates that the number of distinct software programs that can be put on a one-gigabyte hard disk is roughly one followed by 2.7 billion zeros. By comparison, the total number of seconds that have elapsed since the beginning of the universe is only about 1 followed by 17 zeros, and the total number of atoms in the universe is equal to about 1 followed by 100 zeros.
In short, then, people possess a nearly infinite capacity to rearrange physical objects by creating new recipes for their use. Yet some committed Malthusians object that Romer and others who hold that economic growth is potentially limitless not only violate the law of diminishing returns but transgress an even more fundamental physical law: the second law of thermodynamics. According to the second law, in a closed system disorder tends to increase. Think of a droplet of ink as a highly ordered pigment that is diluted when it is dropped into a ten-gallon aquarium. When the pigment’s molecules spread evenly throughout the water, disorder is at a maximum—that is, it becomes virtually impossible to reconstitute the droplet. The idea, then, is that the maintenance of order in one part of the system (heating a house) requires an increase of disorder elsewhere (burning oil).
In fact, the solution to the puzzle of life and of a growing economy is that the earth is not a closed system—the energy that drives it comes principally from the sun. It is true that the sun’s energy is being dissipated. But it will not burn out for another four to five billion years. Hence, the recipes that humans could devise for obtaining and using energy are for all practical purposes limitless. Until medieval times, people inefficiently heated and cooked with open fires in their homes. Then someone in Europe invented the chimney, which dramatically increased the efficiency of heating and cooking. In the eighteenth century, Benjamin Franklin invented the cast iron stove, which again boosted efficiency—and so on, to today’s modern electric heat pumps and gas furnaces. And new ideas and designs continue to be developed all the time, among them passive solar homes, solar cells, fuel cells and nuclear power plants. It seems safe to conclude that so long as the sun shines, the second law of thermodynamics is not terribly relevant.
Indeed, trying to forecast today the energy mix for the next hundred years, especially given the current rate of technological innovation, is as fruitless as someone in 1900 trying to predict our current energy requirements. A person in 1900 would surely not have anticipated scores of millions of automobiles and trucks, thousands of jet planes, and millions of refrigerators. Because of this, the wisest course is for humanity to support institutions and incentive systems that will encourage future scientists, inventors and entrepreneurs to discover, finance and build the technologies that will supply human needs and protect the natural world in the coming century.
Reframing the Problems
Insights from New Growth Theory reframe many environmental problems and suggest some surprising solutions. For example, one of the global environmental problems most commonly attributed to population and economic growth is the loss of tropical forests. But is growth really to blame? According to the Consultative Group on International Agricultural Research, the chief factor that drives deforestation in developing countries is not commercial logging but “poor farmers who have no other option to feeding their families other than slashing and burning a patch of forest… . Slash-and-burn agriculture results in the loss or degradation of some 25 million acres of land per year.”
By contrast, the United States today farms less than half of the land that it did in the 1920s but produces far more food now than it did then. The key, of course, is technology. In fact, available farming technology from developed countries could prevent, and in many cases reverse, the loss of tropical forests and other wildlife habitat around the globe. Unfortunately, institutional barriers, the absence of secure property rights, corrupt governments and a lack of education prevent its widespread diffusion and, hence, environmental restoration.
Another environmental problem frequently attributed to population growth is pollution. In 1972 The Limits to Growth computer model projected that pollution would skyrocket as population increased: “Virtually every pollutant that has been measured as a function of time appears to be increasing exponentially.” But once again, the new Malthusians had things exactly backward. Since 1972, America’s population has risen 26 percent and its economy has more than doubled. Western Europe and Japan have experienced similar rates of growth. Yet, instead of increasing as predicted, air pollutants have dramatically declined.
In fact, a growing body of literature suggests that in most cases there are thresholds of wealth at which the amount of a pollutant begins to decline. Department of Interior analyst Indur Goklany calls these thresholds the “environmental transition.” What this means is that when people rise above mere subsistence, they begin demanding amenities such as clean air and water. The first environmental transition is clean drinking water. Goklany has found that the level of fecal coliform bacteria in rivers, which is a good measure of water pollution, peaks when average per capita incomes reach $1,400 per year. The next transition occurs when particulates like smoke and soot peak at $3,200. And again, levels of sulfur dioxide peak at about $3,700.
Not surprisingly, committed Malthusians reject such findings. Paul Ehrlich, for instance, stubbornly insists that, “Most people do not recognize that, at least in rich nations, economic growth is the disease, not the cure.” [emphasis in original] To counteract the “disease” of economic growth, Maurice King recommends that people in the “privileged North” should engage in “the deliberate quest of poverty” to curb their “luxurious resource consumption.”
The favored target of such critiques is the United States, whose citizens are supposedly consuming more than their fair share of the world’s goods and causing more than their fair share of its ills. The average American, however, is not only a consumer but a producer of both goods and ideas. Americans and Europeans get more done with relatively less because of their higher levels of education, greater access to productive tools, superior infrastructure, democratic governments and free markets. As a consequence, output per hour of labor in the United States today is ten times what it was a hundred years ago. Thus, the average Westerner creates far more resources, especially knowledge and technology, than she or he consumes. Thus, too, both Western economies and environments are improving simultaneously.
All that said, if the right social institutions are lacking—democratic governance, secure private property, free markets—it is possible for a nation to fall into the Malthusian trap of rising poverty and increasing environmental degradation. The economies of many countries in Africa are declining, not because of high population growth rates or lack of resources, but because they have failed to implement the basic policies for encouraging economic growth: namely, widespread education, secure property rights and democratic governance.
Democratic governance and open markets have in fact proved indispensable for the prevention of famine in modern times. Nobel Prize-winning economist Amartya Sen notes that “in the terrible history of famines in the world, there is hardly any case in which a famine has occurred in a country that is independent and democratic, with an uncensored press.” Why is this? Because, says Sen, “So long as famines are relatively costless for the government, with no threat to its survival or credibility, effective actions to prevent famines do not have the urgency to make them inescapable imperatives for the government.”6 Along with Romer and other theorists, Sen also argues that general economic growth, not just growth in food output, is crucial to ending the threat of famine in Africa. He calls “for measures to encourage and enhance technical change, skill formation and productivity—both in agriculture and in other fields.”
Contemporary Malthusians liken humanity to a car travelling one hundred miles per hour on a foggy road. And they warn of dire consequences if we do not slow down. But if we adopt institutions and regulations that slow the pace of innovation, we may find ourselves depleting our current energy supplies before they can be replaced by new ones. New Growth Theory suggests that a better analogy might be that human society is an airplane cloaked in clouds flying at a speed of six hundred miles per hour. If the plane slows down, it will lose air speed and may crash before arriving safely at its destination.
We cannot deplete the supply of ideas, designs and recipes. They are immaterial and limitless, and therefore not bound in any meaningful sense by the second law of thermodynamics. Surely no one believes that humanity has already devised all of the methods to conserve, locate and exploit new sources of energy, or that the flow of ideas to improve houses, transportation, communications, medicine and farming has suddenly dried up. Though far too many of our fellow human beings are caught in local versions of the Malthusian trap, we must not mistake the situation of that segment as representing the future of all of humanity and the earth itself; it is, instead, a dwindling remnant of an unhappy past. Misery is not the inevitable lot of humanity, nor is the ruin of the natural world a foregone conclusion.
In economics, returns to scale and economies of scale are related but different terms that describe what happens as the scale of production increases in the long run, when all input levels including physical capitalusage are variable (chosen by the firm). The term returns to scale arises in the context of a firm’s production function. It explains the behavior of the rate of increase in output (production) relative to the associated increase in the inputs (the factors of production) in the long run. In the long run all factors of production are variable and subject to change due to a given increase in size (scale). While economies of scale show the effect of an increased output level on unit costs, returns to scale focus only on the relation between input and output quantities.
The laws of returns to scale are a set of three interrelated and sequential laws: Law of Increasing Returns to Scale, Law of Constant Returns to Scale, and Law of Diminishing returns to Scale. If output increases by that same proportional change as all inputs change then there are constant returns to scale (CRS). If output increases by less than that proportional change in inputs, there are decreasing returns to scale(DRS). If output increases by more than that proportional change in inputs, there are increasing returns to scale (IRS). A firm’s production function could exhibit different types of returns to scale in different ranges of output. Typically, there could be increasing returns at relatively low output levels, decreasing returns at relatively high output levels, and constant returns at one output level between those ranges.[citation needed]
In mainstream microeconomics, the returns to scale faced by a firm are purely technologically imposed and are not influenced by economic decisions or by market conditions (i.e., conclusions about returns to scale are derived from the specific mathematical structure of the production function in isolation).
Example
When all inputs increase by a factor of 2, new values for output will be:
Twice the previous output if there are constant returns to scale (CRS)
Less than twice the previous output if there are decreasing returns to scale (DRS)
More than twice the previous output if there are increasing returns to scale (IRS)
Assuming that the factor costs are constant (that is, that the firm is a perfect competitor in all input markets), a firm experiencing constant returns will have constant long-run average costs, a firm experiencing decreasing returns will have increasing long-run average costs, and a firm experiencing increasing returns will have decreasing long-run average costs.[1][2][3] However, this relationship breaks down if the firm does not face perfectly competitive factor markets (i.e., in this context, the price one pays for a good does depend on the amount purchased). For example, if there are increasing returns to scale in some range of output levels, but the firm is so big in one or more input markets that increasing its purchases of an input drives up the input’s per-unit cost, then the firm could have diseconomies of scale in that range of output levels. Conversely, if the firm is able to get bulk discounts of an input, then it could have economies of scale in some range of output levels even if it has decreasing returns in production in that output range.
Formal definition
Formally, a production function {\displaystyle \ F(K,L)} is defined to have:
Constant returns to scale if (for any constant a greater than 0) {\displaystyle \ F(aK,aL)=aF(K,L)}
Increasing returns to scale if (for any constant a greater than 1) {\displaystyle \ F(aK,aL)>aF(K,L),}
Decreasing returns to scale if (for any constant a greater than 1) {\displaystyle \ F(aK,aL)<aF(K,L)}
where K and L are factors of production—capital and labor, respectively.
In a more general set-up, for a multi-input-multi-output production processes, one may assume technology can be represented via some technology set, call it {\displaystyle \ T}, which must satisfy some regularity conditions of production theory.[4][5][6][7][8] In this case, the property of constant returns to scale is equivalent to saying that technology set {\displaystyle \ T} is a cone, i.e., satisfies the property {\displaystyle \ aT=T,\forall a>0}. In turn, if there is a production function that will describe the technology set {\displaystyle \ T} it will have to be homogeneous of degree 1.
Formal example
The Cobb-Douglas functional form has constant returns to scale when the sum of the exponents adds up to one. The function is:
{\displaystyle \ F(K,L)=AK^{b}L^{1-b}}
where {\displaystyle A>0} and {\displaystyle 0<b<1}. Thus
Story 1: First The CIA Director Now The State Department Contradict Obama’s Islamic State, Syria and Iraq Policies — The Hillary Clinton Support Network Of Lying Lunatic Leftists Throws Obama Under The Bus — Work Place Violence — Hate Crime — Terrorist Act — Radical Islam — Radical Islamic Terrorist — Radical Islamic Terrorist Jihadists — Face Reality and Stopping Lying Obama — Radical Islamists Are A Majority of The World’s 1,600+ Million Muslims And Want Sharia Law — Ban All Radical Islamists From United States Permanently — Videos
Radical Islam: The Most Dangerous Ideology
What ISIS Wants
The rise of ISIS, explained in 6 minutes
The Basics of Islam 8: Robert Spencer on The Meaning of the Word “Jihad”
Robert Spencer Moment: Trump Was Right.
Robert Spencer on Hannity on the Orlando jihad massacre
The Basics of Islam 1: Robert Spencer on “Islamophobia”
What Does Jihad Really Mean? | For the Record
CIA Director Grave Warning: ISLAMIC STATE Dangerous As Ever
Gorka: CIA director no longer spreading Obama’s narrative
CIA CHIEF CONTRADICTS PRESIDENT OBAMA ON ISIS
Robert Spencer speaks on the Syrian refugee crisis and the Islamic idea of hijrah
State Department diplomats slam Obama’s Syria policy
Diplomats slam Obama’s Syria policy
Dozens of State Department officials just revolted against Obama’s Syria policy
How will Trump react to the diplomats’ memo on Syrian war?
Syria’s war: Who is fighting and why
The war in Syria explained in five minutes | Guardian Animations
State Department dissent memo critical of Obama policy on Syria and Assad
State Department Demands Policy Shift In Syria | MSNBC
DHS Whistleblower Phil Haney exposes Obama administration during Press Conference
DHS Whistleblower Exposes Government’s Submission To Jihad (FULL Press Conference)
Government Insider BLOWS WHISTLE on Obama’s ‘Countering Violent Extremism’ Policy
State Dept Under Fire For Including Syria In Top Foreign Policy Moments – America’s Newsroom
Ben Shapiro: The Myth of the Tiny Radical Muslim Minority
Obama gives speech in Orlando
Obama goes on tirade against Trump over ‘dangerous’ Muslim ban, ‘radical Islam’
Obama on ‘Radical Islam’
Speech by President Barack Obama After Counter-ISIL Meeting
President Obama On Orlando Shooting
Top Ex-CIA Agent Has ‘Chilling Warning’ About Obama’s Plans for Islamic State!
CIA Director on Islamic State
CIA Director John Brennan on ISIS and Global Threats at CSIS
CIA Chief Warns Islamic State Isn’t Finished Yet
CIA’S Brennan: Islamic State’s Momentum Blunted in Syria, Iraq
Shariamerica: Islam, Obama, and the Establishment Clause
Full Event: Donald Trump Rally in Dallas, TX (6-16-16)
An ’embarrassing’ break: Dozens of State Department officials just revolted against Obama’s Syria policy
At least 51 “mid-to-high-level State Department officials” have signed a dissent channel cable breaking with President Barack Obama’s policy on Syria and calling for US airstrikes on the regime of Syrian President Bashar Assad.
“Failure to stem Assad’s flagrant abuses will only bolster the ideological appeal of groups such as Daesh, even as they endure tactical setbacks on the battlefield,” the cable reads, according to The Journal.
Daesh is an alternate name for ISIS, aka the Islamic State or ISIL.
“We are aware of a dissent channel cable written by a group of State Department employees regarding the situation in Syria,” State Department spokesman John Kirby told The Wall Street Journal.
“We are reviewing the cable now, which came up very recently, and I am not going to comment on the contents,” he said.
The officials who signed the document “range from a Syria desk officer in the Bureau of Near Eastern Affairs to a former deputy to the American ambassador in Damascus,” and have all been involved in formulating or carrying out the administration’s Syria policy.
That policy has largely emphasized defeating the Islamic State over bolstering Syria’s anti-Assad rebel groups.
According to the American Foreign Service Association, the dissent channel is “a serious policy channel reserved only for consideration of responsible dissenting and alternative views on substantive foreign policy issues that cannot be communicated in a full and timely manner through regular operating channels and procedures.”
It is available to all “regular or re-employed annuitant employees” of the State Department and the US Agency for International Development.
The number of officials – at least 50 – who have signed the internal document calling for military action against Assad is unusual, a former State Department official who worked on Middle East policy told The Journal.
“It’s embarrassing for the administration to have so many rank-and-file members break on Syria,” they said.
Fighters of the Syrian Democratic Forces sit in a lookout position in the western rural area of Manbij.Thomson Reuters
The cable calls for the Obama administration to place more emphasis on defeating Assad – whose brutality is seen by many experts as the driver of Syria’s jihadist problem – by arming and regaining the trust of Syria’s moderate opposition.
That, in turn, will “turn the tide of the conflict against the regime [to] increase the chances for peace by sending a clear signal to the regime and its backers that there will be no military solution to the conflict,” the cable reportedly says.
The CIA-backed factions of the Free Syrian Army – the majority of which are Arab and battling forces loyal to Assad – have at times clashed with Pentagon-trained fighters associated with the Syrian Democratic Forces, who are predominantly Kurdish and focused on defeating the Islamic State.
Their divergent military objectives and ethnicities have bred mistrust and fighting that is ultimately counterproductive to the cause of the revolution.
Several high-ranking government officials, moreover – including Robert S. Ford, a former ambassador to Syria, and Obama’s former defense secretary, Chuck Hagel – have left their positions over Obama’s failure to act decisively against Assad, whose brutality continues to fuel a bloody revolution that has left over 400,000 people dead and millions displaced.
“Many people working on Syria for the State Department have long urged a tougher policy with the Assad government as a means of facilitating arrival at a negotiated political deal to set up a new Syrian government,” Ford told The New York Times on Thursday.
Protesters carry Free Syrian Army flags and chant slogans during an antigovernment protest in the town of Marat Numan in Idlib Province, Syria, on March 4.REUTERS/Khalil Ashawi
“The moral rationale for taking steps to end the deaths and suffering in Syria, after five years of brutal war, is evident and unquestionable,” the cable said. ” The status quo in Syria will continue to present increasingly dire, if not disastrous, humanitarian, diplomatic and terrorism-related challenges.”
Assad crossed Obama’s now infamous “red line” for airstrikes in 2013, when he used chemical weapons to kill more than 1,000 people in the eastern Damascus suburb of Ghouta. Obama backed away from that red line when Assad agreed to a Russia-brokered deal to destroy his chemical-weapons stockpile.
Some experts say, however, that the entire stockpile has not been destroyed as promised.
“The US’ Syria policy has always been in the head of one man, and one man only: Barack Obama. No one else has ever really had a say in what happens in Syria,” Tony Badran, a Middle East expert and researcher at the Foundation for Defense of Democracies, told Business Insiderin a previous interview.
“Obama has owned it since day one – and from day one, he never intended to remove Assad,” he said.
The cable addresses Russia’s bombing campaign in Syria as well, asserting that Moscow and Assad have not taken past ceasefires and “consequential negotiations” seriously.
Russia entered the war in late September 2015 on behalf of Assad under the guise of fighting ISIS. Russian warplanes have primarily targeted non-jihadist, anti-Assad rebel groups, however, many of which are backed by the US, Turkey, and Saudi Arabia.
Government warplanes bombarded the besieged Syrian town of Darayya with barrel bombs last weekend, shortly after food aid was delivered to the town for the first time in nearly four years.
Chart: Obama Admin. On Pace to Issue One Million Green Cards to Migrants from Majority-Muslim Countries
by CAROLINE MAY
The Obama Administration is on pace to issue more than a million green cards to migrants from majority-Muslim countries, according to an analysis of Department of Homeland Security data.
A chart released by the Senate Subcommittee on Immigration and the National Interest Friday details the surge in immigration to the U.S. from majority-Muslim countries since President Barack Obama took office in 2009.
Specifically, in the first six fiscal years of Obama’s presidency (FY2009 – FY2014), his administration issued 832,014 green cards to migrants majority-Muslim countries, the most of which were issued to migrants from Pakistan (102,000), Iraq (102,000), Bangladesh (90,000), Iran (85,000), Egypt (56,000), and Somalia (37,000).
The total 832,014 new permanent residents do not include migrants on temporary, nonimmigrant visas — which allow foreign nationals to come to the U.S. temporarily for work, study, tourism and the like. As the subcommittee notes, the number also does not include those migrants who overstayed the terms of their visas.
Regardless, as the subcommittee explained in its analysis, the U.S. is playing host to immigrants from majority Muslim countries at an increasing pace.
Between FY 2013 and FY 2014, the number of green cards issued to migrants from Muslim-majority countries increased dramatically – from 117,423 in FY 2013, to 148,810 in FY 2014, a nearly 27 percent increase. Throughout the Obama Administration’s tenure, the United States has issued green cards to an average of 138,669 migrants from Muslim-majority countries per year, meaning that it is nearly certain the United States will have issued green cards to at least 1.1 million migrants from Muslim-majority countries on the President’s watch. It has also been reported that migration from Muslim-majority countries represents the fastest growing class of migrants.
Green cards, or Lawful Permanent Residency, puts immigrants on the path to citizenship and allows for lifetime residency, federal benefits, and work authorization. Included in the totals are refugees, who are required to apply for a green card after one year of residency in the U.S. Unlike other types of immigrants, refugees are immediately eligible for welfare benefits including Temporary Assistance to Needy Families (TANF), food stamps, and Medicaid.
A report from the Office of Refugee Resettlement (ORR) indicated that in FY 2013, 91.4 percent of Middle Eastern refugees (accepted to the U.S. between 2008-2013) received food stamps, 73.1 percent were on Medicaid or Refugee Medical Assistance and 68.3 percent were on cash welfare.
Green Card Totals, FY09-FY14:
Pakistan (102K), Iraq (102K), Bangladesh (90K), Iran (85K), Egypt (56K), Somalia (37K), Uzbekistan (30K), Turkey (26K), Morocco (25K), Jordan (25K), Albania (24K), Afghanistan (21K), Lebanon (20K), Yemen (20K), Syria (18K), Indonesia (17K), Sudan (15K), Sierra Leone (12K), Guinea (9K), Senegal (8K), Saudi Arabia (9K), Algeria (8K), Kazakhstan (8K), Kuwait (6K), Gambia (6K), United Arab Emirates (5K), Azerbaijan (4K), Mali (4K), Burkina Faso (3K), Kyrgyzstan (3K), Kosovo (3K), Mauritania (3K), Tunisia (2K), Tajikistan (2K), Libya (2K), Turkmenistan (1K), Qatar (1K), Chad (1K)
51% of U.S. Muslims want Sharia; 60% of young Muslims more loyal to Islam than to U.S.
OCTOBER 15, 2015 3:43 PM BY ROBERT SPENCER
Really, what did you expect? A considerable portion of U.S. domestic and foreign policy is based on the assumption that Islam in the U.S. will be different: that Muslims here believe differently from those elsewhere, and do not accept the doctrines of violence against and subjugation of unbelievers that have characterized Islam throughout its history. But on what is that assumption based? Nothing but wishful thinking. And future generations of non-Muslims will pay the price.
“Meanwhile, An Islamic Fifth Column Builds Inside America,” by Paul Sperry, IBD, October 1, 2015 (thanks to Pamela Geller)
In berating GOP presidential hopeful Ben Carson for suggesting a loyalty test for Muslims seeking high office, CNN host Jake Tapper maintained that he doesn’t know a single observant Muslim-American who wants to Islamize America.
“I just don’t know any Muslim-Americans — and I know plenty — who feel that way, even if they are observant Muslims,” he scowled.
Tapper doesn’t get out much. If he did, chances are he’d run into some of the 51% of Muslims living in the U.S. who just this June told Polling Co. they preferred having “the choice of being governed according to Shariah,” or Islamic law. Or the 60% of Muslim-Americans under 30 who told Pew Research they’re more loyal to Islam than America.
Maybe they’re all heretics, so let’s see what the enlightened Muslims think.
If Tapper did a little independent research he’d quickly find that America’s most respected Islamic leaders and scholars also want theocracy, not democracy, and even advocate trading the Constitution for the Quran.
These aren’t fringe players. These are the top officials representing the Muslim establishment in America today.
Hopefully none of them ever runs for president, because here’s what he’d have to say about the U.S. system of government:
• Muzammil Siddiqi, chairman of both the Fiqh Council of North America, which dispenses Islamic rulings, and the North American Islamic Trust, which owns most of the mosques in the U.S.: “As Muslims, we should participate in the system to safeguard our interests and try to bring gradual change, (but) we must not forget that Allah’s rules have to be established in all lands, and all our efforts should lead to that direction.”
• Omar Ahmad, co-founder of the Council on American-Islamic Relations, the top Muslim lobby group in Washington: “Islam isn’t in America to be equal to any other faith, but to become dominant. The Quran should be the highest authority in America, and Islam the only accepted religion on Earth.”
• CAIR spokesman Ibrahim Hooper: “I wouldn’t want to create the impression that I wouldn’t like the government of the United States to be Islamic sometime in the future.”
• Imam Siraj Wahhaj, director of the Muslim Alliance in North America: “In time, this so-called democracy will crumble, and there will be nothing. And the only thing that will remain will be Islam.”
• Imam Zaid Shakir, co-founder of Zaytuna College in Berkeley, Calif.: “If we put a nationwide infrastructure in place and marshaled our resources, we’d take over this country in a very short time. . . . What a great victory it will be for Islam to have this country in the fold and ranks of the Muslims.”…
John Owen Brennan (born September 22, 1955)[1][2] is an American government official who is the Director of the Central Intelligence Agency. He has served as chief counterterrorism advisor to U.S. President Barack Obama; his title was Deputy National Security Advisor for Homeland Security and Counterterrorism, and Assistant to the President.[1][3][4] His responsibilities included overseeing plans to protect the country from terrorism and respond to natural disasters, and he met with the President daily.[5][6]Previously, he advised President Obama on foreign policy and intelligence issues during the 2008 presidential campaign and transition.[7] Brennan withdrew his name from consideration for Director of the Central Intelligence Agency (CIA) in the first Obama administration over concerns about his support for transferring terror suspects to countries where they may be tortured while serving under President George W. Bush.[3][5] Instead, Brennan was appointed Deputy National Security Advisor, a position which did not require Senate confirmation.[3][5][8]
President Barack Obama nominated Brennan as his next director of the CIA on January 7, 2013.[11][12][13] The ACLU called for the Senate not to proceed with the appointment until it confirms that “all of his conduct was within the law” at the CIA and White House.[14] John Brennan was approved by the Senate Intelligence Committee on March 5, 2013 to succeedDavid Petraeus as the Director of the CIA by a vote of 12 to 3.[15]
While riding a bus to class at Fordham, he saw an ad in The New York Times that said the CIA was recruiting, and he felt a CIA career would be a good match for his “wanderlust” and his desire to do public service.[5] He received a B.A. in political science from Fordham in 1977.[3] His studies included a junior year abroad learning Arabic and taking Middle Eastern studies courses at the American University in Cairo.[3][5] He also received a Master of Arts in government with a concentration in Middle Eastern studies from the University of Texas at Austin in 1980.[5] He speaks Arabic fluently.[9]
Brennan is married to Kathy Pokluda Brennan, with whom he has had one son and two daughters.[2][3][16]
Brennan began his CIA career as an analyst, presumably in the Washington D.C. area, and spent 25 years with the agency.[1][5][17] At one point in his career, he was a daily intelligence briefer for President Bill Clinton.[5] In 1996 he was CIA station chief in Riyadh, Saudi Arabia when the Khobar Towers bombing killed 19 U.S. servicemen.[5] In 1999 he was appointed chief of staff to George Tenet, then-Director of the CIA.[3][5] Brennan became deputy executive director of the CIA in March 2001.[3] He was director of the newly created Terrorist Threat Integration Center from 2003 to 2004, an office that sifted through and compiled information for President Bush’s daily top secret intelligence briefings and employed the services of analysts from a dozen U.S. agencies and entities.[18] One of the controversies in his career involves the distribution of intelligence to the Bush White House that helped lead to an “Orange Terror Alert“, over Christmas 2003. The intelligence, which purported to list terror targets, was highly controversial within the CIA and was later discredited. An Obama administration official does not dispute that Brennan distributed the intelligence during the Bush era but said Brennan passed it along because that was his job.[19] His last post within the Intelligence Community was as director of the National Counterterrorism Center in 2004 and 2005, which incorporated information on terrorist activities across U.S. agencies.[3][20]
Brennan then left government service for a few years, becoming Chairman of the Intelligence and National Security Alliance (INSA) and the CEO of The Analysis Corporation (TAC). He continued to lead TAC after its acquisition by Global Strategies Group in 2007 and its growth as the Global Intelligence Solutions division of Global’s North American technology business GTEC, before returning to government service with the Obama administration as Homeland Security Advisor on January 20, 2009.[10]
On January 7, 2013, Brennan was nominated by President Barack Obama to be director of the Central Intelligence Agency.[21]
Counterterrorism advisor to President Obama
In late 2008 Brennan was the reported choice for Director of the CIA in the incoming Obama administration. Brennan withdrew his name from consideration because of opposition to his CIA service under President George W. Bush and past public statements he had made in support of enhanced interrogation and the transfer of terrorism suspects to countries where they might be tortured (extraordinary rendition).[3][5][22] President Obama then appointed him to be his chief counterterrorism advisor, a position that did not require Senate confirmation.[3][5][8]
Brennan and President Barack Obama at a meeting of the Homeland Security Council, May 2009
In August 2009, Brennan criticized some Bush-administration anti-terror policies, saying that waterboarding had threatened national security by increasing the recruitment of terrorists and decreasing the willingness of other nations to cooperate with the U.S.[23] He also described the Obama administration’s focus as being on “extremists” and not “jihadists“. He said that using the second term, which means one who is struggling for a holy goal, gives “these murderers the religious legitimacy they desperately seek” and suggests the US is at war with the religion of Islam.[23]
In an early December 2009 interview with the Bergen Record Brennan remarked, “the U.S. intelligence and law enforcement communities have to bat 1.000 every day. The terrorists are trying to be successful just once”.[5] At a press conferences days after the failed Christmas Day bomb attack on Northwest Airlines Flight 253 by Umar Farouk Abdulmutallab, Brennan said U.S. intelligence agencies did not miss any signs that could have prevented the attempt but later said he had let the President down by underestimating a small group of Yemeni terrorists and not connecting them to the attempted bomber.[1][24] Within two weeks after the incident, however, he produced a report highly critical of the performance of U.S. intelligence agencies, concluding that their focus on terrorist attempts aimed at U.S. soil was inadequate.[17] In February 2010, he claimed on Meet the Press that he was tired of Republican lawmakers using national security issues as political footballs, and making allegations where they did not know the facts.[25]
Drone program
In April 2012 Brennan was the first Obama administration official to publicly acknowledge CIA drone strikes in Pakistan, Yemen, Somalia, Libya, Afghanistan, and elsewhere. In his speech he argued for the legality, morality, and effectiveness of the program.[26][27][28] The ACLU and other organizations disagreed. In 2011/2012 he also helped reorganize the process, under the aegis of the Disposition Matrix database, by which people outside of war zones were put on the list of drone targets. According to an Associated Press story, the reorganization helped “concentrate power” over the process inside the White House administration.[29][30][31]
In June 2011, Brennan claimed that US counter-terrorism operations had not resulted in “a single collateral death” in the past year because of the “precision of the capabilities that we’ve been able to develop.”[32][33] Nine months later, Brennan claimed he had said “we had no information” about any civilian, noncombatant deaths during the timeframe in question.[33][34] The Bureau of Investigative Journalism disagreed with Brennan, citing their own research[35] that initially led them to believe that 45 to 56 civilians, including six children, had been killed by ten US drone strikes during the year-long period in question.[33] Additional research led the Bureau to raise their estimate to 76 deaths, including eight children and two women.[33] According to the Bureau, Brennan’s claims “do not appear to bear scrutiny.”[33]The Atlantic has been harsher in its criticism, saying that “Brennan has been willing to lie about those drone strikes to hide ugly realities.”[36]
According to the Bureau of Investigative Journalism, Brennan’s comments about collateral death are perhaps explained by a counting method that treats all military-aged males in a strike zone as combatants unless there is explicit information to prove them innocent.[33][37]
CIA Director (2013–present)
Nomination
Brennan being sworn in as CIA Director, March 8, 2013
Morris Davis, a former Chief Prosecutor for the Guantanamo Military Commissions compared Brennan to Canadian Omar Khadr, who was convicted of “committing murder in violation of the law of war”.[38] He suggested that Brennan’s role in targeting individuals for CIA missile strikes was no more authorized than the throwing of the grenade Khadr was accused of.
On February 27, 2013, the Senate Intelligence Committee postponed a vote, expected to be taken the next day on the confirmation of Brennan until the following week. On March 5, the Intelligence Committee approved the nomination 12–3. The Senate was set to vote on Brennan’s nomination on March 6, 2013. However, Kentucky Senator Rand Paul began a talking Senate filibuster of the vote, citing President Barack Obama and his administration’s use of combat drones, stating “No one politician should be allowed to judge the guilt, to charge an individual, to judge the guilt of an individual and to execute an individual. It goes against everything that we fundamentally believe in our country.”[39][40] Paul’s filibuster continued for 13 hours, after which Brennan was confirmed by a vote of 63–34.
Brennan was sworn into the office of CIA Director on March 8, 2013.[41]
Rand Paul Disgusted at NSA Spying on Congress and Israel | Fox News
Report: NSA captured conversations of Congress members with Israeli leaders
Report Says NSA Captured Conversations Of Congress Members With Israeli Leaders
Report: NSA Wiretapped Conversations Between Israeli PM And Members Of Congress
What NSA Eavesdropping On Israel Reveals About Relations
Wall Street Journal: NSA spied on Israeli leaders
WSJ: NSA Spied Not Only On Israel But Congress During Nuke Talks – America’s Newsroom
NSA spied on Israel amid Iran talks, caught some US lawmakers’ US talks
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All
NSA Surveillance and What To Do About It
ShmooCon 2014: The NSA: Capabilities and Countermeasures
Bruce Schneier: “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World”
JACOB APPELBAUM EXPOSES NSA TOOLS HACKING YOUR COMPUTER-BACK DOORS & MALWARE
Jacob Appelbaum Interview – Discusses Edward Snowden, The NSA, TOR, WikiLeaks
William Binney – NSA Hiding Extent of Surveillance From FISA Courts & Congress
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Binney – The Government is Profiling You (The NSA is Spying on You)
William Binney: NSA had 9/11 foreknowledge
NSA Spying on All Americans Part 1
NSA Spying on All Americans Part 2
How the NSA Spies on Americans (Jim Harper)
The NSA: Future Crime Unit (Jim Harper)
NSA Whistleblower William Binney the 3 words that will put you on the NSA List
NSA whistleblower William Binney Keynote at HOPE Number Nine
NSA Whistleblower William Binney: The Future of FREEDOM
Alex Jones interviews William Binney December 22nd 2015
The Alex Jones Show (3rd HOUR-VIDEO Commercial Free) Wednesday December 30 2015: Seymour Hersh
Operation “Toto” Pulling Back The Curtain: Full NSA Interview
FULL Senate Debate On NSA Spying On ALL Americans
Spying on the Homefront-PBS Frontline
State of Surveillance: Police, Privacy and Technology
The USA Freedom Act | True News
Next Future Terrifying Technology Will Blow Your Mind
Enemy of the State Movie Will Smith (1998)
Encryption as Fast As Possible
Why the NSA is breaking our encryption — and why we should care | Matthew Green | TEDxMidAtlantic
U.S. Spy Net on Israel Snares Congress
NSA’s targeting of Israeli leaders swept up the content of private conversations with U.S. lawmakers
By ADAM ENTOUS and DANNY YADRON
President Barack Obama announced two years ago he would curtail eavesdropping on friendly heads of state after the world learned the reach of long-secret U.S. surveillance programs.
But behind the scenes, the White House decided to keep certain allies under close watch, current and former U.S. officials said. Topping the list was Israeli Prime MinisterBenjamin Netanyahu.
The U.S., pursuing a nuclear arms agreement with Iran at the time, captured communications between Mr. Netanyahu and his aides that inflamed mistrust between the two countries and planted a political minefield at home when Mr. Netanyahu later took his campaign against the deal to Capitol Hill.
The National Security Agency’s targeting of Israeli leaders and officials also swept up the contents of some of their private conversations with U.S. lawmakers and American-Jewish groups. That raised fears—an “Oh-s— moment,” one senior U.S. official said—that the executive branch would be accused of spying on Congress.
The White House kept certain allies including Israeli Prime Minister Benjamin Netanyahu under surveillance after President Obama announced the U.S. would curtail surveillance on friendly heads of state. WSJ’s Adam Entous has details on Lunch Break. Photo: Getty
White House officials believed the intercepted information could be valuable to counter Mr. Netanyahu’s campaign. They also recognized that asking for it was politically risky. So, wary of a paper trail stemming from a request, the White House let the NSA decide what to share and what to withhold, officials said. “We didn’t say, ‘Do it,’ ” a senior U.S. official said. “We didn’t say, ‘Don’t do it.’ ”
Explore more than 60 countries that have or are building cyberwar tools
WSJ’s Adam Entous explains how the U.S. determined which world leaders to spy on after announcing it would curtail surveillance. Photo: Getty
Stepped-up NSA eavesdropping revealed to the White House how Mr. Netanyahu and his advisers had leaked details of the U.S.-Iran negotiations—learned through Israeli spying operations—to undermine the talks; coordinated talking points with Jewish-American groups against the deal; and asked undecided lawmakers what it would take to win their votes, according to current and former officials familiar with the intercepts.
In closed-door debate, the Obama administration weighed which allied leaders belonged on a so-called protected list, shielding them from NSA snooping. French President François Hollande, German Chancellor Angela Merkel and other North Atlantic Treaty Organization leaders made the list, but the administration permitted the NSA to target the leaders’ top advisers, current and former U.S. officials said. Other allies were excluded from the protected list, including Recep Tayyip Erdogan, president of NATO ally Turkey, which allowed the NSA to spy on their communications at the discretion of top officials.
Privately, Mr. Obama maintained the monitoring of Mr. Netanyahu on the grounds that it served a “compelling national security purpose,” according to current and former U.S. officials. Mr. Obama mentioned the exception in his speech but kept secret the leaders it would apply to.
Israeli, German and French government officials declined to comment on NSA activities. Turkish officials didn’t respond to requests Tuesday for comment. The Office of the Director of National Intelligence and the NSA declined to comment on communications provided to the White House.
The White House stopped directly monitoring the private communications of German Chancellor Angela Merkel but authorized the National Security Agency to eavesdrop on her top advisers.PHOTO: ODD ANDERSEN/AGENCE FRANCE-
This account, stretching over two terms of the Obama administration, is based on interviews with more than two dozen current and former U.S. intelligence and administration officials and reveals for the first time the extent of American spying on the Israeli prime minister.
Taking office
After Mr. Obama’s 2008 presidential election, U.S. intelligence officials gave his national-security team a one-page questionnaire on priorities. Included on the form was a box directing intelligence agencies to focus on “leadership intentions,” a category that relies on electronic spying to monitor world leaders.
The NSA was so proficient at monitoring heads of state that it was common for the agency to deliver a visiting leader’s talking points to the president in advance. “Who’s going to look at that box and say, ‘No, I don’t want to know what world leaders are saying,’ ” a former Obama administration official said.
In early intelligence briefings, Mr. Obama and his top advisers were told what U.S. spy agencies thought of world leaders, including Mr. Netanyahu, who at the time headed the opposition Likud party.
Michael Hayden, who led the NSA and the Central Intelligence Agency during the George W. Bush administration, described the intelligence relationship between the U.S. and Israel as “the most combustible mixture of intimacy and caution that we have.”
The NSA helped Israel expand its electronic spy apparatus—known as signals intelligence—in the late 1970s. The arrangement gave Israel access to the communications of its regional enemies, information shared with the U.S. Israel’s spy chiefs later suspected the NSA was tapping into their systems.
When Mr. Obama took office, the NSA and its Israeli counterpart, Unit 8200, worked together against shared threats, including a campaign to sabotage centrifuges for Iran’s nuclear program. At the same time, the U.S. and Israeli intelligence agencies targeted one another, stoking tensions.
“Intelligence professionals have a saying: There are no friendly intelligence services,” said Mike Rogers, former Republican chairman of the House Intelligence Committee.
Early in the Obama presidency, for example, Unit 8200 gave the NSA a hacking tool the NSA later discovered also told Israel how the Americans used it. It wasn’t the only time the NSA caught Unit 8200 poking around restricted U.S. networks. Israel would say intrusions were accidental, one former U.S. official said, and the NSA would respond, “Don’t worry. We make mistakes, too.”
Convinced Mr. Netanyahu would attack Iran without warning the White House, U.S. spy agencies ramped up their surveillance, with the assent of Democratic and Republican lawmakers serving on congressional intelligence committees.
By 2013, U.S. intelligence agencies determined Mr. Netanyahu wasn’t going to strike Iran. But they had another reason to keep watch. The White House wanted to know if Israel had learned of the secret negotiations. U.S. officials feared Iran would bolt the talks and pursue an atomic bomb if news leaked.
The NSA had, in some cases, spent decades placing electronic implants in networks around the world to collect phone calls, text messages and emails. Removing them or turning them off in the wake of the Snowden revelations would make it difficult, if not impossible, to re-establish access in the future, U.S. intelligence officials warned the White House.
Instead of removing the implants, Mr. Obama decided to shut off the NSA’s monitoring of phone numbers and email addresses of certain allied leaders—a move that could be reversed by the president or his successor.
There was little debate over Israel. “Going dark on Bibi? Of course we wouldn’t do that,” a senior U.S. official said, using Mr. Netanyahu’s nickname.
One tool was a cyber implant in Israeli networks that gave the NSA access to communications within the Israeli prime minister’s office.
Given the appetite for information about Mr. Netanyahu’s intentions during the U.S.-Iran negotiations, the NSA tried to send updates to U.S. policy makers quickly, often in less than six hours after a notable communication was intercepted, a former official said.
Despite NSA surveillance, Obama administration officials said they were caught off guard when Mr. Boehner announced the invitation on Jan. 21.
Soon after, Israel’s lobbying campaign against the deal went into full swing on Capitol Hill, and it didn’t take long for administration and intelligence officials to realize the NSA was sweeping up the content of conversations with lawmakers.
The message to the NSA from the White House amounted to: “You decide” what to deliver, a former intelligence official said.
NSA rules governing intercepted communications “to, from or about” Americans date back to the Cold War and require obscuring the identities of U.S. individuals and U.S. corporations. An American is identified only as a “U.S. person” in intelligence reports; a U.S. corporation is identified only as a “U.S. organization.” Senior U.S. officials can ask for names if needed to understand the intelligence information.
The Obama administration included French President François Hollande on a so-called protected list, shielding him from NSA snooping.PHOTO: PHILIPPE WOJAZER/REUTERS
The rules were tightened in the early 1990s to require that intelligence agencies inform congressional committees when a lawmaker’s name was revealed to the executive branch in summaries of intercepted communications.
A 2011 NSA directive said direct communications between foreign intelligence targets and members of Congress should be destroyed when they are intercepted. But the NSA director can issue a waiver if he determines the communications contain “significant foreign intelligence.”
The NSA has leeway to collect and disseminate intercepted communications involving U.S. lawmakers if, for example, foreign ambassadors send messages to their foreign ministries that recount their private meetings or phone calls with members of Congress, current and former officials said.
“Either way, we got the same information,” a former official said, citing detailed reports prepared by the Israelis after exchanges with lawmakers.
During Israel’s lobbying campaign in the months before the deal cleared Congress in September, the NSA removed the names of lawmakers from intelligence reports and weeded out personal information. The agency kept out “trash talk,” officials said, such as personal attacks on the executive branch.
Administration and intelligence officials said the White House didn’t ask the NSA to identify any lawmakers during this period.
“From what I can tell, we haven’t had a problem with how incidental collection has been handled concerning lawmakers,” said Rep. Adam Schiff, a California Democrat and the ranking member of the House Permanent Select Committee on Intelligence. He declined to comment on any specific communications between lawmakers and Israel.
The NSA reports allowed administration officials to peer inside Israeli efforts to turn Congress against the deal. Mr. Dermer was described as coaching unnamed U.S. organizations—which officials could tell from the context were Jewish-American groups—on lines of argument to use with lawmakers, and Israeli officials were reported pressing lawmakers to oppose the deal.
“These allegations are total nonsense,” said a spokesman for the Embassy of Israel in Washington.
A U.S. intelligence official familiar with the intercepts said Israel’s pitch to undecided lawmakers often included such questions as: “How can we get your vote? What’s it going to take?”
NSA intelligence reports helped the White House figure out which Israeli government officials had leaked information from confidential U.S. briefings. When confronted by the U.S., Israel denied passing on the briefing materials.
The agency’s goal was “to give us an accurate illustrative picture of what [the Israelis] were doing,” a senior U.S. official said.
Just before Mr. Netanyahu’s address to Congress in March, the NSA swept up Israeli messages that raised alarms at the White House: Mr. Netanyahu’s office wanted details from Israeli intelligence officials about the latest U.S. positions in the Iran talks, U.S. officials said.
A day before the speech, Secretary of State John Kerry made an unusual disclosure. Speaking to reporters in Switzerland, Mr. Kerry said he was concerned Mr. Netanyahu would divulge “selective details of the ongoing negotiations.”
The State Department said Mr. Kerry was responding to Israeli media reports that Mr. Netanyahu wanted to use his speech to make sure U.S. lawmakers knew the terms of the Iran deal.
Intelligence officials said the media reports allowed the U.S. to put Mr. Netanyahu on notice without revealing they already knew his thinking. The prime minister mentioned no secrets during his speech to Congress.
In the final months of the campaign, NSA intercepts yielded few surprises. Officials said the information reaffirmed what they heard directly from lawmakers and Israeli officials opposed to Mr. Netanyahu’s campaign—that the prime minister was focused on building opposition among Democratic lawmakers.
The NSA intercepts, however, revealed one surprise. Mr. Netanyahu and some of his allies voiced confidence they could win enough votes.
“Encrypt” redirects here. For the film, see Encrypt (film).
This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography.
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.[1] Encryption does not of itself prevent interception, but denies the message content to the interceptor.[2]:374 In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.[2] For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.
Types of encryption
Symmetric key encryption
In symmetric-key schemes,[3] the encryption and decryption keys are the same. Communicating parties must have the same key before they can achieve secure communication.
In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.[4] Public-key encryption was first described in a secret document in 1973;[5] before then all encryption schemes were symmetric-key (also called private-key).[2]:478
A publicly available public key encryption application called Pretty Good Privacy (PGP) was written in 1991 by Phil Zimmermann, and distributed free of charge with source code; it was purchased by Symantec in 2010 and is regularly updated.[6]
Uses of encryption
Encryption has long been used by military and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage.[7] Encryption can be used to protect data “at rest”, such as information stored on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers’ personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems, which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection), is another somewhat different example of using encryption on data at rest.[8]
Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of amessage authentication code (MAC) or a digital signature. Standards for cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single error in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g., traffic analysis, TEMPEST, or Trojan horse.[11]
Digital signature and encryption must be applied to the ciphertext when it is created (typically on the same device used to compose the message) to avoid tampering; otherwise any node between the sender and the encryption agent could potentially tamper with it. Encrypting at the time of creation is only secure if the encryption device itself has not been tampered with.
Story 1: House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos
Background Information
Obama and Hillary Blame Youtube Video for Benghazi Terrorist Attack as Coffins Arrive
Our Fallen Heroes
Published on Sep 15, 2012
President Obama speaks about the tragic loss of four of our fellow Americans who were serving in our diplomatic post in Benghazi, Libya. These Americans represented the best of our country; without people like them, we could not sustain our freedoms or security, or provide the leadership that the entire world depends on. During this time of turmoil in many different countries, the President makes it clear that the United States has a profound respect for people of all faiths, but as Commander in Chief, he will never tolerate efforts to harm our fellow Americans and will ensure that those who attack our people find no escape from justice.
Obama and Press Secretary Carney Blame a Video for the Benghazi Attack
YouTube Video Maker Blamed for Benghazi Attacks Breaks Silence on CNN
White House Covers Up Benghazi Terrorist Attack
13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined.
ABC News’ Jon Karl hammers Jay Carney over New bombshell Benghazi emails
Benghazi Whistleblower Embarrassed by Obama Admin Placing Blame on a YouTube Video
Benghazi Gate – Rand Paul and Hillary Clinton – Question & Answer
Email Reveals Obama Advisor Urged Susan Rice to Blame Video for Benghazi
Exclusive: Docs Show Weapons Going From Benghazi To Syria – Benghazi Gate – Happening Now
Breaking: Hillary Clinton Knew About Libyan Arms Shipments to Syria in 2011
Secretary of State Hillary Clinton knew that the US was sending arms from Libya to Syria back in 2011. She denied this during public testimony (under oath) in early 2013 after the Benghazi terrorist attack.
Melvin Goodman on why CIA Director Brennan is dangerous
The show is going to be about the response to CIA director Brennan’s press conference two weeks ago and then an appearance at the Council on Foreign Relations last week, an on the record interview with Charlie Rose in New York about his plans to restructure the CIA to try to bring a more integrity to intelligence and make it less politicized. We are going to hear from today Melvin Goodman. Goodman is a senior fellow at the Center for International Policy and a professor of government at Johns Hopkins University. He is he is a former CIA analyst. Melvin Goodman is the author of Failure of Intelligence: the Decline and Fall of the CIA and the forthcoming book On the Path to Dissent: A Whistleblower at the CIA. Goodman is the national security columnist for Counterpunch, and he said of CIA director ‘s plan to restructure the CIA and I quote “Simply, it takes the CIA further from Truman’s concept and closer to the ability to politicize intelligence. Operations are part of the policy world and not the intelligence world. The Centers have made it too easy to provide the intelligence that the ‘masters’ desire, whether they are the masters on CIA’s 7th floor or the policy masters. Brennan’s world was the Center for Counterintelligence and Counterterrorism, and many of the intelligence errors and operational errors of the past 15 years have emanated from those centers. Organizationally, it makes no sense — what are the directorates of operations and analysis — they sound as if they are HR experts.”
CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels
Retired Lt. Gen. Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi
Clinton Donors Got Weapons Deals From Hillary
Even by the standards of arms deals between the United States and Saudi Arabia, this one was enormous. A consortium of American defense contractors led by Boeing would deliver $29 billion worth of advanced fighter jets to the United States’ oil-rich ally in the Middle East…E
Why is Benghazi still a big issue for Hillary Clinton? BBC News
General Petraeus Testifies Before Congress For The First Time Since Resigning As Director Of CIA
Select Committee on Benghazi Holds First Hearing
Former CIA Director and General David Petraeus (Ret.) testified at a hearing on U.S. policy toward the Middle East and combating ISIS* in the region. He talked about his support for military enclaves in Syria and for greater military action against Syrian President Bashar al-Assad and ISIS. He also gave his assessment of the Russian military build-up in Syria and of the Iran nuclear agreement.
At the beginning of his testimony, General Petraeus apologized for what what he called his “serious mistake” of sharing classified information with his biographer, with whom he also had an extramarital affair.
Select Committee on Benghazi Holds Second Hearing
Select Committee on Benghazi Holds Third Hearing
Rep. Gowdy: Either Petraeus Will Come Before Congressional Committee Or He Will Be Subpoenaed
Rep. Trey Gowdy addresses Former Secretary of State Hillary Clinton during his opening statement at a hearing Thursday by the House Select Committee on Benghazi. trey gowdy elivers opening statement of benghazi committee hearing with hillary clinton. trey gowdy says ‘We are going to find the #Truth because there is no expiration of it.’ Chairman Trey Gowdy opens #Benghazi hearing: ‘Previous investigations were not thorough. Trey Gowdy to Clinton: Trey Gowdy addressed former Secretary of State Hillary Clinton personally at a high-stakes hearing on Thursday, telling the Democratic presidential candidate that the panel’s investigation is not about her. “Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you,” Gowdy said. “Let me assure you it is not. And let me assure you why it is not. This work is about something much more important than any single person. It is about four U.S. government workers, including our Ambassador, murdered by terrorists on foreign soil. It is about what happened before, during, and after the attacks that killed these four men.” He continued: “It is about what this country owes those who risk their lives to serve it. It is about the fundamental obligation of our government to tell the truth — always — to the American people. Not a single member of this Committee signed up for an investigation into you or your email system. We signed up because we wanted to honor the service and sacrifice of four people sent to a foreign land to represent us – who were killed – and do everything we can to prevent it from happening to others.” Gowdy also presented several key questions he would be asking in his opening statement: Why were there so many requests for more security personnel and equipment, and why were those requests denied in Washington? Why did the State Department compound in Benghazi not even come close to meeting proper security specifications? What policies were we pursuing in Libya that required a physical presence in spite of the escalating violence? Who in Washington was aware of the escalating violence in Libya? What special precautions, if any, were taken on the anniversary of 9-11? What happened in Washington after the first attack and what was the response to that attack? What did the military do or not do? What did our leaders in Washington do or not do and when? Why was the American public given such divergent accounts of what caused these attacks? And why is it so hard to get information from the very government these four men were representing and serving and sacrificing for?
Benghazi panel chair: Investigation not about Hillary Clinton
South Carolina Rep. Trey Gowdy, the chairman of the House Select Committee investigating Benghazi, tells Hillary Clinton in his opening statement that the probe is not singularly focused on the former secretary of state.
Hillary Clinton gave her opening statement to the House Select Committee investigating the 2012 attacks at the U.S. Embassy in Benghazi, Libya.
Benghazi Hearing Committee Chairman on Hillary Clinton’s Emails | The New York Times
Trey Gowdy questions Hillary Clinton (Part 1)
Trey Gowdy questions Hillary Clinton (Part 2)
Clinton to panel: 3 things we learned from Benghazi
Trey Gowdy GRILLS Hillary Clinton Benghazi Committee Hearing
Trey Gowdy GRILLS Hillary Clinton during the Benghazi Committee Hearing. trey gowdy went off on hillary clinton about blumenthal and more. watch the explosive exchange. Hillary Clinton coolly hit back at her Republican interrogators on the Benghazi committee during her long-awaited testimony on Thursday, rebuffing claims she was detached as the situation in Libya deteriorated and asserting she did not use email to conduct the “vast majority” of her work as secretary of state.
The Democratic front-runner told the House Selection Committee on Benghazi, which is 18 months into its probe of the 2012 attacks on the consulate in Libya, that the tragedy does not deserve partisan attacks, while insisting the U.S. needs to stay committed to diplomatic engagement.
“Despite all the previous investigations and all the talk about partisan agendas, I’m here to honor those we lost and to do what I can to aid those who serve us still,” Clinton said, speaking slowly and deliberately during her opening statement. “My challenge to you, members of this committee, is the same challenge I put to myself…. Let’s be worthy of the trust the American people bestow on us… they expect us to rise above partisanship. And I hopes it’s what we’ll strive for today and in the future.”
Republicans questioned Clinton about why numerous requests for additional security never made it Clinton’s attention. She said they went to the right place: to personnel who handled security. And when they pressed her on why she kept the compound open or did not give it additional, she retorted that she never received a recommendation to shut down the mission—even after two attacks on the compound.
The hearing kicked off on Thursday with the partisan sniping that has been the hallmark of the committee’s work, with House Benghazi Committee Chairman Trey Gowdy defended his investigation, assuring Clinton that his probe is not centered on her.
Hour_2_151022_hillary_clinton_2_gty_1160.jpg
WATCH LIVE: Hillary Clinton testifies before Benghazi Committee
“Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you. Let me assure you it is not,” Gowdy said in his opening statement, adding that it was about the people who were killed.
He also blamed her in part for the fact that the inquiry has dragged on for a year and a half.
The State Department only realized it did not have Clinton’s emails after they requested documents, triggering a lengthy process by which the department had to ask her and her top aides who also sometimes used private email for work purposes to turn them over.
“You had an unusual email arrangement with yourself, which meant the State Department could not produce your emails to us,” Gowdy said. “When you left the State Department you kept those public records to yourself for almost two years….Those decisions were your decisions, not ours… It just took longer to get them and garnered more attention in the process.
Ranking Democrat Elijah Cummings (D-Md.) blasted the committee as a partisan witch-hunt out to get Clinton, saying Republicans formed the panel because they “did not like the answers they got” in previous probe—“so they set up this select committee with no rules, no deadlines and a unlimited budget.”
“They set the noose because you’re running for president,” Cummings said, raising his voice before calling for the panel to disband. “It is time for Republicans to end this …fishing expedition.”
It only took Cummings a few minutes to highlight a number of embarrassing moments for Gowdy in recent weeks, including comments by Majority Leader Kevin McCarthy (R-Calif.), Rep. Richard Hanna (R-N.Y) and a fired GOP Benghazi investigator who all suggested the panel was either out to hurt Clinton or increasingly focused on investigating her.
REP. Martha Roby vs Hillary Clinton at House Select Committee on Benghazi 10/22/15
Rep Jim Jordan Goes After Hillary ‘Where’d the False Narrative Start It Started With You’
REP Trey Gowdy vs Hillary Clinton Round 2 at House Select Committee on Benghazi 102215
Benghazi Select – Gowdy: this is an investigation, not a prosecution
Bickering among Benghazi panel as Clinton looks on silently
Fireworks erupt between Clinton, Republicans at Benghazi hearing
More Background Information
Weekly Address: Carrying on the Work of
America’s intelligence community, explained
THE RECRUIT – Spy School: Inside the CIA Training Program, 1 of 2
THE RECRUIT – Spy School: Inside the CIA Training Program, 2 of 2
Special Activities Division
Published on Aug 15, 2014
The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service (NCS) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the government of the United States may deny all knowledge.
Inside America’s New Covert Wars: Navy SEALs, Delta Force, Blackwater, Security Contractors (2013)
The Daring Early Years of the CIA: Covert Ops from WW2 to Vietnam (1995)
How has the CIA been used as a secret Military force? William Blum • BRAVE NEW FILMS
The CIA began as a spy agency after World War Two, but soon the CIA was planning and executing covert operations across the globe without proper congressional oversight. From the removal of the democratically elected leaders of Iran and Guatemala to the attempted invasion of Cuba, to the removal of every secular government in the Middle East, the influence of the agency is insidious. But how can a democratic society tolerate such a secret and lethal institution that works against the very values America seeks to uphold around the world?
CIA Covert Operations in Africa: How Does the U.S. Government Make Decisions?
According to the Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation. It is normally financed by government revenues but in this age of super-empowered individuals and corporations they could become a common tool of power beyond traditional war and diplomacy.
Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action. The CIA’s authority to conduct covert action comes from the National Security Act of 1947. President Ronald Reagan issued Executive Order 12333 titled in 1984. This order defined covert action as “special activities”, both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e). The CIA must have a “Presidential Finding” issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act. These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives. As a result of this framework, the CIA “receives more oversight from the Congress than any other agency in the federal government”. The Special Activities Division (SAD) is a division of the CIA’s National Clandestine Service, responsible for Covert Action and “Special Activities”. These special activities include covert political influence and paramilitary operations. The division is overseen by the United States Secretary of State.
Special Activities Division – Special Operations Group | SAD SOG
Published on Jun 30, 2015
The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action. The Special Activities Division reports directly to the Deputy Director of the National Clandestine Service.
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the United States government may deny all knowledge.
SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU and ISA, as well as other United States special operations forces, such as USNSWC, MARSOC, Special Forces, SEALs and 24th STS.
SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.
REVEALED: If This Is True, Benghazi Is Even Worse Than We Ever Thought
Insiders Come Forward, Proof of Benghazi Stand Down Order, It was Obama
Obama Lies About Libya – Imperial Presidency
Media Silent About Obama’s Undeclared Wars
Did the Military Intervention in Libya Succeed? (Benjamin Friedman)
Drones are Obama’s weapon of choice for waging illegal and undeclared wars
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection ofintelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated.[2] As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government.[3] If they are compromised during a mission, the United States government maydeny all knowledge.[4]
SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.[5]
Political Action Group (PAG) is responsible for covert activities related to political influence, psychological operations and economic warfare. The rapid development of technology has added cyberwarfare to their mission. Tactical units within SAD are also capable of carrying out covert political action while deployed in hostile and austere environments. A large covert operation usually has components that involve many, or all, of these categories, as well as paramilitary operations. Political and Influence covert operations are used to support U.S. foreign policy. Often overt support for one element of an insurgency would be counter-productive due to the impression it would have on the local population. In such cases, covert assistance allows the U.S. to assist without damaging these elements in the process. Many of the other activities (such as propaganda, economic and cyber) support the overall political effort. There have been issues in the past with attempts to influence the US media such as in Operation Mockingbird. However, these activities are now subject to the same oversight as all covert action operations.[6]
SAD provides the President of the United States with an option when overt military and/or diplomatic actions are not viable or politically feasible. SAD can be directly tasked by the President of the United States or the National Security Council at the President’s direction. This is unlike any other U.S. special mission force. However, SAD/SOG has far fewer members than most of the other special missions units, such as the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force) or Naval Special Warfare Development Group (DEVGRU).[7][8][9]
As the action arm of the DO, SAD/SOG conducts direct action missions such as raids, ambushes, sabotage, targeted killings[10][11][12] and unconventional warfare(e.g., training and leading guerrilla and military units of other countries in combat). SAD/SOG also conducts special reconnaissance, that can be either military orintelligence driven, but is carried out by Paramilitary Officers (also called Paramilitary Operatives) when in “non-permissive environments“. Paramilitary Operations Officers are also fully trained case officers (i.e., “spies”) and as such conduct clandestine human intelligence (HUMINT) operations throughout the world.[13]SAD/SOG officers are selected from the most elite U.S. military units.[9]
The political action group within SAD conducts the deniable psychological operations, also known as black propaganda, as well as “Covert Influence” to effect political change as an important part of any Administration’s foreign policy.[1] Covert intervention in a foreign election is the most significant form of political action. This could involve financial support for favored candidates, media guidance, technical support for public relations, get-out-the-vote or political organizing efforts, legal expertise, advertising campaigns, assistance with poll-watching, and other means of direct action. Policy decisions could be influenced by assets, such as subversion of officials of the country, to make decisions in their official capacity that are in the furtherance of U.S. policy aims. In addition, mechanisms for forming and developing opinions involve the covert use of propaganda.[14]
Propaganda includes leaflets, newspapers, magazines, books, radio, and television, all of which are geared to convey the U.S. message appropriate to the region. These techniques have expanded to cover the internet as well. They may employ officers to work as journalists, recruit agents of influence, operate media platforms, plant certain stories or information in places it is hoped it will come to public attention, or seek to deny and/or discredit information that is public knowledge. In all such propaganda efforts, “black” operations denote those in which the audience is to be kept ignorant of the source; “white” efforts are those in which the originator openly acknowledges himself; and “gray” operations are those in which the source is partly but not fully acknowledged.[14][15]
SAD’s existence became better known as a result of the “Global War on Terror“. Beginning in autumn of 2001, SAD/SOG paramilitary teams arrived in Afghanistanto hunt down al-Qaeda leaders, facilitate the entry of U.S. Army Special Forces and lead the United Islamic Front for the Salvation of Afghanistan against the rulingTaliban. SAD/SOG units also defeated Ansar al-Islam in Iraqi Kurdistan prior to the invasion of Iraq in 2003[17][18] and trained, equipped, organized and led theKurdishpeshmerga forces to defeat the Iraqi army in northern Iraq.[13][17] Despite being the most covert unit in U.S. Special Operations, numerous books have been published on the exploits of CIA paramilitary officers, including Conboy and Morrison’s Feet to the Fire: CIA Covert Operations in Indonesia,[19] and Warner’sShooting at the Moon: The Story of America’s Clandestine War in Laos.[20] Most experts consider SAD/SOG the premiere force for unconventional warfare (UW), whether that warfare consists of either creating or combating an insurgency in a foreign country.[7][21][22]
There remains some conflict between the National Clandestine Service and the more clandestine parts of the United States Special Operations Command (USSOCOM),[23] such as the Joint Special Operations Command. This is usually confined to the civilian/political heads of the respective Department/Agency. The combination of SAD and USSOCOM units has resulted in some of the most notable successes of the wars in Iraq and Afghanistan, to include the locating and killing of Osama bin Laden.[22][24] SAD/SOG has several missions. One of these missions is the recruiting, training, and leading of indigenous forces in combat operations.[22] SAD/SOG and its successors have been used when it was considered desirable to have plausible deniability about U.S. support (this is called a covert operation or “covert action”).[13] Unlike other special missions units, SAD/SOG operatives combine special operations and clandestine intelligence capabilities in one individual.[9] These individuals can operate in any environment (sea, air or ground) with limited to no support.[7]
The Pentagon commissioned a study to determine whether the CIA or the U.S. Department of Defense (DoD) should conduct covert action paramilitary operations. Their study determined that the CIA should maintain this capability and be the “sole government agency conducting covert action.” The DoD found that, even under U.S. law, it does not have the legal authority to conduct covert action, nor the operational agility to carry out these types of missions.[27] The operation in May 2011 that resulted in the death of Osama bin Laden was a covert action under the authority of the CIA.[24][28]
SAD/SOG has several hundred officers, mostly former members of special operations forces (SOF) and a majority from theJoint Special Operations Command (JSOC).[29] The CIA has also recruited individuals within the agency.[30] The CIA’s formal position for these individuals is “Paramilitary Operations Officers” and “Specialized Skills Officers.” Paramilitary Operations Officers attend the Clandestine Service Trainee (CST) program, which trains them as clandestine intelligence operatives (known as “Core Collectors” within the Agency). The primary strengths of SAD/SOG Paramilitary Officers are operational agility, adaptability, and deniability. They often operate in small teams, typically made up of six operators (with some operations being carried out by a single officer), all with extensive military special operations expertise and a set of specialized skills that does not exist in any other unit.[9] As fully trained intelligence case officers, Paramilitary Operations Officers possess all the clandestine skills to collect human intelligence—and most importantly—to recruit assets from among the indigenous troops receiving their training. These officers often operate in remote locations behind enemy lines to carry out direct action (including raids and sabotage), counter-intelligence, guerrilla/unconventional warfare, counter-terrorism, and hostage rescue missions, in addition to being able to conduct espionage via HUMINT assets.
There are four principal elements within SAD’s Special Operations Group: the Air Branch, the Maritime Branch, the Ground Branch, and the Armor and Special Programs Branch. The Armor and Special Programs Branch is charged with development, testing, and covert procurement of new personnel and vehicular armor and maintenance of stockpiles of ordnance and weapons systems used by SOG, almost all of which must be obtained from clandestine sources abroad, in order to provide SOG operatives and their foreign trainees with plausible deniability in accordance with U.S. Congressional directives.
Together, SAD/SOG contains a complete combined arms covert military. Paramilitary Operations Officers are the core of each branch and routinely move between the branches to gain expertise in all aspects of SOG.[30] As such, Paramilitary Operations Officers are trained to operate in a multitude of environments. Because these officers are taken from the most highly trained units in the U.S. military and then provided with extensive additional training to become CIA clandestine intelligence officers, many U.S. security experts assess them as the most elite of the U.S. special missions units.[31]
While the World War IIOffice of Strategic Services (OSS) was technically a military agency under the Joint Chiefs of Staff, in practice it was fairly autonomous of military control and enjoyed direct access to PresidentFranklin D. Roosevelt. Major General William Joseph Donovan was the head of the OSS. Donovan was a soldier and Medal of Honor recipient from World War I. He was also a lawyer and former classmate of FDR at Columbia Law School.[37] Like its successor, the CIA, OSS included both human intelligence functions and special operations paramilitary functions. Its Secret Intelligence division was responsible for espionage, while its Jedburgh teams, a joint U.S.-UK-French unit, were forerunners of groups that create guerrilla units, such as the U.S. Army Special Forces and the CIA. OSS’ Operational Groups were larger U.S. units that carried out direct action behind enemy lines. Even during World War II, the idea of intelligence and special operations units not under strict military control was controversial. OSS operated primarily in the European Theater of Operations (ETO) and to some extent in the China-Burma-India Theater, while General of the ArmyDouglas MacArthur was extremely reluctant to have any OSS personnel within his area of operations.
One of the OSS’ greatest accomplishments during World War II was its penetration of Nazi Germany by OSS operatives. The OSS was responsible for training German and Austrian commandos for missions inside Nazi Germany. Some of these agents included exiled communists and socialist party members, labor activists, anti-NaziPOWs, and German and Jewish refugees. At the height of its influence during World War II, the OSS employed almost 24,000 people.[38]
OSS Paramilitary Officers parachuted into many countries then behind enemy lines, including France, Norway, Greece and The Netherlands. In Crete, OSS paramilitary officers linked up with, equipped and fought alongside Greek resistance forces against the Axis occupation.
OSS was disbanded shortly after World War II, with its intelligence analysis functions moving temporarily into the U.S. Department of State. Espionage and counterintelligence went into military units, while paramilitary and related functions went into an assortment of ‘ad hoc’ groups, such as the Office of Policy Coordination. Between the original creation of the CIA by the National Security Act of 1947 and various mergers and reorganizations through 1952, the wartime OSS functions generally went into CIA. The mission of training and leading guerrillas generally stayed in the United States Army Special Forces, but those missions required to remain covert were folded into the paramilitary arm of the CIA. The direct descendant of the OSS’ Special Operations is the CIA’s Special Activities Division.
Tibet
After the Chinese invasion of Tibet in October 1950, the CIA inserted SAD paramilitary teams into Tibet to train and lead Tibetan resistance fighters against thePeople’s Liberation Army of China. These teams selected and then trained Tibetan soldiers in the Rocky Mountains of the United States;[39] training occurred atCamp Hale.[40][41] The SAD teams then advised and led these commandos against the Chinese, both from Nepal and India. In addition, SAD Paramilitary Officers were responsible for the Dalai Lama‘s clandestine escape to India, narrowly escaping capture and certain execution by the Chinese government.[39]
According to a book by retired CIA officer John Kenneth Knaus, entitled Orphans Of The Cold War: America And The Tibetan Struggle For Survival, Gyalo Thondup, the older brother of the 14th (and current) Dalai Lama, sent the CIA five Tibetan recruits. These recruits were then trained in paramilitary tactics on the island ofSaipan in the Northern Marianas.[42] Shortly thereafter, the five men were covertly returned to Tibet “to assess and organize the resistance” and selected another 300 Tibetans for training. U.S. assistance to the Tibetan resistance ceased after the 1972 Nixon visit to China, after which the United States and China normalized relations.[43]
The CIA sponsored a variety of activities during the Korean War. These activities included maritime operations behind North Korean lines. Yong Do Island, connected by a rugged isthmus to Pusan, served as the base for those operations. These operations were carried out by well-trained Korean guerrillas. The four principal U.S. advisers responsible for the training and operational planning of those special missions were Dutch Kramer, Tom Curtis, George Atcheson and Joe Pagnella. All of these Paramilitary Operations Officers operated through a CIA front organization called the Joint Advisory Commission, Korea (JACK), headquartered at Tongnae, a village near Pusan, on the peninsula’s southeast coast.[44] These paramilitary teams were responsible for numerous maritime raids and ambushes behind North Korean lines, as well as prisoner of warrescue operations. These were the first maritime unconventional warfare units that trained indigenous forces as surrogates. They also provided a model, along with the other CIA-sponsored ground based paramilitary Korean operations, for theMilitary Assistance Command, Vietnam-Studies and Observations Group (MACV-SOG) activities conducted by the U.S. military and the CIA/SAD in Vietnam.[7][44] In addition, CIA paramilitary ground-based teams worked directly for U.S. military commanders, specifically with the 8th Army, on the “White Tiger” initiative. This initiative included inserting South Korean commandos and CIA Paramilitary Operations Officers prior to the two major amphibious assaults on North Korea, including the landing at Inchon.[7]
The Bay of Pigs Invasion (known as “La Batalla de Girón”, or “Playa Girón” in Cuba), was an unsuccessful attempt by a U.S.-trained force of Cuban exiles to invade southern Cuba and overthrow the Cuban government of Fidel Castro. The plan was launched in April 1961, less than three months after John F. Kennedy assumed the presidency of the United States. TheCuban Revolutionary Armed Forces, trained and equipped by Eastern Bloc nations, defeated the exile-combatants in three days.
The sea-borne invasion force landed on April 17, and fighting lasted until April 19, 1961. CIA Paramilitary Operations OfficersGrayston Lynch and William “Rip” Robertson led the first assault on the beaches, and supervised the amphibious landings.[45] Four American aircrew instructors from Alabama Air National Guard were killed while flying attack sorties.[45]Various sources estimate Cuban Army casualties (killed or injured) to be in the thousands (between 2,000 and 5,000).[46] This invasion followed the successful overthrow by the CIA of the Mosaddeqgovernment in Iran in 1953[47] and Arbenz government in Guatemala in 1954,[48] but was a failure both militarily and politically.[49] Deteriorating Cuban-American relations were made worse by the 1962 Cuban Missile Crisis.
Bolivia
The National Liberation Army of Bolivia (ELN-Ejército de Liberación Nacional de Bolivia) was a communist guerrilla force that operated from the remote Ñancahuazú region against the pro-U.S. Bolivian government. They were joined by Che Guevara in the mid-1960s.[50][51] The ELN was well equipped and scored a number of early successes against the Bolivian army in the difficult terrain of the mountainous Camiri region.[52] In the late 1960s, the CIA deployed teams of SAD Paramilitary Operations Officers to Bolivia to train the Bolivian army in order to counter the ELN.[52] These SAD teams linked up with U.S. Army Special Forces and Bolivian Special Forces to track down and capture Guevara, who was a special prize because of his leading role in the Cuban Revolution.[52] On October 9, 1967, Guevara was executed by Bolivian soldiers on the orders of CIA paramilitary operative Félix Rodríguez shortly after being captured, according to CIA documents.[53]
Vietnam and Laos
South Vietnam, Military Regions, 1967
The original OSS mission in Vietnam under MajorArchimedes Patti was to work with Ho Chi Minh in order to prepare his forces to assist the United States and their Allies in fighting the Japanese. After the end of World War II, the US agreed at Potsdam to turn Vietnam back to their previous French rulers and in 1950 the US began providing military aid to the French.[54]
CIA Paramilitary Operations Officers trained and led Hmong tribesmen in Laos and Vietnam, and their actions of these officers were not known for several years. Air America was the air component of the CIA’s paramilitary mission in Southeast Asia and was responsible for all combat, logistics and search and rescue operations in Laos and certain sections of Vietnam.[55] The ethnic minority forces numbered in the tens of thousands and they conducted direct actions mission, led by Paramilitary Operations Officers, against the communist Pathet Lao forces and their North Vietnamese allies.[7]
Elements of SAD were seen in the CIA’s Phoenix Program. One component of the Phoenix Program was involved in the capture and killing of suspected Viet Cong (National Liberation Front – NLF) members.[56] Between 1968 and 1972, the Phoenix Program captured 81,740 National Liberation Front of South Vietnam (NLF or Viet Cong) members, of whom 26,369 were killed. This was a large proportion of U.S. killings between 1969 and 1971. The program was also successful in destroying their infrastructure. By 1970, communist plans repeatedly emphasized attacking the government’s “pacification” program and specifically targeted Phoenix agents. The NLF also imposed quotas. In 1970, for example, communist officials near Da Nang in northern South Vietnam instructed their agents to “kill 400 persons” deemed to be government “tyrant[s]” and to “annihilate” anyone involved with the “pacification” program. Several North Vietnamese officials have made statements about the effectiveness of Phoenix.[57][58]
MAC-V SOG (Studies and Observations Group) (which was originally named the Special Operations Group, but was changed for cover purposes), was created and active during the Vietnam War. While CIA was just one part of MAC-V SOG, it did have operational control of some of the programs. Many of the military members of MAC-V SOG joined the CIA after their military service. The legacy of MAC-V SOG continues within SAD’s Special Operations Group.[59]
Maritime activities against the USSR
In 1973, SAD/SOG and the CIA’s Directorate of Science and Technology built and deployed the USNS Glomar Explorer (T-AG-193), a large deep-sea salvage ship, on a secret operation. This operation was called Project Azorian (erroneously called Project Jennifer by the press).[60] Her mission was to recover a sunken Sovietsubmarine, K-129, which had been lost in April 1968.[61][62] A mechanical failure caused two-thirds of the submarine to break off during recovery,[60] but SAD recovered two nuclear-tipped torpedoes, cryptographic machines and the bodies of six Soviet submariners.[63] An alternative theory claims that all of K-129 was recovered[64] and that the official account was an “elaborate cover-up”.[65]
Also in the 1970s, the U.S. Navy, the National Security Agency (NSA) and SAD/SOG [66] conducted Operation Ivy Bells and a series of other missions to place wire taps on Soviet underwater communications cables. These operations were covered in detail in the 1998 book Blind Man’s Bluff: The Untold Story of American Submarine Espionage.[67] In the 1985 edition of “Studies in Intelligence”, the CIA’s in-house journal that outsiders rarely get to see, the CIA describes the “staggering expense and improbable engineering feats” that culminated in the August 1974 mission.[68]
Nicaragua
In 1979, the U.S.-backed Anastasio Somoza Debayle dictatorship in Nicaragua fell to the socialist Sandinistas. Once in power, the Sandinistas disbanded theNicaraguan National Guard, who had committed many human rights abuses, and arrested and executed some of its members. Other former National Guard members helped to form the backbone of the Nicaraguan Counterrevolution or Contra. SAD/SOG paramilitary teams were deployed to train and lead these forces against the Sandinista government. These paramilitary activities were based in Honduras and Costa Rica. Direct military aid by the United States was eventually forbidden by the Boland Amendment of the Defense Appropriations Act of 1983. The Boland Amendment was extended in October 1984 to forbid action by not only the Defense Department, but also to include the Central Intelligence Agency.[69][70]
The Boland Amendment was a compromise because the U.S. Democratic Party did not have enough votes for a comprehensive ban on military aid. It covered only appropriated funds spent by intelligence agencies. Some of Reagan’s national security officials used non-appropriated money of the National Security Council (NSC) to circumvent the Amendment. NSC officials sought to arrange funding by third parties. These efforts resulted in the Iran-Contra Affair of 1987, which concerned Contra funding through the proceeds of arms sales to the Islamic Republic of Iran. No court ever made a determination whether Boland covered the NSC and on the grounds that it was a prohibition rather than a criminal statute, no one was indicted for violating it. Congress later resumed aid to the Contras, totaling over $300 million. The Contra war ended when the Sandinistas were voted out of power by a war-weary populace in 1990.[70][71]Sandinista leader Daniel Ortega was re-elected as President of Nicaragua in 2006 and took office again on January 10, 2007.
El Salvador
CIA personnel were also involved in the Salvadoran civil war.[72] Some allege that the techniques used to interrogate prisoners in El Salvador foreshadowed those later used in Iraq and Afghanistan.[73] In fact, when a similar counter-insurgency program was proposed in Iraq, it was referred to as “the Salvador Option”.[74]
Somalia
Location of Somalia
SAD sent in teams of Paramilitary Operations Officers into Somalia prior to the U.S. intervention in 1992. On December 23, 1992, Paramilitary Officer Larry Freedman became the first casualty of the conflict in Somalia. Freedman was a former ArmyDelta Force operator who had served in every conflict that the U.S. was involved in, both officially and unofficially, since Vietnam.[75] Freedman was killed while conducting special reconnaissance in advance of the entry of U.S. military forces. His mission was completely voluntary, as it required entry into a very hostile area without any support. Freedman was awarded the Intelligence Star on January 5, 1993 for his “extraordinary heroism”.[76]
SAD/SOG teams were key in working with JSOC and tracking high value targets (HVT), known as “Tier One Personalities”. Their efforts, working under extremely dangerous conditions with little to no support, led to several very successful joint JSOC/CIA operations.[77] In one specific operation, a CIA case officer, Michael Shanklin[78] and codenamed “Condor”, working with a CIA Technical Operations Officer from the Directorate of Science and Technology, managed to get a cane with a beacon in it to Osman Ato, a wealthy businessman, arms importer, and Mohammed Aideed, a money man whose name was right below Mohamed Farrah Aidid’s on the Tier One list.
Once Condor confirmed that Ato was in a vehicle, JSOC‘s Delta Force launched a capture operation.
a Little Bird helicopter dropped out of the sky and a sniper leaned out and fired three shots into the car’s engine block. The car ground to a halt as commandos roped down from hovering Blackhawks [sic], surrounded the car and handcuffed Ato. It was the first known helicopter takedown of suspects in a moving car. The next time Jones saw the magic cane, an hour later, Garrison had it in his hand. “I like this cane,” Jones remembers the general exclaiming, a big grin on his face. “Let’s use this again.” Finally, a tier one personality was in custody.[77]
President Bill Clinton withdrew U.S. forces on May 4, 1994.[79]
In June 2006, the Islamic Courts Union seized control of southern Somalia, including the country’s capital Mogadishu, prompting the Ethiopian government to send in troops to try to protect the transitional government. In December, the Islamic Courts warned Ethiopia they would declare war if Ethiopia did not remove all its troops from Somalia. Sheikh Sharif Ahmed, leader of the Islamic Courts, called for a jihad, or holy war, against Ethiopia and encouraged foreign Muslim fighters to come to Somalia. At that time, the United States accused the group of being controlled by al-Qaeda, but the Islamic Courts denied that charge.[80]
In 2009, PBS reported that al-Qaeda had been training terrorists in Somalia for years. Until December 2006, Somalia’s government had no power outside of the town of Baidoa, 150 miles (240 km) from the capital. The countryside and the capital were run by warlords and militia groups who could be paid to protect terrorist groups.[80]
CIA officers kept close tabs on the country and paid a group of Somali warlords to help hunt down members of al-Qaeda according to the New York Times.[citation needed] Meanwhile, Ayman al-Zawahiri, the deputy to al-Qaeda leader Osama bin Laden, issued a message calling for all Muslims to go to Somalia.[80]On January 9, 2007, a U.S. official said that ten militants were killed in one airstrike.[81]
On September 14, 2009, Saleh Ali Saleh Nabhan, a senior al-Qaeda leader in East Africa as well as a senior leader in Shabaab, al Qaeda’s surrogate in Somalia, was killed by elements of U.S. Special Operations. According to a witness, at least two AH-6 Little Bird attack helicopters strafed a two-car convoy. Navy SEALs then seized the body of Nabhan and took two other wounded fighters captive.[82][83] JSOC and the CIA had been trying to kill Nabhan for some time including back in January 2007, when an AC-130 Gunship was called in on one attempt. A U.S. intelligence source stated that CIA paramilitary teams are directly embedded with Ethiopian forces in Somalia, allowing for the tactical intelligence to launch these operations.[84] Nabhan was wanted for his involvement in the 1998 United States embassy bombings, as well as leading the cell behind the 2002 Mombasa attacks.[82][85]
From 2010 to 2013, the CIA set up the Somalia National Intelligence and Security Agency (NISA) by providing training, funding and diplomatic access. In the same time period, the EU and UN has spent millions of dollars for the military training of the Somali National Army (SNA). NISA is considered a professional Somali security force that can be relied upon to neutralize the terrorist threat.[86] This force responded to the complex al-Shabaab attack on the Banadir Regional Courthouse in Mogadishu which killed 25 civilians. NISA’s response however saved 100s and resulted in the death of all the al-Shabaab guerrillas involved.[87]
Significant events during this timeframe included the targeted drone strikes against British al-Qaida operative Bilal el-Berjawi [88] and Moroccan al-Qaida operative Abu Ibrahim.[89] It also included the rescue of U.S. citizen Jessica Buchanan by U.S. Navy SEALs.[90] All likely aided by intelligence collection efforts in Somalia.[91]
Afghanistan
Hamid Karzai with Special Forces and CIA Paramilitary in late 2001.
During the Soviet war in Afghanistan in the 1980s, Paramilitary Operations Officers were instrumental in equippingMujaheddin forces against the Soviet Army. Although the CIA in general, and a Texas congressman named Charlie Wilson in particular, have received most of the attention, the key architect of this strategy was Michael G. Vickers. Vickers was a young Paramilitary Operations Officer from SAD/SOG. The CIA’s efforts have been given credit for assisting in ending the Sovietinvolvement in Afghanistan and bringing Taliban to power.[92]
SAD paramilitary teams were active in Afghanistan in the 1990s in clandestine operations to locate and kill or capture Osama Bin Laden. These teams planned several operations, but did not receive the order to execute from President Bill Clintonbecause the available intelligence did not guarantee a successful outcome weighed against the extraordinary risk to the SAD/SOG teams that would execute the mission.[13] These efforts did however build many of the relationships that would prove essential in the 2001 U.S. Invasion of Afghanistan.[13]
On September 26, 2001, members of the Special Activities Division, led by Gary Schroen, were the first U.S. forces inserted into Afghanistan. The Northern Afghanistan Liaison Team entered the country nine days after the 9/11 attack[93][94] and linked up with the Northern Alliance as part of Task Force Dagger.[95]
They provided the Northern Alliance with resources including cash to buy weapons and prepared for the arrival of USSOCOM forces. The plan for the invasion of Afghanistan was developed by the CIA, the first time in United States history that such a large-scale military operation was planned by the CIA.[96] SAD, U.S. Army Special Forces, and the Northern Alliance combined to overthrow the Taliban in Afghanistan with minimal loss of U.S. lives. They did this without the use of conventional U.S. military ground forces.[13][97][98][99]
What made the Afghan campaign a landmark in the U.S. Military’s history is that it was prosecuted by Special Operations forces from all the services, along with Navy and Air Force tactical power, operations by the Afghan Northern Alliance and the CIA were equally important and fully integrated. No large Army or Marine force was employed”.[100]
The valor exhibited by Afghan and American soldiers, fighting to free Afghanistan from a horribly cruel regime, will inspire even the most jaded reader. The stunning victory of the horse soldiers – 350 Special Forces soldiers, 100 C.I.A. officers and 15,000 Northern Alliance fighters routing a Taliban army 50,000 strong – deserves a hallowed place in American military history”.[101]
Small and highly agile paramilitary mobile teams spread out over the countryside to meet with locals and gather information about the Taliban and al-Qa’ida. During that time, one of the teams was approached in a village and asked by a young man for help in retrieving his teenage sister. He explained that a senior Taliban official had taken her as a wife and had sharply restricted the time she could spend with her family. The team gave the man a small hand-held tracking device to pass along to his sister, with instructions for her to activate it when the Taliban leader returned home. The team responded to her emergency signal, capturing the senior Taliban official and rescuing the sister. The siblings’ tearful reunion left the team at a loss for words—a rarity for the normally loud warriors of CIA’s Special Activities Division.[102]
In December 2001, SAD/SOG and the Army’s Delta Force tracked down Osama bin Laden in the rugged mountains near the Khyber Pass in Afghanistan.[103]Former CIA station chief Gary Berntsen as well as a subsequent Senate investigation claimed that the combined American special operations task force was largely outnumbered by al-Qaeda forces and that they were denied additional US troops by higher command.[104] The task force also requested munitions to block the avenues of egress of bin Laden, but that request was also denied.[105] The team allegedly uncovered evidence in the subsequent site exploration that bin Laden’s ultimate aim was to obtain and detonate a nuclear device in a terrorist attack.[96] According to other press reports, SAD were ineffectual and “Bin Laden and bodyguards walked uncontested out of Tora Bora and disappeared into Pakistan’s unregulated tribal area.”[106]
Surge
In September 2009, the CIA planned on “deploying teams of spies, analysts and paramilitary operatives to Afghanistan, part of a broad intelligence ‘surge’ ordered by President Obama. This will make its station there among the largest in the agency’s history.”[107] This presence is expected to surpass the size of the stations in Iraq and Vietnam at the height of those wars.[107] The station is located at the U.S. Embassy in Kabul and is led “by a veteran with an extensive background in paramilitary operations”.[108] The majority of the CIA’s workforce is located among secret bases and military special operations posts throughout the country.[108][109]
Also in 2009, General Stanley McChrystal, the commander of NATO forces in Afghanistan, planned to request an increase in teams of CIA operatives, including their elite paramilitary officers, to join with U.S. military special operations forces. This combination worked well in Iraq and is largely credited with the success of that surge.[108][110] There have been basically three options described in the media: McChrystal’s increased counterinsurgency campaign; a counter-terror campaign using special operations raids and drone strikes; and withdrawal. The most successful combination in both the wars in Afghanistan and Iraq has been the linking up of SAD and military special forces to fight alongside highly trained indigenous units. One thing all of these options have in common is a requirement for greater CIA participation.[110]
The End Game
According to the current and former intelligence officials, General McChrystal also had his own preferred candidate for the Chief of Station (COS) job, a good friend and decorated CIA paramilitary officer.[111] The officer had extensive experience in war zones, including two previous tours in Afghanistan with one as the Chief of Station, as well as tours in the Balkans, Baghdad and Yemen. He is well known in CIA lore as “the man who saved Hamid Karzai‘s life when the CIA led the effort to oust the Taliban from power in 2001″. President Karzai is said to be greatly indebted to this officer and was pleased when the officer was named chief of station again. According to interviews with several senior officials, this officer “was uniformly well-liked and admired. A career paramilitary officer, he came to the CIA after several years in an elite Marine unit”.[111][112]
General McChrystal’s strategy included the lash up of special operations forces from the U.S. Military and from SAD/SOG to duplicate the initial success and the defeat of the Taliban in 2001[113] and the success of the “Surge” in Iraq in 2007.[114] This strategy proved highly successful and worked very well in Afghanistan with SAD/SOG and JSOC forces conducting raids nearly every night having “superb results” against the enemy.[115]
In 2001, the CIA’s SAD/SOG began creating what would come to be called Counter-terrorism Pursuit Teams (CTPT).[116][117] These units grew to include over 3,000 operatives by 2010 and have been involved in sustained heavy fighting against the enemy. It is considered the “best Afghan fighting force”.
Located at 7,800 feet (2,400 m) above sea level, Firebase Lilley in Shkin serves as a “nerve center for the covert war”.[117] This covert war includes being a hub for these CTPT operations with Firebase Lilley being just one in a constellation of CIA bases across Afghanistan.[117] These units have not only been highly effective in combat operations against the Taliban and al-Qaeda forces, but have also been used to engage with the tribes in areas with no other official government presence.[118]
This covert war also includes a large SOG/CTPT expansion into Pakistan to target senior al-Qaeda and Taliban leadership in the Federally Administered Tribal Area (FATA).[119] CTPT units are the main effort in both the “Counterterrorism plus” and the full “Counterinsurgency” options being discussed by the Obama administration in the December 2010 review.[120] SOG/CTPT are also key to any exit strategy for the U.S. government to leave Afghanistan, while still being able to deny al-Qaeda and other trans-national extremists groups a safehaven both in Afghanistan and in the FATA of Pakistan.[121]
In January 2013, a CIA drone strike killed Mullah Nazir a senior Taliban commander in the South Waziristan area of Pakistan believed responsible for carrying out the insurgent effort against the US military in Afghanistan. Nazir’s death degraded the Taliban.[122]
The U.S. has decided to lean heavily on CIA in general and SAD specifically in their efforts to withdraw from Afghanistan as it did in Iraq.[123] There are plans being considered to have several US Military special operations elements assigned to CIA after the withdrawal.[124]
Yemen
On November 5, 2002, a missile launched from a CIA-controlled Predator drone killed al-Qaeda members traveling in a remote area in Yemen. SAD/SOG paramilitary teams had been on the ground tracking their movements for months and called in this air strike.[125] One of those in the car was Ali Qaed Senyan al-Harthi, al-Qaeda’s chief operative in Yemen and a suspect in the October 2000 bombing of the destroyer USS Cole. Five other people, believed to be low-level al-Qaeda members, were also killed to include an American named Kamal Derwish.[126][127] Former Deputy U.S. Defense Secretary Paul Wolfowitz called it “a very successful tactical operation” and said “such strikes are useful not only in killing terrorists but in forcing al-Qaeda to change its tactics”.[126]
“It’s an important step that has been taken in that it has eliminated another level of experienced leadership from al-Qaeda,” said Vince Cannistraro, former head of counter-terrorism for the CIA and current ABC News consultant. “It will help weaken the organization and make it much less effective.”[128][129] Harithi was on the run, pursued by several security forces who were looking for him and Muhammad Hamdi al-Ahdal, another suspect in the USS Cole bombing case.[130]
In 2009, the Obama administration authorized continued lethal operations in Yemen by the CIA.[131] As a result, the SAD/SOG and JSOC have joined together to aggressively target al-Qaeda operatives in that country, both through leading Yemenese special forces and intelligence driven drone strikes.[131] A major target of these operations is ImamAnwar al-Aulaqi, an American citizen with ties to both Nidal Hassan, the alleged Fort Hood attacker, and Umar Farouk Abdulmutallab, the Christmas 2009 attempted bomber of Northwest Airline flight 253.[132] Imam al-Aulaki was killed on September 30, 2011 by an air attack carried out by the Joint Special Operations Command.[133]
Iraq
SAD paramilitary teams entered Iraq before the 2003 invasion. Once on the ground they prepared the battle space for the subsequent arrival of U.S. military forces. SAD teams then combined with U.S. Army special forces (on a team called the Northern Iraq Liaison Element or NILE).[17] This team organized the KurdishPeshmerga for the subsequent U.S. led invasion. This joint team combined in Operation Viking Hammer to defeat Ansar al-Islam, an Islamist group allied to al-Qaeda, which several battle-hardened fighters from Afghanistan had joined after the fall of the Taliban, in a battle for control over the northeast of Iraq – a battle that turned out being one of the “most intense battles of Special Forces since Vietnam”.[134] This battle was for an entire territory that was completely occupied by Ansar al-Islam and was executed prior to the invasion in February 2003. If this battle had not been as successful as it was, there would have been a considerable hostile force in the rear of the U.S./secular Kurdish force in the subsequent assault on the Iraqi army to the south. The U.S. side was represented by paramilitary operations officers from SAD/SOG and the army’s 10th Special Forces Group (10th SFG). 10th SFG soldiers were awarded three Silver Stars and six Bronze Stars with V for valor for this battle alone [135] and several paramilitary officers were awarded the Intelligence Star for valor in combat.[136] This battle was a significant direct attack and victory on a key U.S. opponent. It resulted in the deaths of a substantial number of militants and the uncovering of a crude laboratory that had traces of poisons and information on chemical weapons at Sargat.[17][137] The team found foreign identity cards, visas, and passports on the enemy bodies. They had come from a wide variety of Middle Eastern and north African countries including Yemen, Sudan, Saudi Arabia, Qatar, Oman, Tunisia, Morocco, and Iran.[135]Sargat was also the only facility that had traces of chemical weapons discovered in the Iraq war.[18][136][138]
The village of Biyara and Base of Ansar al-Islam 2001–2003
In a 2004 U.S. News & World Report article, “A firefight in the mountains”, the author states:
“Viking Hammer would go down in the annals of Special Forces history—a battle fought on foot, under sustained fire from an enemy lodged in the mountains, and with minimal artillery and air support.”[135]
SAD/SOG teams also conducted high risk special reconnaissance missions behind Iraqi lines to identify senior leadership targets. These missions led to the initial assassination attempts against Iraqi PresidentSaddam Hussein and his key generals. Although the initial air strike against Hussein was unsuccessful in killing the dictator, it was successful in effectively ending his ability to command and control his forces. Other strikes against key generals were successful and significantly degraded the command’s ability to react to and maneuver against the U.S.-led invasion force.[17][139] SAD operations officers were also successful in convincing key Iraqi army officers to surrender their units once the fighting started and/or not to oppose the invasion force.[18]
NATO member Turkey refused to allow its territory to be used by the U.S. Army’s 4th Infantry Division for the invasion. As a result, the SAD/SOG, U.S. Army special forces joint teams, the Kurdish Peshmerga and the 173d Airborne Brigade were the entire northern force against the Iraqi army during the invasion. Their efforts kept the 13 divisions of the Iraqi Army in place to defend against the Kurds rather allowing them to contest the coalition force coming from the south.[134] This combined U.S. special operations and Kurdish force defeated the Iraqi Army.[17] Four members of the SAD/SOG team received CIA’s rare Intelligence Star for “extraordinary heroism”.[18]
The mission that captured Saddam Hussein was called “Operation Red Dawn“. It was planned and carried out by JSOC’s Delta Force and SAD/SOG teams (together called Task Force 121). The operation eventually included around 600 soldiers from the 1st Brigade of the 4th Infantry Division.[140][141] Special operations troops probably numbered around 40. Much of the publicity and credit for the capture went to the 4th Infantry Division soldiers, but CIA and JSOC were the driving force. “Task Force 121 were actually the ones who pulled Saddam out of the hole” said Robert Andrews, former deputy assistant Secretary of Defense for special operations and low-intensity conflict. “They can’t be denied a role anymore.”[140]
CIA paramilitary units continued to team up with the JSOC in Iraq and in 2007 the combination created a lethal force many credit with having a major impact in the success of “the Surge“. They did this by killing or capturing many of the key al-Qaeda leaders in Iraq.[142][143] In a CBS60 Minutes interview, Pulitzer Prize-winning journalist Bob Woodward described a new special operations capability that allowed for this success. This capability was developed by the joint teams of CIA and JSOC.[144] Several senior U.S. officials stated that the “joint efforts of JSOC and CIA paramilitary units was the most significant contributor to the defeat of al-Qaeda in Iraq”.[142][145]
In May 2007, Marine Major Douglas A. Zembiec was serving in SAD Ground Branch in Iraq when he was killed by small arms fire while leading a raid.[146][147]Reports from fellow paramilitary officers stated that the flash radio report sent was “five wounded and one martyred”[148] Major Zembiec was killed while saving his soldiers, Iraqi soldiers. He was honored with an intelligence star for his valor in combat.[149]
On October 26, 2008, SAD/SOG and JSOC conducted an operation in Syria targeting the “foreign fighter logistics network” bringing al-Qaeda operatives into Iraq (See 2008 Abu Kamal raid).[150] A U.S. source told CBS News that “the leader of the foreign fighters, an al-Qaeda officer, was the target of Sunday’s cross-border raid.” He said the attack was successful, but did not say whether or not the al-Qaeda officer was killed.[151]Fox News later reported that Abu Ghadiya, “al-Qa’ida’s senior coordinator operating in Syria”, was killed in the attack.[152]The New York Times reported that during the raid U.S. forces killed several armed males who “posed a threat”.[153]
In September 2014 with the rise of the Islamic State, the U.S. government began aggressive military operations against them in both Iraq and Syria. SAD Ground Branch was placed in charge of the ground war.[154] This is a testament to SAD being the preeminent force for unconventional warfare and their long-standing relationship with the most effective fighting force in the region, the Kurdish Peshmerga.[155]
SAD/SOG has been very active “on the ground” inside Pakistan targeting al-Qaeda operatives for Unmanned Aerial Vehicle (UAV) Predator strikes and along with USSOCOM elements they have been training Pakistani Special Service Group Commandos.[156] Before leaving office, President George W. Bush authorized SAD’s successful killing of eight senior al-Qaeda operatives via targeted air strikes.[157] Among those killed were the mastermind of a 2006 plot to detonate explosives aboard planes flying across the Atlantic Rashid Rauf and the man thought to have planned the Islamabad Marriott Hotel bombing on September 20, 2008 that killed 53 people.[158][159] The CIA Director authorized the continuation of these operations and on January 23, SAD/SOG performed killings of 20 individuals in northwestern Pakistan that were terrorists. Some experts assess that the CIA Director – at that time Leon Panetta – has been more aggressive in conducting paramilitary operations in Pakistan than his predecessor.[160] A Pakistani security official stated that other strikes killed at least 10 insurgents, including five foreign nationals and possibly “a high-value target” such as a senior al-Qaeda or Taliban official.[161] On February 14, the CIA drone killed 27 taliban and al-Qaeda fighters in a missile strike in south Waziristan, a militant stronghold near the Afghan border where al-Qaeda leaders Osama bin Laden and Ayman al-Zawahri were believed to be hiding.[162]
According to the documentary film Drone, by Tonje Schei, since 2002 the U.S. Air Force17th Reconnaissance Squadronhas been working for the CIA as “customer”, carrying out at least some of the armed missions in Pakistan.[163]
In a National Public Radio (NPR) report dated February 3, 2008, a senior official stated that al-Qaeda has been “decimated” by SAD/SOG’s air and ground operations. This senior U.S. counter-terrorism official goes on to say, “The enemy is really, really struggling. These attacks have produced the broadest, deepest and most rapid reduction in al-Qaida senior leadership that we’ve seen in several years.”[164] President Obama’s CIA Director Leon Panetta stated that SAD/SOG’s efforts in Pakistan have been “the most effective weapon” against senior al-Qaeda leadership.[165][166]
These covert attacks have increased significantly under President Obama, with as many at 50 al-Qaeda militants being killed in the month of May 2009 alone.[167][168][169] In June 2009, sixty Taliban fighters were killed while at a funeral to bury fighters that had been killed in previous CIA attacks.[170] On July 22, 2009, National Public Radio reported that U.S. officials believeSaad bin Laden, a son of Osama bin Laden, was killed by a CIA strike in Pakistan. Saad bin Laden spent years under house arrest in Iran before traveling last year to Pakistan, according to former National Intelligence Director Mike McConnell. It’s believed he was killed sometime in 2009. A senior U.S. counter-terrorism said U.S. intelligence agencies are “80 to 85 percent” certain that Saad bin Laden is dead.[171]
On August 6, 2009, the CIA announced that Baitullah Mehsud was killed by a SAD/SOG drone strike in Pakistan.[172]The New York Times said, “Although President Obama has distanced himself from many of the Bush administration’s counter-terrorism policies, he has embraced and even expanded the C.I.A.’s covert campaign in Pakistan using Predator and Reaper drones”.[172] The biggest loss may be to “Osama bin Laden’s al-Qa’ida”. For the past eight years, al-Qaeda had depended on Mehsud for protection after Mullah Mohammed Omar fled Afghanistan in late 2001. “Mehsud’s death means the tent sheltering Al Qaeda has collapsed,” an Afghan Taliban intelligence officer who had met Mehsud many times told Newsweek. “Without a doubt he was Al Qaeda’s No. 1 guy in Pakistan,” adds Mahmood Shah, a retired Pakistani Army brigadier and a former chief of the Federally Administered Tribal Area, or FATA, Mehsud’s base.[173]
Airstrikes from CIA drones struck targets in the Federally Administered Tribal Areas (FATA) of Pakistan on September 8, 2009. Reports stated that seven to ten militants were killed to include one top al-Qaida leaders. He was Mustafa al-Jaziri, an Algerian national described as an “important and effective” leader and senior military commander for al-Qaida. The success of these operations are believed to have caused senior Taliban leaders to significantly alter their operations and cancel key planning meetings.[174][175]
The CIA is also increasing its campaign using Predator missile strikes on al-Qaeda in Pakistan. The number of strikes in 2009 exceeded the 2008 total, according to data compiled by the Long War Journal, which tracks strikes in Pakistan.[108] In December 2009, the New York Times reported that President Obama ordered an expansion of the drone program with senior officials describing the program as “a resounding success, eliminating key terrorists and throwing their operations into disarray”.[176] The article also cites a Pakistani official who stated that about 80 missile attacks in less than two years have killed “more than 400” enemy fighters, a number lower than most estimates but in the same range. His account of collateral damage was strikingly lower than many unofficial counts: “We believe the number of civilian casualties is just over 20, and those were people who were either at the side of major terrorists or were at facilities used by terrorists.”[176]
On December 6, 2009, a senior al-Qaeda operative, Saleh al-Somali, was killed in a drone strike in Pakistan. He was responsible for their operations outside of the Afghanistan-Pakistan region and formed part of the senior leadership. Al-Somali was engaged in plotting terrorist acts around the world and “given his central role, this probably included plotting attacks against the United States and Europe”.[177][178] On December 31, 2009, senior Taliban leader and strong Haqqani ally Haji Omar Khan, brother of Arif Khan, was killed in the strike along with the son of local tribal leader Karim Khan.[179]
In January 2010, al-Qaeda in Pakistan announced that Lashkar al-Zil leader Abdullah Said al Libi was killed in a drone missile strike. Neither al-Qaeda nor the US has revealed the date of the attack that killed Libi.[180] On January 14, 2010, subsequent to the suicide attack at Camp Chapman, the CIA located and killed the senior Taliban leader in Pakistan, Hakimullah Mehsud. Mehsud had claimed responsibility in a video he made with the suicide bomber Humam Khalil Abu-Mulal al-Balawi.[181]
On February 5, 2010, the Pakistani Inter-Services Intelligence (ISI) and CIA’s SAD/SOG conducted a joint raid and apprehended Mullah Abdul Ghani Baradar. Baradar was the most significant Taliban figure to be detained since the beginning of the Afghan War more than eight years ago until that date. He ranked second to Mullah Muhammad Omar, the Taliban’s founder and was known to be a close associate of Osama bin Laden. Mullah Baradar was interrogated by CIA and ISI officers for several days before news of his capture was released.[182] This capture sent the message that the Taliban leadership is not safe in Afghanistan or Pakistan.[183] “The seizure of the Afghan Taliban’s top military leader in Pakistan represents a turning point in the U.S.-led war against the militants”, U.S. officials and analysts said.[184] Per Pakistani Interior Minister Rehman Malik, several raids in Karachi in early February netted dozens of suspected Afghan militants.[184] In other joint raids that occurred around the same time, Afghan officials said that the Taliban “shadow governorsP for two provinces in northern Afghanistan had also been detained. Mullah Abdul Salam, the Taliban’s leader in Kunduz, and Mullah Mir Mohammed of Baghlan were captured in Akora Khattack.[185]
On February 20, Muhammad Haqqani, son of Jalaluddin Haqqani, was one of four people killed in the drone strike in Pakistan’s tribal region in North Waziristan, according to two Pakistani intelligence sources.[186]
On May 31, 2010, the New York Times reported that Mustafa Abu al Yazid (AKA Saeed al Masri), a senior operational leader for Al Qaeda, was killed in an American missile strike in Pakistan’s tribal areas.[187]
From July to December 2010, predator strikes killed 535 suspected militants in the FATA to include Sheikh Fateh Al Misri, Al-Qaeda’s new third in command on September 25.[188] Al Misri was planning a major terrorist attack in Europe by recruiting British Muslims who would then go on a shooting rampage similar to what transpired in Mumbai in November 2008.[189]
The operation in the Bilal military cantonment area in the city of Abbottabad resulted in the acquisition of extensive intelligence on the future attack plans of al-Qaeda.[194][195][196] The body of bin Laden was flown to Afghanistan to be identified and then out to the USS Carl Vinson for a burial at sea.[197] DNA from bin Laden’s body, compared with DNA samples on record from his dead sister, confirmed his identity.
The operation was a result of years of intelligence work that included the Inter-Services Intelligence (ISI), the CIA, the DSS, and the Delta Force‘s, apprehension and interrogation of Khalid Sheik Mohammad (KSM),[198][199][200] the discovery of the real name of the courier disclosed by KSM, the tracking, via signal intelligence, of the courier to the Abbottobad compound by paramilitary operatives and the establishment of a CIA safe house that provided critical advance intelligence for the operation.[201][202][203][203]
The material discovered in the raid indicated that bin Laden was still in charge of his Al-Qaeda organization and was developing plans and issuing orders at the time of his death. There is considerable controversy over claims that elements of the Pakistani government, particularly the ISI, may have been concealing the presence of Osama bin Laden in Pakistan.[204][205][206] Bin Laden’s death has been labeled a “game changer” and a fatal blow to Al-Qaeda, by senior U.S. officials.[207]
Iran
In the early 1950s, the Central Intelligence Agency and Britain’s Secret Intelligence Service were ordered to overthrow the government of Iran, Prime MinisterMohammed Mosaddeq, and re-install deposed ShahMohammad Reza Pahlavi.[208] This event was called Operation Ajax.[209][210] The senior CIA officer was Kermit Roosevelt, Jr., the grandson of American president Theodore Roosevelt. The operation utilized all of SAD’s components to include political action, covert influence and paramilitary operations. The paramilitary component included training anti-Communist guerrillas to fight the Tudeh Party if they seized power in the chaos of Operation Ajax.[211] Although a significant tactical/operational success, Operation Ajax is considered very controversial with many critics.[212]
On March 9, 2007 alleged CIA Agent Robert Levinson was kidnapped from Iran’s Kish Island. On July 7, 2008, Pulitzer Prize winning investigative journalist and author Seymour Hersh wrote an article in the New Yorker stating that the Bush Administration had signed a Presidential Finding authorizing the CIA to begin cross border paramilitary operations from Iraq and Afghanistan into Iran. These operations would be against Quds Force, the commando arm of the Iranian Revolutionary Guard, public and private sector strategic targets, and “high-value targets” in the war on terror. Also enrolled to support CIA objectives were the Mujahideen-e-Khalq, known in the West as the M.E.K.,and the Baluchis insurgents. “The Finding was focused on undermining Iran’s nuclear ambitions and trying to undermine the government through regime change,” a person familiar with its contents said, and involved “working with opposition groups and passing money.”[215] Any significant effort against Iran by the Obama Administration would likely come directly from SAD.[216] and in July 2010, Director Panetta chose a former chief of SAD as the new NCS Director.[217]
Libya
After the Arab Spring movements overthrew the rulers of Tunisia and Egypt, its neighbours to the west and east respectively, Libya had a major revolt beginning in February 2011.[218][219] In response, the Obama administration sent in SAD paramilitary operatives to assess the situation and gather information on the opposition forces.[220][221] Experts speculated that these teams could be determining the capability of these forces to defeat the Muammar Gaddafi regime and whether Al-Qaeda had a presence in these rebel elements.
U.S. officials had made it clear that no U.S. troops would be “on the ground”, making the use of covert paramilitary operatives the only alternative.[222] During the early phases of the Libyan offensive of U.S. led air strikes, paramilitary operatives assisted in the recovery of a U.S. Air Force pilot who had crashed due to mechanical problems.[223][224] There was speculation that President Obama issued a covert action finding in March 2011 that authorizes the CIA to carry out a clandestine effort to provide arms and support to the Libyan opposition.[225]
Syria
CIA paramilitary teams have been deployed to Syria to report on the uprising, to access the rebel groups, leadership and to potentially train, equip and lead one of those rebel groups against the Bashar al-Assad regime.[226] In early September 2013, President Obama told U.S. Senators that the CIA had trained the first 50-man insurgent element and that they had been inserted into Syria.[227] The deployment of this unit and the supplying of weapons may be the first tangible measure of support since the U.S. stated they would begin providing assistance to the opposition.[228][229]
In October 2013, SAD was tasked with overthrowing the Syrian government of Bashar al-Assad. This program was considered too limited to have the desired outcome.[230] However, with the rise of the Islamic State, SAD was given the overall command and control of the ground fight against them. This fight will cross the borders between Iraq and Syria.[154][231]
The CIA has always had a Special Activities Division, which secretly carries out special operations mission. However, since September 11, 2001 the US government has relied much more on SAD/SOG because fighting terrorists does not usually involve fighting other armies. Rather, it involves secretly moving in and out of countries like Pakistan, Iran and Somaliawhere the American military is not legally allowed to operate.[232]
If there are missions in these countries that are denied to U.S. military special operations forces, SAD/SOG units are the primary national special missions units to execute those operations.[233]
In the War on Terror, SAD has the lead in the covert war being waged against al Qaeda.[11][234] SAD/SOG paramilitary teams have apprehended many of the senior leaders. These include: Abu Zubaydah,[235] the chief of operations for al-Qaeda;Ramzi bin al-Shibh,[236] the so-called the “20th hijacker”;[237]Khalid Sheikh Mohammed, the mastermind of the September 11, 2001 attacks on New York City and Washington, D.C.;[238]Abd al-Rahim al-Nashiri, alleged to be the mastermind of theUSS Cole bombing and leader of al Qaeda operations in the Persian Gulf prior to his capture in November 2002;[239]Abu Faraj al-Libi, al Qaeda’s “field general” believed to have taken the role of No. 3 in al Qaeda following the capture of Khalid Sheikh Mohammed in Pakistan;[240] andMullah Abdul Ghani Baradar, the number two taliban commander and the highest level taliban commander apprehended in the Afghan War.[241] Prior to the beginning of the “War on Terror”, SAD/SOG located and captured many notable militants and international criminals, including Abimael Guzman and Carlos the Jackal. These were just three of the over 50 caught by SAD/SOG just between 1983 and 1995.[242]
In 2002, the George W. Bush Administration prepared a list of “terrorist leaders” the CIA is authorized to kill in a targeted killing, if capture is impractical and civilian casualties can be kept to an acceptable number. The list includes key al Qaeda leaders like Osama bin Laden (deceased) and his chief deputy, Ayman al-Zawahiri, as well as other principal figures from al Qaeda and affiliated groups. This list is called the “high value target list”.[243] The U.S. president is not legally required to approve each name added to the list, nor is the CIA required to obtain presidential approval for specific attacks, although the president is kept well informed about operations.[243]
SAD/SOG teams have been dispatched to the country of Georgia, where dozens of al Qaeda fugitives from Afghanistan are believed to have taken refuge withChechen separatists and thousands of refugees in the Pankisi Gorge. Their efforts have already resulted in 15 Arab militants linked to al Qaeda being captured.[125]
The SAD/SOG teams have also been active in the Philippines, where 1,200 U.S. military advisers helped to train local soldiers in “counter-terrorist operations” against Abu Sayyaf, a radical Islamist group suspected of ties with al Qaeda. Little is known about this U.S. covert action program, but some analysts believe that “the CIA’s paramilitary wing, the Special Activities Division (SAD), has been allowed to pursue terrorist suspects in the Philippines on the basis that its actions will never be acknowledged”.[125]
On July 14, 2009, several newspapers reported that DCIA Leon Panetta was briefed on a CIA program that had not been briefed to the oversight committees in Congress. Panetta cancelled the initiative and reported its existence to Congress and the President. The program consisted of teams of SAD paramilitary officers organized to execute targeted killing operations against al Qaeda operatives around the world in any country. According to the Los Angeles Times, DCIA Panetta “has not ruled out reviving the program”.[11] There is some question as to whether former Vice President Dick Cheney instructed the CIA not to inform Congress.[244]Per senior intelligence officers, this program was an attempt to avoid the civilian casualties that can occur during predator drone strikes using Hellfire missiles.[245][246]
According to many experts, the Obama administration has relied on the CIA and their paramilitary capabilities, even more than they have on U.S. military forces, to maintain the fight against terrorists in the Afghanistan and Pakistan region, as well as places like Yemen, Somalia and North Africa.[247][248] Ronald Kessler states in his book The CIA at War: Inside the Secret War Against Terror, that although paramilitary operations are a strain on resources, they’re winning the war against terrorism.[247][249]
SAD/SOG paramilitary officers executed the clandestine evacuation of U.S. citizens and diplomatic personnel in Somalia, Iraq (during the Persian Gulf War) andLiberia during periods of hostility, as well as the insertion of Paramilitary Operations Officers prior to the entry of U.S. military forces in every conflict since World War II.[250] SAD officers have operated covertly since 1947 in places such as North Korea, Vietnam, Laos, Cambodia, Lebanon, Iran, Syria, Libya, Iraq, El Salvador,Guatemala, Colombia, Mexico, Nicaragua, Honduras, Chile, Bosnia and Herzegovina, Serbia, Somalia, Kosovo, Afghanistan and Pakistan.[251]
The Fulton surface-to-air recovery system (STARS) is a system developed in the early 1950s by CIA paramilitary officers for retrieving persons on the ground from a MC-130E Combat Talon I aircraft. It uses a harness and a self-inflating balloon that carries an attached lift line. An MC-130E engages the line with its V-shaped yoke and the individual is reeled on board.[252]Project COLDFEET was a very successful mission in 1962 in which two military officers parachuted into a remote abandoned Soviet site in the Arctic. The two were subsequently extracted by the Fulton sky hook. The team gathered evidence of advanced research on acoustical systems to detect under-ice US submarines and efforts to develop Arctic anti-submarine warfare techniques.[253]
Sergeant Major (SgtMaj) Billy Waugh was a Special Forces soldier attached to CIA in the 1960s. During his time at MACV-SOG in Vietnam, he developed and conducted the first combat High Altitude-Low Opening (HALO) jump, “In October 1970, my team made a practice Combat Infiltration into the NVA owned War Zone D, in South Vietnam, for reassembly training, etc. This was the first one in a combat zone.”[254] HALO is a method of delivering personnel, equipment, and supplies from a transport aircraft at a high altitude via free-fall parachute insertion. HALO andHAHO (High Altitude-High Opening) are also known as Military Free Fall (MFF). In the HALO technique, the parachutist opens his parachute at a low altitude after free-falling for a period of time to avoid detection by the enemy. Waugh also led the last combat special reconnaissance parachute insertion into enemy territory occupied by communist North Vietnamese Army (NVA) troops on June 22, 1971.[255]
On October 25, 2003, paramilitary officers Christopher Mueller and William “Chief” Carlson were killed while conducting an operation to kill/capture high level al-Qa’ida leaders near Shkin, Afghanistan. Both these officers were honored with Stars on the CIA Memorial Wall at their Headquarters in Langley, Virginia.[256] “The bravery of these two men cannot be overstated,” Director of Central Intelligence George J. Tenet told a gathering of several hundred Agency employees and family members. “Chris and Chief put the lives of others ahead of their own. That is heroism defined.” Mueller, a former US Navy SEAL and Carlson, a former Army Special Forces soldier, Delta Force operator, and member of the Blackfeet Nation in Montana, died while on this covert operation. Both officers saved the lives of others, including Afghan soldiers, during the engagement with al-Qa’ida forces.[256][257][258] In Oliver North’s book American Heroes in Special Operations, a chapter is devoted to their story.[259]
Notable political action officers
Virginia Hall Goillot started as the only female paramilitary officer in the OSS. She shot herself in the leg while hunting in Turkey in 1932, which was then amputated below the knee. She parachuted into France to organize the resistance with her prosthesis strapped to her body. She was awarded theDistinguished Service Cross. She married an OSS officer named Paul Goillot and the two joined the CIA as paramilitary operations officers in SAD. Once aboard, Mrs. Goillot made her mark as a political action officer playing significant roles in the Guatemala and Guyana operations. These operations involved the covert removal of the governments of these two countries, as directed by the President of the United States.[260]
E. Howard Hunt (October 9, 1918 – January 23, 2007) was an Ivy league educated Naval officer who joined the CIA in 1949 after serving with the OSS in World War II. Hunt was a political action officer in what came to be called their Special Activities Division.[261] He became station chief in Mexico City in 1950, and supervised William F. Buckley, Jr., (Not to be confused with a famous SAD Paramilitary Officer of the same name) who worked for the CIA in Mexico during the period 1951–1952. Buckley, another SAD political action specialist, only served briefly in the CIA and went on to be considered the father of the modern American conservative movement. Buckley and Hunt remained lifelong friends.[262] Hunt ran Operation PBSUCCESS, which overthrew the government in Guatemala in 1954, was heavily involved in theBay of Pigs Invasion operation, frequently mentioned in the JFK assassination, and was one of the operatives in the Watergate scandal.[263]Hunt was also a well-known author with over 50 books to his credit. These books were published under several alias names and several were made into motion pictures.[264]
David Atlee Phillips Perhaps the most famous propaganda officer ever to serve in CIA, Phillips began his career as a journalist and amateur actor in Buenos Aires, Argentina. He joined the Agency in the 1950s and was one of the chief architects of the operation to overthrow Communist president Arbenz in Guatemala in 1954. He was later heavily engaged as a principal member of the Bay of Pigs Task Force at Langley, and in subsequent anti-Castro operations throughout the 1960s. He founded the Association of Former Intelligence Officers (AFIO) after successfully contesting a libel suit against him.
The CIA Memorial Wall is located at CIA headquarters in Langley, Virginia. It honors CIA employees who died in the line of duty.[265] As of August 6, 2012, there were 103 stars carved into the marble wall,[266] each one representing an officer. A majority of these were paramilitary officers.[265] A black book, called the “Book of Honor”, lies beneath the stars and is encased in an inch-thick plate of glass.[266] Inside this book are stars, arranged by year of death, and the names of 77 employees who died in CIA service alongside them.[265][266] The other names remain secret, even in death.[265]
For the United States, Article One, Section Eight of the Constitution says “Congress shall have power to … declare War”. However, that passage provides no specific format for what form legislation must have in order to be considered a “declaration of war” nor does the Constitution itself use this term. Many[who?] have postulated “Declaration(s) of War” must contain that phrase as or within the title. Others oppose that reasoning. In the courts, the United States Court of Appeals for the First Circuit, in Doe v. Bush, said: “[T]he text of the October Resolution itself spells out justifications for a war and frames itself as an ‘authorization’ of such a war.”[1] in effect saying an authorization suffices for declaration and what some may view as a formal Congressional “Declaration of War” was not required by the Constitution.
This article will use the term “formal declaration of war” to mean Congressional legislation that uses the phrase “declaration of war” in the title. Elsewhere, this article will use the terms “authorized by Congress”, “funded by Congress” or “undeclared war” to describe other such conflicts.
History
The United States has formally declared war against foreign nations five separate times, each upon prior request by the President of the United States. Four of those five declarations came after hostilities had begun.[2] James Madison reported that in the Federal Convention of 1787, the phrase “make war” was changed to “declare war” in order to leave to the Executive the power to repel sudden attacks but not to commence war without the explicit approval of Congress.[3] Debate continues as to the legal extent of the President’s authority in this regard.
After Congress repealed the Gulf of Tonkin Resolution in January 1971 and President Richard Nixon continued to wage war in Vietnam, Congress passed the War Powers Resolution (Pub.L. 93–148) over the veto of Nixon in an attempt to rein in some of the president’s claimed powers. The War Powers Resolution proscribes the only power of the president to wage war which is recognized by Congress.
Declarations of war
Formal
The table below lists the five wars in which the United States has formally declared war against eleven foreign nations.[4] The only country against which the United States has declared war more than once is Germany, against which the United States has declared war twice (though a case could be made for Hungary as asuccessor state to Austria-Hungary).
Force withdrawn after six months. However, the Joint Resolution was likely used to authorize the Pancho Villa Expedition. In the Senate, “when word reached the Senate that the invasion had gone forward before the use-of-force resolution had been approved, Republicans reacted angrily” saying it was a violation of the Constitution, but eventually after the action had already started, a resolution was passed after the action to “justify” it since Senators did not think it was a declaration of war.[13][14]
Ba’athist Iraqi government deposed April 2003. U.S. combat operations ended August 31, 2010. War ended December 15, 2011. Destabilization of Iraq and emergence of ISIL in the region 2011–present.[18]
Military engagements authorized by United Nations Security Council Resolutions and funded by Congress
In many instances, the United States has engaged in extended military engagements that were authorized by United Nations Security Council Resolutions and funded by appropriations from Congress.
On at least 125 occasions, the President has acted without prior express military authorization from Congress.[20] These include instances in which the United States fought in the Philippine–American War from 1898–1903, in Nicaragua in 1927, as well as the NATO bombing campaign of Yugoslavia in 1999.
The United States’ longest war was fought between approximately 1840 and 1886 against the Apache Nation. During that entire 46-year period, there was never more than 90 days of peace.[citation needed]
The Indian Wars comprise at least 28 conflicts and engagements. These localized conflicts, with Native Americans, began with European colonists coming to North America, long before the establishment of the United States. For the purpose of this discussion, the Indian Wars are defined as conflicts with the United States of America. They begin as one front in the American Revolutionary War in 1775 and had concluded by 1918. The United States Army still maintains a campaign streamer for Pine Ridge 1890–1891 despite opposition from certain Native American groups.[21]
The American Civil War was not an international conflict under the laws of war, because the Confederate States of America was not a government that had been granted full diplomatic recognition as a sovereign nation by other sovereign states.[22][23] The CSA was recognized by the United States government as a belligerent power, a different status of recognition that authorized Confederate warships to visit non-U.S. ports. This recognition of the CSA’s status as a belligerent power did not impose any duty upon the United States to recognize the sovereignty of the Confederacy, and the United States never did so.
The War Powers Resolution
In 1973, following the withdrawal of most American troops from the Vietnam War, a debate emerged about the extent of presidential power in deploying troops without a declaration of war. A compromise in the debate was reached with the War Powers Resolution. This act clearly defined how many soldiers could be deployed by the President of the United States and for how long. It also required formal reports by the President to Congress regarding the status of such deployments, and limited the total amount of time that American forces could be deployed without a formal declaration of war.
Although the constitutionality of the act has never been tested, it is usually followed, most notably during the Grenada Conflict, the Panamanian Conflict, the Somalia Conflict, the Persian Gulf War, and the Iraq War[clarification needed]. The only exception was President Clinton’s use of U.S. troops in the 78-day NATO air campaign against Yugoslavia during the Kosovo War.[citation needed] In all other cases, the President asserted the constitutional authority to commit troops without the necessity of Congressional approval, but in each case the President received Congressional authorization that satisfied the provisions of the War Powers Act.
On March 21, 2011, a number of lawmakers expressed concern that the decision of President Barack Obama to order the U.S. military to join in attacks of Libyan air defenses and government forces exceeded his constitutional authority because the decision to authorize the attack was made without Congressional permission.[24]
Jump up^Whereas the Government of Germany has formally declared war against the government and the people of the United States of America… the state of war between the United States and the Government of Germany which has thus been thrust upon the United States is hereby formally declared. The War Resolution
SOG considered the most secretive special operations force in America
The Special Activities Division (SAD) is a division in the U.S. Central Intelligence Agency‘s (CIA) National Clandestine Service (NCS) responsible for covert operations known as “special activities”. Within SAD there are two groups, one for tactical paramilitary operations and another for covert political action.
The “Political Action Group” within SAD is in charge of “covert activities” related to political influence, psychological, economic and cyber warfare A large CIA covert operation usually has components that involve many of these categories, as well as paramilitary operations.
Special Operations Group (SOG) is the department within SAD responsible for operations which include the gathering of intelligence information in hostile enemy countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be associated.
As such, members of the unit (called “Paramilitary Operations Officers” and “Specialized Skills Officers”) normally do not carry any objects, identification or clothing (e.g., military uniforms) that would associate them with the United States government (see article: Secret CIA Units Playing a Central Combat Role http://www.washingtonpost.com/wp-srv/politics/CIA18.html).
If members are compromised or killed during a mission, the government of the United States may deny all knowledge (see Congressional Research Service report: Special Operations Forces (SOF) and CIA Paramilitary Operations: Issues for Congresshttp://www.fas.org/sgp/crs/intel/RS22017.pdf ).
The SOG is considered the most secretive special operations force in the United States.
Joe Biden Not Running For President: 2016 Window Has ‘Closed’ | MSNBC
Lyndon Johnson – Remarks on Decision to not seek Reelection
The Daily Wrap | Trump Continues To Surge In Polls
Dr Ben Carson reacts to surging ahead of Trump in new poll
Howard Kurtz: Paul Ryan, Insufficiently Conservative?
Ann Coulter: RINO Speaker Candidates And Illegal Aliens
House Divided – Will Conservatives Accept Paul Ryan as Speaker of the House?
Mark Levin Blasts Paul Ryan On Immigration: “I’ve Had Enough Of This Crap!”
Paul Ryan: The Man Who Would be King
Pro-Amnesty Rep. Gutiérrez Supports Paul Ryan For Speaker Of The House
Paul Ryan on Immigration Reform
Ben Swann vs Paul Ryan – Reality Check: Paul Ryan is Actually a Big Spender Just Like Mitt Romney
Paul Ryan The Conservative Sold Out
Tom Woods: Is Paul Ryan a real fiscal conservative?
Donald Trump Leads in Expectations, Shows Strength on Attributes (POLL)
By JULIE PHELAN
Donald Trump leads the Republican presidential field in the latest ABC News/Washington Post poll, not only in vote preferences but in expectations as well -– a remarkable feat for the non-politician who’s surprised the GOP establishment with his staying power as well as his support.Trump has leveled off with backing from 32 percent of Republicans and Republican-leaning independents who are registered to vote, easily enough to retain his frontrunner status. Fellow outsider Ben Carson follows with 22 percent, also flat this month after sharp summertime gains.Notably, even more leaned Republicans — 42 percent — say they expect Trump to win the GOP nomination for president. And given a list of six potential nominees, 43 percent pick Trump as having the best chance to win the general election just more than a year from now.See PDF with full results here.
Trump also fares well on many key attributes. Nearly half of leaned Republicans — 47 percent — view him as the strongest leader; 39 percent think he’d be best able to handle immigration; 32 percent feel he is closest to them on the issues; and 29 percent say he “best understands the problems of people like you.” In each case he leads the other top-five contenders for the nomination, Carson, Marco Rubio, Jeb Bush, Ted Cruz and Carly Fiorina.
Trump has weaknesses nonetheless. More view Carson as the most honest and trustworthy (33 percent vs. 21 percent for Trump), and Trump trails Bush in having the best experience (31 vs. 23 percent). While 19 percent say Trump has the best personality and temperament to serve effectively as president, that compares with a similar 24 percent for Carson.
Trump and Bush are particularly weak in another measure in this poll, produced for ABC byLanger Research Associates. Roughly equal numbers of leaned Republicans say the more they hear about Trump the less they like him, compared with liking him more, 45 vs. 47 percent. Albeit not a statistically significant result, Bush goes numerically underwater in this gauge, 47-41 percent.
Compare that to Carson: Sixty-four percent say as they hear more about him they like him more, vs. just 18 percent who like him less, a vast 46-point net positive. Scores for Rubio, Fiorina and Cruz also are net positive on this measure by 23, 17 and 8 points, respectively.
Horserace
For all the campaigning under way, the overall race for the GOP nomination looks to be on pause, with essentially no change in candidate support since last month. That reflects a loss of momentum for Trump and Carson alike. Still, among their opponents only Rubio cracks the double digits, and just barely, with 10 percent.
In addition to his appeal to anti-immigration Republicans, Trump’s candidacy is very much bolstered by desire in the party for a political outsider. Republicans and Republican-leaning independents by 57-39 percent say they’re looking for someone from outside the political establishment rather than someone with political experience – drastically different from the 21-76 percent division on this issue among leaned Democrats. And Trump wins 41 percent support from registered leaned Republicans looking for an outsider, vs. 18 percent from those who prefer political experience.
Trump also continues to garner greater support among less educated potential voters -– 46 percent among those who haven’t gone beyond high school, vs. 23 percent among those who’ve attended college. And he’s still more popular among men than women, with 37 vs. 27 percent. Indeed white men without a college degree (leaned Republicans overwhelmingly are white) are among his strongest groups in voter preference and on issues and attributes alike.
Trump also does particularly well among leaned Republicans who oppose the Trans-Pacific Partnership, a trade agreement he, too, opposes. He’s backed by 45 percent of its critics vs. 21 percent of its supporters.
Further, Trump is maintaining his support among groups where it might not be expected -– for example, he’s backed by a third of evangelical white Protestants, “very” conservative leaned Republicans and Southerners alike. He has 36 percent support in non-urban areas, vs. 24 percent in cities.
Groups
These results also are reflected in perceptions of candidate attributes. Men, those with less education, those who prefer a political outsider and opponents of the Trans-Pacific Partnership generally are more apt to rate Trump positively.
In one potential trouble spot for Trump, very conservative Republicans –- a key GOP group –- are less likely than “somewhat” conservatives to view him as the strongest leader of the lot, although he leads on this attribute in both groups, picked as strongest leader by 40 percent of strong conservatives and 52 percent of somewhat conservatives.
Additionally, just 14 percent of very conservatives think Trump’s the most honest and trustworthy; 40 percent say it’s Carson. And while very conservative leaned Republicans say by 53-35 percent that the more they hear about Trump the more they like him, that swells to 78-10 percent for Carson.
Methodology
This ABC News/Washington Post poll was conducted by landline and cellular telephone Oct. 15-18, 2015, in English and Spanish, among a random national sample of 1,001 adults, including 423 leaned Republicans. Results have a margin of sampling error of 3.5 points for the full sample and 5.5 points for leaned Republicans, including the survey’s design effect. Partisan divisions are 30-24-39 percent, Democrats-Republicans-independents.
The survey was produced for ABC News by Langer Research Associates of New York, N.Y., with sampling, data collection and tabulation by Abt-SRBI of New York, N.Y. See details on the survey’s methodology here.
Get real-time updates as this story unfolds. To start, just “star” this story in ABC News’ phone app. Download ABC News for iPhone here or ABC News for Android here.
Paul Ryan’s bid for House speaker splinters conservative Freedom Caucus
Lisa Mascaro
e conditions that Rep. Paul Ryan has set to become the next House speaker are driving a wedge in the fiery House Freedom Caucus, potentially weakening the unity of the conservative group that pushed out the current speaker.
Conservatives appear torn over the offer posed Tuesday by Ryan, the popular Wisconsin Republican, who has given his GOP colleagues until Friday to decide whether they are willing to end their infighting and unite around him.
The Freedom Caucus has so far maintained powerful cohesion as a 40-plus bloc of votes — a force that nudged Speaker John A. Boehner’s early retirement and then blocked the rise of Majority Leader Kevin McCarthy (R-Bakersfield). But that unity is showing signs of fraying.
Some members of the caucus said Ryan’s bid for speaker offered a compelling solution to the GOP’s leadership struggle. Others, though, appeared unwilling to yield to Ryan’s various conditions — a position amplified by conservative groups outside the Capitol.
Signs of division inside the caucus were already apparent.
Two lawmakers recently exited the group; one, California Rep. Tom McClintock, among the most conservative Republicans in the House, detailed the caucus’ “many missteps that have made it counterproductive to its stated goals.”
Deepening the wedge in the influential conservative caucus may become central to finding a new GOP speaker who can lead the divided majority and end the cycle of dysfunction that is damaging the party’s standing with voters ahead the 2016 presidential election.
On the other hand, if the Freedom Caucus unites against Ryan or withholds enough votes it would almost certainly prolong the chaotic leadership struggle.
“Listen, I think Paul is going to get the support he’s looking for,” Boehner said Wednesday after a closed-door party meeting. “But this decision is up to the members.”
Ryan, the party’s former vice presidential nominee, has said he is willing to take on the job to replace Boehner if the House majority’s three main factions pledge support.
His chief obstacle remains the Freedom Caucus, which had thrown its support to one of its own, a little known newcomer, Rep. Daniel Webster (R-Fla.).
With party elections set for Oct. 28, Ryan — like Boehner and McCarthy – would be expected to easily win a majority from within the House GOP. But the challenge will come the next day, when a full House floor vote poses a less certain outcome if all Republicans do not unite against Democrats.
Even if Ryan does not win the official support of the Freedom Caucus, he may be able to peel away enough votes to assure success, and some caucus members are already voicing support for him.
“We’re not a monolithic group by any stretch,” said Rep. Mick Mulvaney (R-S.C.), a leader of the Freedom Caucus, who warned that it may be difficult for the group to change its endorsement. “So the fact we have a difference of opinion amongst the various members is not at all unusual.”
Rep. Cynthia Lummis (R-Wyo.), a Freedom Caucus member who backed Rep. Jason Chaffetz (R-Utah) for speaker rather Webster, was leaning toward Ryan. Chaffetz dropped out of the running Tuesday and threw his support to Ryan.
“I’m not sure that Paul Ryan could walk on water today,” Lummis said after hearing his pitch, “but give him 10 days.”
Outside conservative groups, though, have already turned against Ryan and revved up their attacks.
And Republican voters appear to be in a fighting mood. Polling released Wednesday showed they want a new speaker who is not quick to compromise. Among GOP voters, 62% prefer a speaker who sticks to conservative principles, even if that leads to a government shutdown, according to the Associated Press-GfK poll.
Although Ryan is willing to consider some of the rules changes conservatives want to weaken the speaker’s grip on power, he has several demands of his own that the Freedom Caucus is hesitant to support.
Top among them is making it harder for conservatives to deploy one of their most powerful tools: calling a procedural vote to oust the speaker, which led to Boehner’s early retirement and warned McCarthy off the job.
Ryan told fellow Republicans he was willing to take “arrows in the chest, but not in the back,” according to those familiar with his remarks to the private meeting Tuesday evening.
That will be a tough sell for conservatives who see the motion to “vacate the chair” as the strongest leverage they have over the leadership.
Some changes, such as raising the threshold for bringing such a motion to the floor or approving it, could be acceptable.
Conservative radio talk show host Laura Ingraham raised particular objection over Ryan’s condition that he wouldn’t travel as much for the party as Boehner had so that he could spend more time at home with his family.
“George Washington left the luxury and beauty of Mount Vernon for Valley Forge,” she tweeted, referring to the Washington’s role in the Revolutionary War. “He even worked wkends & morning workouts for his people.”
The Freedom Caucus held a private meeting with Ryan later Wednesday. The group, which includes newer members of Congress as well as more veteran conservatives, is guided by internal rules that require 80% support to endorse a candidate, which Webster was able to win.
But the endorsement of Webster was binding only through the internal party election, meaning lawmakers in the group would be free to vote as they wish on the floor.
Ryan had indicated to his colleagues that he wanted the support from all three caucuses — the Freedom Caucus, the conservative Republican Study Committee and a small moderate GOP wing.
It’s unlikely that Ryan will settle for a promise that the Freedom Caucus will support him during the floor vote if it keeps its previous endorsement for his rival. A Ryan aide said he wants the full caucus’ formal endorsement now.
Paul Ryan is still talking to conservatives about supporting his speaker bid
Erin Kelly and Deirdre Shegreen
Rep. Paul Ryan has apparently not yet been able to secure the support of House conservatives for his bid for speaker, despite the confident assertion by the man he hopes to succeed that Ryan will be able to unite the fractious Republican conference.
“I think Paul is going to get the support that he is looking for,” speaker John Boehner told reporters Wednesday after a meeting of House Republicans. Boehner announced that Republicans will choose a new speaker next week, voting in conference next Wednesday to pick their nominee and on the House floor next Thursday.
But after an hour-long meeting with the rebellious Freedom Caucus Wednesday, Ryan shrugged off questions about whether he had won the group’s endorsement. “We had a nice meeting, a good chat,” Ryan said. Asked if he got a commitment, he said, “we just had an exchange of ideas” and a conversation about “how to make Congress work better.”
Members of the Freedom Caucus said they planned to meet again Wednesday night to talk about Ryan’s bid.
“We’re not done yet,” said Rep. Tim Huelskamp, R-Kan. “Everything’s still being discussed.”
Ryan announced Tuesday night that he will run for the top leadership job if he gets the support of all GOP factions. The Wisconsin Republican gave his colleagues until Friday to decide whether they can support him. Ryan, chairman of the Ways and Means Committee and the 2012 Republican nominee for vice president, had repeatedly said he did not want the job but was pressed to run by Republicans who see him as the best candidate to unite the GOP conference.
“We as a conference should unify now,” Ryan told reporters Tuesday night after meeting with his Republican colleagues. “What I told members is if you can agree to these requests and if I can truly be a unifying figure, then I will gladly serve, and if I am not unifying, that is fine as well — I will be happy to stay where I am.”
Rep. Paul Ryan will run for House speaker if GOP factions endorse him
The Freedom Caucus, a group of about 40 conservative members, has been the most nettlesome. The group helped force Boehner into retirement by threatening to call a no-confidence vote on his speakership. Boehner plans to leave Congress at the end of next week, assuming that House members have elected a new speaker.
The influential group also convinced Majority Leader Kevin McCarthy, R-Calif., to withdraw his bid to become speaker when it became clear he could not win their support. The Freedom Caucus has already endorsed Rep. Daniel Webster, R-Fla., to be the next speaker.
The Caucus is seeking changes to House rules that will allow them to offer more amendments, get more conservative bills on the floor and restore the independence of committee chairmen. Those changes would diminish the speaker’s power. “The next speaker must follow House rules and commit to an open process for debating and amending legislation,” the Freedom Caucus said in a recent Twitter post. “Let the House work its will.”
Before the meeting, Rep. Mick Mulvaney, R-S.C., a member of the group, sounded skeptical that Ryan could win the group’s support. For the Freedom Caucus to endorse, 80 percent of the group’s 40 members have to agree, Mulvaney said, adding that is a “very difficult” bar to meet.
Mulvaney said one of his questions for Ryan will be whether he really wants to serve as speaker. “If you listen to Paul, what you hear is ‘I don’t want the job’,” Mulvaney said.
Ryan said Tuesday he is willing to consider rule changes to give all members a greater voice in the House. But he also said he wants to ensure that “we do not experience constant leadership challenges and crises.”
Boehner said Wednesday that Republicans already know Ryan well. “He works hard; he’s very bright.”
Story 1: Benghazi Scandal Is A Massive Cover-up of President Obama’s Secret Finding For Central Intelligence Agency’s Covert Operations In Libya and Syria — American People Demand Declassification And Release of Entire CIA Covert Operations Finding For Libya and Syria and Public Testimony By Former CIA Director General Petraeus, CIA Director Brennan, CIA Libya Station Chief and Chief of Mission and CIA Employees in Benghazi, Libya On September 11, 2012 — Massive Scandal and Foreign Policy Disaster — Stop The Cover-up, Stonewalling and Slow-walking! — “Why Was The United States in Libya?” — No More Behind Closed Doors — Videos
IT TAKES TREY GOWDY JUST THREE MINUTES TO SILENCE THE MEDIA
Trey Gowdy: Congress’ Benghazi probe not aimed at Clinton
Benghazi timeline: “We are under attack”
Malzberg | Clare Lopez, member of the Citizens’ Commission on Benghazi
Media Silent About Obama’s Undeclared Wars
U.S. fighting undeclared wars with six countries? – FoxNews 110610
Wesley Clark ( US 4 Star General ) US will attack 7 countries in 5 years
END WAR: Brzezinski Debates Why Libya War Right Choice, Goal Is Regime Change With A United Libya
Vijay Prashad Urges Re-Evaluation of NATO Attack on Libya in Debate Over Syria Intervention
How Will History Judge U.S., Coalition Intervention in Libya?
Did the Military Intervention in Libya Succeed? (Benjamin Friedman)
Life After Qaddafi — Libya: A Broken State
Libya War: What They Don’t Want You to Know
OBAMA CONFRONTED ON BENGHAZI – Stutters Through Response
Where is All the Worlds Gold?(full documentary) HD
Ex-CIA officer: Obama fools himself, Muslims see US bombing Libya
U.S. Intelligence knew in 2012: Rise of ISIS, Arms shipments from Libya to Syria
Ex-CIA Agent: America creates its own enemies
Benghazi US consulate attack: why is no one talking about the CIA mission?
Breaking: CNN Reports CIA Engaged in Massive Intimidation Campaign to Keep Benghazi a Secret
August 1, 2013 – Breaking: CNN Reports CIA Engaged in Massive Intimidation Campaign to Keep Benghazi a Secret — This is HUGE. Basically the CIA is reportedly giving polygraph tests EVERY MONTH to more than a dozen CIA employees that were on the ground in Benghazi during the attack, to ensure that none of them talk about what happened that night. CNN — CNN has uncovered exclusive new information about what
Kevin Shipp at AIM’s Citizens Commission on Benghazi Conference
Roger Aronoff Speaks about the newly formed Citizens Commission on Benghazi
Admiral James Lyons Speaks at the Citizens Commission on Benghazi
Lt. General Thomas McInerney Speaks at the Citizens Commission on Benghazi
Ken Timmerman at AIM’s Citizens Commission on Benghazi Conference
Benghazi Attack Cover Up! Obama Armed Al Qaeda?
Bachmann Challenges Former CIA Director on Benghazi
Bachmann: Administration misled public on Benghazi
Benghazi Bombshell – Whistleblower’s Lawyer: 400 Surface To Air Missiles Stolen – Wake Up America
Attorney for Benghazi Whistleblower says 400 missiles stolen during attack
Published on Aug 13, 2013
An attorney for the Benghazi whistleblowers says that some 400 surface to air missles (SAMs) were ‘taken from Libya’ during the terror attack on the U.S. consulate in Benghazi.
He added that the U.S. intelligence community is terrified they might be used to shoot down airliners.
Joe diGenova, whose wife Victoria Toensing — a former deputy assistant attorney general — also represents Benghazi witnesses and others with knowledge of the terror attack, told WMAL radio that the loss of those missiles is also one the reasons the U.S. State Department shut down 19 embassies across the Middle East last week.
‘A lot of people have come forward to share information with us,’ he said during the radio station’s ‘Mornings On The Mall’ program Monday morning.
‘We have learned that one of the reasons the administration is so deeply concerned’ is that ‘there were 400 surface-to-air missiles stolen, and that they are … in the hands of many people, and that the biggest fear in the U.S. intelligence community is that one of these missiles will be used to shoot down an airliner. 400 missiles, surface-to-air missiles, taken from Libya.’
Asked if the missiles are now ‘in the hands of al-Qaeda operatives,’ DiGenova replied, ‘That is what these people are telling us.’
DiGenova said his sources are ‘former intelligence officials who stay in constant contact with people in the Special Ops and intelligence community.’
‘And it’s pretty clear that the biggest concern right now are 400 missiles which have been diverted in Libya and have gotten in the hands of some very ugly people.’
diGenova said that while he was uncertain whether the stolen weapons were being kept at the U.S. Consulate’s CIA annex, ‘it is clear that the annex was somehow involved in the process of the distribution of those missiles.’
‘They were afraid that there was going to be a missile attack on one of the embassies. Remember, you can take a shoulder-held missile and shoot it into an embassy. Not just into the sky.’ ‘That’s what this was all about,’ he insisted. ‘That’s why they’re so worried. That’s why they have lied repeatedly about what happened in Benghazi, because they are now responsible for all of the stepchildren of violence that happens as a result of this. This is a very serious matter.’
FSA rocket shoots down Assad helicopter – Truthloader
White House Knew at 6:07 PM EST That Ansar Al-Sharia Was Behind the Benghazi Attack
Death And Deceit In Benghazi – Did Obama Amind Try Hide The Truth? – W Bret Bair
CIA operators were denied request for help during Benghazi attack, sources say
The Benghazi Select Committee: Many Questions Remain Unanswered
The House Select Committee on Benghazi is gearing up to investigate the many unanswered questions surrounding the attack on the U.S. diplomatic facility on September 11, 2012. Contrary to the Obama Administration’s assertions, numerous questions remain unanswered about what happened that fateful day both in Benghazi and here in Washington. This, despite the determined efforts of members of Congress to extract answered from a reluctant White House and State Department. Yet, in order to prevent a recurrence of unnecessary loss of American lives, systemic failures must be addressed, as well as the lack of accountability among those responsible for diplomatic security. Equally importantly, the families of the victims and indeed Americans need to know why no retaliation or justice has been visited upon those who killed U.S. diplomats.
“Peace President” Obama Let Benghazi Happen
As the Mail Online out it, “The Citizens Commission on Benghazi, a self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented — if the U.S. hadn’t been helping to arm al-Qaeda militias throughout Libya a year earlier.”
Obama “Switched Sides” in War on Terror
Former CIA officer Clare Lopez argues: Libya in 2011 marks the place and the time that the United States (U.S.) and the Obama administration formally switched sides in the Global War on Terror (GWOT). A mere 10 years after al-Qa’eda (supported by Hizballah and Iran) attacked the American homeland in the worst act of terrorism ever suffered by this country, U.S. leadership decided to facilitate the provision of weapons to jihadist militias known to be affiliated with al-Qa’eda and the Muslim Brotherhood in order to bring down a brutal dictator who also just happened to be a U.S. ally in the GWOT at the time.
Obama Let Them Die at Benghazi
Wayne Simmons spent 27 years working with the CIA to combat terrorism, narco-terrorism and narcotics trafficking, arms smuggling, counterfeiting, cyber-terrorists, and industrial and economic espionage. He sits on the Advisory Council for the Intelligence Summit, and is a contributor to the conservative publication Human Events.
“Dark Forces” at Benghazi and Muslim Brotherhood Infiltration
Why didn’t the U.S. military respond in time in Benghazi
Benghazi Victim’s Mother: ‘Why Isn’t Hillary Out Here?’
Rand Paul Questions Hillary Clinton on Benghazi (Flashback)
Benghazi ➡Hillary gave ‘stand down’ order – Cover Up & Deceive America 2016
13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined.
Benghazi, Victims’ Families & Investigators Testify At House Hearing On Benghazi – Lou Dobbs
9-19-2013 “Reviews of the Benghazi Attack and
Unanswered Questions” Part I
9-19-2013 “Reviews of the Benghazi Attack and Unanswered Questions” Part II
9-19-2013 “Reviews of the Benghazi Attack and Unanswered Questions” Part III
Benghazi Scandal Review Of The Benghazi Attack & Questions That Remain Unanswered
Rep. Gowdy Talks Obamacare and Benghazi with Lou Dobbs
Chairman Issa’s Opening Statement Benghazi
Chaffetz Questions Adm. Mullen About Military Capability During Attack In Benghazi
Chaffetz to Families of Benghazi Victims: “We have a duty to find out the truth.”
Benghazi Victim’s Mother ‘Why Isn’t Hillary Out Here’
Congressman Mica questions Administration on Benghazi
In an exchange with witnesses during our Congressional Oversight Hearing, Congressman John Mica explains to Administration officials that most Americans believe the State Department report on responsibility for the Bengazhi attack was a “whitewash”. Those conducting the review were appointed by Secretary of State Hillary Clinton who they failed to interview along with other top State and Administration officials. Mica stated that this looks like an inside job where no one was held accountable, fired and none of the killers captured or brought to justice.
Benghazi Scandal – “It Was Clear Pretty Quickly” – General: Benghazi Was No Demonstration!
Independent Benghazi Review Briefed Clinton, Mills on Report Before Released
House Of Scandals Obama Gives Speech To Distract Americans – Rand Paul (R-KY)- Hannity
The Benghazi Testimony Fox Doesn t Want You To See
Rep. Meehan Questions Officials Responses to Location of Embassy in Benghazi
CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels
Obama authorized CIA covert operation in Libya
SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria
The Daring Early Years of the CIA: Covert Ops from WW2 to Vietnam (1995)
CIA Covert Operations and U.S. Interventions Since World War II Full documentary
DC Scandals – Time To Testify? – Issa: We Call Hillary Clinton Back! – Benghazi Scandal
Benghazi Scandal Investigation Widening Lawmakers Seek Interviews Of 13 Top Officials
Benghazi Scandal Is Obama Admin Trying To Hide Something! Force Into Silence! OReilly
David Petraeus Scandal: Benghazi Attack Testimony Behind Closed Doors
The former CIA head will go behind closed doors to give testimony on the terror attacks.
General Petraeus leaked secret info on Benghazi attack to his mistress?
Glenn Beck: Military Action In Syria Is Designed To Cover Up Benghazi
REVEALED: If This Is True, Benghazi Is Even Worse Than We Ever Thought
The feature story that Michael Lewis just published about President Obama’s decisionmaking prior to the war in Libya includes a lot of details that inspire confidence in his leadership. By all accounts he’s intelligent, sober-minded, and inclined to seek out an array of perspectives. And he’s frequently forced to make extraordinarily difficult tradeoffs with imperfect information. I don’t envy his job.
But the article also raises serious questions about his honesty and regard for the constitution. Let’s take them in turn.
INCONSISTENT EXPLANATIONS
On March 28, 2011, Obama gave a televised address about Libya. It included this passage about his actions:
Confronted by this brutal repression and a looming humanitarian crisis, I ordered warships into the Mediterranean. European allies declared their willingness to commit resources to stop the killing. The Libyan opposition, and the Arab League, appealed to the world to save lives in Libya. At my direction, America led an effort with our allies at the United Nations Security Council to pass an historic Resolution that authorized a No0Fly Zone to stop the regime’s attacks from the air, and further authorized all necessary measures to protect the Libyan people.
In his telling, (a) America led the effort to establish the No-Fly Zone; and (b) the No-Fly Zone would stop the Libyan regime’s attacks from the air.
Compare these assertions to the inside account reported by Lewis (which wasvetted by the White House prior to publication):
If you were president just then and you turned your television to some cable news channel you would have seen many Republican senators screaming at you to invade Libya and many Democratic congressmen hollering at you that you had no business putting American lives at risk in Libya. If you flipped over to the networks on March 7 you might have caught ABC White House correspondent Jake Tapper saying to your press secretary, Jay Carney, “More than a thousand people have died, according to the United Nations. How many more people have to die before the United States decides, O.K., we’re going to take this one step of a no-fly zone?”
By March 13, Qaddafi appeared to be roughly two weeks from getting to Benghazi. On that day the French announced they were planning to introduce a resolution in the United Nations to use U.N. forces to secure the skies over Libya in order to prevent Libyan planes from flying. A “no-fly zone” this was called, and it forced Obama’s hand. The president had to decide whether to support the no-fly-zone resolution or not. At 4:10 p.m. on March 15 the White House held a meeting to discuss the issue. “Here is what we knew,” recalls Obama, by which he means here is what I knew. “We knew that Qaddafi was moving on Benghazi, and that his history was such that he could carry out a threat to kill tens of thousands of people. We knew we didn’t have a lot of time–somewhere between two days and two weeks. We knew they were moving faster than we originally anticipated. We knew that Europe was proposing a no-fly zone.”
That much had been in the news. One crucial piece of information had not. “We knew that a no-fly zone would not save the people of Benghazi,” says Obama. “The no-fly zone was an expression of concern that didn’t really do anything.” European leaders wanted to create a no-fly zone to stop Qaddafi, but Qaddafi wasn’t flying. His army was racing across the North African desert in jeeps and tanks. Obama had to have wondered just how aware of this were these foreign leaders supposedly interested in the fate of these Libyan civilians. He didn’t know if they knew that a no-fly zone was pointless, but if they’d talked to any military leader for five minutes they would have. And that was not all. “The last thing we knew,” he adds, “is that if you announced a no-fly zone and if it appeared feckless, there would be additional pressure for us to go further. As enthusiastic as France and Britain were about the no-fly zone, there was a danger that if we participated the U.S. would own the operation. Because we had the capacity.”
To summarize, (a) America did not lead the effort to establish a no-fly zone — it reluctantly signed on to the idea after its hand was forced by the French; (b) the no-fly zone wouldn’t stop the regime’s attacks because they weren’t coming from the air. It was, rather, a preamble to escalation.
Due to the nature of the Libya conflict, these misrepresentations weren’t nearly as consequential as, say, the way George W. Bush spoke out about weapons of mass destruction before the Iraq war. It is nevertheless an example of the president deliberately misleading the American people in order to facilitate false impressions about foreign military actions that he finds convenient.
ZERO REGARD FOR CONGRESSIONAL APPROVAL
It’s long been established that Obama failed to secure a congressional declaration of war, as the constitution and Senator Obama’s understanding of it dictated; and that he violated the War Powers Resolution. It is nevertheless worth revisiting the subject given these new details about his thought process:
Obama insists that he still had not made up his mind what to do when he returned to the Situation Room — that he was still considering doing nothing at all. A million people in Benghazi were waiting to find out whether they would live or die, and he honestly did not know. There were things the Pentagon might have said to deter him, for instance. “If somebody had said to me that we could not take out their air defense without putting our fliers at risk in a significant way; if the level of risk for our military personnel had been ratcheted up–that might have changed my decision,” says Obama. “Or if I did not feel Sarkozy or Cameron were far enough out there to follow through. Or if I did not think we could get a U.N resolution passed.” Once again he polled the people in the room for their views. Of the principals only Susan Rice (enthusiastically) and Hillary Clinton (who would have settled for a no-fly zone) had the view that any sort of intervention made sense. “How are we going to explain to the American people why we’re in Libya,” asked William Daley, according to one of those present. “And Daley had a point: who gives a shit about Libya?”
From the president’s point of view there was a certain benefit in the indifference of the American public to whatever was happening in Libya. It enabled him to do, at least for a moment, pretty much whatever he wanted to do. Libya was the hole in the White House lawn.
Obama made his decision: push for the U.N resolution and effectively invade another Arab country. Of the choice not to intervene he says, “That’s not who we are,” by which he means that’s not who I am. The decision was extraordinarily personal. “No one in the Cabinet was for it,” says one witness. “There was no constituency for doing what he did.” Then Obama went upstairs to the Oval Office to call European heads of state and, as he puts it, “call their bluff.” Cameron first, then Sarkozy. It was three a.m. in Paris when he reached the French president, but Sarkozy insisted he was still awake. (“I’m a young man!”) In formal and stilted tones the European leaders committed to taking over after the initial bombing. The next morning Obama called Medvedev to make sure that the Russians would not block his U.N. resolution. There was no obvious reason why Russia should want to see Qaddafi murder a city of Libyans, but in the president’s foreign dealings the Russians play the role that Republicans currently more or less play in his domestic affairs. The Russians’ view of the world tends to be zero-sum: if an American president is for it, they are, by definition, against it. Obama thought that he had made more progress with the Russians than he had with the Republicans; Medvedev had come to trust him, he felt, and believed him when he said the United States had no intention of moving into Libya for the long term. A senior American official at the United Nations thought that perhaps the Russians let Obama have his resolution only because they thought it would end in disaster for the United States.
And it could have. All that exists for any president are the odds. On March 17 the U.N. gave Obama his resolution. The next day he flew to Brazil and was there on the 19th, when the bombing began. A group of Democrats in Congress issued a statement demanding Obama withdraw from Libya; Ohio Democratic congressman Dennis Kucinich asked if Obama had just committed an impeachable offense. All sorts of people who had been hounding the president for his inaction now flipped and questioned the wisdom of action. A few days earlier Newt Gingrich, busy running for president, had said, “We don’t need the United Nations. All we have to say is that we think slaughtering your own citizens is unacceptable and that we’re intervening.” Four days after the bombing began, Gingrich went on the Today show to say he wouldn’t have intervened and was quoted on Politico as saying, “It is impossible to make sense of the standard of intervention in Libya except opportunism and news media publicity.” The tone of the news coverage shifted dramatically, too. One day it was “Why aren’t you doing anything?” The next it was “What have you gotten us into?” As one White House staffer puts it, “All the people who had been demanding intervention went nuts after we intervened and said it was outrageous. That’s because the controversy machine is bigger than the reality machine.”
Put more succinctly, going to war in Libya was a close call; there are things various folks could have said to deter him; he ran the decision through executive branch and international channels; most people told him not to do it; but if Congress came into the picture at all, it wasn’t enough to merit mention in the retelling, and certainly not enough to follow the constitution and put the prospective war to a vote. The people’s representatives were excluded.
The imperial presidency is so well entrenched that a journalist like Michael Lewis needn’t really question circumventing Congress to feel as though he’s including all the crucial parts of the story about going to war.
That remains a scandal.
And it is telling that Michael Lewis, one of America’s finest journalists, didn’t even ask Obama about failing to put the decision about Libya before Congress. He didn’t ask despite the plain language of the Constitution, Obama’s prior statements indicating he fully understood his legal obligations, and the fact that various members of Congress complained about his unilateral action. The imperial presidency is so well entrenched that a journalist like Lewis needn’t really question those things to feel as though he’s including all the crucial parts of the story about going to war.
That is quite a precedent Obama has set. And Mitt Romney is ready to exploit it if he wins. As he put it: “I can assure you if I’m president, the Iranians will have no question but that I will be willing to take military action if necessary to prevent them from becoming a nuclear threat to the world. I don’t believe at this stage, therefore, if I’m president that we need to have a war powers approval or special authorization for military force. The president has that capacity now.”
War is commonly defined as “a state of usually open and declared armed hostile conflict between states or nations.” By that definition, the United States and its allies have been at war with Libya since late last week. “At my direction,” President Obama told Congress, “U.S. military forces commenced operations” in Libya.
Article I, section 8 of the United States Constitution states that “Congress shall have the power … to declare war…” Since Congress has not declared war on Libya, is American involvement in the Libyan war unconstitutional?
Some members of Congress think so. Rep. Scott Ringell, a freshman from Virginia, said that the Libya hostilities “should trigger a debate within Congress and [among] the American people about proper interpretation and application of [the] Constitution. I’m surprised more conservatives aren’t speaking out about this issue.” Some Democrats have spoken out questioning the validity of the action. In the past, Senators Obama and Biden both said the president lacks the authority to do what President Obama has done.
The question of the constitutionality of the Libyan effort depends on the original public meaning of Article I, section 8 of the Constitution. Vice President (then Senator) Joseph Biden recalled that meaning in a speech on the Senate floor on July 30, 1998. He noted that the original draft of the Constitution would have empowered Congress to “make war.” James Madison and Elbridge Gerry moved that the language be changed to “declare war” so that the president would have the power “to repel sudden attacks.” Biden pointed out that only one framer, Pierce Butler of South Carolina, thought the president should have the power to initiate war.
Biden concluded that under the Constitution, the president could not use force without prior authorization unless it was necessary to “repel a sudden attack.” Presidential candidate Barack Obama agreed in 2007: “the President does not have power under the Constitution to unilaterally authorize a military attack in a situation that does not involve stopping an actual or imminent threat to the nation.”
Senator Biden also expounded on the framers’ reasons for limiting presidential discretion:
The rationale for vesting the power to launch war in Congress was simple. The Framers’ views were dominated by their experience with the British King, who had unfettered power to start wars. Such powers the Framers were determined to deny the President.
Of course, in 1998 and today, some claim the president has broad powers to initiate and carry on war under the “executive power” and the commander-in-chief clauses of Article II. But the framers rejected this “monarchist view” of the presidency.
The framers of the Constitution knew that the English king possessed certain prerogatives or discretionary powers to act for the public interest. Among these prerogatives was the power to declare war. He could also carry on undeclared wars. Yet the framers explicitly gave Congress the power to declare war. Apart from repelling sudden attacks, the Constitution is silent on the president’s power to conduct undeclared wars. Read against the English background, the text of the Constitution creates a constrained executive for the new nation.
What does this history imply for the present? President Obama told Congress that the use of force in Libya was intended “to prevent a humanitarian catastrophe and address the threat posed to international peace and security by the crisis in Libya.” But the framers did not empower the president to initiate war to prevent humanitarian catastrophes, deal with threats to international peace and security, or protect the lives of foreign nationals. The framers stated that the Constitution was instituted to provide for the common defense of We, the People, not the defense of people everywhere.
They did recognize a limited power to repel sudden attacks. The Libyan regime did not suddenly attack the United States or its citizens. There is nothing to repel. America’s war in Libya thus cannot be constitutional.
What now? The Supreme Court is unlikely to invalidate presidential actions in Libya. The task of vindicating the Constitution falls to Congress. It needs to hear from its conservatives, those who believe in the original meaning of the Constitution. Congress also needs to hear from its liberals, those who believe what Senators Biden and Obama once said about presidential power. Together members of Congress could finally live up to their constitutional obligations and impose restraints on a president who has become too much of a king.
John Samples directs the Cato Institute’s Center for Representative Government and is the author of The Struggle to Limit Government: A Modern Political History.
March 2011: U.S. secretly approves arms shipments from Qatar to Libyan rebels.
May 2011: Al-Qaeda flags raised over Benghazi. November 2011: Rebel leader Abdel-Hakim al-Hasidi admits a significant number of Libyan rebels were al-Qaeda fighters who fought American troops in Iraq.
April 19, 2012: State Department rejects ambassador to Libya’s request for more security personnel.
June 20, 2012: Assassination attempt on the British Ambassador to Libya.
July 9, 2012: Ambassador Stevens asks the State Department for more security personnel.
August 8, 2012: The number of security personnel at Benghazi reduced by State Department.
August 16, 2012: U.S. Site Security in Benghazi alerts the State Department that conditions are perilous. September 4, 2012: Gallup presidential tracking poll: Obama 47 percent; Romney 46 percent. September 4–6, 2012: Democratic National Convention (“al-Qaeda decimated; bin Laden is dead and GM is alive; al-Qaeda is on the run”).
September 11, 2012: Ambassador Stevens alerts the State Department that conditions in Benghazi are deteriorating.
3:40 p.m. (D.C. time): Stevens calls deputy chief of mission Greg Hicks in Tripoli and alerts him that the consulate in Benghazi is under attack.
4:00 p.m.: The White House is advised that the consulate is under attack. 10th Special Forces Group in Croatia is three hours away; Brigadier General (Ret.) Robert Lovell, Deputy Director of Intelligence for AFRICOM, later testifies that intelligence knew immediately that it was not a protest but a terrorist attack; no request for aid comes from the State Department.
5:00 p.m.: Defense Secretary Leon Panetta discusses attack with President Obama.
6:00 p.m.: U.S. Embassy in Tripoli advises the White House and the State Department that al-Qaeda affiliate Ansar al-Sharia has claimed responsibility for the attack. CIA deputy director Mike Morrell later testifies that “analysts knew from the get-go that al Qaeda was involved with this attack.”
8:00 p.m.: Greg Hicks calls Clinton and tells her that consulate is under terrorist attack.
10:00 p.m.: Clinton and Obama talk.
10:30 p.m.: Clinton issues a statement linking the attack to an inflammatory internet video.
11:00–11:30 p.m.: Former Navy SEALs Glen Doherty and Ty Woods killed.
September 12, 2012: Redacted e-mail from a State Department official says the official advised the Libyan government that the attack was carried out by Ansar al-Sharia. No mention of video.
September 12–15, 2012: CIA drafts several iterations of talking points; contains no known references to video as cause of the attack.
September 13, 2012: State Department memo blames the attack on terrorists.
September 13, 2012: Defense Intelligence Agency assigns blame for the attack on Ansar al-Sharia in Libya. No mention of a video.
September 13, 2012: Clinton condemns violence against U.S. consulate in Libya due to a video. September 13, 2012: Jay Carney condemns attack due to a video.
September 14, 2012: State Department says the attack was a spontaneous demonstration due to a video.
September 14, 2012: Obama and Clinton receive the families of the fallen as their caskets arrive at Andrews Air Force Base; blame the attack on a video. Clinton tells Ty Woods’s father, Charles, that they will “get” the producer of the video.
September 14, 2012: Jay Carney blames the video.
September 14, 2012, 8:00 p.m.: Deputy national-security adviser Ben Rhodes sends an e-mail regarding the preparation of Susan Rice for the Sunday talk shows, advising Rice to underscore the video and that the attack is “not a broader failure of policy.” September 15, 2012: Obama blames the video.
September 16, 2012: Susan Rice appears on five Sunday talk shows and characterizes the attacks as a spontaneous reaction due to a video. September 16, 2012: Libyan president disputes Rice’s comments, asserting Benghazi was a planned attack.
September 18, 2012: Obama appears on the David Letterman show, blames the video.
September 19, 2012: The head of the National Counterterrorism Center testifies that the attack was not a protest but a terrorist attack.
September 20, 2012: Obama blames the video. September 20, 2012: Obama and Clinton run an ad on Pakistani TV apologizing for the video.
September 21, 2012: Clinton says it was a terrorist attack.
September 24, 2012: Obama appears on The View, blames the video.
October 4, 2012: Clinton establishes the Accountability Review Board (“ARB”) to examine the circumstances surrounding the loss of personnel in Benghazi. Clinton not interviewed by ARB.
October 11, 2012: At the vice-presidential debate, Joe Biden claims the administration was not informed about requests for more security at the consulate in Benghazi.
October 16, 2012: Obama, in a response to a question from a reporter about whether he denied requests for aid to Benghazi on September 11 responds, “The minute I found out this was going on, I gave three directives. Number one, make sure we are securing our personnel and doing whatever we need to. Number two, we are going to investigate exactly what happened and make sure it doesn’t happen again. Number three, find out who did this so that we can bring them to justice.”
October 18, 2012: Judicial Watch makes a Freedom of Information Act request to the administration for talking points and communications regarding the events in Benghazi. The administration ignores the request.
October 20, 2012: Obama claims that he was not aware of any requests for additional security in Benghazi.
January 23, 2013: Clinton asks, “What difference, at this point, does it make whether it was a terrorist attack or a spontaneous demonstration?”
June 21, 2013: Judicial Watch sues the administration for unlawfully withholding documents pertaining to Benghazi.
July 25, 2013: Obama slams the “endless parade of distractions, political posturing, and phony scandals.”
August 2013: The House Committee on Oversight and Government Reform requests Benghazi e-mails. The Ben Rhodes e-mail is not among those produced.
April 18, 2014: Federal court orders the administration to turn over documents to Judicial Watch. 41 documents are released, including the Ben Rhodes e-mail.
May 1, 2014: Tommy Vietor tells Fox News the president was not in the Situation Room on September 11, 2012.
May 2, 2014: Speaker John Boehner announces a vote to form a select committee on Benghazi.
May 4, 2014: Representative Adam Schiff (D.., Calif.), member of the House Intelligence Committee, suggests Democrats boycott the House select committee as a “colossal waste of time.”
May 5, 2014: Carney will not say whether White House will cooperate with the select committee. (Clearly, much remains to be filled in by the select committee. Numerous questions and lines of inquiry are prompted by the above. The chronology is based on congressional testimony and reports from, among others, the Wall Street Journal, the Washington Post, the Washington Times, the New York Times, the New York Post and Fox News, and the reporting of Steve Hayes and Jennifer Griffin.)
Posted on October 26, 2012 | Updated on May 2, 2014
Summary
The question won’t go away: Did President Obama and administration officials mislead the public when they initially claimed that the deadly Sept. 11 attack on the U.S. consulate in Benghazi began “spontaneously” in response to an anti-Muslim video?
The question surfaced again on Oct. 25 — more than six weeks after the incident — when government emails showed the White House and the State Department were told even as the attack was going on that Ansar al-Sharia, a little-known militant group, had claimed credit for it.
We cannot say whether the administration was intentionally misleading the public. We cannot prove intent. There is also more information to come — both from the FBI, which is conducting an investigation, and Congress, which has been holding hearings.
But, at this point, we do know that Obama and others in the administration were quick to cite the anti-Muslim video as the underlying cause for the attack in Benghazi that killed four U.S. diplomats, including U.S. Ambassador to Libya Chris Stevens. And they were slow to acknowledge it was a premeditated terrorist attack, and they downplayed reports that it might have been.
What follows is a timeline of events that we hope will help put the incident into perspective. We call attention in particular to these key facts:
There were no protesters at the Benghazi consulate prior to the attack, even though Obama and others repeatedly said the attackers joined an angry mob that had formed in opposition to the anti-Muslim film that had triggered protests in Egypt and elsewhere. The State Department disclosed this fact Oct. 9 — nearly a month after the attack.
Libya President Mohamed Magariaf insisted on Sept. 16 — five days after the attack — that it was a planned terrorist attack, but administration officials continued for days later to say there was no evidence of a planned attack.
Magariaf also said the idea that the attack was a “spontaneous protest that just spun out of control is completely unfounded and preposterous.” This, too, was on Sept. 16. Yet, Obama and others continued to describe the incident in exactly those terms — including during the president’s Sept. 18 appearance on the “Late Show With David Letterman.”
Matt Olsen, director of the National Counterterrorism Center, was the first administration official to call it “a terrorist attack” during a Sept. 19 congressional hearing. Secretary of State Hillary Clinton did the same on Sept. 20. Even so, Obama declined opportunities to call it a terrorist attack when asked at a town hall meeting on Sept. 20 and during a taping of “The View” on Sept. 24.
Here is our timeline:
Analysis
Sept. 11: The Attack
2:30 p.m. Eastern Daylight Time (8:30 p.m. Benghazi time): U.S. Ambassador to Libya Chris Stevens steps outside the consulate to say goodbye to a Turkish diplomat. There are no protesters at this time. (“Everything is calm at 8:30,” a State Department official would later say at an Oct. 9 background briefing for reporters. “There’s nothing unusual. There has been nothing unusual during the day at all outside.”)
3 p.m.: Ambassador Stevens retires to his bedroom for the evening. (See Oct. 9 briefing.)
Approximately 3:40 p.m. A security agent at the Benghazi compound hears “loud noises” coming from the front gate and “gunfire and an explosion.” A senior State Department official at the Oct. 9 briefing says that “the camera on the main gate reveals a large number of people – a large number of men, armed men, flowing into the compound.”
About 4 p.m.: This is the approximate time of attack that was given to reporters at a Sept. 12 State Department background briefing. An administration official identified only as “senior administration official one” provides an official timeline of events at the consulate, but only from the time of the attack — not prior to the attack. The official says, “The compound where our office is in Benghazi began taking fire from unidentified Libyan extremists.” (Six of the next seven entries in this timeline — through 8:30 p.m. EDT — all come from the Sept. 12 briefing. The exception being the 6:07 p.m. entry, which comes from Reuters.)
About 4:15 p.m.: “The attackers gained access to the compound and began firing into the main building, setting it on fire. The Libyan guard force and our mission security personnel responded. At that time, there were three people inside the building: Ambassador Stevens, one of our regional security officers, and Information Management Officer Sean Smith.”
Between 4:15 p.m.-4:45 p.m.: Sean Smith is found dead.
About 4:45 p.m.: “U.S. security personnel assigned to the mission annex tried to regain the main building, but that group also took heavy fire and had to return to the mission annex.”
About 5:20 p.m.: “U.S. and Libyan security personnel … regain the main building and they were able to secure it.”
Around 6 p.m.: “The mission annex then came under fire itself at around 6 o’clock in the evening our time, and that continued for about two hours. It was during that time that two additional U.S. personnel were killed and two more were wounded during that ongoing attack.”
6:07 p.m.: The State Department’s Operations Center sends an email to the White House, Pentagon, FBI and other government agencies that said Ansar al-Sharia has claimed credit for the attack on its Facebook and Twitter accounts. (The existence of the email was not disclosed until Reuters reported it on Oct. 24.)
About 8:30 p.m.: “Libyan security forces were able to assist us in regaining control of the situation. At some point in all of this – and frankly, we do not know when – we believe that Ambassador Stevens got out of the building and was taken to a hospital in Benghazi. We do not have any information what his condition was at that time. His body was later returned to U.S. personnel at the Benghazi airport.”
About 10:00 p.m.: Secretary of State Hillary Clinton issues a statement confirming that one State official was killed in an attack on the U.S. consulate in Benghazi. Her statement, which MSNBC posted at 10:32 p.m., made reference to the anti-Muslim video.
Clinton: Some have sought to justify this vicious behavior as a response to inflammatory material posted on the Internet. The United States deplores any intentional effort to denigrate the religious beliefs of others. Our commitment to religious tolerance goes back to the very beginning of our nation. But let me be clear: There is never any justification for violent acts of this kind.
Sept.12: Obama Labels Attack ‘Act of Terror,’ Not ‘Terrorism’
Sept. 12: Clinton issues a statement confirming that four U.S. officials, not one, had been killed. She called it a “violent attack.”
Clinton: All the Americans we lost in yesterday’s attacks made the ultimate sacrifice. We condemn this vicious and violent attack that took their lives, which they had committed to helping the Libyan people reach for a better future.
Sept. 12: Clinton delivers a speech at the State Department to condemn the attack in Benghazi and to praise the victims as “heroes.” She again makes reference to the anti-Muslim video in similar language.
Clinton: Some have sought to justify this vicious behavior, along with the protest that took place at our Embassy in Cairo yesterday, as a response to inflammatory material posted on the Internet. America’s commitment to religious tolerance goes back to the very beginning of our nation. But let me be clear — there is no justification for this, none.
Sept. 12: Obama delivers a morning speech in the Rose Garden to address the deaths of U.S. diplomats in Libya. He said, “No acts of terror will ever shake the resolve of this great nation, alter that character, or eclipse the light of the values that we stand for.” He also makes reference to the anti-Muslim video when he says: “Since our founding, the United States has been a nation that respects all faiths. We reject all efforts to denigrate the religious beliefs of others. But there is absolutely no justification to this type of senseless violence. None.” He uses the term “act of terror” later that night when talking about the attack at a campaign event in Las Vegas.
Sept. 12: After his Rose Garden speech, Obama tapes an interview for “60 Minutes.” Obama says he didn’t use the word “terrorism” in his Rose Garden speech because “it’s too early to know exactly how this came about.” Steve Kroft, the show’s host, wonders how the attack could be described as a “mob action” since the attackers were “very heavily armed.” Obama says “we’re still investigating,” but he suspects “folks involved in this . . . were looking to target Americans from the start.”
Kroft: Mr. President, this morning you went out of your way to avoid the use of the word terrorism in connection with the Libya attack.
Obama: Right.
Kroft: Do you believe that this was a terrorist attack?
Obama: Well, it’s too early to know exactly how this came about, what group was involved, but obviously it was an attack on Americans and we are going to be working with the Libyan government to make sure that we bring these folks to justice one way or the other.
Kroft: It’s been described as a mob action. But there are reports that they were very heavily armed with grenades. That doesn’t sound like your normal demonstration.
Obama: As I said, we’re still investigating exactly what happened. I don’t want to jump the gun on this. But you’re right that this is not a situation that was exactly the same as what happened in Egypt. And my suspicion is, is that there are folks involved in this, who were looking to target Americans from the start.
Sept. 12: Senior administration officials, who did not permit use of their names, hold a briefing with reporters to answer questions about the attack. Twice officials characterize those involved in the attack as “extremists.” In one case, an official identified only as “senior administration official one” is asked by Fox News reporter Justin Fishel if the administration had ruled out the possibly that the attack was in response to the anti-Muslim video. The official says, “We just don’t know.”
Senior administration official one: With regard to whether there is any connection between this Internet activity and this extremist attack in Benghazi, frankly, we just don’t know. We’re not going to know until we have a chance to investigate. And I’m sorry that it is frustrating for you that so many of our answers are “We don’t know,” but they are truthful in that.
NBC’s Andrea Mitchell asks officials to address news reports that the attack has been “linked to a terror attack, an organized terror attack,” possibly al Qaeda. The official refers to it as a “complex attack,” but says it is “too early to say who they were” and their affiliation.
Senior administration official one: Frankly, we are not in a position to speak any further to the perpetrators of this attack. It was clearly a complex attack. We’re going to have to do a full investigation. We are committed to working with the Libyans both on the investigation and to ensure that we bring the perpetrators to justice. The FBI is already committed to assisting in that, but I just – we’re – it’s just too early to speak to who they were and if they might have been otherwise affiliated beyond Libya.
Sept. 12, 4:09 p.m.: At a press briefing en route to Las Vegas, White House Press Secretary Jay Carney is asked, “Does the White House believe that the attack in Benghazi was planned and premeditated?” He responds, “It’s too early for us to make that judgment. I think — I know that this is being investigated, and we’re working with the Libyan government to investigate the incident. So I would not want to speculate on that at this time.”
Sept. 12: Libya’s deputy ambassador to London, Ahmad Jibril, tells the BBC that Ansar al-Sharia was behind the attack. The little-known militant group issues a statement that says it “didn’t participate as a sole entity,” neither confirming nor denying the report.
Sept. 12, 6:06 p.m.: Beth Jones, the acting assistant secretary of state for the Near East, sends an email to top State Department officials that reads in part: “[T]he group that conducted the attacks, Ansar al-Sharia, is affiliated with Islamic extremists.” (An excerpt of Jones’ email was read by Rep. Trey Gowdy at the May 8, 2013, House oversight hearing.)
Sept. 12: Citing unnamed “U.S. government officials,” Reuters reports that “the Benghazi attack may have been planned in advance” and that members of Ansar al-Sharia “may have been involved.” Reuters quotes one of the U.S. officials as saying: “It bears the hallmarks of an organized attack.”
Sept. 13: ‘Clearly Planned’ or ‘Spontaneous’ Attack?
Sept. 13: Clinton meets with Ali Suleiman Aujali — the Libyan ambassador to the U.S. — at a State Department event to mark the end of Ramadan. Ambassador Aujali apologizes to Clinton for what he called “this terrorist attack which took place against the American consulate in Libya.” Clinton, in her remarks, does not refer to it as a terrorist attack. She condemns the anti-Muslim video, but adds that there is “never any justification for violent acts of this kind.”
Clinton: Religious freedom and religious tolerance are essential to the stability of any nation, any people. Hatred and violence in the name of religion only poison the well. All people of faith and good will know that the actions of a small and savage group in Benghazi do not honor religion or God in any way. Nor do they speak for the more than 1 billion Muslims around the world, many of whom have shown an outpouring of support during this time.
Unfortunately, however, over the last 24 hours, we have also seen violence spread elsewhere. Some seek to justify this behavior as a response to inflammatory, despicable material posted on the Internet. As I said earlier today, the United States rejects both the content and the message of that video. The United States deplores any intentional effort to denigrate the religious beliefs of others. At our meeting earlier today, my colleague, the foreign minister of Morocco, said that all prophets should be respected because they are all symbols of our humanity, for all humanity.
But both of us were crystal clear in this paramount message: There is never any justification for violent acts of this kind. And we look to leaders around the world to stand up and speak out against violence, and to take steps to protect diplomatic missions from attack.
Sept. 13: At a daily press briefing, State Department spokeswoman Victoria Nuland was asked if the Benghazi attack was “purely spontaneous or was premeditated by militants.” She declined to say, reiterating that the administration did not want to “jump to conclusions.”
Nuland: Well, as we said yesterday when we were on background, we are very cautious about drawing any conclusions with regard to who the perpetrators were, what their motivations were, whether it was premeditated, whether they had any external contacts, whether there was any link, until we have a chance to investigate along with the Libyans. So I know that’s going to be frustrating for you, but we really want to make sure that we do this right and we don’t jump to conclusions.
That said, obviously, there are plenty of people around the region citing this disgusting video as something that has been motivating. As the Secretary said this morning, while we as Americans, of course, respect free speech, respect free expression, there’s never an excuse for it to become violent.
Sept. 13: Clinton met with Moroccan Foreign Minister Saad-Eddine Al-Othmani. She condemned what she called the “disgusting and reprehensible” anti-Muslim video and the violence that it triggered. She said, “Islam, like other religions, respects the fundamental dignity of human beings, and it is a violation of that fundamental dignity to wage attacks on innocents. As long as there are those who are willing to shed blood and take innocent life in the name of religion, the name of God, the world will never know a true and lasting peace.”
Sept. 13: At a campaign event in Colorado, Obama again uses the phrase “act of terror.” He says: “I want people around the world to hear me: To all those who would do us harm, no act of terror will go unpunished.”
Sept. 13: CNN reports that unnamed “State Department officials” say the incident in Benghazi was a “clearly planned military-type attack” unrelated to the anti-Muslim movie.
CNN: “It was not an innocent mob,” one senior official said. “The video or 9/11 made a handy excuse and could be fortuitous from their perspective but this was a clearly planned military-type attack.”
Sept. 14: White House Says No Evidence of Planned Attack
Sept. 14: Clinton spoke at Andrews Air Force Base at a ceremony to receive the remains of those killed in Benghazi. She remarked that she received a letter from the president of the Palestinian Authority praising Stevens and “deploring — and I quote — ‘an act of ugly terror.’ ” She, however, did not call it an act of terror or a terrorist attack and neither did the president.
Sept. 14: At a State Department press briefing, spokeswoman Nuland says the department will no longer answer any questions about the Benghazi attack. “It is now something that you need to talk to the FBI about, not to us about, because it’s their investigation.”
Sept. 14: At a White House press briefing, Press Secretary Carney denies reports that it was a preplanned attack. “I have seen that report, and the story is absolutely wrong. We were not aware of any actionable intelligence indicating that an attack on the U.S. mission in Benghazi was planned or imminent. That report is false.” Later in that same briefing, Carney is told that Pentagon officials informed members of Congress at a closed-door meeting that the Benghazi attack was a planned terrorist attack. Carney said the matter is being investigated but White House officials “don’t have and did not have concrete evidence to suggest that this was not in reaction to the film.”
Question: Jay, one last question — while we were sitting here — [Defense] Secretary [Leon] Panetta and the Vice Chair of the Joint Chiefs briefed the Senate Armed Services Committee. And the senators came out and said their indication was that this, or the attack on Benghazi was a terrorist attack organized and carried out by terrorists, that it was premeditated, a calculated act of terror. Levin said — Senator Levin — I think it was a planned, premeditated attack. The kind of equipment that they had used was evidence it was a planned, premeditated attack. Is there anything more you can — now that the administration is briefing senators on this, is there anything more you can tell us?
Carney: Well, I think we wait to hear from administration officials. Again, it’s actively under investigation, both the Benghazi attack and incidents elsewhere. And my point was that we don’t have and did not have concrete evidence to suggest that this was not in reaction to the film. But we’re obviously investigating the matter, and I’ll certainly — I’m sure both the Department of Defense and the White House and other places will have more to say about that as more information becomes available.
Sept. 14: Defense Secretary Leon Panetta meets with the Senate Armed Services Committee. Roll Call, a Capitol Hill newspaper, reports that Republicans and Democrats came away with the conclusion that the Benghazi attack was a planned terrorist attack.
The Hill: Senators spoke with Panetta about the response to the situation in Libya. Four Americans were killed in an attack Tuesday on the U.S. consulate in Benghazi, including Ambassador Chris Stevens.
Senators said it has become clearer the attack was coordinated, although they would not say anything specific about any connection to the broader protests that came after an anti-Muslim video was released.
“I think it was a planned, premeditated attack,” Senate Armed Services Chairman Carl Levin (D-Mich.) said. He added he did not know the specific group responsible for the assault on the complex.
[Sen. John] McCain expressed a similar view.“People don’t go to demonstrate and carry RPGs and automatic weapons,” he said, adding that the facts suggest “this was not a ‘mob’ action [or] a group of protesters.”
Sept. 15-16: Susan Rice Contradicts Libyan President
Sept. 15: Obama discusses the Benghazi attack in his weekly address. He makes no mention of terror, terrorists or extremists. He does talk about the anti-Muslim film and “every angry mob” that it inspired in pockets of the Middle East.
Obama: This tragic attack [in Benghazi] takes place at a time of turmoil and protest in many different countries. I have made it clear that the United States has a profound respect for people of all faiths. We stand for religious freedom. And we reject the denigration of any religion — including Islam.
Yet there is never any justification for violence. There is no religion that condones the targeting of innocent men and women. There is no excuse for attacks on our Embassies and Consulates.
Sept. 16: Libya President Mohamed Magariaf says on CBS News’ “Face the Nation” that the attack on the U.S. consulate was planned months in advance. But Susan Rice, the U.S. ambassador to the United Nations, tells CBS News’ Bob Schieffer: “We do not have information at present that leads us to conclude that this was premeditated or preplanned.” She says it began “spontaneously … as a reaction to what had transpired some hours earlier in Cairo,” and “extremist elements” joined in the protest. (It was later learned that Rice received her information from talking points developed by the CIA.)
Update, May 16, 2013: The talking points given to Rice were extensively revised, largely at the request of the State Department. The original CIA talking points said, “We do know that Islamic extremists with ties to al-Qa’ida participated in the attack.” And they said that “[i]nitial press reporting linked the attack to Ansar al-Sharia.” References to al-Qaeda and Ansar al-Sharia were removed. However, all of the drafts say the attack began “spontaneously” in response to the Cairo protest. Read our article “Benghazi Attack, Revisited” for more information on what changes were made to the talking points.
Update, May 2, 2014: Two days before Rice’s appearance on the Sunday talk show circuit, Deputy National Security Adviser for Strategic Communications Ben Rhodes sent an email to other administration officials, including White House Press Secretary Jay Carney, with the subject line “PREP CALL with Susan: Saturday at 4:00 pm ET.” Rhodes’ email outlined four “goals” for Rice’s TV appearances. One of the goals: “To underscore that these protests are rooted in an Internet video, and not a broader failure of policy.” The email contained a mock Q&A session, and the third question asked whether the Benghazi attack was “an intelligence failure.” The answer in the email parroted — nearly word for word — Rice’s talking points when it said: “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the US Embassy in Cairo and evolved into a direct assault against the US Consulate and subsequently its annex.” The Rhodes email was released April 29 by Judicial Watch, a conservative watchdog group that obtained 41 State Department documents under the Freedom of Information Act.
Schieffer: Was this a long-planned attack, as far as you know? Or what– what do you know about that?
Magariaf: The way these perpetrators acted and moved … this leaves us with no doubt that this has preplanned, determined– predetermined.
Schieffer: And you believe that this was the work of al Qaeda and you believe that it was led by foreigners. Is that — is that what you are telling us?
Magariaf: It was planned — definitely, it was planned by foreigners, by people who — who entered the country a few months ago, and they were planning this criminal act since their — since their arrival. …
Schieffer: And joining us now, Susan Rice, the U.N. ambassador, our U.N. ambassador. Madam Ambassador, [Magariaf] says this is something that has been in the planning stages for months. I understand you have been saying that you think it was spontaneous? Are we not on the same page here?
Rice: Bob, let me tell you what we understand to be the assessment at present. First of all, very importantly, as you discussed with the president, there is an investigation that the United States government will launch led by the FBI, that has begun and —
They are not on the ground yet, but they have already begun looking at all sorts of evidence of — of various sorts already available to them and to us. And they will get on the ground and continue the investigation. So we’ll want to see the results of that investigation to draw any definitive conclusions.
But based on the best information we have to date, what our assessment is as of the present is in fact what began spontaneously in Benghazi as a reaction to what had transpired some hours earlier in Cairo where, of course, as you know, there was a violent protest outside of our embassy — sparked by this hateful video. But soon after that spontaneous protest began outside of our consulate in Benghazi, we believe that it looks like extremist elements, individuals, joined in that– in that effort with heavy weapons of the sort that are, unfortunately, readily now available in Libya post-revolution. And that it spun from there into something much, much more violent.
Schieffer: But you do not agree with him that this was something that had been plotted out several months ago?
Rice: We do not– we do not have information at present that leads us to conclude that this was premeditated or preplanned.
Schieffer: Do you agree or disagree with him that al Qaeda had some part in this?
Rice: Well, we’ll have to find out that out. I mean I think it’s clear that there were extremist elements that joined in and escalated the violence. Whether they were al Qaeda affiliates, whether they were Libyan-based extremists or al Qaeda itself I think is one of the things we’ll have to determine.
Sept. 16: Magariaf says in an interview with NPR: “The idea that this criminal and cowardly act was a spontaneous protest that just spun out of control is completely unfounded and preposterous. We firmly believe that this was a precalculated, preplanned attack that was carried out specifically to attack the U.S. consulate.”
Sept. 17: State Defends Rice and ‘Initial Assessment’
Sept. 17: Nuland, the State Department spokeswoman, is asked about Rice’s comments on “Face the Nation” and four other Sunday talk shows. Nuland says, “The comments that Ambassador Rice made accurately reflect our government’s initial assessment.” Nuland uses the phrase “initial assessment” three times when discussing Rice’s comments.
Sept. 18: Obama Says ‘Extremists’ Used Video As ‘Excuse’
Sept. 18: Obama was asked about the Benghazi attack on “The Late Show with David Letterman.” The president said, “Here’s what happened,” and began discussing the impact of the anti-Muslim video. He then said, “Extremists and terrorists used this as an excuse to attack a variety of our embassies, including the consulate in Libya.” He also said, “As offensive as this video was and, obviously, we’ve denounced it and the United States government had nothing to do with it. That’s never an excuse for violence.”
Sept. 18: Asked about Magariaf’s assessment that the video had nothing to do with the terrorist attack in Benghazi, the White House spokesman says Obama “would rather wait” for the investigation to be completed. “But at this time, as Ambassador Rice said and as I said, our understanding and our belief based on the information we have is it was the video that caused the unrest in Cairo, and the video and the unrest in Cairo that helped — that precipitated some of the unrest in Benghazi and elsewhere,” Carney says. “What other factors were involved is a matter of investigation.”
Sept. 18: After meeting with Mexican Secretary of Foreign Relations Patricia Espinosa, Clinton speaks with reporters and is asked if the Libyan president is “wrong” that “this attack was planned for months.” Clinton says, “The Office of the Director of National Intelligence has said we had no actionable intelligence that an attack on our post in Benghazi was planned or imminent.” She does not say if Magariaf is right or wrong.
Sept. 19: Olsen Calls It a ‘Terrorist Attack’
Sept. 19: Matt Olsen, director of the National Counterterrorism Center, tells a Senate subcommittee (at 1:06:49 in the video) that the four State Department officials in Benghazi “were killed in the course of a terrorist attack on our embassy.” It is the first time an administration official labeled it a “terrorist attack.” But he also tells the senators that he has no “specific evidence of significant advanced planning.”
Olsen: Yes, they were killed in the course of a terrorist attack on our embassy. … The best information we have now, the facts that we have now, indicate that this was an opportunist attack on our embassy. The attack began and evolved and escalated over several hours. … [I]t appears that individuals who were certainly well armed seized on the opportunity presented as the events unfolded. … What we don’t have, at this point, is specific intelligence that there was a significant advanced planning or coordination for this attack.
Sept. 19: At a State Department briefing, the department spokeswoman is asked if she now believes that the attack was a “terrorist attack”? She says, “Well, I didn’t get a chance to see the whole testimony that was given by Matt Olsen of the NCTC, but obviously we stand by comments made by our intelligence community who has first responsibility for evaluating the intelligence and what they believe that we are seeing.”
Sept. 19: The White House spokesman does not call it a “terrorist attack” in his press briefing. Carney says, “Based on the information we had at the time — we have now, we do not yet have indication that it was preplanned or premeditated. There’s an active investigation. If that active investigation produces facts that lead to a different conclusion, we will make clear that that’s where the investigation has led.”
Sept. 20: W.H. Spokesman Calls It a ‘Terrorist Attack’ — Not Obama
Sept. 20: Carney calls it a “terrorist attack” after being asked how the White House now classifies the attack. But he says the White House has no evidence that it was “a significantly preplanned attack” and blames the video for igniting the incident in Benghazi.
Carney: It is, I think, self-evident that what happened in Benghazi was a terrorist attack. Our embassy was attacked violently, and the result was four deaths of American officials. So, again, that’s self-evident. I would point you to a couple of things that Mr. Olsen said, which is that at this point it appears that a number of different elements were involved in the attack, including individuals connected to militant groups that are prevalent in Eastern Libya.
He also made clear that at this point, based on the information he has — and he is briefing the Hill on the most up-to-date intelligence — we have no information at this point that suggests that this was a significantly preplanned attack, but this was the result of opportunism, taking advantage of and exploiting what was happening as a result of reaction to the video that was found to be offensive.
Sept. 20: Obama, at a town hall meeting, says “extremists” took advantage of the “natural protests” to the anti-Muslim video to attack the consulate in Benghazi. He does not call it a “terrorist attack.”
Question: We have reports that the White House said today that the attacks in Libya were a terrorist attack. Do you have information indicating that it was Iran, or al Qaeda was behind organizing the protests?
Obama: Well, we’re still doing an investigation, and there are going to be different circumstances in different countries. And so I don’t want to speak to something until we have all the information. What we do know is that the natural protests that arose because of the outrage over the video were used as an excuse by extremists to see if they can also directly harm U.S. interests.
Sept. 21: Clinton Calls It a ‘Terrorist Attack’
Sept. 21: Clinton, speaking to reporters before a meeting with Pakistani Foreign Minister Hina Rabbani Khar, calls it a “terrorist attack” for the first time. She says, “Yesterday afternoon when I briefed the Congress, I made it clear that keeping our people everywhere in the world safe is our top priority. What happened in Benghazi was a terrorist attack, and we will not rest until we have tracked down and brought to justice the terrorists who murdered four Americans.”
Sept. 24-25: Obama Refuses to Call It a Terrorist Attack
Sept. 24: Clinton meets with the Libyan president and calls the Benghazi attack a “terrorist assault.” She says, “As we all know, the United States lost a great ambassador and the Libyan people lost a true friend when Chris Stevens and three other Americans were killed in the terrorist assault on our consulate in Benghazi.”
Sept. 24: Obama tapes an appearance on “The View,” and he’s asked by co-host Joy Behar whether the Libya attack was an act of terrorism or caused by the anti-Muslim video. He does not call it a terrorist attack and says, “We’re still doing an investigation.”
Joy Behar: It was reported that people just went crazy and wild because of this anti-Muslim movie, or anti-Muhammad, I guess, movie. But then I heard Hillary Clinton say that it was an act of terrorism. Is it? What do you say?
Obama: Well, we’re still doing an investigation. There’s no doubt that the kind of weapons that were used, the ongoing assault, that it wasn’t just a mob action. Now, we don’t have all the information yet, so we’re still gathering it. But what’s clear is that around the world, there’s still a lot of threats out there. That’s why we have to maintain the strongest military in the world, that’s why we can’t let down our guard when it comes to the intelligence work that we do and staying on top of — not just al Qaeda, the traditional al Qaeda in Pakistan and Afghanistan. …
Sept. 25: Obama speaks at the United Nations. He praises Chris Stevens as “the best of America” and condemns the anti-Muslim video as “crude and disgusting.” He does not describe the Benghazi attack as a terrorist attack.
Sept. 26: ‘Let’s Be Clear, It Was a Terrorist Attack’
Sept. 26: Carney is asked at a press briefing aboard Air Force One en route to Ohio why the president has not called the Benghazi incident a “terrorist attack.” He said, “The president — our position is, as reflected by the NCTC director, that it was a terrorist attack. It is, I think by definition, a terrorist attack when there is a prolonged assault on an embassy with weapons. … So, let’s be clear, it was a terrorist attack and it was an inexcusable attack.”
Sept. 26: Deputy Secretary of State William Burns, in an interview with Al Jazeera, is asked whether he agrees with the president of Libya that the Benghazi attack was premeditated and had nothing to do with the anti-Muslim video. He said: “It’s clear that the attack which took the lives of Chris Stevens and three other colleagues was clearly choreographed and directed and involved a fair amount of firepower, but exactly what kind of planning went into that and how it emerged on that awful night, we just don’t know right now. But I’m confident we’ll get to the bottom of it.”
Sept. 27: When Did Administration Know?
Sept. 27: At a press briefing, Defense Secretary Leon Panetta says that “it was a terrorist attack,” but declines to say when he came to that conclusion. “It took a while to really get some of the feedback from what exactly happened at that location,” he said. “As we determined the details of what took place there, and how that attack took place, that it became clear that there were terrorists who had planned that attack.”
Army Gen. Martin E. Dempsey, chairman of the Joint Chiefs of Staff, at the same briefing addresses what the U.S. knew in advance of the Benghazi attack. He says there was “a thread of intelligence reporting that groups in … eastern Libya were seeking to coalesce, but there wasn’t anything specific and certainly not a specific threat to the consulate that I’m aware of.”
Sept. 27: In a report on “Anderson Cooper 360 Degrees,” Fran Townsend, former Homeland Security adviser to President George W. Bush, says the administration knew early on that it was a terrorist attack. “The law enforcement source who said to me, from day one we had known clearly that this was a terrorist attack,” she says.
Sept. 27-28: Intelligence ‘Evolved’
Sept. 27: The White House spokesman is asked yet again why the president has refused to call the incident a terrorist attack. “The president’s position [is] that this was a terrorist attack,” Carney says.
Question: If the president does not call it, label it a terrorist attack as you and others have, is there some legal or diplomatic trigger that that brings? Why hasn’t he said that?
Carney: I think you’re misunderstanding something here. I’m the president’s spokesman. When the head of the National Counterterrorism Center, Matt Olsen, in open testimony in Congress answered a question by saying yes, by the definitions we go by — this is me paraphrasing — this was a terrorist attack — I echoed that, because this president, this administration, everybody looks to the intelligence community for the assessments on this. And it has been since I said so, the president’s position that this was a terrorist attack.
Sept. 28: Shawn Turner, a spokesman for the director of national intelligence, says in a statement that the office’s position on the attack evolved. It was first believed that “the attack began spontaneously,” but it was later determined that “it was a deliberate and organized terrorist attack,” he says.
Turner: In the immediate aftermath, there was information that led us to assess that the attack began spontaneously following protests earlier that day at our embassy in Cairo. We provided that initial assessment to Executive Branch officials and members of Congress, who used that information to discuss the attack publicly and provide updates as they became available. Throughout our investigation we continued to emphasize that information gathered was preliminary and evolving.
As we learned more about the attack, we revised our initial assessment to reflect new information indicating that it was a deliberate and organized terrorist attack carried out by extremists. It remains unclear if any group or person exercised overall command and control of the attack, and if extremist group leaders directed their members to participate.
Oct. 2-3: Clinton Cites ‘Continuing Questions’
Oct. 2: White House spokesman Carney at a press briefing in Nevada: “At every step of the way, the administration has based its public statements on the best assessments that were provided by the intelligence community. As the intelligence community learned more information they updated Congress and the American people on it.”
Oct. 3: Clinton tells reporters after a meeting with Foreign Minister of Kazakhstan Erlan Idrissov: “There are continuing questions about what exactly happened in Benghazi on that night three weeks ago. And we will not rest until we answer those questions and until we track down the terrorists who killed our people.”
Oct. 9: ‘Everything Calm’ Prior to Benghazi Attack, No Protests
Oct. 9: At a background briefing, senior state department officials reveal there were no protests prior to the terrorist attack on the U.S. consulate in Benghazi — contrary to what administration officials have been saying for weeks. A senior department official says “everything is calm at 8:30 p.m.” (Libya time) when Stevens was outside the building to bid a visitor goodbye. The ambassador retired to his bedroom for the evening at 9 p.m. The calm was shattered by 9:40 p.m. when “loud noises” and “gunfire and an explosion” are heard. (The background briefing provided on Sept. 12 also said the attack began at about 10 p.m., or about 4 p.m. EDT, but it did not provide information about what happened prior to the attack.)
A senior official says it was “not our conclusion” that the Benghazi attack started as a spontaneous protest to the anti-Muslim video. He also said “there was no actionable intelligence of any planned or imminent attack.”
Question: What in all of these events that you’ve described led officials to believe for the first several days that this was prompted by protests against the video?
Senior state department official two: That is a question that you would have to ask others. That was not our conclusion. I’m not saying that we had a conclusion, but we outlined what happened. The Ambassador walked guests out around 8:30 or so, there was no one on the street at approximately 9:40, then there was the noise and then we saw on the cameras the – a large number of armed men assaulting the compound.
Oct. 10: Administration Says It Gave Public ‘Best Information’
Oct. 10: Carney, the White House spokesman, is asked at a press briefing why the president and administration officials described the anti-Muslim video as the underlying cause of the attack on Benghazi when the State Department “never concluded that the assault in Benghazi was part of a protest on the anti-Muslim film.” He replied, in part: “Again, from the beginning, we have provided information based on the facts that we knew as they became available, based on assessments by the intelligence community — not opinions — assessments by the IC, by the intelligence community. And we have been clear all along that this was an ongoing investigation, that as more facts became available we would make you aware of them as appropriate, and we’ve done that.”
Oct. 10: After testifying before a House committee, Under Secretary for Management Patrick Kennedy is asked at a press briefing what the State Department should have done differently in releasing information about the Benghazi attack. He said, “We are giving out the best information we have at the time.”
Kennedy: [T]his is obviously an incredibly complicated situation. We’ve always made clear from the very beginning that we are giving out the best information we have at the time we are giving it out. That information has evolved over time. For example, if any Administration official, including any career official, had been on television on Sunday, September 16th, they would have said the same thing that Ambassador Rice would have said. She had information at that point from the intelligence community, and that is the same information I had and this – I would have made exactly the same points. Clearly, we know more today, but we knew what we knew when we knew it.
Oct. 10: The House Committee on Oversight and Government Reform releases State Department memos requesting additional security in Libya. Charlene Lamb, a State Department official who denied those requests, tells the committee that the State Department had been training local Libyans for nearly a year and additional U.S. security personnel were not needed. As reported by Foreign Policy: “We had the correct number of assets in Benghazi on the night of 9/11,” Lamb testified. Others testified differently. “All of us at post were in sync that we wanted these resources,” testified Eric Nordstrom, the top regional security officer in Libya over the summer, Foreign Policy reported.
Oct. 15: Clinton Blames ‘Fog of War’
Oct. 15: Clinton, in an interview on CNN, blamed the “fog of war” when asked why the administration initially claimed the attack began with the anti-Muslim video, even though the State Department never reached that conclusion. “In the wake of an attack like this in the fog of war, there’s always going to be confusion, and I think it is absolutely fair to say that everyone had the same intelligence,” Clinton said. “Everyone who spoke tried to give the information they had. As time has gone on, the information has changed, we’ve gotten more detail, but that’s not surprising. That always happens.”
Oct. 15: The New York Timesreports that the Benghazi attack came “without any warning or protest,” but “Libyans who witnessed the assault and know the attackers” say it was “in retaliation for the video.”
Oct. 24: White House, State Department Emails on Ansar al-Sharia
Oct. 24: Reuters reports the White House, Pentagon and other government agencies learned just two hours into the Benghazi attack that Ansar al-Sharia, an Islamic militant group, had “claimed credit” for it. The wire service report was based on three emails from the State Department’s Operations Center. One of the emails said, “Embassy Tripoli reports the group claimed responsibility on Facebook and Twitter and has called for an attack on Embassy Tripol.” The article also noted, “Intelligence experts caution that initial reports from the scene of any attack or disaster are often inaccurate.” (It should be noted that Reuters first reported on Sept. 12 that unnamed U.S. officials believed that Ansar al-Sharia may have been involved.)
Oct. 24: Clinton warns at a press conference that you cannot draw conclusions from the leaked emails because “cherry-picking one story here or one document there” can be misleading. She said, “The independent Accountability Review Board is already hard at work looking at everything — not cherry-picking one story here or one document there — but looking at everything, which I highly recommend as the appropriate approach to something as complex as an attack like this. Posting something on Facebook is not in and of itself evidence, and I think it just underscores how fluid the reporting was at the time and continued for some time to be.”
Oct. 24: Carney, the White House spokesman, says that “within a few hours” of the attack Ansar al-Sharia “claimed that it had not been responsible.” He added, “Neither should be taken as fact — that’s why there’s an investigation underway.”
May 8, 2013: At a hearing of the House Committee on Oversight & Government Reform, Rep. Trey Gowdy reads excerpts of a Sept. 12, 2011, email written by Acting Assistant Secretary of State for the Near East Beth Jones. According to Gowdy, Jones wrote, “I spoke to the Libyan ambassador and emphasized the importance of Libyan leaders to continue to make strong statements,” and “When he said his government suspected that former Qaddafi regime elements carried out the attack, I told him that the group that conducted the attacks, Ansar al-Sharia, is affiliated with Islamic extremists.” Gowdy said the email was sent to several top State Department officials, including Under Secretary for Management Patrick Kennedy. The committee did not release the full contents of the email. House Speaker John Boehner said the State Department did not allow the House to keep a copy of it.)
May 15, 2013: The White House releases 100 pages of emails regarding the CIA’s original talking points that were developed for the House Permanent Select Committee on Intelligence and used by U.S. Ambassador to the United Nations Susan Rice during her Sept. 16 Sunday talk show appearances. The emails show there were extensive changes made at the request of the State Department. (See “Sept. 16″ in our timeline for more information.)
Update, Nov. 6, 2012: This article was updated to add the president’s Sept. 12 interview with “60 Minutes,” which did not release the video and transcript until Nov. 4.
Update, May 9, 2013: This article was updated to include testimony from the May 8, 2013, hearing of the House Committee on Oversight & Government Reform.
The timeline below details the ongoing investigation into the September 11, 2012 attack upon the American diplomatic mission at Benghazi, in Libya. The attack and the investigation are the subject of much controversy in the American political sphere.
The New York Times reported: “American and European officials said that while many details about the attack remained unclear, the assailants seemed organized, well trained and heavily armed, and they appeared to have at least some level of advance planning.” The article also noted that a senior Obama administration official told reporters that “it was clearly a complex attack,” but provided no details.[4]
CBS News reported that Wanis al-Sharef (also spelled al-Sharif), a Libyan Interior Ministry official in Benghazi, said that an angry mob had gathered outside the consulate to protest a U.S.-made film that ridicules Islam’s Prophet Muhammad. According to al-Sharef, the mob stormed the consulate after the U.S. troops who responded fired rounds into the air to try and disperse the crowd.[5]
CBS News later reported that U.S. officials said the attack was not an out-of-control demonstration as first suspected, but a well-executed assault. From the wording of the report it is unclear whether the protesters were a group distinct from the attackers or were the attackers themselves.[6]
The Guardian published a video interview of a local Libyan on the consulate compound right after the attack, who presumed and empathized that the attack was in response to the anti-Islamic film.[7]
The Washington Post reported that U.S. officials and Middle East analysts said that the attack “may have been planned by extremists and inspired by al-Qaeda.”[8]
In a press release, the Qulliam Foundation, a counter-extremism think tank based in London, stated that the “military assault” was not related to the film but was to “avenge the death of Abu Yahya al-Libi, al-Qaeda’s second in command killed a few months ago.”[9]
BBC reported that Libya’s deputy ambassador to London, Ahmad Jibril, named Ansar al-Sharia, also known as Al-Qaeda in the Arabian Peninsula, as the perpetrators. They also said a Libyan reporter told them that the attack was executed by as many as 80 militiamen “armed with assault rifles, rocket-propelled grenades, mortars and 14.5 mm anti-aircraft machine guns.”[10][11]
Deputy Interior Minister Wanis al-Sharif of the Libyan government told a news conference in Benghazi that it was likely that the perpetrators had been Gaddafi loyalists, suggesting the attack could have been intended as a revenge for the extradition of Abdullah al-Senoussi (Gaddafi’s former intelligence chief) from Mauritania the previous month.[12]
September 13
The FBI opened an investigation into the deaths; a team was sent to investigate, with another team for security.[13] The FBI officials were set to arrive by September 21 in Benghazi to work with Libyan officials.[14]
In a briefing to congressional staffers, State Department Under Secretary Patrick Kennedy said that the attack appeared planned because it was so extensive and because of the “proliferation” of small and medium weapons.[15]
CNN reported that the attackers were part of an Al Qaeda spinoff group. They spoke with Sen. Dianne Feinstein (D-Calif.), who said the killings were possibly linked to the terrorist group blamed for the 9/11 hijackings. According to Sen. Feinstein, “The weapons were somewhat sophisticated, and they blew a big hole in the building and started a big fire.”[16]
September 14
The Senate Armed Services Committee was briefed by Secretary of Defense Leon Panetta about the response to the situation in Libya. Afterwards, Senate Armed Services Chairman Carl Levin (D-MI) was quoted as saying, “I think it was a planned, premeditated attack.” He added that he did not know the group responsible for the attack.[17]
Talking points prepared by the CIA, stated “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the U.S. Embassy in Cairo and evolved into a direct assault against the U.S. Consulate and subsequently its annex. There are indications that extremists participated in the violent demonstrations.” [19]
September 16
In an interview with NPR in Benghazi, President Mohammed el-Megarif said that foreigners infiltrated Libya over the past few months, planned the attack, and used Libyans to carry it out.[20] According to el-Megarif: “The idea that this criminal and cowardly act was a spontaneous protest that just spun out of control is completely unfounded and preposterous. We firmly believe that this was a precalculated, preplanned attack that was carried out specifically to attack the U.S. Consulate.” He said the attackers used the protesters outside the consulate as a cover, and there is evidence showing that elements of Ansar al-Sharia, an extremist group in eastern Benghazi, were used by foreign citizens with ties to al-Qaida to attack the consulate.[21]
U.S. Ambassador to the United Nations Susan Rice appeared on several Sunday morning talk shows and stated, “Putting together the best information that we have available to us today our current assessment is that what happened in Benghazi was in fact initially a spontaneous reaction to what had just transpired hours before in Cairo, almost a copycat of– of the demonstrations against our facility in Cairo, which were prompted, of course, by the video. What we think then transpired in Benghazi is that opportunistic extremist elements came to the consulate as this was unfolding. They came with heavy weapons which unfortunately are readily available in post revolutionary Libya. And it escalated into a much more violent episode.”[22][23]
Senator John McCain (R-AZ), the top Republican on the Senate Armed Services Committee, voiced suspicion that the attack was planned in advance and not prompted by the furor over the film. He noted that “[m]ost people don’t bring rocket-propelled grenades and heavy weapons to demonstrations. That was an act of terror.”[24]
September 17
Fox News reported that an “intelligence source on the ground in Libya” said “there was no demonstration outside the U.S. Consulate in Benghazi” before the attack.[25] The source was quoted as saying, “There was no protest and the attacks were not spontaneous.” The source also said that the attack “was planned and had nothing to do with the movie.” The source said the assault came with no warning at about 9:35 p.m. local time and included fire from more than two locations. The information for the time and for multiple directions of the attack corroborates an eyewitness report.[26]
Representative Mike Rogers (R) Michigan, the chairman of the House Intelligence Committee, said in an interview with Real Clear Politics that there were reports that the Consulate sustained “indirect fire, artillery type fire from mortars. They had direct unit action. It was coordinated in a way that was very unusual. They repulsed a quick reaction force that came to the facility….”[27]
September 19
The director of the National Counterterrorism Center, Matthew Olson, appeared before the Senate Homeland Security and Governmental Affairs Committee. During the hearing Olsen said that the Americans killed in Libya died “in the course of a terrorist attack.”[28] But he said that “the facts that we have now indicate that this was an opportunistic attack,” one in which heavily armed militants took advantage of an ongoing demonstration at the Consulate.
Sen. Susan Collins (R-Maine) disagreed with Olsen’s statement that the attack did not appear pre-planned. She said, “Based on the briefings I have had, I’ve come to the opposite conclusion. I just don’t think that people come to protests equipped with RPGs [rocket-propelled grenades] and other heavy weapons. And the reports of complicity—and they are many—with Libyan guards who were assigned to guard the consulate also suggest to me that this was premeditated.” Olsen told committee members that the U.S. is “looking at indications” that some attackers had connections to al-Qaeda or its North African affiliate, al-Qaeda in the Islamic Maghreb.
Fox News reported intelligence sources that the attack was tied to Al Qaeda via the involvement of Abu Sufian bin Qumu, a former Guantanamo Bay detainee.[29][30] However, a US national security official tells Mother Jones that “that report is wrong, there’s no intelligence suggesting that he was leading the attack on the consulate that evening.”[31]
September 20
Reuters reported that U.S. authorities are investigating the prospect of collusion between the militants who launched the attack on the consulate and locally hired Libyan personnel guarding the facility.[32] This corroborates earlier statements by U.S. government officials who stated there were multiple accounts of collusion between the attackers and the Libyan security guards.[28]
Secretary Clinton announced the formation of a panel to investigate the attack,[33] which is separate from the FBI investigation.
White House Press Secretary Jay Carney for the first time called the event “a terrorist attack.” In the same report CNN noted conflicting reports that U.S. Ambassador to Libya Chris Stevens “believed he was on an al Qaeda hit list.”[34]
September 21
U.S. officials said that the heavily armed extremists who laid siege to the consulate used “military-style tactics” in what appeared to be a “sophisticated operation”. Intelligence reports indicated that 50 or more people, many of them masked, took part in the attack and used gun trucks and precise mortar fire.[35] Intelligence reports also indicated that the attackers set up a perimeter to control access in and out of the compound.
September 23
A report in The New York Times has stated that there were two facilities used by the Americans in Benghazi, one for the American mission and an annex a half-mile away [36] and that:
Neither was heavily guarded, and the annex was never intended to be a “safe house,” as initial accounts suggested. Two of the mission’s guards — Tyrone S. Woods and Glen A. Doherty, former members of the Navy SEALs — were killed just outside the villa’s front gate.
September 25
U.S. Senators John McCain (R-AZ), Lindsey Graham (R-SC), Kelly Ayotte (R-NH) and Ron Johnson (R-WI) sent a letter to U.N. Ambassador Susan Rice seeking clarification on statements she made on the five Sunday talk shows on September 16 that the September 11 attack in Benghazi was the result of a “spontaneous reaction.” The senators wrote that the evidence clearly showed the attack was planned and coordinated.[37] Ms. Rice wrote in her reply letter, “I relied solely and squarely on the information the intelligence community provided to me … This information represented the intelligence community’s best, current assessment as of the date of my television appearances.” The four senators replied in a statement: “Elements of the intelligence community apparently told the administration within hours of the attack that militants connected with al Qaeda were involved, yet Ambassador Rice claims her comments five days later reflected the ‘best’ and ‘current’ assessment of the intelligence community. Either the Obama administration is misleading Congress and the American people, or it is blaming the entire failure on the intelligence community.”[38]
September 26
The Daily Beast reported that three separate U.S. intelligence officials knew within 24 hours of the attack that it was “planned and the work of al Qaeda affiliates operating in Eastern Libya.”[39]
Libyan president Mohamed Magariefd, in an interview with NBC News, said that there were no protestors at the site before the attack and that the anti-Islam film had “nothing to do with” the attack.[40] “Reaction should have been, if it was genuine, should have been six months earlier. So it was postponed until the 11th of September,” he said. “They chose this date, 11th of September to carry a certain message.”
Eight Republican Representatives on the House Armed Services Committee sent a letter to President Obama asking him to provide answers to questions in a classified format.[41] Their letter reads in part: “While we appreciate your willingness to provide the House of Representatives with an interagency briefing last week, many of the members’ questions were left unanswered. To that end, we are seeking additional information regarding the intelligence leading up to the attack, the security posture of our embassy, the role former Guantanamo Bay detainees may have played, as well as the way forward in Libya and, indeed, the region.”
September 28
A statement released by the Director of Public Affairs for the Director of National Intelligence, Shawn Turner, on the intelligence related to the terrorist attack on the U.S. Consulate in Benghazi, Libya, read in part:[42] “As we learned more about the attack, we revised our initial assessment to reflect new information indicating that it was a deliberate and organized terrorist attack carried out by extremists. It remains unclear if any group or person exercised overall command and control of the attack, and if extremist group leaders directed their members to participate. However, we do assess that some of those involved were linked to groups affiliated with, or sympathetic to al-Qa’ida. We continue to make progress, but there remain many unanswered questions. As more information becomes available our analysis will continue to evolve and we will obtain a more complete understanding of the circumstances surrounding the terrorist attack.”
October 2012
October 2
In a letter to Secretary of State Clinton, Darrell Issa (R-CA, chairman of the Committee) and Jason Chaffetz (R-UT, chairman of the subcommittee on National Security, Homeland Defense, and Foreign Operations) write that “the attack that claimed the Ambassador’s life was the latest in a long line of attacks on Western diplomats and officials in Libya in the months leading up to September 11, 2012. It was clearly never, as Administration officials once insisted, the result of a popular protest.”[43] The letter goes on to state that the mission in Benghazi was denied increased security they repeatedly requested. Subpoenaed witnesses set to testify before the committee on October 10 are Charlene Lamb, Deputy Assistant Secretary for International Programs, Bureau of Diplomatic Security, U.S. Department of State; Eric Nordstrom, Regional Security Officer, U.S. Department of State; and Lt. Col. Andrew Wood, Utah National Guard, U.S. Army.[44] According to Lt. Col. Wood, his 16-member team and a six-member State Department elite force called a Mobile Security Deployment team left Libya in August, one month before the assault on the diplomatic mission. Wood says that’s despite the fact that U.S. officials in Libya wanted security increased, not decreased.[45]
In an evening briefing to reporters, the State Department said it never concluded that the consulate attack in Libya stemmed from protests over the video.[50][51]
Senate Foreign Relations Committee member Bob Corker (R-TN) met with Libyan officials in Tripoli, and said that investigators are examining video from security cameras at the primary Benghazi compound to help them reconstruct what happened in the attack and identify attack participants.[52]
Senators John McCain (R-AZ), Lindsey Graham (R-SC), Kelly Ayotte (R-NH), and Saxby Chambliss (R-GA) sent letters to Director of National Intelligence James Clapper, CIA Director David Petraeus, and John Brennan, Assistant to the President for Homeland Security and Counterterrorism, asking them to respond to “specific questions regarding the shifting official explanations” about the attack.[53]
October 10
The four witnesses called to testify at the October 10, 2012 hearing of the House Committee on Oversight and Government Reform (l to r) were Lt. Col. Andrew Wood, Utah National Guard, U.S. Army; Eric Nordstrom, Regional Security Officer, U.S. Department of State; Charlene Lamb, Deputy Assistant Secretary for International Programs, Bureau of Diplomatic Security, U.S. Department of State; and Ambassador Patrick Kennedy, Under Secretary for Management, U.S. Department of State. An image of the U.S. compound can be seen behind Ms. Lamb.
The House Committee on Oversight and Government Reform held its hearing, “The Security Failures of Benghazi.”[44] In addition to the three witnesses originally named, a fourth witness testified: Ambassador Patrick Kennedy, Under Secretary for Management, U.S. Department of State.
In sworn testimony, Mr. Kennedy said, “…if any administration official, including any career official, were on television on Sunday, September 16th, they would have said what Ambassador Rice said. The information she had at that point from the intelligence community is the same that I had at that point.”[54] However, in a briefing to congressional staffers on September 13, Mr. Kennedy said that the attack appeared planned.[15] With regard to the so-called “talking points” memo UN Ambassador Susan Rice relied upon for information during television interviews following the Benghazi attack, The Guardian reports that on 16 November 2012, former CIA Director David Petraeus told congressional hearings, references to al-Queda had been removed from the memo. The references where remove so as not to give up information which could compromise classified sources. Rice was unaware of al-Qaida ties to the Benghazi attack.[55]
During testimony State Department witnesses acknowledged that it rejected appeals for more security at its diplomatic posts in Libya in the months before the attack.[56] The “annex” and “safe house” in the second diplomatic compound was inadvertently revealed to be a U.S. intelligence post.[57][58][59]
Charlene Lamb, Deputy Assistant Secretary of State for International Programs, said in her prepared testimony that she had a firm grasp on what happened in Benghazi, starting moments after the assault began. ”When the attack began, a Diplomatic Security agent working in the tactical operations center immediately … alerted the annex U.S. quick reaction security team stationed nearby … and the Diplomatic Security Command Center in Washington. From that point on, I could follow what was happening in almost real-time.”[60]
During testimony Representative Issa described the existence of video tape of the attack taken from consulate security cameras; the tape was not available to committee members at the time of the hearing.
October 12
U.S. Senate Committee on Homeland Security and Governmental Affairs announced its plan to conduct a bipartisan investigation. Part of their investigation will seek to determine “why the Administration’s initial public assessments of this attack were subsequently proven inaccurate.”[61]
October 14
Senator Lindsey Graham (R-SC), speaking on CBS’ Face the Nation, said that “[t]he intelligence community on the ground in Libya has told Senator Corker and myself that within twenty-four hours, they communicated up to Washington that this was a terrorist attack.”[62]
October 15
U.S. Secretary of State Hillary Rodham Clinton assumed responsibility for the Benghazi attack, saying that she is in charge of her 60,000-plus staff all over the world and “the president and the vice president wouldn’t be knowledgeable about specific decisions that are made by security professionals. They’re the ones who weigh all of the threats and the risks and the needs and make a considered decision.”[63] Republican Senator John McCain praised her “laudable gesture, especially when the White House is trying to avoid any responsibility whatsoever” but insisted that either there were drastic failures in the national security operation in not keeping the president aware of ongoing threats, or Obama himself knew of the threats and needed to take responsibility for the shortcomings.[64]
In an interview with the Los Angeles Times, the two Libyan militiamen guarding the consulate denied aiding the attackers. The compound was “lazily quiet” in the hours before the assault, they said. Around 9:30 p.m., the guards heard cries of “Allahu akbar!”—”God is great”—three times from outside the walls, then a voice called out in Arabic “You infidels!” and the attackers raced inside.[65]
The New York Times reported that witnesses of the attack knowledgeable of the circumstances were very convinced that it was carried out by a group of local Islamic militants in response to the video. According to local militia leaders familiar with the militant group, it was capable of carrying out the attack on short notice with only a few hour’s planning.[66]
October 17
Libyan officials report that the founder of Libya’s Islamist militia Ansar al-Sharia was at the compound during the attack, but that he remains free a week after those allegations were disclosed to Libyan political leaders and U.S. investigators.[67] The militia commander, identified as Ahmed Abu Khattalah, is a former political prisoner whose fighters were also blamed for assassinating a senior military officer after he defected to the opposition during last year’s revolution against Moammar Kadafi.[68]
October 18
The New York Times reported that Ahmed Abu Khattala, 41, claimed the Benghazi attack had grown out of a peaceful protest against a video made in the United States that mocked the Prophet Muhammad and Islam.[69] On or about 15 June 2014 American military and law enforcement personnel operating in Libya captured Ahmed Abu Khattala, who had been secretly indicted in the U.S. for his alleged role as a mastermind and/or ring-leader in the Benghazi attack.
Senate Committee on Homeland Security & Governmental Affairs made its first request for documents and briefings into the circumstances surrounding the attack. In separate letters to Secretary Hillary Clinton, Director of National Intelligence James Clapper, and Secretary of Defense Leon Panetta, the committee requested a classified briefing for members of the committee. The briefing is to address threat assessments before the attack, security needs, requests for security, description and chronology of the attack, and what the Obama administration knew about the attack in the immediate aftermath and “whether any initial public statements issued by members of the Administration in the days following the attack were inaccurate and, if so, why.”[70]
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee, questioned the security at the compound and the initial intelligence surrounding the attack. Feinstein was quoted in an interview: “I think what happened was the director of national intelligence, which we call the DNI, who is a very good individual, the former head of the Defense Intelligence Agency, Gen. Jim Clapper, put out some speaking points on the initial intelligence assessment. I think that was possibly a mistake.”[71]
October 19
Oversight and Government Reform Committee Chairman Darrell Issa and National Security Subcommittee Chairman Jason Chaffetz sent a 10-page letter to President Obama,[72] accompanied by 166 pages of unclassified documents[73] and photos.[74] The committee stated that the “letter requests that the White House respond to questions about its role in the controversial decision to have the U.S. diplomatic mission in Libya pursue a course of ‘normalization’ that was intended to help create the perception of success in Libya and contrast it to U.S. operations in Iraq and Afghanistan.”[75]
Representative Peter T. King (R-NY), Chairman of the House Committee on Homeland Security, sent a letter to President Obama requesting him to release Intelligence Community (1) reporting that led Obama Administration officials to initially characterize the assault as a “spontaneous reaction” to a film and (2) data and intelligence that led the Administration to change its characterization from a “spontaneous reaction” to a “terrorist attack.”[76]
Senators John McCain (R-AZ), Lindsey Graham (R-SC), and Kelly Ayotte (R-NH) renewed their request from 10 days ago that Director of National Intelligence James Clapper, CIA Director David Petraeus and John Brennan, Assistant to the President for Homeland Security and Counterterrorism, answer questions regarding “the shifting official explanations surrounding” the attack. The senators wrote, “Our questions should not be hard to answer, and the American people have a right to learn what our intelligence communities knew about the events of September 11, 2012, and when they knew it.”[77]
U.S. officials told The Associated Press that the CIA station chief in Libya compiled intelligence reports within 24 hours of the attack that indicated there was evidence it was carried out by militants, using the pretext of demonstrations against U.S. facilities in Egypt against the film to cover their intent. The report from the station chief was written late Wednesday, Sept. 12, and reached intelligence agencies in Washington the next day. It was not clear how widely the information was circulated.[78]
October 20
The Washington Post reported that talking points prepared by the CIA on Sept. 15 stated: “The currently available information suggests that the demonstrations in Benghazi were spontaneously inspired by the protests at the U.S. Embassy in Cairo and evolved into a direct assault against the U.S. Consulate and subsequently its annex. There are indications that extremists participated in the violent demonstrations.” [19]
CBS News reported Congress members have asked why military assistance was not sent. General Dempsey and Secretary Panetta “looked at available options, and the ones we exercised had our military forces arrive in less than 24 hours, well ahead of timelines laid out in established policies.” An unmanned Predator drone was sent to Benghazi, and the drone observed the final hours of the attack. The Pentagon said it moved a team of special operators from central Europe to Naval Air Station Sigonella; other nearby military forces available were fighter jets and AC-130 gunships. Gary Berntsen stated, “They made zero adjustments in this. They stood and they watched and our people died.”[79]
October 22
The New York Times reported that Ms. Rice, the US ambassador to the UN, “has said that the judgments she offered on the five talk shows on Sept. 16 came from talking points prepared by the C.I.A., which reckoned that the attack that killed Ambassador J. Christopher Stevens and three other Americans had resulted from a spontaneous mob that was angry about an anti-Islamic video that had set off protests elsewhere. That assessment, described to Ms. Rice in briefings the day before her television appearances, was based on intercepted communications, informants’ tips and Libyan press reports, officials said.” [80]
October 23
Media reports indicate that the State Department’s Operations Center sent a “Sensitive but unclassified” email at 4:05 p.m. Washington time (10:05 p.m. Benghazi time) on September 11 titled “U.S. Diplomatic Mission in Benghazi Under Attack” to the White House Situation Room and other U.S. security units and two hours later sent an email titled “Update 2: Ansar al-Sharia Claims Responsibility for Benghazi Attack.”[81][82] The first email reads in part: “approximately 20 armed people fired shots; explosions have been heard as well. Ambassador Stevens, who is currently in Benghazi, and four COM (Chief of Mission/embassy) personnel are in the compound safe haven.”[83] Secretary of State Hillary Rodham Clinton cautioned that those emails are “not in and of itself evidence” that the administration had definitively assessed the assault as a terrorist attack from the beginning.[84] A Tunisian man who was arrested in Turkey earlier this month with reported links to the Benghazi attack has been returned to Tunisia and is facing terrorism charges.[85][86]
October 24
It is reported that both Reuters and Fox News obtained copies of an email sent about 2 hours after the attack in which the White House, Pentagon, and other agencies are told that the Islamist militant group Ansar al-Sharia had “claimed responsibility.”[87]
October 25
A suspected Al-Qaeda member who was believed to have been involved in the Consulate attack was shot dead by Egyptian police, after they received a tip that he was staying in an apartment in Madinat Nasr. Egyptian police also arrested a seven-member cell in Cairo, five of whom are Libyans and the other two Egyptians.[88]
October 26
Republican Senators John McCain, Lindsey Graham, and Kelly Ayotte wrote to Defense Secretary Leon Panetta, CIA Director David Petraeus, and Attorney General Eric Holder requesting they make public the surveillance video taken at the consulate during the attack.[89]Fox News reported that military back-up was denied by the CIA chain of command, and the annex was instructed twice to “stand down”. Woods, and two others, ignored those instructions and evacuated the consulate. Upon returning to the annex, and after beginning to taking fire, the annex requested fire support as they had a laser targeted on the mortar team that was attacking them. A CIA spokeswoman, Jennifer Youngblood, denied the claims.[90]
October 27
The Associated Press published a timeline of the comments by the administration and Libyan officials regarding the Benghazi attack,[91] as well as Libyan witnesses account.[92] The AP article noted that a witness said he militants before the attack gathering around 20 youths from nearby to chant against the anti-Islam film. The article reports that American officials suggest it was a planned militant assault and that the attackers may have used the film controversy as a cover for the attack.
October 31
Former House Speaker Newt Gingrich suggested that “at least two networks have emails from the National Security Adviser’s office telling a counterterrorism group to stand down” in assisting the besieged U.S. consulate in Benghazi.[93] Gingrich said that the bombshell emails could be revealed within the next two days.Fox News reported that a cable marked “SECRET” and addressed to the Office of the Secretary of State Hillary Clinton summarized an “emergency meeting” convened by the U.S. Mission in Benghazi on August 15, 2012. In the meeting the State Department’s regional security officer “expressed concerns with the ability to defend Post in the event of a coordinated attack due to limited manpower, security measures, weapons capabilities, host nation support, and the overall size of the compound.” According to Fox News, “The details in the cable seemed to foreshadow the deadly Sept. 11 attack on the U.S. compound, which was a coordinated, commando-style assault using direct and indirect fire. Al Qaeda in North Africa and Ansar al-Sharia, both mentioned in the cable, have since been implicated in the consulate attack.”[94]
November 2012
November 1
CBS News reported that during the attack the Obama administration did not convene its top interagency counterterrorism resource: the Counterterrorism Security Group, (CSG). A high-ranking government official was quoted: “The CSG is the one group that’s supposed to know what resources every agency has. They know of multiple options and have the ability to coordinate counterterrorism assets across all the agencies. They were not allowed to do their job. They were not called upon.”[95] The article goes on to state that counterterrorism sources and internal emails reviewed by CBS News expressed frustration that key responders were ready to deploy but were not called upon to help in the attack.
Documents found by reporters for the American magazine Foreign Policy on Oct. 26 amid the wreckage of the U.S. consulate indicate there was concern about security at the compound. One letter dated Sept. 11 and addressed to Mohamed Obeidi, the head of the Libyan Ministry of Foreign Affairs’ office in Benghazi, reads in part: “Finally, early this morning at 0643, September 11, 2012, one of our diligent guards made a troubling report. Near our main gate, a member of the police force was seen in the upper level of a building across from our compound. It is reported that this person was photographing the inside of the U.S. special mission and furthermore that this person was part of the police unit sent to protect the mission.”[96] The article states that this accords with a message written by Smith, the IT officer who was killed in the assault, on a gaming forum on Sept. 11. “Assuming we don’t die tonight. We saw one of our ‘police’ that guard the compound taking pictures,” he wrote hours before the assault.
Washington Post published a detailed CIA timeline of the attack described by a senior intelligence official.[97]
November 2
Fifty-three members of the House of Representatives sent a letter to President Obama and Secretary Clinton requesting responses to oversight questions, including questions on the president’s Daily Brief, how the State Department designated the Benghazi compound (and how it affected security requirements), contradictions in the administration’s public statements of the attack as a deliberate terrorist attack or a spontaneous protest, and discrepancies between danger pay increases for mission personnel but denial for additional security.[98]Senior U.S. intelligence officials acknowledged that Woods and Doherty were contracted by the Central Intelligence Agency, not the State Department as originally publicly identified.[99]
Fox News reported that U.S. military intelligence informed senior commanders as early as 7 p.m. ET (that is, less than 4 hours after the attack began) that Ansar al-Sharia carried out the attack. The intelligence was relayed with no caveats, according to a source familiar with the intelligence.[100]
The Pentagon said that two U.S. service members volunteered to join the CIA team that travelled from Tripoli to Benghazi on the rescue mission.[101]
November 3
U.S. Senators John McCain (R-AZ), Lindsey Graham (R-SC) and Kelly Ayotte (R-NH) urged the immediate creation of a temporary Select Committee to investigate the Benghazi attack.[102]Fox News reported that the Blue Mountain Security manager (who was in charge of the local force hired to guard the consulate perimeter) made calls on both two-way radios and cell phones to colleagues in Benghazi warning of problems at least an hour earlier than the attack. Allegedly, those calls were to local security contractors, who say that the annex was also notified much earlier than 9:40 p.m., when the attack started. U.S. military intelligence also said that armed militias were gathering up to 3 hours before the attack.[103]
November 9
David H. Petraeus resigned his position as CIA Director and admitted to having an extramarital affair; he was scheduled to testify before Congress the week of November 12 on the Benghazi attack.[104] As of then it was not clear that General Petraeus would have to testify, and whether he would be disposed to do so if requested or required by Congress, though Senator Dianne Feinstein, D-CA, Chair of the Senate Intelligence Committee, indicated that the Congress would need to interview him. On Wednesday, November 14, 2012, it was made known that he had agreed to testify the following day, Thursday, November 15.[105]
November 10
The Department of Defense released a press release stating they released a detailed timeline yesterday of the Pentagon’s response to the attack.[106]
November 12
Paula Broadwell gave a talk on October 26 at the University of Denver in which she revealed that the CIA annex was used to imprison Libyan militia members.[107] In the same speech, Broadwell speculated that this may have been the motivation behind the attack on the consulate.[108] A Fox News Source confirmed to them that the CIA Annex was used as a detention center for not just militia members, but for prisoners from all parts of Northern Africa and the Middle East. The CIA has denied these allegations.[109]
November 15
U.S. intelligence and counter-terrorism officials testified in congressional public and closed hearings today.[110] CNN reported that legislators saw “real-time film (showing) exactly what happened”, starting before the attack began up “through the incident and the exodus,” according to Sen. Dianne Feinstein. The video was reported to be from “a combination of video from a surveillance camera and a drone.”[111]
November 16
Former CIA Director David Petraeus testified in closed hearings to both congressional intelligence committees. Speaking with reporters after the hearing, Representative Peter T. King (R-NY), Chairman of the House Committee on Homeland Security, said that Petraeus testified that he knew that the attack was a terrorist attack linked to al-Qaeda affiliates and not sparked by a protest over an anti-Islam video, as White House officials and President Obama had said for days afterwards.[112] “The original talking points put out by the CIA were different from what was later put out,” King said. “Petraeus says his initial assessment was from the start it was a terrorist attack.” King said a CIA analyst specifically told lawmakers that the al-Qaeda affiliates line “was taken out.”[113]
Other House members in attendance at the hearing said that Petraeus made clear that the modifications of the original talking points were not done for political reasons. Petraeus “was adamant there was no politicization of the process, no White House interference or political agenda,” said Rep. Adam Schiff (D-CA). “He completely debunked that idea.” Regarding Ambassador Susan Rice‘s comments during television interviews after the attack, Schiff went on to say that the, according to Petraeus, the comments “reflected the best intelligence at the time that could be released publicly”. “There was an interagency process to draft it, not a political process,” Schiff said. “They came up with the best assessment without compromising classified information or source or methods. So changes were made to protect classified information.”[114] According to Petraeus’s statements during the hearing, administration officials were concerned that, by publicly disclosing the involvement of Al Qaeda affiliates and sympathizers in the attack, those groups would be tipped off that US government agencies were aware of their involvement.[115]
The Washington Post reported that, since the attack, the CIA and other intelligence analysts have settled on a hybrid view of the attack, suggesting that the Cairo protest sparked militants in Libya, who quickly mobilized the assault on U.S. facilities in Benghazi.[116] Details about possible al-Qaeda links were not in initial talking points used by both Petraeus and UN Ambassador Susan Rice because they were preliminary and based on classified sources, intelligence officials said.
November 20
CBS News reported that the Office of the Director of National Intelligence (DNI) cut specific references to “al Qaeda” and “terrorism” from the unclassified talking points given to Ambassador Susan Rice on the attack, with the agreement of the CIA and FBI.[117]
November 27
In a White House press briefing to reporters, Press Secretary Jay Carney told reporters: “There was no protest outside the Benghazi facility. To this day, it is the assessment of this administration and of our intelligence community and certainly the assessment of your colleagues and the press who have interviewed participants on the ground in the assault on our facilities in Benghazi that they acted at least in part in response to what they saw happening in Cairo and took advantage of that situation.”[118]
U.S. Ambassador to the UN Susan Rice testified for about an hour in a closed session with Republican Senators John McCain, Lindsey Graham, and Kelly Ayotte.[119] McCain told reporters after the meeting: “We are significantly troubled by many of the answers that we got, and some that we didn’t get, concerning evidence that was overwhelming leading up to the attack on our consulate…. It is clear that the information that she gave the American people was incorrect when she said that it was a spontaneous demonstration triggered by a hateful video.” Rice later issued a statement saying: “We explained that the talking points provided by the intelligence community, and the initial assessment upon which they were based, were incorrect in a key respect: there was no protest or demonstration in Benghazi…. While, we certainly wish that we had had perfect information just days after the terrorist attack, as is often the case, the intelligence assessment has evolved.”
December 2012
December 7
The House Committee on Foreign Affairs announced that Secretary of State Hillary Clinton will testify, as early as next week, at an open hearing on the Benghazi attack.[120]
December 15
Hillary Clinton faints and suffers a concussion. As a result, her aides announce that they no longer expect her to testify at the hearing on the Benghazi attack.[121]
December 18
An independent inquiry into the attack sharply criticises State Department officials in Washington for ignoring requests for more guards and safety upgrades, and for failing to adapt security procedures to a deteriorating security environment.[122]
December 31
A bipartisan SenateHomeland Security Committee report faults the State Department and Pentagon for providing inadequate protection to the U.S. Consulate. It also criticized the Obama Administration’s handling of the attack.[123]
January 2013
January 23
Hillary Clinton testifies before Congress on the subject of the attack. She decries the “politicization” of incident, and defends the State Department.[124][125] Noteworthy highlights from her testimony include her comment, “What difference, at this point, does it make?” in response to questions about why the Benghazi attack occurred and how the controversial talking points were created. She also stated, in response to Senator Rand Paul‘s question about the U.S. transferring weapons to Turkey from Libya, “I do not know. I don’t have any information on that,” further stating, “you’ll have to direct that question to the agency that ran the annex.”[126]
February 2013
February 07
Leon Panetta and Martin Dempsey testify before Senate Armed Services Committee on the subject of the attack. Under questioning by Lindsey Graham, Panetta and Dempsey said that they both only talked to President Obama one time on the day of the attack.[127][128][129]
February 18
The United States has been denied access to individuals who were detained after a raid in the Nasr City neighborhood of Cairo by Egyptian officials. One of these individuals is Muhammad Jamal al Kashef, who is suspected of establishing training camps where attackers of the Benghazi consulate and CIA annex had trained.[130][131]
April 2013
April 23
House Republicans released a report on the Benghazi attack that was highly critical of the White House and the State Department; the White House dismissed the report, and House Democrats called the report biased.[132]Among dozens of findings, the report[133] states that:
“Senior State Department officials knew that the threat environment in Benghazi was high and that the Benghazi compound was vulnerable and unable to withstand an attack, yet the department continued to systematically withdraw security personnel”
The “[Obama] Administration willfully perpetuated a deliberately misleading and incomplete narrative that the attacks evolved from a political demonstration caused by a YouTube video.”
“… after a White House Deputies Meeting on Saturday, September 15, 2012, the Administration altered the talking points to remove references to the likely participation of Islamic extremists in the attacks. The Administration also removed references to the threat of extremists linked to al-Qa’ida in Benghazi and eastern Libya….”
“The Administration deflected responsibility by blaming the IC [intelligence community] for the information it communicated to the public in both the talking points and the subsequent narrative it perpetuated.”
May 2013
May 8
Gregory Hicks, Eric Nordstrom, and Mark Thompson testify before the United States House Committee on Oversight and Government Reform,[134] and were called “whistleblowers” by the committee chairman.[135] Hicks testified that more assistance from the U.S. military could have been provided, that attempts to send additional forces were told to stand down by another authority, and he was demoted for telling his recollection of events; the Defense Department disputed Hicks’ testimony, and the State Department did not respond.[136][137] Hicks further stated that since the Libyan government had called the attack a terrorist attack, and the United States did not, complicated the FBI investigation.[136] Thompson testified that a Foreign Emergency Support Team was not sent due to instructions from the State Department, which the State Department said would have taken too long to be effective; Nordstrom criticized the Accountability Review Board, that it did not look into decisions made by those individuals in higher authority.[136] Furthermore, they testified that their previous attempts to increase security leading up to the attacks were denied.[136] Democrats charged that the Republicans were politicizing the investigation.[138]
August 2013
August 06
The United States Department of Justice filed the first criminal charges in the Benghazi attack against Ahmed Abu Khattala, leader of a Libyan militia. The charges were sealed and their exact nature wasn’t clear, nor was the number of suspects named in the case. The Justice Department declined to comment on specific charges.[139][140]
Ansar al-Sharia in Libya (ASL, English: Partisans of Islamic Law) is a SalafistIslamistmilitia group that advocates the implementation of strict Sharia law across Libya.[1] Ansar al-Sharia came into being in 2011, during the Libyan Civil War. Until January 2015, it was led by its “Emir“, Mohamed al-Zahawi.[4] The organization has deliberately targeted both Libyan and American civilians and took part in the 2012 Benghazi attack. The group has been designated as a terrorist organization by the United Nations,[10] Turkey, the UAE, the United Kingdom and the United States.[11]
Ansar al-Sharia was formed during the Libyan Civil War and rose to prominence after the killing of Muammar Gaddafi. Made up of former rebels from the Abu Obayda Bin Aljarah Brigade, Malik Brigade and February 17th Martyrs Brigade and many more,[7] the Salafist militia initially made their name by posting videos of themselves fighting in the Battle of Sirte, the final battle in the war.[12]
Their first major public appearance occurred on 7 June 2012, when they led a rally of as many as 200 pickup trucks mounted with artillery[13] along Benghazi’s Tahrir Square and demanded the imposition of Sharia law.[14] According to the New York Times, “Western diplomats who watched said they were stunned by the scale and weaponry of the display.”[13]
The leader of Ansar al-Sharia, Sheikh Muhammad al-Zahawi, later gave an interview on a local TV station forbidding participation in Libya’s first post-civil war parliamentary elections on the grounds that they were un-Islamic.[15] The militia went on to provide security to some public property in eastern Libya, including Benghazi’s Al Jala Hospital.[12] The group is reportedly the military arm of Al-Dawa wa Al-Islah, a charitable organization.[16]
Ansar al-Sharia carried out destruction of Sufishrines in Benghazi, which they regarded as idolatrous.[20] In November 2011, Libyan Salafis engaged in a series of attacks on Sufi shrines all over the country.[21]Mohamed Yousef el-Magariaf, the president of the General National Congress (GNC) denounced the shrine attacks as “disgraceful acts” and said “those involved were criminals who would be pursued.”[21]
Ansar al-Sharia used its online presence to denounce the 2013 capture and removal from Libya of al-Qaeda operative Abu Anas al-Libi, by American military forces.[22]
Aside from militant activities, Ansar al-Sharia has attempted to gain local support through Dawah (missionary activities), the provision of social services, ranging from security patrols to garbage collection, and the establishment of medical clinics and religious schools.[8] In January 2015, the group introduced Islamic religious police and a sharia court in parts of Benghazi.[23]
2012 U.S. Consulate attack in Benghazi
On 11 September 2012, the United States Department of State Operations Center advised the White House Situation Room and other U.S. security units that Ansar al-Sharia was claiming responsibility for the attack on the U.S. diplomatic mission in Benghazi that had just occurred.[24] Witnesses said they saw vehicles with the group’s logo at the scene of the assault and that fighters there acknowledged at the time that they belonged to Ansar al-Sharia.[19] Witnesses also said they saw Ahmed Abu Khattala, a commander of Ansar al-Sharia, leading the embassy attack, a claim Mr. Khattala denied.[25] According to longwarjournal.org, the group issued a statement asserting that it “didn’t participate as a sole entity” and that the attack “was a spontaneous popular uprising” to the film trailer Innocence of Muslims, widely condemned as anti-Islamic.[26]
As of 6 August 2013, U.S. officials confirmed that Ahmed Abu Khattala, the Libyan leader of Ansar al-Sharia, has been charged with playing a significant role in last year’s attack on the U.S. diplomatic compound in Benghazi. According to NBC, the charges were filed under seal in Washington, D.C. in late July.[27] Khattalah was arrested by U.S. Delta Force special operations personnel in a raid on Libya on 15 June 2014.[28][29] He is being transported to the United States aboard the USS New York aircraft carrier and is expected to face trial in a U.S. criminal court.[30]
Temporary withdrawal and resurgence
On 21 September 2012, after massive anti-militia protests in Benghazi which largely blamed Ansar al-Sharia for the mission attack, hundreds of protesters stormed the militia headquarters, pulled down flags of the militia and torched a vehicle inside the base.[31] The group was forced out of its bases in Benghazi the next day.[32]
A few hours after the attack, Martyrs of February 17, together with Bou Salim Martyrs brigade, allegedly agreed to disband,[33] however about 150-200 militiamen moved from Benghazi to Jebel Akhdar area.[34]
As of December 2012, the group still existed, although it had adopted a low-key position.[35] By March 2013, the group had returned to Benghazi and began patrolling hospitals and manning checkpoints, as well as providing humanitarian services to residents.[36] By late 2013, the group had opened up a branch in Derna, under the slogan “A step toward building the Islamic state”.[37] The group also established a presence in the Libyan cities of Ajdabiya and Sirte.[6]
Following prolonged tensions between Islamists and non-Islamists in Libya, on 16 May 2014 military forces loyal to General Khalifa Belqasim Haftar launched a large scale air and ground offensive codenamed Operation Dignity on Islamist militia groups in Benghazi including Ansar al-Sharia.[38][39]
After initial reverses, Ansar al-Sharia, and other Islamist and jihadist militias fighting together as the Shura Council of Benghazi Revolutionaries, launched a counteroffensive against units loyal to Haftar in the following months, largely driving them out of the city by August of the same year.[40][41] After capturing several army bases in this offensive, Ansar al Sharia posted images on the internet of the weapons and equipment that had seized, including D-30 Howitzers, Multiple rocket launchers, Strela 2Man-portable air-defense systems, large quantities of ammunition and vehicles.[41][42]
In late 2014, the group’s leader, Mohamed al-Zahawi, died of wounds he had received from the fighting.[4] In the months that followed, many members of Ansar al-Sharia, including the majority of its organisation in Sirte, reportedly defected to the Islamic State of Iraq and the Levant in Libya.[43][44] On 30 March 2015, the group’s chief Sharia jurist, Abu Abdullah Al-Libi, pledged allegiance to ISIL,[45] and defected with a number of fighters. Ansar al-Sharia quickly announced that Abu Tamim al Libi has been selected as his replacement.[46] While there have been rumors that the group could pledge allegiance to ISIL, it has retained its independence.[23]
Designation as a terrorist organization
The countries and organizations below have officially listed the Ansar Al Sharia as a terrorist organization.
This article is about a particular use of the term connected with military and political organizations. For covert operations in intelligence gathering, organized crime and religious or minor political groups, see Front organization.
“Covert operative” redirects here. For the legal definition of covert agents or operatives, see covert agent.
[hide]This article has multiple issues. Please help improve it or discuss these issues on the talk page.
The examples and perspective in this article deal primarily with the United States and do not represent a worldwide view of the subject. (December 2009)
This article needs additional citations for verification. (January 2013)
According to the U.S. Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation.
Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the Congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action.[1] The CIA’s authority to conduct covert action comes from the National Security Act of 1947.[2] President Ronald Reagan issued Executive Order 12333 titled United States Intelligence Activities in 1984. This order defined covert action as “special activities”, both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e).[2][3] The CIA must have a “Presidential Finding” issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act.[1] These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives.[4] As a result of this framework, the CIA “receives more oversight from the Congress than any other agency in the federal government”.[5] The Special Activities Division (SAD) is a division of the CIA’s National Clandestine Service, responsible for Covert Action and “Special Activities”. These special activities include covert political influence and paramilitary operations. The division is overseen by the United States Secretary of State.[2]
In a covert operation, the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means “hidden,” while covert means “deniable.” The term stealth refers both to a broad set of tactics aimed at providing and preserving the element of surprise and reducing enemy resistance and to a set of technologies (stealth technology) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealthy are not used to formally describe types of missions.
Covert operations are employed in situations where openly operating against a target would be disadvantageous. These operations are generally illegal in the target state and are frequently in violation of the laws of the sponsoring country. Operations may be directed at or conducted with allies and friends to secure their support for controversial components of foreign policy throughout the world. Covert operations may include sabotage, assassinations, support for coups d’état, or support for subversion. Tactics include the use of a false flag or front group.
The activity of organizations engaged in covert operations is in some instances similar to, or overlaps with, the activity of front organizations. While covert organizations are generally of a more official military or paramilitary nature, like the DVS German Air Transport School in the Nazi era, the line between both becomes muddled in the case of front organizations engaged in terrorist activities and organized crime.
The following persons are known to have participated in covert operations, as distinct from clandestine intelligence gathering (espionage) either by their own admission or by the accounts of others:
Roy Farran Major Roy Alexandar Farran DSO MC and Two Bars served in her majesty’s SAS during WW2 taking part in Operation Tombola, author of Winged Dagger lived 2 January 1921 – 2 June 2006.
Charles Beckwith, US Army colonel who was an early exchange officer with the British Special Air Service (SAS), and created the Delta Force (1st Special Forces Operational Detachment-Delta) based on the SAS.
Richard Meinertzhagen, British officer who engaged in deceptive operations against Turkish forces in World War I, although falsifying later operations.
Richard Quirin, German World War II saboteur landed by German submarine in the US, as part of Operation Pastorius. Captured and executed. ex parte Quirin was a Supreme Court case challenging the constitutionality of execution of unlawful combatants.
Pavel Sudoplatov, major general in Soviet state security (under many organizational names), with roles ranging from assassin to director of field operations.
Jesús Villamor, Filipino Air Force officer that helped organize World War II guerilla movements.
Executive Secrets: Coved the Presidency, William J. Daugherty, University of Kentucky Press, 2004, page 25.
Executive Secrets: Covert Action and the Presidency, William J. Daugherty, University of Kentucky Press, 2004.
All Necessary Means: Employing CIA operatives in a Warfighting Role Alongside Special Operations Forces, Colonel Kathryn Stone, Professor Anthony R. Williams (Project Advisor), United States Army War College (USAWC), 7 April 2003, page 7
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated.[2] As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government.[3] If they are compromised during a mission, the United States government may deny all knowledge.[4]
SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.[5]
Political Action Group (PAG) is responsible for covert activities related to political influence, psychological operations and economic warfare. The rapid development of technology has added cyberwarfare to their mission. Tactical units within SAD are also capable of carrying out covert political action while deployed in hostile and austere environments. A large covert operation usually has components that involve many, or all, of these categories, as well as paramilitary operations. Political and Influence covert operations are used to support U.S. foreign policy. Often overt support for one element of an insurgency would be counter-productive due to the impression it would have on the local population. In such cases, covert assistance allows the U.S. to assist without damaging these elements in the process. Many of the other activities (such as propaganda, economic and cyber) support the overall political effort. There have been issues in the past with attempts to influence the US media such as in Operation Mockingbird. However, these activities are now subject to the same oversight as all covert action operations.[6]
SAD provides the President of the United States with an option when overt military and/or diplomatic actions are not viable or politically feasible. SAD can be directly tasked by the President of the United States or the National Security Council at the President’s direction. This is unlike any other U.S. special mission force. However, SAD/SOG has far fewer members than most of the other special missions units, such as the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force) or Naval Special Warfare Development Group (DEVGRU).[7][8][9]
As the action arm of the DO, SAD/SOG conducts direct action missions such as raids, ambushes, sabotage, targeted killings[10][11][12] and unconventional warfare (e.g., training and leading guerrilla and military units of other countries in combat). SAD/SOG also conducts special reconnaissance, that can be either military or intelligence driven, but is carried out by Paramilitary Officers (also called Paramilitary Operatives) when in “non-permissive environments“. Paramilitary Operations Officers are also fully trained case officers (i.e., “spies”) and as such conduct clandestine human intelligence (HUMINT) operations throughout the world.[13] SAD/SOG officers are selected from the most elite U.S. military units.[9]
The political action group within SAD conducts the deniable psychological operations, also known as black propaganda, as well as “Covert Influence” to effect political change as an important part of any Administration’s foreign policy.[1] Covert intervention in a foreign election is the most significant form of political action. This could involve financial support for favored candidates, media guidance, technical support for public relations, get-out-the-vote or political organizing efforts, legal expertise, advertising campaigns, assistance with poll-watching, and other means of direct action. Policy decisions could be influenced by assets, such as subversion of officials of the country, to make decisions in their official capacity that are in the furtherance of U.S. policy aims. In addition, mechanisms for forming and developing opinions involve the covert use of propaganda.[14]
Propaganda includes leaflets, newspapers, magazines, books, radio, and television, all of which are geared to convey the U.S. message appropriate to the region. These techniques have expanded to cover the internet as well. They may employ officers to work as journalists, recruit agents of influence, operate media platforms, plant certain stories or information in places it is hoped it will come to public attention, or seek to deny and/or discredit information that is public knowledge. In all such propaganda efforts, “black” operations denote those in which the audience is to be kept ignorant of the source; “white” efforts are those in which the originator openly acknowledges himself; and “gray” operations are those in which the source is partly but not fully acknowledged.[14][15]
SAD’s existence became better known as a result of the “Global War on Terror“. Beginning in autumn of 2001, SAD/SOG paramilitary teams arrived in Afghanistan to hunt down al-Qaeda leaders, facilitate the entry of U.S. Army Special Forces and lead the United Islamic Front for the Salvation of Afghanistan against the ruling Taliban. SAD/SOG units also defeated Ansar al-Islam in Iraqi Kurdistan prior to the invasion of Iraq in 2003[17][18] and trained, equipped, organized and led the Kurdishpeshmerga forces to defeat the Iraqi army in northern Iraq.[13][17] Despite being the most covert unit in U.S. Special Operations, numerous books have been published on the exploits of CIA paramilitary officers, including Conboy and Morrison’s Feet to the Fire: CIA Covert Operations in Indonesia,[19] and Warner’s Shooting at the Moon: The Story of America’s Clandestine War in Laos.[20] Most experts consider SAD/SOG the premiere force for unconventional warfare (UW), whether that warfare consists of either creating or combating an insurgency in a foreign country.[7][21][22]
There remains some conflict between the National Clandestine Service and the more clandestine parts of the United States Special Operations Command (USSOCOM),[23] such as the Joint Special Operations Command. This is usually confined to the civilian/political heads of the respective Department/Agency. The combination of SAD and USSOCOM units has resulted in some of the most notable successes of the wars in Iraq and Afghanistan, to include the locating and killing of Osama bin Laden.[22][24] SAD/SOG has several missions. One of these missions is the recruiting, training, and leading of indigenous forces in combat operations.[22] SAD/SOG and its successors have been used when it was considered desirable to have plausible deniability about U.S. support (this is called a covert operation or “covert action”).[13] Unlike other special missions units, SAD/SOG operatives combine special operations and clandestine intelligence capabilities in one individual.[9] These individuals can operate in any environment (sea, air or ground) with limited to no support.[7]
The Pentagon commissioned a study to determine whether the CIA or the U.S. Department of Defense (DoD) should conduct covert action paramilitary operations. Their study determined that the CIA should maintain this capability and be the “sole government agency conducting covert action.” The DoD found that, even under U.S. law, it does not have the legal authority to conduct covert action, nor the operational agility to carry out these types of missions.[27] The operation in May 2011 that resulted in the death of Osama bin Laden was a covert action under the authority of the CIA.[24][28]
SAD/SOG has several hundred officers, mostly former members of special operations forces (SOF) and a majority from the Joint Special Operations Command (JSOC).[29] The CIA has also recruited individuals within the agency.[30] The CIA’s formal position for these individuals is “Paramilitary Operations Officers” and “Specialized Skills Officers.” Paramilitary Operations Officers attend the Clandestine Service Trainee (CST) program, which trains them as clandestine intelligence operatives (known as “Core Collectors” within the Agency). The primary strengths of SAD/SOG Paramilitary Officers are operational agility, adaptability, and deniability. They often operate in small teams, typically made up of six operators (with some operations being carried out by a single officer), all with extensive military special operations expertise and a set of specialized skills that does not exist in any other unit.[9] As fully trained intelligence case officers, Paramilitary Operations Officers possess all the clandestine skills to collect human intelligence—and most importantly—to recruit assets from among the indigenous troops receiving their training. These officers often operate in remote locations behind enemy lines to carry out direct action (including raids and sabotage), counter-intelligence, guerrilla/unconventional warfare, counter-terrorism, and hostage rescue missions, in addition to being able to conduct espionage via HUMINT assets.
There are four principal elements within SAD’s Special Operations Group: the Air Branch, the Maritime Branch, the Ground Branch, and the Armor and Special Programs Branch. The Armor and Special Programs Branch is charged with development, testing, and covert procurement of new personnel and vehicular armor and maintenance of stockpiles of ordnance and weapons systems used by SOG, almost all of which must be obtained from clandestine sources abroad, in order to provide SOG operatives and their foreign trainees with plausible deniability in accordance with U.S. Congressional directives.
Together, SAD/SOG contains a complete combined arms covert military. Paramilitary Operations Officers are the core of each branch and routinely move between the branches to gain expertise in all aspects of SOG.[30] As such, Paramilitary Operations Officers are trained to operate in a multitude of environments. Because these officers are taken from the most highly trained units in the U.S. military and then provided with extensive additional training to become CIA clandestine intelligence officers, many U.S. security experts assess them as the most elite of the U.S. special missions units.[31]
While the World War IIOffice of Strategic Services (OSS) was technically a military agency under the Joint Chiefs of Staff, in practice it was fairly autonomous of military control and enjoyed direct access to PresidentFranklin D. Roosevelt. Major General William Joseph Donovan was the head of the OSS. Donovan was a soldier and Medal of Honor recipient from World War I. He was also a lawyer and former classmate of FDR at Columbia Law School.[37] Like its successor, the CIA, OSS included both human intelligence functions and special operations paramilitary functions. Its Secret Intelligence division was responsible for espionage, while its Jedburgh teams, a joint U.S.-UK-French unit, were forerunners of groups that create guerrilla units, such as the U.S. Army Special Forces and the CIA. OSS’ Operational Groups were larger U.S. units that carried out direct action behind enemy lines. Even during World War II, the idea of intelligence and special operations units not under strict military control was controversial. OSS operated primarily in the European Theater of Operations (ETO) and to some extent in the China-Burma-India Theater, while General of the ArmyDouglas MacArthur was extremely reluctant to have any OSS personnel within his area of operations.
One of the OSS’ greatest accomplishments during World War II was its penetration of Nazi Germany by OSS operatives. The OSS was responsible for training German and Austrian commandos for missions inside Nazi Germany. Some of these agents included exiled communists and socialist party members, labor activists, anti-NaziPOWs, and German and Jewish refugees. At the height of its influence during World War II, the OSS employed almost 24,000 people.[38]
OSS Paramilitary Officers parachuted into many countries then behind enemy lines, including France, Norway, Greece and The Netherlands. In Crete, OSS paramilitary officers linked up with, equipped and fought alongside Greek resistance forces against the Axis occupation.
OSS was disbanded shortly after World War II, with its intelligence analysis functions moving temporarily into the U.S. Department of State. Espionage and counterintelligence went into military units, while paramilitary and related functions went into an assortment of ‘ad hoc’ groups, such as the Office of Policy Coordination. Between the original creation of the CIA by the National Security Act of 1947 and various mergers and reorganizations through 1952, the wartime OSS functions generally went into CIA. The mission of training and leading guerrillas generally stayed in the United States Army Special Forces, but those missions required to remain covert were folded into the paramilitary arm of the CIA. The direct descendant of the OSS’ Special Operations is the CIA’s Special Activities Division.
Tibet
After the Chinese invasion of Tibet in October 1950, the CIA inserted SAD paramilitary teams into Tibet to train and lead Tibetan resistance fighters against the People’s Liberation Army of China. These teams selected and then trained Tibetan soldiers in the Rocky Mountains of the United States;[39] training occurred at Camp Hale.[40][41] The SAD teams then advised and led these commandos against the Chinese, both from Nepal and India. In addition, SAD Paramilitary Officers were responsible for the Dalai Lama‘s clandestine escape to India, narrowly escaping capture and certain execution by the Chinese government.[39]
According to a book by retired CIA officer John Kenneth Knaus, entitled Orphans Of The Cold War: America And The Tibetan Struggle For Survival, Gyalo Thondup, the older brother of the 14th (and current) Dalai Lama, sent the CIA five Tibetan recruits. These recruits were then trained in paramilitary tactics on the island of Saipan in the Northern Marianas.[42] Shortly thereafter, the five men were covertly returned to Tibet “to assess and organize the resistance” and selected another 300 Tibetans for training. U.S. assistance to the Tibetan resistance ceased after the 1972 Nixon visit to China, after which the United States and China normalized relations.[43]
The CIA sponsored a variety of activities during the Korean War. These activities included maritime operations behind North Korean lines. Yong Do Island, connected by a rugged isthmus to Pusan, served as the base for those operations. These operations were carried out by well-trained Korean guerrillas. The four principal U.S. advisers responsible for the training and operational planning of those special missions were Dutch Kramer, Tom Curtis, George Atcheson and Joe Pagnella. All of these Paramilitary Operations Officers operated through a CIA front organization called the Joint Advisory Commission, Korea (JACK), headquartered at Tongnae, a village near Pusan, on the peninsula’s southeast coast.[44] These paramilitary teams were responsible for numerous maritime raids and ambushes behind North Korean lines, as well as prisoner of war rescue operations. These were the first maritime unconventional warfare units that trained indigenous forces as surrogates. They also provided a model, along with the other CIA-sponsored ground based paramilitary Korean operations, for the Military Assistance Command, Vietnam-Studies and Observations Group (MACV-SOG) activities conducted by the U.S. military and the CIA/SAD in Vietnam.[7][44] In addition, CIA paramilitary ground-based teams worked directly for U.S. military commanders, specifically with the 8th Army, on the “White Tiger” initiative. This initiative included inserting South Korean commandos and CIA Paramilitary Operations Officers prior to the two major amphibious assaults on North Korea, including the landing at Inchon.[7]
The Bay of Pigs Invasion (known as “La Batalla de Girón”, or “Playa Girón” in Cuba), was an unsuccessful attempt by a U.S.-trained force of Cuban exiles to invade southern Cuba and overthrow the Cuban government of Fidel Castro. The plan was launched in April 1961, less than three months after John F. Kennedy assumed the presidency of the United States. The Cuban Revolutionary Armed Forces, trained and equipped by Eastern Bloc nations, defeated the exile-combatants in three days.
The sea-borne invasion force landed on April 17, and fighting lasted until April 19, 1961. CIA Paramilitary Operations Officers Grayston Lynch and William “Rip” Robertson led the first assault on the beaches, and supervised the amphibious landings.[45] Four American aircrew instructors from Alabama Air National Guard were killed while flying attack sorties.[45] Various sources estimate Cuban Army casualties (killed or injured) to be in the thousands (between 2,000 and 5,000).[46] This invasion followed the successful overthrow by the CIA of the Mosaddeqgovernment in Iran in 1953[47] and Arbenz government in Guatemala in 1954,[48] but was a failure both militarily and politically.[49] Deteriorating Cuban-American relations were made worse by the 1962 Cuban Missile Crisis.
Bolivia
The National Liberation Army of Bolivia (ELN-Ejército de Liberación Nacional de Bolivia) was a communist guerrilla force that operated from the remote Ñancahuazú region against the pro-U.S. Bolivian government. They were joined by Che Guevara in the mid-1960s.[50][51] The ELN was well equipped and scored a number of early successes against the Bolivian army in the difficult terrain of the mountainous Camiri region.[52] In the late 1960s, the CIA deployed teams of SAD Paramilitary Operations Officers to Bolivia to train the Bolivian army in order to counter the ELN.[52] These SAD teams linked up with U.S. Army Special Forces and Bolivian Special Forces to track down and capture Guevara, who was a special prize because of his leading role in the Cuban Revolution.[52] On October 9, 1967, Guevara was executed by Bolivian soldiers on the orders of CIA paramilitary operative Félix Rodríguez shortly after being captured, according to CIA documents.[53]
Vietnam and Laos
South Vietnam, Military Regions, 1967
The original OSS mission in Vietnam under MajorArchimedes Patti was to work with Ho Chi Minh in order to prepare his forces to assist the United States and their Allies in fighting the Japanese. After the end of World War II, the US agreed at Potsdam to turn Vietnam back to their previous French rulers and in 1950 the US began providing military aid to the French.[54]
CIA Paramilitary Operations Officers trained and led Hmong tribesmen in Laos and Vietnam, and their actions of these officers were not known for several years. Air America was the air component of the CIA’s paramilitary mission in Southeast Asia and was responsible for all combat, logistics and search and rescue operations in Laos and certain sections of Vietnam.[55] The ethnic minority forces numbered in the tens of thousands and they conducted direct actions mission, led by Paramilitary Operations Officers, against the communist Pathet Lao forces and their North Vietnamese allies.[7]
Elements of SAD were seen in the CIA’s Phoenix Program. One component of the Phoenix Program was involved in the capture and killing of suspected Viet Cong (National Liberation Front – NLF) members.[56] Between 1968 and 1972, the Phoenix Program captured 81,740 National Liberation Front of South Vietnam (NLF or Viet Cong) members, of whom 26,369 were killed. This was a large proportion of U.S. killings between 1969 and 1971. The program was also successful in destroying their infrastructure. By 1970, communist plans repeatedly emphasized attacking the government’s “pacification” program and specifically targeted Phoenix agents. The NLF also imposed quotas. In 1970, for example, communist officials near Da Nang in northern South Vietnam instructed their agents to “kill 400 persons” deemed to be government “tyrant[s]” and to “annihilate” anyone involved with the “pacification” program. Several North Vietnamese officials have made statements about the effectiveness of Phoenix.[57][58]
MAC-V SOG (Studies and Observations Group) (which was originally named the Special Operations Group, but was changed for cover purposes), was created and active during the Vietnam War. While CIA was just one part of MAC-V SOG, it did have operational control of some of the programs. Many of the military members of MAC-V SOG joined the CIA after their military service. The legacy of MAC-V SOG continues within SAD’s Special Operations Group.[59]
Maritime activities against the USSR
In 1973, SAD/SOG and the CIA’s Directorate of Science and Technology built and deployed the USNS Glomar Explorer (T-AG-193), a large deep-sea salvage ship, on a secret operation. This operation was called Project Azorian (erroneously called Project Jennifer by the press).[60] Her mission was to recover a sunken Sovietsubmarine, K-129, which had been lost in April 1968.[61][62] A mechanical failure caused two-thirds of the submarine to break off during recovery,[60] but SAD recovered two nuclear-tipped torpedoes, cryptographic machines and the bodies of six Soviet submariners.[63] An alternative theory claims that all of K-129 was recovered[64] and that the official account was an “elaborate cover-up”.[65]
Also in the 1970s, the U.S. Navy, the National Security Agency (NSA) and SAD/SOG [66] conducted Operation Ivy Bells and a series of other missions to place wire taps on Soviet underwater communications cables. These operations were covered in detail in the 1998 book Blind Man’s Bluff: The Untold Story of American Submarine Espionage.[67] In the 1985 edition of “Studies in Intelligence”, the CIA’s in-house journal that outsiders rarely get to see, the CIA describes the “staggering expense and improbable engineering feats” that culminated in the August 1974 mission.[68]
Nicaragua
In 1979, the U.S.-backed Anastasio Somoza Debayle dictatorship in Nicaragua fell to the socialist Sandinistas. Once in power, the Sandinistas disbanded the Nicaraguan National Guard, who had committed many human rights abuses, and arrested and executed some of its members. Other former National Guard members helped to form the backbone of the Nicaraguan Counterrevolution or Contra. SAD/SOG paramilitary teams were deployed to train and lead these forces against the Sandinista government. These paramilitary activities were based in Honduras and Costa Rica. Direct military aid by the United States was eventually forbidden by the Boland Amendment of the Defense Appropriations Act of 1983. The Boland Amendment was extended in October 1984 to forbid action by not only the Defense Department, but also to include the Central Intelligence Agency.[69][70]
The Boland Amendment was a compromise because the U.S. Democratic Party did not have enough votes for a comprehensive ban on military aid. It covered only appropriated funds spent by intelligence agencies. Some of Reagan’s national security officials used non-appropriated money of the National Security Council (NSC) to circumvent the Amendment. NSC officials sought to arrange funding by third parties. These efforts resulted in the Iran-Contra Affair of 1987, which concerned Contra funding through the proceeds of arms sales to the Islamic Republic of Iran. No court ever made a determination whether Boland covered the NSC and on the grounds that it was a prohibition rather than a criminal statute, no one was indicted for violating it. Congress later resumed aid to the Contras, totaling over $300 million. The Contra war ended when the Sandinistas were voted out of power by a war-weary populace in 1990.[70][71]Sandinista leader Daniel Ortega was re-elected as President of Nicaragua in 2006 and took office again on January 10, 2007.
El Salvador
CIA personnel were also involved in the Salvadoran civil war.[72] Some allege that the techniques used to interrogate prisoners in El Salvador foreshadowed those later used in Iraq and Afghanistan.[73] In fact, when a similar counter-insurgency program was proposed in Iraq, it was referred to as “the Salvador Option”.[74]
Somalia
Location of Somalia
SAD sent in teams of Paramilitary Operations Officers into Somalia prior to the U.S. intervention in 1992. On December 23, 1992, Paramilitary Officer Larry Freedman became the first casualty of the conflict in Somalia. Freedman was a former Army Delta Force operator who had served in every conflict that the U.S. was involved in, both officially and unofficially, since Vietnam.[75] Freedman was killed while conducting special reconnaissance in advance of the entry of U.S. military forces. His mission was completely voluntary, as it required entry into a very hostile area without any support. Freedman was awarded the Intelligence Star on January 5, 1993 for his “extraordinary heroism”.[76]
SAD/SOG teams were key in working with JSOC and tracking high value targets (HVT), known as “Tier One Personalities”. Their efforts, working under extremely dangerous conditions with little to no support, led to several very successful joint JSOC/CIA operations.[77] In one specific operation, a CIA case officer, Michael Shanklin[78] and codenamed “Condor”, working with a CIA Technical Operations Officer from the Directorate of Science and Technology, managed to get a cane with a beacon in it to Osman Ato, a wealthy businessman, arms importer, and Mohammed Aideed, a money man whose name was right below Mohamed Farrah Aidid’s on the Tier One list.
Once Condor confirmed that Ato was in a vehicle, JSOC‘s Delta Force launched a capture operation.
a Little Bird helicopter dropped out of the sky and a sniper leaned out and fired three shots into the car’s engine block. The car ground to a halt as commandos roped down from hovering Blackhawks [sic], surrounded the car and handcuffed Ato. It was the first known helicopter takedown of suspects in a moving car. The next time Jones saw the magic cane, an hour later, Garrison had it in his hand. “I like this cane,” Jones remembers the general exclaiming, a big grin on his face. “Let’s use this again.” Finally, a tier one personality was in custody.[77]
President Bill Clinton withdrew U.S. forces on May 4, 1994.[79]
In June 2006, the Islamic Courts Union seized control of southern Somalia, including the country’s capital Mogadishu, prompting the Ethiopian government to send in troops to try to protect the transitional government. In December, the Islamic Courts warned Ethiopia they would declare war if Ethiopia did not remove all its troops from Somalia. Sheikh Sharif Ahmed, leader of the Islamic Courts, called for a jihad, or holy war, against Ethiopia and encouraged foreign Muslim fighters to come to Somalia. At that time, the United States accused the group of being controlled by al-Qaeda, but the Islamic Courts denied that charge.[80]
In 2009, PBS reported that al-Qaeda had been training terrorists in Somalia for years. Until December 2006, Somalia’s government had no power outside of the town of Baidoa, 150 miles (240 km) from the capital. The countryside and the capital were run by warlords and militia groups who could be paid to protect terrorist groups.[80]
CIA officers kept close tabs on the country and paid a group of Somali warlords to help hunt down members of al-Qaeda according to the New York Times.[citation needed] Meanwhile, Ayman al-Zawahiri, the deputy to al-Qaeda leader Osama bin Laden, issued a message calling for all Muslims to go to Somalia.[80] On January 9, 2007, a U.S. official said that ten militants were killed in one airstrike.[81]
On September 14, 2009, Saleh Ali Saleh Nabhan, a senior al-Qaeda leader in East Africa as well as a senior leader in Shabaab, al Qaeda’s surrogate in Somalia, was killed by elements of U.S. Special Operations. According to a witness, at least two AH-6 Little Bird attack helicopters strafed a two-car convoy. Navy SEALs then seized the body of Nabhan and took two other wounded fighters captive.[82][83] JSOC and the CIA had been trying to kill Nabhan for some time including back in January 2007, when an AC-130 Gunship was called in on one attempt. A U.S. intelligence source stated that CIA paramilitary teams are directly embedded with Ethiopian forces in Somalia, allowing for the tactical intelligence to launch these operations.[84] Nabhan was wanted for his involvement in the 1998 United States embassy bombings, as well as leading the cell behind the 2002 Mombasa attacks.[82][85]
From 2010 to 2013, the CIA set up the Somalia National Intelligence and Security Agency (NISA) by providing training, funding and diplomatic access. In the same time period, the EU and UN has spent millions of dollars for the military training of the Somali National Army (SNA). NISA is considered a professional Somali security force that can be relied upon to neutralize the terrorist threat.[86] This force responded to the complex al-Shabaab attack on the Banadir Regional Courthouse in Mogadishu which killed 25 civilians. NISA’s response however saved 100s and resulted in the death of all the al-Shabaab guerrillas involved.[87]
Significant events during this timeframe included the targeted drone strikes against British al-Qaida operative Bilal el-Berjawi [88] and Moroccan al-Qaida operative Abu Ibrahim.[89] It also included the rescue of U.S. citizen Jessica Buchanan by U.S. Navy SEALs.[90] All likely aided by intelligence collection efforts in Somalia.[91]
Afghanistan
Hamid Karzai with Special Forces and CIA Paramilitary in late 2001.
During the Soviet war in Afghanistan in the 1980s, Paramilitary Operations Officers were instrumental in equipping Mujaheddin forces against the Soviet Army. Although the CIA in general, and a Texas congressman named Charlie Wilson in particular, have received most of the attention, the key architect of this strategy was Michael G. Vickers. Vickers was a young Paramilitary Operations Officer from SAD/SOG. The CIA’s efforts have been given credit for assisting in ending the Soviet involvement in Afghanistan and bringing Taliban to power.[92]
SAD paramilitary teams were active in Afghanistan in the 1990s in clandestine operations to locate and kill or capture Osama Bin Laden. These teams planned several operations, but did not receive the order to execute from President Bill Clinton because the available intelligence did not guarantee a successful outcome weighed against the extraordinary risk to the SAD/SOG teams that would execute the mission.[13] These efforts did however build many of the relationships that would prove essential in the 2001 U.S. Invasion of Afghanistan.[13]
On September 26, 2001, members of the Special Activities Division, led by Gary Schroen, were the first U.S. forces inserted into Afghanistan. The Northern Afghanistan Liaison Team entered the country nine days after the 9/11 attack[93][94] and linked up with the Northern Alliance as part of Task Force Dagger.[95]
They provided the Northern Alliance with resources including cash to buy weapons and prepared for the arrival of USSOCOM forces. The plan for the invasion of Afghanistan was developed by the CIA, the first time in United States history that such a large-scale military operation was planned by the CIA.[96] SAD, U.S. Army Special Forces, and the Northern Alliance combined to overthrow the Taliban in Afghanistan with minimal loss of U.S. lives. They did this without the use of conventional U.S. military ground forces.[13][97][98][99]
What made the Afghan campaign a landmark in the U.S. Military’s history is that it was prosecuted by Special Operations forces from all the services, along with Navy and Air Force tactical power, operations by the Afghan Northern Alliance and the CIA were equally important and fully integrated. No large Army or Marine force was employed”.[100]
The valor exhibited by Afghan and American soldiers, fighting to free Afghanistan from a horribly cruel regime, will inspire even the most jaded reader. The stunning victory of the horse soldiers – 350 Special Forces soldiers, 100 C.I.A. officers and 15,000 Northern Alliance fighters routing a Taliban army 50,000 strong – deserves a hallowed place in American military history”.[101]
Small and highly agile paramilitary mobile teams spread out over the countryside to meet with locals and gather information about the Taliban and al-Qa’ida. During that time, one of the teams was approached in a village and asked by a young man for help in retrieving his teenage sister. He explained that a senior Taliban official had taken her as a wife and had sharply restricted the time she could spend with her family. The team gave the man a small hand-held tracking device to pass along to his sister, with instructions for her to activate it when the Taliban leader returned home. The team responded to her emergency signal, capturing the senior Taliban official and rescuing the sister. The siblings’ tearful reunion left the team at a loss for words—a rarity for the normally loud warriors of CIA’s Special Activities Division.[102]
In December 2001, SAD/SOG and the Army’s Delta Force tracked down Osama bin Laden in the rugged mountains near the Khyber Pass in Afghanistan.[103] Former CIA station chief Gary Berntsen as well as a subsequent Senate investigation claimed that the combined American special operations task force was largely outnumbered by al-Qaeda forces and that they were denied additional US troops by higher command.[104] The task force also requested munitions to block the avenues of egress of bin Laden, but that request was also denied.[105] The team allegedly uncovered evidence in the subsequent site exploration that bin Laden’s ultimate aim was to obtain and detonate a nuclear device in a terrorist attack.[96] According to other press reports, SAD were ineffectual and “Bin Laden and bodyguards walked uncontested out of Tora Bora and disappeared into Pakistan’s unregulated tribal area.”[106]
Surge
In September 2009, the CIA planned on “deploying teams of spies, analysts and paramilitary operatives to Afghanistan, part of a broad intelligence ‘surge’ ordered by President Obama. This will make its station there among the largest in the agency’s history.”[107] This presence is expected to surpass the size of the stations in Iraq and Vietnam at the height of those wars.[107] The station is located at the U.S. Embassy in Kabul and is led “by a veteran with an extensive background in paramilitary operations”.[108] The majority of the CIA’s workforce is located among secret bases and military special operations posts throughout the country.[108][109]
Also in 2009, General Stanley McChrystal, the commander of NATO forces in Afghanistan, planned to request an increase in teams of CIA operatives, including their elite paramilitary officers, to join with U.S. military special operations forces. This combination worked well in Iraq and is largely credited with the success of that surge.[108][110] There have been basically three options described in the media: McChrystal’s increased counterinsurgency campaign; a counter-terror campaign using special operations raids and drone strikes; and withdrawal. The most successful combination in both the wars in Afghanistan and Iraq has been the linking up of SAD and military special forces to fight alongside highly trained indigenous units. One thing all of these options have in common is a requirement for greater CIA participation.[110]
The End Game
According to the current and former intelligence officials, General McChrystal also had his own preferred candidate for the Chief of Station (COS) job, a good friend and decorated CIA paramilitary officer.[111] The officer had extensive experience in war zones, including two previous tours in Afghanistan with one as the Chief of Station, as well as tours in the Balkans, Baghdad and Yemen. He is well known in CIA lore as “the man who saved Hamid Karzai‘s life when the CIA led the effort to oust the Taliban from power in 2001″. President Karzai is said to be greatly indebted to this officer and was pleased when the officer was named chief of station again. According to interviews with several senior officials, this officer “was uniformly well-liked and admired. A career paramilitary officer, he came to the CIA after several years in an elite Marine unit”.[111][112]
General McChrystal’s strategy included the lash up of special operations forces from the U.S. Military and from SAD/SOG to duplicate the initial success and the defeat of the Taliban in 2001[113] and the success of the “Surge” in Iraq in 2007.[114] This strategy proved highly successful and worked very well in Afghanistan with SAD/SOG and JSOC forces conducting raids nearly every night having “superb results” against the enemy.[115]
In 2001, the CIA’s SAD/SOG began creating what would come to be called Counter-terrorism Pursuit Teams (CTPT).[116][117] These units grew to include over 3,000 operatives by 2010 and have been involved in sustained heavy fighting against the enemy. It is considered the “best Afghan fighting force”.
Located at 7,800 feet (2,400 m) above sea level, Firebase Lilley in Shkin serves as a “nerve center for the covert war”.[117] This covert war includes being a hub for these CTPT operations with Firebase Lilley being just one in a constellation of CIA bases across Afghanistan.[117] These units have not only been highly effective in combat operations against the Taliban and al-Qaeda forces, but have also been used to engage with the tribes in areas with no other official government presence.[118]
This covert war also includes a large SOG/CTPT expansion into Pakistan to target senior al-Qaeda and Taliban leadership in the Federally Administered Tribal Area (FATA).[119] CTPT units are the main effort in both the “Counterterrorism plus” and the full “Counterinsurgency” options being discussed by the Obama administration in the December 2010 review.[120] SOG/CTPT are also key to any exit strategy for the U.S. government to leave Afghanistan, while still being able to deny al-Qaeda and other trans-national extremists groups a safehaven both in Afghanistan and in the FATA of Pakistan.[121]
In January 2013, a CIA drone strike killed Mullah Nazir a senior Taliban commander in the South Waziristan area of Pakistan believed responsible for carrying out the insurgent effort against the US military in Afghanistan. Nazir’s death degraded the Taliban.[122]
The U.S. has decided to lean heavily on CIA in general and SAD specifically in their efforts to withdraw from Afghanistan as it did in Iraq.[123] There are plans being considered to have several US Military special operations elements assigned to CIA after the withdrawal.[124]
Yemen
On November 5, 2002, a missile launched from a CIA-controlled Predator drone killed al-Qaeda members traveling in a remote area in Yemen. SAD/SOG paramilitary teams had been on the ground tracking their movements for months and called in this air strike.[125] One of those in the car was Ali Qaed Senyan al-Harthi, al-Qaeda’s chief operative in Yemen and a suspect in the October 2000 bombing of the destroyer USS Cole. Five other people, believed to be low-level al-Qaeda members, were also killed to include an American named Kamal Derwish.[126][127] Former Deputy U.S. Defense Secretary Paul Wolfowitz called it “a very successful tactical operation” and said “such strikes are useful not only in killing terrorists but in forcing al-Qaeda to change its tactics”.[126]
“It’s an important step that has been taken in that it has eliminated another level of experienced leadership from al-Qaeda,” said Vince Cannistraro, former head of counter-terrorism for the CIA and current ABC News consultant. “It will help weaken the organization and make it much less effective.”[128][129] Harithi was on the run, pursued by several security forces who were looking for him and Muhammad Hamdi al-Ahdal, another suspect in the USS Cole bombing case.[130]
In 2009, the Obama administration authorized continued lethal operations in Yemen by the CIA.[131] As a result, the SAD/SOG and JSOC have joined together to aggressively target al-Qaeda operatives in that country, both through leading Yemenese special forces and intelligence driven drone strikes.[131] A major target of these operations is ImamAnwar al-Aulaqi, an American citizen with ties to both Nidal Hassan, the alleged Fort Hood attacker, and Umar Farouk Abdulmutallab, the Christmas 2009 attempted bomber of Northwest Airline flight 253.[132] Imam al-Aulaki was killed on September 30, 2011 by an air attack carried out by the Joint Special Operations Command.[133]
Iraq
SAD paramilitary teams entered Iraq before the 2003 invasion. Once on the ground they prepared the battle space for the subsequent arrival of U.S. military forces. SAD teams then combined with U.S. Army special forces (on a team called the Northern Iraq Liaison Element or NILE).[17] This team organized the KurdishPeshmerga for the subsequent U.S. led invasion. This joint team combined in Operation Viking Hammer to defeat Ansar al-Islam, an Islamist group allied to al-Qaeda, which several battle-hardened fighters from Afghanistan had joined after the fall of the Taliban, in a battle for control over the northeast of Iraq – a battle that turned out being one of the “most intense battles of Special Forces since Vietnam”.[134] This battle was for an entire territory that was completely occupied by Ansar al-Islam and was executed prior to the invasion in February 2003. If this battle had not been as successful as it was, there would have been a considerable hostile force in the rear of the U.S./secular Kurdish force in the subsequent assault on the Iraqi army to the south. The U.S. side was represented by paramilitary operations officers from SAD/SOG and the army’s 10th Special Forces Group (10th SFG). 10th SFG soldiers were awarded three Silver Stars and six Bronze Stars with V for valor for this battle alone [135] and several paramilitary officers were awarded the Intelligence Star for valor in combat.[136] This battle was a significant direct attack and victory on a key U.S. opponent. It resulted in the deaths of a substantial number of militants and the uncovering of a crude laboratory that had traces of poisons and information on chemical weapons at Sargat.[17][137] The team found foreign identity cards, visas, and passports on the enemy bodies. They had come from a wide variety of Middle Eastern and north African countries including Yemen, Sudan, Saudi Arabia, Qatar, Oman, Tunisia, Morocco, and Iran.[135] Sargat was also the only facility that had traces of chemical weapons discovered in the Iraq war.[18][136][138]
The village of Biyara and Base of Ansar al-Islam 2001–2003
In a 2004 U.S. News & World Report article, “A firefight in the mountains”, the author states:
“Viking Hammer would go down in the annals of Special Forces history—a battle fought on foot, under sustained fire from an enemy lodged in the mountains, and with minimal artillery and air support.”[135]
SAD/SOG teams also conducted high risk special reconnaissance missions behind Iraqi lines to identify senior leadership targets. These missions led to the initial assassination attempts against Iraqi PresidentSaddam Hussein and his key generals. Although the initial air strike against Hussein was unsuccessful in killing the dictator, it was successful in effectively ending his ability to command and control his forces. Other strikes against key generals were successful and significantly degraded the command’s ability to react to and maneuver against the U.S.-led invasion force.[17][139] SAD operations officers were also successful in convincing key Iraqi army officers to surrender their units once the fighting started and/or not to oppose the invasion force.[18]
NATO member Turkey refused to allow its territory to be used by the U.S. Army’s 4th Infantry Division for the invasion. As a result, the SAD/SOG, U.S. Army special forces joint teams, the Kurdish Peshmerga and the 173d Airborne Brigade were the entire northern force against the Iraqi army during the invasion. Their efforts kept the 13 divisions of the Iraqi Army in place to defend against the Kurds rather allowing them to contest the coalition force coming from the south.[134] This combined U.S. special operations and Kurdish force defeated the Iraqi Army.[17] Four members of the SAD/SOG team received CIA’s rare Intelligence Star for “extraordinary heroism”.[18]
The mission that captured Saddam Hussein was called “Operation Red Dawn“. It was planned and carried out by JSOC’s Delta Force and SAD/SOG teams (together called Task Force 121). The operation eventually included around 600 soldiers from the 1st Brigade of the 4th Infantry Division.[140][141] Special operations troops probably numbered around 40. Much of the publicity and credit for the capture went to the 4th Infantry Division soldiers, but CIA and JSOC were the driving force. “Task Force 121 were actually the ones who pulled Saddam out of the hole” said Robert Andrews, former deputy assistant Secretary of Defense for special operations and low-intensity conflict. “They can’t be denied a role anymore.”[140]
CIA paramilitary units continued to team up with the JSOC in Iraq and in 2007 the combination created a lethal force many credit with having a major impact in the success of “the Surge“. They did this by killing or capturing many of the key al-Qaeda leaders in Iraq.[142][143] In a CBS60 Minutes interview, Pulitzer Prize-winning journalist Bob Woodward described a new special operations capability that allowed for this success. This capability was developed by the joint teams of CIA and JSOC.[144] Several senior U.S. officials stated that the “joint efforts of JSOC and CIA paramilitary units was the most significant contributor to the defeat of al-Qaeda in Iraq”.[142][145]
In May 2007, Marine Major Douglas A. Zembiec was serving in SAD Ground Branch in Iraq when he was killed by small arms fire while leading a raid.[146][147] Reports from fellow paramilitary officers stated that the flash radio report sent was “five wounded and one martyred”[148] Major Zembiec was killed while saving his soldiers, Iraqi soldiers. He was honored with an intelligence star for his valor in combat.[149]
On October 26, 2008, SAD/SOG and JSOC conducted an operation in Syria targeting the “foreign fighter logistics network” bringing al-Qaeda operatives into Iraq (See 2008 Abu Kamal raid).[150] A U.S. source told CBS News that “the leader of the foreign fighters, an al-Qaeda officer, was the target of Sunday’s cross-border raid.” He said the attack was successful, but did not say whether or not the al-Qaeda officer was killed.[151]Fox News later reported that Abu Ghadiya, “al-Qa’ida’s senior coordinator operating in Syria”, was killed in the attack.[152]The New York Times reported that during the raid U.S. forces killed several armed males who “posed a threat”.[153]
In September 2014 with the rise of the Islamic State, the U.S. government began aggressive military operations against them in both Iraq and Syria. SAD Ground Branch was placed in charge of the ground war.[154] This is a testament to SAD being the preeminent force for unconventional warfare and their long-standing relationship with the most effective fighting force in the region, the Kurdish Peshmerga.[155]
SAD/SOG has been very active “on the ground” inside Pakistan targeting al-Qaeda operatives for Unmanned Aerial Vehicle (UAV) Predator strikes and along with USSOCOM elements they have been training Pakistani Special Service Group Commandos.[156] Before leaving office, President George W. Bush authorized SAD’s successful killing of eight senior al-Qaeda operatives via targeted air strikes.[157] Among those killed were the mastermind of a 2006 plot to detonate explosives aboard planes flying across the Atlantic Rashid Rauf and the man thought to have planned the Islamabad Marriott Hotel bombing on September 20, 2008 that killed 53 people.[158][159] The CIA Director authorized the continuation of these operations and on January 23, SAD/SOG performed killings of 20 individuals in northwestern Pakistan that were terrorists. Some experts assess that the CIA Director – at that time Leon Panetta – has been more aggressive in conducting paramilitary operations in Pakistan than his predecessor.[160] A Pakistani security official stated that other strikes killed at least 10 insurgents, including five foreign nationals and possibly “a high-value target” such as a senior al-Qaeda or Taliban official.[161] On February 14, the CIA drone killed 27 taliban and al-Qaeda fighters in a missile strike in south Waziristan, a militant stronghold near the Afghan border where al-Qaeda leaders Osama bin Laden and Ayman al-Zawahri were believed to be hiding.[162]
According to the documentary film Drone, by Tonje Schei, since 2002 the U.S. Air Force17th Reconnaissance Squadron has been working for the CIA as “customer”, carrying out at least some of the armed missions in Pakistan.[163]
In a National Public Radio (NPR) report dated February 3, 2008, a senior official stated that al-Qaeda has been “decimated” by SAD/SOG’s air and ground operations. This senior U.S. counter-terrorism official goes on to say, “The enemy is really, really struggling. These attacks have produced the broadest, deepest and most rapid reduction in al-Qaida senior leadership that we’ve seen in several years.”[164] President Obama’s CIA Director Leon Panetta stated that SAD/SOG’s efforts in Pakistan have been “the most effective weapon” against senior al-Qaeda leadership.[165][166]
These covert attacks have increased significantly under President Obama, with as many at 50 al-Qaeda militants being killed in the month of May 2009 alone.[167][168][169] In June 2009, sixty Taliban fighters were killed while at a funeral to bury fighters that had been killed in previous CIA attacks.[170] On July 22, 2009, National Public Radio reported that U.S. officials believe Saad bin Laden, a son of Osama bin Laden, was killed by a CIA strike in Pakistan. Saad bin Laden spent years under house arrest in Iran before traveling last year to Pakistan, according to former National Intelligence Director Mike McConnell. It’s believed he was killed sometime in 2009. A senior U.S. counter-terrorism said U.S. intelligence agencies are “80 to 85 percent” certain that Saad bin Laden is dead.[171]
On August 6, 2009, the CIA announced that Baitullah Mehsud was killed by a SAD/SOG drone strike in Pakistan.[172]The New York Times said, “Although President Obama has distanced himself from many of the Bush administration’s counter-terrorism policies, he has embraced and even expanded the C.I.A.’s covert campaign in Pakistan using Predator and Reaper drones”.[172] The biggest loss may be to “Osama bin Laden’s al-Qa’ida”. For the past eight years, al-Qaeda had depended on Mehsud for protection after Mullah Mohammed Omar fled Afghanistan in late 2001. “Mehsud’s death means the tent sheltering Al Qaeda has collapsed,” an Afghan Taliban intelligence officer who had met Mehsud many times told Newsweek. “Without a doubt he was Al Qaeda’s No. 1 guy in Pakistan,” adds Mahmood Shah, a retired Pakistani Army brigadier and a former chief of the Federally Administered Tribal Area, or FATA, Mehsud’s base.[173]
Airstrikes from CIA drones struck targets in the Federally Administered Tribal Areas (FATA) of Pakistan on September 8, 2009. Reports stated that seven to ten militants were killed to include one top al-Qaida leaders. He was Mustafa al-Jaziri, an Algerian national described as an “important and effective” leader and senior military commander for al-Qaida. The success of these operations are believed to have caused senior Taliban leaders to significantly alter their operations and cancel key planning meetings.[174][175]
The CIA is also increasing its campaign using Predator missile strikes on al-Qaeda in Pakistan. The number of strikes in 2009 exceeded the 2008 total, according to data compiled by the Long War Journal, which tracks strikes in Pakistan.[108] In December 2009, the New York Times reported that President Obama ordered an expansion of the drone program with senior officials describing the program as “a resounding success, eliminating key terrorists and throwing their operations into disarray”.[176] The article also cites a Pakistani official who stated that about 80 missile attacks in less than two years have killed “more than 400” enemy fighters, a number lower than most estimates but in the same range. His account of collateral damage was strikingly lower than many unofficial counts: “We believe the number of civilian casualties is just over 20, and those were people who were either at the side of major terrorists or were at facilities used by terrorists.”[176]
On December 6, 2009, a senior al-Qaeda operative, Saleh al-Somali, was killed in a drone strike in Pakistan. He was responsible for their operations outside of the Afghanistan-Pakistan region and formed part of the senior leadership. Al-Somali was engaged in plotting terrorist acts around the world and “given his central role, this probably included plotting attacks against the United States and Europe”.[177][178] On December 31, 2009, senior Taliban leader and strong Haqqani ally Haji Omar Khan, brother of Arif Khan, was killed in the strike along with the son of local tribal leader Karim Khan.[179]
In January 2010, al-Qaeda in Pakistan announced that Lashkar al-Zil leader Abdullah Said al Libi was killed in a drone missile strike. Neither al-Qaeda nor the US has revealed the date of the attack that killed Libi.[180] On January 14, 2010, subsequent to the suicide attack at Camp Chapman, the CIA located and killed the senior Taliban leader in Pakistan, Hakimullah Mehsud. Mehsud had claimed responsibility in a video he made with the suicide bomber Humam Khalil Abu-Mulal al-Balawi.[181]
On February 5, 2010, the Pakistani Inter-Services Intelligence (ISI) and CIA’s SAD/SOG conducted a joint raid and apprehended Mullah Abdul Ghani Baradar. Baradar was the most significant Taliban figure to be detained since the beginning of the Afghan War more than eight years ago until that date. He ranked second to Mullah Muhammad Omar, the Taliban’s founder and was known to be a close associate of Osama bin Laden. Mullah Baradar was interrogated by CIA and ISI officers for several days before news of his capture was released.[182] This capture sent the message that the Taliban leadership is not safe in Afghanistan or Pakistan.[183] “The seizure of the Afghan Taliban’s top military leader in Pakistan represents a turning point in the U.S.-led war against the militants”, U.S. officials and analysts said.[184] Per Pakistani Interior Minister Rehman Malik, several raids in Karachi in early February netted dozens of suspected Afghan militants.[184] In other joint raids that occurred around the same time, Afghan officials said that the Taliban “shadow governorsP for two provinces in northern Afghanistan had also been detained. Mullah Abdul Salam, the Taliban’s leader in Kunduz, and Mullah Mir Mohammed of Baghlan were captured in Akora Khattack.[185]
On February 20, Muhammad Haqqani, son of Jalaluddin Haqqani, was one of four people killed in the drone strike in Pakistan’s tribal region in North Waziristan, according to two Pakistani intelligence sources.[186]
On May 31, 2010, the New York Times reported that Mustafa Abu al Yazid (AKA Saeed al Masri), a senior operational leader for Al Qaeda, was killed in an American missile strike in Pakistan’s tribal areas.[187]
From July to December 2010, predator strikes killed 535 suspected militants in the FATA to include Sheikh Fateh Al Misri, Al-Qaeda’s new third in command on September 25.[188] Al Misri was planning a major terrorist attack in Europe by recruiting British Muslims who would then go on a shooting rampage similar to what transpired in Mumbai in November 2008.[189]
The operation in the Bilal military cantonment area in the city of Abbottabad resulted in the acquisition of extensive intelligence on the future attack plans of al-Qaeda.[194][195][196] The body of bin Laden was flown to Afghanistan to be identified and then out to the USS Carl Vinson for a burial at sea.[197] DNA from bin Laden’s body, compared with DNA samples on record from his dead sister, confirmed his identity.
The operation was a result of years of intelligence work that included the Inter-Services Intelligence (ISI), the CIA, the DSS, and the Delta Force‘s, apprehension and interrogation of Khalid Sheik Mohammad (KSM),[198][199][200] the discovery of the real name of the courier disclosed by KSM, the tracking, via signal intelligence, of the courier to the Abbottobad compound by paramilitary operatives and the establishment of a CIA safe house that provided critical advance intelligence for the operation.[201][202][203][203]
The material discovered in the raid indicated that bin Laden was still in charge of his Al-Qaeda organization and was developing plans and issuing orders at the time of his death. There is considerable controversy over claims that elements of the Pakistani government, particularly the ISI, may have been concealing the presence of Osama bin Laden in Pakistan.[204][205][206] Bin Laden’s death has been labeled a “game changer” and a fatal blow to Al-Qaeda, by senior U.S. officials.[207]
Iran
In the early 1950s, the Central Intelligence Agency and Britain’s Secret Intelligence Service were ordered to overthrow the government of Iran, Prime Minister Mohammed Mosaddeq, and re-install deposed ShahMohammad Reza Pahlavi.[208] This event was called Operation Ajax.[209][210] The senior CIA officer was Kermit Roosevelt, Jr., the grandson of American president Theodore Roosevelt. The operation utilized all of SAD’s components to include political action, covert influence and paramilitary operations. The paramilitary component included training anti-Communist guerrillas to fight the Tudeh Party if they seized power in the chaos of Operation Ajax.[211] Although a significant tactical/operational success, Operation Ajax is considered very controversial with many critics.[212]
On March 9, 2007 alleged CIA Agent Robert Levinson was kidnapped from Iran’s Kish Island. On July 7, 2008, Pulitzer Prize winning investigative journalist and author Seymour Hersh wrote an article in the New Yorker stating that the Bush Administration had signed a Presidential Finding authorizing the CIA to begin cross border paramilitary operations from Iraq and Afghanistan into Iran. These operations would be against Quds Force, the commando arm of the Iranian Revolutionary Guard, public and private sector strategic targets, and “high-value targets” in the war on terror. Also enrolled to support CIA objectives were the Mujahideen-e-Khalq, known in the West as the M.E.K.,and the Baluchis insurgents. “The Finding was focused on undermining Iran’s nuclear ambitions and trying to undermine the government through regime change,” a person familiar with its contents said, and involved “working with opposition groups and passing money.”[215] Any significant effort against Iran by the Obama Administration would likely come directly from SAD.[216] and in July 2010, Director Panetta chose a former chief of SAD as the new NCS Director.[217]
Libya
After the Arab Spring movements overthrew the rulers of Tunisia and Egypt, its neighbours to the west and east respectively, Libya had a major revolt beginning in February 2011.[218][219] In response, the Obama administration sent in SAD paramilitary operatives to assess the situation and gather information on the opposition forces.[220][221] Experts speculated that these teams could be determining the capability of these forces to defeat the Muammar Gaddafi regime and whether Al-Qaeda had a presence in these rebel elements.
U.S. officials had made it clear that no U.S. troops would be “on the ground”, making the use of covert paramilitary operatives the only alternative.[222] During the early phases of the Libyan offensive of U.S. led air strikes, paramilitary operatives assisted in the recovery of a U.S. Air Force pilot who had crashed due to mechanical problems.[223][224] There was speculation that President Obama issued a covert action finding in March 2011 that authorizes the CIA to carry out a clandestine effort to provide arms and support to the Libyan opposition.[225]
Syria
CIA paramilitary teams have been deployed to Syria to report on the uprising, to access the rebel groups, leadership and to potentially train, equip and lead one of those rebel groups against the Bashar al-Assad regime.[226] In early September 2013, President Obama told U.S. Senators that the CIA had trained the first 50-man insurgent element and that they had been inserted into Syria.[227] The deployment of this unit and the supplying of weapons may be the first tangible measure of support since the U.S. stated they would begin providing assistance to the opposition.[228][229]
In October 2013, SAD was tasked with overthrowing the Syrian government of Bashar al-Assad. This program was considered too limited to have the desired outcome.[230] However, with the rise of the Islamic State, SAD was given the overall command and control of the ground fight against them. This fight will cross the borders between Iraq and Syria.[154][231]
The CIA has always had a Special Activities Division, which secretly carries out special operations mission. However, since September 11, 2001 the US government has relied much more on SAD/SOG because fighting terrorists does not usually involve fighting other armies. Rather, it involves secretly moving in and out of countries like Pakistan, Iran and Somalia where the American military is not legally allowed to operate.[232]
If there are missions in these countries that are denied to U.S. military special operations forces, SAD/SOG units are the primary national special missions units to execute those operations.[233]
In the War on Terror, SAD has the lead in the covert war being waged against al Qaeda.[11][234] SAD/SOG paramilitary teams have apprehended many of the senior leaders. These include: Abu Zubaydah,[235] the chief of operations for al-Qaeda; Ramzi bin al-Shibh,[236] the so-called the “20th hijacker”;[237]Khalid Sheikh Mohammed, the mastermind of the September 11, 2001 attacks on New York City and Washington, D.C.;[238]Abd al-Rahim al-Nashiri, alleged to be the mastermind of the USS Cole bombing and leader of al Qaeda operations in the Persian Gulf prior to his capture in November 2002;[239]Abu Faraj al-Libi, al Qaeda’s “field general” believed to have taken the role of No. 3 in al Qaeda following the capture of Khalid Sheikh Mohammed in Pakistan;[240] and Mullah Abdul Ghani Baradar, the number two taliban commander and the highest level taliban commander apprehended in the Afghan War.[241] Prior to the beginning of the “War on Terror”, SAD/SOG located and captured many notable militants and international criminals, including Abimael Guzman and Carlos the Jackal. These were just three of the over 50 caught by SAD/SOG just between 1983 and 1995.[242]
In 2002, the George W. Bush Administration prepared a list of “terrorist leaders” the CIA is authorized to kill in a targeted killing, if capture is impractical and civilian casualties can be kept to an acceptable number. The list includes key al Qaeda leaders like Osama bin Laden (deceased) and his chief deputy, Ayman al-Zawahiri, as well as other principal figures from al Qaeda and affiliated groups. This list is called the “high value target list”.[243] The U.S. president is not legally required to approve each name added to the list, nor is the CIA required to obtain presidential approval for specific attacks, although the president is kept well informed about operations.[243]
SAD/SOG teams have been dispatched to the country of Georgia, where dozens of al Qaeda fugitives from Afghanistan are believed to have taken refuge with Chechen separatists and thousands of refugees in the Pankisi Gorge. Their efforts have already resulted in 15 Arab militants linked to al Qaeda being captured.[125]
The SAD/SOG teams have also been active in the Philippines, where 1,200 U.S. military advisers helped to train local soldiers in “counter-terrorist operations” against Abu Sayyaf, a radical Islamist group suspected of ties with al Qaeda. Little is known about this U.S. covert action program, but some analysts believe that “the CIA’s paramilitary wing, the Special Activities Division (SAD), has been allowed to pursue terrorist suspects in the Philippines on the basis that its actions will never be acknowledged”.[125]
On July 14, 2009, several newspapers reported that DCIA Leon Panetta was briefed on a CIA program that had not been briefed to the oversight committees in Congress. Panetta cancelled the initiative and reported its existence to Congress and the President. The program consisted of teams of SAD paramilitary officers organized to execute targeted killing operations against al Qaeda operatives around the world in any country. According to the Los Angeles Times, DCIA Panetta “has not ruled out reviving the program”.[11] There is some question as to whether former Vice President Dick Cheney instructed the CIA not to inform Congress.[244] Per senior intelligence officers, this program was an attempt to avoid the civilian casualties that can occur during predator drone strikes using Hellfire missiles.[245][246]
According to many experts, the Obama administration has relied on the CIA and their paramilitary capabilities, even more than they have on U.S. military forces, to maintain the fight against terrorists in the Afghanistan and Pakistan region, as well as places like Yemen, Somalia and North Africa.[247][248] Ronald Kessler states in his book The CIA at War: Inside the Secret War Against Terror, that although paramilitary operations are a strain on resources, they’re winning the war against terrorism.[247][249]
SAD/SOG paramilitary officers executed the clandestine evacuation of U.S. citizens and diplomatic personnel in Somalia, Iraq (during the Persian Gulf War) and Liberia during periods of hostility, as well as the insertion of Paramilitary Operations Officers prior to the entry of U.S. military forces in every conflict since World War II.[250] SAD officers have operated covertly since 1947 in places such as North Korea, Vietnam, Laos, Cambodia, Lebanon, Iran, Syria, Libya, Iraq, El Salvador, Guatemala, Colombia, Mexico, Nicaragua, Honduras, Chile, Bosnia and Herzegovina, Serbia, Somalia, Kosovo, Afghanistan and Pakistan.[251]
The Fulton surface-to-air recovery system (STARS) is a system developed in the early 1950s by CIA paramilitary officers for retrieving persons on the ground from a MC-130E Combat Talon I aircraft. It uses a harness and a self-inflating balloon that carries an attached lift line. An MC-130E engages the line with its V-shaped yoke and the individual is reeled on board.[252]Project COLDFEET was a very successful mission in 1962 in which two military officers parachuted into a remote abandoned Soviet site in the Arctic. The two were subsequently extracted by the Fulton sky hook. The team gathered evidence of advanced research on acoustical systems to detect under-ice US submarines and efforts to develop Arctic anti-submarine warfare techniques.[253]
Sergeant Major (SgtMaj) Billy Waugh was a Special Forces soldier attached to CIA in the 1960s. During his time at MACV-SOG in Vietnam, he developed and conducted the first combat High Altitude-Low Opening (HALO) jump, “In October 1970, my team made a practice Combat Infiltration into the NVA owned War Zone D, in South Vietnam, for reassembly training, etc. This was the first one in a combat zone.”[254] HALO is a method of delivering personnel, equipment, and supplies from a transport aircraft at a high altitude via free-fall parachute insertion. HALO and HAHO (High Altitude-High Opening) are also known as Military Free Fall (MFF). In the HALO technique, the parachutist opens his parachute at a low altitude after free-falling for a period of time to avoid detection by the enemy. Waugh also led the last combat special reconnaissance parachute insertion into enemy territory occupied by communist North Vietnamese Army (NVA) troops on June 22, 1971.[255]
On October 25, 2003, paramilitary officers Christopher Mueller and William “Chief” Carlson were killed while conducting an operation to kill/capture high level al-Qa’ida leaders near Shkin, Afghanistan. Both these officers were honored with Stars on the CIA Memorial Wall at their Headquarters in Langley, Virginia.[256] “The bravery of these two men cannot be overstated,” Director of Central Intelligence George J. Tenet told a gathering of several hundred Agency employees and family members. “Chris and Chief put the lives of others ahead of their own. That is heroism defined.” Mueller, a former US Navy SEAL and Carlson, a former Army Special Forces soldier, Delta Force operator, and member of the Blackfeet Nation in Montana, died while on this covert operation. Both officers saved the lives of others, including Afghan soldiers, during the engagement with al-Qa’ida forces.[256][257][258] In Oliver North’s book American Heroes in Special Operations, a chapter is devoted to their story.[259]
Notable political action officers
Virginia Hall Goillot started as the only female paramilitary officer in the OSS. She shot herself in the leg while hunting in Turkey in 1932, which was then amputated below the knee. She parachuted into France to organize the resistance with her prosthesis strapped to her body. She was awarded the Distinguished Service Cross. She married an OSS officer named Paul Goillot and the two joined the CIA as paramilitary operations officers in SAD. Once aboard, Mrs. Goillot made her mark as a political action officer playing significant roles in the Guatemala and Guyana operations. These operations involved the covert removal of the governments of these two countries, as directed by the President of the United States.[260]
E. Howard Hunt (October 9, 1918 – January 23, 2007) was an Ivy league educated Naval officer who joined the CIA in 1949 after serving with the OSS in World War II. Hunt was a political action officer in what came to be called their Special Activities Division.[261] He became station chief in Mexico City in 1950, and supervised William F. Buckley, Jr., (Not to be confused with a famous SAD Paramilitary Officer of the same name) who worked for the CIA in Mexico during the period 1951–1952. Buckley, another SAD political action specialist, only served briefly in the CIA and went on to be considered the father of the modern American conservative movement. Buckley and Hunt remained lifelong friends.[262] Hunt ran Operation PBSUCCESS, which overthrew the government in Guatemala in 1954, was heavily involved in the Bay of Pigs Invasion operation, frequently mentioned in the JFK assassination, and was one of the operatives in the Watergate scandal.[263] Hunt was also a well-known author with over 50 books to his credit. These books were published under several alias names and several were made into motion pictures.[264]
David Atlee Phillips Perhaps the most famous propaganda officer ever to serve in CIA, Phillips began his career as a journalist and amateur actor in Buenos Aires, Argentina. He joined the Agency in the 1950s and was one of the chief architects of the operation to overthrow Communist president Arbenz in Guatemala in 1954. He was later heavily engaged as a principal member of the Bay of Pigs Task Force at Langley, and in subsequent anti-Castro operations throughout the 1960s. He founded the Association of Former Intelligence Officers (AFIO) after successfully contesting a libel suit against him.
The CIA Memorial Wall is located at CIA headquarters in Langley, Virginia. It honors CIA employees who died in the line of duty.[265] As of August 6, 2012, there were 103 stars carved into the marble wall,[266] each one representing an officer. A majority of these were paramilitary officers.[265] A black book, called the “Book of Honor”, lies beneath the stars and is encased in an inch-thick plate of glass.[266] Inside this book are stars, arranged by year of death, and the names of 77 employees who died in CIA service alongside them.[265][266] The other names remain secret, even in death.[265]
Story 1: Is President Obama Sabotaging The Federal Bureau of Investigation Of Hillary Clinton’s Handling of Classified Documents? American People Want To Know — Will Hillary Clinton Be Indicted or Nominated? Yes Hillary Will Be Indicted For Violation of 18 U.S. Code § 793 and §798 and §1924 — Biden Backup to Replace Hillary Clinton — California Governor Jerry Brown To Enter Race? — Videos
FBI Probe: Hillary Clinton Could Face 10 Years In Prison
Obama Calls Clinton Secret Server A “Mistake,” Says Questions About Her Actions “Legitimate”
Firebrand Trey Gowdy Dismantles Ex-Staffer’s Claim That Benghazi Committee Is Partisan
MSNBC Panel: Even The President Says Hillary Clinton’s Emails Are A Legitimate Issue
Top Republican: Hillary Clinton still withholding Benghazi emails
Hillary Clinton’s Favorability Numbers at the Lowest Since 1992
Obama: Criticism Of Hillary Clinton’s Private Email ‘Ginned Up’ Because Of Politics
FBI FURY: OBAMA SABOTAGING HILLARY INVESTIGATION
Rand Paul: Clinton Fired an ambassador for using a private email server; 10-16-2015
Obama Tells ‘60 Minutes’ Hillary Clinton Made Email ‘Mistake’
MSNBC: CIA’s Most Closely Guarded Information Passed Through Clinton Email
Wife of Imprisoned CIA Whistleblower Jeffrey Sterling Speaks Out October 15, 2015
Unprecedented News Conference: Thursday, October 15, 2015, National Press Club, Washington
Jeffrey Sterling was convicted under the Espionage Act as a source for New York Times reporter James Risen’s book State of War. He began serving his three-and-a-half year prison sentence in June. His wife’s news conference was the first time the spouse of a CIA whistleblower has made such an appearance.
National Press Club President John Hughes opened the conference, which featured:
* Thomas Drake
* Delphine Halgand
* Ray McGovern
* Jesselyn Radack
Clinton’s Deleted Emails On ‘Cloud’ Server
The saga over Hillary Clinton’s private use of an email server continues. The FBI is now investigating deleted emails from a “cloud” storage system. On Friday October 2, 2015 Platte River and Clinton’s officials gave written consent for Datto Inc. (a Connecticut-based tech company) to release Clinton’s emails to the FBI. Deputy Press Secretary at the Republican National Committee, Raffi Williams, discusses what this means for Hillary Clinton’s presidential campaign. OANN’s Matt Schuck has this story.
Uh Oh! Hillary’s Emailgate Just Got Worse! MUCH WORSE! FBI Expands…
Could Hillary Clinton face prosecution over email scandal?
Minute Memo #174 – Clinton Hiding Benghazi Emails
Newly released emails of Hillary Clinton show new legal trouble up ahead.
According to investigative reporter Sharyl Attkinsson, Clinton deliberately hid information on the Benghazi terror attack in blatant violation of Freedom of Information Act requests.
According to Attkinsson:
“The newly-released batch of Hillary Clinton emails provides further proof that Freedom of Information (FOI) law has been blatantly violated.
The documents include material directly responsive to a FOI request I made back in 2012 after the Benghazi terrorist attacks on the U.S. compounds.
However, the material was not produced at the time, as required by law.
Once again, there appears to be nobody who holds government officials and agencies accountable for their routine violation of this law. So the infractions occur frequently and with impunity.
If nobody polices our government officials and agencies–if they are above the law–then how does a lawful society function?”
Judge Napolitano: FBI Will Recommend Hillary Clinton Be Indicted
Mark Levin: Hillary Clinton in Violation of Espionage Act • Hannity • 9/2/15 •
Newsmax Prime | Alan Dershowitz talks about the FBI investigating Hillary Clinton’s email server
Hillary Jokes About FBI Investigation
September 24, 2015: Sen. Tom Cotton questions NSA Director about Clinton Emails
‘Under Penalty of Perjury’: Judge Nap on Latest Twist in Hillary’s Email Scandal
Judge Andrew Napolitano appeared on “The Kelly File” tonight to weigh in on the latest developments in the Hillary Clinton email scandal.
A federal judge has demanded that Clinton and two of her most trusted aides go on the record “under penalty of perjury” regarding the private email server Clinton used during her time as Secretary of State.
Judge Napolitano noted that when the government suspected that Gen. Petraeus kept secure documents in his home, they raided it.
In Clinton’s case, Judge Napolitano pointed out, the government doesn’t suspect she has secure documents. It’s a known fact.
Not only that, but she gave a thumb drive with that secure information to her lawyer, Judge Napolitano added.
“Mrs. Clinton should be treated like anybody else who is obviously violating the law by failing to secure classified documents and keeping them in insecure venues not approved by the government,” Judge Napolitano stated.
He said that the federal judge’s use of the phrase “under penalty of perjury” is extremely significant, because it reminds Clinton that for the first time, she will be under oath.
Morrell confirms at least one foreign country have what was on Hillary’s email server.
Hillary Emails – Trey Gowdy Lays It Out
13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined
White House Covers Up Benghazi Terrorist Attack (INCLUDING NEW REPORTS)
CIA Contractor: I Told State Department Rep. Benghazi Was Terrorist Attack
White House Covers Up Benghazi Terrorist Attack – New BBC Science Documentary HD
Obama LIED About Benghazi Attack!!! (Lt. Col. Tony Shaffer Interview)
CIA Gun Runner: Hillary’s Benghazi Crimes Confirmed
SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria
Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood
Source: FBI probe of Clinton email focused on ‘gross negligence’ provision
By Catherine Herridge, Pamela Browne
Three months after Hillary Clinton’s use of a private email address and server while secretary of state was referred to the FBI, an intelligence source familiar with the investigation tells Fox News that the team is now focused on whether there were violations of an Espionage Act subsection pertaining to “gross negligence” in the safekeeping of national defense information.
Under 18 USC 793 subsection F, the information does not have to be classified to count as a violation. The intelligence source, who spoke on the condition of anonymity citing the sensitivity of the ongoing probe, said the subsection requires the “lawful possession” of national defense information by a security clearance holder who “through gross negligence,” such as the use of an unsecure computer network, permits the material to be removed or abstracted from its proper, secure location.
Subsection F also requires the clearance holder “to make prompt report of such loss, theft, abstraction, or destruction to his superior officer. “A failure to do so “shall be fined under this title or imprisoned not more than ten years, or both.”
The source said investigators are also focused on possible obstruction of justice. “If someone knows there is an ongoing investigation and takes action to impede an investigation, for example destruction of documents or threatening of witnesses, that could be a separate charge but still remain under a single case,” the source said. Currently, the ongoing investigation is led by the Washington Field Office of the FBI.
A former FBI agent, who is not involved in the case, said the inconsistent release of emails, with new documents coming to light from outside accounts, such as that of adviser Sidney Blumenthal, could constitute obstruction. In addition, Clinton’s March statement that there was no classified material on her private server has proven false, after more than 400 emails containing classified information were documented.
Clinton and her team maintain the use of a private account was allowed, and the intelligence was not classified at the time, but later upgraded. The latter claim is disputed by the intelligence community Inspector General, who represents the agencies involved, which concluded the information was classified from the start.
One of Clinton’s primary defenses is that the emails containing classified information, did not carry classification markings, but a leading national security defense attorney says that is no excuse under the law.
“The fact that something’s not marked or that the person may not know that it was classified would not be relevant at all in a prosecution under the Espionage Act,” defense attorney Edward MacMahon Jr. recently told Fox.
It is not known what relevant evidence, if any, has been uncovered by the FBI, or whether any charges will ultimately be brought, but Director James Comey told reporters in Washington D.C. on Oct. 1, “If you know my folks… they don’t give a rip about politics.”
On Thursday, a group of national security whistleblowers held a news conference in Washington at the National Press Club to highlight what they characterized as a double standard in these types of cases.
NSA whistleblower Thomas Drake was indicted in 2010 under the Espionage Act for sharing unclassified material with a Baltimore Sun reporter. Drake, who also went to Congress with his concerns about the NSA, said his goal was to expose government misconduct.
“This is the secretary of state, one of the most targeted individuals by other intelligence entities and agencies in the world using a private server to traffic highly sensitive information and no doubt including classified information and no doubt including info about sources and methods,”Drake said at Thursday’s event.
He added the whistleblowers’ treatment shows there is a law for the average citizen, and apparently a different set of rules for the powerful.
“But hey, I’m secretary of state,” Drake said in a sarcastic tone. ”Even Obama gave her cover.”
The charges against Drake were eventually dropped. He pled guilty to a misdemeanor, but in the process lost his ability to work in national security and depleted his life savings to mount a defense.
Former CIA officer Jeffrey Sterling also went to Congress with his complaints, but was sentenced in May to three-and-a-half years in prison for violating the Espionage Act by giving classified information to a New York Times reporter. Sterling, who is appealing the case, was also convicted on obstruction of justice charges because a single email was missing from his account, even though the government could not show he was responsible for that.
Clinton has acknowledged deleting some 30,000 emails she considered personal.
In 2015, former CIA Director General David Petraeus pled guilty to a misdemeanor admitting he mishandled classified materials by sharing notebooks with his former mistress and biographer, Paula Broadwell.
He also was ordered to pay a $100,000 fine. Sterling’s supporters said he shared far less classified information with the New York Times.
“Powerful and politically connected individuals accused of the same and much worse conduct receive, at most, a slap on the wrist. Like General David Petraeus who gave away more secret information, classified at a much higher level, to his mistress and received a sweetheart plea deal for a minor misdemeanor,”Jesselyn Radack, a whistleblower and former ethics adviser to the Department of Justice, said Thursday.
“Or Hillary Clinton – she got a primetime TV apologist political spin interview from President Obama himself,” Radack added.
Eight Laws Hillary Clinton Could Be Indicted For Breaking
Kenneth P. Bergquist
Brigadier General, U.S. Army (Ret)
As a former Justice Department official, I have, of late, been asked by both Democratic and Republican friends whether Hillary Clinton could be indicted for her email related actions. The simple answer is yes — she, and perhaps some of her senior staff, could be indicted for violating a number of federal criminal statutes. But for reasons that will be discussed later, it is unlikely that she will be.
Nevertheless, it is well worth discussing the various criminal provisions of federal law that she and others may have been violated based on mainstream news reports. Remember that news reporting can be incorrect or incomplete — and that Hillary Clinton, and anyone else involved, deserves every presumption of innocence. Also keep in mind that an indictment is not a conviction but rather the informed opinion of a grand jury that probable cause exists to believe one or more violations of federal criminal statutes have transpired.
This intellectual and legal research exercise should commence with a brief review of the basics of criminal jurisprudence: There are two elements of a criminal offense: the prohibited conduct as defined in statute; and the mens rea or mental intent of the individual or individuals engaging in the prohibited conduct. Thus, to gain a conviction on a criminal count in an indictment, a prosecutor must prove beyond a reasonable doubt that: (1) the prohibited conduct occurred, (2) the prohibited conduct was undertaken by the defendant, and (3) the defendant had the requisite mens rea or intent at the time.
1.) 18 U.S. Code § 793 – Gathering, transmitting or losing defense information 18 U.S. Code § 798 – Disclosure of classified information
A federal prosecutor would naturally focus first on the most serious allegations: willfully transmitting or willfully retaining Top Secret and Compartmented (TS/SCI) material using a private server system. The individual who transmits and the individual who receives and retains TS/SCI information on a private server jointly share the culpability for risking the compromise and exploitation of the information by hostile intelligence services. The prosecutor’s charging document would likely include felony counts under 18 U.S. Code § 793 and under 18 U.S. Code § 798 against each transmitting individual as well as separate counts against each receiving and retaining individual. Violation of either provision of the U.S. Code cited above is a felony with a maximum prison term of ten years.
The prohibited conduct is the insecure transmission of highly classified information, as well as the receipt and retention of highly classified information in an unapproved manner. The requisite mens rea is the willful commission of the prohibited conduct and the knowledge that compromised information could result in prejudice or injury to the United States or advantage to any foreign nation. Proof of intent to disclose the classified information is not required.
2.) U.S. Code § 1924 – Unauthorized removal and retention of classified documents or material
If the federal prosecutors are of a charitable disposition and an accused person has been cooperative, the felony charges under 18 U.S. Code § 793 and 18 U.S. Code § 798 may be “pled-down” to a single or to multiple misdemeanor counts under 18 U.S. Code § 1924. A misdemeanor conviction would probably result in a period of probation and a less significant fine. The prohibited conduct is the unauthorized removal of classified information from government control or its retention in an unauthorized location. The mens rea required is the intent to remove from government control or the intent to store the classified information in an unauthorized location.
3.) 18 U.S. Code § 2071(b) — Concealment, removal, or mutilation generally
To sustain a charge under 18 U.S. Code § 2071(b), a federal prosecutor need only prove that the accused transferred and held the only copies of official government records (whether classified or not), the very existence of which was concealed from government records custodians. The mens rea required is that an accused knows that official government records were transferred or removed from the control of government records custodians. Violation of 18 U.S. Code § 2071(b) is a felony with a maximum prison term of three years.
4.) 18 U.S. Code § 641 – Public money, property or records
Again, if the federal prosecutors are of a charitable disposition and accused has been cooperative, the felony charges under 18 U.S. Code § 2071(b) can be “pled down” to a misdemeanor under 18 U.S. Code § 641. The prohibited conduct is the conversion of official records (whether classified or not) to the accused’s exclusive use and the mens rea is simply the intent to do so. Conviction on the lesser misdemeanor charge would likely result in a period of probation and the imposition of a fine.
5.) 18 U.S. Code § 1505 – Obstruction of proceedings before departments, agencies, and committees
If it can be proven that an accused destroyed, withheld, or concealed the existence of official records being sought under subpoena by a committee of Congress, the accused can be convicted of obstruction under 18 U.S. Code § 1505. The prohibited conduct includes destruction, concealment and withholding of documents, thereby impeding or obstructing the committee’s rightful pursuit of information. The mens rea is knowledge of the committee’s interest in obtaining the official records in the accused’s custody or control. Violation of 18 U.S. Code § 1505 is a felony with a maximum prison term of five years.
6.) 18 U.S. Code § 1519 — Destruction, alteration, or falsification of records in federal investigations
If it can be proven that an accused knowingly concealed the existence of official records being sought by the Department of State Inspector General (DOS/IG) or by the Federal Bureau of Investigation (FBI), such accused can be convicted of obstruction. The prohibited conduct is the concealment and withholding of documents that impede or obstruct an investigation. The mens rea is the intent to conceal or withhold. Violation of 18 U.S. Code § 1519 is a felony with a maximum prison term of twenty years.
7.) 18 U.S. Code § 1031 — Fraud against the United States
18 U.S. Code § 1343 – Fraud by wire, radio or television
18 U.S. Code § 1346 — Definition of “scheme or artifice to defraud”
18 U.S. Code § 371 – Conspiracy to defraud the United States
If it can be proven that an accused arranged for the Department of State to hire an Information Technology (IT) specialist to primarily administer and maintain a private server system owned by the accused, then the accused can be convicted of conspiracy to commit honest services fraud and probably wire fraud. The prohibited conduct is having the United States pay an employee salary and/or official travel funds for performing private services on behalf of accused. The mens rea is simply the knowledge of the employee’s status as a public servant and that the government was not fully reimbursed for the costs to the government of such services. The wire fraud conviction can be sought if it can be proven that accused used electronic means of communication in undertaking such scheme or artifice to defraud.
8.) 18 U.S. Code § 371 – Conspiracy to commit a federal offense
If any accused and any third party can be proven to have colluded in any violation of federal, criminal law, then all involved can be charged with criminal conspiracy as well as being charged with the underlying offense.
Indictment?
The old adage, that a good prosecutor can get a ham sandwich indicted, is bad news for any public servant who risks the compromise of classified information or otherwise violates any of the other federal criminal statutes listed above. Specifically, this Administration has a history of vigorously prosecuting and winning convictions in the mishandling of classified information and other criminal violations of the public trust.
However, Hillary Clinton is anything but a ham sandwich; and she knows it. She and her senior aides will not even be formally investigated by this Justice Department, much less indicted. The president will allow Hillary Clinton and her aides to “tough it out” for as long it is politically possible. However, if and when the political and public opinion costs of a “tough it out” tactic become too great, President Obama will simply use that famous pen of his to issue a succinct pardon and make formal mockery of the concept of equal justice.
Kenneth Bergquist served as a Deputy Assistant Attorney General in the United States Department of Justice during the Reagan Administration and serves now as pro bono legal counsel to the Special Operations Education Fund (OPSEC).
Story 1: American People’s Verdict On Democratic Socialist Debate: Lying Lunatic Left — Hillary Clinton — Bernie Sanders — Martin O’Malley — Lincoln Chaffee — Guilty As Charged — Indict or Nominate or Pardon Hillary Clinton — Biden Biding Time Until Benghazi Testimony of Clinton — Worse Economic Recovery Since Great Depression and 7 Years of Economic Stagnation Under Obama — No Change — No Hope — Videos
LAS VEGAS, NV – OCTOBER 13: (L-R) Democratic presidential candidates Jim Webb, U.S. Sen. Bernie Sanders (I-VT), Hillary Clinton, Martin O’Malley and Lincoln Chafee take the stage for a presidential debate sponsored by CNN and Facebook at Wynn Las Vegas on October 13, 2015 in Las Vegas, Nevada. The five candidates are participating in the party’s first presidential debate. (Photo by Joe Raedle/Getty Images)
Bernie Sanders vs. Hillary Clinton | Democratic Presidential Debate Analysis
Obama’s message to Democratic debate candidates
In a taped message to the Democratic candidates, President Barack Obama urged Democrats to work hard and fight to keep the White House in 2016.
Who were the winners and losers of the Democratic debate?
Bernie Sanders : People are sick of hearing about Hillary Clinton’s “damn emails”
Mom Of Benghazi Victim Demands Answers While Hillary Clinton Laughs Off Email Scandal
Winners and losers at first Democratic debate
Clinton and Sanders dominate first Democratic debate
The Best Moments From The First Democratic Primary Debate
Democratic debate CNN — democratic debate 2016 Full … Sanders,Clinton,Omalley,Webb,Chafee
Bernie Sanders continues to shock the political world
Hillary & Democrats May Not Cooperate With Benghazi Committee
Dem Debate #1: Mature Adults, Not Lunatics. Did Hillary or Bernie Win?
Emails Show Clinton Worked With George Soros To Run Shadow Gov’t
The real scandal surrounding Democratic presidential hopeful Hillary Clinton’s private email system may be that she was running, in concert with a private consulting firm tied closely to George Soros, an outsourced and parallel State Department answerable only to her and not President Obama, the Congress, or the American people.
Who Won The First Democratic Debate In Terms Of Body Language?
Carol Kinsey Goman
The major story of the first televised presidential debate in 1960 became the photogenic appeal of John F. Kennedy versus the sickly look of his opponent, Richard Nixon, who refused to wear makeup although his recent illness had left him with a pallid complexion. In addition, Kennedy looked directly at the camera when answering questions (rather that at the journalists who asked them), which made viewers see him as someone who was talking right to them and giving straight answers. To make matters worse, the cameras caught Nixon wiping perspiration from his forehead while Kennedy was pressing him on the issues.
When the debate ended, a large majority of television viewers recognized Kennedy as the winner. Radio listeners, who heard the debate but hadn’t seen it, gave the victory to Nixon.
Never again would politicians under estimate the importance of physical appearance and body language – especially when appearing on television. Today’s political figures are fully aware of, and heavily coached on, the impact of nonverbal communication.
And when it comes to nonverbal cues, everything matters: Gender, age, skin color, hair style, attractiveness, height, clothing, facial expressions, hand gestures, posture — audiences judge it all. Superficial? Maybe. But this potent (and often unconscious) process is also hardwired in the human brain.
There are two sets of nonverbal signals that are especially important for candidates to project: warmth and authority. Warmth cues project likeability and candor and authority cues denote power and status. The most appealing politicians (at least from a body language standpoint) are those whose behaviors encompass both sets of signals.
Which brings me to the first Democratic debate of the 2016 election cycle — and how I would grade the body language of the debaters.
Hillary Clinton, former secretary of state
Grade: A-
How she did it: Clinton is often described, by both supporters and critics, as strong, tough, and aggressive. So it was no surprise to see those qualities exhibited in her body language through expansive gestures, erect posture, and well-prepared responses.
Recommended by Forbes
MOST POPULAR Photos: The World’s Top-Earning YouTube Stars 2015
TRENDING ON FACEBOOK Bernie Sanders Clearly Won Tuesday’s Debate — On Twitter
SungardASVoice: How Cloud Orchestration Keeps Cloud Computing In Perfect Harmony
Leadership Presence And The GOP Debate
Hits And Misses From The Second GOP Debate
So, Who Won The First Republican Primary Debate of 2012? -Media Training
But Clinton’s body language won the debate by doing more than displaying authority. She successfully “warmed up” her image, with smiles, head nods in agreement/support of other’s comments, and (at one point) even laughter.
Visually, being the only woman on stage was also to her advantage. The contrast between Clinton and the rest of the (white, male) candidates was visually striking – especially for someone who wants to show how she would be different from previous presidents.
Bernie Sanders, senator of Vermont
Grade: B+
How he did it: Unlike Clinton, who (for better or worse) is a known national figure, Sanders needed to give the audience a clear picture of who he is and what he stands for – and he was very effective doing so last night. Sanders was animated and used gestures (like finger pointing and palms rotated down) to effectively emphasize his resolve – although at times, his movements were a bit jerky, instead of smooth. And for those who were wondering if a 74-year old could keep his energy high for two hours, the answer was a resounding “yes.”
Sanders nonverbal negatives include his leaning too often on the lectern (as if he needed physical support) and in his lack of warm cues. He is much more expressive when showing anger, disgust, and impatience – but rarely does he display joy or express optimism.
Martin O’Malley, former governor Maryland
Grade: C
How he did it: While he never had the “break through” moment his campaign was hoping for, nonverbally O’Malley had a significant nonverbal advantage: He looked fit and athletic – and he was the tallest person in the line up. Don’t discount the effect of these seemingly trivial facts. We are biased toward attractive, healthy people, and we unconsciously attribute leadership characteristics to tall people. (The effects of this are seen not only in politics, but in business. For example, in the U.S. population, 14.5% men are 6’ tall and over, but with CEOs of Fortune 500 companies, that statistic climbs to 58%.) But his softer, slower communication style often lacked the energy and passion needed to support his rhetoric. And his deadpan, almost angry expression when other candidates were speaking was tweeted about as the “death stare” – not a good look for someone who is usually seen as upbeat and happy.
Jim Webb, former senator of Virginia
Grade C-
How he did it: Webb is known as being “gruff” and “stiff,” and both of those qualities were displayed nonverbally: Outside of a slight lean backward and a shoulder shrug now and then, he rarely moved his body – adding to his stoic image.
Lincoln Chaffee, former governor of Rhode Island
Grade: D
How he did it: Chafee’s body language was filled with nervous facial gestures (lip licking was especially prevalent) and conflicting nonverbal messages, the most noticeable being a smile with tightened or compressed lips that made the otherwise warm signal look forced and inauthentic.
The only missing contender in last night’s debate was Vice President Joe Biden, who hasn’t declared his intention to run. Too bad. He is passionate and expressive. He would have been interesting to watch.
EVIDENCE SHOWS CLINTON RAN A PARALLEL, OUTSOURCED STATE DEPT.
Clinton received help from George Soros to run shadow gov’t
The real scandal surrounding Democratic presidential hopeful Hillary Clinton’s private email system may be that she was running, in concert with a private consulting firm tied closely to George Soros, an outsourced and parallel State Department answerable only to her and not President Obama, the Congress, or the American people.
The media has tried to separate two dubious operations of Mrs. Clinton while she was at the State Department. The first is the private email server located in her Chappaqua, New York residence. The second is the fact that her government-paid State Department personal assistant, Huma Abedin, wife of disgraced New York “sexting” congressman Anthony Weiner, was simultaneously on the payroll of Teneo, a corporate intelligence firm that also hired former President Bill Clinton and former British Prime Minister Tony Blair as advisers. Abedin has been linked to the Muslim Brotherhood, which has recently buried the hatchet with longtime rival Saudi Arabia and common cause against the Assad government in Syria, the Houthi rebels in Yemen, and Iran.
It is clear that Mrs. Clinton used her private email system to seek advice on major foreign policy issues, from her friend and paid Clinton Foundation adviser Sidney Blumenthal providing private intelligence on Libya’s post-Qaddafi government and possible business ventures to Clinton friend Lanny Davis seeking favors from Mrs. Clinton. It should be noted that Davis was a paid lobbyist for the military junta of Honduras that overthrew democratically-elected President Manuel Zelaya in 2009. It also should be noted that Mrs. Clinton voiced her personal dislike for the late Libyan leader Muammar Qaddafi, when, after he was assassinated by U.S.-armed jihadist rebels, boasted, “We came, we saw, he died!”
It was highly unusual for Abedin to receive a U.S. government paycheck while also receiving a consultant’s salary from Teneo. Teneo was founded in 2011 by Doug Band, a former counselor to Bill Clinton. Teneo, which is as much a private intelligence firm as it is an investment company and “governance” consultancy, has its headquarters in New York and branches in Washington DC, Brussels, São Paulo, London, Dublin, Dubai, Hong Kong, Beijing, and Melbourne. With the exception of its investment arm, Teneo closely resembles the former CIA-connected firm where Barack Obama worked after he graduated from Columbia, Business International Corporation (BIC). Teneo’s marketing claims match those made by BIC during its heyday: Teneo works “exclusively with the CEOs and senior leaders of many of the world’s largest and most complex companies and organizations.”
Teneo has staked a position in the international news media with its recent purchase of the London-based firm Blue Rubicon, formed in part by the former home news editor for Channel 4 News in the United Kingdom. Teneo also recently acquired London’s Stockwell Group, which provides consultancy services to the National Bank of Greece and Pireaus Bank. It appears that Mrs. Clinton’s friends are cashing in on the global banking austerity being levied against Greece.
The head of Teneo Intelligence is Jim Shinn, a former assistant secretary for Asia for the Defense Department. What is troubling is that Teneo has been offering statements to the media designed to heighten tensions between NATO and Turkey on one side and Russia on the other over Russia’s military attacks on the Islamic State in Syria. Shinn’s intelligence chief in Teneo’s London office, Wolfgango Piccoli, who has worked for the Soros-linked Eurasia Group consultancy, told CNN that Russia’s “reinforcement of the Assad regime and the consolidation of separate areas of control is more likely to prolong the conflict by forcing a stalemate.” The Teneo statement came in a CNN report that suggests members of the Bashar al Assad government in Syria and Russian President Vladimir Putin and his government could be charged by international or “national” tribunals for war crimes in a manner similar to those convened on members of the Yugoslavian and Serbian governments.
The entire International Criminal Court (ICC) in The Hague and in Africa has fallen under the control of George Soros and his operatives. Soros has made no secret of his support for overthrowing Assad and Putin and he has resorted to a “weapon of mass migration” of Syrian, Iraqi, and other refugees into Europe in order to destabilize the entire continent and endanger its Christian culture and social democratic traditions. Mrs. Clinton and Soros extensively used Mrs. Clinton’s private email system to exchange, among other things, information on the political situation in Albania, a country where Soros’s operatives are plentiful and powerful. Soros is a major donor to the Clinton Foundation and Mrs. Clinton’s presidential campaign.
Soros also pressed Mrs. Clinton for State Department support for his American University of Central Asia, which, as seen with Soros’s Central European University in Budapest and its graduate ranks of pro-U.S. leaders throughout central and eastern Europe, is designed to manufacture a new generation of pro-U.S. leaders in the Central Asian states of the former Soviet Union.
The “wiping” of Mrs. Clinton’s email systems’ hard drives appear to be part of a classic case of an intelligence operation destroying data after being exposed.
The Clinton outsourcing of U.S. foreign policy not only involves Teneo but also the Clinton Foundation, for which Mrs. Clinton solicited donations from foreign sources while she served as Secretary of State. Moreover, in a classic example of racketeering, Bill Clinton was paid by Teneo as an adviser while his Clinton Foundation hired Teneo as as a consultant. The Clinton Foundation is directed by Bill and Hillary Clinton, along with their daughter Chelsea Clinton Mezvinsky. Mrs. Clinton’s private email use also extended to Clinton Foundation chief financial officer Andrew Kessel and longtime Bill Clinton friend Bruce Lindsey.
One of the emails sent via Mrs. Clinton’s private system was from her State Department counsel Cheryl Mills to Amitabh Desai, the head of foreign policy for the Clinton Foundation. Mills wanted Desai to arrange a meeting between Rwandan dictator Paul Kagame with the Democratic Republic of Congo strongman Joseph Kabila during Kagame’s visit to Kinshasa in 2012. This effort was conducted outside the State Department with the sole exception that Assistant Secretary of State for African Affairs Johnnie Carson, a close friend of Mrs. Clinton, was involved in the email exchange with Mills and Desai.
Other private email use involved Hollywood magnate Haim Saban, Loews heir Andrew Tisch, and Lynn de Rothschild, all of whom were peddling Israel’s interests to Hillary and Bill Clinton in return for sizable donations to the Clinton Foundation and Mrs. Clinton’s presidential campaign.
Under the Clinton Giustra Enterprise Partnership, the Clinton Foundation received generous financial support totaling some $31 million from Frank Giustra, a Canadian uranium mining magnate. Giustra relied on the Clintons to use their influence to open up lucrative uranium exploitation opportunities in places like Kazakhstan and Africa.
Senator Chuck Grassley (R-IA) has been stonewalled in his attempt to obtain more information about Teneo’s relationship with Mrs. Clinton, the Clinton Foundation, and Bill Clinton.
Wayne Madsen is an investigative journalist who consistently exposes cover-ups from deep within the government. Want to be the first to learn the latest scandal? Go to WayneMadsenReport.com subscribe today!
Story 1: Obama The Tyrant Races To Have The United Nations Security Council Pass The Traitorous Terrorist Treaty Before Congress Votes It Down — Congress and President Betray The United States Constitution — Just Walk Way From Both Political Parties — Never Again Fasicism — Videos
Incredible! New George S Patton speech! Iran & modern warfare
The Iran nuclear deal. Good deal or bad deal?
George Pataki: Iran deal is bad for civilized world
White House, Democrats divided over Iran nuclear deal
KEY POINTS OF HISTORIC IRAN NUCLEAR DEAL
Bolton: Nuke Deal ‘Paves the Way’ for Iran to Get Nuclear Weapons
Mitch McConnell Fox News Sunday. McConnell On Iran Deal, Ted Cruz, Donald Trump
July 14, 2015 Fiorina on nuclear deal with Iran: Bad behavior pays
Trump reacts to Obama’s Iran deal presser, El Chapo’s escape
Key Republican Senator Corker Angry Over Iran Nuclear Deal
Blackburn: Iran Nuclear Deal is Bad for the United States
Levin: ‘U.S. Senate Just Capitulated To Obama,’ And Rewrote The Constitution’s Treaty Provision
Just Walk Way From Both Political Parties
Discusses Iran Nuclear Agreement Review Act on FOX News Channel’s “The O’Reilly Factor”
“TREATY” – The Word Congress Won’t Use
Judge Napolitano : Obama pushes World Government by signing U.N. Arms Trade Treaty (Sep 26, 2013)
Obama Bringing Iran Deal to UN, Bypassing Congress
The Four Tops Walk Away Renee
Four Tops – It’s The Same Old Song (1966)
UN ENDORSES IRAN NUCLEAR DEAL WITH 6 WORLD POWERS
The U.N. Security Council on Monday unanimously endorsed the landmark nuclear deal between Iran and six world powers and authorized a series of measures leading to the end of U.N. sanctions that have hurt Iran’s economy.
But the measure also provides a mechanism for U.N. sanctions to “snap back” in place if Iran fails to meet its obligations.
Both U.S. Ambassador Samantha Power and Iran’s U.N. Ambassador Gholamali Khoshroo called the agreement an important achievement for diplomacy, the Iranian promising to be “resolute in fulfilling its obligations” and the American pledging to be vigilant in ensuring they are carried out.
The resolution had been agreed to by the five veto-wielding council members, who along with Germany negotiated the nuclear deal with Iran. It was co-sponsored by all 15 members of the Security Council. The European Union’s foreign ministers endorsed the agreement later Monday in Brussels and pledged to implement it.
Under the agreement, Iran’s nuclear program will be curbed for a decade in exchange for potentially hundreds of billions of dollars’ worth of relief from international sanctions. Many key penalties on the Iranian economy, such as those related to the energy and financial sectors, could be lifted by the end of the year.
Iran insists its nuclear program is purely peaceful, aimed at producing nuclear energy and medical isotopes, but the United States and its Western allies believe Tehran’s real goal is to build atomic weapons. U.S. President Barack Obama has stressed that all of Iran’s pathways to a nuclear weapon are cut off for the duration of the agreement and Iran will remove two-thirds of its installed centrifuges and get rid of 98 percent of its stockpile of uranium.
Britain’s U.N. Ambassador Matthew Rycroft said “the world is now a safer place in the knowledge that Iran cannot now build a nuclear bomb.” But Israel’s U.N. Ambassador Ron Prosor told reporters immediately after the vote that the Security Council had “awarded a great prize to the most dangerous country in the world,” calling it “a very sad day” not only for Israel but the entire world.
The document specifies that seven resolutions related to U.N. sanctions will be terminated when Iran has completed a series of major steps to curb its nuclear program and the International Atomic Energy Agency has concluded that “all nuclear material in Iran remains in peaceful activities.”
All provisions of the U.N. resolution will terminate in 10 years, including the “snap back” provision on sanctions.
But last week the six major powers – the U.S., Russia, China, Britain, France and Germany – and the European Union sent a letter, seen by The Associated Press, informing U.N. Secretary-General Ban Ki-moon that they have agreed to extend the snap back mechanism for an additional five years. They asked Ban to send the letter to the Security Council.
Obama told reporters the vote will send a strong message of international support for the agreement as the best way to ensure “that Iran does not get a nuclear weapon.” He faces strong opposition in the Republican-controlled Congress and expressed hope that members will pay attention to the vote.
Power, the U.S. ambassador, said the nuclear deal doesn’t change the United States’ “profound concern about human rights violations committed by the Iranian government or about the instability Iran fuels beyond its nuclear program, from its support for terrorist proxies to repeated threats against Israel to its other destabilizing activities in the region.”
She urged Iran to release three “unjustly imprisoned” Americans and to determine the whereabouts of Robert Levinson, a former FBI agent who vanished in Iran in 2007.
The message that diplomacy can work ran through many speeches from council members.
Iran’s Khoshroo stressed that only if commitments are fully honored “can diplomacy prevail over conflict and war in a world that is replete with violence, suffering and oppression.”
Russia’s U.N. Ambassador Vitaly Churkin said the agreement “clearly demonstrates that where there’s a political will based on realism and respect for legitimate mutual interests of the international community, the most complex tasks can be resolved.”
“Today, the Security Council has confirmed the inalienable right of Iran to develop its peaceful nuclear program, including to enrich uranium, while ensuring the comprehensive control by the IAEA,” Churkin said.
Article II, Section 2, Clause 2 of the United States Constitution, includes the Treaty Clause, which empowers the President of the United States to propose and chiefly negotiate agreements, which must be confirmed by the Senate, between the United States and other countries, which become treaties between the United States and other countries after the advice and consent of a supermajority of the United States Senate.
Full text of the clause
[The President] shall have Power, by and with the Advice and Consent of the Senate, to make Treaties, provided two thirds of the Senators present concur…
One of three types of international accord
In the United States, the term “treaty” is used in a more restricted legal sense than in international law. U.S. law distinguishes what it calls treaties from congressional-executive agreements and sole-executive agreements.[1] All three classes are considered treaties under international law; they are distinct only from the perspective of internal United States law. Distinctions among the three concern their method of ratification: by two-thirds of the Senate, by normal legislative process, or by the President alone, respectively. The Treaty Clause [2] empowers the President to make or enter into treaties with the “advice and consent” of two-thirds of theSenate. In contrast, normal legislation becomes law after approval by simple majorities in both the Senate and the House of Representatives.
Throughout U.S. history, the President has also made international “agreements” through congressional-executive agreements (CEAs) that are ratified with only a majority from both houses of Congress, or sole-executive agreements made by the President alone.[1] Though the Constitution does not expressly provide for any alternative to the Article II treaty procedure, Article I, Section 10 of the Constitution does distinguish between treaties (which states are forbidden to make) and agreements (which states may make with the consent of Congress).[3] The Supreme Court of the United States has considered congressional-executive and sole-executive agreements to be valid, and they have been common throughout American history. Thomas Jefferson explained that the Article II treaty procedure is not necessary when there is no long-term commitment:
It is desirable, in many instances, to exchange mutual advantages by Legislative Acts rather than by treaty: because the former, though understood to be in consideration of each other, and therefore greatly respected, yet when they become too inconvenient, can be dropped at the will of either party: whereas stipulations by treaty are forever irrevocable but by joint consent….[4]
A further distinction embodied in U.S. law is between self-executing treaties, which do not require additional legislative action, and non-self-executing treaties which do require the enactment of new laws.[1][5] These various distinctions of procedure and terminology do not affect the binding status of accords under international law. Nevertheless, they do have major implications under U.S. domestic law. In Missouri v. Holland, the Supreme Court ruled that the power to make treaties under the U.S. Constitution is a power separate from the other enumerated powers of the federal government, and hence the federal government can use treaties to legislate in areas which would otherwise fall within the exclusive authority of the states. By contrast, a congressional-executive agreement can only cover matters which the Constitution explicitly places within the powers of Congress and the President.[1] Likewise, a sole-executive agreement can only cover matters within the President’s authority or matters in which Congress has delegated authority to the President.[1] For example, a treaty may prohibit states from imposing capital punishment on foreign nationals, but a congressional-executive agreement or sole-executive agreement cannot.
In general, arms control agreements are often ratified by the treaty mechanism.[6] At the same time, trade agreements (such as the North American Free Trade Agreement and United States accession to the World Trade Organization) are generally voted on as a CEA, and such agreements typically include an explicit right to withdraw after giving sufficient written notice to the other parties.[7] If an international commercial accord contains binding “treaty” commitments, then a two-thirds vote of the Senate may be required.[8]
Between 1946 and 1999, the United States completed nearly 16,000 international agreements. Only 912 of those agreements were treaties, submitted to the Senate for approval as outlined in Article II of the United States Constitution. Since the Franklin Roosevelt presidency, only 6% of international accords have been completed as Article II treaties.[1] Most of these executive agreements consist of congressional-executive agreements.
Repeal
American law is that international accords become part of the body of U.S. federal law.[1] Consequently, Congress can modify or repeal treaties by subsequent legislative action, even if this amounts to a violation of the treaty under international law. This was held, for instance, in the Head Money Cases. The most recent changes will be enforced by U.S. courts entirely independent of whether the international community still considers the old treaty obligations binding upon the U.S.[1]
Additionally, an international accord that is inconsistent with the U.S. Constitution is void under domestic U.S. law, the same as any other federal law in conflict with the Constitution. This principle was most clearly established in the case of Reid v. Covert.[9] The Supreme Court could rule an Article II treaty provision to be unconstitutional and void under domestic law, although it has not yet done so.
In Goldwater v. Carter,[10] Congress challenged the constitutionality of then-president Jimmy Carter‘s unilateral termination of a defense treaty. The case went before the Supreme Court and was never heard; a majority of six Justices ruled that the case should be dismissed without hearing an oral argument, holding that “The issue at hand … was essentially a political question and could not be reviewed by the court, as Congress had not issued a formal opposition.” In his opinion, Justice Brennan dissented, “The issue of decision making authority must be resolved as a matter of constitutional law, not political discretion; accordingly, it falls within the competence of the courts”. Presently, there is no official ruling on whether the President has the power to break a treaty without the approval of Congress, and the courts also declined to interfere when President George W. Bush unilaterally withdrew the United States from the ABM Treaty in 2002, six months after giving the required notice of intent.[11]
Scope of presidential powers
Presidents have regarded the Article II treaty process as necessary where an international accord would bind a future president. For example, Theodore Roosevelt explained:
The Constitution did not explicitly give me power to bring about the necessary agreement with Santo Domingo. But the Constitution did not forbid my doing what I did. I put the agreement into effect, and I continued its execution for two years before the Senate acted; and I would have continued it until the end of my term, if necessary, without any action by Congress. But it was far preferable that there should be action by Congress, so that we might be proceeding under a treaty which was the law of the land and not merely by a direction of the Chief Executive which would lapse when that particular executive left office. I therefore did my best to get the Senate to ratify what I had done.[12]
A sole-executive agreement can only be negotiated and entered into through the president’s authority (1) in foreign policy, (2) as commander-in-chief of the armed forces, (3) from a prior act of Congress, or (4) from a prior treaty.[1] Agreements beyond these competencies must have the approval of Congress (for congressional-executive agreements) or the Senate (for treaties).
In 1972, Congress passed legislation requiring the president to notify Congress of any executive agreements that are formed.[13]
Although the nondelegation doctrine prevents Congress from delegating its legislative authority to the executive branch, Congress has allowed the executive to act as Congress’s “agent” in trade negotiations, such as by setting tariffs, and, in the case of Trade Promotion Authority, by solely authoring the implementing legislation for trade agreements. The constitutionality of this delegation was upheld by the Supreme Court in Field v. Clark (1892).
HAMILTON’S WARNING AGAINST OBAMA AND THE IRAN DEAL – FEDERALIST NO. 75
“An ambitious man might make his own aggrandizement, by the aid of a foreign power, the price of his treachery to his constituents.” Thus did Alexander Hamilton warn the American people, in Federalist No. 75, against allowing the president to make treaties alone.
Hamilton, while a supporter of executive power, nevertheless argued for the Senate’s treaty role, because “it would be utterly unsafe and improper to intrust that power to an elective magistrate of four years’ duration.”
It would be unsafe, he said, because even the most virtuous individuals, with the best of intentions, would fall prey to the temptations that negotiations with foreign powers would certainly provide.
How much more so does his advice apply to a president of lesser virtue, such as Barack Obama, who intends to decrease the power of the United States as a matter of ideological conviction, and who seeks narcissistic satisfaction in the attention a deal with Iran would temporarily provide!
Hamilton also anticipated the greed allegedly displayed by Hillary Clinton as Secretary of State, whose perambulations around the globe in service of the president’s dubious foreign policy agenda coincided with generous donations from foreign governments to her family’s personal foundation.
“An avaricious man might be tempted to betray the interests of the state to the acquisition of wealth,” Hamilton warns, prescribing the review powers of the Senate as the remedy.
And lest apologists for Obama argue that the nuclear deal with Iran is not actually a “treaty,” but merely an “executive agreement,” Hamilton leaves no doubt as to the scope of arrangements to which the Senate’s review power applies.
“The power of making treaties,” he says, concerns “CONTRACTS with foreign nations, which have the force of law, but derive it from the obligations of good faith” (original emphasis).
Congress should heed Hamilton’s warning before it is too late.
The President… shall have Power, by and with the Advice and Consent of the Senate, to make Treaties, provided two thirds of the Senators present concur….
The Treaty Clause has a number of striking features. It gives the Senate, in James Madison’s terms, a “partial agency” in the President’s foreign-relations power. The clause requires a supermajority (two-thirds) of the Senate for approval of a treaty, but it gives the House of Representatives, representing the “people,” no role in the process.
Midway through the Constitutional Convention, a working draft had assigned the treaty-making power to the Senate, but the Framers, apparently considering the traditional role of a nation-state’s executive in making treaties, changed direction and gave the power to the President, but with the proviso of the Senate’s “Advice and Consent.” In a formal sense, then, treaty-making became a mixture of executive and legislative power. Most people of the time recognized the actual conduct of diplomacy as an executive function, but under Article VI treaties were, like statutes, part of the “supreme Law of the Land.” Thus, as Alexander Hamilton explained in The Federalist No. 75, the two branches were appropriately combined:
The qualities elsewhere detailed as indispensable in the management of foreign relations point out the executive as the most fit in those transactions; while the vast importance of the trust and the operation of treaties as laws plead strongly for the participation of the whole or a portion of the legislative body in the office of making them.
Another reason for involving both President and Senate was that the Framers thought American interests might be undermined by treaties entered into without proper reflection. The Framers believed that treaties should be strictly honored, both as a matter of the law of nations and as a practical matter, because the United States could not afford to give the great powers any cause for war. But this meant that the nation should be doubly cautious in accepting treaty obligations. As James Wilson said, “Neither the President nor the Senate, solely, can complete a treaty; they are checks upon each other, and are so balanced as to produce security to the people.”
The fear of disadvantageous treaties also underlay the Framers’ insistence on approval by a two-thirds majority of the Senate. In particular, the Framers worried that one region or interest within the nation, constituting a bare majority, would make a treaty advantageous to it but prejudicial to other parts of the country and to the national interest. An episode just a year before the start of the Convention had highlighted the problem. The United States desired a trade treaty with Spain, and sought free access to the Mississippi River through Spanish-controlled New Orleans. Spain offered favorable trade terms, but only if the United States would give up its demands on the Mississippi. The Northern states, which would have benefited most from the trade treaty and cared little about New Orleans, had a majority, but not a supermajority, in the Continental Congress. Under the Articles of Confederation, treaties required assent of a supermajority (nine out of thirteen) of the states, and the South was able to block the treaty. It was undoubtedly that experience that impelled the Framers to carry over the supermajority principle from the Articles of Confederation.
At the Convention, several prominent Framers argued unsuccessfully to have the House of Representatives included. But most delegates thought that the House had substantial disadvantages when it came to treaty-making. For example, as a large body, the House would have difficulty keeping secrets or acting quickly. The small states, wary of being disadvantaged, also preferred to keep the treaty-making power in the Senate, where they had proportionally greater power.
The ultimate purpose, then, of the Treaty Clause was to ensure that treaties would not be adopted unless most of the country stood to gain. True, treaties would be more difficult to adopt than statutes, but the Framers realized that an unwise statute could simply be repealed, but an unwise treaty remained a binding international commitment, which would not be so easy to unwind.
Other questions, however, remained. First, are the provisions of the clause exclusive—that is, does it provide the only way that the United States may enter into international obligations?
While the clause does not say, in so many words, that it is exclusive, its very purpose—not to have any treaty disadvantage one part of the nation—suggests that no other route was possible, whether it be the President acting alone, or the popularly elected House having a role. On the other hand, while the Treaty Clause was, in the original understanding, the exclusive way to make treaties, the Framers also apparently recognized a class of less-important international agreements, not rising to the level of “treaties,” which could be approved in some other way. Article I, Section 10, in describing restrictions upon the states, speaks of “Treat[ies]” and “Agreement[s]…with a foreign Power” as two distinct categories. Some scholars believe this shows that not all international agreements are treaties, and that these other agreements would not need to go through the procedures of the Treaty Clause. Instead, the President, in the exercise of his executive power, could conclude such agreements on his own. Still, this exception for lesser agreements would have to be limited to “agreements” of minor importance, or else it would provide too great an avenue for evasion of the protections the Framers placed in the Treaty Clause.
A second question is how the President and Senate should interact in their joint exercise of the treaty power. Many Framers apparently thought that the President would oversee the actual conduct of diplomacy, but that the Senate would be involved from the outset as a sort of executive council advising the President. This was likely a reason that the Framers thought the smaller Senate was more suited than the House to play a key role in treaty-making. In the first effort at treaty-making under the Constitution, President George Washington attempted to operate in just this fashion. He went to the Senate in person to discuss a proposed treaty before he began negotiations. What is less clear, however, is whether the Constitution actually requires this process, or whether it is only what the Framers assumed would happen. The Senate, of course, is constitutionally authorized to offer “advice” to the President at any stage of the treaty-making process, but the President is not directed (in so many words) as to when advice must be solicited. As we shall see, this uncertainty has led, in modern practice, to a very different procedure than some Framers envisioned. It seems clear, however, that the Framers expected that the Senate’s “advice and consent” would be a close review and not a mere formality, as they thought of it as an important check upon presidential power.
A third difficult question is whether the Treaty Clause implies a Senate power or role in treaty termination. Scholarly opinion is divided, and few Framers appear to have discussed the question directly. One view sees the power to make a treaty as distinct from the power of termination, with the latter being more akin to a power of implementation. Since the Constitution does not directly address the termination power, this view would give it to the President as part of the President’s executive powers to conduct foreign affairs and to execute the laws. When the termination question first arose in 1793, Washington and his Cabinet, which included Hamilton and Thomas Jefferson, embraced this view. All of them thought Washington could, on his own authority, terminate the treaty with France if necessary to keep the United States neutral.
A second view holds that, as a matter of the general eighteenth-century understanding of the legal process, the power to take an action (such as passing a statute or making a treaty) implies the power to undo the action. This view would require the consent of the President and a supermajority of the Senate to undo a treaty. There is, however, not much historical evidence that many Framers actually held this view of treaty termination, and it is inconsistent with the common interpretation of the Appointments Clause (under which Senate approval is required to appoint but not to remove executive officers).
The third view is that the Congress as a whole has the power to terminate treaties, based on an analogy between treaties and federal laws. When the United States first terminated a treaty in 1798 under John Adams, this procedure was adopted, but there was little discussion of the constitutional ramifications.
Finally, there is a question of the limits of the treaty power. A treaty presumably cannot alter the constitutional structure of government, and the Supreme Court has said that executive agreements—and so apparently treaties—are subject to the limits of the Bill of Rights just as ordinary laws are. Reid v. Covert (1957). InGeofroy v. Riggs (1890), the Supreme Court also declared that the treaty power extends only to topics that are “properly the subject of negotiation with a foreign country.” However, at least in the modern world, one would think that few topics are so local that they could not, under some circumstances, be reached as part of the foreign-affairs interests of the nation. Some have argued that treaties are limited by the federalism interests of the states. The Supreme Court rejected a version of that argument in State of Missouri v. Holland (1920), holding that the subject matter of treaties is not limited to the enumerated powers of Congress. The revival of interest in federalism limits on Congress in such areas as state sovereign immunity, see Seminole Tribe of Florida v. Florida (1996), and the Tenth Amendment, see Printz v. United States (1997), raises the question whether these limits also apply to the treaty power, but the Court has not yet taken up these matters.
Turning to modern practice, the Framers’ vision of treaty-making has in some ways prevailed and in some ways been altered. First, it is not true—and has not been true since George Washington’s administration—that the Senate serves as an executive council to advise the President in all stages of treaty-making. Rather, the usual modern course is that the President negotiates and signs treaties independently and then presents the proposed treaty to the Senate for its approval or disapproval. Washington himself found personal consultation with the Senate to be so awkward and unproductive that he abandoned it, and subsequent Presidents have followed his example.
Moreover, the Senate frequently approves treaties with conditions and has done so since the Washington administration. If the President makes clear to foreign nations that his signature on a treaty is only a preliminary commitment subject to serious Senate scrutiny, and if the Senate takes seriously its constitutional role of reviewing treaties (rather than merely deferring to the President), the check that the Framers sought to create remains in place. By going beyond a simple “up-or-down” vote, the Senate retains some of its power of “advice”: the Senate not only disapproves the treaty proposed by the President but suggests how the President might craft a better treaty. As a practical matter, there is often much consultation between the executive and members of the Senate before treaties are crafted and signed. Thus modern practice captures the essence of the Framers’ vision that the Senate would have some form of a participatory role in treaty-making.
A more substantial departure from the Framers’ vision may arise from the practice of “executive agreements.” According to the Restatement of Foreign Relations Law of the United States, the President may validly conclude executive agreements that (1) cover matters that are solely within his executive power, or (2) are made pursuant to a treaty, or (3) are made pursuant to a legitimate act of Congress. Examples of important executive agreements include the Potsdam and Yalta agreements of World War II, the General Agreement on Tariffs and Trade, which regulated international trade for decades, and the numerous status-of-forces agreements the United States has concluded with foreign governments.
Where the President acts pursuant to a prior treaty, there seems little tension with the Framers’ vision, as Senate approval has, in effect, been secured in advance. Somewhat more troublesome is the modern practice of so-called congressional–executive agreements, by which some international agreements have been made by the President and approved (either in advance or after the fact) by a simple majority of both houses of Congress, rather than two-thirds of the Senate. Many of these agreements deal particularly with trade-related matters, which Congress has clear constitutional authority to regulate. Congressional–executive agreements, at least with respect to trade matters, are now well established, and recent court challenges have been unsuccessful. Made in the USA Foundation v. United States (2001). On the other hand, arguments for “complete interchangeability”—that is, claims that anything that can be done by treaty can be done by congressional–executive agreement—seem counter to the Framers’ intent. The Framers carefully considered the supermajority rule for treaties and adopted it in response to specific threats to the Union; finding a complete alternative to the Treaty Clause would in effect eliminate the supermajority rule and make important international agreements easier to adopt than the Framers wished.
The third type of executive agreement is one adopted by the President without explicit approval of either the Senate or the Congress as a whole. The Supreme Court and modern practice embrace the idea that the President may under some circumstances make these so-called sole executive agreements. United States v. Belmont (1937); United States v. Pink (1942). But the scope of this independent presidential power remains a serious question. The Pink and Belmont cases involved agreements relating to the recognition of a foreign government, a power closely tied to the President’s textual power to receive ambassadors (Article II, Section 3). The courts have consistently permitted the President to settle foreign claims by sole executive agreement, but at the same time have emphasized that the Congress has acquiesced in the practice. Dames & Moore v. Regan (1981);American Insurance Ass’n v. Garamendi (2003). Beyond this, the modern limits of the President’s ability to act independently in making international agreements have not been explored. With respect to treaty termination, modern practice allows the President to terminate treaties on his own. In recent times, President James Earl Carter terminated the U.S.–Taiwan Mutual Defense Treaty in 1977, and President George W. Bush terminated the ABM Treaty with Russia in 2001. The Senate objected sharply to President Carter’s actions, but the Supreme Court rebuffed the Senate in Goldwater v. Carter (1979). President Bush’s action was criticized in some academic quarters but received general acquiescence. In light of the consensus early in Washington’s administration, it is probably fair to say that presidential termination does not obviously depart from the original understanding, inasmuch as the Framers were much more concerned about checks upon entering into treaties than they were about checks upon terminating them.
Story 1: First Official Explosive Documentation From Defense Intelligence Agency (DIA) — Profiles in Deceit — Obama And Clinton Lying To The Families That Died in Benghazi and The American People — Why? Coverup of CIA Covert Operation Including Supervision of Arms Shipments Through Third Party Cutout To Syrian Rebels Including Al Qaeda and Islamic Jihadist Terrorists (Now Islamic State) And Win Second Term For Obama and First Term For Hillary Clinton — Both Incompetent and Untrustworthy Leftist Liars — Impeach Obama Now! — Videos
Defense Intelligence Agency (DIA), dated September 12, 2012, the day after the Benghazi attack
The attack was planned ten or more days prior on approximately 01 September 2012. The intention was to attack the consulate and to kill as many Americans as possible to seek revenge for U.S. killing of Aboyahiye ((ALALIBY)) in Pakistan and in memorial of the 11 September 2001 atacks on the World Trade Center buildings.
Weapons from the former Libya military stockpiles were shipped from the port of Benghazi, Libya to the Port of Banias and the Port of Borj Islam, Syria. The weapons shipped during late-August 2012 were Sniper rifles, RPG’s, and 125 mm and 155mm howitzers missiles.
During the immediate aftermath of, and following the uncertainty caused by, the downfall of the ((Qaddafi)) regime in October 2011 and up until early September of 2012, weapons from the former Libya military stockpiles located in Benghazi, Libya were shipped from the port of Benghazi, Libya to the ports of Banias and the Port of Borj Islam, Syria. The Syrian ports were chosen due to the small amount of cargo traffic transiting these two ports. The ships used to transport the weapons were medium-sized and able to hold 10 or less shipping containers of cargo.
The weapons shipped from Syria during late-August 2012 were Sniper rifles, RPG’s and 125mm and 155mm howitzers missiles. The numbers for each weapon were estimated to be: 500 Sniper rifles, 100 RPG launchers with 300 total rounds, and approximately 400 howitzers missiles [200 ea – 125mm and 200ea – 155 mm.]
The deterioration of the situation has dire consequences on the Iraqi situation and are as follows:
This creates the ideal atmosphere for AQI [al Qaeda Iraq] to return to its old pockets in Mosul and Ramadi, and will provide a renewed momentum under the presumption of unifying the jihad among Sunni Iraq and Syria, and the rest of the Sunnis in the Arab world against what it considers one enemy, the dissenters. ISI could also declare an Islamic state through its union with other terrorist organizations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory.
US Intel knew about weapons going from Benghazi to Syria
Daily News Collective For May 19, 2015
Hillary Clinton Fires Back Over Benghazi Select Committee On The Record
Hillary’s Benghazi Lies Exposed!
Hillary Clinton feigned ignorance when she was questioned about the Benghazi gun-running program by Senator Rand Paul in January 2013.
However, explosive new documents obtained by Judicial Watch prove conclusively that US intelligence agencies were fully aware weapons were being transferred from Libya to Syria before the attack.
That’s not the only Benghazi fact given the spin by the Obama Administration.
Help us spread the word about the liberty movement, we’re reaching millions help us reach millions more. Share the free live video feed link with your friends & family: http://www.infowars.com/show
Military intel predicted rise of ISIS in 2012, detailed arms shipments from Benghazi to Syria
Rep. Mike Pompeo Discusses 13 Hours At Benghazi
(FULL) 13 Hours in Benghazi: Fox News Special Report
Benghazi: The Truth Behind the Smokescreen
Herridge: Fmr. CIA Director Morell May Have Altered Benghazi Talking Points to Benefit Obama Admin
The Truth About How The US Will Save Syria
CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels
Retired Lt Gen Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi
SYRIA CNBC: Benghazi Is Not About Libya But An Operation To Put Arms & Men In Syria
Former CIA Spy: Benghazi Was CIA Operation
Benghazi Bombshell: Insiders Confirm CIA Sent Missiles to FSA Rebels
Judge Jeanine Pirro Opening Statement President Obama’s Benghazi Attack Claims
Judicial Watch: Defense, State Department Documents Reveal Obama Administration Knew that al Qaeda Terrorists Had Planned Benghazi Attack 10 Days in Advance
Administration knew three months before the November 2012 presidential election of ISIS plans to establish a caliphate in Iraq
Administration knew of arms being shipped from Benghazi to Syria
(Washington, DC) – Judicial Watch announced today that it obtained more than 100 pages of previously classified “Secret” documents from the Department of Defense (DOD)and the Department of State revealing that DOD almost immediately reported that the attack on the U.S. Consulate in Benghazi was committed by the al Qaeda and Muslim Brotherhood-linked “Brigades of the Captive Omar Abdul Rahman” (BCOAR), and had been planned at least 10 days in advance. Rahman is known as the Blind Sheikh, and is serving life in prison for his involvement in the 1993 World Trade Center bombing and other terrorist acts. The new documents also provide the first official confirmation that shows the U.S. government was aware of arms shipments from Benghazi to Syria. The documents also include an August 2012 analysis warning of the rise of ISIS and the predicted failure of the Obama policy of regime change in Syria.
The documents were released in response to a court order in accordance with a May 15, 2014, Freedom of Information Act (FOIA) lawsuit filed against both the DOD and State Department seeking communications between the two agencies and congressional leaders “on matters related to the activities of any agency or department of the U.S. government at the Special Mission Compound and/or classified annex in Benghazi.”
Spelling and punctuation is duplicated in this release without corrections.
A Defense Department document from the Defense Intelligence Agency (DIA), dated September 12, 2012, the day after the Benghazi attack, details that the attack on the compound had been carefully planned by the BOCAR terrorist group “to kill as many Americans as possible.” The document was sent to then-Secretary of State Hillary Clinton, then-Defense Secretary Leon Panetta, the Joint Chiefs of Staff and the Obama White House National Security Council. The heavily redacted Defense Department “information report” says that the attack on the Benghazi facility “was planned and executed by The Brigades of the Captive Omar Abdul Rahman (BCOAR).” The group subscribes to “AQ ideologies:”
The attack was planned ten or more days prior on approximately 01 September 2012. The intention was to attack the consulate and to kill as many Americans as possible to seek revenge for U.S. killing of Aboyahiye ((ALALIBY)) in Pakistan and in memorial of the 11 September 2001 atacks on the World Trade Center buildings.
“A violent radical,” the DIA report says, is “the leader of BCOAR is Abdul Baset ((AZUZ)), AZUZ was sent by ((ZAWARI)) to set up Al Qaeda (AQ) bases in Libya.” The group’s headquarters was set up with the approval of a “member of the Muslim brother hood movement…where they have large caches of weapons. Some of these caches are disguised by feeding troughs for livestock. They have SA-7 and SA-23/4 MANPADS…they train almost every day focusing on religious lessons and scriptures including three lessons a day of jihadist ideology.”
The Defense Department reported the group maintained written documents, in “a small rectangular room, approximately 12 meters by 6 meters…that contain information on all of the AQ activity in Libya.”
(Azuz is again blamed for the Benghazi attack in an October 2012 DIA document.)
The DOD documents also contain the first official documentation that the Obama administration knew that weapons were being shipped from the Port of Benghazi to rebel troops in Syria. An October 2012 report confirms:
Weapons from the former Libya military stockpiles were shipped from the port of Benghazi, Libya to the Port of Banias and the Port of Borj Islam, Syria. The weapons shipped during late-August 2012 were Sniper rifles, RPG’s, and 125 mm and 155mm howitzers missiles.
During the immediate aftermath of, and following the uncertainty caused by, the downfall of the ((Qaddafi)) regime in October 2011 and up until early September of 2012, weapons from the former Libya military stockpiles located in Benghazi, Libya were shipped from the port of Benghazi, Libya to the ports of Banias and the Port of Borj Islam, Syria. The Syrian ports were chosen due to the small amount of cargo traffic transiting these two ports. The ships used to transport the weapons were medium-sized and able to hold 10 or less shipping containers of cargo.
The DIA document further details:
The weapons shipped from Syria during late-August 2012 were Sniper rifles, RPG’s and 125mm and 155mm howitzers missiles. The numbers for each weapon were estimated to be: 500 Sniper rifles, 100 RPG launchers with 300 total rounds, and approximately 400 howitzers missiles [200 ea – 125mm and 200ea – 155 mm.]
The heavily redacted document does not disclose who was shipping the weapons.
Another DIA report, written in August 2012 (the same time period the U.S. was monitoring weapons flows from Libya to Syria), said that the opposition in Syria was driven by al Qaeda and other extremist Muslim groups: “the Salafist, the Muslim Brotherhood, and AQI are the major forces driving the insurgency in Syria.” The growing sectarian direction of the war was predicted to have dire consequences for Iraq, which included the “grave danger” of the rise of ISIS:
The deterioration of the situation has dire consequences on the Iraqi situation and are as follows:
This creates the ideal atmosphere for AQI [al Qaeda Iraq] to return to its old pockets in Mosul and Ramadi, and will provide a renewed momentum under the presumption of unifying the jihad among Sunni Iraq and Syria, and the rest of the Sunnis in the Arab world against what it considers one enemy, the dissenters. ISI could also declare an Islamic state through its union with other terrorist organizations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory.
Some of the “dire consequences” are blacked out but the DIA presciently warned one such consequence would be the “renewing facilitation of terrorist elements from all over the Arab world entering into Iraqi Arena.”
From a separate lawsuit, the State Department produced a document created the morning after the Benghazi attack by Hillary Clinton’s offices, and the Operations Center in the Office of the Executive Secretariat that was sent widely through the agency, including to Joseph McManus (then-Hillary Clinton’s executive assistant). At 6:00 am, a few hours after the attack, the top office of the State Department sent a “spot report” on the “Attack on U.S. Diplomatic Mission in Benghazi” that makes no mention of videos or demonstrations:
Four COM personnel were killed and three were wounded in an attack by dozens of fighters on the U.S. Diplomatic Mission in Benghazi beginning approximately 1550 Eastern Time….
The State Department has yet to turn over any documents from the secret email accounts of Hillary Clinton and other top State Department officials.
“These documents are jaw-dropping. No wonder we had to file more FOIA lawsuits and wait over two years for them. If the American people had known the truth – that Barack Obama, Hillary Clinton and other top administration officials knew that the Benghazi attack was an al-Qaeda terrorist attack from the get-go – and yet lied and covered this fact up – Mitt Romney might very well be president. And why would the Obama administration continue to support the Muslim Brotherhood even after it knew it was tied to the Benghazi terrorist attack and to al Qaeda? These documents also point to connection between the collapse in Libya and the ISIS war – and confirm that the U.S. knew remarkable details about the transfer of arms from Benghazi to Syrian jihadists,” stated Tom Fitton, Judicial Watch president. “These documents show that the Benghazi cover-up has continued for years and is only unraveling through our independent lawsuits. The Benghazi scandal just got a whole lot worse for Barack Obama and Hillary Clinton.”
In fact, she’s had a series of bad days since she announced her presidential bid April 12. But Monday was the worst of them.
In a bombshell report, the New York Times reported that Clinton, as secretary of state, used her private email to share private intelligence reports from noted conspiracy theorist and political hitman Sidney Blumenthal, at a time when Blumenthal was being paid by the Clinton Foundation and liberal political organizations that helped lay the groundwork for Clinton’s presidential campaign.
The emails included reports on Libya at a time when Blumenthal was seeking business in the country and included dubious information. The Times reported that Clinton nonetheless “took Mr. Blumenthal’s advice seriously” and “continued to pass around his emails even after other senior diplomats concluded that Mr. Blumenthal’s assessments were often unreliable.”
A second story about Clinton and Libya broke the same day, this one casting further doubt on the Obama administration’s narrative about the attacks on U.S. facilities in Benghazi on September 11, 2012, and specifically on claims Clinton made about nature of those attacks and motivations of the attackers. An intelligence report prepared by the Defense Intelligence Agency and sent to Clinton and other senior administration officials on September 12, 2012, just one day after the attacks, concluded that the attack “was planned ten or more days” in advance and was meant to “kill as many Americans as possible.” The report identifies al Qaeda-linked terrorists believed to have been involved in the assault.
Despite this, the Obama administration crafted a public narrative that the attack had evolved from a “spontaneous” protest over a YouTube video and included a wide range of individuals. Clinton cited the video in remarks at a memorial service on September 14, 2012, for those killed in the attacks. She told members of the victims’ families that the administration would bring to justice those responsible for the video. The DIA report and several other Benghazi-related documents were released to Judicial Watch pursuant to a court order in response to a FOIA request.
The DIA report further undermines the administration’s already-tattered claims that its public case was based on intelligence assessments. Emails released in response to a previous Judicial Watch requestshowed that the White House had drafted a set of political talking points that sought to blame the video and not administration policy.
That the DIA report was not released as a result of any previous Benghazi investigations raises additional questions about the administration’s unwillingness to turn over documents related to the attacks and how comprehensive those previous investigations have been. Many of the revelations that have undermined administration claims about Benghazi have come outside of the regular congressional oversight efforts, in part because of the administration’s disinclination to cooperate and in part because of the half-hearted inquiries led by the committees of jurisdiction.
Administration defenders and many in the media claimed that an additional investigation of Benghazi would be unnecessary because of these previous efforts. But these recent revelations validate the decision of House speaker John Boehner to create a select committee and make clear that there is still much more to learn. The State Department only recently turned over documents related to the State Department’s Administrative Review Board examination of Benghazi. The House Oversight Committee first requested those documents more than two years ago – on January 28, 2013. The Benghazi Select Committee is still waiting for reams of documents from the White House, the Pentagon, and the State Department.
Beyond that, of course, are questions about emails and documents that the public may never see because Hillary Clinton used private emails to circumvent the record retention requirements of the U.S. government. The committee is examining all options in its attempt to find or recover those discarded emails.
It has been nearly a month since Hillary Clinton took questions from the media. And with the growing stench of scandal it’s likely that she’ll continue to seek to avoid circumstances that might require her to provide answers. That’s a short-term solution to a long-term problem. And even a media that is ideologically sympathetic is showing signs of frustration with her games.
The Pronk Pops Show — Week in Review — September 16-22, 2017
Posted on September 25, 2017. Filed under: American History, Bomb, College, Congress, Constitution, Crime, Defense Intelligence Agency (DIA), Demographics, Diasters, Earthquake, Education, Elections, Employment, Energy, Faith, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Friends, Genocide, government, government spending, Health, Health Care, history, Illegal, Immigration, Investments, IRS, Islam, Islam, Journalism, Language, Law, Legal, liberty, Life, Links, Macroeconomics, media, Monetary Policy, Money, National Security Agency (NSA_, Natural Gas, Newspapers, Nuclear, Obamacare, People, Philosophy, Photos, Police, Political Correctness, Politics, Presidential Candidates, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religious, Security, Shite, Spying, Success, Sunni, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, The Pronk Pops Show, Trade Policiy, Video, Wahhabism, War, Wealth, Weapons of Mass Destruction, Weather, Welfare, Wisdom, Work | Tags: 16-22 September 2017, Commentary, Current Events, Japan, Mexico Earthquake 7.1 Richter Scale, North Korea, Over 225 Killed, President Donald J. Trump, Radical Islamic Terrorist Attack in London, Raymond Thomas Pronk, Rocket Man, South Korea, The Pronk Pops Show -- Week In Review, United Nations Speech, United States |
The Pronk Pops Show Podcasts
Pronk Pops Show 970, September 22, 2017
Pronk Pops Show 969, September 21, 2017
Pronk Pops Show 968, September 20, 2017
Pronk Pops Show 967, September 19, 2017
Pronk Pops Show 966, September 18, 2017
Pronk Pops Show 965, September 15, 2017
Pronk Pops Show 964, September 14, 2017
Pronk Pops Show 963, September 13, 2017
Pronk Pops Show 962, September 12, 2017
Pronk Pops Show 961, September 11, 2017
Pronk Pops Show 960, September 8, 2017
Pronk Pops Show 959, September 7, 2017
Pronk Pops Show 958, September 6, 2017
Pronk Pops Show 957, September 5, 2017
Pronk Pops Show 956, August 31, 2017
Pronk Pops Show 955, August 30, 2017
Pronk Pops Show 954, August 29, 2017
Pronk Pops Show 953, August 28, 2017
Pronk Pops Show 952, August 25, 2017
Pronk Pops Show 951, August 24, 2017
Pronk Pops Show 950, August 23, 2017
Pronk Pops Show 949, August 22, 2017
Pronk Pops Show 948, August 21, 2017
Pronk Pops Show 947, August 16, 2017
Pronk Pops Show 946, August 15, 2017
Pronk Pops Show 945, August 14, 2017
Pronk Pops Show 944, August 10, 2017
Pronk Pops Show 943, August 9, 2017
Pronk Pops Show 942, August 8, 2017
Pronk Pops Show 941, August 7, 2017
Pronk Pops Show 940, August 3, 2017
Pronk Pops Show 939, August 2, 2017
Pronk Pops Show 938, August 1, 2017
Pronk Pops Show 937, July 31, 2017
Pronk Pops Show 936, July 27, 2017
Pronk Pops Show 935, July 26, 2017
Pronk Pops Show 934, July 25, 2017
Pronk Pops Show 934, July 25, 2017
Pronk Pops Show 933, July 24, 2017
Pronk Pops Show 932, July 20, 2017
Pronk Pops Show 931, July 19, 2017
Pronk Pops Show 930, July 18, 2017
Pronk Pops Show 929, July 17, 2017
Pronk Pops Show 928, July 13, 2017
Pronk Pops Show 927, July 12, 2017
Pronk Pops Show 926, July 11, 2017
Pronk Pops Show 925, July 10, 2017
Pronk Pops Show 924, July 6, 2017
Pronk Pops Show 923, July 5, 2017
Pronk Pops Show 922, July 3, 2017
Pronk Pops Show 921, June 29, 2017
Pronk Pops Show 920, June 28, 2017
Pronk Pops Show 919, June 27, 2017
Pronk Pops Show 918, June 26, 2017
Pronk Pops Show 917, June 22, 2017
Pronk Pops Show 916, June 21, 2017
Pronk Pops Show 915, June 20, 2017
Pronk Pops Show 914, June 19, 2017
Pronk Pops Show 913, June 16, 2017
Pronk Pops Show 912, June 15, 2017
Pronk Pops Show 911, June 14, 2017
Pronk Pops Show 910, June 13, 2017
Pronk Pops Show 909, June 12, 2017
Pronk Pops Show 908, June 9, 2017
Pronk Pops Show 907, June 8, 2017
Pronk Pops Show 906, June 7, 2017
Pronk Pops Show 905, June 6, 2017
Pronk Pops Show 904, June 5, 2017
Pronk Pops Show 903, June 1, 2017
The Pronk Pops Show 970
September 22, 2017
Breaking Story 1: Rocket Man Kim Jong-Un Promises To Explode Hydrogen Bomb Over Pacific Ocean —
Story 2: The Democratic and Republican Party Failure To Completely Repeal Obamacare Including Repealing The Patient Protection and Affordable Care Act (ACA) and All Related Mandates, Regulations, Taxes, Spending and Subsidies — Obamacare Collapsing — Replace Obamacare With Free Enterprise Market Capitalism Health Insurance — Keep The Federal Government Out Of The Health Insurance and Health Care Business — Videos —
Story 3: Obama’s Secret Surveillance Spy State Scandal — Misuse of Intelligence Community For Political Purposes — Gross Abuse of Power and Political Conspiracy — Violation of Fourth Amendment — Videos —
For additional information and videos:
https://pronkpops.wordpress.com/2017/09/22/the-pronk-pops-show-970-september-22-2017-breaking-story-1-rocket-man-kim-jong-un-promises-to-explode-hydrogen-bomb-over-pacific-ocean-story-2-the-democratic-and-republican-party-failure-to-co/
The Pronk Pops Show 969
September 21, 2017
Story 1: President Trump Signs Executive Order Targeting Institutions and People Doing Business With North Korea — Communist China Trades With and Enabled North Korea Nuclear Weapon and Missile Programs — Waiting For Embargo Banning All Trade and Investment in Communist China — Videos —
Story 2: Fed To Start Quantitative Tightening In October 2017 by Selling Some ($10 Billion Per Month or $120 Billion Per Year) of $4,500 Billion Bond Portfolio As U.S. Economy Slows in 2017? — Videos
For additional information and videos:
https://pronkpops.wordpress.com/2017/09/21/the-pronk-pops-show-969-september-21-2017-story-1-president-trump-signs-executive-order-targeting-institutions-and-people-doing-business-with-north-korea-communist-china-trades-with-and-enabled/
The Pronk Pops Show 968
September 20, 2017
Breaking and Developing — Story 1: 7.1 Richter Scale Earthquake Kills Over 200 In Mexico — Videos —
Story 2: Category 4 Hurricane Marie With 155 Miles Per Hour Winds, 10 Foot Flood Surge and 20 Plus Inches of Rainfall Turns Lights Out in Puerto Rico with Widespread Flooding and Damages — Videos —
Story 3: Yes The Obama Administration Was Wiretapping The Trump Campaign and Former Trump Campaign Manager Paul Manafort — Trump Was Right and Big Lie Media Lied Again — Obama Spying Scandal Bigger Than Watergate — Videos —
Story 4: Illegal Aliens Shout Down House Minority Leader Nancy Pelosi Calling Her A Liar — When Will American Citizens Shout Down President Trump Calling Him A Liar? … President Trump and Republican Party Want Touch Back Amnesty and Pathway to Citizenship For Illegal Aliens — Majority of American People Want All Immigration Laws Enforced — Deport and Remove All 30-60 Million Illegal Aliens In United States To Country of Origin — No Republican Re-importing of Illegal Aliens With Expedited Visas and Touch Back Amnesty and Pathway to Citizenship — Employ American Citizens Not Illegal Aliens — Videos
For additional information and videos:
https://pronkpops.wordpress.com/2017/09/20/the-pronk-pops-show-968-september-20-2018-breaking-and-developing-story-1-7-1-richter-scale-earthquake-kills-over-200-in-mexico-videos-story-2-category-4-hurricane-marie-with-155-miles-per/
The Pronk Pops Show 967
September 19, 2017
Story 1: President Trump United Nations Speech Names North Korea and Iran As Threats to World Peace and Critical of Those Nations (China) Who Trade With Them –Totally Destroy North Korea And The Rocket Man Mr. Kim — Videos —
Story 2: Major 7.1 Richter Scale Killer Earthquake Hits Central Mexico — 76 Miles Southwest of Mexico City Centered in Puebla state town of Raboso, — Damages and Collapses Buildings — Over 150 Deaths — Videos —
Story 3: Category 5 Hurricane Marie With Sustained Winds of 165 Miles Per Hour and Wind Gust 195 MPH Hits Puerto Rico, British and American Virgin Islands, Dominica, Dominican Republic, Guadeloupe — Videos
For additional information and videos:
https://pronkpops.wordpress.com/2017/09/19/the-pronk-pops-show-967-september-19-2017-story-1-president-trump-united-nations-speech-names-north-korea-and-iran-as-threats-to-world-peace-and-critical-of-those-nations-china-who-trade-with-th/
The Pronk Pops Show 966
September 18, 2017
Story 1: Two Islamic Terrorists Arrested For London Train Attack — United Kingdom Threat Level Lowered From Critical To Severe — Elderly Couple Took In Several Hundred Forster Children Over The Years Including Two Suspected Terrorists — Trump: “Loser Terrorist” And “Sick And Demented” — 21-Year-Old Syrian Refugee Yahyah Farroukh Named Suspect — Videos —
Story 2: Trump Wants To Increase CIA Drone Attacks — Videos —
Story 3: Third Night Of Violence In St. Louis — Protesters And Vandals Damage Property With Over 120 Arrests And 11 Police Injured — Videos
For additional information and videos:
https://pronkpops.wordpress.com/2017/09/19/the-pronk-pops-show-966-september-18-2017-story-1-two-islamic-terrorists-arrested-for-london-train-attack-united-kingdom-threat-level-lowered-from-critical-to-severe-elderly-couple-took-in/
The Pronk Pops Show 965
September 15, 2017
Breaking Story 1: Radical Islamic Terrorist Attack — Improvised Bucket Bomb Device Explodes In United Kingdom Parson Green Tube Train Station in West London During Morning Rush Hour — 29 Injured None Seriously including Children — Threat Level Raised From Severe To Critical By Prime Minister May — Videos —
Story 2: North Korea Fires Another Ballistic Missile Over Japan — Videos —
Story 3: Conservative Commentator Ben Shapiro Allowed To Speak At University of California, Berkeley, Police Arrested Nine of The Protesters –Videos
For additional information and videos:
https://pronkpops.wordpress.com/2017/09/15/the-pronk-pops-show-965-september-15-2017-breaking-story-1-radical-islamic-terrorist-attack-bucket-bomb-device-explodes-in-united-kingdom-parson-green-tube-train-station-in-west-london-during-rush/
The Pronk Pops Show 964
September 14, 2017
Story 1: Did President Trump Betray His Supporters By Promising Citizenship or Pathway To Citizenship For Illegal Alien “Dreamers”? — Big Lie Media and Lying Lunatic Left Losers (Senate Democratic Leader Chuck Schumer and House Democratic Leader Nancy Pelosi ) Say They Have A Deal or Understanding and Rollover Republicans Support Trump (Senate Majority Leader Mitch McConnell and House Speaker Paul Ryan) — No Wall and No Deportation For 30-60 Million Illegal Aliens Including “Dreamers” — You Were Warned Not To Trust Trump — Rollover Republicans Want Touch-back Amnesty For Illegal Aliens — Hell No — Illegal Aliens Must Go — Trump Has 48 Hours To Confirm or Deny! — Political Suicide Watch Countdown — Videos
For additional information and videos:
https://pronkpops.wordpress.com/2017/09/14/the-pronk-pops-show-964-september-14-2017-story-1-did-president-trump-betray-his-supporters-by-promising-citizenship-or-pathway-to-citizenship-for-illegal-alien-dreamers-big-lie-media-and/
The Pronk Pops Show 963
September 13, 2017
Story 1: American Collectivism (Resistance Is Futile) Vs. American Individualism (I Have Not Yet Begun To Fight!) — Federal Income, Capital Gains, Payroll,Estate And Gift Taxes, Budget Deficits, National Debt, Unfunded Liabilities, Democratic And Republican Parties, Two Party Tyranny Of The Warfare And Welfare State And American Empire Are The Past — The Future Is Fair Tax Less, Surplus Budgets, No Debts, No Unfunded Liabilities, And American Independence Party With A Peace And Prosperity Economy, Representative Constitutional American Republic Are The Future — Lead, Follow Or Get Out Of The Way — Those Without Power Cannot Defend Freedom — Videos
For additional information and videos:
https://pronkpops.wordpress.com/2017/09/13/the-pronk-pops-show-963-september-13-2017-story-1-american-collectivism-resistance-is-futile-vs-american-individualism-i-have-not-yet-begun-to-fight-federal-income-capital-gains-payrol/
The Pronk Pops Show Podcasts Portfolio
Listen To Pronk Pops Podcast or Download Shows 970-971
Listen To Pronk Pops Podcast or Download Shows 963-969
Listen To Pronk Pops Podcast or Download Shows 955-962
Listen To Pronk Pops Podcast or Download Shows 946-954
Listen To Pronk Pops Podcast or Download Shows 938-945
Listen To Pronk Pops Podcast or Download Shows 926-937
Listen To Pronk Pops Podcast or Download Shows 916-925
Listen To Pronk Pops Podcast or Download Shows 906-915
Listen To Pronk Pops Podcast or Download Shows 889-896
Listen To Pronk Pops Podcast or Download Shows 884-888
Listen To Pronk Pops Podcast or Download Shows 878-883
Listen To Pronk Pops Podcast or Download Shows 870-877
Listen To Pronk Pops Podcast or Download Shows 864-869
Listen To Pronk Pops Podcast or Download Shows 857-863
Listen To Pronk Pops Podcast or Download Shows 850-856
Listen To Pronk Pops Podcast or Download Shows 845-849
Listen To Pronk Pops Podcast or Download Shows 840-844
Listen To Pronk Pops Podcast or Download Shows 833-839
Listen To Pronk Pops Podcast or Download Shows 827-832
Listen To Pronk Pops Podcast or Download Shows 821-826
Listen To Pronk Pops Podcast or Download Shows 815-820
Listen To Pronk Pops Podcast or Download Shows 806-814
Listen To Pronk Pops Podcast or Download Shows 800-805
Listen To Pronk Pops Podcast or Download Shows 793-799
Listen To Pronk Pops Podcast or Download Shows 785-792
Listen To Pronk Pops Podcast or Download Shows 777-784
Listen To Pronk Pops Podcast or Download Shows 769-776
Listen To Pronk Pops Podcast or Download Shows 759-768
Listen To Pronk Pops Podcast or Download Shows 751-758
Listen To Pronk Pops Podcast or Download Shows 745-750
Listen To Pronk Pops Podcast or Download Shows 738-744
Listen To Pronk Pops Podcast or Download Shows 732-737
Listen To Pronk Pops Podcast or Download Shows 727-731
Listen To Pronk Pops Podcast or Download Shows 720-726
Listen To Pronk Pops Podcast or DownloadShows 713-719
Listen To Pronk Pops Podcast or DownloadShows 705-712
Listen To Pronk Pops Podcast or Download Shows 695-704
Listen To Pronk Pops Podcast or Download Shows 685-694
Listen To Pronk Pops Podcast or Download Shows 675-684
Listen To Pronk Pops Podcast or Download Shows 668-674
Listen To Pronk Pops Podcast or Download Shows 660-667
Listen To Pronk Pops Podcast or Download Shows 651-659
Listen To Pronk Pops Podcast or Download Shows 644-650
Listen To Pronk Pops Podcast or Download Shows 637-643
Listen To Pronk Pops Podcast or Download Shows 629-636
Listen To Pronk Pops Podcast or Download Shows 617-628
Listen To Pronk Pops Podcast or Download Shows 608-616
Listen To Pronk Pops Podcast or Download Shows 599-607
Listen To Pronk Pops Podcast or Download Shows 590-598
Listen To Pronk Pops Podcast or Download Shows 585- 589
Listen To Pronk Pops Podcast or Download Shows 575-584
Listen To Pronk Pops Podcast or Download Shows 565-574
Listen To Pronk Pops Podcast or Download Shows 556-564
Listen To Pronk Pops Podcast or Download Shows 546-555
Listen To Pronk Pops Podcast or Download Shows 538-545
Listen To Pronk Pops Podcast or Download Shows 532-537
Listen To Pronk Pops Podcast or Download Shows 526-531
Listen To Pronk Pops Podcast or Download Shows 519-525
Listen To Pronk Pops Podcast or Download Shows 510-518
Listen To Pronk Pops Podcast or Download Shows 500-509
Listen To Pronk Pops Podcast or Download Shows 490-499
Listen To Pronk Pops Podcast or Download Shows 480-489
Listen To Pronk Pops Podcast or Download Shows 473-479
Listen To Pronk Pops Podcast or Download Shows 464-472
Listen To Pronk Pops Podcast or Download Shows 455-463
Listen To Pronk Pops Podcast or Download Shows 447-454
Listen To Pronk Pops Podcast or Download Shows 439-446
Listen To Pronk Pops Podcast or Download Shows 431-438
Listen To Pronk Pops Podcast or Download Shows 422-430
Listen To Pronk Pops Podcast or Download Shows 414-421
Listen To Pronk Pops Podcast or Download Shows 408-413
Listen To Pronk Pops Podcast or Download Shows 400-407
Listen To Pronk Pops Podcast or Download Shows 391-399
Listen To Pronk Pops Podcast or Download Shows 383-390
Listen To Pronk Pops Podcast or Download Shows 376-382
Listen To Pronk Pops Podcast or Download Shows 369-375
Listen To Pronk Pops Podcast or Download Shows 360-368
Listen To Pronk Pops Podcast or Download Shows 354-359
Listen To Pronk Pops Podcast or Download Shows 346-353
Listen To Pronk Pops Podcast or Download Shows 338-345
Listen To Pronk Pops Podcast or Download Shows 328-337
Listen To Pronk Pops Podcast or Download Shows 319-327
Listen To Pronk Pops Podcast or Download Shows 307-318
Listen To Pronk Pops Podcast or Download Shows 296-306
Listen To Pronk Pops Podcast or Download Shows 287-295
Listen To Pronk Pops Podcast or Download Shows 277-286
Listen To Pronk Pops Podcast or Download Shows 264-276
Listen To Pronk Pops Podcast or Download Shows 250-263
Listen To Pronk Pops Podcast or Download Shows 236-249
Listen To Pronk Pops Podcast or Download Shows 222-235
Listen To Pronk Pops Podcast or Download Shows 211-221
Listen To Pronk Pops Podcast or Download Shows 202-210
Listen To Pronk Pops Podcast or Download Shows 194-201
Listen To Pronk Pops Podcast or Download Shows 184-193
Listen To Pronk Pops Podcast or Download Shows 174-183
Listen To Pronk Pops Podcast or Download Shows 165-173
Listen To Pronk Pops Podcast or Download Shows 158-164
Listen To Pronk Pops Podcast or Download Shows 151-157
Listen To Pronk Pops Podcast or Download Shows 143-150
Listen To Pronk Pops Podcast or Download Shows 135-142
Listen To Pronk Pops Podcast or Download Shows 131-134
Listen To Pronk Pops Podcast or Download Shows 124-130
Listen To Pronk Pops Podcast or Download Shows 121-123
Listen To Pronk Pops Podcast or Download Shows 118-120
Listen To Pronk Pops Podcast or Download Shows 113 -117
Listen To Pronk Pops Podcast or Download Show 112
Listen To Pronk Pops Podcast or Download Shows 108-111
Listen To Pronk Pops Podcast or Download Shows 106-108
Listen To Pronk Pops Podcast or Download Shows 104-105
Listen To Pronk Pops Podcast or Download Shows 101-103
Listen To Pronk Pops Podcast or Download Shows 98-100
Listen To Pronk Pops Podcast or Download Shows 94-97
Listen To Pronk Pops Podcast or Download Show 93
Listen To Pronk Pops Podcast or Download Show 92
Listen To Pronk Pops Podcast or Download Show 91
Listen To Pronk Pops Podcast or Download Shows 88-90
Listen To Pronk Pops Podcast or Download Shows 84-87
Listen To Pronk Pops Podcast or Download Shows 79-83
Listen To Pronk Pops Podcast or Download Shows 74-78
Listen To Pronk Pops Podcast or Download Shows 71-73
Listen To Pronk Pops Podcast or Download Shows 68-70
Listen To Pronk Pops Podcast or Download Shows 65-67
Listen To Pronk Pops Podcast or Download Shows 62-64
Listen To Pronk Pops Podcast or Download Shows 58-61
Listen To Pronk Pops Podcast or Download Shows 55-57
Listen To Pronk Pops Podcast or Download Shows 52-54
Listen To Pronk Pops Podcast or Download Shows 49-51
Listen To Pronk Pops Podcast or Download Shows 45-48
Listen To Pronk Pops Podcast or Download Shows 41-44
Listen To Pronk Pops Podcast or Download Shows 38-40
Listen To Pronk Pops Podcast or Download Shows 34-37
Listen To Pronk Pops Podcast or Download Shows 30-33
Listen To Pronk Pops Podcast or Download Shows 27-29
Listen To Pronk Pops Podcast or Download Shows 17-26
Listen To Pronk Pops Podcast or Download Shows 16-22
Listen To Pronk Pops Podcast or Download Shows 10-15
Listen To Pronk Pops Podcast or Download Shows 1-9
Read Full Post | Make a Comment ( None so far )