The Manchurian Candidate (1962) – Assassination Scene (12/12) | Movieclips
The Remaker: The Manchurian Candidate 1962 vs. 2004
The Manchurian Candidate (1962): Classical Film Review
The Manchurian Candidate – Film, Literature and the New World Order
Anjelica Huston-Prizzi’s Honor-“You wanna do it Charlie” scene
Prizzis Honor 1985
Prizzi’s Honor
Prizzi’s Honor scene.mov
Prizzis Honor 1985
AVE MARIA
Anjelica Huston – Prizzi’s Honor – last scene
Richard Condon, Political Novelist, Dies at 81
About the Archive
This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them.
Occasionally the digitization process introduces transcription errors or other problems. Please send reports of such problems to archive_feedback@nytimes.com.
Richard Condon, the fiendishly inventive novelist and political satirist who wrote “The Manchurian Candidate,” “Winter Kills” and “Prizzi’s Honor,” among other books, died yesterday at Presbyterian Hospital in Dallas. He was 81.
Novelist is too limited a word to encompass the world of Mr. Condon. He was also a visionary, a darkly comic conjurer, a student of American mythology and a master of conspiracy theories, as vividly demonstrated in “The Manchurian Candidate.” That novel, published in 1959, subsequently became a cult film classic, directed by John Frankenheimer. In this spellbinding story, Raymond Shaw, an American prisoner of war (played in the film by Laurence Harvey), is brainwashed and becomes a Communist agent and assassin.
When the 1962 film was re-released in 1988, Janet Maslin wrote in The New York Times that it was “arguably the most chilling piece of cold war paranoia ever committed to film, yet by now it has developed a kind of innocence.”
Mr. Condon was a popular novelist who earned serious critical attention, although he did not always win favorable reviews. His response: “I’m a man of the marketplace as well as an artist.” And he added, “I’m a pawnbroker of myth.” Though others made claims that his novels were prophetic, he admitted only that they were “sometimes about five and a half minutes ahead of their time.”
In “Winter Kills,” a President, evidently modeled on John F. Kennedy, is assassinated in a conspiracy involving the Central Intelligence Agency and the underworld. Obsessed by politics, Mr. Condon once said: “Every book I’ve ever written has been about the abuse of power. I feel very strongly about that. I’d like people to know how deeply their politicians are wronging them.” That abuse could be in contemporary life or as long ago as the 15th century, as in his novel “A Trembling Upon Rome.”
Politicians like Senator Joseph R. McCarthy and President Richard M. Nixon appeared in various guises in his work, Nixon as Walter Slurrie in “Death of a Politician.” Speaking about politics and political thrillers, Mr. Condon once said, “It’s the villains that make good literature, because they’re the only ones in the story who know what they want.”
He did not write his first novel until he was 42, but, once started, he never stopped. The first, “The Oldest Confession” (1958), was filmed as “The Happy Thieves,” starring Rex Harrison and Rita Hayworth. The novel was a success, but the film was a failure, whereas the second, “The Manchurian Candidate,” was popular in both forms. Eventually he wrote 26 novels and two works of nonfiction, “And Then We Moved to Rossenarra,” a memoir of the years he lived in Ireland, and “The Mexican Stove,” a cookbook he wrote with his daughter Wendy Jackson.
When asked how he knew so much about crime families, he said he first learned about the subject as a boy on the streets of Washington Heights. He was born in Manhattan and graduated from De Witt Clinton High School. Because his grades were so poor, he never went to college. He worked as an elevator operator, a hotel clerk and a waiter, then sold an article to Esquire magazine. While working as a copywriter for an advertising agency, he met a model named Evelyn Hunt, whom he married in 1938. Copywriting led him into movie publicity, with his first stop the Disney organization.
For 22 years, he was a movie publicist, working for almost every major Hollywood studio. With characteristic panache, he later described himself as “a drummer boy for the gnomes and elves of the silver screen.” During this period, he saturated himself with movies, watching eight a week. They were, he said, mostly bad films, but they taught him the art of storytelling and the need for the novelist to be entertaining.
In the late 1950’s, he left Hollywood and returned to New York to become a novelist. The idea for “The Oldest Confession” came while he was on location with “The Pride and the Passion” at El Escorial, outside Madrid. Fascinated by Old Master paintings, he wrote his book about art thievery. The consecutive success of “The Oldest Confession” and “The Manchurian Candidate” enabled him to devote himself to fiction.
In 1959, he began a series of migrations, first to Mexico, then to Switzerland, finally to Ireland. His travels added to his backlog of knowledge, but he continued to set most of his novels in the United States. Through the 1960’s and into the 70’s, his books received mixed reviews, with some of the more admiring notices going to “An Infinity of Mirrors” in 1964. “Winter Kills,” in 1974, drew favorable attention, with Christopher Lehmann-Haupt saying in his review in The Times that it was “a grand entertainment” and “the best book Mr. Condon has written since ‘The Manchurian Candidate.’ “
After writing a series of novels in Ireland, Mr. Condon moved back to the United States, settling in Dallas in 1980. In Texas, he had his next comeback, with “Prizzi’s Honor,” about the Prizzi family of mobsters in Brooklyn. John Huston turned the novel into a hit film, starring Jack Nicholson, Kathleen Turner and Anjelica Huston. The screenplay, by Mr. Condon and Janet Roach, was nominated for an Academy Award. Several years later, Mr. Condon completed the fictional cycle with “Prizzi’s Family,” “Prizzi’s Glory” and “Prizzi’s Money,” published in 1994.
Among his other novels are “Some Angry Angel,” “A Talent for Loving,” “Arigato” and “Emperor of America.”
Throughout his life, Mr. Condon displayed a wry, even diabolical streak. He often named his characters after real people. For example, the characters in Raymond Shaw’s infantry squad in “The Manchurian Candidate” were named for people associated with the Phil Silvers television show, “You’ll Never Get Rich.” His longest-running character, Dr. Weiler, was named after A. H. Weiler, a former film critic for The Times. In various Condon novels, Dr. Weiler turns up as an obstetrician, a cardiologist, a psychiatrist and the royal physician.
Mr. Condon is survived by his wife; two daughters, Ms. Jackson, of Dallas, and Deborah Condon, who lives near Salisbury in England, and three grandchildren.
Most people know John Frankenheimer’s movie “The Manchurian Candidate,” which stars Frank Sinatra, Laurence Harvey, Janet Leigh, and Angela Lansbury in the story of an American soldier who is captured in Korea and programmed by Chinese Communists to kill on command. And most people probably think of the movie as a classic of Cold War culture, like “On the Beach” and “Invasion of the Body Snatchers”—a popular work articulating the anxieties of an era. In fact, “The Manchurian Candidate” was a flop. It was released in the fall of 1962, failed to recover its costs, and was pulled from distribution two years later, after the assassination of John F. Kennedy. It turned up a few times on television, but it was not shown in a movie theatre again until 1987, which—nearly the end of the Cold War—is the year its popularity dates from. The true artifact of Cold War culture is the novel, by Richard Condon, that the movie was based on.
Condon’s book came out in 1959 and was a best-seller. It was praised in the Times (“a wild, vigorous, curiously readable melange”) and The New Yorker (“a wild and exhilarating satire”); Time named it one of the Ten Best Bad Novels—which, from a publisher’s point of view, is far from the worst thing that might be said about a book. The novel’s success made Condon rich; he spent most of the rest of his life abroad, producing many more works in the genre that Timehad identified, including “Winter Kills,” in 1974, and, in 1982, “Prizzi’s Honor.” His adaptation of that novel for the John Huston movie received an Academy Award nomination in 1986. He died in 1996.
Condon was a cynic of the upbeat type, not unlike Tom Wolfe: his belief that everything is basically shit did not get in the way of his pleasure in making fun of it. He learned that attitude in the finest school for it on earth, Hollywood. Before he was a novelist, Condon was a movie publicist. He began, in 1936, at Walt Disney Productions, where he promoted “Fantasia” and “Dumbo,” among other animated masterpieces, and moved on to a succession of studios, finishing up at United Artists, which he left in 1957. He didn’t know what he wanted to do next; he just wanted out. “The only thing I knew how to do was spell,” he later explained, so he did the logical thing and became a writer. Condon claimed that his work in Hollywood had given him three ulcers. He also claimed that he had seen, during his years there, ten thousand movies, an experience that he believed gave him (his words) “an unconscious grounding in storytelling.”
Frankenheimer called “The Manchurian Candidate” “one of the best books I ever read,” but admirers of Frankenheimer’s movie have not been so gracious. Greil Marcus, in a characteristically overheated appreciation of the movie in the British Film Institute’s Film Classics series, calls the novel a “cheaply paranoid fantasy,” and he goes on, “That the story would lodge in the nation’s psyche and stay there was the work of other hands.” The film historian David Thomson describes it as “a book written so that an idiot could film it.” No doubt Condon wrote “The Manchurian Candidate” with a movie deal in mind. It was his second novel; his first, called “The Oldest Confession,” was also made into a movie—“The Happy Thieves,” starring Rex Harrison (a flop that stayed a flop). But the claim that Condon’s “Manchurian Candidate” is not much more than a draft for the screenplay (which was written by George Axelrod, the author of “The Seven Year Itch”) is peculiar. Michael Crichton writes books that any idiot can film; he practically supplies camera angles. But Condon’s is not an easy book to film, in part because its tone is not readily imitated cinematically, and in part because much of it is, or was in 1962, virtually unfilmable. Strange as the movie is—a thriller teetering on the edge of camp—the book is stranger.
Time, a magazine whose editors, after all, have daily experience with overcooked prose, was not wrong in seeing something splendid in the badness of Condon’s book. “The Manchurian Candidate” may be pulp, but it is very tony pulp. It is a man in a tartan tuxedo, chicken à la king with shaved truffles, a signed LeRoy Neiman. It’s Mickey Spillane with an M.F.A., and a kind of summa of the styles of paperback fiction circa 1959. The writing is sometimes hardboiled:
The slightest touchy thing he said to her could knock the old cat over sideways with an off-key moan. But what could he do? He had elected himself Head Chump when he stepped down from Valhalla and telephoned this sweaty little advantage-taker.
Sometimes it adopts a police-blotter, “degree-zero” mode:
“Thank you, Major. Dismiss,” the general said. Marco left the office at four twenty-one in the afternoon. General Jorgenson shot himself to death at four fifty-five.
Occasionally, and usually in an inconvenient place, it drops a mot recherché:
Raymond’s mother came out of her chair, spitting langrel. [“Langrel”: irregular pieces of iron loaded into shell casings for the purpose of ripping the enemy’s sails in naval battles; obsolete.]
He clutched the telephone like an osculatorium and did not allow himself to think about what lay beyond that instant. [“Osculatorium”: medieval Latin, for a tablet that is kissed during the Mass. There appears to be no connotation involving clutching.]
It signals feeling by waxing poetic:
Such an instant ago he had paddled their wide canoe across that lake of purple wine toward a pin of light high in the sky which would widen and widen and widen while she slept until it had blanched the blackness.
It signals wisdom by waxing incomprehensible:
There is an immutable phrase at large in the languages of the world that places fabulous ransom on every word in it: The love of a good woman. It means what it says and no matter what the perspective or stains of the person who speaks it, the phrase defies devaluing. The bitter and the kind can chase each other around it, this mulberry bush of truth and consequence, and the kind may convert the bitter and the bitter may emasculate the kind but neither can change its meaning because the love of a good woman does not give way to arbitrage.
And, when appropriate, it salivates:
Her lithe, solid figure seemed even more superb because of her flawless carriage. She wore a Chinese dressing gown of a shade so light that it complemented the contrasting color of her eyes. Her long and extremely beautiful legs were stretched out before her on the chaise longue, and any man but her son or her husband, seeing what she had and yet knowing that this magnificent forty-nine-year-old body was only a wasted uniform covering blunted neural energy, might have wept over such a waste.
Some people like their bananas ripe to the point of blackness. “The Manchurian Candidate” is a very ripe banana, and, for those who have the taste for it, delectable.
The magnificent forty-nine-yearold body in the last passage belongs to the mother of Raymond, the assassin, who in Frankenheimer’s movie is played by Angela Lansbury as a proper and steely middle-aged matron. For Condon, though, Raymond’s mother is no matron. She is a sexually predatory heroin addict who commits double incest. She is the serpent in the suburban garden of Cold War domesticity, and, in imagining her and her history, Condon almost certainly had in the back of his mind the book that, three years earlier, had become the first blockbuster in American publishing, Grace Metalious’s “Peyton Place”—a story that also had to be sanitized for the movies. The plot of “Peyton Place” turns on incest (as, for that matter, does the plot of “Lolita,” a sensation when the American edition came out, in 1958). But the luridness of Condon’s novel did not make it to the screen. There is no equivalent in the movie, for example, of the proto-Pynchonesque sequence in which Raymond’s stepfather, Johnny Iselin, attempts to have sex with an Eskimo. Frankenheimer’s idea of satire was a lot more conventional than Condon’s. He was also a Hollywood filmmaker, of course, and obliged to observe a different decorum.
Counterintuitive as it sounds, the secret to making a successful thriller, as Michael Crichton and Tom Clancy have demonstrated, is to slow down the action occasionally with disquisitions on Stuff It Is Interesting to Know—how airplanes are made, how nuclear submarines work, how to build an atomic bomb. Ideally, this information is also topical, food for the national appetite of the day. In “The Manchurian Candidate,” the topic is brainwashing.
Fear of Communist brainwashing seems an example of Cold War hysteria, but in the nineteen-fifties the fear was not without basis. United Nations ground forces began military action in Korea on July 5, 1950. On July 9th, an American soldier who had been captured just two days earlier delivered a radio speech consisting of North Korean propaganda. Similar broadcasts by captured soldiers continued throughout the war. At the end of the war, the Army estimated that one out of every seven American prisoners of war had collaborated with the enemy. (The final, generally accepted estimate is one out of ten.) Twenty-one Americans refused to return to the United States; forty announced that they had become Communists; and fourteen were court-martialled, and eleven of those were convicted.
The term “brainwashing” was coined by a journalist named Edward Hunter, who had served in the Morale Operations section of the U.S. Office of Strategic Services during the Second World War, which he spent mostly in Asia, and who became an outspoken anti-Communist. Hunter’s book “Brainwashing in Red China: The Calculated Destruction of Men’s Minds” appeared in 1951. In it, he explained that “brainwashing” was his translation of the Chinese term hsi-nao, which means “cleansing of the mind,” and which he said he had heard frequently when speaking with Europeans who had been caught inside China in 1949, the year of Mao’s revolution.
In 1955, two years after the armistice ending the Korean War, the Army issued a huge report on the treatment of American prisoners called “POW: The Fight Continues After the Battle.” The Army had interviewed all surviving prisoners of war on the ships that brought them back across the Pacific—more than four thousand soldiers—and had learned that many of them underwent intensive indoctrination by Chinese Communists. The Chinese had carefully segregated the prisoners they had identified as incorrigibles, sometimes housing them in separate camps, and had subjected the prisoners they judged to be potential converts to five hours of indoctrination a day, in classes that combined propaganda by the instructors with “confessions” by the prisoners. In some cases, physical torture accompanied the indoctrination, but in general the Chinese used the traditional methods of psychological coercion: repetition and humiliation. The Army discovered that a shocking number of prisoners had, to one degree or another, succumbed. Some were persuaded to accuse the United States, in signed statements, of engaging in germ warfare—a charge that was untrue but was widely believed in many countries.
The Army report instigated a popular obsession with brainwashing that lasted well into 1957. Stories about the experiences of American prisoners appeared in The Saturday Evening Post, Life, the Times Magazine, and The New Yorker. The term itself became a synonym for any sort of effective persuasion, and writers struggled with the question of whether aspects of contemporary American life, such as advertising and psychiatric therapy, might really be forms of brainwashing. Condon must have read much of this material; he did know Andrew Salter’s “Conditioned Reflex Therapy” (1949), a book he has the Chinese psychiatrist in his novel, Yen Lo, cite in the speech in which he announces his successful brainwashing of the American prisoners. Yen Lo names a number of other studies of hypnosis and conditioning, including “The Seduction of the Innocent,” by Frederic Wertham, an alarmist account of the way comic books corrupt the minds of American youth. (Yen Lo evidently has, in addition to his other exceptional powers, a crystal ball, since “Seduction of the Innocent” was not published until 1954, after the Korean War was over.) These books and articles apparently persuaded Condon that brainwashing, or psychological conditioning using a combination of hypnosis and Pavlovian methods, was a real possibility—as the recent experience of the Korean P.O.W.s had persuaded many other Americans that it was.
Condon’s book played on the fear that brainwashing could be permanent, that minds could be altered forever. By the time Frankenheimer’s movie came out, though, it had become clear that most conditioning is temporary. In 1961, in “Thought Reform and the Psychology of Totalism: A Study of ‘Brainwashing’ in China,” the psychiatrist Robert Jay Lifton, who had conducted some of the shipboard interviews with returning P.O.W.s, concluded that the indoctrination of prisoners was a long-term failure. All of the “converts” eventually returned to the United States, and the former prisoners who had come home praising the good life to be had in North Korea soon reverted to American views.
Still, conditioning is the theme (if “theme” is not too grand a term) of Condon’s novel. Even before Raymond falls into the hands of Yen Lo, he is psychologically conditioned, by his mother’s behavior, to despise everyone. His mother is conditioned, by her early incest, to betray everyone. And the American people are conditioned, by political propaganda, to believe her McCarthy-like husband’s baseless charges about Communists in the government. It is not, in Condon’s vision, the Communist world on one side and the free world on the other. It is just the manipulators and the manipulated, the conditioners and the conditioned, the publicists and the public. In such a world, it’s probably better to be the publicist, if you can deal with the ulcers.
Frank Sinatra, who plays Marco, the only friend Raymond has, is supposed to have asked his friend Jack Kennedy for his approval before Frankenheimer’s movie was released. United Artists was apparently afraid that the assassination scene might give some nut an idea. Kennedy, as it happened, loved the movie; he was, after all, the world’s most famous Ian Fleming fan. He was killed a year after “The Manchurian Candidate” came out. Did Lee Harvey Oswald see it? The problem has been examined in depth by John Loken, in a book called “Oswald’s Trigger Films” (2000). Loken concludes that although the evidence is not definitive, Oswald almost certainly did see it. “The Manchurian Candidate” opened in Dallas in November, 1962, and played there for several months; Oswald, who was living in Dallas at the time, had a habit of going to the movies by himself (he was in a movie theatre when he was arrested on November 22, 1963); and Loken has determined that the bus Oswald probably took to work passed within ten yards of a theatre where the movie was playing. (Loken is much struck by the fact that references to “The Manchurian Candidate” are almost nonexistent in the literature, official and otherwise, on the Kennedy assassination. He concludes, in the spirit of all scholars of that assassination, that “the probable Oswald connection, so utterly obvious if one but thinks about it, has been suppressed for decades by a powerful conglomerate that might aptly be called the ‘media-entertainment complex.’ ”)
Immediately after Kennedy was shot, Condon got a call from a newspaper reporter asking if he felt responsible. Condon couldn’t see the relevance, and he was not being defensive. He had not introduced political assassination to popular American culture. Robert Penn Warren’s “All the King’s Men” was published in 1946 and was made into a movie in 1949; a version for television, directed by Sidney Lumet, was broadcast in 1958. Assassination is the subject of John Huston’s “We Were Strangers” (1949) and Lewis Allen’s “Suddenly” (1954), also starring Frank Sinatra. Oswald might easily have seen those movies as well. More to the point: “The Manchurian Candidate” is the story of a man programmed to kill at the command of other people. What self-respecting assassin would take such a character for his role model? Either Oswald acted according to his own wishes, in which case he wasn’t imitating Condon’s killer, or he really was programmed by the Communists, in which case the question isn’t whether Oswald saw Frankenheimer’s movie but whether his Communist masters did.
United Artists withdrew “The Manchurian Candidate” from theatres in 1964, although the movie could occasionally be seen on television and in art houses. In 1972, Sinatra bought the rights and, in 1975, removed it from circulation entirely. Whether or not he was motivated by guilt over Kennedy’s death is unclear. He did, however, give his daughter Tina permission to produce a remake, and it is being shot, this fall, by Jonathan Demme. (Demme’s previous movie, “The Truth About Charlie,” was also a remake, of Stanley Donen’s “Charade,” of 1963. His method, judging from that effort, is to update the story and then salt it with allusions to the period of the original. “Charade” was filmed in Paris at the time of the French New Wave, and so in Demme’s version there are appearances by Charles Aznavour, Agnès Varda, and the grave of François Truffaut—none of which have anything to do with the story. Demme has reportedly set “The Manchurian Candidate” in the time of the Gulf War; Liev Schreiber plays Raymond, Meryl Streep is his dragon mother, and Marco is played by Denzel Washington. We can be fairly confident that at some point Denzel Washington will be seen listening to a Frank Sinatra song.)
The Kennedy assassination does not fulfill Condon and Frankenheimer’s prophecy. On the contrary, it buries it. If any assassin might plausibly have been a Communist puppet, it was Oswald, a man who had lived in the Soviet Union for three years, who had a Russian wife, and who once handed out leaflets for an outfit called the Fair Play for Cuba Committee. These facts were widely known within hours of Oswald’s arrest, and yet the theory that he was an agent who was directed, wittingly or not, by Communist handlers has never been an important part of the folklore of the Kennedy assassination. Until the late nineteen-seventies, the official line (endorsed, incidentally, by Condon at the time) was that Oswald acted alone. Dissenters from that view have been drawn mainly to theories involving the Mafia and the Central Intelligence Agency, even though hooking Oswald up with those entities requires a far greater imaginative stretch than associating him with the Soviets. Almost no one thinks of Kennedy (except in some convoluted way) as a casualty of the Cold War, and his death does not represent the culmination of the national anxiety about Communist infiltration. It represents the end of that obsession, and of the panic that Condon’s novel and Frankenheimer’s movie both so happily exploit. ♦
Richard Thomas Condon (March 18, 1915 in New York City – April 9, 1996 in Dallas, Texas) was a prolific and popular American political novelist. Though his works were satire, they were generally transformed into thrillers or semi-thrillers in other mediums, such as cinema. All 26 books were written in distinctive Condon style, which combined fast-pace, outrage, and frequent humor while focusing almost obsessively at monetary greed and political corruption. Condon himself once said: “Every book I’ve ever written has been about abuse of power. I feel very strongly about that. I’d like people to know how deeply their politicians wrong them.”[1] Condon’s books were occasionally bestsellers, and many of his books were made into films; he is primarily remembered for his 1959 The Manchurian Candidate and, many years later, a series of four novels about a family of New York gangsters named Prizzi.
Condon’s writing was known for its complex plotting, fascination with trivia, and loathing for those in power; at least two of his books featured thinly disguised versions of Richard Nixon.[citation needed] His characters tend to be driven by obsession, usually sexual or political, and family loyalty. His plots often have elements of classical tragedy, with protagonists whose pride leads them to destroy what they love. Some of his books, most notably Mile High (1969), are perhaps best described as secret history.[citation needed]And Then We Moved to Rossenarra is a humorous autobiographical recounting of various places in the world where he had lived and his family’s 1970s move to Rossenarra, Co. Kilkenny, Ireland.
After service in the United States Merchant Marine, Condon achieved moderate success as a Hollywood publicist, ad writer and Hollywood agent. Condon turned to writing in 1957. Employed by United Artists as an ad writer, he complained that he was wasting time in Hollywood and wanted to write a novel. Without Condon’s knowledge, his boss, Max E. Youngstein, deducted money from his salary, then fired him after a year, returning the amount of money he had deducted in the form of a Mexican bank account and the key to a house overlooking the ocean in Mexico. Youngstein told him to write his book.[3] His second novel, The Manchurian Candidate (1959), featured a dedication to Youngstein and was made into a successful film.
In Mile High, his eighth novel, one primarily about how a single spectacularly ruthless gangster named Eddie West imposes Prohibition upon an unwary populace, Condon sums up the theme of all his books in a single angry cri de coeur:
“Prohibition fused the amateurism and catch-as-catch-can national tendencies of the early days of the republic with a more modern, highly organized lust for violence and the quick buck. It fused the need to massacre twelve hundred thousand American Indians and ten million American buffalo, the lynching bees, the draft riots, bread riots, gold riots and race riots, the constant wars, the largest rats in the biggest slums, boxing and football, the loudest music, the most strident and exploitative press with the entire wonderful promise of tomorrow and tomorrow, always dragging the great nation downward into greater violence and more unnecessary deaths, into newer and more positive celebration of nonlife, all so that the savage, simple-minded people might be educated into greater frenzies of understanding that power and money are the only desirable objects for this life.”[4]
Although not perhaps actually originated by Condon himself, his use of “the Manchurian Candidate” made that phrase a part of the English language. Frank Rich, for example, in his column in the “Sunday Opinion” of The New York Times of August 17, 2008, writes about Barack Obama with a reference to both a well-known actress and a well-known plot element in the first movie version of Condon’s 1959 book:
“[Obama’s] been done in by that ad with Britney [Spears] and Paris [Hilton] and a new international crisis that allows [John] McCain to again flex his Manchurian Candidate military cred. Let the neocons identify a new battleground for igniting World War III… and McCain gets with the program as if Angela Lansbury has just dealt him the Queen of Hearts“.[5]
Condon’s works are difficult to categorize precisely: A 1971 Time magazine review declared that, “Condon was never a satirist: he was a riot in a satire factory. He raged at Western civilization and every last one of its works. He decorticated the Third Reich, cheese fanciers, gossip columnists and the Hollywood star system with equal and total frenzy.” [6] The headline of his obituary in The New York Times called him a “political novelist”,[7] but went on to say that, “Novelist is too limited a word to encompass the world of Mr. Condon. He was also a visionary, a darkly comic conjurer, a student of American mythology and a master of conspiracy theories, as vividly demonstrated in ‘The Manchurian Candidate.'”[7] Although his books combined many different elements, including occasional outright fantasy and science fiction, they were, above all, written to entertain the general public. He had, however, a genuine disdain, outrage, and even hatred for many of the mainstream political corruptions that he found so prevalent in American life. In a 1977 quotation, he said that:[8]
“…people are being manipulated, exploited, murdered by their servants, who have convinced these savage, simple-minded populations that they are their masters, and that it hurts the head, if one thinks. People accept servants as masters. My novels are merely entertaining persuasions to get the people to think in other categories.”
With his long lists of absurd trivia and “mania for absolute details”, Condon was, along with Ian Fleming, one of the early exemplars of those called by Pete Hamill in a New York Times review, “the practitioners of what might be called the New Novelism… Condon applies a dense web of facts to fiction…. There might really be two kinds of fiction: the fiction of sensibility and the fiction of information… As a practitioner of the fiction of information, no one else comes close to him.”[9]
Condon attacked his targets wholeheartedly but with a uniquely original style and wit that made almost any paragraph from one of his books instantly recognizable. Reviewing one of his works in the International Herald Tribune, playwright George Axelrod (The Seven Year Itch, Will Success Spoil Rock Hunter), who had collaborated with Condon on the screenplay for the film adaptation of The Manchurian Candidate, wrote:
“The arrival of a new novel by Richard Condon is like an invitation to a party…. the sheer gusto of the prose, the madness of his similes, the lunacy of his metaphors, his infectious, almost child-like joy in composing complex sentences that go bang at the end in the manner of exploding cigars is both exhilarating and as exhausting as any good party ought to be.”
From his 1975 novel, Money Is Love, comes a fine example of the “lunacy of his metaphors”: “Mason took in enough cannabis smoke to allow a Lipan Apache manipulating a blanket over it to transmit the complete works of Tennyson.” [10]
The Manchurian Candidate offers:
“The effects of the narcotics, techniques, and suggestions… achieved a result that approximated the impact an entire twenty-five-cent jar of F. W. Woolworth vanishing cream might have on vanishing an aircraft carrier of the Forrestal class when rubbed into the armor plate.”[11]
Condon was also enamored of long lists of detailed trivia that, while at least marginally pertinent to the subject at hand, are almost always an exercise in gleeful exaggeration and joyful spirits. In An Infinity of Mirrors, for instance, those in attendance of the funeral of a famous French actor and notable lover are delineated as:
Seven ballerinas of an amazing spectrum of ages were at graveside. Actresses of films, opera, music halls, the theatre, radio, carnivals, circuses, pantomimes, and lewd exhibitions mourned in the front line. There were also society leaders, lady scientists, women politicians, mannequins, couturières, Salvation Army lassies, all but one of his wives, a lady wrestler, a lady matador, twenty-three lady painters, four lady sculptors, a car-wash attendant, shopgirls, shoplifters, shoppers, and the shopped; a zoo assistant, two choir girls, a Métro attendant from the terminal at the Bois de Vincennes, four beauty-contest winners, a chambermaid; the mothers of children, the mothers of men, the grandmothers of children and the grandmothers of men; and the general less specialized, female public-at-large which had come from eleven European countries, women perhaps whom he had only pinched or kissed absent-mindedly while passing through his busy life. They attended twenty-eight hundred and seventy strong, plus eleven male friends of the deceased.[12]
Writing about The Whisper of the Axe in the daily book review column of Friday, May 21, 1976, in the New York Times, Richard R. Lingeman praised the book in particular and Condon in general for his “extravagance of invention unique with him.” [13]
Not everyone was as exhilarated by Condon’s antics, however. In a long Times Sunday review just two days after Lingeman’s, Roger Sale excoriated Condon as a writer of “how-to books” in general, this book in particular, and Condon’s habit of using lists: “A lot of it is done with numbers arbitrarily chosen to falsely simulate precision.” [14]
All of Condon’s books have, to an unknown degree, the names of real people in them as characters, generally very minor or peripheral. The most common, which appears in all of his books, is some variation of Franklin M. Heller. Among them are F.M. Heller, Frank Heller, Franz Heller, and F. Marx Heller. The real-life Heller was apparently a television director in New York City in the 1950s, ’60s, and 70s, who initially lived on Long Island and then moved to a house on Rockrimmon Road in Stamford, Connecticut.[15] Beginning with Mile High in 1969, mentions of a Rockrimmon Road or Rockrimmon House also began to appear regularly in the novels. Late in life Heller grew a thick white beard and became a devotee of needlework—both traits that the fictional Hellers shared, sometimes to ludicrous effect, as when a battle-hardened Admiral Heller is depicted issuing orders while absorbed in needlework. The real-life Heller made one needlework depiction of the manor house in Ireland in which Condon was living at the time.
Condon was a great friend of actor Allan Melvin, having written a nightclub act for him. Condon later became a publicist for The Phil Silvers Show (“Sgt. Bilko”), on which Melvin played Cpl. Henshaw. Melvin’s name shows up in several Condon books, most prominently as hitman Al (the Plumber) Melvini in “Prizzi’s Honor” (a play on Melvin’s “Al the Plumber” character in Liquid-Plumr commercials.) In The Manchurian Candidate, with the exception of Marco, Shaw and Mavole, all of Marco’s platoon members are named for the cast/crew of “Bilko”: (Nat) Hiken, (Maurice) Gosfield, (Jimmy) Little, (Phil) Silvers, (Allan) Melvin, (Mickey) Freeman and (Harvey) Lembeck.
For many years a Hollywood publicity man for Walt Disney and other studios, Condon took up writing relatively late in life and his first novel, The Oldest Confession, was not published until he was 43. The demands of his career with United Artists—promoting dreadful movies such as The Pride and the Passion and A King and Four Queens—led to a series of bleeding ulcers and a determination to do something else.
His next book, The Manchurian Candidate, combined all the elements that defined his works for the next 30 years: nefarious conspiracies, satire, black humor, outrage at political and financial corruption in the American scene, breath-taking elements from thrillers and spy fiction, horrific and grotesque violence, and an obsession with the minutiae of food, drink, and fast living. It quickly made him, for a few years at least, the center of a cult devoted to his works. As he rapidly produced more and more books with the same central themes, however, this following fell away and his critical reputation diminished. Still, over the next three decades Condon produced works that returned him to favor, both with the critics and the book-buying public, such as Mile High, Winter Kills, and the first of the Prizzi books, Prizzi’s Honor.
Of his numerous books that were turned into Hollywood movies, The Manchurian Candidate was filmed twice. The first version, in 1962, which starred Frank Sinatra, Laurence Harvey, Janet Leigh, and Angela Lansbury, followed the book with great fidelity, and is now highly regarded as a glimpse into the mindset of its era. Janet Maslin, writing already over two decades ago, said in The New York Times In 1996 that it was “arguably the most chilling piece of cold war paranoia ever committed to film, yet by now it has developed a kind of innocence.”[7]
Beginning with his first book, The Oldest Confession, Condon frequently prefaced his novels with excerpts of verse from a so-called Keener’s Manual; these epigraphs foreshadowed the theme of the book or, in several instances, gave the book its title. The Keener’s Manual, however, was a fictional invention by Condon and does not actually exist. A “keen” is a “lamentation for the dead uttered in a loud wailing voice or sometimes in a wordless cry” [16] and a “keener” is a professional mourner, usually a woman in Ireland, who “utters the keen… at a wake or funeral.” [17]
Five of Condon’s first six books derived their titles from the fictional manual, the only exception being his most famous book, The Manchurian Candidate. The epigraph in The Manchurian Candidate, however, “I am you and you are me /and what have we done to each other?” is a recurring theme in earlier Condon’s books: in various forms it also appears as dialog in both The Oldest Confession and Some Angry Angel. Among other epigraphs, the last line of “The riches I bring you /Crowding and shoving, /Are the envy of princes: /A talent for loving.” is the title of Condon’s fourth novel. His fifth and sixth novels, An Infinity of Mirrors and Any God Will Do, also derive their titles from excerpts of the manual.
In 1998 a California software engineer noticed several paragraphs in The Manchurian Candidate that appeared nearly identical to portions of the celebrated 1934 novel I, Claudius by the English writer Robert Graves. She wrote about the apparent plagiarism on her website but her discovery went unnoticed by most of the world until Adair Lara, a longtime San Francisco Chronicle staff writer, wrote a lengthy article about the accusation in 2003.[18] Reprinting the paragraphs in question, she also solicited the opinion of a British forensic linguist, who concluded that Condon had unquestionably plagiarized at least two paragraphs of Graves’s work. By this time, however, more than seven years had passed since Condon’s death and Lara’s article also failed to generate any literary interest outside the Chronicle.
In Some Angry Angel, the book that followed The Manchurian Candidate, Condon makes a direct reference to Graves. In a long, convoluted passage on page 25 Condon reflects on “mistresses” and their relationship—a peripheral one, to the reader—to Graves’s writings about “Major Male” Deities and “Major Female” Deities. As Angel was published only a year after Candidate, there is no question, therefore, about Condon’s familiarity with the works of Robert Graves.[19]
Condon’s familiarity with Graves is also in evidence on p. 127 of his first novel, The Oldest Confession. One of the characters in the book purchases a copy of Graves’ Antigua, Penny, Puce!
The Oldest Confession, Appleton-Century-Crofts, New York, 1958, Library of Congress Catalog Card Number: 58-8662; Longman, London, 1959, as The Happy Thieves
The Manchurian Candidate, McGraw-Hill, New York, 1959, Library of Congress Catalog Card Number: 59-8533
^ Jump up to:abcThe New York Times, Wednesday, April 10, 1996, Obituaries, “Richard Condon, Political Novelist, Dies at 81; Wrote ‘Manchurian Candidate’ and ‘Prizzi'” at [2]
^Who’s Who in Spy Fiction, Donald McCormick, Sphere Books Ltd., London, 1977, page 64
^“For Eddie West, power was all that mattered,” by Pete Hamill, The New York Times, August 31, 1969, at
^Time Magazine, “Liederkranz”, a book review by John Skow, June 2, 1975
^The Manchurian Candidate, by Richard Condon, paperback edition, Signet, New York, November, 1962, fifth printing, page 261
^An Infinity of Mirrors, by Richard Condon, paperback edition, Fawcett Crest, New York, September, 1965, page 36
^“A Thriller of the Condon Class”, by Richard R. Lingeman, The New York Times, May 21, 1976, at [3]
^Webster’s New International Dictionary of the English Language, Second Edition, Unabridged, G. & C. Merriam Co., Publishers, Springfield, Massachusetts, 1943
^“Has a local software engineer unmasked ‘The Manchurian Candidate’? Menlo Park woman says author Richard Condon plagiarized”, by Adair Lara, in the San Francisco Chronicle,October 4, 2003; the entire article can be read at [4]
Story 1: The Illegal Alien Family That Is Deported Together Stays Together — Let The “Dreamers” Go Back To Their Country of Origin With Families– Enforce All Immigration Laws — Remove and Deport The 30-60 Million Illegal Aliens Who Invaded The United States in Last 20 Years — No DACA Fix Needed — Trump Will Lose Many of His Supporters If He Gives Amnesty or Citizenship To Dreamers — Video —
Story 2: Feral Hog Invasion of America — Hogs Eat Everything — Kill The Hogs — Boar Busters — Videos
Story 1: The Great Outing of Sexual Abusers in Big Lie Media and Congress — The CREEP List Grows Longer and Longer — Abuse of Power — Videos —
Story 2: A Two Charlie Day — Charlie Rose, Should Be Fired By CBS, and Charlie Manson, Dead At 83, Should Have Been Executed By State of California — Videos
Story 1: More on Moore: Roy Moore’s Attorney News Briefing — She Said Vs. He Said — Faulty Memory of Witnesses Leading To Wrongful Conviction — Sexual Abuse — Who Do You Believe? — The Voters of Alabama Must Answer This Question on December 12 — Videos —
Story 2: Will The Senate Pass A Tax Reform Bill?– NO — Tax Cut Bill — Yes — Videos —
Story 3: Who is on the Congressional CREEP List of Sexual Harassers in Congress and Their Staffs ? — Who is next to be outed? — Shout Animal House — Intimacy — Getting To Know You– Dance With Me –Videos
Story 1: He Is Back — Let The Screaming Begin — Videos —
Story 2: Trial Balloon of Having Sessions Return To The Senate By Write In Campaign Shot Down By Attorney General Jeff Sessions — Political Elitist Establishment Trying To Overturn Alabama Voters — Videos —
Story 3: Attorney General Sessions Grilled By House Including Whether There Will Special Counsel For Hillary Clinton Alleged Crimes — Vidoes —
Story 4: Sexual Harassment in The Senate and House — Time To Expose the Exposers — Out Them By Naming Them — Publish The Creep List — Videos
Mork & Mindy was the first tv show to display an incredible talent of Robin Williams. The audience instantly fell in love with the “cute and cuddly” alien Mork and his human friend Mindy. I think of this show with great fondness because it’s extremely funny, lovely and kind. It’s the kind of TV product we really need these days. It was a huge hit back in the day and i think the people in 2015 could really use a little happiness it gives. Anyway, here’s a little video, i hope you gonna like it! Song: Walk The Moon – Shut Up and Dance
The Love Story of Mork & Mindy
Mork & Mindy – Never Thought That I Could Love
Mork & Mindy – Getting To Know You
Mork and Mindy – Dance With Me
Bing Crosby – Getting To Know You
JAMES TAYLOR – GETTING TO KNOW YOU
Getting to Know You from The King and I
Yul Brynner and Deborah Kerr perform “Shall We Dance” from The King and I
Bows and flows of angel hair and ice cream castles in the air
And feather canyons everywhere, I’ve looked at clouds that way
But now they only block the sun they rain and snow on everyone
So many things I would have done, but clouds got in my way
I’ve looked at clouds from both sides now
From up and down and still somehow
It’s cloud’s illusions I recall
I really don’t know clouds at all
Moons and Junes and Ferris wheels the dizzy dancing way you feel
As every fairy tale comes real, I’ve looked at love that way
But now it’s just another show, you leave ’em laughin’ when you go
And if you care don’t let them know, don’t give yourself away
I’ve looked at love from both sides now
From give and take and still somehow
It’s love’s illusions I recall
I really don’t know love at all
Tears and fears and feeling proud, to say, “I love you” right out loud
Dreams and schemes and circus crowds, I’ve looked at life that way
But now old friends are acting strange they shake their heads, they say
I’ve changed
But something’s lost but something’s gained in living every day
I’ve looked at life from both sides now
From win and lose and still somehow
It’s life’s illusions I recall
I really don’t know life at all
Isn’t it rich?
Are we a pair?
Me here at last on the ground,
You in mid-air,
Where are the clowns?
Isn’t it bliss?
Don’t you approve?
One who keeps tearing around,
One who can’t move,
Where are the clowns?
There ought to be clowns?
Just when I’d stopped opening doors,
Finally knowing the one that I wanted was yours
Making my entrance again with my usual flair
Sure of my lines
No one is there
Don’t you love farce?
My fault, I fear
I thought that you’d want what I want
Sorry, my dear!
But where are the clowns
Send in the clowns
Don’t bother, they’re here
Isn’t it rich?
Isn’t it queer?
Losing my timing this late in my career
But where are the clowns?
There ought to be clowns
Well, maybe next year
JUDY COLLINS – Turn Turn Turn (1966 )
Judy Collins Lyrics
“Turn, Turn, Turn (To Everything There Is A Season)”
Words-adapted from the bible, book of ecclesiastes
Music-pete seegerTo everything (turn, turn, turn)
There is a season (turn, turn, turn)
And a time for every purpose, under heavenA time to be born, a time to die
A time to plant, a time to reap
A time to kill, a time to heal
A time to laugh, a time to weepTo everything (turn, turn, turn)
There is a season (turn, turn, turn)
And a time for every purpose, under heaven
A time to build up, a time to break down
A time to dance, a time to mourn
A time to cast away stones, a time to gather stones together
To everything (turn, turn, turn)
There is a season (turn, turn, turn)
And a time for every purpose, under heaven
A time of love, a time of hate
A time of war, a time of peace
A time you may embrace, a time to refrain from embracing
To everything (turn, turn, turn)
There is a season (turn, turn, turn)
And a time for every purpose, under heaven
A time to gain, a time to lose
A time to rend, a time to sew
A time to love, a time to hate
A time for peace, I swear its not too late
Celtic Woman – Amazing Grace
The Most Beautiful “Amazing Grace” I’ve ever heard
AMAZING GRACE
Amazing grace, How sweet the sound
That saved a wretch like me.
I once was lost, but now I am found,
Was blind, but now I see.’Twas grace that taught my heart to fear,
And grace my fears relieved.
How precious did that grace appear
The hour I first believed.Through many dangers, toils and snares
I have already come,
‘Tis grace has brought me safe thus far
And grace will lead me home.The Lord has promised good to me
His word my hope secures;
He will my shield and portion be,
As long as life endures.Yea, when this flesh and heart shall fail,
And mortal life shall cease
I shall possess within the veil,
A life of joy and peace.When we’ve been there ten thousand years
Bright shining as the sun,
We’ve no less days to sing God’s praise
Than when we’ve first begun.
It started with what seemed like a simple question I asked myself. That question, not surprisingly for anyone who knows me, led to a series of additional questions. Somehow, I wasn’t getting clear answers for myself, so I started asking people I came in contact with the same questions. The results were fascinating to me and I wanted to explore the topic more fully. The basic question: “What does intimacy mean to you?”
The range of responses was wide and varied. I included both men and women, different ages, some were in relationships and others were not. Most people had to stop for a moment to really think about and put into words what intimacy meant to them. As I looked more deeply at the topic, I found that there are in fact four key types of intimacy.
What Does Intimacy Mean to You?
The people I asked generally started with the most common of the four types of intimacy: Sexual. This wasn’t too much of a surprise because sexual intimacy is probably the most stereotypical and most familiar definition of the word in modern society. Having sex, however, often has less to do with intimacy than with a physical act between people. As it ended up, the people I talked to wanted more than just the act of sex — they wanted some depth. They wanted to feel safe while being vulnerable, wanting to be seen by his/her partner. That made sense, as this form of intimacy also includes a wide range of sensuous activity and sensual expression, so it’s much more than having intercourse.
It’s interesting that the word intercourse is also defined as an “exchange especially of thoughts or feelings.” It’s curious why intimacy is challenging to people in their relationships. I continued to look further.
Connecting Emotionally
The next of the four faces of intimacy is emotional intimacy.This happens when two people feel comfortable sharing their feelings with each other. The goal is to try to be aware and understand the other person’s emotional side. My guess is that women have an easier time with this in very close female friendships, but I’d like to believe that men too are becoming more comfortable experiencing emotional intimacy. This form of intimacy I’ve become comfortable with and see as a healthy part of the give-and-take in all relationships, whether female or male.
Margaret Paul, Ph.D, refers to the fears people have in relation to emotional intimacy. She says, “Many people have two major fears that may cause them to avoid intimacy: the fear of rejection (of losing the other person), and the fear of engulfment (of being invaded, controlled, and losing oneself).” This made some sense to me.
Love and Intimacy
However, if we believe that there are only two major energies we humans experience, love and fear (or an absence of love), then I find it interesting that in this area of intimacy, it seems people have moved from their hearts and love to an energy that stops them from experiencing their true essence and what they often yearn for the most. Love and intimacy.
In her book A Return to Love, the brilliant Marianne Williamson says it most eloquently:
“Love is what we were born with. Fear is what we have learned here. The spiritual journey is the relinquishment or unlearning of fear and the acceptance of love back into our hearts. Love is our ultimate reality and our purpose on earth. To be consciously aware of it, to experience love in ourselves and others, is the meaning of life.”
Even the Bible says, “There is no fear where love exists.” Of course I believe that love and intimacy are highly spiritual. In her book Love for No Reason, Marci Shimoff states, “Love for no reason is your natural state.” She also tells a wonderful story about a spiritual teacher who once said to her, “I love you and it’s no concern of yours.” To love, from your heart, just to love. As I talked about in my piece on what makes a good relationship, my ideal is definitely a loving spiritual partnership.
True Intimacy
I kept wondering if true intimacy could be as simple as a matter of moving back to loving ourselves first? To rediscovering the unconditional love we all were born with? The idea of self-intimacy and self-love is a fascinating concept. I’ll leave these as open-ended questions for you to ask yourselves for now. I was curious to look more closely at the other two types of intimacy.
The next, intellectual intimacy, is something I personally have the most comfort with. This one is about communication, and as someone who lives and breathes words, it’s extremely familiar to me. The ability to share ideas in an open and comfortable way can lead to a very intimate relationship indeed, as I’m fortunate to discover quite frequently. As someone who engages in this type of interaction all the time, it offers me a wonderful and fulfilling form of intimacy. I wondered if this was my strongest area of intimacy.
Experiential Intimacy
The fourth kind of intimacy is experiential intimacy, an intimacy of activity. I realized I experience this every time I get together with a group to create art in a silent process. It’s about letting the art unfold, by working together in co-operation. The essence of this intimate activity is that very little is said to each other, it’s not a verbal sharing of thoughts or feelings, but it’s more about involving yourself in the activity and feeling an intimacy from this involvement.
During a recent encounter I had at a contact improv jam, I realized was actually this form of intimacy. I interacted with a young man, letting our body energy lead the dance, with no eye contact and no words, just movement in a sensual and open, if not dramatic, dance. So, I understood that this experiential intimacy is also, somewhat surprisingly, in my intimacy vocabulary.
Joining and Separating
Rick Hanson, Ph.D says that having intimacy in our lives requires a natural balance of two great themes — joining and separation — that are in fact central to human life. Almost everyone wants both of them, to varying degrees. He goes on to say, “In other words: individuality and relationship, autonomy and intimacy, separation and joining support each other. They are often seen at odds with each other, but this is so not the case!” This also made perfect sense to me. Yin and yang. Light and dark. All the polarities we live in life, lead to a balance.
My understanding and curiosity were greatly expanded after exploring the four faces of intimacy. Maybe this awareness might make it easier to find your own perfect personal balance between them all. For me, it comes down to our willingness to explore intimacy in all its forms. It’s not necessary that every intimate relationship includes all the different types of intimacy. Ultimately it is each individual’s choice.
What I learned, makes me believe that with some balance in these areas, we might find a deeper connection and understanding of the relationships in our life. I also fully recognize that we all have different definitions of intimacy. Are men and women’s definitions dramatically different? It is a fascinating conversation to continue to explore.
Soul Intimacy
Then, as often happens with perfect synchronicity, I received my daily Gaping Void email by Hugh MacLeod with the subject: Has your soul been seen lately?It went on to say, “I saw your soul today and it made me want to cry with joy and thanks.” The topic was intimacy. What followed was a beautiful way to end my piece.
“Intimacy isn’t strictly about romantic relationships, or even relations with family — sometimes it happens quickly, and often times in ways we hardly notice.
I’m talking about that moment when someone allows the world to see what’s inside… what they are really about. It’s about seeing someone for who and what they are and that the glimpse was offered either voluntarily or without the person’s knowledge. This is an incredible moment where our existence suddenly makes sense and all comes together in a singular place.
For those of you who have experienced this, it’s something that never gets lost in memory or time. It’s like a little mirror we take out every now and then to remember a time when something so complex became so inconceivably simple. It’s pretty incredible.”
This is the essence of what intimacy is really all about. Dare to be vulnerable, dare to be seen.
Intimacy is Key to Being Healthy and Vital
Dr. Christiane Northrup in her newest book “Goddesses Never Age”, tells us that intimacy is an important part of life regardless of age. As she shares, “Age is just a number, and agelessness means not buying into the idea that a number determines everything from your state of health to your attractiveness to your value.” As a member of Team Northrup, a team whose mission is to support people to live their most vital and healthy lives, I invite you to a complimentary health and vitality consultation.
Before we talk to customize a plan for you, find out how healthy you are with the True Health Assessment. The three-part report, identifies your top health risk factors, maps out a recommended lifestyle plan that identifies ways you can improve your health and provides you with individualized nutrition recommendations based on your specific assessment answers.
Now let me ask you my starting question: What does intimacy mean to you?
Ender’s Game — Molecular Detachment Device and Ending
Ender’s Game Final / Last Battle Scene!
Ender’s Game | The way we win matters.
Ender’s Game (2013) – Final Few Scenes
Ender’s Game: Creating a Zero-G Battle Room Effects Exclusive-Design FX-WIRED
Orson Scott Card discusses the ‘Ender’s Game’ movie
Interview with Orson Scott Card
Orson Scott Card Interview HD
Published on Apr 19, 2015
World renowned, Orson Scott Card, author of the New York Times Bestseller and Hugo Award winner Ender’s Game and many more, joined Kimberly Quigley in her big red booth for a chat. Not only is he funny and kind but also very humble. His mind has created entire worlds for millions to enjoy. They sit and talk about how he got into writing, about his many novels, about the Ender phenomena, the movie and his future movie plans. Hear Orson’s wonderful advice for aspiring writers. He talks about this and more in this fun half hour interview. Get to know the amazing Orson Scott Card, on The Red Booth!
What is Orson Scott Card’s favorite book? (extended answer)
A Brief Interview with Orson Scott Card (extended answers)
Orson Scott Card on Libraries
Orson Scott Card on literature, logic and scientific method
Orson Scott Card – On the State of Israel
Creative education–how to keep the spark alive in children and adults | Orson Scott Card | TEDxUSU
Published on Dec 6, 2014
This talk was given at a local TEDx event, produced independently of the TED Conferences. Orson Scott Card discusses the importance of creativity and how it can be fostered.
Orson Scott Card is the author of the novels Ender’s Game, Ender’s Shadow, and Speaker for the Dead, which are widely read by adults and younger readers, and are increasingly used in schools. His most recent series, the young adult Pathfinder series (Pathfinder, Ruins, Visitors) and the fantasy Mithermages series (Lost Gate, Gate Thief), are taking readers in new directions. Besides these and other science fiction novels, Orson writes contemporary fantasy (Magic Street, Enchantment, Lost Boys), biblical novels (Stone Tables, Rachel and Leah), the American frontier fantasy series The Tales of Alvin Maker (beginning with Seventh Son), poetry (An Open Book), and many plays and scripts, including his “freshened” Shakespeare scripts for Romeo & Juliet, The Taming of the Shrew and The Merchant of Venice. Orson was born in Washington and grew up in California, Arizona, and Utah. He served a mission for the LDS Church in Brazil in the early 1970s. Besides his writing, he teaches occasional classes and workshops and directs plays. He frequently teaches writing and literature courses at Southern Virginia University. Orson currently lives in Greensboro, North Carolina, with his wife, Kristine Allen Card, where his primary activities are writing a review column for the local Rhino Times and feeding birds, squirrels, chipmunks, possums and raccoons on the patio.
Orson Scott Card On Science Fiction and Religion
‘Enders Game’ Writer’s Ridiculous Racist Rant Against Obama
Ender’s Game – Book vs Movie Part 1/2
Ender’s Game – Book vs Movie Part 2/2
5 REASONS WHY I LIKED THE ENDER’S GAME SERIES
Ender’s Game Cast chat Orson Scott Card controversy
EDA #4 – Orson Scott Card is a Dick
Ender’s Game Xenocide Book 3 Audiobook Part 1
Top 10 Best Books In the Ender Series
Ender’s Game by Orson Scott Card (Book Summary and Review) – Minute Book Report
On Lusitania, Ender finds a world where humans and pequeninos and the Hive Queen could all live together; where three very different intelligent species could find common ground at last. Or so he thought.
Lusitania also harbors the descolada, a virus that kills all humans it infects, but which the pequininos require in order to become adults. The Starways Congress so fears the effects of the descolada, should it escape from Lusitania, that they have ordered the destruction of the entire planet, and all who live there. With The Fleet on its way, a second xenocide seems inevitable.[2]
Lusitania
Following the events of Speaker for the Dead, a group of characters are depicted living as members of a Brazilian Catholic human colony on Lusitania, a unique planet inhabited by the only other two known species of sentient alien life: the Pequeninos “little ones” and the Hive Queen. The pequeninos are native to the planet, while the Hive Queen was transplanted to this world by Ender, partly in penance for his near-total destruction of her Formic species in Ender’s Game.
The Lusitanian ecosystem is pervaded by a complex virus, dubbed ‘Descolada’ (Portuguese for “no longer glued”) by humans. The Descolada breaks apart and rearranges the basic genetic structure of living cells. It is extremely adaptable to any species or form of known life, and easily transmissible. The native pequeninos and other life that survived on Lusitania after the Descolada’s introduction to the planet thousands (or millions) of years ago are adapted to it. As a result of the deadly virus, the Lusitanian ecosystem is severely limited. Staying alive on Lusitania takes immense effort and research on the part of the Hive Queen and the humans, as they are not adapted to the descolada. Near the end of the story, it is revealed the Descolada is possibly an artificially engineered virus designed to terraform planets, but the original creators of the virus are unknown, and there remains a slim chance it evolved naturally.
After the rebellion of the small human colony on Lusitania in Speaker for the Dead to protect the future of the intelligent alien species, Starways Congress sends a fleet to Lusitania to regain control, which will take several decades to reach its destination. Valentine Wiggin, under her pseudonym Demosthenes, publishes a series of articles revealing the presence of the “Little Doctor” planet-annihilating weapon on the Fleet. Demosthenes calls it the “Second Xenocide,” as using the weapon will result in the obliteration of the only known intelligent alien life. She also claims it to be a brutal crackdown of any colony world striving for autonomy from Starways Congress. Public anger spreads through humanity, and rebellions nearly ensue on several colonies.
After quelling much public discontent, Starways Congress finishes their analysis of the situation while the fleet is en route. Fearing the Descolada virus, further rebellions by colony worlds, and other possible unknown political motives, Starways Congress attempts to relay an order to the fleet to annihilate Lusitania upon arrival. After conferring with friends on whether a cause is worth dying for, Jane (a compassionate AI living in the interstellar ansible communication network) shuts off transmissions to the fleet to block the order. As a consequence of this action, she risks her eventual discovery and death, should the government shut down and wipe the interplanetary network. No known smaller computer system can house her consciousness.
On Lusitania itself, Ender attempts to find solutions to the looming catastrophes of the Congressional fleet, Descolada virus, and conflicts among the humans and intelligent alien species. Much on Lusitania centers around the Ribeira family, including Ender’s wife Novinha and her children. Novinha and Elanora, the mother-daughter team responsible for most of the biological advances countering the complex Descolada virus, are unsure if they can manufacture a harmless replacement virus. Conflicts arise on whether they should even do so, since the Descolada is intrinsically tied in with the life cycles of all Lusitanian organisms and may even be sentient itself. In addition, to try to devise methods to escape the planet, Lusitania’s leading, troublemaking physicist Grego is persuaded by Ender to research faster-than-light travel, despite Grego scoffing at the idea. The third biologista of the family, Quara, is convinced that the Descolada is an intelligent, self-aware species, and deserves attempts from the humans for communication and preservation. An additional sibling and Catholic priest, Quim (Father Estevão), is determined to use faith and theology to head off another form of xenocide: a group of warmongering Pequenino wish to wipe out all Earthborn life via starship, carrying the deadly Descolada within them.
World of Path
Starways Congress wants its fleet back. After all else fails, it sends the dilemma of the fleet’s impossible disappearance to several citizens of the world of Path, a cultural planetary enclave modeled on early China. Path’s culture centers on the godspoken – those who hear the voices of the gods in the form of irresistible compulsions, and are capable of significantly superior intelligence. It later becomes clear that the godspoken of Path are victims of a cruel government project: granted great intelligence by genetic modification, they were also shackled with a form of obsessive-compulsive disorder to control their loyalty. The experiment is set in a culture bound by five dictates – obey the gods, honor the ancestors, love the people, serve the rulers, then serve your self. This is a further safeguard against rebellion. The superintelligent godspoken are considered the most devout and holy of all citizens, and any disloyal thoughts in a godspoken’s mind are immediately suppressed by overwhelming obsessive-compulsive behavior, believed to be a sign from the gods the thoughts are wrong. The most respected godspoken on Path is Han Fei-Tzu, for devising a treaty to prevent the rebellion of several colony worlds after the articles published by Demosthenes. Great things are expected of his daughter and potential successor Han Qing-jao, “Gloriously Bright”. While doubting the existence of the gods himself, Han Fei-Tzu promised his dying wife he would raise Qing-jao with an unwavering belief in the godspoken. The two of them are tasked by Starways Congress with deciphering the disappearance of the Lusitania Fleet. Han Qing-jao’s secret maid, Si Wang-mu, aids her in this task, her intelligence (partially) unfettered by the rigid caste system.
The young and naive Qing-jao eventually traces the identity of Demosthenes. Discovering that Demosthenes is Valentine Wiggin, Ender’s sister – but that Valentine has been on a starship en route to Lusitania for the last thirty years – Qing-Jao concludes that the only possible explanation is advanced computer software closely tied to the communication network. This software must be hiding Demosthenes and publishing her work, while also causing the disappearance of the Fleet. All but discovered, Jane reveals herself to Han Fei-tzu, Han Qing-jao and Si Wang-mu, telling them about their genetic slavery and begging forbearance on their report to Starways Congress.
Already harboring suspicions about the godspoken’s condition, Han Fei-tzu accepts the news of Congress’s atrocity, as does Si Wang-mu, but his daughter Han Qing-jao clings to her belief that Demosthenes and Jane are enemies of the gods. Feeling betrayed by her father, who is violently incapacitated by OCD from the disloyal thoughts, Qing-jao argues with Jane. Jane threatens shutting off all communications from Path, but Si Wang-mu realizes this would eventually lead to the planet’s destruction by Starways Congress. Understanding Jane to be truly alive and compassionate, through tears Si Wang-mu states Jane will not block the report. However, Qing-jao compares Jane to the servants in Path’s caste system, merely a computer program designed to serve humans, containing neither autonomy nor awareness.
Knowing she has exhausted her last possibilities of stopping Qing-jao, Jane sacrifices her future and life, unwilling to bring harm to Qing-jao or the people of Path. A triumphant Qing-jao reports the knowledge of Demosthenes, Jane, and the fate of the Fleet to Starways Congress. Qing-jao recommends a coordinated date set several months from the present, to prepare the massive undertaking of setting up clean computers across the interplanetary network, after which the transition to a new system will kill Jane and allow Congress full control again. Allowing the message to be sent, Jane restores communication with the Fleet, and Congress re-issues the order for the Fleet to obliterate Lusitania.
Han Fei-tzu recovers from the incapacitation of his OCD, despairing over his daughter’s actions, and his unwitting aid in deeply brainwashing her to serve Congress. He and Si Wang-mu assist Jane and those on Lusitania in finding solutions to their impending catastrophes. Planter, a Pequenino on Lusitania, offers his life for an experiment to determine whether the Descolada gives Pequeninos sentience, or if they have the ability innately. Eventually, Elanora Ribeira is able to come up with a possible model for a “recolada:” a refit of the Descolada that allows the native life to survive and retain self-awareness, but doesn’t seek to kill all other life forms. With the available equipment, however, the recolada is impossible to make, and they are running out of time against the soon-to-arrive Fleet.
Outside
While this research takes place, tragedies occur on Lusitania. Father Estevão Ribeira, the priest attempting to sway a distant warmongering sect of the Pequeninos from their goal of attacking humanity, is killed by the Fathertree Warmaker, who took Quim hostage and denied him the food with the anti-descolada chemicals, so the descolada infected and killed him on the 7th day of being hostage. Grego Ribeira spurs a riot of humans to burn down the warmaker’s forest, but the violent mob gets out of his control, and rampages through the neighboring Pequenino forest instead, massacring many of its inhabitants – the original friends and allies of humanity. Under the terms of the treaty with Pequeninos, the Hive Queen is brought in to hold the peace, setting a perimeter guard of hive drones around the human colony and preventing further escalation of violence between the two groups. Grego is locked in jail, despite eventually stepping between the surviving Pequeninos and his own riot. The town realizes their horrific rage, and constructs a chapel surrounding the fallen priest’s grave, trying to find penance for their actions.
Finally, a breakthrough is made. Knowing the Ansible communication network allows instantaneous transfer of information, and through knowledge of how the Hive Queen gives sentience to child queens, Jane, Grego, and Olhado discover the “Outside”. The Outside is a spacetime plane where aiúas initially exist. (Aiúa is the term given to the pattern defining any specific structure of the universe, whether a particular atom, a star, or a sentient consciousness.) Formic hive queens are called from Outside after birth, giving awareness to the new body. Jane is able to contain within her vast computing power the pattern defining the billions of atoms and overall structure comprising a simple “starship” (little more than a room), with passengers included, and take them Outside. By bringing them Outside, where relative location is nonexistent, then back “Inside” at a different spot in the physical universe, instantaneous travel has been achieved, finally matching the instantaneous communication of the Ansibles and Formics. They quickly arrange to take Ender, Ela, and Miro to Outside. While Ela is Outside, she is able to create the recolada virus, which is a safe replacement of the descolada, and a cure to the godspoken genetic defect. Miro envisions his body as it was before he was crippled by paralysis, and upon arrival in the Outside, his consciousness is contained within a new, restored body. Ender discovers, however, the surreal unwitting creation of a new “Valentine” and new “Peter Wiggin” from his subconscious, who embody idealized forms of his altruistic and power-hungry sides.
The recolada begins its spread across Lusitania, converting the formerly lethal virus into a harmless aid to native life. The cure to the people of Path’s genetic-controlling defect is distributed, yet Han Fei-tzu is tragically unable to convince his daughter Qing-jao this was the true course of action. Confronted with the possibility of being lied to all her life and dooming many sentient species to destruction, or an alternative of believing all she ever loved and trusted has betrayed her – Demosthenes, her father, her friend, her world. Qing-jao instead continues her godspoken rite of woodgrain tracing until her death and is honored by those on Path who still believe in the gods as the last true godspoken. She is elevated to god status after her death. Si Wang-mu sets off with Peter to take control over Starways Congress to stop the Fleet closing in on Lusitania. The new Valentine-persona journeys to find a planet to which the population of Lusitania can evacuate. The stage is set for the final book of the four-part series, Children of the Mind.
Card is a professor of English at Southern Virginia University,[11] has written two books on creative writing, hosts writing bootcamps and workshops, and serves as a judge in the Writers of the Future contest.[12] A great-great-grandson of Brigham Young, Card is a practicing member of The Church of Jesus Christ of Latter-day Saints (LDS Church). In addition to producing a large body of fiction works, he has also offered political, religious, and social commentary in his columns and other writing.
Card began his writing career primarily as a poet, studying with Clinton F. Larson at BYU. During his studies as a theater major, he began “doctoring” scripts, adapting fiction for readers theater production, and finally writing his own one-act and full-length plays, several of which were produced by faculty directors at BYU. He also explored fiction writing, beginning with stories that eventually evolved into The Worthing Saga.
After returning to Provo, Utah from his LDS mission in Brazil, Card started the Utah Valley Repertory Theatre Company, which for two summers produced plays at “the Castle”, a Depression-era outdoor amphitheater behind the state psychiatric hospital in Provo; his company’s were the first plays ever produced at the Castle. Meanwhile, he took part-time employment as a proofreader at BYU Press, then made the jump to full-time employment as a copy editor. In 1976, in the midst of a paid role performing in the church’s musical celebrating America’s Bicentennial, he secured employment as an assistant editor at the Ensign, and moved to Salt Lake City. It was while working at Ensign that Card published his first piece of fiction. His short story “Gert Fram” appeared in the July 1977 fine arts issue of that magazine under the pseudonym Byron Walley.
Science fiction
He wrote the short story “Ender’s Game” while working at the BYU press, and submitted it to several publications. The idea for the later novel of the same title came from the short story about a school where boys can fight in space. It was eventually purchased by Ben Bova at Analog Science Fiction and Fact and published in the August 1977 issue. Meanwhile, he started writing half-hour audioplays on LDS Church history, the New Testament, and other subjects for Living Scriptures in Ogden, Utah; on the basis of that continuing contract, some freelance editing work, and a novel contract for Hot Sleep and A Planet Called Treason, he left Ensign and began supporting his family as a freelancer.
He completed his master’s degree in English at the University of Utah in 1981 and began a doctoral program at the University of Notre Dame, but the recession of the early 1980s caused the flow of new book contracts to temporarily dry up. He returned to full-time employment as the book editor for Compute! magazine in Greensboro, North Carolina, in 1983. In October of that year, a new contract for the Alvin Maker “trilogy” (now up to six books) allowed him to return to freelancing.
Ender’s Game and its sequel Speaker for the Dead were both awarded the Hugo Award and the Nebula Award, making Card the only author (as of 2015) to win both of science fiction’s top prizes in consecutive years. Card continued the series with Xenocide, Children of the Mind, Ender’s Shadow, Shadow of the Hegemon, Shadow Puppets, “First Meetings in the Enderverse“, Shadow of the Giant, Shadows in Flight, the 2007 release of A War of Gifts, and the 2008 release of Ender in Exile, a book that takes place after Ender’s Game and before Speaker for the Dead. Card has also announced his plan to write Shadows Alive, a book that connects the “Shadow” series and “Speaker” series together. He later also wrote the first formic war saga: Earth Unaware, Earth Afire, and Earth Awakens as a prequel to the Ender novels. This trilogy relays, among other things, the history of Mazer Rackham. In 2008 Card announced that Ender’s Game would be made into a movie, but that he did not have a director lined up (Wolfgang Petersen had previously been scheduled to direct the movie but subsequently moved on to other projects.) It was to be produced by Chartoff Productions, and Card was writing the screenplay himself.[17] The film was made several years later, and released in 2013, with Asa Butterfield in the title role and Gavin Hood directing.
In 1983 Card published the novel Saints, a historical fiction based loosely on one of his ancestors and her experiences coming into the LDS Church during the early portion of its movement. It continues through her eyes into subsequent events up until the granting of Statehood to Utah.
In 2000, Card published the first novel in The Women of Genesis series. This series explores the lives of the principal women mentioned in the first book of the Bible and includes Sarah (2000), Rebekah (2002), and Rachel and Leah (2004).
In the fall of 2005, Card launched Orson Scott Card’s InterGalactic Medicine Show.[19] He edited the first two issues, but found that the demands of teaching, writing, and directing plays for his local church theater group made it impossible to respond to writers’ submissions in a timely manner; former Card student and experienced freelance writer and editor Edmund R. Schubert took over as editor on June 1, 2006.
The dialog and screenplay (but not the story) for the Xbox video game Advent Rising was written by Card and Cameron Dayton.[20]
In 2008, Card’s novella Hamlet’s Father, a retelling of Shakespeare‘s Hamlet, was published in the anthology The Ghost Quartet (Tor Books). The work re-interpreted all of the characters’ personalities and motivations.
Pseudonyms
Over the years Orson Scott Card has used at least seven pseudonyms.
The names Frederick Bliss and P.Q. Gump were used by Card when he was asked to write an overview of Mormon playwrights “Mormon Shakespeares: A Study of Contemporary Mormon Theatre” for Spring 1976 issue of Sunstone magazine. According to Card he used these pseudonyms because the article included a brief reference to himself and his play “Stone Tables”.[21]
The name Byron Walley was used by Card on his first published piece of fiction “Gert Fram” which appeared in the July 1977 fine arts issue of Ensign magazine. According to Card he used this name because he had a non-fiction article, “Family Art”, a poem, “Looking West”, and a short play, “The Rag Mission”, appearing in the same issue.[21] Card also used the name Byron Walley in stories he published in Friend magazine, New Era magazine and in the anthology Dragons of Darkness. Stories by Byron Walley include: “Gert Fram“, Ensign magazine, July 1977; “Bicicleta“, Friend magazine, October 1977; “The Best Family Home Evening Ever“, Friend magazine, January 1978; “Billy’s Box“, Friend magazine, February 1978; “I Think Mom and Dad Are Going Crazy, Jerry“, New Era magazine, May 1979; and “Middle Woman“, Dragons of Darkness, Ace Books, 1982.
The name Brian Green was also used by Card in the July 1977 fine arts issue of Ensign magazine. He used this name for his short play “The Rag Mission” because he had three other pieces appearing in the same issue.[21]
The name Dinah Kirkham was used to write the short story “The Best Day“, in 1983.[22]
The name Noam D. Pellume was used by Card for his short story “Damn Fine Novel” which appeared in the October 1989 issue of The Green Pages.[23]
Card wrote the novel Zanna’s Gift (2004) under the pen name Scott Richards, saying, “I was trying to establish a separate identity in the marketplace, but for various reasons the marketing strategy didn’t work as we’d hoped.”[24]
On writing
Teaching
In 2005, Card accepted a permanent appointment as “distinguished professor” at Southern Virginia University in Buena Vista, Virginia, a small liberal arts college run according to the principles of The Church of Jesus Christ of Latter-day Saints. Card has cited his frustration with the dismal teaching methodology for creative writing in most universities as a reason for accepting this position, along with his desire to teach the techniques of effective fiction writing to writers whose values are more congruent with his own.[11] Card has worked closely with colleagues to develop ways to educate aspiring writers and has published two books on the subject. He was eager for the opportunity to apply these techniques in a university environment—his assorted workshops did not allow the follow-through he desired. After being deeply moved by stories of his students’ parents in some of their essays, he decided to stop teaching regularly at the university to spend time with his youngest child who still lives at home.[25][non-primary source needed] Card returned to teaching for the spring semester of 2009.
Books on writing
Card has written two books on the subject of creative writing – Characters and Viewpoint, published in 1988, and How to Write Science Fiction and Fantasy, published in 1990. He was also a co-writer for How to Write a Million (though his contribution is actually a reprint of an earlier work).
Card also offered advice about writing in an interview in Leading Edge #23 in 1991.
Card won the ALA Margaret Edwards Award in 2008 for his contribution in writing for teens, selected by a panel of YA librarians.[26] “What have I done that made some wonderfully deluded people think that I should get the [award] for lifetime achievement in writing young adult fiction?” he asked in his address, and asserted that “There is no such thing as children’s literature.” Furthermore:[27]
I have not worked with YA editors; my work has never been marketed that way until Tor put a YA cover and a new ISBN on Ender’s Game — fifteen years after the book first came out, and long after it had become popular with young readers. Ender’s Game was written with no concessions to young readers. My protagonists were children, but the book was definitely not aimed at kids. I was perfectly aware that the rule of thumb for children’s literature is that the protagonist must be a couple of years older than the target audience. You want ten-year-old readers, you have a twelve-year-old hero.
At the beginning of the book, Ender is six. Who, exactly, is the target audience?
Poetry
Card created a website, Strong Verse that publishes poetry from authors living and dead with the aim of showcasing works that present a clear message in clear language. The following motto appears on the website’s header: “Good poetry is meant to be understood, not decoded.”[28]
Opinion
Since 2001, Card’s commentary[29] includes the political columns “War Watch”, “World Watch”, or “Civilization Watch” (depending on Card’s topic) and the column “Uncle Orson Reviews Everything,” all published at the Greensboro Rhinoceros Times. The last-named column features personal reviews of movies, books, and restaurants in the greater Greensboro area, in addition to a variety of other topics.[30] The column also later appears on his website, Hatrack River. Since 2008 Card has written a column for the Mormon Times.
Politics
Card’s vocal opposition to same-sex marriage and other views on homosexuality led to a boycott of the film version of Ender’s Game[31] – a development which itself received criticism.[32] Owing to political developments, by the early 2010s Card believed the question of U.S. legalization of same-sex marriage moot.[33]
Describing himself as a political liberal[34] and moral conservative,[35] Card’s ideals concerning society—as well as foundational themes within his fiction—are described as communitarian.[34][36][37] In 2000, Card said, “Most of the program of both the left and the right is so unbelievably stupid it’s hard to wish to identify myself with either. But on economic matters, I’m a committed communitarian. I regard the Soviet Union as simply state monopoly capitalism. It was run the way the United States would be if Microsoft owned everything. Real communism has never been tried! I would like to see government controls expanded, laws that allow capitalism to not reward the most rapacious, exploitative behavior. I believe government has a strong role to protect us from capitalism.”[38]
In an August 2013 essay, he presented as an experiment in fictional writing of “The game of Unlikely Events”,[45] Card described an alternative future in which President Barack Obama ruled as a “Hitler– or Stalin-style dictator” with his own national police force of young unemployed men; Obama and his wife Michelle would have amended the U.S. Constitution to allow presidents to remain in power for life, as in Nigeria, Zimbabwe, and Hitler’s Germany.[46][47] Card’s essay drew criticism, especially for alleged insensitivity in its reference to urban gangs.[48][49][50]
Views about homosexuality
Card has publicly declared his opposition to homosexuality and same-sex marriage.[41][51] In a 1990 essay he wrote that the laws prohibiting homosexual behavior should remain on the books and be enforced in order to “send a message” that those who break those laws “cannot be permitted to remain as acceptable, equal citizens”.[41][52] In May 2013, however, Card wrote that since the US Supreme Court had ruled those laws unconstitutional in 2003, he has “no interest in criminalizing homosexual acts”.[53]
In a 2008 opinion piece in the Mormon church’s newspaper he wrote that “no matter how close the bonds of affection and friendship might be” for a same-sex couple, their relationship will never be “the same as the coupling between a man and a woman”. He additionally stated that any government attempting to change the definition of marriage is his “mortal enemy” and that he would “act to destroy that government and bring it down”.[54] In 2009 he joined the board of directors of the National Organization for Marriage, a group that campaigns against same-sex marriage,[41] but later resigned from the board in mid-2013.[31] Card has stated that there is “no need to legalize gay marriage”.[55]
Card has also expressed his opinion that paraphilia and homosexuality are linked. In 2004, he claimed that it’s a “myth that homosexuals are ‘born that way‘” and the “dark secret” of homosexuality was that it often resulted from “disturbing seduction”, “rape”, or child abuse.[31][41][55] Additionally, in Card’s 2008 novella Hamlet’s Father, which re-imagines the backstory of Shakespeare’s play Hamlet, Card was accused of directly trying to link the king’s pedophilia with homosexuality. The novella prompted public outcry and its publishers were inundated with complaints.[56][57] Trade journal Publishers Weekly criticized Card’s work, stating that the main purpose of it was to attempt to link homosexuality to pedophilia.[58] Card responded to the claim: “…[T]here is no link whatsoever between homosexuality and pedophilia in this book. Hamlet’s father, in the book, is a pedophile, period. I don’t show him being even slightly attracted to adults of either sex. It is the reviewer, not me, who has asserted this link, which I would not and did not make.”[57]
In 2013, Card was selected as a guest author for DC Comics‘s new Adventures of Superman comic book series,[59] but controversy over Card’s views on homosexuality led illustrator Chris Sprouse to leave the project[60] and DC Comics to put Card’s story on hold indefinitely.[61] A few months later an LGBT group, Geeks OUT!, proposed a boycott of the movie adaptation of Ender’s Game calling Card’s view anti-gay,[62][63] causing the movie studio Lionsgate to publicly distance itself from Card’s opinions.[64]
In July 2013, one week after the U.S. Supreme Court issued rulings in two cases that were widely interpreted as favoring recognition of same-sex marriages, Card wrote in Entertainment Weekly that the gay marriage issue is moot due to the Supreme Court’s decision on DOMA.[33] He further stated, “now it will be interesting to see whether the victorious proponents of gay marriage will show tolerance toward those who disagreed with them when the issue was still in dispute.”[33]
Religion
Card’s membership in The Church of Jesus Christ of Latter-day Saints has been an important facet of his life from early on. He is a great-great-grandson of Brigham Young, the second Latter-day Saint prophet, and all of Card’s ancestors for at least three generations have been members of the LDS Church. His ancestors include several other figures notable in the LDS Church, including the Cardston colony founder Charles Ora Card. As such, his faith has been a source of inspiration and influence for both his writing and his personal views.[14] Since 2008 Card has written a column of Latter-day Saint devotional and cultural commentary for the Sunday national edition of the Deseret News (formerly “the Mormon Times“).[65]
The life of their son, Charles, influenced some of Card’s fiction, most notably the Homecoming series, Lost Boys and Folk of the Fringe. Their daughter, Emily, along with two other writers, adapted Card’s short stories “Clap Hands and Sing“, “Lifeloop” and “A Sepulchre of Songs” for the stage in Posing as People.[66]
In 2008, he appeared in the short film The Delivery, which starred his daughter, Emily. He plays an author reading an audiobook in this film, which won First Place in Fantasy at Dragon*Con Film Festival. He wrote an original story, “The Emperor of the Air,” specifically for the short film by Gabrielle de Cuir and Stefan Rudnicki.
Card suffered a mild stroke on January 1, 2011, and was briefly hospitalized. He reported expecting to make a full recovery despite impairment of his left hand.[67][68]
Awards
The ALA Margaret A. Edwards Award recognizes one writer and a particular body of work for “significant and lasting contributions to young adult literature”. Card won the annual award in 2008, citing Ender’s Game (1985), which inaugurated the science fiction Ender Saga, and Ender’s Shadow (1999), the so-called parallel novel featuring another boy in the Battle School. According to the citation, the two boys’ “experiences echo those of teens, beginning as children navigating in an adult world and growing into a state of greater awareness of themselves, their communities and the larger universe.”[26] In the same year, Card won the Lifetime Achievement Award for Mormon writers (Whitney Awards).[69]
In 1978, the Harold B. Lee Library acquired the Orson Scott Card papers, which included Card’s works, writing notes and letters, and in 2007 the collection was formally opened.[74][75][76]
American Pie – Don McLean – Full Length 1989 Video from Original 1971/72 Song
Don McLean- American Pie (with Lyrics)
Donald Trump: Person Of The Year 2016 | POY 2016 | TIME
Time Magazine Person of the Year: Strangest Picks
Isaiah Wilner – “The Man Time Forgot”
USA – Seventy-five years of Time Magazine
Time Magazine Is Fake News
Henry R. Luce and the 20th Century
Uploaded on Apr 26, 2010
A discussion with two biographers of Henry R. Luce, the Yale graduate who founded Time, Inc. Alan Brinkley, an historian at Columbia University, and Lance Morrow, a contributor at Time, spoke about Luce and his impact on the 20th Century. Professor Shelly Kagan moderated the discussion; Yale University President Richard Levin gave the introduction. The event was sponsored by the Yale Daily News.
The Man Who Revolutionized Magazine Publishing: The Rise of the American News Media (2002)
Published on Dec 5, 2015
Henry Robinson Luce (April 3, 1898 – February 28, 1967), was a Chinese-American magazine magnate, who was called “the most influential private citizen in the America of his day”. About the book: https://www.amazon.com/gp/product/080…
He launched and closely supervised a stable of magazines that transformed journalism and the reading habits of upscale Americans. Time summarized and interpreted the week’s news; Life was a picture magazine of politics, culture, and society that dominated American visual perceptions in the era before television; Fortune explored in depth the economy and the world of business, introducing to executives avant-garde ideas such as Keynesianism; and Sports Illustrated explored the motivations and strategies of sports teams and key players. Counting his radio projects and newsreels, Luce created the first multimedia corporation. He was born in China to missionary parents. He envisaged that the United States would achieve world hegemony, and, in 1941, he declared the 20th century would be the “American Century”.
Nightly discussions of the concept of a news magazine led Luce and Hadden, both age 23, to quit their jobs in 1922. Later that same year, they formed Time Inc. Having raised $86,000 of a $100,000 goal, they published the first issue of Time on March 3, 1923. Luce served as business manager while Hadden was editor-in-chief. Luce and Hadden annually alternated year-to-year the titles of president and secretary-treasurer. In 1925, Luce decided to move headquarters to Cleveland, while Hadden was on a trip to Europe. Cleveland was cheaper, and Luce’s first wife, Lila, wanted out of New York. When Hadden returned, he was horrified and moved Time back to New York. Upon Hadden’s sudden death in 1929, Luce assumed Hadden’s position.
Luce launched the business magazine Fortune in February 1930 and acquired Life in order to relaunch it as a weekly magazine of photojournalism in November 1936; he went on to launch House & Home in 1952 and Sports Illustrated in 1954. He also produced The March of Time weekly newsreel. By the mid 1960s, Time Inc. was the largest and most prestigious magazine publisher in the world. (Dwight Macdonald, a Fortune staffer during the 1930s, referred to him as “Il Luce”, a play on the Italian Dictator Mussolini, who was called “Il Duce”).)
President Franklin D. Roosevelt, aware that most publishers were opposed to him, issued a decree in 1943 that blocked all publishers and media executives from visits to combat areas; he put General George Marshall in charge of enforcement. The main target was Luce, who had long opposed FDR. Historian Alan Brinkley argued the move was “badly mistaken”, for had Luce been allowed to travel, he would have been an enthusiastic cheerleader for American forces around the globe. But stranded in New York City, Luce’s frustration and anger expressed itself in hard-edged partisanship.[4] Luce, supported by Editor-in-Chief T. S. Matthews, appointed Whittaker Chambers as acting Foreign News editor in 1944, despite the feuds Chambers had with reporters in the field.[5]
Luce, who remained editor-in-chief of all his publications until 1964, maintained a position as an influential member of the Republican Party.[6] An instrumental figure behind the so-called “China Lobby”, he played a large role in steering American foreign policy and popular sentiment in favor of Nationalist leader Chiang Kai-shek and his wife Soong Mei-ling in their war against the Japanese. (The Chiangs appeared in the cover of Time eleven times between 1927 and 1955.[7])
It has been reported that Luce, during the 1960s, tried LSD and reported that he had talked to God under its influence.[8]
Once ambitious to become Secretary of State in a Republican administration, Luce penned a famous article in Life magazine in 1941, called “The American Century”, which defined the role of American foreign policy for the remainder of the 20th century (and perhaps beyond).
Firing Line with William F. Buckley Jr. “Reflections on the Current Scene”
Firing Line with William F. Buckley Jr. “Feminism”
Christopher Hitchens on News, Media, Entertainment and Propaganda (1997)
“THE END IS NEAR!” TIME Magazine Releases Cryptic Cover November 2016! TIME’S UP!
Edward Bernays called it PROPAGANDA
What is Propaganda
Devastating Expose on American Journalism and Media Concentration: Leading Thinkers Bernie Sanders
Mainstream Media Lies to the Masses – Media Lies – Media Lies Documentary
Propaganda and Manipulation: How mass media engineers and distorts our perceptions
More on propaganda and collective insanity
Propaganda & Engineering Consent for Empire with Mark Crispin Miller
Ben Shapiro on Fake News, Crumbling Mainstream Media, and Russia’s Hacking (Part 3)
Ben Shapiro and Dave Rubin: Trump, the Alt Right, Fake News, and More (Full Interview)
College Indoctrination Documentary
Education Is a System of Indoctrination of the Young – Noam Chomsky
27. Your Indoctrination
Ben Shapiro on indoctrination of America’s youth in universities
What is “Fake News?”
The Truth About Fake News | Russia Hacked U.S. Election For Donald Trump?
WELCOME TO TRUTH | Full Documentary 2014
The Future of Newspapers and Magazines
The Future of Journalism: Tom Rosenstiel at TEDxAtlanta
Citizen journalism | Paul Lewis | TEDxThessaloniki
The slow journalism revolution | Rob Orchard | TEDxMadrid
Why the majority is always wrong | Paul Rulkens | TEDxMaastricht
Why I read a book a day (and why you should too): the law of 33% | Tai Lopez | TEDxUBIWiltz
George Carlin – Political Correctness is fascism pretending to be Manners………………
George Carlin the illusion of freedom
The Owners of the Country
How ‘Elites’ Became One of the Nastiest Epithets in American Politics
Our new president is a private-jet-setting billionaire Ivy League graduate, a real estate tycoon, a TV star and a son of inherited wealth. But he is no longer, by his own calculations, a member of the “elite.” Nor are the men (and the few women) now joining his inner circle — 1-percenters and corporate executives, Harvard and Yale alumni, Silicon Valley entrepreneurs and Goldman Sachs bankers. The true elite apparently sits elsewhere, among those who, in Sarah Palin’s notable 2008 formulation, think “that they’re — I guess — better than anyone else.”
As an adjective, the word “elite” still conveys something positive, even aspirational: elite athlete, elite model, elite travel services. But as a noun, embodied by actual living people, it has become one of the nastiest epithets in American politics. “Elites have taken all the upside for themselves and pushed the downside to the working- and middle-class Americans,” complains Trump’s adviser Steve Bannon (of Harvard, Goldman Sachs and Hollywood). In this formulation, elites are a destructive, condescending collective, plotting against the beleaguered masses outside their ranks.
And in these attacks, the president-elect and his team are deploying one of the most effective partisan political stereotypes of the modern age. For most of American history, anti-elite sentiment was a matter of up versus down, not left versus right. But about half a century ago, the conservative movement set out to claim anti-elite politics as its own. That meant redefining the term away from class and toward culture, where the “elite” could be identified by its liberal ideas, coastal real estate and highbrow consumer preferences. The right-wing Club for Growth captured this type in a famous 2004 attack ad, instructing the Democrat Howard Dean to “take his tax-hiking, government-expanding, latte-drinking, sushi-eating, Volvo-driving, New York Times-reading, body-piercing, Hollywood-loving, left-wing freak show back to Vermont where it belongs.”
Trump adjusted the formula for the hot topics of the 2016 campaign. “I was on the right side of that issue, as you know, with the people,” he boasted after Brexit, adding that “Hillary, as always, stood with the elites.” His complaints against “political correctness” conjure a world of absurdist campus politics, where overprivileged students squabble over gender pronouns and the fine points of racial victimization. “Media elites” come in for special attack, cordoned off in pens to be mocked and jeered at during rallies, labeled both liars and incompetents.
But Trump has also ventured beyond mere name-calling, turning the 2016 election into a competition between knowledge systems: the tell-it-like-it-is “people” versus the know-it-all “elites.” His campaign insisted for months that pollsters and technocrats and media would be proven wrong by his electoral success. The fact that he did win dealt a blow to an entire worldview, one in which empirical inquiry and truth-telling were supposed to triumph in the end. The question, now, is whether it’s possible to run an executive branch based on hostility toward experts and professionals of all political stripes — and how many billionaires and Ivy Leaguers Trump can appoint before this rhetorical pose begins to break down altogether.
The notion that distant elites might be conspiring against the people comes straight from the Founding Fathers, whose Declaration of Independence lamented the “long train of abuses and usurpations” inflicted upon ordinary Americans by an arrogant British king. From there on, United States history might be seen as a repeating cycle of anti-elite revolt. The Jacksonians rebelled against the Founders’ aristocratic pretensions. Northern “free labor” went to war against the oligarchical slavocracy. And the Populist revolts of the late 19th century adapted this story to modern capitalism, with farmers and laborers rebelling against robber barons, bankers, time-management experts and college-educated professionals.
The first historians to study those Populists described them as heroic crusaders, champions of the “people” against the “powers.” But by the middle of the 20th century, alarmed by the rise of fascism and homegrown demagogues like Senator Joseph McCarthy, a new generation of scholars took a more anxious view of the anti-elite spirit. In his 1955 book “The Age of Reform,” Richard Hofstadter dismissed the Populists as backward-looking, provincial anti-Semites, the latent fascists of their day. Eight years later, his “Anti-Intellectualism in American Life” documented a dangerous suspicion of “the critical mind” that seemed to course through the national culture. From his perspective, the 1952 election captured everything wrong with American political life, with Dwight Eisenhower’s “philistinism” winning over Adlai Stevenson’s “intellect.”
Hofstadter did not usually describe his ideal intellectually minded citizens as members of an “elite.” That word conveyed something different — a ruling class that held direct political and economic power. The most famous articulation of this view came from the sociologist C. Wright Mills, in his 1956 assessment of America’s “power elite.” “They rule the big corporations,” Mills wrote. “They run the machinery of the state and claim its prerogatives. They direct the military establishment.” In Mills’s view, these people were tied together not by culture or ideology but by their positions at the helms of large, ever-more-complex institutions. As individuals, they might be Republicans or Democrats, and might live in Ohio or California. The point was that they were in charge of things.
But that vision never gained much traction in mainstream politics, where a more partisan, targeted definition was starting to emerge. William F. Buckley Jr. carved out some essentials in his first book, “God and Man at Yale,” drawing a neat distinction between respectable Ivy-educated men like himself and the socialistic eggheads of the professoriate. Ronald Reagan chose the term “elite” to bring it all together in his famed 1964 speech, “A Time for Choosing,” delivered on behalf of the Republican presidential candidate Barry Goldwater. “This is the issue of this election,” he said: “whether we believe in our capacity for self-government or whether we abandon the American Revolution and confess that a little intellectual elite in a far-distant capitol can plan our lives for us better than we can plan them ourselves.”
Lyndon Johnson won that election in a blowout, but Reagan’s vision of a smug and detached liberal elite helped spark the oncoming “culture wars,” pitting a supposedly indignant Middle America against the liberal snobs of the coasts. By the 1990s, with the rise of right-wing media stars like Rush Limbaugh and Bill O’Reilly, bashing the “liberal elite” had become a favorite blood sport of the American right.
Despite all the abuse hurled their way, some “liberal elites” have accepted at least part of their detractors’ critique, particularly on the progressive left. It was during Bill Clinton’s presidency that the social critic Christopher Lasch published “The Revolt of the Elites and the Betrayal of Democracy,” which mourned that “upper-middle-class liberals” had turned into “petulant, self-righteous, intolerant” scolds, thoroughly out of touch with the concerns of Middle America. Since then, the torch has passed to a younger generation of writers, including MSNBC’s Chris Hayes, whose 2012 “Twilight of the Elites” called for rethinking the entire ethos of liberal “meritocracy” — a system, he argued, that tends to fuel self-congratulation and incompetence at the top while offering little but contempt and dim prospects for those at the bottom.
So as 2017 begins, we find ourselves in a strange and uncertain political moment. Antipathy toward a wealthy, preening managerial class seems to be gaining popularity across the political spectrum — and, oddly, to have helped elect a wealthy, preening incoming president. Meanwhile, both liberal and conservative “elites” are scrambling to figure out what happens if the president-elect continues to reject basic political norms and even routine intelligence briefings. Under a Trump presidency, such “elites” may have no choice but to attempt a radical redefinition of their role in American life. Otherwise, the man in the White House will do it for them.
Henry Robinson Luce (April 3, 1898 – February 28, 1967) was an American magazine magnate who was called “the most influential private citizen in the America of his day”.[1] He launched and closely supervised a stable of magazines that transformed journalism and the reading habits of upscale Americans. Time summarized and interpreted the week’s news; Life was a picture magazine of politics, culture, and society that dominated American visual perceptions in the era before television; Fortune explored in depth the economy and the world of business, introducing to executives avant-garde ideas such as Keynesianism; and Sports Illustrated explored the motivations and strategies of sports teams and key players. Counting his radio projects and newsreels, Luce created the first multimedia corporation. He was born in China to missionary parents. He envisaged that the United States would achieve world hegemony, and, in 1941, he declared the 20th century would be the “American Century“.[2][3]
At 15, he was sent to the US to attend the Hotchkiss School in Connecticut, where he edited the Hotchkiss Literary Monthly. It was there he first met Briton Hadden,[3] who would become a lifelong partner. At the time, Hadden served as editor-in-chief of the school newspaper, and Luce worked as an assistant managing editor. Both went on to Yale College, where Hadden served as chairman and Luce as managing editor of The Yale Daily News. Luce was also a member of Alpha Delta Phi and Skull and Bones. After being voted “most brilliant” of his class and graduating in 1920, he parted ways with Hadden to embark for a year on historical studies at Oxford University, followed by a stint as a cub reporter for the Chicago Daily News.
In December 1921, Luce rejoined Hadden to work at The Baltimore News. Recalling his relationship with Hadden, Luce later said, “Somehow, despite the greatest differences in temperaments and even in interests, we had to work together. We were an organization. At the center of our lives — our job, our function — at that point everything we had belonged to each other.”[citation needed]
Magazines
Nightly discussions of the concept of a news magazine led Luce and Hadden, both age 23, to quit their jobs in 1922. Later that same year, they partnered with Robert Livingston Johnson and another Yale classmate to form Time Inc.[4] Having raised $86,000 of a $100,000 goal, they published the first issue of Time on March 3, 1923. Luce served as business manager while Hadden was editor-in-chief. Luce and Hadden annually alternated year-to-year the titles of president and secretary-treasurer while Johnson served as vice president and advertising director. In 1925, Luce decided to move headquarters to Cleveland, while Hadden was on a trip to Europe. Cleveland was cheaper, and Luce’s first wife, Lila, wanted out of New York. When Hadden returned, he was horrified and moved Time back to New York. Upon Hadden’s sudden death in 1929, Luce assumed Hadden’s position.
Luce launched the business magazine Fortune in February 1930 and acquired Life in order to relaunch it as a weekly magazine of photojournalism in November 1936; he went on to launch House & Home in 1952 and Sports Illustrated in 1954. He also produced The March of Time weekly newsreel. By the mid 1960s, Time Inc. was the largest and most prestigious magazine publisher in the world. (Dwight Macdonald, a Fortune staffer during the 1930s, referred to him as “Il Luce”, a play on the Italian Dictator Mussolini, who was called “Il Duce”).)
President Franklin D. Roosevelt, aware that most publishers were opposed to him, issued a decree in 1943 that blocked all publishers and media executives from visits to combat areas; he put General George Marshall in charge of enforcement.[citation needed] The main target was Luce, who had long opposed Roosevelt. Historian Alan Brinkley argued the move was “badly mistaken” and said had Luce been allowed to travel, he would have been an enthusiastic cheerleader for American forces around the globe.[citation needed] However, stranded in New York City, Luce’s frustration and anger expressed itself in blatant partisanship.[5]
Luce, supported by Editor-in-Chief T. S. Matthews, appointed Whittaker Chambers as acting Foreign News editor in 1944, despite the feuds that Chambers had with reporters in the field.[6]
Luce, who remained editor-in-chief of all his publications until 1964, maintained a position as an influential member of the Republican Party.[7] An instrumental figure behind the so-called “China Lobby“, he played a large role in steering American foreign policy and popular sentiment in favor of Kuomintang leader Chiang Kai-shek and his wife, Soong Mei-ling, in their war against the Japanese. (The Chiangs appeared in the cover of Time eleven times between 1927 and 1955.[8])
It has been reported that Luce, during the 1960s, tried LSD and reported that he had talked to God under its influence.[9]
Once ambitious to become Secretary of State in a Republican administration, Luce penned a famous article in Life magazine in 1941, called “The American Century“, which defined the role of American foreign policy for the remainder of the 20th century (and perhaps beyond).[7]
An ardent anti-Soviet, he once demanded John Kennedy invade Cuba, later to remark to his editors that if he did not, his corporation would act like Hearst during the Spanish–American War. The publisher would advance his concepts of US dominance of the “American Century” through his periodicals with the ideals shared and guided by members of his social circle, John Foster Dulles, Secretary of State and his brother, director of the CIA, Allen Dulles. To highlight the cozy extent of their alliance, rumors swirled that the publisher shared the wartime mistress of the spymaster with Clare Booth Luce.[10]
Luce had two children, Peter Paul and Henry Luce III, with his first wife, Lila Hotz. He married his second wife, Clare Boothe Luce in 1935, who had an 11-year-old daughter, Ann Clare Brokaw, whom he raised as his own. He died in Phoenix, Arizona in 1967. According to the Henry Luce Foundation, he died suddenly at age 68 while visiting his home on Fishers Island, New York, of cardiac arrest. At his death, he was said to be worth $100 million in Time Inc. stock.[11] Most of his fortune went to the Henry Luce Foundation. During his life, Luce supported many philanthropies such as Save the Children Federation, the Metropolitan Museum of Art and United Service to China, Inc. He is interred at Mepkin Plantation in South Carolina.
Jump up^Maisto, Stephen A., Galizio, Mark, & Connors, Gerald J. (2008). Drug Use and Abuse: Fifth Edition. Belmont: Thomson Higher Education. ISBN 0-495-09207-X
Jump up^Talbot, David. “The Devils’ Chessboard: Allen Dulles, The CIA and the Rise of America’s Secret Government.” (2015) Harper-Collins, pub., New York, New York pp. 236-238, 444.
Brinkley, Alan. What Would Henry Luce Make of the Digital Age?, TIME (April 19, 2010) excerpt and text search
Elson, Robert T. Time Inc: The Intimate History of a Publishing Enterprise, 1923-1941 (1968); vol. 2: The World of Time Inc.: The Intimate History, 1941-1960 (1973), official corporate history
Herzstein, Robert E. Henry R. Luce, Time, and the American Crusade in Asia (2006) excerpt and text search
Herzstein, Robert E. Henry R. Luce: A Political Portrait of the Man Who Created the American Century (1994).
Swanberg was born in Saint Paul, Minnesota in 1907, and earned his B.A. at the University of Minnesota in 1930.[5]
With grudging and only partial help from his father, who wanted his son to be a cabinet maker like himself, Swanberg earned his degree, only to find that employment as a journalist with such local daily newspapers as the St. Paul Daily News and the Minneapolis Star was unsatisfactory, as their staff were shrinking during the Great Depression. Swanberg instead held a succession of low-paying manual labor jobs. After five years he followed a college friend to New York City in September 1935. After months of anxious job-hunting he secured an interview at the Dell Publishing Company with president George T. Delacorte Jr. himself, and was hired as an assistant editor of three lowbrow magazines. Money saved in the next months enabled him to return briefly to the Midwest to marry his college sweetheart Dorothy Green, and bring her to New York. He soon began to climb up the editorial ladder at Dell, and by 1939 he was doing well enough to buy a house in Connecticut.
When the United States entered World War II, Swanberg was 34 years old, the father of two children and suffering from a hearing disability. Rejected by the army, he enlisted in the Office of War Information in 1943 and, after training was sent to England following D-Day. In London, amid the V-1 and V-2 attacks, he prepared and edited pamphlets to be air-dropped behind enemy lines in France and later in Norway.[6] With the end of the war he returned in October 1945 to Dell and the publishing world.
Swanberg did not return to magazine editing but instead did freelance work within and without Dell. By 1953 he began carving out time for researching his first book (Sickles), which Scribner’s purchased, beginning a long-term association. Swanberg’s early hopes of newspaper work never materialized, but by the mid-1950s he had established himself as scholarly biographer. His efforts proved to be labor-intensive and required up to four years apiece, even when assisted by the research and transcription efforts of his wife Dorothy. Upon turning 80 in 1987, Swanberg attempted one last biography, about William Eugene “Pussyfoot” Johnson (1862–1945).[7] He was at work on that project when he succumbed to heart failure at his typewriter in Southbury, Connecticut on September 17, 1992.
Swanberg’s 1961 book Citizen Hearst: A Biography of William Randolph Hearst was recommended for a Pulitzer Prize for Biography or Autobiography by the advisory board but rejected by the trustees of Columbia University, apparently because they thought that Hearst was not dignified enough to be the subject of the award. It was the first time in 46 years that the trustees rejected a recommendation from the advisory board, and the news caused sales to soar.[1]
Works
In a statistical overview derived from writings by and about William Andrew Swanberg, OCLC/WorldCat[clarification needed] encompasses roughly 30+ works in 100+ publications in 5 languages and 16,000+ library holdings.[8]
Frank Luther Mott-Kappa Tau Alpha Award, 1961, for Citizen Hearst
In 1962 the Pulitzer Board awarded the Pulitzer Prize in biography to Citizen Hearst. The trustees of Columbia University, who administer the prize, overturned the award refusing to honor a book whose subject (William Randolph Hearst) cannot be regarded as an “eminent example of the biographer’s art as specified in the prize definition.”[2]
Trump says “let it be an arms race” when it comes to nuclear weapons
“Absolutely Frightening”: Greenpeace on Trump’s Call for a New Nuclear Arms Race
Trump, Putin both seek to boost their nuclear capability
Published on Dec 22, 2016
President-elect Donald Trump signaled Thursday that he will look to “strengthen and expand” the US’s nuclear capability hours after Russian President Vladimir Putin pledged to enhance his country’s nuclear forces.
The exchange appeared to raise the prospect of a new arms race between the two nuclear superpowers, which between them boast more than 14,000 nuclear warheads, the still deadly legacy of their four-decades long Cold War standoff.
But the comments by Putin, who is presiding over a project to restore Russia’s lost global power and influence, and Trump, who will shortly become the US commander-in-chief, did not spell out exactly what each side is proposing or whether a major change of nuclear doctrine is in the offing.
Trump weighed in with a tweet just hours after Putin spoke following a meeting with his military advisers to review the activity of the past year.
“The United States must greatly strengthen and expand its nuclear capability until such time as the world comes to its senses regarding nukes,” Trump wrote.
It was not immediately clear if the President-elect is proposing an entire new nuclear policy that he would begin to flesh out once he takes office next year.
Trump could also be referring to plans to modernize the current US nuclear arsenal that are currently underway and will cost hundreds of billions of dollars. The Obama administration has outlined a plan to modernize delivery systems, command and control systems and to refurbish warheads in the US nuclear triad — the US force of sea, airborne and missile delivered nuclear weapons.
Trump and nuclear fears
US Nuclear Weapons Systems Need an Upgrade. Here’s Why
America’s nuclear bomb gets a makeover
USA Dropped a Safe Nuclear Bomb in Nevada – F-15 Launching a Brand New B-61 Bomb
B61 US Nuclear Bomb Program
Nuclear Modernization: Is the United States Headed for a New Arms Race?
Stratcom Commander Emphasizes Need to Modernize Nuke “Russia is modernizing their nuclear triad”
Report on Russia’s Nuclear Triad Modernization
INSIDE VIEW !!! US Air Force Minuteman Strategic Missile Silo Mini Documentary
Published on Mar 10, 2016
The LGM-30 Minuteman is a US land-based intercontinental ballistic missile (ICBM), in service with the Air Force Global Strike Command. As of 2014, the LGM-30G Minuteman III version[a] is the only land-based ICBM in service in the United States.[citation needed]
Development of the Minuteman began in the mid-1950s as the outgrowth of basic research into solid fuel rocket motors which indicated an ICBM based on solids was possible. Such a missile could stand ready for extended periods of time with little maintenance, and then launch on command. In comparison, existing US missile designs using liquid fuels required a lengthy fueling process immediately before launch, which left them open to the possibility of surprise attack. This potential for immediate launch gave the missile its name; like the Revolutionary War’s Minutemen, the Minuteman was designed to be launched on a moment’s notice.[2][3]
Minuteman entered service in 1962 as a weapon tasked primarily with the deterrence role, threatening Soviet cities with a counterattack if the US was attacked. However, with the development of the US Navy’s Polaris which addressed the same role, the Air Force began to modify Minuteman into a weapon with much greater accuracy with the specific intent of allowing it to attack hardened military targets, including Soviet missile silos. The Minuteman-II entered service in 1965 with a host of upgrades to improve its accuracy and survivability in the face of an anti-ballistic missile (ABM) system the Soviets were known to be developing. Minuteman-III followed in 1970, using three smaller warheads instead of one large one, which made it very difficult to attack by an anti-ballistic missile system which would have to hit all three widely separated warheads to be effective. Minuteman-III was the first multiple independently targetable reentry vehicle (MIRV) ICBM to be deployed. Each missile can carry up to three nuclear warheads, which have a yield in the range of 300 to 500 kilotons.
Peaking at 1000 missiles in the 1970s, the current US force consists of 450 Minuteman-III missiles[4] in missile silos around Malmstrom AFB, Montana; Minot AFB, North Dakota; and F.E. Warren AFB, Wyoming.[1] By 2018 this will be reduced to 400 armed missiles, with 50 unarmed missiles in reserve, and four non-deployed test launchers to comply with the New START treaty.[5] The Air Force plans to keep the missile in service until at least 2030.[6][7] It is one component of the US nuclear triad—the other two parts of the triad being the Trident submarine-launched ballistic missile (SLBM), and nuclear weapons carried by long-range strategic bombers.
Type Intercontinental ballistic missile
Place of origin United States
Service history
In service 1962 (Minuteman-I)
1965 (Minuteman-II)
1970 (Minuteman-III)
Used by United States
Production history
Manufacturer Boeing
Unit cost $7,000,000
Specifications
Weight 78,000 lb (35,300 kg)
Length 59 ft 9.5 in (18.2 m)
Diameter 5 ft 6 in (1.7 m) (1st stage)
Warhead Nuclear: W62, W78, or (2006–) W87
Detonation
mechanism
Air Burst or Contact (Surface)
Engine Three-stage Solid-fuel rocket engines; first stage: Thiokol TU-122 (M-55); second stage: Aerojet-General SR-19-AJ-1; third stage: Aerojet/Thiokol SR73-AJ/TC-1
Operational
range
approx. 8,100 (exact is classified) miles (13,000 km)
Flight altitude 700 miles (1,120 kilometers)
Speed Approximately 17507 mph (Mach 23, or 28176 km/h, or 7 km/s) (terminal phase)
Guidance
system
Inertial
Accuracy 200 m CEP
Launch
platform
Missile Silo (MLCC)
Minuteman-III (LGM-30G): the current model [edit]
Side view of Minuteman-III ICBM
Airmen work on a Minuteman-III’s multiple independently-targetable re-entry vehicle (MIRV) system. Current missiles carry a single warhead.
The LGM-30G Minuteman-III program started in 1966, and included several improvements over the previous versions. It was first deployed in 1970. Most modifications related to the final stage and reentry system (RS). The final (third) stage was improved with a new fluid-injected motor, giving finer control than the previous four-nozzle system. Performance improvements realized in Minuteman-III include increased flexibility in reentry vehicle (RV) and penetration aids deployment, increased survivability after a nuclear attack, and increased payload capacity.[1] The missile retains a gimballed inertial guidance system.
Minuteman-III originally contained the following distinguishing features:
Armed with W62 warhead, having a yield of only 170 kilotons TNT, instead of previous W56’s yield of 1.2 megatons.[28]
It was the first[29] Multiple Independently Targetable Reentry Vehicles (MIRV) missile. A single missile was then able to target 3 separate locations. This was an improvement from the Minuteman-I and Minuteman-II models, which were only able to carry one large warhead.
An RS capable of deploying, in addition to the warheads, penetration aids such as chaff and decoys.
Minuteman-III introduced in the
Examining the U.S. Nuclear Spending Binge | Arms Control Association
Published on Jul 31, 2016
The Arms Control Association has for years raised warning sirens about the cost and necessity of the modernization plans and have suggested a number of steps that could be taken to put the plans on a more sustainable course. The Pentagon estimates that the proposed modernization effort of the U.S. nuclear triad and its supporting infrastructure over the next 25 years will cost between $350-$450 billion.
The remainder of the Obama administration and that of the next president will likely be faced with a number of increasingly urgent questions about America’s nuclear modernization project, including its affordability, opportunity costs, impacts on global stability and more.
Speakers on this panel addressed the scope of the current nuclear weapons spending plans, challenges and options available to the next president, and the feasibility of the modernization plans given the experience of previous administrations.
• Mark F. Cancian, Senior Advisor with the International Security Program at the Center for Strategic and International Studies
• Hans Kristensen, Director of the Nuclear Information Project at the Federation of American Scientists
• Andrew Weber, former Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense Programs
• Amy Woolf, Specialist in Nuclear Weapons Policy at the Congressional Research Service
• Kingston Reif, Arms Control Association, Moderator
LGM-30 Minuteman Launch – ICBM
Published on May 31, 2016
The LGM-30 Minuteman is a U.S. land-based intercontinental ballistic missile (ICBM), in service with the Air Force Global Strike Command.
As of 2014, the LGM-30G Minuteman III version is the only land-based ICBM in service in the United States.
PONI Live Debate: Triad Modernization
Should the US Spend $1 Trillion on Nuclear Weapons?
Breaking down Russia and U.S. nuclear capabilities
China Nuclear Message to Donald Trump
Nuclear weapons… new Documentary BBC 2016
As Pentagon overhauls nuclear triad, critics advise caution
The Future of US Submarines: Ohio Replacement SSBN(X) Ballistic Missile Subs
Evaluating President-elect Trump so far
President Obama Is Modernizing Nuclear Weapons – Here’s Why You Should Care
Inside Aging American Nuke Base
Presidential Debate Highlights | Trump, Clinton Nuclear Weapons Policy
Donald Trump: Why Can’t We Use Nuclear Weapons If We Have Them?
#LoserDonald: Why Don’t We Use Nukes?
Nuclear weapon states continue to upgrade stockpiles: SIPRI
NEW USA Military Technology threats to Russia & China Navy (2016)
Obama Promised a “World Without Nuclear Weapons,” But May Now Spend $3 Trillion on Weapons Upgrades
This Russian Weapon Can Destroy an Entire Army | WORST NIGHTMARE for US Military
TOP 5 WEAPONS OF U.S.A.
US Military’s new $100 Billion WEAPONS will dominate the World
World Nuclear War scenario… how it would look like – Documentary
Nuclear Weapons (The History)
4th Generation Nuclear Weapons
Fail Safe – Movie (1964)
Fail-Safe, Conclusion
The Making of “Dr. Strangelove”
The Bomb Run Sequence from Dr. Strangelove
Dr. Strangelove Final Scene
Trump Said the U.S. Should Expand Nuclear Weapons. He’s Right.
America needs to bolster its deterrence not to start a war, but to prevent one.
On Thursday, Donald Trump created controversy when he tweeted, “The United States must greatly strengthen and expand its nuclear capability until such time as the world comes to its senses regarding nukes.” In case anyone was confused, he followed up Friday morning with an off-air remark to MSNBC’s “Morning Joe” that clarified his intentions: “Let it be an arms race,” he said. “We will outmatch them at every pass and outlast them all.”
The backlash was swift and unanimous. Critics charged that there is no plausible reason to expand U.S. nuclear weapons, that Trump’s comments contradicted a decades-old bipartisan consensus on the need to reduce nuclear stockpiles, and that such reckless statements risk provoking a new nuclear arms race with Russia and China.
On this matter, however, Trump is right.
U.S. nuclear strategy cannot be static, but must take into account the nuclear strategy and capabilities of its adversaries. For decades, the United States was able to reduce its nuclear arsenal from Cold War highs because it did not face any plausible nuclear challengers. But great power political competition has returned and it has brought nuclear weapons, the ultimate instrument of military force, along for the ride.
In recent years, North Korea has continued to grow its nuclear arsenal and means of delivery and has issued chilling nuclear threats against the United States and its Asian allies. As recently as Thursday — before Trump’s offending tweet — Rodong Sinmum, the Pyongyang regime’s official newspaper, published an opinion article calling for bolstering North Korea’s “nuclear deterrence.”
The potential threats are everywhere. Washington faces an increasing risk of conflict with a newly assertive, nuclear-armed China in the South China Sea. Beijing is expanding its nuclear forces and it is estimated that the number of Chinese warheads capable of reaching the U.S. homeland has more than trebled in the past decade and continues to grow. And Russia has become more aggressive in Europe and the Middle East and has engaged in explicit nuclear saber rattling the likes of which we have not seen since the 1980s. At the height of the crisis over Crimea in 2014, for example, Russian President Vladimir Putin ominously declared, “It’s best not to mess with us … I want to remind you that Russia is one of the leading nuclear powers.” And on Tuesday, he vowed to “enhance the combat capability of strategic nuclear forces, primarily by strengthening missile complexes that will be guaranteed to penetrate existing and future missile defense systems.” As former Defense Secretary William Perry correctly notes, “Today, the danger of some sort of a nuclear catastrophe is greater than it was during the Cold War.”
The United States needs a robust nuclear force, therefore, not because anyone wants to fight a nuclear war, but rather, the opposite: to deter potential adversaries from attacking or coercing the United States and its allies with nuclear weapons of their own.
Under President Barack Obama, the United States mindlessly reduced its nuclear arsenal even as other nuclear powers went in the opposite direction, expanding and modernizing their nuclear forces. Such a path was unsustainable and Trump is correct to recognize that America’s aging nuclear arsenal is in need of some long overdue upgrades.
So, what would expanding and strengthening the nuclear arsenal look like?
First, the United States must modernize all three legs of the nuclear triad (submarines; long-range bombers, including a new cruise missile; and intercontinental ballistic missiles, or ICBMs). The Obama administration announced plans to modernize the triad under Republican pressure, but critics are already trying to kill off the ICBM and the cruise missile, and production timelines for these weapon systems keep slipping into the future. The Trump administration must make the timely modernization of all three legs of the triad a top priority.
Second, the United States should increase its deployment of nuclear warheads, consistent with its international obligations. According to New START, the treaty signed with Russia in 2011, each state will deploy no more than 1,550 strategic nuclear warheads, but those restrictions don’t kick in until February 2018. At present, according to the State Department, the United States is roughly 200 warheads below the limit while Russia is almost 250 warheads above it. Accordingly, Russia currently possesses a nuclear superiority of more than 400 warheads, which is worrisome in and of itself and also raises serious questions about whether Moscow intends to comply with this treaty at all. The United States, therefore, should expand its deployed arsenal up to the treaty limits and be fully prepared for further expansion should Russia break out — as Moscow has done with several other legacy arms control agreements.
Third, and finally, the United States and NATO need more flexible nuclear options in Europe. In the event of a losing war with NATO, Russian strategy calls for limited nuclear “de-escalation” strikes against European civilian and military targets. At present, NATO lacks an adequate response to this threat. As I explain in a new report, the United States must develop enhanced nuclear capabilities, including a tactical, air-to-surface cruise missile, in order to disabuse Putin of the notion that he can use nuclear weapons in Europe and get away with it.
These stubborn facts lay bare the ignorance or naivety of those fretting that Trump’s tweets risk starting a new nuclear arms race. It is U.S. adversaries, not Trump, who are moving first. It is a failure to respond that would be most reckless, signaling continued American weakness and only incentivizing further nuclear aggression.
The past eight years have been demoralizing for many in the defense policy community as Obama has consistently placed ideology over reality in the setting of U.S. nuclear policy. The results, an increasingly disordered world filled with intensifying nuclear dangers, speak for themselves.
Rather than express outrage over Trump’s tweet, therefore, we should take heart that we once again have a president who may be willing to do what it takes to defend the country against real, growing and truly existential threats.
How the Pentagon Plans to Modernize the US Nuclear Arsenal
By JUSTIN FISHEL
LUIS MARTINEZ
Dec 23, 2016, 2:22 PM ET
President-elect Donald Trump’s tweets this week about strengthening and expanding America’s nuclear weapons capability are raising eyebrows, but they also highlight the Pentagon’s existing programs to update and modernize its nuclear arsenal.
The components of America’s nuclear triad of Intercontinental Ballistic Missiles (ICBM’s), strategic bombers, and submarine-launched ballistic missiles are decades old. While the Pentagon has undergone a modernization process to keep these systems intact over that time, the Pentagon has plans to replace each leg of the triad in the coming decades.
But the Pentagon’s plans to update and modernize the nuclear triad will be a lengthy and costly enterprise. Defense Secretary Ash Carter told Congress earlier this year that it will cost $350 billion to $450 billion to update and modernize beginning in 2021. But there are some estimates that a 30-year modernization program could cost as much as $1 trillion.
And that process has gotten underway since the lifespan of the existing delivery systems ends in the next 15 to 20 years. Replacement systems are currently in the phase of research, development, testing and evaluation.
The U.S. Air Force maintains a fleet of 450 Minuteman III ICBM missiles located in underground silos across the plains states, each carrying multiple nuclear warheads. A key leg of the nuclear triad, the Minuteman III missiles went into service in the 1970’s and have been upgraded ever since to keep them mission ready. No new ICBM missiles have gone into service since the MX missile was deployed in the 1980’s, but those missiles were retired a decade ago.
This summer, the Air Force began the process of soliciting designs for a new ICBM to replace the Minuteman III, with the first new missile scheduled to enter service by 2029.
The Air Force has already begun the process of replacing the 76 B-52 strategic bombers that have been flying since the 1960’s with the new B-21 “Raider” that will begin flying in 2025. Upgrades to the B-52, designed in the 1950’s, have allowed the aircraft to continue serving as a nuclear-capable aircraft and also allowed it to conduct airstrikes against ISIS.
The Navy has also begun the process to find a replacement for its 14 Ohio Class ballistic missile submarine fleet that first went into service in the 1980’s. But the first Columbia Class submarine is not slated to enter service until 2031.
But it is important to point out that a replacement of these systems, while incredibly expensive, does not equate to an overall growth of the nuclear arsenal.
In other words, the U.S. is looking to become more efficient — it’s not looking for more nuclear weapons. As one defense official put it, with the cost of the new systems, the Pentagon is simply not able to do a one-to-one replacement.
As of September 2015, the United States has a total of 4,571 warheads in its nuclear weapons stockpile, according to a State Department official. The United States has retired thousands of nuclear warheads that are removed from their delivery platform that are not included in this total, the official said, noting those warheads are not functional and are in a queue for dismantlement.
The 2011 New START (Strategic Arms Reduction Treaty) nuclear weapons agreement limits to 1,550 the number of nuclear warheads that can be deployed on ICBMs, submarines or heavy bombers by the U.S. and Russia. Both countries have until February 2018 to meet the New START’s reduction target levels for deployed warheads.
The United States currently has 1,361 deployed nuclear weapons while Russia has 1,796. The larger Russian number is seen as a temporary increase as Russia replaces older warheads with new ones.
Donald Trump says he wants to ‘greatly strengthen and expand’ U.S. nuclear capability, a radical break from U.S. foreign policy
Putin praises Russian military’s show of strength in Syria
EmbedShare
Russian President Vladimir Putin praised his country’s military on Dec. 22, saying its armed forces had performed well in the fight against “international terrorists” in Syria. (Reuters)
By Carol MorelloDecember 22 at 1:05 PM
President-elect Donald Trump on Thursday called for the United States to expand its nuclear arsenal, after Russian President Vladimir Putin said his country’s nuclear potential needs fortifying, raising the specter of a new arms race that would reverse decades of efforts to reduce the number and size of the two countries’ nuclear weapons.In a tweet that offered no details, Trump said, “The United States must greatly strengthen and expand its nuclear capability until such time as the world comes to its senses regarding nukes.”During the campaign, Trump talked in one debate about the need to modernize the country’s infrastructure of nuclear weaponry, saying the United States is falling behind. But it is not clear whether Trump is thinking of increasing the number of nuclear weapons the United States possesses, or updating the existing supply.
The men and women the president-elect has selected for his Cabinet and White House team.
“We need to strengthen the military potential of strategic nuclear forces, especially with missile complexes that can reliably penetrate any existing and prospective missile defense systems,” Putin said.
Russia and the United States have worked for decades at first limiting, and then reducing, the number and strength of nuclear arms they produced and maintained under a Cold War strategy of deterrence known as “mutually assured destruction.” Both Republican and Democratic presidents have pursued a policy of nuclear arms reduction, said Daryl G. Kimball, executive director of the Arms Control Association.
Currently, the United States has just under 5,000 warheads in its active arsenal, and more than 1,550 deployed strategic warheads, a number that fluctuates, according to Kimball. In an October assessment by the State Department Bureau of Arms Control Verification and Compliance, Russia has about 400 more nuclear warheads than the United States does. But the United States has about 170 more delivery systems than Russia.
Under the New START Treaty, the main strategic arms treaty in place, both the U.S. and Russia must deploy no more than 1,550 strategic weapons by February of 2018. Kimball said both countries appear to be on track to meet that limit, which will remain in force until 2021, when they could decide to extend the agreement for another five years.
Since President George H.W. Bush’s administration, it has been U.S. policy not to build new nuclear warheads. Under President Obama, the policy has been not to pursue warheads with new military capabilities.
The U.S. military is in the beginning stages of updating its nuclear triad, which covers the delivery systems — bombers, submarines and intercontinental ballistic missiles. Last year, the Pentagon estimated it must spend an average of $18 billion a year over 15 years starting in 2021, to replace weapons that already have been refurbished and upgraded beyond their original shelf life.
Trump’s history of discussing nuclear weapons
President-elect Donald Trump has called nuclear weapons “the single greatest problem the world has” – but he’s also made some controversial statements about them. (Peter Stevenson/The Washington Post)
But independent experts have estimated the total cost of modernizing the aging nuclear arsenal could reach $1 trillion over 30 years, according to the Arms Control Association.
“If Donald Trump is concerned about the rising costs of the F-35, he will be shocked by the skyrocketing costs of the current plan to modernizing the U.S. nuclear arsenal,” Kimball said. “Trump and his people need to explain the basis of his cryptic tweet. What does he mean by expand, and at what cost?”
But others argue that nuclear weapons and the principle of deterrence are essential components of national security, and the Obama administration’s efforts to further reduce its nuclear weapons have been just wishful thinking.
Michaela Dodge, a Heritage Foundation policy analyst specializing in nuclear weapons and missile defense policy, said that the White House in its 2010 Nuclear Posture Review made the erroneous assessment that there was little likelihood of conflict with Russia. Yet Moscow is in the midst of a large-scale nuclear weapons modernization program, and has violated many arms control treaties that it signed, she said.
“There is already an ongoing nuclear arms race, except now the United States isn’t racing,” she said in a telephone interview. “It’s mostly Russia and China.”
Dodge has called for the incoming Trump administration to request funding for nuclear warheads, delivery platforms and nuclear infrastructure. She also said the United States should withdraw from treaties that have eroded defense capabilities.
Traditional components of a strategic nuclear triad
While traditional nuclear strategy holds that a nuclear triad provides the best level of deterrence from attack, in reality, most nuclear powers do not have the military budget to sustain a full triad. Only the United States and Russia have maintained nuclear triads for most of the nuclear age.[3] Both the US and the Soviet Union composed their triads along the same lines, including the following components:
Bomber aircraft capable of delivering nuclear bombs (carrier-based or land-based; usually armed with long-range missiles).[1]
Ballistic missile submarines (SSBNs). Nuclear missiles launched from ships or submarines.[1][3] Although in early years the US Navy sea leg was carrier aircraft based with a very short period using sub launched cruise missiles such as the Regulus before SLBMs were ready to be deployed.
The triad also gives the commander in chief the flexibility to use different types of weapons for the appropriate strike while also preserving a reserve of nuclear armaments theoretically safe from a counter-force strike:
ICBMs allow for a long-range strike launched from a controlled or friendly environment at a lower cost per delivered warhead and easiest targeting from a surveyed geographic location.[4] If launched from a fixed position, such as a missile silo, they are vulnerable to a first strike, though their interception once aloft is substantially difficult,[1][3] Some ICBMs are either rail or road mobile. Medium-range ballistic missiles and ground-launched cruise missiles were also assigned for strategic targets based in nations closer to the potential confrontation, but were eventually forbidden by arms control treaty to the US and Russia.
SLBMs, launched from submarines, allow for a greater chance of survival from a first strike, giving the commander a second-strike capability.[1][3] Some long-range submarine-launched cruise missiles are counted towards triad status; this was the first type of submarine-launched strategic second-strike nuclear weapon before ballistic missile submarines became available. A SLBM is the most difficult to get accurate targeting for as it requires obtaining an accurate geographical fix to program targeting data to the missile, the total cost of a SLBM is increased by the cost of the submarine force, large crews and deterrence patrols.[4]
Strategic bombers have greater flexibility in their deployment and weaponry. They can serve as both a first- and second-strike weapon. A bomber armed with AGM-129 ACM missiles, for example, could be classified as a first-strike weapon. A number of bombers often with aerial refueling aircraft kept at safe points would constitute a second-strike weapon.[1][3] In some strategic contexts either with nearby potential enemies or with forward basing lighter aircraft can be used on the strategic level as either a first-strike weapon or if dispersed at small airfields or aboard an aircraft carrier can reasonably avoid a counterstrike giving them regional second-strike capacity, aircraft such as the Mirage 2000, F-15E, A-5 Vigilante, Sea Harrier, or FB-111 are or were tasked part or full-time with land or sea-based strategic nuclear attack missions. An aerial refueling fleet supports intercontinental strategic operations both for heavy bombers and smaller aircraft; it also makes possible around the clock airborne standby of bombers and command aircraft making these airborne assets nearly impossible to eliminate in a first strike. Bomber airborne alert patrols are very expensive in terms of fuel and aircraft maintenance, even non-airborne alert basing requires both crew training hours and aircraft upkeep.[4]
Tactical nuclear weapons are used in air, land and sea warfare. Air-to-air missiles and rockets, surface-to-air missiles, and small air-to-ground rockets, bombs, and precision munitions have been developed and deployed with nuclear warheads. Ground forces have included tactical nuclear artillery shells, surface-to-surface rockets, land mines, medium and small man-packable nuclear engineering demolition charges, even man-carried or vehicle-mounted recoilless rifles. Naval forces have carried nuclear-armed naval rocket-assisted and standard depth charges and torpedoes, and naval gunnery shells. Tactical nuclear weapons and the doctrine for their use is primarily for use in a non-strategic warfighting role destroying military forces in the battle area; they are not counted toward triad status despite the possibility of many of these systems being usable as strategic weapons depending on the target.
Triad powers
The following nations are considered fully established triad nuclear powers, they have robust capability to launch a worldwide second strike in all three legs and can disperse their air forces and their sea forces on deterrent patrols. They possess nuclear forces consisting of land-based missiles, ballistic or long-range cruise missile submarines, and strategic bombers or long-range tactical aircraft.
Unlike the United States and Russia where strategic nuclear forces are enumerated by treaty limits and subject to verification, China, a nuclear power since 1964, is not subject to these requirements but currently has a triad structure smaller in size compared to Russia and the United States. China’s nuclear force is much smaller than the US or Russia and is closer in number and capability to that of France or the United Kingdom. This force is mainly land-based missiles including ICBMs, IRBMs, and tactical ballistic missiles as well as cruise missiles. Unlike the US and Russia, China stores many of its missiles in huge underground tunnel complexes; U.S. Representative Michael Turner[5] referring to 2009 Chinese media reports said “This network of tunnels could be in excess of 5,000 kilometers (3,110 miles), and is used to transport nuclear weapons and forces,”[6] the Chinese Army newsletter calls this tunnel system an Underground Great Wall of China.[7]
Currently China has one Type 092 submarine that is currently active with JL-1 SLBM according to Office of Naval Intelligence.[8][9] In addition, the PLAN has deployed 4 newer Type 094 submarines and plan to deploy up to 8 of these Jin-class SSBN by the end of 2020.[10][11] The new Type 094 fleet uses the newer JL-2 SLBM. China carried out a series of successful JL-2 launches in 2009,[12] 2012[13][14] and 2015.[15] The United States expect the 094 SSBN to carry out its first deterrent patrol by 2015 with the JL-2 missile active.[10] There is an aged albeit upgraded bomber force consisting of Xian H-6s with an unclear nuclear delivery role. The PLAAF has a limited capability fleet of H-6 bombers modified for aerial refuelling as well as forthcoming Russian Ilyushin Il-78 aerial refuelling tankers.[16] China also introduced a newer and modernized H-6 variant the H-6K with enhanced capabilities such as launching long ranged cruise missile the CJ-10. In addition to the H-6 bomber, there are numerous tactical fighter and fighter bombers such as the: J-16, J-10, JH-7A and Su-30 which all capable of carrying nuclear weapons. China is also developing hypersonic glide vehicles.
The United States operates Minuteman ICBMs from underground hardened silos, Trident SLBMs carried by Ohio-class submarines, it also operates B-52, B-2 strategic bombers, as well as land-based tactical aircraft, some capable of carrying strategic and tactical B61 and large strategic B83gravity bombs, and AGM-86 ALCMs. While the US no longer keeps nuclear armed bombers on airborne alert, it has the ability to do so, along with the airborne nuclear command and control aircraft with its fleet of KC-10 and KC-135 aerial refueling planes. Previous to development of submarine-launched ballistic missiles, the US Navy strategic nuclear role was provided by aircraft carrier–based bombers and, for a short time, submarine-launched cruise missiles. With the end of the cold war, the US never deployed the rail-mobile version of the Peacekeeper ICBM or the road mobile Midgetman small ICBM. The US destroyed its stock of road-mobile Pershing II IRBMs and ground-launched cruise missiles in accordance with the INF treaty. The US also has shared strategic nuclear weapons and still deploys shared tactical nuclear weapons to some NATO countries.[1][3][31]
A former triad power, the FrenchForce de frappe possesses sea-based and air-based nuclear forces through the Triomphant-class ballistic missile submarines deployed with M45 intercontinental SLBMs armed with multiple warheads, nuclear capable Dassault Rafale F3 and Dassault Mirage 2000N fighter aircraft (armed with Air-Sol Moyenne Portée) which replaced the long-range Dassault Mirage IV supersonic nuclear bomber and KC-135 aerial refuelling tankers in its inventory. France had S2 and then S3 silo based strategic nuclear IRBMs, the S3 with a 3,500 km range, but these have been phased out of service since the dissolution of the USSR. France operates aircraft with a nuclear strike role from its aircraft carrier.
Non-triad powers
Non-triad powers are nuclear armed nations which have never developed a strategic nuclear delivery triad.
North Korea
North Korea has claimed to have indigenous nuclear weapons technology since a large underground explosion was detected in 2006. The DPRK has both aircraft and missiles which may be tasked to deliver nuclear weapons. The North Korean missile program is largely based on domestically produced variants of the Soviet Scud missile, some of which are sufficiently powerful to attempt satellite launch. The DPRK also has short-range ballistic missiles and cruise missiles. Western researchers believe the current generation of the DPRK’s suspected nuclear weapons are too large to be fitted to the country’s existing missile stock.[32]
Pakistan
Pakistan does not have an active nuclear triad. Its nuclear weapons are primarily land-based. The Minimum Credible Deterrence (MCD) is a defense and strategic principle on which the atomic weapons program of Pakistan is based.[33] This doctrine is not a part of the nuclear doctrine, which is designed for the use of the atomic weapons in a full-scale declared war if the conditions of the doctrine are surpassed.[34] Instead, the MCD policy falls under minimal deterrence as an inverse to Mutually Assured Destruction (MAD).[35] In August 2012, The Economist magazine wrote an article stating that Pakistan was an emerging nuclear triad state. Pakistani plans of responding to any capture or pre-emptive destruction of their nuclear defences seems to be one reason why they are determined to develop a third leg, after air- and land-based delivery systems, to Pakistan’s nuclear triad, consisting of nuclear-armed ships and submarines. As Iskander Rehman of the Carnegie Endowment, a think-tank, observes in a recent paper, Pakistani nuclear expansion and methods of delivery is drifting “from the dusty plains of the Punjab into the world’s most congested shipping lanes… It is only a matter of time before Pakistan formally brings nuclear weapons into its own fleet.”[36]
Pakistan possesses several ballistic missiles such as the Shaheen-1A and the Shaheen-II, missiles having ranges of 900 km and 2000 km respectively. They also contain systems said to be capable of carrying several nuclear warheads as well as being designed to evade missile-defense systems.[37][38] Pakistan also possesses the Babur cruise missile with a range up to 700 km. These land-based missiles are controlled by Army Strategic Forces Command of the Pakistan Army.
The PAF has two dedicated units (the No. 16 Black Panthers and the No. 26 Black Spiders) operating 18 aircraft in each squadron of the JF-17 Thunder, believed to be the preferred vehicle for delivery of nuclear weapons.[39] These units are a major part of the Air Force Strategic Command, a command responsible for nuclear response. The PAF also operates a fleet of F-16 fighters, of which 18 were delivered in 2012 and, as confirmed by General Ashfaq Parvez Kayani, are capable of carrying nuclear weapons.[40] The PAF also possesses the Ra’ad air-launched cruise missile which has a range of 350 km and can carry a nuclear warhead with a yield of between 10 kilotons to 35 kilotons.[41]
In 2004, the Pakistan Navy established the Naval Strategic Forces Command and made it responsible for countering and battling naval-based weapons of mass destruction. It is believed by most experts that Pakistan is developing a sea-based variant of the Hatf VII Babur, which is a nuclear-capable ground-launched cruise missile.[42]
United Kingdom
The UK never rolled out its own land based missile nuclear delivery system. It only possesses sea-based nuclear forces through its Royal NavyVanguard-class ballistic missile submarines, deployed with Trident II intercontinental SLBMs armed with multiple warheads. The Royal Air Force used to operate V bomber strategic bombers throughout the Cold War and continued airborne delivery using Tornado and Jaguar aircraft until the late 1990s. The planned UK silo-based IRBM, the Blue Streak missile, was cancelled as it was not seen as a credible deterrent, considering the population density of areas in the UK geologically suited for missile silos. The tactical Corporal surface-to-surface missile was operated by the British Army. The American made intermediate range Thor missile aimed at Soviet targets was operated briefly by the RAF but before the arrival of the Polaris SLBM. Previously having a nuclear strike mission for carrier-based Buccaneer attack aircraft and later Sea Harriers, the UK no longer deploys nuclear weapons for delivery by carrier-based naval aircraft or any other means other than the Vanguard submarine-launched Trident SLBM.
Israel has been reported in congressional testimony by the US Department of Defense of having aircraft-delivered nuclear weapons as early as the mid-1960s, a demonstrated missile-based force since the mid-1960s, an IRBM in the mid-1980s, an ICBM in the early 2000s[43] and the suspected second-strike capability arrived with the Dolphin-class submarine and Popeye Turbo submarine-launched cruise missile. Israel is suspected of using their inventory of nuclear-capable fighter aircraft such as the long-range F-15E Strike Eagle, F-16 and formerly the F-4 Phantom, Dassault Mirage III, A-4 Skyhawk and Nesher. Israel has appreciable and growing numbers of long-range tanker aircraft and aerial refueling capacity on its long-range fighter-bomber aircraft, this capacity was used in the 1985 long-range conventional strike against the PLO in Tunisia.[44]Jane’s Defence Weekly reports that the Israeli Dolphin-class submarines are widely believed to be nuclear armed, offering Israel a second-strike capability with a demonstrated range of at least 1500 km in a 2002 test.[45][46] According to an official report which was submitted to the American congress in 2004,[43] it may be that with a payload of 1,000 kg the Jericho 3 gives Israel nuclear strike capabilities within the entire Middle East, Africa, Europe, Asia and almost all parts of North America, as well as within large parts of South America and North Oceania, Israel also has the regional reach of its Jericho 2 IRBM force. The existence of a nuclear force is often hinted at blatantly and evidence of an advanced weapons program including miniaturized and thermonuclear devices has been presented, especially the extensive photographic evidence given by former Israeli nuclear weapons assembler Mordechai Vanunu. There have been incidents where Israel has been suspected of testing, but so far Israel for diplomatic reasons has not openly admitted to having operational nuclear weapons, and so is only a suspect triad state.
Air Mobile ICBM Feasibility Demonstration—24 October 1974
There is nothing in nuclear strategy to mandate only these three delivery systems. For example, orbital weapons or spacecraft for purposes of orbital bombardment using nuclear devices have been developed and silo deployed by the USSR from 1969 to 1983, these would not fit into the categories listed above. However, actual space-based weapon systems used for weapons of mass destruction have been banned under the Outer Space Treaty and launch ready deployment for the US and former USSR by the SALT II treaty. Another example is the US, UK, and France do or have previously included a strategic nuclear strike mission for carrier-based aircraft, which especially in the past were far harder to track and target with ICBMs or strategic nuclear bombers than fixed bomber or missile bases, permitting some second-strike flexibility; this was the first sea-based deterrent before the SLBM. The US and UK jointly explored an air-launched strategic ballistic nuclear missile, the Skybolt, but canceled the program in favor of submarine-based missiles. In 1974 a Lockheed C-5 Galaxy successfully tested an air launch of a Minuteman ICBM; this system was not deployed, but was used as a bargaining point in the SALT treaty negotiations with the USSR.
Story 1: Trump Rattles The American Okie Doke Obama Into Stuttering Empty Suit –The Great Pretender — The Truth Hurts — Get Out of Our Lives — Roll It Back To A Full Employment Growing Booming Economy with 67% Labor Participation Rate and Less Than 3% Unemployment Rate — Make America Great Again — Catch Me If You Can — Videos
-A joke played on someone. Someone getting played for a fool.
-Also, someone who is fake or is a joke.
“I felt like a dumbass when that nigga hit me with the okie doke.”
“I keep it real homeboy. I ain’t no okie doke.”
Psychological projection is a theory in psychology in which humans defend themselves against their own unpleasant impulses by denying their existence while attributing them to others. For example, a person who is habitually rude may constantly accuse other people of being rude. It incorporates blame shifting.
Immigration moderation. Before any new green cards are issued to foreign workers abroad, there will be a pause where employers will have to hire from the domestic pool of unemployed immigrant and native workers. This will help reverse women’s plummeting workplace participation rate, grow wages, and allow record immigration levels to subside to more moderate historical averages.
U.S. Labor Participation Rate – Graph of Reagan vs obama
Obama Tries to Trash Donald Trump and Turns into a Stuttering Mess
Obama attacks Trump in Indiana speech but won’t use his name
Obama Busts GOP Economic Myths
Obama takes a victory lap over Elkhart, Indiana’s resurgence
Why doesn’t Obama say Donald Trump’s name?
The Great Pretender Obama Says Don’t Fall For The Okie-Doke
No Help Wanted – Labor Participation Rate Lowest Since 1977 – Fox & Friends.
Labor participation has hit a 38-year low, and that’s a problem
Labor participation rate is down to unprecedented levels
Unemployment and the Unemployment Rate
Types of Unemployment
Top 10 Greatest Con Artists in Movies
Catch me if you can best scenes
Catch Me If You Can Movie- Check Fraud
Catch Me If You Can Trailer
To Tell the Truth: Frank William Abagnale Jr. (1977)
The Real Frank Abagnale, “Catch me if you can” man – CNN Red Chair
Catch Me If You Can: Frank Abagnale’s Story
Frank Abagnale, who evolved from being a brilliant young mastermind of international deception and fraud into one of the world’s most respected authorities on forgery and embezzlement, tells his life story. His intercontinental saga prompted Steven Spielberg to turn Abagnale’s life into the movie Catch Me If You Can starring Leonardo DiCaprio.
The Platters – The Great Pretender – HD (1955)
Data extracted on: June 2, 2016 (4:31:21 PM)
Labor Force Statistics from the Current Population Survey
Series Id: LNS11300000
Seasonally Adjusted
Series title: (Seas) Labor Force Participation Rate
Labor force status: Civilian labor force participation rate
Type of data: Percent or rate
Age: 16 years and over
Download:
Year
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Annual
1980
64.0
64.0
63.7
63.8
63.9
63.7
63.8
63.7
63.6
63.7
63.8
63.6
1981
63.9
63.9
64.1
64.2
64.3
63.7
63.8
63.8
63.5
63.8
63.9
63.6
1982
63.7
63.8
63.8
63.9
64.2
63.9
64.0
64.1
64.1
64.1
64.2
64.1
1983
63.9
63.8
63.7
63.8
63.7
64.3
64.1
64.3
64.3
64.0
64.1
64.1
1984
63.9
64.1
64.1
64.3
64.5
64.6
64.6
64.4
64.4
64.4
64.5
64.6
1985
64.7
64.7
64.9
64.9
64.8
64.6
64.7
64.6
64.9
65.0
64.9
65.0
1986
64.9
65.0
65.1
65.1
65.2
65.4
65.4
65.3
65.4
65.4
65.4
65.3
1987
65.4
65.5
65.5
65.4
65.7
65.5
65.6
65.7
65.5
65.7
65.7
65.7
1988
65.8
65.9
65.7
65.8
65.7
65.8
65.9
66.1
65.9
66.0
66.2
66.1
1989
66.5
66.3
66.3
66.4
66.3
66.5
66.5
66.5
66.4
66.5
66.6
66.5
1990
66.8
66.7
66.7
66.6
66.6
66.4
66.5
66.5
66.4
66.4
66.4
66.4
1991
66.2
66.2
66.3
66.4
66.2
66.2
66.1
66.0
66.2
66.1
66.1
66.0
1992
66.3
66.2
66.4
66.5
66.6
66.7
66.7
66.6
66.5
66.2
66.3
66.3
1993
66.2
66.2
66.2
66.1
66.4
66.5
66.4
66.4
66.2
66.3
66.3
66.4
1994
66.6
66.6
66.5
66.5
66.6
66.4
66.4
66.6
66.6
66.7
66.7
66.7
1995
66.8
66.8
66.7
66.9
66.5
66.5
66.6
66.6
66.6
66.6
66.5
66.4
1996
66.4
66.6
66.6
66.7
66.7
66.7
66.9
66.7
66.9
67.0
67.0
67.0
1997
67.0
66.9
67.1
67.1
67.1
67.1
67.2
67.2
67.1
67.1
67.2
67.2
1998
67.1
67.1
67.1
67.0
67.0
67.0
67.0
67.0
67.2
67.2
67.1
67.2
1999
67.2
67.2
67.0
67.1
67.1
67.1
67.1
67.0
67.0
67.0
67.1
67.1
2000
67.3
67.3
67.3
67.3
67.1
67.1
66.9
66.9
66.9
66.8
66.9
67.0
2001
67.2
67.1
67.2
66.9
66.7
66.7
66.8
66.5
66.8
66.7
66.7
66.7
2002
66.5
66.8
66.6
66.7
66.7
66.6
66.5
66.6
66.7
66.6
66.4
66.3
2003
66.4
66.4
66.3
66.4
66.4
66.5
66.2
66.1
66.1
66.1
66.1
65.9
2004
66.1
66.0
66.0
65.9
66.0
66.1
66.1
66.0
65.8
65.9
66.0
65.9
2005
65.8
65.9
65.9
66.1
66.1
66.1
66.1
66.2
66.1
66.1
66.0
66.0
2006
66.0
66.1
66.2
66.1
66.1
66.2
66.1
66.2
66.1
66.2
66.3
66.4
2007
66.4
66.3
66.2
65.9
66.0
66.0
66.0
65.8
66.0
65.8
66.0
66.0
2008
66.2
66.0
66.1
65.9
66.1
66.1
66.1
66.1
66.0
66.0
65.9
65.8
2009
65.7
65.8
65.6
65.7
65.7
65.7
65.5
65.4
65.1
65.0
65.0
64.6
2010
64.8
64.9
64.9
65.2
64.9
64.6
64.6
64.7
64.6
64.4
64.6
64.3
2011
64.2
64.1
64.2
64.2
64.1
64.0
64.0
64.1
64.2
64.1
64.1
64.0
2012
63.7
63.8
63.8
63.7
63.7
63.8
63.7
63.5
63.7
63.8
63.6
63.7
2013
63.6
63.4
63.3
63.4
63.4
63.4
63.3
63.2
63.3
62.8
63.0
62.9
2014
62.9
63.0
63.2
62.8
62.8
62.8
62.9
62.9
62.8
62.9
62.9
62.7
2015
62.9
62.8
62.7
62.7
62.8
62.6
62.6
62.6
62.4
62.5
62.5
62.6
2016
62.7
62.9
63.0
62.8
Series Id: LNS14000000
Seasonally Adjusted
Series title: (Seas) Unemployment Rate
Labor force status: Unemployment rate
Type of data: Percent or rate
Age: 16 years and over
Download:
Year
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Annual
1980
6.3
6.3
6.3
6.9
7.5
7.6
7.8
7.7
7.5
7.5
7.5
7.2
1981
7.5
7.4
7.4
7.2
7.5
7.5
7.2
7.4
7.6
7.9
8.3
8.5
1982
8.6
8.9
9.0
9.3
9.4
9.6
9.8
9.8
10.1
10.4
10.8
10.8
1983
10.4
10.4
10.3
10.2
10.1
10.1
9.4
9.5
9.2
8.8
8.5
8.3
1984
8.0
7.8
7.8
7.7
7.4
7.2
7.5
7.5
7.3
7.4
7.2
7.3
1985
7.3
7.2
7.2
7.3
7.2
7.4
7.4
7.1
7.1
7.1
7.0
7.0
1986
6.7
7.2
7.2
7.1
7.2
7.2
7.0
6.9
7.0
7.0
6.9
6.6
1987
6.6
6.6
6.6
6.3
6.3
6.2
6.1
6.0
5.9
6.0
5.8
5.7
1988
5.7
5.7
5.7
5.4
5.6
5.4
5.4
5.6
5.4
5.4
5.3
5.3
1989
5.4
5.2
5.0
5.2
5.2
5.3
5.2
5.2
5.3
5.3
5.4
5.4
1990
5.4
5.3
5.2
5.4
5.4
5.2
5.5
5.7
5.9
5.9
6.2
6.3
1991
6.4
6.6
6.8
6.7
6.9
6.9
6.8
6.9
6.9
7.0
7.0
7.3
1992
7.3
7.4
7.4
7.4
7.6
7.8
7.7
7.6
7.6
7.3
7.4
7.4
1993
7.3
7.1
7.0
7.1
7.1
7.0
6.9
6.8
6.7
6.8
6.6
6.5
1994
6.6
6.6
6.5
6.4
6.1
6.1
6.1
6.0
5.9
5.8
5.6
5.5
1995
5.6
5.4
5.4
5.8
5.6
5.6
5.7
5.7
5.6
5.5
5.6
5.6
1996
5.6
5.5
5.5
5.6
5.6
5.3
5.5
5.1
5.2
5.2
5.4
5.4
1997
5.3
5.2
5.2
5.1
4.9
5.0
4.9
4.8
4.9
4.7
4.6
4.7
1998
4.6
4.6
4.7
4.3
4.4
4.5
4.5
4.5
4.6
4.5
4.4
4.4
1999
4.3
4.4
4.2
4.3
4.2
4.3
4.3
4.2
4.2
4.1
4.1
4.0
2000
4.0
4.1
4.0
3.8
4.0
4.0
4.0
4.1
3.9
3.9
3.9
3.9
2001
4.2
4.2
4.3
4.4
4.3
4.5
4.6
4.9
5.0
5.3
5.5
5.7
2002
5.7
5.7
5.7
5.9
5.8
5.8
5.8
5.7
5.7
5.7
5.9
6.0
2003
5.8
5.9
5.9
6.0
6.1
6.3
6.2
6.1
6.1
6.0
5.8
5.7
2004
5.7
5.6
5.8
5.6
5.6
5.6
5.5
5.4
5.4
5.5
5.4
5.4
2005
5.3
5.4
5.2
5.2
5.1
5.0
5.0
4.9
5.0
5.0
5.0
4.9
2006
4.7
4.8
4.7
4.7
4.6
4.6
4.7
4.7
4.5
4.4
4.5
4.4
2007
4.6
4.5
4.4
4.5
4.4
4.6
4.7
4.6
4.7
4.7
4.7
5.0
2008
5.0
4.9
5.1
5.0
5.4
5.6
5.8
6.1
6.1
6.5
6.8
7.3
2009
7.8
8.3
8.7
9.0
9.4
9.5
9.5
9.6
9.8
10.0
9.9
9.9
2010
9.8
9.8
9.9
9.9
9.6
9.4
9.4
9.5
9.5
9.4
9.8
9.3
2011
9.1
9.0
9.0
9.1
9.0
9.1
9.0
9.0
9.0
8.8
8.6
8.5
2012
8.3
8.3
8.2
8.2
8.2
8.2
8.2
8.1
7.8
7.8
7.7
7.9
2013
8.0
7.7
7.5
7.6
7.5
7.5
7.3
7.3
7.3
7.2
6.9
6.7
2014
6.6
6.7
6.7
6.2
6.2
6.1
6.2
6.2
6.0
5.7
5.8
5.6
2015
5.7
5.5
5.5
5.4
5.5
5.3
5.3
5.1
5.1
5.0
5.0
5.0
2016
4.9
4.9
5.0
5.0
Series Id: LNS13327709
Seasonally Adjusted
Series title: (seas) Total unemployed, plus all marginally attached workers plus total employed part time for economic reasons, as a percent of all civilian labor force plus all marginally attached workers
Labor force status: Aggregated totals unemployed
Type of data: Percent or rate
Age: 16 years and over
Percent/rates: Unemployed and mrg attached and pt for econ reas as percent of labor force plus marg attached
Download:
Year
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Annual
1994
11.8
11.4
11.4
11.2
10.8
10.9
10.7
10.5
10.4
10.3
10.1
10.0
1995
10.2
9.9
9.9
10.0
10.0
10.1
10.1
10.0
10.1
9.9
10.0
10.0
1996
9.8
10.0
9.8
9.9
9.7
9.6
9.7
9.3
9.4
9.4
9.3
9.5
1997
9.4
9.4
9.1
9.2
8.8
8.8
8.6
8.6
8.7
8.4
8.3
8.4
1998
8.4
8.4
8.4
7.9
7.9
8.0
8.1
7.9
7.9
7.8
7.6
7.6
1999
7.7
7.7
7.6
7.6
7.4
7.5
7.5
7.3
7.4
7.2
7.1
7.1
2000
7.1
7.2
7.1
6.9
7.1
7.0
7.0
7.1
7.0
6.8
7.1
6.9
2001
7.3
7.4
7.3
7.4
7.5
7.9
7.8
8.1
8.7
9.3
9.4
9.6
2002
9.5
9.5
9.4
9.7
9.5
9.5
9.6
9.6
9.6
9.6
9.7
9.8
2003
10.0
10.2
10.0
10.2
10.1
10.3
10.3
10.1
10.4
10.2
10.0
9.8
2004
9.9
9.7
10.0
9.6
9.6
9.5
9.5
9.4
9.4
9.7
9.4
9.2
2005
9.3
9.3
9.1
8.9
8.9
9.0
8.8
8.9
9.0
8.7
8.7
8.6
2006
8.4
8.4
8.2
8.1
8.2
8.4
8.5
8.4
8.0
8.2
8.1
7.9
2007
8.4
8.2
8.0
8.2
8.2
8.3
8.4
8.4
8.4
8.4
8.4
8.8
2008
9.2
9.0
9.1
9.2
9.7
10.1
10.5
10.8
11.0
11.8
12.6
13.6
2009
14.2
15.2
15.8
15.9
16.5
16.5
16.4
16.7
16.7
17.1
17.1
17.1
2010
16.7
17.0
17.1
17.1
16.6
16.4
16.4
16.5
16.8
16.6
16.9
16.6
2011
16.2
16.0
15.9
16.1
15.8
16.1
15.9
16.1
16.4
15.8
15.5
15.2
2012
15.2
15.0
14.6
14.6
14.8
14.8
14.8
14.6
14.8
14.4
14.4
14.4
2013
14.5
14.3
13.8
14.0
13.8
14.2
13.8
13.6
13.7
13.7
13.1
13.1
2014
12.7
12.6
12.6
12.3
12.1
12.0
12.2
12.0
11.8
11.5
11.4
11.2
2015
11.3
11.0
10.9
10.8
10.7
10.5
10.4
10.3
10.0
9.8
9.9
9.9
2016
9.9
9.7
9.8
9.7
Obama in Elkhart: Voters should beware of politicians ‘preying’ on economic fears
President Barack Obama says people should beware of politicians who are “preying” on Americans’ anxieties about the economy in a bid to win headlines and votes.
Obama isn’t naming names. But he says some politicians are running on anti-trade, anti-immigrant policies in an effort to play to people’s fears.
Obama made the remarks during a visit to Elkhart, Indiana. He’s holding up the manufacturing community as a symbol of the nation’s climb from recession to recovery.
Obama says his administration’s “smart” decisions played a part in helping Elkhart come back. He says he wants to bust “myths” that Democratic policies are bad for the economy.
Indiana’s Republican governor, Mike Pence, says Elkhart had rebounded “in spite of Obama’s policies” and that those policies inflicted onerous federal burdens on Indiana.
To Obama, lingering challenges aren’t enough to forestall a planned victory lap. Arguing that his controversial $840 billion stimulus package was ultimately vindicated, Obama will call on the next president to be willing to spend big to enable further economic growth.
The president is making his eighth visit to the state since taking office in January 2009. Here are details on the visits:
Feb. 2, 2009: Travels to Elkhart for his first event outside the Washington area since taking office 13 days earlier and speaks about his economic stimulus plan at Concord High School as Elkhart County’s unemployment rate was about 15 percent.
May 17, 2009: Delivers commencement address at the University of Notre Dame in South Bend, an appearance that drew weeks of criticism from many Catholic bishops and abortion opponents. Then travels to Indianapolis for two Democratic Party fundraisers.
Aug. 5, 2009: Visits Monaco RV factory in Wakarusa and announces $2.4 billion in grants for electric car production.
Nov. 23, 2010: Obama and Vice President Joe Biden both fly into Grissom Air Reserve Base then travel to a Chrysler transmission factory in Kokomo, where Obama promotes the U.S. auto industry revival.
May 6, 2011: Travels to an Allison Transmission factory in Indianapolis and speaks about how the hybrid transmissions made there can help reduce the country’s need for imported oil.
Oct. 3, 2014: Travels to Millennium Steel Services, a minority-owned steel processor near Princeton, and speaks about the nation’s manufacturing gains and the improving U.S. economy.
Feb. 6, 2015: Visits an Ivy Tech Community College campus in Indianapolis to tout his proposal for offering two years of college free.
June 1, 2016: Scheduled to speak about the economy at Concord Community High School in Elkhart and then take part in a PBS town hall at Elkhart’s Lerner Theatre.
Psychological projection is a theory in psychology in which humans defend themselves against their own unpleasant impulses by denying their existence while attributing them to others.[1] For example, a person who is habitually rudemay constantly accuse other people of being rude. It incorporates blame shifting.
According to some research, the projection of one’s negative qualities onto others is a common process in everyday life.[2]
Historical precursors
A prominent precursor in the formulation of the projection principle was Giambattista Vico,[3][4] and an early formulation of it is found in ancient Greek writer Xenophanes, which observed that “the gods of Ethiopians were inevitably black with flat noses while those of the Thracians were blond with blue eyes.”[citation needed] In 1841, Ludwig Feuerbach was the first to employ this concept as the basis for a systematic critique of religion.[5][6][7]
Psychoanalytic developments
Projection (German: Projektion) was conceptualised by Freud in his letters to Wilhelm Fliess,[8] and further refined by Karl Abraham and Anna Freud. Freud considered that in projection thoughts, motivations, desires, and feelings that cannot be accepted as one’s own are dealt with by being placed in the outside world and attributed to someone else.[9] What the ego repudiates is split off and placed in another.[10]
Freud would later come to believe that projection did not take place arbitrarily, but rather seized on and exaggerated an element that already existed on a small scale in the other person.[11] (The related defence of projective identification differs from projection in that there the other person is expected to become identified with the impulse or desire projected outside,[12] so that the self maintains a connection with what is projected, in contrast to the total repudiation of projection proper.)[13]
Melanie Klein saw the projection of good parts of the self as leading potentially to over-idealisation of the object.[14] Equally, it may be one’s conscience that is projected, in an attempt to escape its control: a more benign version of this allows one to come to terms with outside authority.[15]
Carl Jung considered that the unacceptable parts of the personality represented by the Shadow archetype were particularly likely to give rise to projection, both small-scale and on a national/international basis.[19]Marie-Louise Von Franz extended her view of projection, stating that “wherever known reality stops, where we touch the unknown, there we project an archetypal image”.[20]
Psychological projection is one of the medical explanations of bewitchment used to explain the behavior of the afflicted children at Salem in 1692. The historian John Demos asserts that the symptoms of bewitchment experienced by the afflicted girls were due to the girls undergoing psychological projection of repressed aggression.[21]
Practical examples
Victim blaming: The victim of someone else’s accident or bad luck may be offered criticism, the theory being that the victim may be at fault for having attracted the other person’s hostility.[22]
Projection of marital guilt: Thoughts of infidelity to a partner may be unconsciously projected in self-defence on to the partner in question, so that the guiltattached to the thoughts can be repudiated or turned to blame instead, in a process linked to denial.[23]
Bullying: A bully may project his/her own feelings of vulnerability onto the target(s) of the bullying activity. Despite the fact that a bully’s typically denigrating activities are aimed at the bully’s targets, the true source of such negativity is ultimately almost always found in the bully’s own sense of personal insecurityand/or vulnerability.[24] Such aggressive projections of displaced negative emotions can occur anywhere from the micro-level of interpersonal relationships, all the way up through to the macro-level of international politics, or even international armed conflict.[19]
Projection of general guilt: Projection of a severe conscience[25] is another form of defence, one which may be linked to the making of false accusations, personal or political.[19]
Projection of hope: Also, in a more positive light, a patient may sometimes project his or her feelings of hope onto the therapist.[26]
Counter-projection
Jung wrote, “All projections provoke counter-projection when the object is unconscious of the quality projected upon it by the subject.”[27] Thus, what is unconscious in the recipient will be projected back onto the projector, precipitating a form of mutual acting out.[28]
In a rather different usage, Harry Stack Sullivan saw counter-projection in the therapeutic context as a way of warding off the compulsive re-enactment of apsychological trauma, by emphasising the difference between the current situation and the projected obsession with the perceived perpetrator of the original trauma.[29]
Clinical approaches
Drawing on Gordon Allport‘s idea of the expression of self onto activities and objects, projective techniques have been devised to aid personality assessment, including the Rorschach ink-blots and the Thematic Apperception Test (TAT).[30]
Projection may help a fragile ego reduce anxiety, but at the cost of a certain dissociation, as in dissociative identity disorder.[31] In extreme cases, an individual’s personality may end up becoming critically depleted.[32] In such cases, therapy may be required which would include the slow rebuilding of the personality through the “taking back” of such projections.[33]
Criticism
Some studies were critical of Freud’s theory. Research supports the existence of a false-consensus effect whereby humans have a broad tendency to believe that others are similar to themselves, and thus “project” their personal traits onto others. This applies to good traits as well as bad traits and is not a defense mechanism for denying the existence of the trait within the self.[34]
Instead, Newman, Duff, and Baumeister (1997) proposed a new model of defensive projection. In this view, people try to suppress thoughts of their undesirable traits, and these efforts make those trait categories highly accessible—so that they are then used all the more often when forming impressions of others. The projection is then only a by-product of the real defensive mechanism.[35]
Theater Talk: Actor Richard Griffiths of “The History Boys”; Bob Martin of “The Drowsy Chaperone”
Alan Bennett in conversation: part one
Alan Bennett in conversation: part two
Alan Bennett The Lady in The Van Interview
A Chip in the Sugar – Alan Bennett – Talking Heads
Alan Bennett – Sunset Across the Bay (TV Play 1975)
Alan Bennett – Telegram
Alan Bennett & John Fortune: “Men’s Talk”
Peter Cook, Dudley Moore, Alan Bennett and Jonathan Miller
Oxbridge Philosophy – Alan Bennett & Jonathan Miller
The Lady In The Van – Alan Bennett Featurette – Starring Maggie Smith – At Cinemas Now
The Lady In The Van Trailer #2 – Starring Maggie Smith – At Cinemas November 13
Maggie Smith
Dame Margaret Natalie Smith, CH DBE (born 28th December 1934) is an English actress. She made her stage debut in 1952 and has had an extensive, varied career in stage, film and television spanning over sixty years. Smith has appeared in over 50 films and is one of Britain’s most recognisable actresses. She was appointed Dame Commander of the Order of the British Empire (DBE) in the 1990 New Year Honours for services to the performing arts, and Member of the Order of the Companions of Honour (CH) in the 2014 Birthday Honours for services to drama.
Dame Maggie Smith’s brilliant career
Beyond the Fringe (Complete)
Beyond the Fringe was a British comedy stage revue written and performed by Peter Cook, Dudley Moore, Alan Bennett, and Jonathan Miller. It played in London’s West End and then on New York’s Broadway in the early 1960s, and is widely regarded as seminal to the rise of satire in 1960s Britain.
Take A Pew – Alan Bennett
Richard Griffiths (1947-2013)
The History Boys – Broadway
Almost complete recording of the original production during its run on Broadway. Not mine but thanks for sharing whoever it was 🙂
The Pronk Pops Show 551, October 12, 2015, Story 1: President Obama Stalls Islamic State While He Runs Out The Clock On His Failed Presidency — Who is next? President Trump — Obama A Real Loser — Leading On Climate Change — Give Me A Break! — Videos
60 Minutes in 60 Seconds (Day 36)
Obama talks Russia’s escalation in Syria on “60 Minutes”
“60 Minutes” interview: President Obama
Dr David Evans on Global Warming
50 to 1 Project – David Evans Interview
Freeman Dyson on the Global Warming Hysteria April, 2015
High Hopes and Missed Opportunities in Iraq
Emma Sky: “The Unraveling”
Reflections on the Future of War with Gen. Raymond Odierno
Thomas Barnett: Rethinking America’s military strategy
Donald Trump Iran Deal FULL SPEECH, Against Iran Nuclear Agreement at Tea Party Rally Sept. 9, 2015
The Iran Nuclear Deal
Iran and the Bomb
Climate Change in 12 Minutes – The Skeptic’s Case
Climategate: What They Aren’t Telling You!
Krauthammer: ‘Sputtering’ Obama Admin Has No Idea What to Do About Russia, Syria
Donald Trump Fox & Friends RIPS Obama 60 Minute Interview & Biden’s Low Poll Numbers FULL Interview
Donald trump Meet The Press FULL Interview 10/4/2015
60 Minutes Host Destroys Barack Obama On Syria
60 Minutes Host Embarrasses Barack Obama On Syria II
Background Articles and Videos
MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY DEBATE: PETER HUBER
MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY DEBATE: PHILIP STOTT
Professor Fred Singer on Climate Change Pt 1
Professor Fred Singer on Climate Change Pt 2
Global Warming, Lysenkoism & Eugenics Prof Richard Lindzen
Interview with Professor Richard Lindzen
Richard Lindzen, Ph.D. Lecture Deconstructs Global Warming Hysteria (High Quality Version)
Global Warming – Michael Crichton
Michael Crichton | States of Fear: Science or Politics?
Dr Roy Spencer on Global Warming Part 1 of 6
Dr Roy Spencer on Global Warming Part 2 of 6
Dr Roy Spencer on Global Warming Part 3 of 6
Dr Roy Spencer on Global Warming Part 4 of 6
Dr Roy Spencer on Global Warming Part 5 of 6
Dr Roy Spencer on Global Warming Part 6 of 6
Global warming and the Carbon Tax Scam
The Great Global Warming Swindle Full Movie
Global Warming: How Hot Air and Bad Science Will Give YOU Staggeringly Higher Taxes and Prices
Sen. Inhofe To Investigate ClimateGate
Lou Dobbs: ‘Who The Hell Does The President Think He Is?’
The Free-Market Case for Green
ManBearPig, Climategate and Watermelons: A conversation with author James Delingpole
James Delingpole: Great Britain, the Green Movement, and the End of the World
George Carlin on Global Warming
Americans Skeptical of Science Behind Global Warming
“…Most Americans (52%) believe that there continues to be significant disagreement within the scientific community over global warming.
While many advocates of aggressive policy responses to global warming say a consensus exists, the latest Rasmussen Reports national telephone survey finds that just 25% of adults think most scientists agree on the topic. Twenty-three percent (23%) are not sure. …”
Steve Kroft: The last time we talked was this time last year, and the situation in Syria and Iraq had begun to worsen vis-Ã -vis ISIS. You had just unveiled a plan to provide air support for troops in Iraq, and also some air strikes in Syria, and the training and equipping of a moderate Syrian force. You said that this would degrade and eventually destroy ISIS.
President Barack Obama: Over time.
Steve Kroft: Over time. It’s been a year, and–
President Barack Obama: I didn’t say it was going to be done in a year.
Steve Kroft: No. But you said…
President Barack Obama: There’s a question in here somewhere.
…
Steve Kroft: Who’s going to get rid of them?
President Barack Obama: Over time, the community of nations will all get rid of them, and we will be leading getting rid of them. But we are not going to be able to get rid of them unless there is an environment inside of Syria and in portions of Iraq in which local populations, local Sunni populations, are working in a concerted way with us to get rid of them.
On the “moderate opposition” in Syria:
Steve Kroft: You have been talking about the moderate opposition in Syria. It seems very hard to identify. And you talked about the frustrations of trying to find some and train them. You got a half a billion dollars from Congress to train and equip 5,000, and at the end, according to the commander CENTCOM, you got 50 people, most of whom are dead or deserted. He said four or five left?
President Barack Obama: Steve, this is why I’ve been skeptical from the get go about the notion that we were going to effectively create this proxy army inside of Syria. My goal has been to try to test the proposition, can we be able to train and equip a moderate opposition that’s willing to fight ISIL? And what we’ve learned is that as long as Assad remains in power, it is very difficult to get those folks to focus their attention on ISIL.
Steve Kroft: If you were skeptical of the program to find and identify, train and equip moderate Syrians, why did you go through the program?
President Barack Obama: Well, because part of what we have to do here, Steve, is to try different things. Because we also have partners on the ground that are invested and interested in seeing some sort of resolution to this problem. And–
Steve Kroft: And they wanted you to do it.
President Barack Obama: Well, no. That’s not what I said. I think it is important for us to make sure that we explore all the various options that are available.
Steve Kroft: I know you don’t want to talk about this.
President Barack Obama: No, I’m happy to talk about it.
Steve Kroft: I want to talk about the– this program, because it would seem to show, I mean, if you expect 5,000 and you get five, it shows that somebody someplace along the line did not– made– you know, some sort of a serious miscalculation.
President Barack Obama: You know, the– the– Steve, let me just say this.
Steve Kroft: It’s an embarrassment.
President Barack Obama: Look, there’s no doubt that it did not work. And, one of the challenges that I’ve had throughout this heartbreaking situation inside of Syria is, is that– you’ll have people insist that, you know, all you have to do is send in a few– you know, truckloads full of arms and people are ready to fight. And then, when you start a train-and-equip program and it doesn’t work, then people say, “Well, why didn’t it work?” Or, “If it had just started three months earlier it would’ve worked.”
Steve Kroft: But you said yourself you never believed in this.
President Barack Obama: Well– but Steve, what I have also said is, is that surprisingly enough it turns out that in a situation that is as volatile and with as many players as there are inside of Syria, there aren’t any silver bullets. And this is precisely why I’ve been very clear that America’s priorities has to be number one, keeping the American people safe. Number two, we are prepared to work both diplomatically and where we can to support moderate opposition that can help convince the Russians and Iranians to put pressure on Assad for a transition. But that what we are not going to do is to try to reinsert ourselves in a military campaign inside of Syria. Let’s take the situation in Afghanistan, which I suspect you’ll ask about. But I wanted to use this as an example.
Steve Kroft: All right. I feel like I’m being filibustered, Mr. President.
President Barack Obama: No, no, no, no, no. Steve, I think if you want to roll back the tape, you’ve been giving me long questions and statements, and now I’m responding to ’em. So let’s– so– if you ask me big, open-ended questions, expect big, open-ended answers. Let’s take the example of Afghanistan. We’ve been there 13 years now close to 13 years. And it’s still hard in Afghanistan. Today, after all the investments we have there, and we still have thousands of troops there. So the notion that after a year in Syria, a country where the existing government hasn’t invited us in, but is actively keeping us out, that somehow we would be able to solve this quickly– is–
Steve Kroft: We didn’t say quickly.
President Barack Obama: –is– is– is an illusion. And– and–
Steve Kroft: Nobody’s expecting that, Mr. President.
President Barack Obama: Well, the– no, I understand, but what I’m– the simple point I’m making, Steve, is that the solution that we’re going to have inside of Syria is ultimately going to depend not on the United States putting in a bunch of troops there, resolving the underlying crisis is going to be something that requires ultimately the key players there to recognize that there has to be a transition to new government. And, in the absence of that, it’s not going to work.
On Russia:
Steve Kroft: One of the key players now is Russia.
President Barack Obama: Yeah.
Steve Kroft: A year ago when we did this interview, there was some saber-rattling between the United States and Russia on the Ukrainian border. Now it’s also going on in Syria. You said a year ago that the United States– America leads. We’re the indispensible nation. Mr. Putin seems to be challenging that leadership.
President Barack Obama: In what way? Let– let’s think about this– let– let–
Steve Kroft: Well, he’s moved troops into Syria, for one. He’s got people on the ground. Two, the Russians are conducting military operations in the Middle East for the first time since World War II–
President Barack Obama: So that’s–
Steve Kroft: –bombing the people– that we are supporting.
President Barack Obama: So that’s leading, Steve? Let me ask you this question. When I came into office, Ukraine was governed by a corrupt ruler who was a stooge of Mr. Putin. Syria was Russia’s only ally in the region. And today, rather than being able to count on their support and maintain the base they had in Syria, which they’ve had for a long time, Mr. Putin now is devoting his own troops, his own military, just to barely hold together by a thread his sole ally. And in Ukraine–
Steve Kroft: He’s challenging your leadership, Mr. President. He’s challenging your leadership–
President Barack Obama: Well Steve, I got to tell you, if you think that running your economy into the ground and having to send troops in in order to prop up your only ally is leadership, then we’ve got a different definition of leadership. My definition of leadership would be leading on climate change, an international accord that potentially we’ll get in Paris. My definition of leadership is mobilizing the entire world community to make sure that Iran doesn’t get a nuclear weapon. And with respect to the Middle East, we’ve got a 60-country coalition that isn’t suddenly lining up around Russia’s strategy. To the contrary, they are arguing that, in fact, that strategy will not work.
Steve Kroft: My point is– was not that he was leading, my point is that he was challenging your leadership. And he has very much involved himself in the situation. Can you imagine anything happening in Syria of any significance at all without the Russians now being involved in it and having a part of it?
President Barack Obama: But that was true before. Keep in mind that for the last five years, the Russians have provided arms, provided financing, as have the Iranians, as has Hezbollah.
Steve Kroft: But they haven’t been bombing and they haven’t had troops on the ground–
President Barack Obama: And the fact that they had to do this is not an indication of strength, it’s an indication that their strategy did not work.
Steve Kroft: You don’t think–
President Barack Obama: You don’t think that Mr. Putin would’ve preferred having Mr. Assad be able to solve this problem without him having to send a bunch of pilots and money that they don’t have?
Steve Kroft: Did you know he was going to do all this when you met with him in New York?
President Barack Obama: Well, we had seen– we had pretty good intelligence. We watch–
Steve Kroft: So you knew he was planning to do it.
President Barack Obama: We knew that he was planning to provide the military assistance that Assad was needing because they were nervous about a potential imminent collapse of the regime.
Steve Kroft: You say he’s doing this out of weakness. There is a perception in the Middle East among our adversaries, certainly and even among some of our allies that the United States is in retreat, that we pulled our troops out of Iraq and ISIS has moved in and taken over much of that territory. The situation in Afghanistan is very precarious and the Taliban is on the march again. And ISIS controls a large part of Syria.
President Barack Obama: I think it’s fair to say, Steve, that if–
Steve Kroft: It’s– they– let me just finish the thought. They say your–
President Barack Obama: You’re–
Steve Kroft: –they say you’re projecting a weakness, not a strength–
President Barack Obama: –you’re saying “they,” but you’re not citing too many folks. But here–
Steve Kroft: No, I’ll cite– I’ll cite if you want me, too.
President Barack Obama: –here– yes. Here–
Steve Kroft: I’d say the Saudis. I’d say the Israelis. I’d say a lot of our friends in the Middle East. I’d say everybody in the Republican party. Well, you want me to keep going?
President Barack Obama: Yeah. The– the– if you are– if you’re citing the Republican party, I think it’s fair to say that there is nothing I’ve done right over the last seven and a half years. And I think that’s right. It– and– I also think what is true is that these are the same folks who were making an argument for us to go into Iraq and who, in some cases, still have difficulty acknowledging that it was a mistake. And Steve, I guarantee you that there are factions inside of the Middle East, and I guess factions inside the Republican party who think that we should send endless numbers of troops into the Middle East, that the only measure of strength is us sending back several hundred thousand troops, that we are going to impose a peace, police the region, and– that the fact that we might have more deaths of U.S. troops, thousands of troops killed, thousands of troops injured, spend another trillion dollars, they would have no problem with that. There are people who would like to see us do that. And unless we do that, they’ll suggest we’re in retreat.
Steve Kroft: They’ll say you’re throwing in the towel–
President Barack Obama: No. Steve, we have an enormous presence in the Middle East. We have bases and we have aircraft carriers. And our pilots are flying through those skies. And we are currently supporting Iraq as it tries to continue to build up its forces. But the problem that I think a lot of these critics never answered is what’s in the interest of the United States of America and at what point do we say that, “Here are the things we can do well to protect America. But here are the things that we also have to do in order to make sure that America leads and America is strong and stays number one.” And if in fact the only measure is for us to send another 100,000 or 200,000 troops into Syria or back into Iraq, or perhaps into Libya, or perhaps into Yemen, and our goal somehow is that we are now going to be, not just the police, but the governors of this region. That would be a bad strategy Steve. And I think that if we make that mistake again, then shame on us.
Steve Kroft: Do you think the world’s a safer place?
President Barack Obama: America is a safer place. I think that there are places, obviously, like Syria that are not safer than when I came into office. But, in terms of us protecting ourselves against terrorism, in terms of us making sure that we are strengthening our alliances, in terms of our reputation around the world, absolutely we’re stronger.
On Friday, the Pentagon ended the program to train-and-equip Syrian rebels that the president told us did not work. In a moment, he talks about Donald Trump, Hillary Clinton’s emails and Joe Biden’s possible run for president.
Steve Kroft: OK. Mr. President, there are a lot of serious problems with the world right now, but I want to ask you a few questions about politics.
President Barack Obama: Yeah, go ahead.
Steve Kroft: What do you think of Donald Trump?
President Barack Obama: Well, I think that he is a great publicity-seeker and at a time when the Republican party hasn’t really figured out what it’s for, as opposed to what it’s against. I think that he is tapped into something that exists in the Republican party that’s real. I think there is genuine anti-immigrant sentiment in the large portion of at least Republican primary voters. I don’t think it’s uniform. He knows how to get attention. He is, you know, the classic reality TV character and, at this early stage, it’s not surprising that he’s gotten a lot of attention.
Steve Kroft: You think he’s running out of steam? I mean, you think he’s going to disappear?
President Barack Obama: You know, I’ll leave it up to the pundits to make that determination. I don’t think he’ll end up being president of the United States.
Steve Kroft: Did you know about Hillary Clinton’s use of private email server–
President Barack Obama: No.
Steve Kroft: –while she was Secretary of State?
President Barack Obama: No.
Steve Kroft: Do you think it posed a national security problem?
President Barack Obama: I don’t think it posed a national security problem. I think that it was a mistake that she has acknowledged and– you know, as a general proposition, when we’re in these offices, we have to be more sensitive and stay as far away from the line as possible when it comes to how we handle information, how we handle our own personal data. And, you know, she made a mistake. She has acknowledged it. I do think that the way it’s been ginned-up is in part because of– in part– because of politics. And I think she’d be the first to acknowledge that maybe she could have handled the original decision better and the disclosures more quickly. But–
Steve Kroft: What was your reaction when you found out about it?
President Barack Obama: This is one of those issues that I think is legitimate, but the fact that for the last three months this is all that’s been spoken about is an indication that we’re in presidential political season.
Steve Kroft: Do you agree with what President Clinton has said and Secretary Clinton has said, that this is not– not that big a deal. Do you agree with that?
President Barack Obama: Well, I’m not going to comment on–
Steve Kroft: You think it’s not that big a deal–
President Barack Obama: What I think is that it is important for her to answer these questions to the satisfaction of the American public. And they can make their own judgment. I can tell you that this is not a situation in which America’s national security was endangered.
Steve Kroft: This administration has prosecuted people for having classified material on their private computers.
President Barack Obama: Well, I– there’s no doubt that there had been breaches, and these are all a matter of degree. We don’t get an impression that here there was purposely efforts– on– in– to hide something or to squirrel away information. But again, I’m gonna leave it to–
Steve Kroft: If she had come to you.
President Barack Obama: I’m going to leave it to Hillary when she has an interview with you to address all these questions.
Steve Kroft: Right now, there’s nobody on either side of the aisle that is exactly running on your record. Do you want Joe Biden to get in the race and do it?
President Barack Obama: You know, I am going to let Joe make that decision. And I mean what I say. I think Joe will go down as one of the finest vice presidents in history, and one of the more consequential. I think he has done great work. I don’t think there’s any politician at a national level that has not thought about being the president. And if you’re sitting right next to the president in every meeting and, you know wrestling with these issues, I’m sure that for him he’s saying to himself, “I could do a really good job.”
Steve Kroft: I do want to talk a little bit about Congress. Are you going to miss John Boehner?
President Barack Obama: John Boehner and I disagreed on just about everything. But the one thing I’ll say about John Boehner is he did care about the institution. He recognized that nobody gets 100 percent in our democracy. I won’t say that he and I were ideal partners, but he and I could talk and we could get some things done. And so I am a little concerned that the reason he left was because there are a group of members of Congress who think having somebody who is willing to shut down the government or default on the U.S. debt is going to allow them to get their way 100 percent of the time.
Steve Kroft: Do you think you’re going to be able to get anything through Congress?
President Barack Obama: Well, given that– this Congress hasn’t been able to get much done at all over the last year and a half, two years, for that matter for the last four, it would be surprising if we were able to make huge strides on the things that are important. But I have a more modest goal, which is to make sure that Congress doesn’t do damage to the economy.
The president says that means avoiding another budget crisis and another round of threats to shut down the government, which could happen as early as December. Even with congressional Republicans in disarray, he’s hoping to reach a deal with Congress as he did two years ago, to lift some spending caps in defense and other areas while continuing to reduce the deficit.
President Barack Obama: Right now, our economy is much stronger relative to the rest of the world. China, Europe, emerging markets, they’re all having problems. And so, if we provide another shock to the system by shutting down the government, that could mean that the progress we have made starts going backwards instead of forwards. We have to make sure that we pass a transportation bill. It may not be everything that I want. We should be being much more aggressive in rebuilding America right now. Interest rates are low, construction workers need the work, and our economy would benefit from it. But if we can’t do a big multiyear plan, we have to at least do something that is robust enough– so that we are meeting the demands of a growing economy.
Steve Kroft: A few months back, at a fundraiser, you made a point of saying that the first lady was very pleased that you can’t run again.
President Barack Obama: Yeah, she is.
Steve Kroft: Do you feel the same way?
President Barack Obama: You know, it’s interesting. I– you go into your last year and I think it’s bittersweet. On the one hand, I am very proud of what we’ve accomplished and it makes me think, I’d love to do some more. But by the time I’m finished, I think it will be time for me to go. Because there’s a reason why we considered George Washington one of our greatest presidents. He set a precedent, saying that when you occupy this seat, it is an extraordinary privilege, but the way our democracy is designed, no one person is indispensable. And ultimately you are a citizen. And once you finish with your service, you go back to being a citizen. And I– and I think that– I think having a fresh set of legs in this seat, I think having a fresh perspective, new personnel and new ideas and a new conversation with the American people about issues that may be different a year from now than they were when I started eight years ago, I think that’s all good for our democracy. I think it’s healthy.
Steve Kroft: Do you think if you ran again, could run again, and did run again, you would be elected?
Story 1: Stop Believing The Lying Lunatic Left: Hillary Clinton: “It Was Allowed.”, Receiving And Sending Classified Documents on Personal Email Server Is Not Allowed — It is A Serious Federal Crime Under Title 18 U.S. Code § 1924 and § 793 — Hillary Clinton’s Race To The White House or Sing Sing Prison — October Surprise on October 22 in Congressional Hearing on Benghazi! — Videos
Savannah Guthrie Grills Hillary on Emails
NBC’s Savannah Guthrie grilled Hillary Clinton during a Today show town hall Monday, asking pointedly if she realized how bad her private email looked to an outside observer.
Guthrie noted that while Clinton had apologized for using a private email, she also kept saying that it was an invented issue used by Republicans to attack her. “And I guess my question to you is, which is it?” she said. “If you’re blaming the Republicans, some might wonder how genuine is that apology?”
“Well, actually it’s both,” Clinton said. “I mean, I’m sorry that I made a choice that has resulted in this kind of situation, and I’ve said I’ve made a mistake. Obviously if I had to do it over again, I wouldn’t. It was allowed and everybody has confirmed that. But it’s also, as we now know very clearly, the way that the Republicans are trying to bring my– as they admit– poll numbers down.”
“So it’s really both, Savannah,” Clinton said. “It’s both, ‘Hey, you know what, turn the clock back, it was allowed.’ I was thinking about many other things [than] my email account when I became Secretary of State.”
“It’s allowed, but you know, anybody who works in government knows it’s really not encouraged to use your personal email. And I just — do you get how bad it looks?” Guthrie asked.
“It looks like you set up a personal server, you set up your own email so that you would have control of those emails and you and you alone would decide when to release, whether to release them. And that’s in fact what happened,” she continued.
“Well, Savannah, first of all, it was allowed,” Clinton said. “And I’ve said it wasn’t the best choice. And every government official gets to decide what is personal and work-related.”
Another Tech Company Joins FBI Clinton Email Probe
Democrats on the Select Committee on Benghazi released a new video and fact sheet rebutting claims made by Chairman Trey Gowdy that the Committee is not focused on former Secretary of State Hillary Clinton. The new video and fact sheet come after Republican Majority Leader Kevin McCarthy admitted on national television that the purpose of the Select Committee has always been to damage Hillary Clinton’s bid for President.
Admit | Hillary Clinton
Kevin McCarthy Admits Benghazi Committee Formed to Beat Hillary Clinton
Hillary Clinton Likely to Face Felony Charges for Her Reckless Email Handling & Lying about It
New Batch Of Hillary Clinton Emails Includes Classified Information – Making Money
New Clinton email count: 305 documents with potentially classified information
Inspector Finds Top Secret Emails Were On Hillary Clinton’s Server Trey Gowdy Benghazi Gate
Will Hillary Clinton Be Charged in the Email Scandal? One Judge Says Yes
Judge Napolitano: Gaps in Hillary Clinton Emails Include 2-Month Period Following Benghazi Attack
Tempers Flare At Hearing On Benghazi Terror Attack Trey Gowdy Lou Dobbs
Ex-Counter Intel Agent Nails Hillary Clinton With Two Laws She Broke
Chris Farrell, a former Army counterintelligence agent and now director of investigations for Judicial Watch, argues Hillary Clinton has violated two national security laws.
The first is Title 18 of U.S. Code Sec. 1924 which outlaws the unauthorized removal and storage of classified information. Penalties include fines and imprisonment for up to one year.
The second is Title 18 of U.S. Code Sec. 793, a more serious felony, which outlaws people from misusing national defense information, and carries a sentence of up to 10 years in prison.
Liberal media not buying Hillary Clinton’s email excuses?
Judge Orders State Dept To Help FBI Recover Hillary Clinton’s Deleted Emails America’s News HQ
Hillary Clinton Explains What’s in Her Classified Emails
Rep. Trey Gowdy on Hillary Clinton’s widening email scandal – FoxTV Political News
• Criminal Charges Hang Over Clinton • “Hillary Blew It” – Chuck Todd • 7/24/15 •
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
NSA Whistleblower William Binney on how they target us, abuse us, spy on us
NSA Whistleblower William Binney: The Future of FREEDOM
A 36-year veteran of America’s Intelligence Community, William Binney resigned from his position as Director for Global Communications Intelligence (COMINT) at the National Security Agency (NSA) and blew the whistle, after discovering that his efforts to protect the privacy and security of Americans were being undermined by those above him in the chain of command.
The NSA data-monitoring program which Binney and his team had developed — codenamed ThinThread — was being aimed not at foreign targets as intended, but at Americans (codenamed as Stellar Wind); destroying privacy here and around the world. Binney voices his call to action for the billions of individuals whose rights are currently being violated.
William Binney speaks out in this feature-length interview with Tragedy and Hope’s Richard Grove, focused on the topic of the ever-growing Surveillance State in America.
On January 22, 2015: (Berlin, Germany) – The Government Accountability Project (GAP) is proud to announce that retired NSA Technical Director and GAP client, William “Bill” Binney, will accept the Sam Adams Associates for Integrity in Intelligence Award today in Berlin, Germany. The award is presented annually by the Sam Adams Associates for Integrity in Intelligence (SAAII) to a professional who has taken a strong stand for ethics and integrity. http://whistleblower.org/press/nsa-wh…
Obama Admin. Was Likely Running Arms To Islamic Jihadists Through Benghazi
Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood
Uncovering the Benghazi Cover-up: Obama was Watching Siege After Drone Arrived (10/28/12)
Obama LIED About Benghazi Attack!!! (Lt. Col. Tony Shaffer Interview)
SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria
Benghazi-Gate: Connection between CIA and al-Qaeda in Libya and Syria, with Turkey’s Help
(FULL) 13 Hours in Benghazi: Fox News Special Report
Russia Hacks Pentagon + China Hack = 25 Million Records. Fed Judge Requests All Clinton Emails
Trusted Surveillance Part 4/8 – Enemy of The State
Enemy of the State (1998) Movie Full HD (English Subtitles) | Will Smith Movies Full Length
Gowdy: Clinton to testify in October before Benghazi panel, all questions ‘asked’ and ‘answered’
South Carolina Rep. Trey Gowdy said Sunday that Hillary Clinton will indeed testify Oct. 22 about her activities as secretary of state at the time of the Benghazi attacks but suggested that her demand for a one-time appearance will result in a long, hard day.
“We have agreed on the date,” Gowdy, a Republican and chairman of House’s Select Committee on Benghazi, told “Fox News Sunday.”
“And the ground rules are simple: You’re going to stay there until all of the questions are asked and answered with respect to Benghazi,” he continued. “If she’s going to insist that she’s only coming once, I’m going to insist that once be fully constructed, which means she’s going to be there for a while.”
Gowdy said questions about Clinton’s growing email controversy will be part of the hearing only because they’re relevant to his task of finding out what Clinton knew prior to the fatal Sept. 11, 2012, terror attacks on the U.S. outpost in Benghazi, Libya.
U.S. ambassador Christopher Stevens and three other Americans were killed in the attacks.
Clinton was secretary of state from 2009 to 2013. Among questions still being pursued are how much did the Obama administration know about the possibility of a terror attack and did the outpost have adequate security.
The email controversy essentially centers on Clinton using a private server and email accounts while serving as the country’s top diplomat.
“Had she not had this email arrangement with herself, you wouldn’t be talking to me this morning,” Gowdy told Fox on Sunday. “So, my focus is on the four murdered Americans in Benghazi. But before I can write the final definitive accounting of that, I have to make sure that the public record is complete.”
Clinton, the front running Democratic presidential candidate, has said she had no knowledge of sending or receiving information marked as classified, that she has done nothing wrong and intends to cooperate with investigations.
However, thousands of pages of her emails publicly released in recent months show she received messages later marked classified, including some that contained material regarding the production and dissemination of U.S. intelligence information.
And a recent inspector general probe raised concerns about whether classified information had traversed the email system, resulting in a counterintelligence referral being sent to the Justice Department. However, the referral did not allege criminal wrongdoing.
Intentionally transmitting classified information through an unsecured system would appear to be a violation of federal regulations.
This weekend, Clinton suggested the email controversy is also politically motivated.
“I won’t get down in the mud with them,” she said. “I won’t play politics with national security or dishonor the memory of those who we lost. I won’t pretend that this is anything other than what it is, the same old partisan games we’ve seen so many times before.”
Gowdy, a former federal prosecutor, has repeatedly declined to comment on whether he thinks Clinton broke federal law with what he calls her “unique email arrangement.”
However, he said Sunday that he has confidence in the FBI’s handling of the server, which Clinton turned over last week, after repeated requests, and that the agency will be the neutral observer for which he has asked.
“I think (the FBI is) the premiere law enforcement agency in the world,” Gowdy said. “I think that they’re as apolitical as anything can be in this culture, and I think they’re going to go wherever the facts take them.”
Clinton will testify before Benghazi panel on Oct. 22
Circle Oct. 22 with a red pen on the calendar: That’s when Hillary Clinton will testify before the Select Committee on Benghazi, the panel confirmed on Wednesday.
The former Secretary of State will answer questions about her role in the events that led up to the 2012 Benghazi, Libya terrorist attack that left four Americans dead — and, more than likely, her email practices that have come under fire in recent weeks.
Story Continued Below
“Secretary Clinton’s attorney, Mr. David Kendall, late today confirmed she has accepted the Select Committee’s offer to appear before the committee, which will take place Oct. 22nd,” spokesman Jamal Ware said in a statement. “Members of the Committee will question the former Secretary about Libya, Benghazi and her email arrangement consistent with the scope and jurisdiction of the Committee laid out in the House Resolution.”
Clinton’s campaign had made a similar announcement last Saturday following a series of reports calling into question the 2016 Democratic front-runner’s handling of classified information.
But the panel balked at the announcement, saying Kendall and the panel hadn’t agreed on the scope of what could be asked. They worried Kendall would demand that the panel stay away from questions about her email practices. Clinton used a home-brewed email server for work instead of a State.gov account as is required under government transparency rules.
Second IT firm agrees to give Clinton’s server data to FBI
Former secretary of state hired Datto Inc. to provide a private cloud backup of her emails
FBI asked the Connecticut company to turn over data. It agreed.
State Department also asking again whether she turned over all of her business emails
BY GREG GORDON AND ANITA KUMAR
Hillary Clinton hired a Connecticut company to back up her emails on a “cloud” storage system, and her lawyers have agreed to turn whatever it contains over to the FBI, a person familiar with the situation said Tuesday.
The disclosure came as a Republican Senate committee chairman, Wisconsin Sen. Ron Johnson, also asked the firm to turn over to the committee copies of any Clinton emails still in its possession.
There were conflicting accounts as to whether the development could lead to recovery of any of Clinton’s more than 31,000 personal emails, which she said she deleted from her private server upon turning over her work-related emails to the State Department, at its request, in December 2014.
Congressional Republicans have voiced skepticism as to whether the 30,940 business emails that the Democratic presidential candidate handed over represented all of those related to her position as secretary of state. The FBI is separately investigating whether Clinton’s arrangement put classified information at risk but has yet to characterize it as a criminal inquiry.
Datto Inc., based in Norwalk, Conn., became the second data storage firm to become entangled in the inquiry into Clinton’s unusual email arrangement, which has sparked a furor that has dogged her campaign. In August, Clinton and the firm that had managed her server since June 2013, Colorado-based Platte River Networks, agreed to surrender it for examination by the FBI.
On Friday, Clinton’s attorney, David Kendall, and Platte River agreed to allow Datto to turn over the data from the backup server to the FBI, said the person familiar with Datto’s storage, who spoke on condition of anonymity because of the sensitivity of the matter.
Datto said in a statement that “with the consent of our client and their end user, and consistent with our policies regarding data privacy, Datto is working with the FBI to provide data in conjunction with its investigation.”
The source said, however, that Platte River had set up a 60-day retention policy for the backup server, meaning that any emails to which incremental changes were made at least 60 days prior would be deleted and “gone forever.” While the server wouldn’t have been “wiped clean,” the source said, any underlying data likely would have been written over and would be difficult to recover.
Since Clinton has said she deleted all of her personal emails, the configuration might complicate any attempt by FBI forensics experts to resurrect emails from the backup. However, Bloomberg reported recently that the FBI has recovered some of Clinton’s emails, apparently from the server they seized from Platte River.
In laying out facts gathered by the Senate Homeland Security and Governmental Affairs Committee, which he chairs, Johnson offered the first public confirmation that Clinton or her representatives had arranged for a backup of her email server after she left office in early 2013.
His letter also cited internal emails recounting requests in late 2014 and early 2015 from Clinton representatives for Colorado-based Platte River Networks, the firm managing Clinton’s primary server, to direct Datto to reduce the amount of her emails it was backing up. These communications led a Platte River employee to air suspicions that “this whole thing really is covering up some shaddy (sic) shit,” according to an excerpt of an email cited by Johnson.
The controversy seems sure to come up on Oct. 22, when Clinton is scheduled to testify to a House committee investigating the fatal 2012 attacks on U.S. facilities in Benghazi, Libya. It was the panel’s chairman who first declared last March that she had “wiped” her server clean based on a letter from Clinton’s attorney.
Spokesmen for Clinton’s campaign declined to respond to requests for comment about Johnson’s letter Tuesday.
On May 31, 2013, four months after Clinton left office, the Clinton Executive Service Corp., which oversaw her email server contracts, hired Platte River to maintain her account. Its New Jersey-based server replaced the server in her New York home that had handled her emails throughout her tenure as secretary of state.
Several weeks ago, Platte River employees discovered that her private server was syncing with an offsite Datto server, he said.
When Datto acknowledged that was the case, a Platte River employee replied in an email: “This is a problem.”
Johnson said that “Datto apparently possessed a backup of the server’s contents since June 2013.”
Upon that discovery, Platte River “directed Datto to not delete the saved data and worked with Datto to find a way to move the saved information . . . back to Secretary Clinton’s private server.”
CLINTON WILL TESTIFY ON CAPITOL HILL ABOUT HER EMAIL PRACTICES OCT. 22
The letter also noted that Platte River employees were directed to reduce the amount of email data being stored with each backup. Late this summer, Johnson wrote, a Platte River employee took note of this change and inquired whether the company could search its archives for an email from Clinton Executive Service Corp. directing such a reduction in October or November 2014 and then again around February, advising Platte River to save only emails sent during the most recent 30 days.
Those reductions would have occurred after the State Department requested that Clinton turn over her emails.
IT IS UNCLEAR WHY SECRETARY CLINTON’S REPRESENTATIVES APPARENTLY DIRECTED (PLATTE RIVER) TO REDUCE THE BACKUP TIME PERIOD OF HER EMAILS AROUND THE SAME TIME PERIOD OR IN THE MONTHS FOLLOWING THE STATE DEPARTMENT’S REQUEST.
Wisconsin Sen. Ron Johnson, in letter to Datto
It was here that a Platte River employee voiced suspicions about a cover-up and sought to protect the company. “If we have it in writing that they told us to cut the backups,” the employee wrote, “and that we can go public with our statement saying we have had backups since day one, then we were told to trim to 30 days, it would make us look a WHOLE LOT better,” according to the email cited by Johnson.
In the letter to Austin McChord, Datto’s CEO, Johnson asked the firm to produce copies of all communications it had relating to Clinton’s server, including those with Platte River and the Clinton firm.” He also asked whether Datto and its employees were authorized to store and view classified information and for details of any cyberattacks on the backup server.
In an ongoing review of Clinton’s work emails, the State Department and intelligence agencies have found more than 400 containing classified information, including at least two declared “Top Secret,” the most sensitive national security data. Clinton has said none of the emails were marked classified during her tenure although some communications by their nature are classified at creation.
In other developments, the State Department is asking Clinton to search again for any emails, regardless of format, from the first two months of her tenure, according to a document filed Tuesday by the State Department in response to a lawsuit about her emails.
The request to Clinton attorney David Kendall, dated Oct. 2, comes weeks after the State Department obtained a series of emails that Clinton did not turn over despite her claim that she sent the agency all her work-related correspondence.
TO THE EXTENT HER EMAILS MIGHT BE FOUND ON ANY INTERNET SERVICE AND EMAIL PROVIDERS, WE ENCOURAGE YOU TO CONTACT THEM.
Patrick Kennedy, under secretay of state for management
The chain of emails, dating from Jan. 10, 2009 to Feb. 1, 2009, were exchanged with former Gen. David Petraeus when he headed the military’s U.S. Central Command, responsible for running the wars in Iraq and Afghanistan and mostly relate to personnel matters.
“These emails are now in our possession and will be subject to Freedom of Information Act requests,” State Department spokesman John Kirby said last week. “Furthermore, we asked the IG to incorporate this matter into the review Secretary Kerry requested in March. We have also informed Congress of this matter.”
Clinton said she was unable to turn over emails she sent or received from late January to March 18, 2009, because she continued to use the AT&T Blackberry account she had when she was a senator. But after the Petraeus emails surfaced and showed she had not turned over emails sent or received on her new account, aides said said she could not turn over emails because they had not been captured on her private server.
Clinton’s campaign and Kendall did not immediately respond to questions about Johnon’s letter or the State Department’s new request.
18 U.S. Code § 1924 – Unauthorized removal and retention of classified documents or material
(a)
Whoever, being an officer, employee, contractor, or consultant of the United States, and, by virtue of his office, employment, position, or contract, becomes possessed of documents or materials containing classified information of the United States, knowingly removes such documents or materials without authority and with the intent to retain such documents or materials at an unauthorized location shall be fined under this title or imprisoned for not more than one year, or both.
(b)
For purposes of this section, the provision of documents and materials to the Congress shall not constitute an offense under subsection (a).
(c)
In this section, the term “classified information of the United States” means information originated, owned, or possessed by the United States Government concerning the national defense or foreign relations of the United States that has been determined pursuant to law or Executive order to require protection against unauthorized disclosure in the interests of national security.
18 U.S. Code § 793 – Gathering, transmitting or losing defense information
(a)
Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or
(b)
Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or
(c)
Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or
(d)
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or
(e)
Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or
(f)
Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer—Shall be fined under this title or imprisoned not more than ten years, or both.
(g)
If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy.
(h)
(1)
Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term “State” includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States.
(2)
The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection.
(3)The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)–(p)) shall apply to—
(A)
property subject to forfeiture under this subsection;
(B)
any seizure or disposition of such property; and
(C)
any administrative or judicial proceeding in relation to such property,
if not inconsistent with this subsection.
(4)
Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law.
In 1970, the name of the facility was changed to “Ossining Correctional Facility” and, in 1985, it received its present name.[3] “Sing Sing” was derived from the name of a Native American Nation, “Sinck Sinck” (or “Sint Sinck”), from whom the land was purchased in 1685.[4]
Sing Sing prison confines about 1,700 prisoners.[5] There are plans to convert the original 1825 cell block into a time specific museum.[6]
A 25-minute documentary from 1963 about Ray Bradbury – by David L. Wolper
Day at Night: Ray Bradbury
A Conversation with Ray Bradbury
A short film for the National Endowment for the arts feature Ray Bradbury as he discusses his life, literary loves and Fahrenheit 451.
A Conversation with Ray Bradbury by Lawrence Bridges
Fahrenheit 451 – Trailer
Fahrenheit 451 (1966) Full Movie | Julie Christie Full Movies Online
Top 10 Notes: Fahrenheit 451
Feeling More Alive: Fahrenheit 451’s The Hearth and the Salamander
Fahrenheit 451 by Ray Bradbury (Full audiobook)
Ray Bradbury on Writing Persistently
A Conversation with Ray Bradbury
Author Ray Bradbury joins Dean Nelson of Point Loma Nazarene University for a talk about his craft as part of Point Loma Nazarene University’s Writer’s Symposium by the Sea. Series: “Writer’s Symposium By The Sea” [4/2001] [Public Affairs] [Humanities] [Show ID: 5534]
An Evening with Ray Bradbury 2001
Science fiction author Ray Bradbury regales his audience with stories about his life and love of writing in “Telling the Truth,” the keynote address of The Sixth Annual Writer’s Symposium by the Sea, sponsored by Point Loma Nazarene University. Series: Writer’s Symposium By The Sea [4/2001] [Public Affairs] [Humanities] [Show ID: 5533]
Raymond Douglas “Ray” Bradbury[2] (August 22, 1920 – June 5, 2012) was an Americanfantasy, science fiction, horror and mystery fiction author. Best known for hisdystopian novel Fahrenheit 451 (1953) and for the science fiction and horror stories gathered together as The Martian Chronicles (1950) and The Illustrated Man (1951), Bradbury was one of the most celebrated 20th- and 21st-century American genre writers. He wrote and consulted on many screenplays and television scripts, includingMoby Dick[3] and It Came from Outer Space. Many of his works have been adapted into comic books, television shows, and films.
Bradbury was surrounded by an extended family during his early childhood and formative years in Waukegan, Illinois. An aunt read him short stories when he was a child.[11] This period provided foundations for both the author and his stories. In Bradbury’s works of fiction, 1920s Waukegan becomes “Green Town,” Illinois.
The Bradbury family lived in Tucson, Arizona, in 1926–27 and 1932–33 as the father pursued employment, each time returning to Waukegan, but eventually settled in Los Angeles in 1934, when Bradbury was 14. The family arrived with only 40 dollars, which paid for rent and food until his father finally found a job making wire at a cable company for $14 a week. This meant that they could stay, however, and Bradbury—who was in love with Hollywood—was ecstatic.
Bradbury attended Los Angeles High School and was active in the drama club. He often roller-skated through Hollywood in hopes of meeting celebrities. Among the creative and talented people Bradbury met this way were special effects pioneer Ray Harryhausen and radio star George Burns. (Bradbury’s first pay as a writer was at the age of fourteen, when Burns hired him to write for the Burns and Allen show.[12][13])
Influences
Literature
Bradbury was a reader and writer throughout his youth.[14] He knew as a young boy that he was “going into one of the arts.” In 1931, at the age of eleven, the young Bradbury began writing his own stories. The country was going through the Great Depression, and sometimes Bradbury wrote on butcher paper.
In his youth, he spent much time in the Carnegie library in Waukegan, reading such authors as H. G. Wells, Jules Verne, and Edgar Allan Poe. At age twelve, Bradbury began writing traditional horror stories and said he tried to imitate Poe until he was about eighteen. In addition to comics, he loved Edgar Rice Burroughs, creator of Tarzan of the Apes,[15] especially Burroughs’ John Carter of Mars series. The Warlord of Marsimpressed him so much that at the age of twelve he wrote his own sequel.[16] The young Bradbury was also a cartoonist and loved to illustrate. He wrote about Tarzan and drew his own Sunday panels. He listened to the radio show Chandu the Magician, and when the show went off the air every night he would sit and write the entire script from memory.
In Beverly Hills, he often visited the science fiction writer Bob Olsen for mentorship as well as friendship while Bradbury was a teenager. They shared ideas and would keep in contact. In 1936, at a secondhand bookstore in Hollywood, Bradbury discovered a handbill promoting meetings of the Los Angeles Science Fiction Society.[17] Thrilled to find there were others with his interests, at the age of sixteen Bradbury joined a weekly Thursday-night conclave.[18]
When he was seventeen, Bradbury read stories published in Astounding Science Fiction, and said he read everything by Robert A. Heinlein, Arthur C. Clarke, and the early writings of Theodore Sturgeon and A. E. van Vogt, but cited H. G. Wells and Jules Verne as his big science fiction influences. Bradbury identified with Verne, saying, “He believes the human being is in a strange situation in a very strange world, and he believes that we can triumph by behaving morally.” [19] Bradbury admitted that he stopped reading genre books in his twenties and embraced a broad field of literature that included Alexander Pope and poet John Donne.[20] Bradbury had just graduated from high school when he met Robert Heinlein, then 31 years old. Bradbury recalled, “He was well known, and he wrote humanistic science fiction, which influenced me to dare to be human instead of mechanical.”[20]
Hollywood
The family lived about four blocks from the Uptown Theater on Western Avenue in Los Angeles, the flagship theater for MGM and Fox. There, Bradbury learned how to sneak in and watched previews almost every week. He roller-skated there as well as all over town, as he put it “hell-bent on getting autographs from glamorous stars. It was glorious.” Among stars the young Bradbury was thrilled to encounter were Norma Shearer, Laurel and Hardy, and Ronald Colman. Sometimes he would spend all day in front of Paramount Pictures or Columbia Pictures and then skate to the Brown Derby to watch the stars who came and went for meals. He recounted seeing Cary Grant, Marlene Dietrich and Mae West, who he would learn made a regular appearance every Friday night, bodyguard in tow.[20]
Bradbury relates the following meeting with Sergei Bondarchuk, director of Soviet epic film series War and Peace, at a Hollywood award ceremony in Bondarchuk’s honor:
They formed a long queue and as Bondarchuk was walking along it he recognized several people: “Oh Mr. Ford, I like your film.” He recognized the director, Greta Garbo, and someone else. I was standing at the very end of the queue and silently watched this. Bondarchuk shouted to me; “Ray Bradbury, is that you?” He rushed up to me, embraced me, dragged me inside, grabbed a bottle ofStolichnaya, sat down at his table where his closest friends were sitting. All the famous Hollywood directors in the queue were bewildered. They stared at me and asked each other “who is this Bradbury?” And, swearing, they left, leaving me alone with Bondarchuk…[21]
Career
Bradbury’s “Undersea Guardians” was the cover story for the December 1944 issue of Amazing Stories
Bradbury’s first published story was “Hollerbochen’s Dilemma”, which appeared in the January 1938 number of Forrest J. Ackerman’s fanzineImagination!.[1] In July 1939, Ackerman gave nineteen-year-old Bradbury the money to head to New York for the First World Science Fiction Convention in New York City, and funded Bradbury’s fanzine, titled Futuria Fantasia.[22] Bradbury wrote most of its four issues, each limited to under 100 copies.[citation needed]Between 1940 and 1947, he was a contributor to Rob Wagner‘s film magazine, Script.[23]
In 1939, Bradbury joined Laraine Day‘s Wilshire Players Guild where for two years he wrote and acted in several plays. They were, as Bradbury later described, “so incredibly bad” that he gave up playwriting for two decades.[25] Bradbury’s first paid piece, “Pendulum,” written with Henry Hasse, was published in the pulp magazineSuper Science Stories in November 1941, for which he earned $15.[26]
Bradbury sold his first story, “The Lake”, for $13.75 at the age of twenty-two.[20] He became a full-time writer by the end of 1942. His first collection of short stories, Dark Carnival, was published in 1947 by Arkham House, a small press in Sauk City, Wisconsin, owned by writer August Derleth. Reviewing Dark Carnival for the New York Herald Tribune, Will Cuppy proclaimed Bradbury “suitable for general consumption” and predicted that he would become a writer of the caliber of British fantasy author John Collier.[27]
After a rejection notice from the pulp Weird Tales, Bradbury submitted “Homecoming” to Mademoiselle which was spotted by a young editorial assistant named Truman Capote. Capote picked the Bradbury manuscript from a slush pile, which led to its publication. Homecoming won a place in The O. Henry Prize Stories of 1947.[28]
It was in UCLA‘s Powell Library, in a study room with typewriters for rent, that Bradbury wrote his classic story of a book-burning future, The Fireman, which was about 25,000 words long. It was later published at about 50,000 words under the name Fahrenheit 451, for a total cost of $9.80, due to the library’s typewriter-rental fees of ten cents per half-hour.[29]
A chance encounter in a Los Angeles bookstore with the British expatriate writer Christopher Isherwood gave Bradbury the opportunity to put The Martian Chronicles into the hands of a respected critic. Isherwood’s glowing review[30] followed.
Writing
Bradbury attributed to two incidents his lifelong habit of writing every day. The first of these, occurring when he was three years old, was his mother’s taking him to see Lon Chaney‘s performance in The Hunchback of Notre Dame.[31] The second incident occurred in 1932, when a carnival entertainer, one Mr. Electrico, touched the young man on the nose with an electrified sword, made his hair stand on end, and shouted, “Live forever!”[32] Bradbury remarked, “I felt that something strange and wonderful had happened to me because of my encounter with Mr. Electrico…[he] gave me a future…I began to write, full-time. I have written every single day of my life since that day 69 years ago.”[32] It was at that age that Bradbury first started to do magic, which was his first great love. If he had not discovered writing, he would have become a magician.[33]
Bradbury claimed a wide variety of influences, and described discussions he might have with his favorite poets and writers Robert Frost, William Shakespeare, John Steinbeck, Aldous Huxley, and Thomas Wolfe. From Steinbeck, he said he learned “how to write objectively and yet insert all of the insights without too much extra comment.” He studied Eudora Welty for her “remarkable ability to give you atmosphere, character, and motion in a single line.” Bradbury’s favorite writers growing up included Katherine Anne Porter, who wrote about the American South, Edith Wharton, and Jessamyn West.[34]
Bradbury was once described as a “Midwestsurrealist” and is often labeled a science fiction writer, which he described as “the art of the possible.” Bradbury resisted that categorization, however:
First of all, I don’t write science fiction. I’ve only done one science fiction book and that’s Fahrenheit 451, based on reality. It was named so to represent the temperature at which paper ignites. Science fiction is a depiction of the real. Fantasy is a depiction of the unreal. So Martian Chronicles is not science fiction, it’s fantasy. It couldn’t happen, you see? That’s the reason it’s going to be around a long time – because it’s a Greek myth, and myths have staying power.[35]
Bradbury recounted when he came into his own as a writer, the afternoon he wrote a short story about his first encounter with death. When he was a boy, he met a young girl at the beach and she went out into the water and never came back. Years later, as he wrote about it, tears flowed from him. He recognized he had taken the leap from emulating the many writers he admired to connecting with his voice as a writer.[36][37]
When later asked about the lyrical power of his prose, Bradbury replied, “From reading so much poetry every day of my life. My favorite writers have been those who’ve said things well.” He is quoted, “If you’re reluctant to weep, you won’t live a full and complete life.”[38]
In high school, Bradbury was active in both the Poetry Club and the Drama club, continuing plans to become an actor but becoming serious about his writing as his high school years progressed. Bradbury graduated from Los Angeles High School, where he took poetry classes with Snow Longley Housh, and short story writing courses taught by Jeannet Johnson.[39] The teachers recognized his talent and furthered his interest in writing,[40] but he did not attend college. Instead, he sold newspapers at the corner of South Norton Avenue and Olympic Boulevard. In regard to his education, Bradbury said:
Libraries raised me. I don’t believe in colleges and universities. I believe in libraries because most students don’t have any money. When I graduated from high school, it was during the Depression and we had no money. I couldn’t go to college, so I went to the library three days a week for 10 years.[41][42]
He told The Paris Review, “You can’t learn to write in college. It’s a very bad place for writers because the teachers always think they know more than you do – and they don’t.”[43]
“Green Town”
A reinvention of Waukegan, Green Town is a symbol of safety and home, which is often juxtaposed as a contrasting backdrop to tales of fantasy or menace. It serves as the setting of his semi-autobiographical classics Dandelion Wine, Something Wicked This Way Comes, and Farewell Summer as well as in many of his short stories. In Green Town, Bradbury’s favorite uncle sprouts wings, traveling carnivals conceal supernatural powers, and his grandparents provide room and board to Charles Dickens.[44] Perhaps the most definitive usage of the pseudonym for his hometown, in Summer Morning, Summer Night, a collection of short stories and vignettes exclusively about Green Town, Bradbury returns to the signature locale as a look back at the rapidly disappearing small-town world of the American heartland, which was the foundation of his roots.[45]
Cultural contributions
Bradbury wrote many short essays on the arts and culture, attracting the attention of critics in this field, but he used his fiction to explore and criticize his culture and society. Bradbury observed, for example, thatFahrenheit 451 touches on the alienation of people by media:
In writing the short novel Fahrenheit 451 I thought I was describing a world that might evolve in four or five decades. But only a few weeks ago, in Beverly Hills one night, a husband and wife passed me, walking their dog. I stood staring after them, absolutely stunned. The woman held in one hand a small cigarette-package-sized radio, its antenna quivering. From this sprang tiny copper wires which ended in a dainty cone plugged into her right ear. There she was, oblivious to man and dog, listening to far winds and whispers and soap opera cries, sleep walking, helped up and down curbs by a husband who might just as well not have been there. This was not fiction.[46]
In a 1982 essay he wrote, “People ask me to predict the Future, when all I want to do is prevent it.” This intent had been expressed earlier by other authors,[47] who sometimes attributed it to him.
Bradbury was a strong supporter of public library systems, and helped to raise money to prevent the closure of several in California due to budgetary cuts. He iterated from his past that “libraries raised me”, and shunned colleges and universities, comparing his own lack of funds during the Depression with poor contemporary students.[53] His opinion varied on modern technology. In 1985 Bradbury wrote, “I see nothing but good coming from computers. When they first appeared on the scene, people were saying, ‘Oh my God, I’m so afraid.’ I hate people like that – I call them the neo-Luddites“, and “In a sense [computers] are simply books. Books are all over the place, and computers will be too”.[54] He resisted the conversion of his work into e-books, stating in 2010 “We have too many cellphones. We’ve got too many internets. We have got to get rid of those machines. We have too many machines now”.[55] When the publishing rights for Fahrenheit 451 came up for renewal in December 2011, Bradbury permitted its publication in electronic form provided that the publisher, Simon & Schuster, allowed the e-book to be digitally downloaded by any library patron. The title remains the only book in the Simon & Schuster catalog where this is possible.[56]
Several comic book writers have adapted Bradbury’s stories. Particularly noted among these were EC Comics‘ line of horror and science-fiction comics. Initially, the writers plagiarized his stories, but a diplomatic letter from Bradbury about it led to the company paying him and negotiating properly licensed adaptations of his work. The comics featuring Bradbury’s stories included Tales from the Crypt, Weird Science, Weird Fantasy, Crime Suspenstories, Haunt of Fear and others.
Bradbury remained an enthusiastic playwright all his life, leaving a rich theatrical legacy as well as literary. Bradbury headed the Pandemonium Theatre Company in Los Angeles for many years and had a five-year relationship with the Fremont Centre Theatre in South Pasadena.[57]
Bradbury was married to Marguerite McClure (January 16, 1922 – November 24, 2003) from 1947 until her death; they had four daughters:[60] Susan, Ramona, Bettina and Alexandra.[61] Though he lived in Los Angeles, Bradbury never obtained a driver’s license but relied on public transportation or his bicycle.[62] He lived at home until he was twenty-seven and married. His wife of fifty-six years, Maggie, as she was affectionately called, was the only woman Bradbury ever dated.[20]
Bradbury was a close friend of Charles Addams, and Addams illustrated the first of Bradbury’s stories about the Elliotts, a family that would resemble Addams’ own Addams Familyplaced in rural Illinois. Bradbury’s first story about them was “Homecoming,” published in the 1946 Halloween issue of Mademoiselle, with Addams illustrations. He and Addams planned a larger collaborative work that would tell the family’s complete history, but it never materialized, and according to a 2001 interview, they went their separate ways.[63] In October 2001, Bradbury published all the Family stories he had written in one book with a connecting narrative, From the Dust Returned, featuring a wraparound Addams cover of the original “Homecoming” illustration.[64]
Another close friend was animator Ray Harryhausen, who was best man at Bradbury’s wedding.[65] During a BAFTA 2010 awards tribute in honor of Ray Harryhausen‘s 90th birthday, Bradbury spoke of his first meeting Harryhausen at Forrest J Ackerman‘s house when they were both 18 years old. Their shared love for science fiction, King Kong, and the King Vidor-directed film The Fountainhead, written by Ayn Rand, was the beginning of a lifelong friendship. These early influences inspired the pair to believe in themselves and affirm their career choices. After their first meeting, they kept in touch at least once a month, in a friendship that spanned over 70 years.[66]
Late in life, Bradbury retained his dedication and passion despite what he described as the “devastation of illnesses and deaths of many good friends.” Among the losses that deeply grieved Bradbury was the death of Star Trek creator Gene Roddenberry, who was an intimate friend for many years. They remained close friends for nearly three decades after Roddenberry asked him to write for Star Trek, which Bradbury never did, objecting that he “never had the ability to adapt other people’s ideas into any sensible form.”[20]
Bradbury suffered a stroke in 1999[67] that left him partially dependent on a wheelchair for mobility.[68] Despite this he continued to write, and had even written an essay for The New Yorker, about his inspiration for writing, published only a week prior to his death.[69] Bradbury made regular appearances at science fiction conventions until 2009, when he retired from the circuit.
Ray Bradbury’s headstone in May 2012 prior to his death
Bradbury chose a burial place at Westwood Village Memorial Park Cemetery in Los Angeles, with a headstone that reads “Author of Fahrenheit 451”.[70][71][72] On February 6, 2015, the New York Times reported that the house that Bradbury lived and wrote in for fifty years of his life, at 10265 Cheviot Drive in Los Angeles, CA, had been demolished.[73]
Death
Bradbury died in Los Angeles, California, on June 5, 2012, at the age of 91, after a lengthy illness.[74] Bradbury’s personal library was willed to the Waukegan Public Library, where he had many of his formative reading experiences.[75]
The New York Times ’ obituary stated that Bradbury was “the writer most responsible for bringing modern science fiction into the literary mainstream.”[76] The Los Angeles Times credited Bradbury with the ability “to write lyrically and evocatively of lands an imagination away, worlds he anchored in the here and now with a sense of visual clarity and small-town familiarity”.[77] Bradbury’s grandson, Danny Karapetian, stated that Bradbury’s works had “influenced so many artists, writers, teachers, scientists, and it’s always really touching and comforting to hear their stories”.[61]The Washington Post hallmarked several modern day technologies that Bradbury had envisioned much earlier in his writing, such as the idea of banking ATMs and earbuds and Bluetooth headsets from Fahrenheit 451, and the concepts of artificial intelligence within I Sing the Body Electric.[78]
For many Americans, the news of Ray Bradbury’s death immediately brought to mind images from his work, imprinted in our minds, often from a young age. His gift for storytelling reshaped our culture and expanded our world. But Ray also understood that our imaginations could be used as a tool for better understanding, a vehicle for change, and an expression of our most cherished values. There is no doubt that Ray will continue to inspire many more generations with his writing, and our thoughts and prayers are with his family and friends.[79]
Several celebrity fans of Bradbury paid tribute to the author by stating the influence of his works on their own careers and creations.[80][81] Filmmaker Steven Spielberg stated that Bradbury was “[his] muse for the better part of [his] sci-fi career…. On the world of science fiction and fantasy and imagination he is immortal”.[82] Writer Neil Gaiman felt that “the landscape of the world we live in would have been diminished if we had not had him in our world”.[81] Author Stephen King released a statement on his website saying, “Ray Bradbury wrote three great novels and three hundred great stories. One of the latter was called ‘A Sound of Thunder.’ The sound I hear today is the thunder of a giant’s footsteps fading away. But the novels and stories remain, in all their resonance and strange beauty.”[83] Bradbury’s influence well exceeded the field of literature. Progressive house music producer and performer, Joel Thomas Zimmerman, who is most commonly known by his stage name Deadmau5, composed a song named after one of Bradbury’s short stories “The Veldt” which was originally published in the Saturday Evening Post.[84] The EP of “The Veldt” was released days after Bradbury’s death and is dedicated to the memory of the author.[85]
Bradbury is credited with writing 27 novels and over 600 short stories.[77] More than eight million copies of his works, published in over 36 languages, have been sold around the world.[76]
First novel
In 1949, Bradbury and his wife were expecting their first child. He took a Greyhound bus to New York and checked into a room at the YMCA for fifty cents a night. He took his short stories to a dozen publishers and no one wanted them. Just before getting ready to go home, Bradbury had dinner with an editor at Doubleday. When Bradbury recounted that everyone wanted a novel and he didn’t have one, the editor, coincidentally named Walter Bradbury, asked if the short stories might be tied together into a book length collection. The title was the editor’s idea; he suggested, “You could call it “The Martian Chronicles.” Bradbury liked the idea and recalled making notes in 1944 to do a book set on Mars. That evening, he stayed up all night at the YMCA and typed out an outline. He took it to the Doubleday editor the next morning, who read it and wrote Bradbury a check for seven hundred and fifty dollars. When Bradbury returned to Los Angeles, he connected all the short stories and that became The Martian Chronicles.[34]
Intended first novel
What was later issued as a collection of stories and vignettes, Summer Morning, Summer Night, started out to be Bradbury’s first true novel. The core of the work was Bradbury’s witnessing of the American small-town and life in the American heartland.
In the winter of 1955–56, after a consultation with his Doubleday editor, Bradbury deferred publication of a novel based on Green Town, the pseudonym for his hometown. Instead, he extracted seventeen stories and, with three other Green Town tales, bridged them into his 1957 book Dandelion Wine. Later, in 2006, Bradbury published the original novel remaining after the extraction, and retitled it Farewell Summer. These two titles show what stories and episodes Bradbury decided to retain as he created the two books out of one.
The most significant of the remaining unpublished stories, scenes, and fragments were published under the originally intended name for the novel, Summer Morning, Summer Night, in 2007.[86]
Adaptations to other media
Bradbury in 1959, when some of his short stories were adapted for television shows like Alfred Hitchcock Presents
Also in the early 1950s, adaptations of Bradbury’s stories were televised in several anthology shows, including Tales of Tomorrow, Lights Out, Out There, Suspense, CBS Television Workshop, Jane Wyman’s Fireside Theatre, Star Tonight, Windows and Alfred Hitchcock Presents. “The Merry-Go-Round,” a half-hour film adaptation of Bradbury’s “The Black Ferris,” praised by Variety, was shown on Starlight Summer Theater in 1954 and NBC’s Sneak Preview in 1956. During that same period, several stories were adapted for radio drama, notably on the science fiction anthologies Dimension X and its successor X Minus One.
Producer William Alland first brought Bradbury to movie theaters in 1953 with It Came from Outer Space, a Harry Essex screenplay developed from Bradbury’s screen treatment “Atomic Monster”. Three weeks later came the release of Eugène Lourié’s The Beast from 20,000 Fathoms (1953), which featured one scene based on Bradbury’s “The Fog Horn“, about a sea monster mistaking the sound of a fog horn for the mating cry of a female. Bradbury’s close friend Ray Harryhausen produced the stop-motion animation of the creature. Bradbury would later return the favor by writing a short story, “Tyrannosaurus Rex”, about a stop-motion animator who strongly resembled Harryhausen. Over the next 50 years, more than 35 features, shorts, and TV movies were based on Bradbury’s stories or screenplays.
Bradbury was hired in 1953 by director John Huston to work on the screenplay for his film version of Melville‘s Moby Dick (1956), which stars Gregory Peck as Captain Ahab, Richard Basehart as Ishmael, and Orson Welles as Father Mapple. A significant result of the film was Bradbury’s book Green Shadows, White Whale, a semi-fictionalized account of the making of the film, including Bradbury’s dealings with Huston and his time in Ireland, where exterior scenes that were set in New Bedford, Massachusetts, were filmed.
In 1965, three of Bradbury’s stories were adapted for the stage. These included “The Wonderful Ice Cream Suit”, “The Day It Rained Forever” and “Device Out Of Time”. The latter was adapted from his 1957 novel Dandelion Wine. The plays debuted at the Coronet Theater in Hollywood and featured Booth Coleman, Joby Baker, Fredric Villani, Arnold Lessing, Eddie Sallia, Keith Taylor, Richard Bull, Gene Otis Shane, Henry T. Delgado, F. Murray Abraham, Anne Loos and Len Lesser. The director was Charles Rome Smith and the production company was Pandemonium Productions.
In 1966, Bradbury helped Lynn Garrison create AVIAN, a specialist aviation magazine. For the first issue Bradbury wrote a poem – Planes that land on grass.
Ray Bradbury takes part in a symposium at Caltech with Arthur C. Clarke, journalist Walter Sullivan, and scientists Carl Sagan and Bruce Murray. In this excerpt, Bradbury reads his poem ‘If Only We Had Taller Been’ (poem begins at 2:20, full text[88]). Video released by NASA in honor of the naming of Bradbury Landing in 2012.[89]
In 1972 The Screaming Woman was adapted as an ABC Movie-of-the-Week starring Olivia de Havilland.
In 1984, Michael McDonough of Brigham Young University produced “Bradbury 13,” a series of 13 audio adaptations of famous stories from Bradbury, in conjunction with National Public Radio. The full-cast dramatizations featured adaptations of “The Ravine,” “Night Call, Collect,” “The Veldt“, “There Was an Old Woman,” “Kaleidoscope,” “Dark They Were, and Golden-Eyed“, “The Screaming Woman,” “A Sound of Thunder,” “The Man,” “The Wind,” “The Fox and the Forest,” “Here There Be Tygers” and “The Happiness Machine”. Voiceover actor Paul Frees provided narration, while Bradbury himself was responsible for the opening voiceover; Greg Hansen and Roger Hoffman scored the episodes. The series won a Peabody Award as well as two Gold Cindy awards and was released on CD on May 1, 2010. The series began airing on BBC Radio 4 Extra on June 12, 2011.
From 1985 to 1992 Bradbury hosted a syndicated anthology television series, The Ray Bradbury Theater, for which he adapted 65 of his stories. Each episode would begin with a shot of Bradbury in his office, gazing over mementoes of his life, which he states (in narrative) are used to spark ideas for stories. During the first two seasons, Bradbury also provided additional voiceover narration specific to the featured story and appeared on screen.
Deeply respected in the USSR, Bradbury’s fictions has been adapted into five episodes of the Soviet science fiction TV series This Fantastic World which adapted the stories I Sing The Body Electric, Fahrenheit 451, A Piece of Wood, To the Chicago Abyss, and Forever and the Earth.[91] In 1984 a cartoon adaptation of There Will Come Soft Rains («Будет ласковый дождь») came out byUzbek director Nazim Tyuhladziev.[92] He made a film adaptation of The Veldt (“Вельд”) in 1987.[93] In 1989 came out a cartoon adaptation of Here There Be Tygers («Здесь могут водиться тигры») by director Vladimir Samsonov.[94]
The 1998 film The Wonderful Ice Cream Suit, released by Touchstone Pictures, was written by Bradbury. It was based on his story “The Magic White Suit” originally published in The Saturday Evening Post in 1957. The story had also previously been adapted as a play, a musical, and a 1958 television version.
In 2002, Bradbury’s own Pandemonium Theatre Company production of Fahrenheit 451 at Burbank’s Falcon Theatre combined live acting with projected digital animation by the Pixel Pups. In 1984, Telarium released a game for Commodore 64 based on Fahrenheit 451.[95] Bradbury and director Charles Rome Smith co-founded Pandemonium in 1964, staging the New York production of The World of Ray Bradbury(1964), adaptations of “The Pedestrian“, “The Veldt”, and “To the Chicago Abyss.”
In 2005, the film A Sound of Thunder was released, loosely based upon the short story of the same name. The film The Butterfly Effect revolves around the same theory as A Sound of Thunder and contains many references to its inspiration. Short film adaptations of A Piece of Wood and The Small Assassin were released in 2005 and 2007 respectively.
In 2005, it was reported that Bradbury was upset with filmmaker Michael Moore for using the title Fahrenheit 9/11, which is an allusion to Bradbury’s Fahrenheit 451, for his documentary about the George W. Bush administration. Bradbury expressed displeasure with Moore’s use of the title but stated that his resentment was not politically motivated, even though Bradbury was conservative-leaning politically.[96] Bradbury asserted that he did not want any of the money made by the movie, nor did he believe that he deserved it. He pressured Moore to change the name, but to no avail. Moore called Bradbury two weeks before the film’s release to apologize, saying that the film’s marketing had been set in motion a long time ago and it was too late to change the title.[97]
In 2008, the film Ray Bradbury’s Chrysalis was produced by Roger Lay Jr. for Urban Archipelago Films, based upon the short story of the same name. The film won the best feature award at the International Horror and Sci-Fi Film Festival in Phoenix. The film has international distribution by Arsenal Pictures and domestic distribution by Lightning Entertainment.
In 2010, The Martian Chronicles was adapted for radio by Colonial Radio Theatre on the Air.
In 2012, EDM artist deadmau5, along with guest vocalist Chris James, crafted a song called “The Veldt” inspired by Bradbury’s short story of the same title. The lyrics featured various references to the short story.
Bradbury’s works and approach to writing are documented in Terry Sanders‘ film Ray Bradbury: Story of a Writer (1963).
Bradbury’s poem “Groon” was voiced as a tribute in 2012.[98]
The Ray Bradbury Award for excellency in screenwriting was occasionally presented by the Science Fiction and Fantasy Writers of America – presented to six people on four occasions from 1992 to 2009.[99] Beginning 2010, the Ray Bradbury Award for Outstanding Dramatic Presentation is presented annually according to Nebula Awards rules and procedures, although it is not a Nebula Award.[100] The revamped Bradbury Award replaced the Nebula Award for Best Script.
In 1971, an impact crater on Earth’s moon was named “Dandelion Crater” by the Apollo 15 astronauts, in honor of Bradbury’s novel Dandelion Wine.
Ray Bradbury Park was dedicated in Waukegan, Illinois in 1990. He was present for the ribbon-cutting ceremony. The park contains locations described in Dandelion Wine, most notably the “113 steps”. In 2009, an interpretive panel designed by artist Michael Pavelich was added to the park detailing the history of Ray Bradbury and Ray Bradbury Park.[101]
In 2000, he was awarded the Medal for Distinguished Contribution to American Letters from the National Book Foundation.[102]
For his contribution to the motion picture industry, Bradbury was given a star on the Hollywood Walk of Fame on April 1, 2002.[103]
In 2003, he received an honorary doctorate from Woodbury University where he presented the Ray Bradbury Creativity Award each year at Woodbury University until his death.[104]
In 2005 he was awarded the degree of Doctor of Laws (honoris causa) by the National University of Ireland, Galway at a conferring ceremony in Los Angeles.
On April 14, 2007, Bradbury received the Sir Arthur Clarke Award‘s Special Award, given by Clarke to a recipient of his choice.
On April 16, 2007, Bradbury received a special citation by the Pulitzer Prize jury “for his distinguished, prolific, and deeply influential career as an unmatched author of science fiction and fantasy.”[111]
On May 17, 2008, Bradbury received the inaugural J. Lloyd Eaton Lifetime Achievement Award in Science Fiction, presented by the UCR Libraries at the 2008 Eaton Science Fiction Conference, “Chronicling Mars”.[114]
In 2009, Bradbury was awarded an Honorary Doctorate by Columbia College Chicago.[115]
Anderson, James Arthur (2013). The Illustrated Ray Bradbury. Wildside Press. ISBN978-1-4794-0007-2.
Albright, Donn (1990). Bradbury Bits & Pieces: The Ray Bradbury Bibliography, 1974–88. Starmont House. ISBN1-55742-151-X.
Eller, Jonathan R.; Touponce, William F. (2004). Ray Bradbury: The Life of Fiction. Kent State University Press. ISBN0-87338-779-1.
Eller, Jonathan R. (2011). Becoming Ray Bradbury. Urbana, IL: University of Illinois Press. ISBN0-252-03629-8.
Nolan, William F. (1975). The Ray Bradbury Companion: A Life and Career History, Photolog, and Comprehensive Checklist of Writings. Gale Research. ISBN0-8103-0930-0.
Paradowski, Robert J.; Rhynes, Martha E. (2001). Ray Bradbury. Salem Press.
Reid, Robin Anne (2000). Ray Bradbury: A Critical Companion. Greenwood Press. ISBN0-313-30901-9.
Fahrenheit 451 is a dystopian novel by Ray Bradbury published in 1953. It is regarded as one of his best works.[3] The novel presents a future American society where books are outlawed and “firemen” burn any that are found.[4] The title refers to the temperature that Bradbury asserted to be the autoignition point of paper[5][6] (In reality, scientists place the autoignition point of paper anywhere from high 440 degrees Fahrenheit to some 30 degrees hotter, depending on the study and type of paper).[7]
The novel has been the subject of interpretations primarily focusing on the historical role of book burning in suppressing dissenting ideas. In a 1956 radio interview,[8]Bradbury stated that he wrote Fahrenheit 451 because of his concerns at the time (during the McCarthy era) about the threat of book burning in the United States. In later years, he stated his motivation for writing the book in more general terms.
The novel has been adapted several times. François Truffaut wrote and directed a film adaptation of the novel in 1966, and a BBC Radio dramatization was produced in 1982. Bradbury published a stage play version in 1979[15] and helped develop a 1984 interactive fiction computer game titled Fahrenheit 451. A companion piece titled A Pleasure To Burn, consisting of a selection of Bradbury’s short stories, was released in 2010, less than two years before the author’s death.
The novel is divided into three parts: “The Hearth and the Salamander”, “The Sieve and the Sand”, and “Burning Bright”.
“The Hearth and the Salamander”
Guy Montag is a “fireman” hired to burn the possessions of those who read outlawed books. One fall night while returning from work, he meets his new neighbor: a teenage girl named Clarisse McClellan, whose free-thinking ideals and liberating spirit cause him to question his life and his own perceived happiness. Montag returns home to find that his wife Mildred has overdosed on sleeping pills, and calls for medical attention. Mildred survives with no memory of what happened. Over the next days, Clarisse faithfully meets Montag as he walks home. She tells him about how her interests have made her an outcast at school. Montag looks forward to these meetings, and just as he begins to expect them, Clarisse goes absent. He senses something is wrong.[18]
In the following days, while at work with the other firemen ransacking the book-filled house of an old woman before the inevitable burning, Montag steals a book before any of his coworkers notice. The woman refuses to leave her house and her books, choosing instead to light a match and burn herself alive. Montag returns home jarred by the woman’s suicide. While getting ready for bed, he hides the stolen book under his pillow. Still shaken by the night’s events, he attempts to make conversation with Mildred, conversation that only causes him to realize how little he knows her and how little they have in common. Montag asks his wife if she has seen Clarisse recently. Mildred mutters that she believes Clarisse died after getting struck by a speeding car and that her family has moved away. Dismayed by her failure to mention this, Montag uneasily tries to fall asleep. Outside he suspects the presence of “The Hound”, an eight-legged[19] robotic dog-like creature that resides in the firehouse and aids the firemen.
Montag awakens ill the next morning and stays home from work. He relates the story of the burned woman to an apathetic Mildred and mentions perhaps quitting his work. The possibility of becoming destitute over the loss of income provokes a strong reaction from her and she explains that the woman herself is to blame because she had books.
Captain Beatty, Montag’s fire chief, personally visits Montag to see how he is doing. Sensing Montag’s concerns, Beatty recounts how books lost their value and where the firemen fit in: Over the course of several decades, people embraced new media, sports, and a quickening pace of life. Books were ruthlessly abridged or degraded to accommodate a short attention span while minority groups protested over the controversial, outdated content perceived to be found in books. The government took advantage of this and the firemen were soon hired to burn books in the name of public happiness. Beatty adds casually that all firemen eventually steal a book out of curiosity; if the book is burned within 24 hours, the fireman and his family will not get in trouble.
After Beatty has left, Montag reveals to Mildred that over the last year he has accumulated a stash of books that he has kept hidden in their air-conditioning duct. In a panic, Mildred grabs a book and rushes to throw it in their kitchen incinerator; Montag subdues her and tells her that the two of them are going to read the books to see if they have value. If they do not, he promises the books will be burned and all will return to normal.
“The Sieve and the Sand”
While Montag and Mildred are perusing the stolen books, a sniffing occurs at their front door. Montag recognizes it as The Hound while Mildred passes it off as a random dog. They resume their discussion once the sound ceases. Montag laments Mildred’s suicide attempt, the woman who burned herself, and the constant din of bombers flying over their house taking part in a looming war neither he, nor anybody else, knows much about. He states that maybe the books of the past have messages that can save society from its own destruction. The conversation is interrupted by a call from Mildred’s friend Ann Bowles, and they set up a date to watch the “parlor walls” (large televisions lining the walls of her living room) that night at Mildred’s house.
Montag meanwhile concedes that they will need help to understand the books. Montag remembers an old man named Faber he once met in a park a year ago, an English professor before books were banned. He telephones Faber with questions about books and Faber soon hangs up on him. Undeterred, Montag makes a subway trip to Faber’s home along with a rare copy of the Bible, the book he stole at the woman’s house. Montag forces the scared and reluctant Faber into helping him by methodically ripping pages from the Bible. Faber concedes and gives Montag a homemade ear-piece communicator so he can offer constant guidance.
After Montag returns home, Mildred’s friends, Mrs. Bowles and Clara Phelps, arrive to watch the parlor walls. Not interested in the insipid entertainment they are watching, Montag turns off the walls and tries to engage the women in meaningful conversation, only to find them indifferent to all but the most trivial aspects of the upcoming war, friend’s deaths, their families, and politics. Montag leaves momentarily and returns with a book of poetry. This confuses the women and alarms Faber who is listening remotely. He proceeds to recite the poem Dover Beach, causing Mrs. Phelps to cry. At the behest of Faber in the ear-piece, Montag burns the book. Mildred’s friends leave in disgust while Mildred locks herself in the bathroom and takes more sleeping pills.
In the aftermath of the parlor party, Montag hides his books in his backyard before returning to the firehouse late at night with just the stolen Bible. He finds Beatty playing cards with the other firemen. Montag hands him the book, which is unceremoniously tossed into the trash. Beatty tells Montag that he had a dream in which they fought endlessly by quoting books to each other. In describing the dream Beatty reveals that, despite his disillusionment, he was once an enthusiastic reader. A fire alarm sounds and Beatty picks up the address from the dispatcher system. They drive in the firetruck recklessly to the destination. Montag is stunned when the truck arrives at his house.
“Burning Bright”
Beatty orders Montag to destroy his own house, telling him that his wife and her friends were the ones who reported him. Montag tries to talk to Mildred as she quickly leaves the house. Mildred ignores him, gets inside a taxi, and vanishes down the street. Montag obeys the chief, destroying the home piece by piece with a flamethrower. As soon as he has incinerated the house, Beatty discovers Montag’s ear-piece and plans to hunt down Faber. Montag threatens Beatty with the flamethrower and (after Beatty taunts him) burns his boss alive, and knocks his coworkers unconscious. As Montag escapes the scene, the firehouse’s mechanical dog attacks him, managing to inject his leg with a tranquilizer. He destroys it with the flamethrower and limps away.
Montag runs through the city streets towards Faber’s house. Faber urges him to make his way to the countryside and contact the exiled book-lovers who live there. He mentions he will be leaving on an early bus heading to St. Louis and that he and Montag can rendezvous there later. On Faber’s television, they watch news reports of another mechanical hound being released, with news helicopters following it to create a public spectacle. Montag leaves Faber’s house. After an extended manhunt, he escapes by wading into a river and floating downstream.
Montag leaves the river in the countryside, where he meets the exiled drifters, led by a man named Granger. They have each memorized books for an upcoming time when society is ready to rediscover them. While learning the philosophy of the exiles, Montag and the group watch helplessly as bombers fly overhead and attack the city with nuclear weapons, completely annihilating it. While Faber would have left on the early bus, Mildred along with everyone else in the city was surely killed. Montag and the group are injured and dirtied, but manage to survive the shock wave.
In the morning after, Granger teaches Montag and the others about the legendary phoenix and its endless cycle of long life, death in flames, and rebirth. He adds that the phoenix must have some relation to mankind, which constantly repeats its mistakes. Granger emphasizes that man has something the phoenix does not: mankind can remember the mistakes it made from before it destroyed itself, and try to not make them again. Granger then muses that a large factory of mirrors should be built, so that mankind can take a long look at itself. When the meal is over, the band goes back toward the city, to help rebuild society.
Characters
Guy Montag is the protagonist and fireman who presents the dystopia through the eyes of a worker loyal to it, a man in conflict about it, and one resolved to be free of it. Through most of the book, Montag lacks knowledge and believes what he hears.
Clarisse McClellan walks with Montag on his trips home and is one month short of being a 17-year-old girl.[notes 3][20] She is an unusual sort of person in the bookless, hedonistic society: outgoing, naturally cheerful, unorthodox, and intuitive. She is unpopular among peers and disliked by teachers for asking “why” instead of “how” and focusing on nature rather than on technology. A few days after their first meeting, she disappears without any explanation; Mildred tells Montag (and Captain Beatty confirms) that Clarisse was hit by a speeding car and that her family left following her death. In the afterword of a later edition, Bradbury notes that the film adaptation changed the ending so that Clarisse (who, in the film, is now a 20-year-old school teacher who was fired for being unorthodox) was living with the exiles. Bradbury, far from being displeased by this, was so happy with the new ending that he wrote it into his later stage edition.
Mildred “Millie” Montag is Guy Montag’s wife. She is addicted to sleeping pills, absorbed in the shallow dramas played on her “parlor walls” (flat-panel televisions), and indifferent to the oppressive society around her. She is described in the book as “thin as a praying mantis from dieting, and her flesh like white bacon.” Despite her husband’s attempts to break her from the spell society has on her, Mildred continues to be shallow and indifferent. After Montag scares her friends away by reading Dover Beach and unable to live with someone who has been hoarding books, Mildred betrays Montag by reporting him to the firemen and abandoning him.
Captain Beatty is Montag’s boss. Once an avid reader, he has come to hate books due to their unpleasant content and contradicting facts and opinions. In a scene written years later by Bradbury for theFahrenheit 451 play, Beatty invites Montag to his house where he shows him walls of books left to molder on their shelves.
Stoneman and Black are Montag’s coworkers at the firehouse. They do not have a large impact on the story and function to show the reader the contrast between the firemen who obediently do as they’re told and someone like Montag, who formerly took pride in his job—subsequently realizing how damaging it is to society.
Faber is a former English professor. He has spent years regretting that he did not defend books when he saw the moves to ban them. Montag turns to him for guidance, remembering him from a chance meeting in a park some time earlier. Faber at first refuses to help Montag, and later realizes that he is only trying to learn about books, not destroy them. Bradbury notes in his afterword that Faber is part of the name of a German manufacturer of pencils, Faber-Castell.
Mrs. Ann Bowles and Mrs. Clara Phelps are Mildred’s friends and representative of the anti-intellectual, hedonistic society presented in the novel. During a social visit to Montag’s house, they brag about ignoring the bad things in their lives and have a cavalier attitude towards the upcoming war, their husbands, their children, and politics. Mrs. Phelps has a husband named Pete who was called in to fight in the upcoming war (and believes that he’ll be back in a week because of how quick the war will be) and thinks having children serves no purpose other than to ruin lives. Mrs. Bowles is a thrice married, single mother. Her first husband divorced her, her second died in a jet accident, and her third committed suicide by shooting himself in the head. She has two children who do not like or even respect her due to her permissive, often negligent and abusive parenting: Mrs. Bowles brags that her kids beat her up and she’s glad that she can hit back. When Montag reads Dover Beach to them, Mrs. Phelps starts crying over how hollow her life is while Mrs. Bowles chastises Montag for reading “silly awful hurting words”.
Granger is the leader of a group of wandering intellectual exiles who memorize books in order to preserve their contents.
Historical context
Bradbury’s lifelong passion with books began at an early age. As a frequent visitor to his local libraries in the 1920s and 1930s, he recalls being disappointed because they did not stock popular science fiction novels, like those of H. G. Wells, because, at the time, they were not deemed literary enough. Between this and learning about the destruction of the Library of Alexandria,[21] a great impression was made on the young man about the vulnerability of books to censure and destruction. Later as a teenager, Bradbury was horrified by the Nazi book burnings[22] and later Joseph Stalin‘s campaign of political repression, the “Great Purge“, in which writers and poets, among many others, were arrested and often executed.[23]
After the 1945 conclusion of World War II shortly after the atomic bombings of Hiroshima and Nagasaki, the United States focused its concern on the Soviet atomic bomb project and the expansion of communism. The House Un-American Activities Committee (HUAC)—formed in 1938 to investigate American citizens and organizations suspected of having communist ties—held hearings in 1947 to investigate alleged communist influence in Hollywood movie-making. These hearings resulted in the blacklisting of the so-called “Hollywood Ten“,[24] a group of influential screenwriters and directors. This governmental interference in the affairs of artists and creative types greatly angered Bradbury.[25] Bitter and concerned about the workings of his government, a late 1949 nighttime encounter with an overzealous police officer would inspire Bradbury to write “The Pedestrian“, a short story which would go on to become “The Fireman” and then Fahrenheit 451. The rise of Senator Joseph McCarthy‘s hearings hostile to accused communists starting in 1950, would only deepen Bradbury’s contempt over government overreach.[26][27]
The same year HUAC began investigating Hollywood is often considered the beginning of the Cold War, as in March 1947, the Truman Doctrine was announced. By about 1950, the Cold War was in full swing and the American public’s fear of atomic warfare and communist influence was at a feverish level. The stage was set for Bradbury to write the dramatic nuclear holocaust ending of Fahrenheit 451, exemplifying the type of scenario feared by many Americans of the time.[28]
Bradbury’s early life witnessed the Golden Age of Radio while the transition to the Golden Age of Television began right around the time he started to work on the stories that would eventually lead to Fahrenheit 451. Bradbury saw these forms of media as a threat to the reading of books, indeed as a threat to society, as he believed they could act as a distraction from important affairs. This contempt for mass media and technology would express itself through Mildred and her friends and is an important theme in the book.[29]
Writing and development
Fahrenheit 451 developed out of a series of ideas Bradbury had visited in previously written stories. For many years, he tended to single out “The Pedestrian” in interviews and lectures as sort of a proto-Fahrenheit 451. In the Preface of his 2006 anthology Match to Flame: The Fictional Paths to Fahrenheit 451 he states that this is an oversimplification.[30] The full genealogy of Fahrenheit 451 given in Match to Flame is involved. The following covers the most salient aspects.[citation needed]
Between 1947 and 1948,[31] Bradbury wrote the short story “Bright Phoenix” (not published until the May 1963 issue of The Magazine of Fantasy & Science Fiction[32][33]) about a librarian who confronts a book-burning “Chief Censor” named Jonathan Barnes. Barnes is a clear foreshadow of the ominous Captain Beatty of Fahrenheit 451.[citation needed]
In late 1949,[34] Bradbury was stopped and questioned by a police officer while walking late one night.[35][36] When asked “What are you doing?”, Bradbury wisecracked, “Putting one foot in front of another.”[35][36]This incident inspired Bradbury to write the 1951 short story “The Pedestrian”.[notes 4][35][36] In “The Pedestrian”, Leonard Mead is harassed and detained by the city’s remotely operated police cruiser (there’s only one) for taking nighttime walks, something that has become extremely rare in this future-based setting: everybody else stays inside and watches television (“viewing screens”). Alone and without an alibi, Mead is taken to the “Psychiatric Center for Research on Regressive Tendencies” for his peculiar habit. Fahrenheit 451 would later echo this theme of an authoritarian society distracted by broadcast media.[citation needed]
Bradbury expanded the book-burning premise of “Bright Phoenix”[37] and the totalitarian future of “The Pedestrian”[38] into “The Fireman”, a novella published in the February 1951 issue of Galaxy Science Fiction.[39][40] “The Fireman” was written in the basement of UCLA‘s Powell Library on a typewriter that he rented for a fee of ten cents per half hour.[41] The first draft was 25,000 words long and was completed in nine days.[42]
Urged by a publisher at Ballantine Books to double the length of his story to make a novel, Bradbury returned to the same typing room and expanded his work into Fahrenheit 451, taking just nine days.[41] The completed book was published by Ballantine in 1953.[43]
Supplementary material
Bradbury has supplemented the novel with various front and back matter, including a 1979 coda,[44] a 1982 afterword,[45] a 1993 foreword, and several introductions. In these he provides some commentary on the themes of the novel,[44] thoughts on the movie adaptation, and numerous personal anecdotes related to the writing and development.[citation needed]
Publication history
The first U.S. printing was a paperback version from October 1953 by The Ballantine Publishing Group. Shortly after the paperback, a hardback version was released that included a special edition of 200 signed and numbered copies bound in asbestos.[46][47][48] These were technically collections because the novel was published with two short stories: “The Playground” and “And the Rock Cried Out”, which have been absent in later printings.[1][49] A few months later, the novel was serialized in the March, April, and May 1954 issues of nascent Playboy magazine.[9][50]
Expurgation
Starting in January 1967, Fahrenheit 451 was subject to expurgation by its publisher, Ballantine Books with the release of the “Bal-Hi Edition” aimed at high school students.[51][52] Among the changes made by the publisher were the censorship of the words “hell”, “damn”, and “abortion”; the modification of seventy-five passages; and the changing of two episodes.[52][53] In the one case, a drunk man became a “sick man” while cleaning fluff out of a human navel became “cleaning ears” in the other.[52][54] For a while both the censored and uncensored versions were available concurrently but by 1973 Ballantine was publishing only the censored version.[54][55] This continued until 1979 when it came to Bradbury’s attention:[54][55]
In 1979, one of Bradbury’s friends showed him an expurgated copy. Bradbury demanded that Ballantine Books withdraw that version and replace it with the original, and in 1980 the original version once again became available. In this reinstated work, in the Author’s Afterword, Bradbury relates to the reader that it is not uncommon for a publisher to expurgate an author’s work, but he asserts that he himself will not tolerate the practice of manuscript “mutilation”.
The “Bal-Hi” editions are now referred to by the publisher as the “Revised Bal-Hi” editions.[56]
Non-print publications
An audiobook version read by Bradbury himself was released in 1976 and received a Spoken WordGrammy nomination.[14] Another audiobook was released in 2005 narrated by Christopher Hurt.[57] The e-bookversion was released in December 2011.[58][59]
Reception
In 1954, Galaxy Science Fiction reviewer Groff Conklin placed the novel “among the great works of the imagination written in English in the last decade or more.”[60] The Chicago Sunday Tribune‘s August Derlethdescribed the book as “a savage and shockingly savage prophetic view of one possible future way of life,” calling it “compelling” and praising Bradbury for his “brilliant imagination”.[61] Over half a century later, Sam Weller wrote, “upon its publication, Fahrenheit 451 was hailed as a visionary work of social commentary.”[62] Today, Fahrenheit 451 is still viewed as an important cautionary tale against conformity and book burning.[63]
When the book was first published there were those who did not find merit in the tale. Anthony Boucher and J. Francis McComas were less enthusiastic, faulting the book for being “simply padded, occasionally with startlingly ingenious gimmickry, … often with coruscating cascades of verbal brilliance [but] too often merely with words.”[64] Reviewing the book for Astounding Science Fiction, P. Schuyler Miller characterized the title piece as “one of Bradbury’s bitter, almost hysterical diatribes,” and praised its “emotional drive and compelling, nagging detail.”[65] Similarly, The New York Times was unimpressed with the novel and further accused Bradbury of developing a “virulent hatred for many aspects of present-day culture, namely, such monstrosities as radio, TV, most movies, amateur and professional sports, automobiles, and other similar aberrations which he feels debase the bright simplicity of the thinking man’s existence.”[66]
Censorship/banning incidents
In the years since its publication, Fahrenheit 451 has occasionally been banned, censored, or redacted in some schools by parents and teaching staff either unaware of or indifferent to the inherent irony of such censorship. The following are some notable incidents:
In 1987, Fahrenheit 451 was given “third tier” status by the Bay County School Board in Panama City, Florida, under then-superintendent Leonard Hall’s new three-tier classification system.[67] Third tier was meant for books to be removed from the classroom for “a lot of vulgarity”.[67] After a resident class-action lawsuit, a media stir, and student protests, the school board abandoned their tier-based censorship system and approved all the currently used books.[67]
In 1992, Venado Middle School in Irvine, California gave copies of Fahrenheit 451 to students with all “obscene” words blacked out.[68] Parents contacted the local media and succeeded in reinstalling the uncensored copies.[68]
In 2006, parents of a tenth grade high school student in Montgomery County, Texas, demanded the book be banned from their daughter’s English class reading list.[69] Their daughter was assigned the book during Banned Books Week, but stopped reading several pages in due to the offensive language and description of the burning of the Bible.[69] In addition, her parents protested the violence, portrayal of Christians, and depictions of firemen in the novel.[69]
Themes
Discussions about Fahrenheit 451 often center on its story foremost as a warning against state-based censorship. Indeed, when Bradbury wrote the novel during the McCarthy era, he was concerned about censorship in the United States. During a radio interview in 1956,[70][71] Bradbury said:
I wrote this book at a time when I was worried about the way things were going in this country four years ago. Too many people were afraid of their shadows; there was a threat of book burning. Many of the books were being taken off the shelves at that time. And of course, things have changed a lot in four years. Things are going back in a very healthy direction. But at the time I wanted to do some sort of story where I could comment on what would happen to a country if we let ourselves go too far in this direction, where then all thinking stops, and the dragon swallows his tail, and we sort of vanish into a limbo and we destroy ourselves by this sort of action.
As time went by, Bradbury tended to dismiss censorship as a chief motivating factor for writing the story. Instead he usually claimed that the real messages of Fahrenheit 451 were about the dangers of an illiterate society infatuated with mass media and the threat of minority and special interest groups to books. In the late 1950s, Bradbury recounted:
In writing the short novel Fahrenheit 451, I thought I was describing a world that might evolve in four or five decades. But only a few weeks ago, in Beverly Hills one night, a husband and wife passed me, walking their dog. I stood staring after them, absolutely stunned. The woman held in one hand a small cigarette-package-sized radio, its antenna quivering. From this sprang tiny copper wires which ended in a dainty cone plugged into her right ear. There she was, oblivious to man and dog, listening to far winds and whispers and soap-opera cries, sleep-walking, helped up and down curbs by a husband who might just as well not have been there. This was not fiction.[72]
This story echoes Mildred’s “Seashell ear-thimbles” (i.e., a brand of in-ear headphones) that act as an emotional barrier between her and Montag. In a 2007 interview, Bradbury maintained that people misinterpret his book and that Fahrenheit 451 is really a statement on how mass media like television marginalizes the reading of literature.[73] Regarding minorities, he wrote in his 1979 Coda:
There is more than one way to burn a book. And the world is full of people running about with lit matches. Every minority, be it Baptist/Unitarian, Irish/Italian/Octogenarian/Zen Buddhist, Zionist/Seventh-day Adventist, Women’s Lib/Republican, Mattachine/Four Square Gospel feels it has the will, the right, the duty to douse the kerosene, light the fuse. […] Fire-Captain Beatty, in my novel Fahrenheit 451, described how the books were burned first by minorities, each ripping a page or a paragraph from this book, then that, until the day came when the books were empty and the minds shut and the libraries closed forever. […] Only six weeks ago, I discovered that, over the years, some cubby-hole editors at Ballantine Books, fearful of contaminating the young, had, bit by bit, censored some seventy-five separate sections from the novel. Students, reading the novel, which, after all, deals with censorship and book-burning in the future, wrote to tell me of this exquisite irony. Judy-Lynn del Rey, one of the new Ballantine editors, is having the entire book reset and republished this summer with all the damns and hells back in place.[74]
Book-burning censorship, Bradbury would argue, was a side-effect of the these two primary factors; this is consistent with Captain Beatty’s speech to Montag about the history of the firemen. According to Bradbury, it is the people, not the state, who are the culprit in Fahrenheit 451.[73] Nevertheless, the role on censorship, state-based or otherwise, is still perhaps the most frequent theme explored in the work.[75][better source needed]
A variety of other themes in the novel besides censorship have been suggested. Two major themes are resistance to conformity and control of individuals via technology and mass media. Bradbury explores how the government is able to use mass media to influence society and suppress individualism through book burning. The characters Beatty and Faber point out the American population is to blame. Due to their constant desire for a simplistic, positive image, books must be suppressed. Beatty blames the minority groups, who would take offense to published works that displayed them in an unfavorable light. Faber went further to state that the American population simply stopped reading on their own. He notes that the book burnings themselves became a form of entertainment to the general public.[76]
Predictions for the future
Bradbury described himself as “a preventor of futures, not a predictor of them.”[77] He did not believe that book burning was an inevitable part of our future; he wanted to warn against its development.[77] In a later interview, when asked if he believes that teaching Fahrenheit 451 in schools will prevent his totalitarian[2] vision of the future, Bradbury replied in the negative. Rather, he states that education must be at the kindergarten and first-grade level. If students are unable to read then, they will be unable to read Fahrenheit 451.[78]
In terms of technology, Sam Weller notes that Bradbury “predicted everything from flat-panel televisions to iPod earbuds and twenty-four-hour banking machines.”[79]
In June 2009, a graphic novel edition of the book was published. Entitled Ray Bradbury’s Fahrenheit 451: The Authorized Adaptation,[91] the paperback graphic adaptation was illustrated by Tim Hamilton.[92][93] The introduction in the novel is written by Bradbury.[citation needed]
Jump up^During Captain Beatty’s recounting of the history of the firemen to Montag, he says, “Out of the nursery into the college and back to the nursery; there’s your intellectual pattern for the past five centuries or more.” The text is ambiguous regarding which century he is claiming began this pattern. One interpretation is that he means the 20th century, which would place the novel in at least the 24th century. “The Fireman” novella, which was expanded to become Fahrenheit 451, is set in October 2052.
Jump up^In early editions of the book, Montag says, “We’ve started and won two atomic wars since 1960” in the first pages of The Sieve and the Sand. This sets a lower bound on the time setting. In later decades, some editions have changed this year to 1990 or 2022.
Jump up^Clarisse tells Montag she is “seventeen and crazy”, later admitting that she will actually be seventeen “next month”.
Jump up^“The Pedestrian” would go on to be published in The Reporter magazine on August 7, 1951, that is, after the publication in February 1951 of its inspired work “The Fireman”.
See also
Fahrenheit 9/11, a 2004 documentary film by American filmmaker, director and political commentator Michael Moore.
Further reading
McGiveron, R. O. (1996). “What ‘Carried the Trick’? Mass Exploitation and the Decline of Thought in Ray Bradbury’s Fahrenheit 451“. Extrapolation (Liverpool University Press) 37 (3): 245–256. ISSN0014-5483.
Plan A (Awful) Hillary Clinton, Plan B (Bad): Joe Biden, Plan C (California): Jerry Brown, Plan D (Dumb): Bernie Sanders — Obama’s Legacy: The Destruction of Democratic Party — Rupert Murdoch Says Biden Very Likely To Win Nomination and Hard To Beat — Videos
Plan A (Awful) Hillary Clinton
Hillary Clinton ‘Sorry’ Her Use Of Private E-Mail Has Raised Questions
Hillary Clinton on emails: ‘I’m sorry’
Hillary Clinton Interview: One-On-One With Andrea Mitchell | MSNBC
Mounting trouble in Hillary Clinton email investigation
Minute Memo #174 – Clinton Hiding Benghazi Emails
Clinton Emails To Receive 50 State Department Staff
Judge Napolitano: Gut feeling is that Hillary Clinton will be charged over private emails.
• Clinton Insiders Altered Top Secret Emails • Kelly File • 8/12/15 •
Napolitano: Clinton’s emails on home server against the law – FoxTV United States News
Rep. Gowdy: “About damn time” Clinton emails tu..
Newsmax Prime | Gen. Michael Hayden on Hillary Clinton’s having compromised U.S. National Security
Trump Predicts Prison Time for Hillary Clinton
Hillary Clinton vs Bernie Sanders
Hillary Clinton on emails: ‘everything was permitted
Plan B (Bad) Joe Biden
Joe Biden Makes Strides, But Is He Running?
Crowd greets Biden with chants of ‘Run, Joe, run!’
Biden greeted with chants of ‘run, Joe, run!’ in Pittsburgh
Biden Hears Cheers: ‘Run, Joe, Run’
Plan C (California) Jerry Brown
Gov. Jerry Brown: If I were Biden, I’d give 2016 run ‘very serious consideration
Jerry Brown: If I Were Joe Biden, I’d Give 2016 Run ‘Serious Consideration’
Jerry Brown: I Would Run for President if I Was 10 Years Younger
Calif. Gov. Jerry Brown talks drought, political future
Calif. Gov. Jerry Brown Nixes 2016 Presidential Bid
Jerry Brown for President 1992 Report – (The MacNeil/Lehrer NewsHour)
Bill Clinton Versus Jerry Brown 1992
3 California Governors Who Ran for President
Plan D (Dumb) Bernie Sanders
Bernie Sanders Grows NH Lead Over Hillary Clinton, Gains in Iowa
Hillary Clinton vs Bernie Sanders
Bernie Sanders Explains Why Socialist Isn’t a Dirty Word
Things Get Awkward When Matthews Asks DNC Head About Bernie Sanders, Socialism (VIDEO)
Rupert Murdoch On Why He Supports Immigration Reform
Rupert Murdoch: Donald Trump ‘wrong’ on immigration
Bill O’Reilly Donald Trump Battle over Immigration Plan and 14th Amendment
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
National Security Agency Whistleblower William Binney on Growing State Surveillance
NSA Whistleblower William Binney: The Future of FREEDOM
Operation “Toto” Pulling Back The Curtain: Full NSA Interview
Will Smith Movies Full Length | Enemy of the State 1998 Movie English HD
‘Run, Joe, run!’ Adoring Pittsburgh crowd enthusiastically encourages Joe Biden to run for president
Joe Biden given a rapturous welcome by Pittsburgh steelworkers at rally
The Vice President gave a rousing speech blaming America’s ills on stagnant wages and an unfair tax code that favors the wealthy
Biden, who is still grieving his son, Beau, jogged through the crowd
Biden’s popularity numbers are on par with Trump’s
By KIRI BLAKELEY FOR DAILYMAIL.COM and ASSOCIATED PRESS
PUBLISHED: 13:35 EST, 7 September 2015 | UPDATED: 15:58 EST, 7 September 2015
Hearing chants of ‘run Joe, run,’ Vice President Joe Biden marched in Pittsburgh’s annual Labor Day parade on Monday as speculation swirled about a potential entry into the Democratic presidential campaign.
The vice president donned a black-and-gold United Steelworkers union hat and told hundreds of union members that the gap between the wealthy and poor was hurting the nation.
The 72-year-old exuberantly jogged through the crowd of supportive well-wishers, who were urging him to join the race for president.
‘Give it a go, Joe!’ shouted one woman.
Scroll down for video
Vice President Joe Biden revved up the crowd at a steelworkers union event in Pittsburgh on Sunday
Biden was greeted with shouts of ‘Run, Joe, run!’ encouraging him to run for president
Recent polls suggest that those who are abandoning Hillary Clinton back Biden for president, according to CNN.
But Biden deflected questions as to whether or not he would enter the fray, only saying ‘I am definitely going to run part of this parade, I feel like I am home right now.’
But he had much more to say in his speech in front of the union.
‘It used to be when productivity went up in America, everybody got a chance to share,’ said Biden. ‘They got a piece of the action… Why in God’s name should a man or a woman working in a steel mill make $50,000 a year when someone on Wall Street makes millions of dollars a year?’
In introducing Biden for his speech, Trumka and United Steelworkers union chief Leo Gerard gave strong praise to Biden, who was born in Scranton, Pennsylvania.
Biden praises unions as he addressees crowds on Labor Day
The adoring crowd flocked around the sprightly 72-year-old, who is still reeling from his son Beau’s death in May, but who looked happy and healthy at the rally
Fans clamored for selfies with the VP, who tends to be known for his verbal gaffes
‘He has never let us down,’ said Gerard.
Biden, in his speech, said the tax code is to blame for the rich getting a bigger piece of the economic pie.
‘The tax code’s not fair. It’s simply not fair,’ Biden said in a city long associated with organized labor. ‘The wealthy aren’t paying their fair share. There used to be one America.’
Biden greeted United Steelworkers President Leo Gerard (right) who said Biden has never let steelworkers down
Biden was cagey about whether he would run for POTUS but he had no issue with jogging through the streets of Pittsburgh
When asked point-blank by young local business owner Chris Fuget asked whether he would announce a 2016 run, the Vice President coyly said, ‘I haven’t made that decision yet,’ according to CNN.
There was some disappointment in the crowd that he didn’t throw his hat into the ring.
‘We thought today might have been the day,’ said Pittsburgh union worker Jack Gaffrey.
‘It’s hope,’ the VP said about the enthusiastic response the crowd gave him
His entry could jumble a Democratic contest that has seen front-runner Hillary Rodham Clinton’s lead diminish in early states against Vermont Sen. Bernie Sanders, an independent who describes himself as a democratic socialist.
Biden, however, said last week he wasn’t certain if he and his family had the ’emotional energy’ for another campaign. Biden’s eldest son, Beau, died of brain cancer in May.
Biden blamed America’s ills on the tax code which favors the wealthy as well as low and stagnant wages
But AFL-CIO President Richard Trumka, who walked the parade route with Biden, said the vice president got a strong response from the city’s workers.
‘If you’re looking for energy, this is a great place to get energy today,’ the labor leader said.
Asked what he made of the overwhelmingly warm response Pittsburgh gave him, he replied, ‘It’s hope.’
‘I am definitely going to run part of this parade,’ Biden said and then made good his promise
In a new NBC/Marist poll of New Hampshire primary voters released on Sunday, Biden had support from 16 percent of Democratic voters.
That’s half the total of Clinton, who herself trailed front runner Sanders by nine points in New Hampshire, a state where Bill and Hillary Clinton have deep ties.
In Iowa, Clinton saw her lead over Sanders decline by half and now leads him by 37 percent to 20 precent with Biden at 20 percent.
But Biden still isn’t as quite popular as GOP frontrunner Donald Trump.
The reality star billionaire beats him by a narrow margin in a new national poll 44 percent to 42 percent, according to SurveyUSA.
Forget Sanders and Biden, the Democrats’ best 2016 backup is California Gov. Jerry Brown.
The best bet.
By Lara BrownAug. 21, 2015 | 10:40 a.m. EDT+ MoreIn assessing Hillary Clinton’s chances of being the 2016 Democratic nominee, Sean Trende hits the nail squarely on the head: “Absent an indictment, she remains the solid favorite for the nomination.” Yes, you read that correctly: “absent an indictment.”
In any other year, with any other candidate, that phrase would be ludicrous. How could a party be so solidly behind a person who is so publicly balancing on a razor’s edge between shady practices andillegal dealings? While there are many reasons for this, three stand out and are worth remembering before asking the next logical question: If not her, then who?
First, two large “anti-in-party” midterm elections decimated the Democrats’ bench. Surviving Democratic statewide elected officials are few and far between. And those who are there need more time to acquire political experience and develop a national reputation.
Second, Clinton has been perceived by her fellow partisans as the next in line for the nomination since the day she conceded the 2008 nomination contest to then-Sen. Barack Obama. That year’s epic contest ended with an unspoken but widely understood deal between the two warring factions of Democratic activists: Support for Obama in 2008 will lead to support for Clinton as his successor. This was a tough pill for Clinton’s backers to take because they had been expecting Clinton to become the party’s next nominee since the day John Kerry lost in 2004. But they accepted the trade because they had no choice.
Third, Clinton is not only unique because her gender combines with the Democratic Party’s sincere desire to follow the first African-American president with the first female one (a right time, right place confluence of dynamics, if you will), but also because the country experienced tremendous economic prosperity during her husband’s tenure in the White House and Democrats largely believe that fact will redound favorably on her candidacy.
Of course, her being a Clinton is also a challenge for her campaign. Aside from the dynasty knock, the Clintons have long rankled the feathers of other Democrats, and it was this “anti-Clinton” sentiment thatObama exploited to full benefit in 2008.
Nevertheless, it’s this strange brew of partisan expectations and political realities that have likely kept Clinton’s (older, but no less ambitious) Democratic opponents on the sidelines. If she were indicted, though, all bets are off and the problem of surfeit ambition would likely arise.
Setting aside the unknown probability of an indictment and the known likelihood of Clinton securing the Democratic presidential nomination before next spring, the question of who could possibly replace her is an interesting one to consider.
At the moment, progressive Democrats are increasingly rallying around one of her few declared opponents, Sen. Bernie Sanders of Vermont. But his far-left policy stances and past voting record make him a weak general election candidate. Democrats know this; it’s highly unlikely that the party establishment would support him to become the nominee.
There’s also the undeclared, but publicly ruminating Vice President Joe Biden. Despite his gaffe-pronereputation, most reports suggest that he is the party’s preferred second choice.
Still, if Clinton’s candidacy were to implode, I don’t imagine Biden would be on a glide path to the nomination (unless Obama were to endorse him). Secretary of State John Kerry might decide his time is now. As he lost the 2004 election by fewer than 120,000 votes from Ohio, he can legitimately argue he’s been a better candidate than Biden in past presidential races.
But by far, the Democrats’ strongest septuagenarian is California Gov. Jerry Brown. He has vast political experience. He’s well-liked across the Democratic Party. He continues to enjoy high approval ratings and has widely been perceived as an effective governor.
He’d also offer the Democrats two key talking points Sanders, Biden and Kerry can’t: He’s a Washington outsider and he knows how to make government work because he’s served four terms in the top executive office in California. Further, he has a more than two-decade long reputation of being the “anti-Clinton,” which would not only likely endear him to Sanders’ supporters, but would also place him in good stead were the party needing to wash its hands of all things Clinton in the wake of an indictment.
So while Brown’s candidacy may be a far-fetched possibility, from my view, he’s the best “second choice” for Democrats to mount a competitive general election campaign. But then, all of us Brownsfrom California tend to view politics rather unconventionally.
GINGRICH: JERRY BROWN COULD ENTER PRESIDENTIAL RACE
by JOEL B. POLLAK 17 Aug 2015246
Former Speaker of the House and 2012 presidential candidate Newt Gingrich told CNN on Monday that California Gov. Jerry Brown could enter the presidential race.
“If Hillary starts to implode you will see a vacuum that you have not seen in many, many years,” Gingrich told Fox News’ Greta van Susteren on her show, On the Record, speculating that Clinton’s mounting scandals could cost her the race.
“[Former New York mayor Michael] Bloomberg, if he shifts, Jerry Brown–I mean, you just don’t know. [Senator]
Sen. Elizabeth Warren (D-MA) 15% …” Gingrich suggested.Gingrich also suggested that Secretary of State John Kerry might run, along with Vice President Joe Biden.
Brown has run for president three times before. He would be 78 years old in 2016, and has suggested that age might be an obstacle to a run, though he has not entirely ruled out a fourth attempt at the Oval Office.
He is, however, among the most popular and successful Democratic governors in the United States, and has more experience than anyone else in the field, currently or potentially.
Gingrich said that Hillary’s main worry will be socialist
Sen. Bernie Sanders (I-VT) 16%, who is running for the Democratic Party nomination.
Story 1: Part II, Nobody Does It Better Spying On People of The World — National Security Agency — Turnkey Tyranny Turned On The American People — NSA Budget $100 Billion Plus Paid By The American People — The Patriot Act Expires On June 1, 2015 — Both Republican and Democratic Parties Will Renew It! — Secret Security Surveillance State — Alive, Well and Growing — Videos
Amendment IV
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Appellate Court Rules NSA’s Phone Data Collection Is Illegal
McConnell to Push for Pure PATRIOT Act Extension
INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE since 9/11
What You Didn’t Know About The NSA Bluffdale Spy Center – From Former NSA Director Bill Binney
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
30c3 keynote with Glenn Greenwald [30c3]
FISA Court: Telecoms okay with NSA data collection
US Supreme Court refuses to let Americans challenge FISA eavesdropping law
FISA Section 215: A Debate about Its Legality, Usefulness and Civil Liberties
The creepy spying power buried in the Patriot Act
Real Talk: The Patriot Act
Patriot Act Powers – GOP Fights To Renew NSA Surveillance Law – Fox & Friends
Marco Rubio blasts colleagues over renewing NSA spying powers
Rand Paul Stalling Patriot Act Extension!
The Obama Administration’s War on Whistleblowers–7 Whistleblowers speak at News Conference 04-27-15
Top NSA Whistleblower William Binney Exposes the Tyranny 3/20/15
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
Former NSA Head Exposes Agency’s Real Crimes
NSA Whistleblower William Binney: The Future of FREEDOM
‘NSA owns entire network anywhere in the world’ – whistleblower William Binney
NSA Whistle-Blower Tells All: The Program | Op-Docs | The New York Times
William Binney – The Government is Profiling You (The NSA is Spying on You)
Alleged NSA whistleblower warns of “turnkey tyranny” in U.S.
NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’
Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”
NSA Whistleblower Thomas Drake Prevails in Unprecedented Obama Admin Crackdown
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
29C3 Panel: Jesselyn Radack, Thomas Drake, William Binney on whistleblowing and surveillance
Everything We Know About NSA Spying: “Through a PRISM, Darkly” – Kurt Opsahl at CCC
FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying
Last Week Tonight with John Oliver: Government Surveillance (HBO)
The Lame Duck Show: Turn Key Tyranny Solutions
PBS Nova S36E11 The Spy Factory Full Documentary
Inside The NSA~Americas Cyber Secrets
Full Documentaries – National Security Agency Secrets – (NSA) Special Documentary
NSA can spy on 98 percent of the world
Glenn Becks “SURVEILLANCE STATE”
Glenn Greenwald on Domestic Surveillance: NSA Warrantless Wiretapping Controversy (2006)
Enemy of the State (1998) Predicts Edward Snowden’s Revelations
Enemy Of The State – The NSA Can Read The Time Off Your F**king Wristwatch!
Will Smith | Enemy of the State 1998 Movie Full HD
Ron Paul to Congress: DO NOT Extend the “PATRIOT” Act!
Congressman Ron Paul, MD – We’ve Been NeoConned
Why Shouldn’t I Work for the NSA?
(Good Will Hunting)
N.S.A. Phone Data Collection Is Illegal, Appeals Court Rules
THE COMPUTERS ARE LISTENING
HOW THE NSA CONVERTS SPOKEN WORDS INTO SEARCHABLE TEXT
Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.
But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.
Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documentsdescribe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.
The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
Spying on international telephone calls has always been a staple of NSA surveillance, but the requirement that an actual person do the listening meant it was effectively limited to a tiny percentage of the total traffic. By leveraging advances in automated speech recognition, the NSA has entered the era of bulk listening.
And this has happened with no apparent public oversight, hearings or legislative action. Congress hasn’t shown signs of even knowing that it’s going on.
The USA Freedom Act — the surveillance reform bill that Congress is currently debating — doesn’t address the topic at all. The bill would end an NSA program that does not collect voice content: the government’s bulk collection of domestic calling data, showing who called who and for how long.
Even if becomes law, the bill would leave in place a multitude of mechanisms exposed by Snowden that scoop up vast amounts of innocent people’s text and voice communications in the U.S. and across the globe.
Civil liberty experts contacted by The Intercept said the NSA’s speech-to-text capabilities are a disturbing example of the privacy invasions that are becoming possible as our analog world transitions to a digital one.
“I think people don’t understand that the economics of surveillance have totally changed,” Jennifer Granick, civil liberties director at the Stanford Center for Internet and Society, told The Intercept.
“Once you have this capability, then the question is: How will it be deployed? Can you temporarily cache all American phone calls, transcribe all the phone calls, and do text searching of the content of the calls?” she said. “It may not be what they are doing right now, but they’ll be able to do it.”
And, she asked: “How would we ever know if they change the policy?”
Indeed, NSA officials have been secretive about their ability to convert speech to text, and how widely they use it, leaving open any number of possibilities.
That secrecy is the key, Granick said. “We don’t have any idea how many innocent people are being affected, or how many of those innocent people are also Americans.”
I Can Search Against It
NSA whistleblower Thomas Drake, who was trained as a voice processing crypto-linguist and worked at the agency until 2008, told The Intercept that he saw a huge push after the September 11, 2001 terror attacks to turn the massive amounts of voice communications being collected into something more useful.
Human listening was clearly not going to be the solution. “There weren’t enough ears,” he said.
The transcripts that emerged from the new systems weren’t perfect, he said. “But even if it’s not 100 percent, I can still get a lot more information. It’s far more accessible. I can search against it.”
Converting speech to text makes it easier for the NSA to see what it has collected and stored, according to Drake. “The breakthrough was being able to do it on a vast scale,” he said.
More Data, More Power, Better Performance
The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s.
What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds.
In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited.
Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
“I would tell you we are not very good at that,” he said.
In an ideal environment like a news broadcast, he said, “we’re getting pretty good at being able to do these types of translations.”
A 2008 document from the Snowden archive shows that transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing:
(U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing.
Experts in speech recognition say that in the last decade or so, the pace of technological improvement has been explosive. As information storage became cheaper and more efficient, technology companies were able to store massive amounts of voice data on their servers, allowing them to continually update and improve the models. Enormous processors, tuned as “deep neural networks” that detect patterns like human brains do, produce much cleaner transcripts.
And the Snowden documents show that the same kinds of leaps forward seen in commercial speech-to-text products have also been happening in secret at the NSA, fueled by the agency’s singular access to astronomical processing power and its own vast data archives.
In fact, the NSA has been repeatedly releasing new and improved speech recognition systems for more than a decade.
The first-generation tool, which made keyword-searching of vast amounts of voice content possible, was rolled out in 2004 and code-named RHINEHART.
“Voice word search technology allows analysts to find and prioritize intercept based on its intelligence content,” says an internal 2006 NSA memo entitled “For Media Mining, the Future Is Now!”
The memo says that intelligence analysts involved in counterterrorism were able to identify terms related to bomb-making materials, like “detonator” and “hydrogen peroxide,” as well as place names like “Baghdad” or people like “Musharaf.”
RHINEHART was “designed to support both real-time searches, in which incoming data is automatically searched by a designated set of dictionaries, and retrospective searches, in which analysts can repeatedly search over months of past traffic,” the memo explains (emphasis in original).
As of 2006, RHINEHART was operating “across a wide variety of missions and languages” and was “used throughout the NSA/CSS [Central Security Service] Enterprise.”
But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.”
The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states.
A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
Extensive Use Abroad
Voice communications can be collected by the NSA whether they are being sent by regular phone lines, over cellular networks, or through voice-over-internet services. Previously released documents from the Snowden archive describe enormous efforts by the NSA during the last decade to get access to voice-over-internet content like Skype calls, for instance. And other documents in the archive chronicle the agency’s adjustment to the fact that an increasingly large percentage of conversations, even those that start as landline or mobile calls, end up as digitized packets flying through the same fiber-optic cables that the NSA taps so effectively for other data and voice communications.
The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America.
For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.”
The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
Keyword spotting extended to Iranian intercepts as well. A 2006 memoreported that RHINEHART had been used successfully by Persian-speaking analysts who “searched for the words ‘negotiations’ or ‘America’ in their traffic, and RHINEHART located a very important call that was transcribed verbatim providing information on an important Iranian target’s discussion of the formation of a the new Iraqi government.”
“Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
The memo offers an example from NSA Texas, where an analyst newly trained on the system used a keyword search to find previously unreported information on a target involved in drug-trafficking. In another case, an official at a Special Collection Service site in Latin America “was able to find foreign intelligence regarding a Cuban official in a fraction of the usual time.”
In a 2011 article, “Finding Nuggets — Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan,” an intelligence analysis technical director from NSA Texas described the “rare life-changing instance” when he learned about human language technology, and its ability to “find the exact traffic of interest within a mass of collection.”
Analysts in Texas found the new technology a boon for spying. “From finding tunnels in Tijuana, identifying bomb threats in the streets of Mexico City, or shedding light on the shooting of US Customs officials in Potosi, Mexico, the technology did what it advertised: It accelerated the process of finding relevant intelligence when time was of the essence,” he wrote. (Emphasis in original.)
The author of the memo was also part of a team that introduced the technology to military leaders in Afghanistan. “From Kandahar to Kabul, we have traveled the country explaining NSA leaders’ vision and introducing SIGINT teams to what HLT analytics can do today and to what is still needed to make this technology a game-changing success,” the memo reads.
Extent of Domestic Use Remains Unknown
What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.”
The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
“The National Security Agency employs a variety of technologies in the course of its authorized foreign-intelligence mission,” spokesperson Vanee’ Vines wrote in an email to The Intercept. “These capabilities, operated by NSA’s dedicated professionals and overseen by multiple internal and external authorities, help to deter threats from international terrorists, human traffickers, cyber criminals, and others who seek to harm our citizens and allies.”
Vines did not respond to the specific questions about privacy protections in place related to the processing of domestic or domestic-to-international voice communications. But she wrote that “NSA always applies rigorous protections designed to safeguard the privacy not only of U.S. persons, but also of foreigners abroad, as directed by the President in January 2014.”
“I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept.
His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
“We went to the intelligence community and asked them to declassify a significant amount of material,” he said. The “vast majority” of that material was declassified, he said. But not all — including “facts that we thought could be declassified without compromising national security.”
Hypothetically, Medine said, the ability to turn voice into text would raise significant privacy concerns. And it would also raise questions about how the intelligence agencies “minimize” the retention and dissemination of material— particularly involving U.S. persons — that doesn’t include information they’re explicitly allowed to keep.
“Obviously it increases the ability of the government to process information from more calls,” Medine said. “It would also allow the government to listen in on more calls, which would raise more of the kind of privacy issues that the board has raised in the past.”
“I’m not saying the government does or doesn’t do it,” he said, “just that these would be the consequences.”
A New Learning Curve
Speech recognition expert Bhiksha Raj likens the current era to the early days of the Internet, when people didn’t fully realize how the things they typed would last forever.
“When I started using the Internet in the 90s, I was just posting stuff,” said Raj, an associate professor at Carnegie Mellon University’s Language Technologies Institute. “It never struck me that 20 years later I could go Google myself and pull all this up. Imagine if I posted something on alt.binaries.pictures.erotica or something like that, and now that post is going to embarrass me forever.”
The same is increasingly becoming the case with voice communication, he said. And the stakes are even higher, given that the majority of the world’s communication has historically been conducted by voice, and it has traditionally been considered a private mode of communication.
“People still aren’t realizing quite the magnitude that the problem could get to,” Raj said. “And it’s not just surveillance,” he said. “People are using voice services all the time. And where does the voice go? It’s sitting somewhere. It’s going somewhere. You’re living on trust.” He added: “Right now I don’t think you can trust anybody.”
“Things aren’t ephemeral anymore,” Taipale told The Intercept. “We’re living in a world where many things that were fleeting in the analog world are now on the permanent record. The question then becomes: what are the consequences of that and what are the rules going to be to deal with those consequences?”
Realistically, Taipale said, “the ability of the government to search voice communication in bulk is one of the things we may have to live with under some circumstances going forward.” But there at least need to be “clear public rules and effective oversight to make sure that the information is only used for appropriate law-enforcement or national security purposes consistent with Constitutional principles.”
Ultimately, Taipale said, a system where computers flag suspicious voice communications could be less invasive than one where people do the listening, given the potential for human abuse and misuse to lead to privacy violations. “Automated analysis has different privacy implications,” he said.
But to Jay Stanley, a senior policy analyst with the ACLU’s Speech, Privacy and Technology Project, the distinction between a human listening and a computer listening is irrelevant in terms of privacy, possible consequences, and a chilling effect on speech.
“What people care about in the end, and what creates chilling effects in the end, are consequences,” he said. “I think that over time, people would learn to fear computerized eavesdropping just as much as they fear eavesdropping by humans, because of the consequences that it could bring.”
Indeed, computer listening could raise new concerns. One of the internal NSA memos from 2006 says an “important enhancement under development is the ability for this HLT capability to predict what intercepted data might be of interest to analysts based on the analysts’ past behavior.”
Citing Amazon’s ability to not just track but predict buyer preferences, the memo says that an NSA system designed to flag interesting intercepts “offers the promise of presenting analysts with highly enriched sorting of their traffic.”
To Phillip Rogaway, a professor of computer science at the University of California, Davis, keyword-search is probably the “least of our problems.” In an email to The Intercept, Rogaway warned that “When the NSA identifies someone as ‘interesting’ based on contemporary NLP [Natural Language Processing] methods, it might be that there is no human-understandable explanation as to why beyond: ‘his corpus of discourse resembles those of others whom we thought interesting’; or the conceptual opposite: ‘his discourse looks or sounds different from most people’s.’”
If the algorithms NSA computers use to identify threats are too complex for humans to understand, Rogaway wrote, “it will be impossible to understand the contours of the surveillance apparatus by which one is judged. All that people will be able to do is to try your best to behave just like everyone else.”
EFF sued the Department of Justice (DOJ) on the 10th anniversary of the signing of the USA PATRIOT Act in October 2011 for answers about “secret interpretations” of a controversial section of the law. In June 2013, a leaked FISA court order publicly revealed that “secret interpretation”: the government was using Section 215 of the Patriot Act to collect the phone records of virtually every person in the United States.
Prior to the revelations, several senators warned that the DOJ was using Section 215 of the PATRIOT Act to support what government attorneys called a “sensitive collection program,” targeting large numbers of Americans. The language of Section 215 allows for secret court orders to collect “tangible things” that could be relevant to a government investigation – a far lower threshold and more expansive reach than a warrant based on probable cause. The list of possible “tangible things” the government can obtain is seemingly limitless, and could include everything from driver’s license records to Internet browsing patterns.
In response to a court order in our lawsuit, in September 2013, the government released hundreds of pages of previously secret FISA documents detailing the court’s interpretation of Section 215, including an opinion excoriating the NSA for misusing its mass surveillance database for years. In October 2013, the government released a second batch of documents related to Section 215, which showed, among other things, that the NSA had collected cell site location without notifying its oversight committees in Congress or the FISA court.
EFF’s lawsuit came after the DOJ failed to respond to a Freedom of Information Act (FOIA) request on the interpretation and use of Section 215. The suit demanded records describing the types of “tangible things” that have been collected so far, the legal basis for the “sensitive collection program,” and information on the how many people have been affected by Section 215 orders.
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Published on Dec 30, 2013
Through a PRISM, Darkly
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.
Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english
Glenn Becks “SURVEILLANCE STATE”
Inside the NSA
Ed Snowden, NSA, and Fairy Tales
AT&T Spying On Internet Traffic
For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”
NSA Whistle-Blower Tells All – Op-Docs: The Program
The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Benny – The Government is Profiling You (The NSA is Spying on You)
‘After 9/11 NSA had secret deal with White House’
The story of Whistleblower Thomas Drake
Whistleblowers, Part Two: Thomas Drake
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Meet Edward Snowden: NSA PRISM Whistleblower
The Truth About Edward Snowden
N.S.A. Spying: Why Does It Matter?
Inside The NSA~Americas Cyber Secrets
NSA Whistleblower Exposes Obama’s Dragnet
AT&T whistleblower against immunity for Bush spy program-1/2
AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program
The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.
AT&T whistleblower against immunity for Bush spy program-2/2
Enemy Of The State 1998 (1080p) (Full movie)
Background Articles and Videos
Stellar Wind
Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]
The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]
There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]
During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]
In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.
PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1]PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]
According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]
History
Slide showing that much of the world’s communications flow through the US
Details of information collected via PRISM
PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]
PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]
The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]
According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]
Response from companies
The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]
Initial Public Statements
Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]
Slide listing companies and the date that PRISM collection began
Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]
In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13]The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]
“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]
Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]
On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]
The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]
While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]
Post-PRISM Transparency Reports
In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.
On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000” user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]
Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]
Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]
Response from United States government
Executive branch
Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]
Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]
On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]
The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]
The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]
In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]
Legislative branch
In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:
Senator John McCain (R-AZ)
June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee
June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]
Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee
June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]
Representative John Boehner (R-OH), Speaker of the House of Representatives
June 11 “He’s a traitor”[50] (referring to Edward Snowden)
Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act
June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]
Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.
June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]
Senator Mark Udall (D-CO)
June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]
Representative Todd Rokita (R-IN)
June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]
Senator Rand Paul (R-KY)
June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]
Representative Luis Gutierrez (D-IL)
June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]
Judicial branch
The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.
Applicable law and practice
On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]
After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.
If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]
If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]
Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]
The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]
Involvement of other countries
Australia
The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]
Canada
Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]
Germany
Germany did not receive any raw PRISM data, according to a Reuters report.[59]
Israel
Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.
New Zealand
In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]
United Kingdom
In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]
Domestic response
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)
The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]
Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]
In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]
In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]
The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]
On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]
International response
Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]
Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]
Protests at Checkpoint Charlie in Berlin
The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]
The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]
William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]
Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]
Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]
Russia has offered to consider an asylum request from Edward Snowden.[91]
Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]
A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]
A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]
Background
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]
Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]
The new project replacing Trailblazer is called Turbulence.[3]
Whistleblowing
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]
Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]
In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]
Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.
Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]
History
Slide showing that much of the world’s communications flow through the US.
Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]
NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]
Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]
Technology
According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]
Legality and FISA Amendments Act of 2008
The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]
The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]
Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]
The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
the Government Communications Headquarters of the United Kingdom,
the National Security Agency of the United States,
the Communications Security Establishment of Canada,
the Defence Signals Directorate of Australia, and
the Government Communications Security Bureau of New Zealand.
the National SIGINT Organisation (NSO) of The Netherlands
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]
Capabilities
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]
Controversy
See also: Industrial espionage
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
Hardware
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]
Name
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]
Ground stations
The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
Hong Kong (since closed)
Australian Defence Satellite Communications Station (Geraldton, Western Australia)
Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
Misawa Air Base (Japan) Map
GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
Sugar Grove (West Virginia, U.S.) Map
Yakima Training Center (Washington, U.S.) Map
GCSB Waihopai (New Zealand)
GCSB Tangimoana (New Zealand)
CFS Leitrim (Ontario, Canada)
Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
Ayios Nikolaos (Cyprus – U.K.)
BadAibling Station (BadAibling, Germany – U.S.)
relocated to Griesheim in 2004[19]
deactivated in 2008[20]
Buckley Air Force Base (Aurora, Colorado)
Fort Gordon (Georgia, U.S.)
Gander (Newfoundland & Labrador, Canada)
Guam (Pacific Ocean, U.S.)
Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
Lackland Air Force Base, Medina Annex (San Antonio, Texas)
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]
Description
Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]
The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]
The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.
Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.
Lawsuit
Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]
More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.
PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States
Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security.[7] The data mostly comes from the NSA, FBI, CIA, as well as other government sources.[7]
Carnivore: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight
Intelligence Community (IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct espionage
President George W. Bush gestures as he addresses an audience Wednesday, July 20, 2005 at the Port of Baltimore in Baltimore, Md., encouraging the renewal of provisions of the Patriot Act.
The following is a section summary of the USA PATRIOT Act, Title II. The USA PATRIOT Act was passed by the United StatesCongress in 2001 as a response to the September 11, 2001 attacks. Title II: Enhanced Surveillance Procedures gave increased powers of surveillance to various government agencies and bodies. This title has 25 sections, with one of the sections (section 224) containing a sunset clause which sets an expiration date, 31 December 2005, for most of the title’s provisions. On 22 December 2005, the sunset clause expiration date was extended to 3 February 2006.
Title II contains many of the most contentious provisions of the act. Supporters of the Patriot Act claim that these provisions are necessary in fighting the War on Terrorism, while its detractors argue that many of the sections of Title II infringe upon individual and civil rights.
The sections of Title II amend the Foreign Intelligence Surveillance Act of 1978 and its provisions in 18 U.S.C., dealing with “Crimes and Criminal Procedure“. It also amends the Electronic Communications Privacy Act of 1986. In general, the Title expands federal agencies’ powers in intercepting, sharing, and using private telecommunications, especially electronic communications, along with a focus on criminal investigations by updating the rules that govern computer crime investigations. It also sets out procedures and limitations for individuals who feel their rights have been violated to seek redress, including against the United States government. However, it also includes a section that deals with trade sanctions against countries whose government supports terrorism, which is not directly related to surveillance issues.
Two sections dealt with the interception of communications by the United States government.
Section 201 is titled Authority to intercept wire, oral, and electronic communications relating to terrorism. This section amended 18 U.S.C.§ 2516 (Authorization for interception of wire, oral, or electronic communications) of the United States Code. This section allows (under certain specific conditions) the United States Attorney General (or some of his subordinates) to authorize a Federal judge to make an order authorizing or approving the interception of wire or oral communications by the Federal Bureau of Investigation (FBI), or another relevant U.S. Federal agency.
The Attorney General’s subordinates who can use Section 201 are: the Deputy Attorney General, the Associate Attorney General, any Assistant Attorney General, any acting Assistant Attorney General, any Deputy Assistant Attorney General or acting Deputy Assistant Attorney General in the Criminal Division who is specially designated by the Attorney General.
The amendment added a further condition which allowed an interception order to be carried out. The interception order may now be made if a criminal violation is made with respect to terrorism (defined by 18 U.S.C.§ 2332):
Section 202 is titled Authority to intercept wire, oral, and electronic communications relating to computer fraud and abuse offenses, and amended the United States Code to include computer fraud and abuse in the list of reasons why an interception order may be granted.[3][4]
Section 203: Authority to share criminal investigative information
Section 203 (Authority to share criminal investigation information) modified the Federal Rules of Criminal Procedure with respect to disclosure of information before the grand jury (Rule 6(e)). Section 203(a) allowed the disclosure of matters in deliberation by the grand jury, which are normally otherwise prohibited, if:
a court orders it (before or during a judicial proceeding),
a court finds that there are grounds for a motion to dismiss an indictment because of matters before the Grand Jury,
if the matters in deliberation are made by an attorney for the government to another Federal grand jury,
an attorney for the government requests that matters before the grand jury may reveal a violation of State criminal law,
the matters involve foreign intelligence or counterintelligence or foreign intelligence information. Foreign intelligence and counterintelligence was defined in section 3 of the National Security Act of 1947,[5] and “foreign intelligence information” was further defined in the amendment as information about:
an actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power;
sabotage or international terrorism by a foreign power or an agent of a foreign power; or
clandestine intelligence activities by an intelligence service or network of a foreign power or by an agent of foreign power; or
information about a foreign power or foreign territory that relates to the national defense or the security of the United States or the conduct of the foreign affairs of the United States.’.
information about non-U.S. and U.S. citizens
203(a) gave the court the power to order a time within which information may be disclosed, and specified when a government agency may use information disclosed about a foreign power. The rules of criminal procedure now state that “within a reasonable time after such disclosure, an attorney for the government shall file under seal a notice with the court stating the fact that such information was disclosed and the departments, agencies, or entities to which the disclosure was made.”
Section 203(b) modified 18 U.S.C.§ 2517, which details who is allowed to learn the results of a communications interception, to allow any investigative or law enforcement officer, or attorney for the Government to divulge foreign intelligence, counterintelligence or foreign intelligence information to a variety of Federal officials. Specifically, any official who has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived from this could divulge this information to any Federal law enforcement, intelligence, protective, immigration, national defense, or national security official. The definition of “foreign intelligence” was the same as section 203(a), with the same ability to define “foreign intelligence” to be intelligence of a non-U.S. and U.S. citizen. The information received must only be used as necessary in the conduct of the official’s official duties.[6]
The definition of “foreign intelligence information” is defined again in Section 203(d).
Section 203(c) specified that the Attorney General must establish procedures for the disclosure of information due to 18 U.S.C.§ 2517 (see above), for those people who are defined as U.S. citizens.[7]
Section 204: Limitations on communication interceptions
Section 204 (Clarification of intelligence exceptions from limitations on interception and disclosure of wire, oral, and electronic communication) removed restrictions from the acquisition of foreign intelligence information from international or foreign communications. It was also clarified that the Foreign Intelligence Surveillance Act of 1978 should not only be the sole means of electronic surveillance for just oral and wire intercepts, but should also include electronic communication.[8][9]
Section 205: Employment of translators by the FBI
Under section 205 (Employment of translators by the Federal Bureau of Investigation), the Director of the Federal Bureau of Investigation is now allowed to employ translators to support counterterrorism investigations and operations without regard to applicable Federal personnel requirements and limitations. However, he must report to the House Judiciary Committee and Senate Judiciary Committee the number of translators employed and any legal reasons why he cannot employ translators from federal, state, or local agencies.[10]
Section 206: Roving surveillance authority
The Foreign Intelligence Surveillance Act of 1978[11] allows an applicant access to all information, facilities, or technical assistance necessary to perform electronic surveillance on a particular target. The assistance given must protect the secrecy of and cause as little disruption to the ongoing surveillance effort as possible. The direction could be made at the request of the applicant of the surveillance order, by a common carrier, landlord, custodian or other specified person. Section 206 (Roving surveillance authority under the Foreign Intelligence Surveillance Act of 1978) amended this to add:
or in circumstances where the Court finds that the actions of the target of the application may have the effect of thwarting the identification of a particular person.
This allows intelligence agencies to undertake “roving” surveillance: they do not have to specify the exact facility or location where their surveillance will be done. Roving surveillance was already specified for criminal investigations under 18 U.S.C.§ 2518(11), and section 206 brought the ability of intelligence agencies to undertake such roving surveillance into line with such criminal investigations. However, the section was not without controversy, as James X. Dempsey, the Executive Director of the Center for Democracy & Technology, argued that a few months after the Patriot Act was passed the Intelligence Authorization Act was also passed that had the unintended effect of seeming to authorize “John Doe” roving taps — FISA orders that identify neither the target nor the location of the interception (see The Patriot Debates, James X. Dempsey debates Paul Rosenzweig on section 206).[12]
Section 207: Duration of FISA surveillance on agents of a foreign powe
Previously FISA only defined the duration of a surveillance order against a foreign power (defined in 50 U.S.C.§ 1805(e)(1)) . This was amended by section 207 (Duration of FISA surveillance of non-United States persons who are agents of a foreign power) to allow surveillance of agents of a foreign power (as defined in section 50 U.S.C.§ 1801(b)(1)(A)) for a maximum of 90 days. Section 304(d)(1) was also amended to extend orders for physical searches from 45 days to 90 days, and orders for physical searches against agents of a foreign power are allowed for a maximum of 120 days. The act also clarified that extensions for surveillance could be granted for a maximum of a year against agents of a foreign power.[13]
Section 208: Designation of judges
Section 103(A) of FISA was amended by Section 208 (Designation of judges) of the Patriot Act to increase the number of federal district court judges who must now review surveillance orders from seven to 11. Of these, three of the judges must live within 20 miles (32 km) of the District of Columbia.[14]
Section 209: Seizure of voice-mail messages pursuant to warrants
Section 209 (Seizure of voice-mail messages pursuant to warrants) removed the text “any electronic storage of such communication” from title 18, section 2510 of the United States Code. Before this was struck from the Code, the U.S. government needed to apply for a title III wiretap order[15] before they could open voice-mails, however now the government only need apply for an ordinary search. Section 2703, which specifies when a “provider of electronic communication services” must disclose the contents of stored communications, was also amended to allow such a provider to be compelled to disclose the contents via a search warrant, and not a wiretap order. According to Vermont senator Patrick Leahy, this was done to “harmonizing the rules applicable to stored voice and non-voice (e.g., e-mail) communications”.[16][17]
Section 210 & 211: Scope of subpoenas for records of electronic communications
The U.S. Code specifies when the U.S. government may require a provider of an electronic communication service to hand over communication records.[18] It specifies what that provider must disclose to the government,[19] and was amended by section 210 (Scope of subpoenas for records of electronic communications) to include records of session times and durations of electronic communication as well as any identifying numbers or addresses of the equipment that was being used, even if this may only be temporary. For instance, this would include temporarily assigned IP addresses, such as those established by DHCP.[20]
Section 211 (Clarification of scope) further clarified the scope of such orders. 47 U.S.C.§ 551 (Section 631 of the Communications Act of 1934) deals with the privacy granted to users of cable TV. The code was amended to allow the government to have access to the records of cable customers, with the notable exclusion of records revealing cable subscriber selection of video programming from a cable operator.[21]
Section 212: Emergency disclosure of electronic communications
Section 212 (Emergency disclosure of electronic communications to protect life and limb) amended the US Code to stop a communications provider from providing communication records (not necessarily relating to the content itself) about a customer’s communications to others.[22] However, should the provider reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person then the communications provider can now disclose this information. The act did not make clear what “reasonably” meant.
A communications provider could also disclose communications records if:
a court orders the disclosure of communications at the request of a government agency (18 U.S.C.§ 2703)
the customer allows the information to be disclosed
if the service provider believes that they must do so to protect their rights or property.
Section 213 (Authority for delaying notice of the execution of a warrant) amended the US Code to allow the notification of search warrants[24] to be delayed.[25] This section has been commonly referred to as the “sneak and peek” section, a phrase originating from the FBI[citation needed] and not, as commonly believed, from opponents of the Patriot Act. The U.S. government may now legally search and seize property that constitutes evidence of a United States criminal offense without immediately telling the owner. The court may only order the delayed notification if they have reason to believe it would hurt an investigation — delayed notifications were already defined in 18 U.S.C.§ 2705 — or, if a search warrant specified that the subject of the warrant must be notified “within a reasonable period of its execution,” then it allows the court to extend the period before the notification is given, though the government must show “good cause”. If the search warrant prohibited the seizure of property or communications, then the search warrant could then be delayed.
Section 214: Pen register and trap and trace authority
FISA was amended by section 214 (Pen register and trap and trace authority under FISA) to clarify that pen register and trap and trace surveillance can be authorised to allow government agencies to gather foreign intelligence information.[27] Where the law only allowed them to gather surveillance if there was evidence of international terrorism, it now gives the courts the power to grant trap and traces against:
non-U.S. citizens.
those suspected of being involved with international terrorism,
those undertaking clandestine intelligence activities
Section 215: Access to records and other items under FISA
This section is commonly referred to as the “library records” provision[29] because of the wide range of personal material that can be investigated.[30][31]
FISA was modified by section 215 (Access to records and other items under the Foreign Intelligence Surveillance Act) to allow the Director of the FBI (or an official designated by the Director, so long as that official’s rank is no lower than Assistant Special Agent in Charge) to apply for an order to produce materials that assist in an investigation undertaken to protect against international terrorism or clandestine intelligence activities. The act specifically gives an example to clarify what it means by “tangible things”: it includes “books, records, papers, documents, and other items”.
It is specified that any such investigation must be conducted in accordance with guidelines laid out in Executive Order 12333 (which pertains to United States intelligence activities). Investigations must also not be performed on U.S. citizens who are carrying out activities protected by the First Amendment to the Constitution of the United States.
Any order that is granted must be given by a FISA court judge or by a magistrate judge who is publicly designated by the Chief Justice of the United States to allow such an order to be given. Any application must prove that it is being conducted without violating the First Amendment rights of any U.S. citizens. The application can only be used to obtain foreign intelligence information not concerning a U.S. citizen or to protect against international terrorism or clandestine intelligence activities.
This section of the PATRIOT Act is controversial because the order may be granted ex parte, and once it is granted — in order to avoid jeopardizing the investigation — the order may not disclose the reasons behind why the order was granted.
The section carries a gag order stating that “No person shall disclose to any other person (other than those persons necessary to produce the tangible things under this section) that the Federal Bureau of Investigation has sought or obtained tangible things under this section”. Senator Rand Paul stated that the non-disclosure is imposed for one year,[32] though this is not explicitly mentioned in the section.
In order to protect anyone who complies with the order, FISA now prevents any person who complies with the order in “good faith” from being liable for producing any tangible goods required by the court order. The production of tangible items is not deemed to constitute a waiver of any privilege in any other proceeding or context.
During a House Judiciary hearing on domestic spying on July 17, 2013 John C. Inglis, the deputy director of the surveillance agency, told a member of the House judiciary committee that NSA analysts can perform “a second or third hop query” through its collections of telephone data and internet records in order to find connections to terrorist organizations.[34] “Hops” refers to a technical term indicating connections between people. A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with.[34][35] NSA officials had said previously that data mining was limited to two hops, but Inglis suggested that the Foreign Intelligence Surveillance Court has allowed for data analysis extending “two or three hops”.[36]
Section 216: Authority to issue pen registers and trap and trace devices[edit]
Section 216 (Modification of authorities relating to use of pen registers and trap and trace devices) deals with three specific areas with regards to pen registers and trap and trace devices: general limitations to the use of such devices, how an order allowing the use of such devices must be made, and the definition of such devices.
Limitations
18 U.S.C.§ 3121 details the exceptions related to the general prohibition on pen register and trap and trace devices. Along with gathering information for dialup communications, it allows for gathering routing and other addressing information. It is specifically limited to this information: the Act does not allow such surveillance to capture the actual information that is contained in the communication being monitored. However, organisations such as the EFF have pointed out that certain types of information that can be captured, such as URLs, can have content embedded in them. They object to the application of trap and trace and pen register devices to newer technology using a standard designed for telephones.
Making and carrying out orders
It also details that an order may be applied for ex parte (without the party it is made against present, which in itself is not unusual for search warrants), and allows the agency who applied for the order to compel any relevant person or entity providing wire or electronic communication service to assist with the surveillance. If the party whom the order is made against so requests, the attorney for the Government, law enforcement or investigative officer that is serving the order must provide written or electronic certification that the order applies to the targeted individual.
If a pen register or trap and trace device is used on a packet-switched data network, then the agency doing surveillance must keep a detailed log containing:
any officer or officers who installed the device and any officer or officers who accessed the device to obtain information from the network;
the date and time the device was installed, the date and time the device was uninstalled, and the date, time, and duration of each time the device is accessed to obtain information;
the configuration of the device at the time of its installation and any subsequent modification made to the device; and
any information which has been collected by the device
This information must be generated for the entire time the device is active, and must be provided ex parte and under seal to the court which entered the ex parte order authorizing the installation and use of the device. This must be done within 30 days after termination of the order.
Orders must now include the following information:[37]
the identifying number of the device under surveillance
the location of the telephone line or other facility to which the pen register or trap and trace device is to be attached or applied
if a trap and trace device is installed, the geographic limits of the order must be specified
This section amended the non-disclosure requirements of 18 U.S.C.§ 3123(d)(2) by expanding to include those whose facilities are used to establish the trap and trace or pen register or to those people who assist with applying the surveillance order who must not disclose that surveillance is being undertaken. Before this it had only applied to the person owning or leasing the line.
Definitions
The following terms were redefined in the US Code’s chapter 206 (which solely deals with pen registers and trap and trace devices):
Court of competent jurisdiction: defined in 18 U.S.C.§ 3127(2), subparagraph A was stricken and replaced to redefine the court to be any United States district court (including a magistrate judge of such a court) or any United States court of appeals havingjurisdiction over the offense being investigated (title 18 also allows State courts that have been given authority by their State to use pen register and trap and trace devices)
Pen register: defined in 18 U.S.C.§ 3127(3), the definition of such a device was expanded to include a device that captures dialing, routing, addressing, or signaling information from an electronics communication device. It limited the usage of such devices to exclude the capturing of any of the contents of communications being monitored. 18 U.S.C.§ 3124(b) was also similarly amended.
Trap and trace device: defined in 18 U.S.C.§ 3127(4), the definition was similarly expanded to include the dialing, routing, addressing, or signaling information from an electronics communication device. However, a trap and trace device can now also be a “process”, not just a device.
Contents:18 U.S.C.§ 3127(1) clarifies the term “contents” (as referred to in the definition of trap and trace devices and pen registers) to conform to the definition as defined in 18 U.S.C.§ 2510(8), which when used with respect to any wire, oral, or electronic communication, includes any information concerning the substance, purport, or meaning of that communication.
Section 217: Interception of computer trespasser communications
Section 217 (Interception of computer trespasser communications) firstly defines the following terms:
Protected computer: this is defined in 18 U.S.C.§ 1030(e)(2)(A), and is any computer that is used by a financial institution or the United States Government or one which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
Computer trespasser: this is defined in 18 U.S.C.§ 2510(21) and references to this phrase means
a person who accesses a protected computer without authorization and thus has no reasonable expectation of privacy in any communication transmitted to, through, or from the protected computer; and
does not include a person known by the owner or operator of the protected computer to have an existing contractual relationship with the owner or operator of the protected computer for access to all or part of the protected computer
Amendments were made to 18 U.S.C.§ 2511(2) to make it lawful to allow a person to intercept the communications of a computer trespasser if
the owner or operator of the protected computer authorizes the interception of the computer trespasser’s communications on the protected computer,
the person is lawfully engaged in an investigation,
the person has reasonable grounds to believe that the contents of the computer trespasser’s communications will be relevant to their investigation, and
any communication captured can only relate to those transmitted to or from the computer trespasser.
Section 218: Foreign intelligence information
Section 218 (Foreign intelligence information) amended 50 U.S.C.§ 1804(a)(7)(B) and 50 U.S.C.§ 1823(a)(7)(B) (both FISA sections 104(a) (7)(B) and section 303(a)(7)(B), respectively) to change “the purpose” of surveillance orders under FISA to gain access to foreign intelligence to “significant purpose”. Mary DeRosa, in The Patriot Debates, explained that the reason behind this was to remove a legal “wall” which arose when criminal and foreign intelligence overlapped. This was because the U.S. Department of Justice interpreted “the purpose” of surveillance was restricted to collecting information for foreign intelligence, which DeRosa says “was designed to ensure that prosecutors and criminal investigators did not use FISA to circumvent the more rigorous warrant requirements for criminal cases”. However, she also says that it is debatable whether this legal tightening of the definition was even necessary, stating that “the Department of Justice argued to the FISA Court of Review in 2002 that the original FISA standard did not require the restrictions that the Department of Justice imposed over the years, and the court appears to have agreed [which] leaves the precise legal effect of a sunset of section 218 somewhat murky.”[38]
Section 219: Single-jurisdiction search warrants for terrorism
Section 219 (Single-jurisdiction search warrants for terrorism) amended the Federal Rules of Criminal Procedure to allow a magistrate judge who is involved in an investigation of domestic terrorism or international terrorism the ability to issue a warrant for a person or property within or outside of their district.[39]
Section 220: Nationwide service of search warrants for electronic evidence
Section 220 (Nationwide service of search warrants for electronic evidence) gives the power to Federal courts to issue nationwide service of search warrants for electronic surveillance. However, only courts with jurisdiction over the offense can order such a warrant. This required amending 18 U.S.C.§ 2703 and 18 U.S.C.§ 2711.
Section 221: Trade sanctions
Section 221 (Trade sanctions) amended the Trade Sanctions Reform and Export Enhancement Act of 2000.[40] This Act prohibits, except under certain specific circumstances, the President from imposing a unilateral agricultural sanction or unilateral medical sanction against a foreign country or foreign entity. The Act holds various exceptions to this prohibition, and the Patriot Act further amended the exceptions to include holding sanctions against countries that design, develop or produce chemical or biological weapons, missiles, or weapons of mass destruction.[41] It also amended the act to include the Taliban as state sponsors of international terrorism. In amending Title IX, section 906 of the Trade sanctions act, the Taliban was determined by the Secretary of State to have repeatedly provided support for acts of international terrorism and the export of agricultural commodities, medicine, or medical devices is now pursuant to one-year licenses issued and reviewed by the United States Government.[42] However, the export of agricultural commodities, medicine, or medical devices to the Government of Syria or to the Government of North Korea were exempt from such a restriction.[43]
The Patriot Act further states that nothing in the Trade Sanctions Act will limit the application of criminal or civil penalties to those who export agricultural commodities, medicine, or medical devices to:
any foreign entity or individual who is subject to any restriction for involvement in weapons of mass destruction or missile proliferation.
Section 222: Assistance to law enforcement agencies
Section 222 (Assistance to law enforcement agencies) states that nothing in the Patriot Act shall make a communications provider or other individual provide more technical assistance to a law enforcement agency than what is set out in the Act. It also allows for the reasonable compensation of any expenses incurred while assisting with the establishment of pen registers or trap and trace devices.[47]
Section 223: Civil liability for certain unauthorized disclosures
18 U.S.C.§ 2520(a) allows any person who has had their rights violated due to the illegal interception of communications to take civil action against the offending party. Section 223 (Civil liability for certain unauthorized disclosures) excluded the United States from such civil action.
If a court or appropriate department or agency determines that the United States or any of its departments or agencies has violated any provision of chapter 119 of the U.S. Code they may request an internal review from that agency or department. If necessary, an employee may then have administrative action taken against them. If the department or agency do not take action, then they must inform the notify the Inspector General who has jurisdiction over the agency or department, and they must give reasons to them why they did not take action.[48]
A citizen’s rights will also be found to have been violated if an investigative, law enforcement officer or governmental entity discloses information beyond that allowed in 18 U.S.C.§ 2517(a).[49]
U.S. Code Title 18, Section 2712 added
A totally new section was appended to Title 18, Chapter 121 of the US Code: Section 2712, “Civil actions against the United States”. It allows people to take action against the US Government if they feel that they had their rights violated, as defined in chapter 121,chapter 119, or sections 106(a), 305(a), or 405(a) of FISA. The court may assess damages no less than $US10,000 and litigation costs that are reasonably incurred. Those seeking damages must present them to the relevant department or agency as specified in the procedures of the Federal Tort Claims Act.
Actions taken against the United States must be initiated within two years of when the claimant has had a reasonable chance to discover the violation. All cases are presented before a judge, not a jury. However, the court will order a stay of proceedings if they determine that if during the court case civil discovery will hurt the ability of the government to conduct a related investigation or the prosecution of a related criminal case. If the court orders the stay of proceedings they will extend the time period that a claimant has to take action on a reported violation. However, the government may respond to any action against it by submitting evidence ex parte in order to avoid disclosing any matter that may adversely affect a related investigation or a related criminal case. The plaintiff is then given an opportunity to make a submission to the court, not ex parte, and the court may request further information from either party.[50]
If a person wishes to discover or obtain applications or orders or other materials relating to electronic surveillance or to discover, obtain, or suppress evidence or information obtained or derived from electronic surveillance under FISA, then the Attorney General may file an affidavit under oath that disclosure or an adversary hearing would harm the national security of the United States. In these cases, the court may review in camera and ex parte the material relating to the surveillance to make sure that such surveillance was lawfully authorized and conducted. The court may then disclose part of material relating to the surveillance. However, the court is restricted in they may only do this “where such disclosure is necessary to make an accurate determination of the legality of the surveillance”.[50] If it then determined that the use of a pen register or trap and trace device was not lawfully authorized or conducted, the result of such surveillance may be suppressed as evidence. However, should the court determine that such surveillance was lawfully authorised and conducted, they may deny the motion of the aggrieved person.[51]
It is further stated that if a court or appropriate department or agency determines that an officer or employee of the United States willfully or intentionally violated any provision of chapter 121 of the U.S. Code they will request an internal review from that agency or department. If necessary, an employee may then have administrative action taken against them. If the department or agency do not take action, then they must inform the notify the Inspector General who has jurisdiction over the agency or department, and they must give reasons to them why they did not take action. (see[49] for a similar part of the Act)
Section 224: Sunset
This article is outdated. Please update this article to reflect recent events or newly available information.(November 2010)
Section 224 (Sunset) is a sunset clause. Title II and the amendments made by the title originally would have ceased to have effect on December 31, 2005, with the exception of the below sections. However, on December 22, 2005, the sunset clause expiration date was extended to February 3, 2006, and then on February 2, 2006 it was further extended to March 10:
Title II sections that did not expire on March 10, 2006
Section
Section title
203(a)
Authority to share criminal investigation information : Authority to share Grand Jury information
203(c)
Authority to share criminal investigation information : Procedures
205
Employment of translators by the Federal Bureau of Investigation
208
Designation of judges
210
Scope of subpoenas for records of electronic communications
211
Clarification of scope
213
Authority for delaying notice of the execution of a warrant
216
Modification of authorities relating to use of pen registers and trap and trace devices
219
Single-jurisdiction search warrants for terrorism
221
Trade sanctions
222
Assistance to law enforcement agencies
Further, any particular foreign intelligence investigations that are ongoing will continue to be run under the expired sections.
Section 225: Immunity for compliance with FISA wiretap[edit]
Section 225 (Immunity for compliance with FISA wiretap) gives legal immunity to any provider of a wire or electronic communication service, landlord, custodian, or other person that provides any information, facilities, or technical assistance in accordance with a court order or request for emergency assistance. This was added to FISA as section 105 (50 U.S.C.§ 1805).
Jump up^18 U.S.C.§ 3103a(a) states that “a warrant may be issued to search for and seize any property that constitutes evidence of a criminal offense in violation of the laws of the United States”
Jump up^This is defined in Executive Order No. 12947: “Prohibiting Transactions With Terrorists Who Threaten To Disrupt the Middle East Peace Process”
Jump up^This is defined in Executive Order No. 13224: “Blocking Property and Prohibiting Transactions With Persons Who Commit, Threaten to Commit, or Support Terrorism”
Story 1: Nobody Does It Better Spying On People of The World — National Security Agency — Turnkey Tyranny Turned On The American People — NSA Budget $100 Billion Plus Paid By The American People — The Patriot Act Expires On June 1, 2015 — Both Republican and Democratic Parties Will Renew It! — Secret Security Surveillance State — Alive, Well and Growing — Videos
Amendment IV
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Appellate Court Rules NSA’s Phone Data Collection Is Illegal
McConnell to Push for Pure PATRIOT Act Extension
INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE since 9/11
What You Didn’t Know About The NSA Bluffdale Spy Center – From Former NSA Director Bill Binney
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
30c3 keynote with Glenn Greenwald [30c3]
FISA Court: Telecoms okay with NSA data collection
US Supreme Court refuses to let Americans challenge FISA eavesdropping law
FISA Section 215: A Debate about Its Legality, Usefulness and Civil Liberties
The creepy spying power buried in the Patriot Act
Real Talk: The Patriot Act
Patriot Act Powers – GOP Fights To Renew NSA Surveillance Law – Fox & Friends
Marco Rubio blasts colleagues over renewing NSA spying powers
Rand Paul Stalling Patriot Act Extension!
The Obama Administration’s War on Whistleblowers–7 Whistleblowers speak at News Conference 04-27-15
Top NSA Whistleblower William Binney Exposes the Tyranny 3/20/15
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
Former NSA Head Exposes Agency’s Real Crimes
NSA Whistleblower William Binney: The Future of FREEDOM
‘NSA owns entire network anywhere in the world’ – whistleblower William Binney
NSA Whistle-Blower Tells All: The Program | Op-Docs | The New York Times
William Binney – The Government is Profiling You (The NSA is Spying on You)
Alleged NSA whistleblower warns of “turnkey tyranny” in U.S.
NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’
Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”
NSA Whistleblower Thomas Drake Prevails in Unprecedented Obama Admin Crackdown
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
29C3 Panel: Jesselyn Radack, Thomas Drake, William Binney on whistleblowing and surveillance
Everything We Know About NSA Spying: “Through a PRISM, Darkly” – Kurt Opsahl at CCC
FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying
Last Week Tonight with John Oliver: Government Surveillance (HBO)
The Lame Duck Show: Turn Key Tyranny Solutions
PBS Nova S36E11 The Spy Factory Full Documentary
Inside The NSA~Americas Cyber Secrets
Full Documentaries – National Security Agency Secrets – (NSA) Special Documentary
NSA can spy on 98 percent of the world
Glenn Becks “SURVEILLANCE STATE”
Glenn Greenwald on Domestic Surveillance: NSA Warrantless Wiretapping Controversy (2006)
Enemy of the State (1998) Predicts Edward Snowden’s Revelations
Enemy Of The State – The NSA Can Read The Time Off Your F**king Wristwatch!
Will Smith | Enemy of the State 1998 Movie Full HD
Ron Paul to Congress: DO NOT Extend the “PATRIOT” Act!
Congressman Ron Paul, MD – We’ve Been NeoConned
Why Shouldn’t I Work for the NSA?
(Good Will Hunting)
N.S.A. Phone Data Collection Is Illegal, Appeals Court Rules
THE COMPUTERS ARE LISTENING
HOW THE NSA CONVERTS SPOKEN WORDS INTO SEARCHABLE TEXT
Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.
But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.
Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documentsdescribe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.
The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
Spying on international telephone calls has always been a staple of NSA surveillance, but the requirement that an actual person do the listening meant it was effectively limited to a tiny percentage of the total traffic. By leveraging advances in automated speech recognition, the NSA has entered the era of bulk listening.
And this has happened with no apparent public oversight, hearings or legislative action. Congress hasn’t shown signs of even knowing that it’s going on.
The USA Freedom Act — the surveillance reform bill that Congress is currently debating — doesn’t address the topic at all. The bill would end an NSA program that does not collect voice content: the government’s bulk collection of domestic calling data, showing who called who and for how long.
Even if becomes law, the bill would leave in place a multitude of mechanisms exposed by Snowden that scoop up vast amounts of innocent people’s text and voice communications in the U.S. and across the globe.
Civil liberty experts contacted by The Intercept said the NSA’s speech-to-text capabilities are a disturbing example of the privacy invasions that are becoming possible as our analog world transitions to a digital one.
“I think people don’t understand that the economics of surveillance have totally changed,” Jennifer Granick, civil liberties director at the Stanford Center for Internet and Society, told The Intercept.
“Once you have this capability, then the question is: How will it be deployed? Can you temporarily cache all American phone calls, transcribe all the phone calls, and do text searching of the content of the calls?” she said. “It may not be what they are doing right now, but they’ll be able to do it.”
And, she asked: “How would we ever know if they change the policy?”
Indeed, NSA officials have been secretive about their ability to convert speech to text, and how widely they use it, leaving open any number of possibilities.
That secrecy is the key, Granick said. “We don’t have any idea how many innocent people are being affected, or how many of those innocent people are also Americans.”
I Can Search Against It
NSA whistleblower Thomas Drake, who was trained as a voice processing crypto-linguist and worked at the agency until 2008, told The Intercept that he saw a huge push after the September 11, 2001 terror attacks to turn the massive amounts of voice communications being collected into something more useful.
Human listening was clearly not going to be the solution. “There weren’t enough ears,” he said.
The transcripts that emerged from the new systems weren’t perfect, he said. “But even if it’s not 100 percent, I can still get a lot more information. It’s far more accessible. I can search against it.”
Converting speech to text makes it easier for the NSA to see what it has collected and stored, according to Drake. “The breakthrough was being able to do it on a vast scale,” he said.
More Data, More Power, Better Performance
The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s.
What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds.
In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited.
Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
“I would tell you we are not very good at that,” he said.
In an ideal environment like a news broadcast, he said, “we’re getting pretty good at being able to do these types of translations.”
A 2008 document from the Snowden archive shows that transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing:
(U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing.
Experts in speech recognition say that in the last decade or so, the pace of technological improvement has been explosive. As information storage became cheaper and more efficient, technology companies were able to store massive amounts of voice data on their servers, allowing them to continually update and improve the models. Enormous processors, tuned as “deep neural networks” that detect patterns like human brains do, produce much cleaner transcripts.
And the Snowden documents show that the same kinds of leaps forward seen in commercial speech-to-text products have also been happening in secret at the NSA, fueled by the agency’s singular access to astronomical processing power and its own vast data archives.
In fact, the NSA has been repeatedly releasing new and improved speech recognition systems for more than a decade.
The first-generation tool, which made keyword-searching of vast amounts of voice content possible, was rolled out in 2004 and code-named RHINEHART.
“Voice word search technology allows analysts to find and prioritize intercept based on its intelligence content,” says an internal 2006 NSA memo entitled “For Media Mining, the Future Is Now!”
The memo says that intelligence analysts involved in counterterrorism were able to identify terms related to bomb-making materials, like “detonator” and “hydrogen peroxide,” as well as place names like “Baghdad” or people like “Musharaf.”
RHINEHART was “designed to support both real-time searches, in which incoming data is automatically searched by a designated set of dictionaries, and retrospective searches, in which analysts can repeatedly search over months of past traffic,” the memo explains (emphasis in original).
As of 2006, RHINEHART was operating “across a wide variety of missions and languages” and was “used throughout the NSA/CSS [Central Security Service] Enterprise.”
But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.”
The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states.
A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
Extensive Use Abroad
Voice communications can be collected by the NSA whether they are being sent by regular phone lines, over cellular networks, or through voice-over-internet services. Previously released documents from the Snowden archive describe enormous efforts by the NSA during the last decade to get access to voice-over-internet content like Skype calls, for instance. And other documents in the archive chronicle the agency’s adjustment to the fact that an increasingly large percentage of conversations, even those that start as landline or mobile calls, end up as digitized packets flying through the same fiber-optic cables that the NSA taps so effectively for other data and voice communications.
The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America.
For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.”
The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
Keyword spotting extended to Iranian intercepts as well. A 2006 memoreported that RHINEHART had been used successfully by Persian-speaking analysts who “searched for the words ‘negotiations’ or ‘America’ in their traffic, and RHINEHART located a very important call that was transcribed verbatim providing information on an important Iranian target’s discussion of the formation of a the new Iraqi government.”
“Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
The memo offers an example from NSA Texas, where an analyst newly trained on the system used a keyword search to find previously unreported information on a target involved in drug-trafficking. In another case, an official at a Special Collection Service site in Latin America “was able to find foreign intelligence regarding a Cuban official in a fraction of the usual time.”
In a 2011 article, “Finding Nuggets — Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan,” an intelligence analysis technical director from NSA Texas described the “rare life-changing instance” when he learned about human language technology, and its ability to “find the exact traffic of interest within a mass of collection.”
Analysts in Texas found the new technology a boon for spying. “From finding tunnels in Tijuana, identifying bomb threats in the streets of Mexico City, or shedding light on the shooting of US Customs officials in Potosi, Mexico, the technology did what it advertised: It accelerated the process of finding relevant intelligence when time was of the essence,” he wrote. (Emphasis in original.)
The author of the memo was also part of a team that introduced the technology to military leaders in Afghanistan. “From Kandahar to Kabul, we have traveled the country explaining NSA leaders’ vision and introducing SIGINT teams to what HLT analytics can do today and to what is still needed to make this technology a game-changing success,” the memo reads.
Extent of Domestic Use Remains Unknown
What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.”
The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
“The National Security Agency employs a variety of technologies in the course of its authorized foreign-intelligence mission,” spokesperson Vanee’ Vines wrote in an email to The Intercept. “These capabilities, operated by NSA’s dedicated professionals and overseen by multiple internal and external authorities, help to deter threats from international terrorists, human traffickers, cyber criminals, and others who seek to harm our citizens and allies.”
Vines did not respond to the specific questions about privacy protections in place related to the processing of domestic or domestic-to-international voice communications. But she wrote that “NSA always applies rigorous protections designed to safeguard the privacy not only of U.S. persons, but also of foreigners abroad, as directed by the President in January 2014.”
“I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept.
His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
“We went to the intelligence community and asked them to declassify a significant amount of material,” he said. The “vast majority” of that material was declassified, he said. But not all — including “facts that we thought could be declassified without compromising national security.”
Hypothetically, Medine said, the ability to turn voice into text would raise significant privacy concerns. And it would also raise questions about how the intelligence agencies “minimize” the retention and dissemination of material— particularly involving U.S. persons — that doesn’t include information they’re explicitly allowed to keep.
“Obviously it increases the ability of the government to process information from more calls,” Medine said. “It would also allow the government to listen in on more calls, which would raise more of the kind of privacy issues that the board has raised in the past.”
“I’m not saying the government does or doesn’t do it,” he said, “just that these would be the consequences.”
A New Learning Curve
Speech recognition expert Bhiksha Raj likens the current era to the early days of the Internet, when people didn’t fully realize how the things they typed would last forever.
“When I started using the Internet in the 90s, I was just posting stuff,” said Raj, an associate professor at Carnegie Mellon University’s Language Technologies Institute. “It never struck me that 20 years later I could go Google myself and pull all this up. Imagine if I posted something on alt.binaries.pictures.erotica or something like that, and now that post is going to embarrass me forever.”
The same is increasingly becoming the case with voice communication, he said. And the stakes are even higher, given that the majority of the world’s communication has historically been conducted by voice, and it has traditionally been considered a private mode of communication.
“People still aren’t realizing quite the magnitude that the problem could get to,” Raj said. “And it’s not just surveillance,” he said. “People are using voice services all the time. And where does the voice go? It’s sitting somewhere. It’s going somewhere. You’re living on trust.” He added: “Right now I don’t think you can trust anybody.”
“Things aren’t ephemeral anymore,” Taipale told The Intercept. “We’re living in a world where many things that were fleeting in the analog world are now on the permanent record. The question then becomes: what are the consequences of that and what are the rules going to be to deal with those consequences?”
Realistically, Taipale said, “the ability of the government to search voice communication in bulk is one of the things we may have to live with under some circumstances going forward.” But there at least need to be “clear public rules and effective oversight to make sure that the information is only used for appropriate law-enforcement or national security purposes consistent with Constitutional principles.”
Ultimately, Taipale said, a system where computers flag suspicious voice communications could be less invasive than one where people do the listening, given the potential for human abuse and misuse to lead to privacy violations. “Automated analysis has different privacy implications,” he said.
But to Jay Stanley, a senior policy analyst with the ACLU’s Speech, Privacy and Technology Project, the distinction between a human listening and a computer listening is irrelevant in terms of privacy, possible consequences, and a chilling effect on speech.
“What people care about in the end, and what creates chilling effects in the end, are consequences,” he said. “I think that over time, people would learn to fear computerized eavesdropping just as much as they fear eavesdropping by humans, because of the consequences that it could bring.”
Indeed, computer listening could raise new concerns. One of the internal NSA memos from 2006 says an “important enhancement under development is the ability for this HLT capability to predict what intercepted data might be of interest to analysts based on the analysts’ past behavior.”
Citing Amazon’s ability to not just track but predict buyer preferences, the memo says that an NSA system designed to flag interesting intercepts “offers the promise of presenting analysts with highly enriched sorting of their traffic.”
To Phillip Rogaway, a professor of computer science at the University of California, Davis, keyword-search is probably the “least of our problems.” In an email to The Intercept, Rogaway warned that “When the NSA identifies someone as ‘interesting’ based on contemporary NLP [Natural Language Processing] methods, it might be that there is no human-understandable explanation as to why beyond: ‘his corpus of discourse resembles those of others whom we thought interesting’; or the conceptual opposite: ‘his discourse looks or sounds different from most people’s.’”
If the algorithms NSA computers use to identify threats are too complex for humans to understand, Rogaway wrote, “it will be impossible to understand the contours of the surveillance apparatus by which one is judged. All that people will be able to do is to try your best to behave just like everyone else.”
EFF sued the Department of Justice (DOJ) on the 10th anniversary of the signing of the USA PATRIOT Act in October 2011 for answers about “secret interpretations” of a controversial section of the law. In June 2013, a leaked FISA court order publicly revealed that “secret interpretation”: the government was using Section 215 of the Patriot Act to collect the phone records of virtually every person in the United States.
Prior to the revelations, several senators warned that the DOJ was using Section 215 of the PATRIOT Act to support what government attorneys called a “sensitive collection program,” targeting large numbers of Americans. The language of Section 215 allows for secret court orders to collect “tangible things” that could be relevant to a government investigation – a far lower threshold and more expansive reach than a warrant based on probable cause. The list of possible “tangible things” the government can obtain is seemingly limitless, and could include everything from driver’s license records to Internet browsing patterns.
In response to a court order in our lawsuit, in September 2013, the government released hundreds of pages of previously secret FISA documents detailing the court’s interpretation of Section 215, including an opinion excoriating the NSA for misusing its mass surveillance database for years. In October 2013, the government released a second batch of documents related to Section 215, which showed, among other things, that the NSA had collected cell site location without notifying its oversight committees in Congress or the FISA court.
EFF’s lawsuit came after the DOJ failed to respond to a Freedom of Information Act (FOIA) request on the interpretation and use of Section 215. The suit demanded records describing the types of “tangible things” that have been collected so far, the legal basis for the “sensitive collection program,” and information on the how many people have been affected by Section 215 orders.
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Published on Dec 30, 2013
Through a PRISM, Darkly
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.
Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english
Glenn Becks “SURVEILLANCE STATE”
Inside the NSA
Ed Snowden, NSA, and Fairy Tales
AT&T Spying On Internet Traffic
For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”
NSA Whistle-Blower Tells All – Op-Docs: The Program
The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Benny – The Government is Profiling You (The NSA is Spying on You)
‘After 9/11 NSA had secret deal with White House’
The story of Whistleblower Thomas Drake
Whistleblowers, Part Two: Thomas Drake
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Meet Edward Snowden: NSA PRISM Whistleblower
The Truth About Edward Snowden
N.S.A. Spying: Why Does It Matter?
Inside The NSA~Americas Cyber Secrets
NSA Whistleblower Exposes Obama’s Dragnet
AT&T whistleblower against immunity for Bush spy program-1/2
AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program
The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.
AT&T whistleblower against immunity for Bush spy program-2/2
Enemy Of The State 1998 (1080p) (Full movie)
Background Articles and Videos
Stellar Wind
Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]
The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]
There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]
During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]
In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.
PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1]PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]
According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]
History
Slide showing that much of the world’s communications flow through the US
Details of information collected via PRISM
PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]
PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]
The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]
According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]
Response from companies
The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]
Initial Public Statements
Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]
Slide listing companies and the date that PRISM collection began
Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]
In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13]The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]
“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]
Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]
On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]
The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]
While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]
Post-PRISM Transparency Reports
In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.
On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000” user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]
Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]
Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]
Response from United States government
Executive branch
Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]
Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]
On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]
The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]
The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]
In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]
Legislative branch
In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:
Senator John McCain (R-AZ)
June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee
June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]
Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee
June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]
Representative John Boehner (R-OH), Speaker of the House of Representatives
June 11 “He’s a traitor”[50] (referring to Edward Snowden)
Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act
June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]
Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.
June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]
Senator Mark Udall (D-CO)
June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]
Representative Todd Rokita (R-IN)
June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]
Senator Rand Paul (R-KY)
June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]
Representative Luis Gutierrez (D-IL)
June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]
Judicial branch
The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.
Applicable law and practice
On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]
After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.
If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]
If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]
Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]
The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]
Involvement of other countries
Australia
The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]
Canada
Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]
Germany
Germany did not receive any raw PRISM data, according to a Reuters report.[59]
Israel
Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.
New Zealand
In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]
United Kingdom
In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]
Domestic response
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)
The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]
Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]
In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]
In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]
The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]
On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]
International response
Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]
Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]
Protests at Checkpoint Charlie in Berlin
The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]
The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]
William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]
Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]
Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]
Russia has offered to consider an asylum request from Edward Snowden.[91]
Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]
A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]
A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]
Background
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]
Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]
The new project replacing Trailblazer is called Turbulence.[3]
Whistleblowing
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]
Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]
In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]
Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.
Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]
History
Slide showing that much of the world’s communications flow through the US.
Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]
NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]
Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]
Technology
According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]
Legality and FISA Amendments Act of 2008
The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]
The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]
Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]
The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
the Government Communications Headquarters of the United Kingdom,
the National Security Agency of the United States,
the Communications Security Establishment of Canada,
the Defence Signals Directorate of Australia, and
the Government Communications Security Bureau of New Zealand.
the National SIGINT Organisation (NSO) of The Netherlands
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]
Capabilities
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]
Controversy
See also: Industrial espionage
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
Hardware
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]
Name
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]
Ground stations
The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
Hong Kong (since closed)
Australian Defence Satellite Communications Station (Geraldton, Western Australia)
Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
Misawa Air Base (Japan) Map
GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
Sugar Grove (West Virginia, U.S.) Map
Yakima Training Center (Washington, U.S.) Map
GCSB Waihopai (New Zealand)
GCSB Tangimoana (New Zealand)
CFS Leitrim (Ontario, Canada)
Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
Ayios Nikolaos (Cyprus – U.K.)
BadAibling Station (BadAibling, Germany – U.S.)
relocated to Griesheim in 2004[19]
deactivated in 2008[20]
Buckley Air Force Base (Aurora, Colorado)
Fort Gordon (Georgia, U.S.)
Gander (Newfoundland & Labrador, Canada)
Guam (Pacific Ocean, U.S.)
Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
Lackland Air Force Base, Medina Annex (San Antonio, Texas)
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]
Description
Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]
The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]
The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.
Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.
Lawsuit
Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]
More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.
PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States
Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security.[7] The data mostly comes from the NSA, FBI, CIA, as well as other government sources.[7]
Carnivore: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight
Intelligence Community (IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct espionage
President George W. Bush gestures as he addresses an audience Wednesday, July 20, 2005 at the Port of Baltimore in Baltimore, Md., encouraging the renewal of provisions of the Patriot Act.
The following is a section summary of the USA PATRIOT Act, Title II. The USA PATRIOT Act was passed by the United StatesCongress in 2001 as a response to the September 11, 2001 attacks. Title II: Enhanced Surveillance Procedures gave increased powers of surveillance to various government agencies and bodies. This title has 25 sections, with one of the sections (section 224) containing a sunset clause which sets an expiration date, 31 December 2005, for most of the title’s provisions. On 22 December 2005, the sunset clause expiration date was extended to 3 February 2006.
Title II contains many of the most contentious provisions of the act. Supporters of the Patriot Act claim that these provisions are necessary in fighting the War on Terrorism, while its detractors argue that many of the sections of Title II infringe upon individual and civil rights.
The sections of Title II amend the Foreign Intelligence Surveillance Act of 1978 and its provisions in 18 U.S.C., dealing with “Crimes and Criminal Procedure“. It also amends the Electronic Communications Privacy Act of 1986. In general, the Title expands federal agencies’ powers in intercepting, sharing, and using private telecommunications, especially electronic communications, along with a focus on criminal investigations by updating the rules that govern computer crime investigations. It also sets out procedures and limitations for individuals who feel their rights have been violated to seek redress, including against the United States government. However, it also includes a section that deals with trade sanctions against countries whose government supports terrorism, which is not directly related to surveillance issues.
Two sections dealt with the interception of communications by the United States government.
Section 201 is titled Authority to intercept wire, oral, and electronic communications relating to terrorism. This section amended 18 U.S.C.§ 2516 (Authorization for interception of wire, oral, or electronic communications) of the United States Code. This section allows (under certain specific conditions) the United States Attorney General (or some of his subordinates) to authorize a Federal judge to make an order authorizing or approving the interception of wire or oral communications by the Federal Bureau of Investigation (FBI), or another relevant U.S. Federal agency.
The Attorney General’s subordinates who can use Section 201 are: the Deputy Attorney General, the Associate Attorney General, any Assistant Attorney General, any acting Assistant Attorney General, any Deputy Assistant Attorney General or acting Deputy Assistant Attorney General in the Criminal Division who is specially designated by the Attorney General.
The amendment added a further condition which allowed an interception order to be carried out. The interception order may now be made if a criminal violation is made with respect to terrorism (defined by 18 U.S.C.§ 2332):
Section 202 is titled Authority to intercept wire, oral, and electronic communications relating to computer fraud and abuse offenses, and amended the United States Code to include computer fraud and abuse in the list of reasons why an interception order may be granted.[3][4]
Section 203: Authority to share criminal investigative information
Section 203 (Authority to share criminal investigation information) modified the Federal Rules of Criminal Procedure with respect to disclosure of information before the grand jury (Rule 6(e)). Section 203(a) allowed the disclosure of matters in deliberation by the grand jury, which are normally otherwise prohibited, if:
a court orders it (before or during a judicial proceeding),
a court finds that there are grounds for a motion to dismiss an indictment because of matters before the Grand Jury,
if the matters in deliberation are made by an attorney for the government to another Federal grand jury,
an attorney for the government requests that matters before the grand jury may reveal a violation of State criminal law,
the matters involve foreign intelligence or counterintelligence or foreign intelligence information. Foreign intelligence and counterintelligence was defined in section 3 of the National Security Act of 1947,[5] and “foreign intelligence information” was further defined in the amendment as information about:
an actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power;
sabotage or international terrorism by a foreign power or an agent of a foreign power; or
clandestine intelligence activities by an intelligence service or network of a foreign power or by an agent of foreign power; or
information about a foreign power or foreign territory that relates to the national defense or the security of the United States or the conduct of the foreign affairs of the United States.’.
information about non-U.S. and U.S. citizens
203(a) gave the court the power to order a time within which information may be disclosed, and specified when a government agency may use information disclosed about a foreign power. The rules of criminal procedure now state that “within a reasonable time after such disclosure, an attorney for the government shall file under seal a notice with the court stating the fact that such information was disclosed and the departments, agencies, or entities to which the disclosure was made.”
Section 203(b) modified 18 U.S.C.§ 2517, which details who is allowed to learn the results of a communications interception, to allow any investigative or law enforcement officer, or attorney for the Government to divulge foreign intelligence, counterintelligence or foreign intelligence information to a variety of Federal officials. Specifically, any official who has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived from this could divulge this information to any Federal law enforcement, intelligence, protective, immigration, national defense, or national security official. The definition of “foreign intelligence” was the same as section 203(a), with the same ability to define “foreign intelligence” to be intelligence of a non-U.S. and U.S. citizen. The information received must only be used as necessary in the conduct of the official’s official duties.[6]
The definition of “foreign intelligence information” is defined again in Section 203(d).
Section 203(c) specified that the Attorney General must establish procedures for the disclosure of information due to 18 U.S.C.§ 2517 (see above), for those people who are defined as U.S. citizens.[7]
Section 204: Limitations on communication interceptions
Section 204 (Clarification of intelligence exceptions from limitations on interception and disclosure of wire, oral, and electronic communication) removed restrictions from the acquisition of foreign intelligence information from international or foreign communications. It was also clarified that the Foreign Intelligence Surveillance Act of 1978 should not only be the sole means of electronic surveillance for just oral and wire intercepts, but should also include electronic communication.[8][9]
Section 205: Employment of translators by the FBI
Under section 205 (Employment of translators by the Federal Bureau of Investigation), the Director of the Federal Bureau of Investigation is now allowed to employ translators to support counterterrorism investigations and operations without regard to applicable Federal personnel requirements and limitations. However, he must report to the House Judiciary Committee and Senate Judiciary Committee the number of translators employed and any legal reasons why he cannot employ translators from federal, state, or local agencies.[10]
Section 206: Roving surveillance authority
The Foreign Intelligence Surveillance Act of 1978[11] allows an applicant access to all information, facilities, or technical assistance necessary to perform electronic surveillance on a particular target. The assistance given must protect the secrecy of and cause as little disruption to the ongoing surveillance effort as possible. The direction could be made at the request of the applicant of the surveillance order, by a common carrier, landlord, custodian or other specified person. Section 206 (Roving surveillance authority under the Foreign Intelligence Surveillance Act of 1978) amended this to add:
or in circumstances where the Court finds that the actions of the target of the application may have the effect of thwarting the identification of a particular person.
This allows intelligence agencies to undertake “roving” surveillance: they do not have to specify the exact facility or location where their surveillance will be done. Roving surveillance was already specified for criminal investigations under 18 U.S.C.§ 2518(11), and section 206 brought the ability of intelligence agencies to undertake such roving surveillance into line with such criminal investigations. However, the section was not without controversy, as James X. Dempsey, the Executive Director of the Center for Democracy & Technology, argued that a few months after the Patriot Act was passed the Intelligence Authorization Act was also passed that had the unintended effect of seeming to authorize “John Doe” roving taps — FISA orders that identify neither the target nor the location of the interception (see The Patriot Debates, James X. Dempsey debates Paul Rosenzweig on section 206).[12]
Section 207: Duration of FISA surveillance on agents of a foreign powe
Previously FISA only defined the duration of a surveillance order against a foreign power (defined in 50 U.S.C.§ 1805(e)(1)) . This was amended by section 207 (Duration of FISA surveillance of non-United States persons who are agents of a foreign power) to allow surveillance of agents of a foreign power (as defined in section 50 U.S.C.§ 1801(b)(1)(A)) for a maximum of 90 days. Section 304(d)(1) was also amended to extend orders for physical searches from 45 days to 90 days, and orders for physical searches against agents of a foreign power are allowed for a maximum of 120 days. The act also clarified that extensions for surveillance could be granted for a maximum of a year against agents of a foreign power.[13]
Section 208: Designation of judges
Section 103(A) of FISA was amended by Section 208 (Designation of judges) of the Patriot Act to increase the number of federal district court judges who must now review surveillance orders from seven to 11. Of these, three of the judges must live within 20 miles (32 km) of the District of Columbia.[14]
Section 209: Seizure of voice-mail messages pursuant to warrants
Section 209 (Seizure of voice-mail messages pursuant to warrants) removed the text “any electronic storage of such communication” from title 18, section 2510 of the United States Code. Before this was struck from the Code, the U.S. government needed to apply for a title III wiretap order[15] before they could open voice-mails, however now the government only need apply for an ordinary search. Section 2703, which specifies when a “provider of electronic communication services” must disclose the contents of stored communications, was also amended to allow such a provider to be compelled to disclose the contents via a search warrant, and not a wiretap order. According to Vermont senator Patrick Leahy, this was done to “harmonizing the rules applicable to stored voice and non-voice (e.g., e-mail) communications”.[16][17]
Section 210 & 211: Scope of subpoenas for records of electronic communications
The U.S. Code specifies when the U.S. government may require a provider of an electronic communication service to hand over communication records.[18] It specifies what that provider must disclose to the government,[19] and was amended by section 210 (Scope of subpoenas for records of electronic communications) to include records of session times and durations of electronic communication as well as any identifying numbers or addresses of the equipment that was being used, even if this may only be temporary. For instance, this would include temporarily assigned IP addresses, such as those established by DHCP.[20]
Section 211 (Clarification of scope) further clarified the scope of such orders. 47 U.S.C.§ 551 (Section 631 of the Communications Act of 1934) deals with the privacy granted to users of cable TV. The code was amended to allow the government to have access to the records of cable customers, with the notable exclusion of records revealing cable subscriber selection of video programming from a cable operator.[21]
Section 212: Emergency disclosure of electronic communications
Section 212 (Emergency disclosure of electronic communications to protect life and limb) amended the US Code to stop a communications provider from providing communication records (not necessarily relating to the content itself) about a customer’s communications to others.[22] However, should the provider reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person then the communications provider can now disclose this information. The act did not make clear what “reasonably” meant.
A communications provider could also disclose communications records if:
a court orders the disclosure of communications at the request of a government agency (18 U.S.C.§ 2703)
the customer allows the information to be disclosed
if the service provider believes that they must do so to protect their rights or property.
Section 213 (Authority for delaying notice of the execution of a warrant) amended the US Code to allow the notification of search warrants[24] to be delayed.[25] This section has been commonly referred to as the “sneak and peek” section, a phrase originating from the FBI[citation needed] and not, as commonly believed, from opponents of the Patriot Act. The U.S. government may now legally search and seize property that constitutes evidence of a United States criminal offense without immediately telling the owner. The court may only order the delayed notification if they have reason to believe it would hurt an investigation — delayed notifications were already defined in 18 U.S.C.§ 2705 — or, if a search warrant specified that the subject of the warrant must be notified “within a reasonable period of its execution,” then it allows the court to extend the period before the notification is given, though the government must show “good cause”. If the search warrant prohibited the seizure of property or communications, then the search warrant could then be delayed.
Section 214: Pen register and trap and trace authority
FISA was amended by section 214 (Pen register and trap and trace authority under FISA) to clarify that pen register and trap and trace surveillance can be authorised to allow government agencies to gather foreign intelligence information.[27] Where the law only allowed them to gather surveillance if there was evidence of international terrorism, it now gives the courts the power to grant trap and traces against:
non-U.S. citizens.
those suspected of being involved with international terrorism,
those undertaking clandestine intelligence activities
Section 215: Access to records and other items under FISA
This section is commonly referred to as the “library records” provision[29] because of the wide range of personal material that can be investigated.[30][31]
FISA was modified by section 215 (Access to records and other items under the Foreign Intelligence Surveillance Act) to allow the Director of the FBI (or an official designated by the Director, so long as that official’s rank is no lower than Assistant Special Agent in Charge) to apply for an order to produce materials that assist in an investigation undertaken to protect against international terrorism or clandestine intelligence activities. The act specifically gives an example to clarify what it means by “tangible things”: it includes “books, records, papers, documents, and other items”.
It is specified that any such investigation must be conducted in accordance with guidelines laid out in Executive Order 12333 (which pertains to United States intelligence activities). Investigations must also not be performed on U.S. citizens who are carrying out activities protected by the First Amendment to the Constitution of the United States.
Any order that is granted must be given by a FISA court judge or by a magistrate judge who is publicly designated by the Chief Justice of the United States to allow such an order to be given. Any application must prove that it is being conducted without violating the First Amendment rights of any U.S. citizens. The application can only be used to obtain foreign intelligence information not concerning a U.S. citizen or to protect against international terrorism or clandestine intelligence activities.
This section of the PATRIOT Act is controversial because the order may be granted ex parte, and once it is granted — in order to avoid jeopardizing the investigation — the order may not disclose the reasons behind why the order was granted.
The section carries a gag order stating that “No person shall disclose to any other person (other than those persons necessary to produce the tangible things under this section) that the Federal Bureau of Investigation has sought or obtained tangible things under this section”. Senator Rand Paul stated that the non-disclosure is imposed for one year,[32] though this is not explicitly mentioned in the section.
In order to protect anyone who complies with the order, FISA now prevents any person who complies with the order in “good faith” from being liable for producing any tangible goods required by the court order. The production of tangible items is not deemed to constitute a waiver of any privilege in any other proceeding or context.
During a House Judiciary hearing on domestic spying on July 17, 2013 John C. Inglis, the deputy director of the surveillance agency, told a member of the House judiciary committee that NSA analysts can perform “a second or third hop query” through its collections of telephone data and internet records in order to find connections to terrorist organizations.[34] “Hops” refers to a technical term indicating connections between people. A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with.[34][35] NSA officials had said previously that data mining was limited to two hops, but Inglis suggested that the Foreign Intelligence Surveillance Court has allowed for data analysis extending “two or three hops”.[36]
Section 216: Authority to issue pen registers and trap and trace devices[edit]
Section 216 (Modification of authorities relating to use of pen registers and trap and trace devices) deals with three specific areas with regards to pen registers and trap and trace devices: general limitations to the use of such devices, how an order allowing the use of such devices must be made, and the definition of such devices.
Limitations
18 U.S.C.§ 3121 details the exceptions related to the general prohibition on pen register and trap and trace devices. Along with gathering information for dialup communications, it allows for gathering routing and other addressing information. It is specifically limited to this information: the Act does not allow such surveillance to capture the actual information that is contained in the communication being monitored. However, organisations such as the EFF have pointed out that certain types of information that can be captured, such as URLs, can have content embedded in them. They object to the application of trap and trace and pen register devices to newer technology using a standard designed for telephones.
Making and carrying out orders
It also details that an order may be applied for ex parte (without the party it is made against present, which in itself is not unusual for search warrants), and allows the agency who applied for the order to compel any relevant person or entity providing wire or electronic communication service to assist with the surveillance. If the party whom the order is made against so requests, the attorney for the Government, law enforcement or investigative officer that is serving the order must provide written or electronic certification that the order applies to the targeted individual.
If a pen register or trap and trace device is used on a packet-switched data network, then the agency doing surveillance must keep a detailed log containing:
any officer or officers who installed the device and any officer or officers who accessed the device to obtain information from the network;
the date and time the device was installed, the date and time the device was uninstalled, and the date, time, and duration of each time the device is accessed to obtain information;
the configuration of the device at the time of its installation and any subsequent modification made to the device; and
any information which has been collected by the device
This information must be generated for the entire time the device is active, and must be provided ex parte and under seal to the court which entered the ex parte order authorizing the installation and use of the device. This must be done within 30 days after termination of the order.
Orders must now include the following information:[37]
the identifying number of the device under surveillance
the location of the telephone line or other facility to which the pen register or trap and trace device is to be attached or applied
if a trap and trace device is installed, the geographic limits of the order must be specified
This section amended the non-disclosure requirements of 18 U.S.C.§ 3123(d)(2) by expanding to include those whose facilities are used to establish the trap and trace or pen register or to those people who assist with applying the surveillance order who must not disclose that surveillance is being undertaken. Before this it had only applied to the person owning or leasing the line.
Definitions
The following terms were redefined in the US Code’s chapter 206 (which solely deals with pen registers and trap and trace devices):
Court of competent jurisdiction: defined in 18 U.S.C.§ 3127(2), subparagraph A was stricken and replaced to redefine the court to be any United States district court (including a magistrate judge of such a court) or any United States court of appeals havingjurisdiction over the offense being investigated (title 18 also allows State courts that have been given authority by their State to use pen register and trap and trace devices)
Pen register: defined in 18 U.S.C.§ 3127(3), the definition of such a device was expanded to include a device that captures dialing, routing, addressing, or signaling information from an electronics communication device. It limited the usage of such devices to exclude the capturing of any of the contents of communications being monitored. 18 U.S.C.§ 3124(b) was also similarly amended.
Trap and trace device: defined in 18 U.S.C.§ 3127(4), the definition was similarly expanded to include the dialing, routing, addressing, or signaling information from an electronics communication device. However, a trap and trace device can now also be a “process”, not just a device.
Contents:18 U.S.C.§ 3127(1) clarifies the term “contents” (as referred to in the definition of trap and trace devices and pen registers) to conform to the definition as defined in 18 U.S.C.§ 2510(8), which when used with respect to any wire, oral, or electronic communication, includes any information concerning the substance, purport, or meaning of that communication.
Section 217: Interception of computer trespasser communications
Section 217 (Interception of computer trespasser communications) firstly defines the following terms:
Protected computer: this is defined in 18 U.S.C.§ 1030(e)(2)(A), and is any computer that is used by a financial institution or the United States Government or one which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
Computer trespasser: this is defined in 18 U.S.C.§ 2510(21) and references to this phrase means
a person who accesses a protected computer without authorization and thus has no reasonable expectation of privacy in any communication transmitted to, through, or from the protected computer; and
does not include a person known by the owner or operator of the protected computer to have an existing contractual relationship with the owner or operator of the protected computer for access to all or part of the protected computer
Amendments were made to 18 U.S.C.§ 2511(2) to make it lawful to allow a person to intercept the communications of a computer trespasser if
the owner or operator of the protected computer authorizes the interception of the computer trespasser’s communications on the protected computer,
the person is lawfully engaged in an investigation,
the person has reasonable grounds to believe that the contents of the computer trespasser’s communications will be relevant to their investigation, and
any communication captured can only relate to those transmitted to or from the computer trespasser.
Section 218: Foreign intelligence information
Section 218 (Foreign intelligence information) amended 50 U.S.C.§ 1804(a)(7)(B) and 50 U.S.C.§ 1823(a)(7)(B) (both FISA sections 104(a) (7)(B) and section 303(a)(7)(B), respectively) to change “the purpose” of surveillance orders under FISA to gain access to foreign intelligence to “significant purpose”. Mary DeRosa, in The Patriot Debates, explained that the reason behind this was to remove a legal “wall” which arose when criminal and foreign intelligence overlapped. This was because the U.S. Department of Justice interpreted “the purpose” of surveillance was restricted to collecting information for foreign intelligence, which DeRosa says “was designed to ensure that prosecutors and criminal investigators did not use FISA to circumvent the more rigorous warrant requirements for criminal cases”. However, she also says that it is debatable whether this legal tightening of the definition was even necessary, stating that “the Department of Justice argued to the FISA Court of Review in 2002 that the original FISA standard did not require the restrictions that the Department of Justice imposed over the years, and the court appears to have agreed [which] leaves the precise legal effect of a sunset of section 218 somewhat murky.”[38]
Section 219: Single-jurisdiction search warrants for terrorism
Section 219 (Single-jurisdiction search warrants for terrorism) amended the Federal Rules of Criminal Procedure to allow a magistrate judge who is involved in an investigation of domestic terrorism or international terrorism the ability to issue a warrant for a person or property within or outside of their district.[39]
Section 220: Nationwide service of search warrants for electronic evidence
Section 220 (Nationwide service of search warrants for electronic evidence) gives the power to Federal courts to issue nationwide service of search warrants for electronic surveillance. However, only courts with jurisdiction over the offense can order such a warrant. This required amending 18 U.S.C.§ 2703 and 18 U.S.C.§ 2711.
Section 221: Trade sanctions
Section 221 (Trade sanctions) amended the Trade Sanctions Reform and Export Enhancement Act of 2000.[40] This Act prohibits, except under certain specific circumstances, the President from imposing a unilateral agricultural sanction or unilateral medical sanction against a foreign country or foreign entity. The Act holds various exceptions to this prohibition, and the Patriot Act further amended the exceptions to include holding sanctions against countries that design, develop or produce chemical or biological weapons, missiles, or weapons of mass destruction.[41] It also amended the act to include the Taliban as state sponsors of international terrorism. In amending Title IX, section 906 of the Trade sanctions act, the Taliban was determined by the Secretary of State to have repeatedly provided support for acts of international terrorism and the export of agricultural commodities, medicine, or medical devices is now pursuant to one-year licenses issued and reviewed by the United States Government.[42] However, the export of agricultural commodities, medicine, or medical devices to the Government of Syria or to the Government of North Korea were exempt from such a restriction.[43]
The Patriot Act further states that nothing in the Trade Sanctions Act will limit the application of criminal or civil penalties to those who export agricultural commodities, medicine, or medical devices to:
any foreign entity or individual who is subject to any restriction for involvement in weapons of mass destruction or missile proliferation.
Section 222: Assistance to law enforcement agencies
Section 222 (Assistance to law enforcement agencies) states that nothing in the Patriot Act shall make a communications provider or other individual provide more technical assistance to a law enforcement agency than what is set out in the Act. It also allows for the reasonable compensation of any expenses incurred while assisting with the establishment of pen registers or trap and trace devices.[47]
Section 223: Civil liability for certain unauthorized disclosures
18 U.S.C.§ 2520(a) allows any person who has had their rights violated due to the illegal interception of communications to take civil action against the offending party. Section 223 (Civil liability for certain unauthorized disclosures) excluded the United States from such civil action.
If a court or appropriate department or agency determines that the United States or any of its departments or agencies has violated any provision of chapter 119 of the U.S. Code they may request an internal review from that agency or department. If necessary, an employee may then have administrative action taken against them. If the department or agency do not take action, then they must inform the notify the Inspector General who has jurisdiction over the agency or department, and they must give reasons to them why they did not take action.[48]
A citizen’s rights will also be found to have been violated if an investigative, law enforcement officer or governmental entity discloses information beyond that allowed in 18 U.S.C.§ 2517(a).[49]
U.S. Code Title 18, Section 2712 added
A totally new section was appended to Title 18, Chapter 121 of the US Code: Section 2712, “Civil actions against the United States”. It allows people to take action against the US Government if they feel that they had their rights violated, as defined in chapter 121,chapter 119, or sections 106(a), 305(a), or 405(a) of FISA. The court may assess damages no less than $US10,000 and litigation costs that are reasonably incurred. Those seeking damages must present them to the relevant department or agency as specified in the procedures of the Federal Tort Claims Act.
Actions taken against the United States must be initiated within two years of when the claimant has had a reasonable chance to discover the violation. All cases are presented before a judge, not a jury. However, the court will order a stay of proceedings if they determine that if during the court case civil discovery will hurt the ability of the government to conduct a related investigation or the prosecution of a related criminal case. If the court orders the stay of proceedings they will extend the time period that a claimant has to take action on a reported violation. However, the government may respond to any action against it by submitting evidence ex parte in order to avoid disclosing any matter that may adversely affect a related investigation or a related criminal case. The plaintiff is then given an opportunity to make a submission to the court, not ex parte, and the court may request further information from either party.[50]
If a person wishes to discover or obtain applications or orders or other materials relating to electronic surveillance or to discover, obtain, or suppress evidence or information obtained or derived from electronic surveillance under FISA, then the Attorney General may file an affidavit under oath that disclosure or an adversary hearing would harm the national security of the United States. In these cases, the court may review in camera and ex parte the material relating to the surveillance to make sure that such surveillance was lawfully authorized and conducted. The court may then disclose part of material relating to the surveillance. However, the court is restricted in they may only do this “where such disclosure is necessary to make an accurate determination of the legality of the surveillance”.[50] If it then determined that the use of a pen register or trap and trace device was not lawfully authorized or conducted, the result of such surveillance may be suppressed as evidence. However, should the court determine that such surveillance was lawfully authorised and conducted, they may deny the motion of the aggrieved person.[51]
It is further stated that if a court or appropriate department or agency determines that an officer or employee of the United States willfully or intentionally violated any provision of chapter 121 of the U.S. Code they will request an internal review from that agency or department. If necessary, an employee may then have administrative action taken against them. If the department or agency do not take action, then they must inform the notify the Inspector General who has jurisdiction over the agency or department, and they must give reasons to them why they did not take action. (see[49] for a similar part of the Act)
Section 224: Sunset
This article is outdated. Please update this article to reflect recent events or newly available information.(November 2010)
Section 224 (Sunset) is a sunset clause. Title II and the amendments made by the title originally would have ceased to have effect on December 31, 2005, with the exception of the below sections. However, on December 22, 2005, the sunset clause expiration date was extended to February 3, 2006, and then on February 2, 2006 it was further extended to March 10:
Title II sections that did not expire on March 10, 2006
Section
Section title
203(a)
Authority to share criminal investigation information : Authority to share Grand Jury information
203(c)
Authority to share criminal investigation information : Procedures
205
Employment of translators by the Federal Bureau of Investigation
208
Designation of judges
210
Scope of subpoenas for records of electronic communications
211
Clarification of scope
213
Authority for delaying notice of the execution of a warrant
216
Modification of authorities relating to use of pen registers and trap and trace devices
219
Single-jurisdiction search warrants for terrorism
221
Trade sanctions
222
Assistance to law enforcement agencies
Further, any particular foreign intelligence investigations that are ongoing will continue to be run under the expired sections.
Section 225: Immunity for compliance with FISA wiretap[edit]
Section 225 (Immunity for compliance with FISA wiretap) gives legal immunity to any provider of a wire or electronic communication service, landlord, custodian, or other person that provides any information, facilities, or technical assistance in accordance with a court order or request for emergency assistance. This was added to FISA as section 105 (50 U.S.C.§ 1805).
Jump up^18 U.S.C.§ 3103a(a) states that “a warrant may be issued to search for and seize any property that constitutes evidence of a criminal offense in violation of the laws of the United States”
Jump up^This is defined in Executive Order No. 12947: “Prohibiting Transactions With Terrorists Who Threaten To Disrupt the Middle East Peace Process”
Jump up^This is defined in Executive Order No. 13224: “Blocking Property and Prohibiting Transactions With Persons Who Commit, Threaten to Commit, or Support Terrorism”
NSA Whistle-blower William Binney: The Future of FREEDOM
A 36-year veteran of America’s Intelligence Community, William Binney resigned from his position as Director for Global Communications Intelligence (COMINT) at the National Security Agency (NSA) and blew the whistle, after discovering that his efforts to protect the privacy and security of Americans were being undermined by those above him in the chain of command.
The NSA data-monitoring program which Binney and his team had developed — codenamed ThinThread — was being aimed not at foreign targets as intended, but at Americans (codenamed as Stellar Wind); destroying privacy here and around the world. Binney voices his call to action for the billions of individuals whose rights are currently being violated.
William Binney speaks out in this feature-length interview with Tragedy and Hope’s Richard Grove, focused on the topic of the ever-growing Surveillance State in America.
On January 22, 2015: (Berlin, Germany) – The Government Accountability Project (GAP) is proud to announce that retired NSA Technical Director and GAP client, William “Bill” Binney, will accept the Sam Adams Associates for Integrity in Intelligence Award today in Berlin, Germany. The award is presented annually by the Sam Adams Associates for Integrity in Intelligence (SAAII) to a professional who has taken a strong stand for ethics and integrity. http://whistleblower.org/press/nsa-wh…
NSA Whistle-blower: Everyone in US under virtual surveillance, all info stored, no matter the post
Former NSA Head Exposes Agency’s Real Crimes
Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All
“Where I see it going is toward a totalitarian state,” says William Binney. “You’ve got the NSA doing all this collecting of material on all of its citizens – that’s what the SS, the Gestapo, the Stasi, the KGB, and the NKVD did.”
Binney is talking about the collection of various forms of personal data on American citizens by the National Security Agency (NSA), where he worked for 30 years before quitting in 2001 from his high-placed post as technical leader for intelligence. A registered Republican for most of his life, Binney volunteered for military service during the Vietnam War, which led to his being hired by the NSA in the early ’70s.
In 2002 – long before the revelations of Edward Snowden rocked the world – Binney and several former colleagues went to Congress and the Department of Defense, asking that the NSA be investigated. Not only was the super-secretive agency wasting taxpayer dollars on ineffective programs, they argued, it was broadly violating constitutional guarantees to privacy and due process.
The government didn’t just turn a blind eye to the agency’s activities; it later accused the whistleblowers of leaking state secrets. A federal investigation of Binney – including an FBI search and seizure of his home and office computers that destroyed his consulting business – exonerated him on all charges.
“We are a clear example that [going through] the proper channels doesn’t work,” says Binney, who approves of Edward Snowden’s strategy of going straight to the media. At the same time, Binney criticizes Snowden’s leaking of documents not directly related to the NSA’s surveillance of American citizens and violation of constitutional rights. Binney believes that the NSA is vital to national security but has been become unmoored due to technological advances that vastly extend its capabilities and leadership that has no use for limits on government power. “They took that program designed [to prevent terrorist attacks] and used it to spy on American citizens and everyone else in the world,” flatly declares Binney (33:30).
Binney sat down with Reason TV’s Nick Gillespie to discuss “Trailblazer”, a data-collection program which was used on American citizens (1:00), why he thinks the NSA had the capability to stop the 9/11 attacks (7:00), his experience being raided by the FBI in 2007 (12:50), and why former President Gerald Ford, usually regarded as a hapless time-server, is one of his personal villians (41:25).
NSA Whistle-Blower Tells All: The Program | Op-Docs | The New York Times
William Binney: NSA had 9/11 foreknowledge
NSA Whistleblower Supports 9/11 Truth – William Binney and Richard Gage on GRTV
“The NSA Is Lying”: U.S. Government Has Copies of Most of Your Emails Says NSA Whistleblower
William Edward Binney[2] is a former highly placed intelligence official with the United States National Security Agency (NSA)[3] turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. He was a high-profile critic of his former employers during the George W. Bush administration.
Binney continues to speak out during Barack Obama‘s presidency about the NSA’s data collection policies, and continues interviews in the media regarding his experiences and his views on communication intercepts by governmental agencies of American citizens. In a legal case, Binney has testified in an affidavit that the NSA is in deliberate violation of the U.S. Constitution.
Biography
Binney grew up in rural Pennsylvania and graduated with a Bachelor of Science degree in mathematics from the Pennsylvania State University in 1970. He said that he volunteered for the Army during the Vietnam era in order to select work that would interest him rather than be drafted and have no input. He was found to have strong aptitudes for mathematics, analysis, and code-breaking,[4] and served four years from 1965–1969 at the Army Security Agency before going to the NSA in 1970. Binney was a Russia specialist and worked in the operations side of intelligence, starting as an analyst and ending as Technical Director prior to becoming a geopolitical world Technical Director. In the 1990s, he co-founded a unit on automating signals intelligence with NSA research chief Dr. John Taggart.[5] Binney’s NSA career culminated as Technical Leader for intelligence in 2001. Having expertise in intelligence analysis, traffic analysis, systems analysis, knowledge management, and mathematics (including set theory, number theory, and probability),[6] Binney has been described as one of the best analysts in the NSA’s history.[7] After retiring from the NSA he founded “Entity Mapping, LLC”, a private intelligence agency together with fellow NSA whistleblower J. Kirk Wiebe to market their analysis program to government agencies. NSA continued to retaliate against them, ultimately preventing them from getting work, or causing contracts they had secured to be terminated abruptly.[8]
Whistleblowing
Binney sitting in the offices ofDemocracy Now! in New York City, prior to appearing with hosts Amy Goodman, Juan Gonzalez, and guest Jacob Appelbaum. Photo taken byJacob Appelbaum.
In September 2002, he, along with J. Kirk Wiebe and Edward Loomis, asked the U.S. Defense Department to investigate the NSA for allegedly wasting “millions and millions of dollars” on Trailblazer, a system intended to analyze data carried on communications networks such as the Internet. Binney had been one of the inventors of an alternative system, ThinThread, which was shelved when Trailblazer was chosen instead. Binney has also been publicly critical of the NSA for spying on U.S. citizens, saying of its expanded surveillance after the September 11, 2001 attacks that “it’s better than anything that the KGB, the Stasi, or the Gestapo and SS ever had”[9] as well as noting Trailblazer’s ineffectiveness and unjustified high cost compared to the far less intrusive ThinThread.[10] He was furious that the NSA hadn’t uncovered the 9/11 plot and stated that intercepts it had collected but not analyzed likely would have garnered timely attention with his leaner more focused system.[7]
After he left the NSA in 2001, Binney was one of several people investigated as part of an inquiry into the 2005 New York Times exposé[11][12] on the agency’s warrantless eavesdropping program. Binney was cleared of wrongdoing after three interviews with FBI agents beginning in March 2007, but one morning in July 2007, a dozen agents armed with rifles appeared at his house, one of whom entered the bathroom and pointed his gun at Binney, still towelling off from a shower. In that raid, the FBI confiscated a desktop computer, disks, and personal and business records. The NSA revoked his security clearance, forcing him to close a business he ran with former colleagues at a loss of a reported $300,000 in annual income. In 2012, Binney and his co-plaintiffs went to federal court to get the items back. Binney spent more than $7,000 on legal fees.[13]
During interviews on Democracy Now! in April and May 2012[14] with elaboration in July 2012 at 2600’s hacker conference HOPE[4] and at DEF CON a couple weeks later,[15]Binney repeated estimates that the NSA (particularly its Stellar Wind project[16]) had intercepted 20 trillion communications “transactions” of Americans such as phone calls, emails, and other forms of data (but not including financial data). This includes most of the emails of US citizens. Binney disclosed in an affidavit for Jewel v. NSA[17] that the agency was “purposefully violating the Constitution”.[6] Binney also notes that he found out after retiring that the NSA was pursuing collect-it-all vs. targeted surveillance even before the 9/11 attacks.
Binney was invited as a witness by the NSA commission of the German Bundestag. On July 3, 2014 the Spiegel wrote, he said that the NSA wanted to have information about everything. In Binney’s view this is a totalitarian approach, which had previously been seen only in dictatorships.[18] Binney stated the goal was also to control people. Meanwhile, he said it is possible in principle to survey the whole population, abroad and in the US, which in his view contradicts the United States Constitution. In October 2001, shortly after the 9/11 attacks, the NSA began with its mass surveillance, he said. Therefore, he left the secret service shortly afterwards, after more than 30 years of employment. Binney mentioned that there were about 6000 analysts in the surveillance at NSA already during his tenure. According to him, everything changed after 9/11. The NSA used the attacks as a justification to start indiscriminate data collection. “This was a mistake. But they still do it”, he said. The secret service was saving the data as long as possible: “They do not discard anything. If they have anything they keep it.” Since then, the NSA has been saving collected data indefinitely. Binney said he deplored the NSA’s development of the past few years, to collect data not only on groups who are suspicious for criminal or terrorist activities. “We have moved away from the collection of these data to the collection of data of the 7 billion people on our planet.” Binney said he argued even then, to only pull relevant data from the cables. Access to the data was granted to departments of the government or the IRS.[18]
In August 2014 Binney was among the signatories of an open letter by the group Veteran Intelligence Professionals for Sanity to German chancellor Angela Merkel in which they urged the Chancellor to be suspicious of U.S. intelligence regarding the alleged invasion of Russia in Eastern Ukraine.[19][20]
“An especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors.”[1]
Status
Active
Statistics
Established
1960
First awarded
1960
Distinct
recipients
unknown; an average of fewer than 11 per year since 1993 [2]
Service ribbon of the Presidential Medal of Freedom
(left: Medal with Distinction)
The Presidential Medal of Freedom is an award bestowed by the President of the United States and is—along with the comparable Congressional Gold Medal, bestowed by an act of U.S. Congress—the highest civilian award of the United States. It recognizes those individuals who have made “an especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors”.[3] The award is not limited to U.S. citizens and, while it is a civilian award, it can also be awarded to military personnel and worn on the uniform.
It was established in 1963 and replaced the earlier Medal of Freedom that was established by President Harry S. Truman in 1945 to honor civilian service duringWorld War II.
History of the award
Similar in name to the Medal of Freedom,[3] but much closer in meaning and precedence to the Medal for Merit: the Presidential Medal of Freedom is currently the supreme civilian decoration in precedence, whereas the Medal of Freedom was inferior in precedence to the Medal for Merit; the Medal of Freedom was awarded by any of three Cabinet secretaries, whereas the Medal for Merit was awarded by the president, as is the Presidential Medal of Freedom. Another measure of the difference between these two similarly named but very distinct awards is their per-capita frequency of award: from 1946 to 1961 the average annual incidence of award of the Medal of Freedom was approximately 1 per every 86,500 adult U.S. citizens; from 1996 to 2011 the average annual incidence of award of the Presidential Medal of Freedom was approximately 1 per every 20,500,000 adult U.S. citizens (so on an annualized per capita basis, 240 Medals of Freedom have been awarded per one Presidential Medal of Freedom).[2][4]
President John F. Kennedy established the current decoration in 1963 through Executive Order11085, with unique and distinctive insignia, vastly expanded purpose, and far higher prestige.[1] It was the first U.S. civilian neck decoration and, in the grade of Awarded With Distinction, is the only U.S. sash and star decoration (the Chief Commander degree of the Legion of Merit – which may only be awarded to foreign heads of state – is a star decoration, but without a sash). The Executive Order calls for the medal to be awarded annually on or around July 4, and at other convenient times as chosen by the president,[5] but it has not been awarded every year (e.g., 2001, 2010). Recipients are selected by the president, either on his own initiative or based on recommendations. The order establishing the medal also expanded the size and the responsibilities of the Distinguished Civilian Service Awards Board so it could serve as a major source of such recommendations.
Medal andaccoutrementsincluding undress ribbon, miniature, and lapel badge.
Graphical representation of the Presidential Medal of Freedom with Distinction
The badge of the Presidential Medal of Freedom is in the form of a golden star with white enamel, with a red enamel pentagon behind it; the central disc bears thirteen gold stars on a blue enamel background (taken from the Great Seal of the United States) within a golden ring. Golden American bald eagles with spread wings stand between the points of the star. It is worn around the neck on a blue ribbon with white edge stripes.
A special grade of the medal, known as the Presidential Medal of Freedom with Distinction,[6] has a larger execution of the same medal design worn as a star on the left chest along with a sash over the right shoulder (similar to how the insignia of a Grand Cross is worn), with its rosette (blue with white edge, bearing the central disc of the medal at its center) resting on the left hip. When the medal With Distinction is awarded, the star may be presented depending from a neck ribbon and can be identified by its larger size than the standard medal (compare size of medals in pictures below; President Reagan’s was awarded With Distinction).
Both medals may also be worn in miniature form on a ribbon on the left chest, with a silver American bald eagle with spread wings on the ribbon, or a golden American bald eagle for a medal awarded With Distinction. In addition, the medal is accompanied by a service ribbon for wear on military service uniform, a miniature medal pendant for wear on mess dress or civilian formal wear, and a lapel badge for wear on civilian clothes (all shown in the accompanying photograph of the full presentation set).
Gordon B. Hinckleyreceiving the Presidential Medal of Freedom from George W. Bush in 2004
Chita Rivera with President Barack Obamaprior to receiving the Presidential Medal of Freedom, August 2009
President Barack Obama talks with Stephen Hawking in the Blue Room of the White House before a ceremony presenting him and 15 others the Presidential Medal of Freedom, August 12, 2009.
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Published on Dec 30, 2013
Through a PRISM, Darkly
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.
Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english
Glenn Becks “SURVEILLANCE STATE”
Inside the NSA
Ed Snowden, NSA, and Fairy Tales
AT&T Spying On Internet Traffic
For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”
NSA Whistle-Blower Tells All – Op-Docs: The Program
The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Benny – The Government is Profiling You (The NSA is Spying on You)
‘After 9/11 NSA had secret deal with White House’
The story of Whistleblower Thomas Drake
Whistleblowers, Part Two: Thomas Drake
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Meet Edward Snowden: NSA PRISM Whistleblower
The Truth About Edward Snowden
N.S.A. Spying: Why Does It Matter?
Inside The NSA~Americas Cyber Secrets
NSA Whistleblower Exposes Obama’s Dragnet
AT&T whistleblower against immunity for Bush spy program-1/2
AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program
The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.
AT&T whistleblower against immunity for Bush spy program-2/2
Enemy Of The State 1998 (1080p) (Full movie)
Background Articles and Videos
Stellar Wind
Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]
The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]
There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]
During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]
In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.
PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1]PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]
According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]
History
Slide showing that much of the world’s communications flow through the US
Details of information collected via PRISM
PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]
PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]
The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]
According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]
Response from companies
The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]
Initial Public Statements
Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]
Slide listing companies and the date that PRISM collection began
Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]
In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13]The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]
“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]
Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]
On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]
The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]
While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]
Post-PRISM Transparency Reports
In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.
On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000” user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]
Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]
Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]
Response from United States government
Executive branch
Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]
Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]
On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]
The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]
The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]
In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]
Legislative branch
In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:
Senator John McCain (R-AZ)
June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee
June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]
Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee
June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]
Representative John Boehner (R-OH), Speaker of the House of Representatives
June 11 “He’s a traitor”[50] (referring to Edward Snowden)
Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act
June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]
Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.
June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]
Senator Mark Udall (D-CO)
June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]
Representative Todd Rokita (R-IN)
June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]
Senator Rand Paul (R-KY)
June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]
Representative Luis Gutierrez (D-IL)
June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]
Judicial branch
The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.
Applicable law and practice
On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]
After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.
If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]
If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]
Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]
The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]
Involvement of other countries
Australia
The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]
Canada
Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]
Germany
Germany did not receive any raw PRISM data, according to a Reuters report.[59]
Israel
Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.
New Zealand
In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]
United Kingdom
In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]
Domestic response
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)
The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]
Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]
In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]
In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]
The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]
On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]
International response
Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]
Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]
Protests at Checkpoint Charlie in Berlin
The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]
The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]
William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]
Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]
Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]
Russia has offered to consider an asylum request from Edward Snowden.[91]
Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]
A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]
A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]
Background
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]
Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]
The new project replacing Trailblazer is called Turbulence.[3]
Whistleblowing
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]
Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]
In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]
Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.
Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]
History
Slide showing that much of the world’s communications flow through the US.
Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]
NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]
Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]
Technology
According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]
Legality and FISA Amendments Act of 2008
The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]
The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]
Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]
The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
the Government Communications Headquarters of the United Kingdom,
the National Security Agency of the United States,
the Communications Security Establishment of Canada,
the Defence Signals Directorate of Australia, and
the Government Communications Security Bureau of New Zealand.
the National SIGINT Organisation (NSO) of The Netherlands
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]
Capabilities
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]
Controversy
See also: Industrial espionage
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
Hardware
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]
Name
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]
Ground stations
The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
Hong Kong (since closed)
Australian Defence Satellite Communications Station (Geraldton, Western Australia)
Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
Misawa Air Base (Japan) Map
GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
Sugar Grove (West Virginia, U.S.) Map
Yakima Training Center (Washington, U.S.) Map
GCSB Waihopai (New Zealand)
GCSB Tangimoana (New Zealand)
CFS Leitrim (Ontario, Canada)
Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
Ayios Nikolaos (Cyprus – U.K.)
BadAibling Station (BadAibling, Germany – U.S.)
relocated to Griesheim in 2004[19]
deactivated in 2008[20]
Buckley Air Force Base (Aurora, Colorado)
Fort Gordon (Georgia, U.S.)
Gander (Newfoundland & Labrador, Canada)
Guam (Pacific Ocean, U.S.)
Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
Lackland Air Force Base, Medina Annex (San Antonio, Texas)
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]
Description
Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]
The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]
The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.
Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.
Lawsuit
Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]
More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.
PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States
Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security.[7] The data mostly comes from the NSA, FBI, CIA, as well as other government sources.[7]
Carnivore: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight
Intelligence Community (IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct espionage
Story 1: Obama’s House Organ The Shrinking Readership New York Times Reveals Obama Angry With Israeli Prime Minister Benjamin Netanyahu — No News Here — Obama’s Failed Foreign Policy Requires U.S. To — Bomb Bomb Bomb Islamic State and Iran — A Twofer — Bombs Away — Beach Boys — Videos
Dr. Strangelove: Major Kong Rides The Bomb 1080p
Beach Boys Good Vibrations
The Beach Boys – Help Me Rhonda
Beach Boys ” I Get Around ” Live 1964
US Senate committee approves bill for further sanctions on Iran
White House says fresh Iran sanctions “unconstructive”
Boehner Invite of Netanyahu Debated by Fox News Sunday Panel
White House furious over Netanyahu and Boehner meeting
Krauthammer On How Israel Tension Raises Questions On Iran
Obama And Netanyahu Are In Awkward New Territory
GOP Leadership’s Invitation to Netanyahu a Provocation Aimed at War with Iran
White House: Obama will not sit down with Netanyahu
Israeli PM Netanyahu: U.S. is Number 1 Target to ISIS
John Bolton: Iranian President Rouhani is playing Obama like a “violin”
FLASHBACK : Obama rejects Netanyahu snubs meeting with the Israeli Prime Minister (Sept 11, 2012)
The Obama administration is angry with Israel. Here’s the administration’s house organ, the New York Times, this morning:
The Obama administration, after days of mounting tension, signaled on Wednesday how angry it is with Israel that Prime Minister Benjamin Netanyahu accepted Republican leaders’ invitation to address Congress on Iran without consulting the White House.
The outrage the episode has incited within President Obama’s inner circle became clear in unusually sharp criticism by a senior administration official who said that the Israeli ambassador, Ron Dermer, who helped orchestrate the invitation, had repeatedly placed Mr. Netanyahu’s political fortunes above the relationship between Israel and the United States.
The official who made the comments to The New York Times would not be named…
Of course, the official who last summer called Prime Minister Netanyahu a “coward” and a “chickens–t” would not be named either. But there is no reason to think those unnamed angry officials do not speak for an angry president.
The Obama White House usually prides itself on not getting angry. Its self-image is that it’s cool, calm, and collected. And it doesn’t get angry at, for example, the Islamic Republic of Iran. The Obama White House understands and appreciates the complexities of the Islamic Republic’s politics and history. It is only with respect to the Jewish state that the Obama White House is impatient, peremptory, and angry.
Why has Obama been lashing out? Because he had a dream. He was to be the American president who would preside at, and take credit for, the founding of a Palestinian state. Obama would be to Palestine what Harry Truman was to Israel. Now it’s clear that’s not going to happen during his presidency. Obama’s frustrated that it’s not going to happen. So he lashes out.
But Obama is still pursuing another dream: to be the American president who goes to Tehran, who achieves with Iran what Richard Nixon achieved with China. And he thinks Israel, and Israel’s friends in the United States, stand in the way of achieving that dream. So he has another reason to be angry.
Of course, it’s not Israel but reality that stands in the way of Obama’s dreams. His Cairo speech, and the policies that followed from it, have crashed on the shoals of reality. Obama said in Cairo in June 2009, that he hoped that his administration would end the “cycle of suspicion and discord” between the United States and much of the Muslim world:
I have come here to seek a new beginning between the United States and Muslims around the world; one based upon mutual interest and mutual respect; and one based upon the truth that America and Islam are not exclusive, and need not be in competition. Instead, they overlap, and share common principles – principles of justice and progress; tolerance and the dignity of all human beings. …
There must be a sustained effort to listen to each other; to learn from each other; to respect one another; and to seek common ground. As the Holy Koran tells us, “Be conscious of God and speak always the truth.”
But the truth is that Obama’s policies haven’t ameliorated the crisis in Islam or lessened the discord between Islam and the West. They have worsened the discord and exacerbated the crisis. Obama’s policies of retreat have strengthened radical Islam, and undermined those in the Muslim world who do believe in “justice and progress; tolerance and the dignity of all human beings.”
It is Obama’s failures that explain his anger—his failures, and his hopes that a breakthrough with Iran could erase the memories of failure and appear to vindicate his foreign policy. Israel stands in the way, he thinks, of this breakthrough. Prime Minister Netanyahu stands in the way. And so Obama lashes out.
It’s of course unseemly. But it’s also dangerous. Neville Chamberlain and the British establishment were far angrier with Winston Churchill, and much harsher in their attempts to discredit him, in the late 1930s when the dreams of appeasement were failing, than earlier, when hope for the success of appeasement was alive. When you think your policies are going to be vindicated, you ignore or dismiss critics. It’s when you suspect and fear imminent failure that you lash out.
So we have an angry president, increasingly desperate for vindication of his failed foreign policy, accelerating both his appeasement of Iran and his attacks on Israel. The good news is that the Republican party and the conservative movement—and most of the American people—stand with Israel and against President Obama. Of major parts of the American Jewish community, on the other hand, one can say no such thing.
G.O.P.’s Invitation to Netanyahu Is Aiding Obama’s Cause on Iran
President Obama’s relations with Democrats on Capitol Hill have never been especially close. But one man is helping to bring them a little closer together: Benjamin Netanyahu.
For months, the issue of imposing sanctions on Iran split many Democrats from the president, as they feared his posture was emboldening the government in Tehran to further develop itsnuclear program. But Mr. Netanyahu’s planned speech, a provocation of the president that many Democrats found distasteful and undiplomatic, has helped shift the political dynamic.
“For the prime minister to accept made it extremely political, knowing how the invitation played out,” said Senator Joe Manchin III, Democrat of West Virginia and a frequent critic of the White House. Mr. Manchin was one of 10 Democrats who signed a letter agreeing not to vote on a sanctions bill until after the March 24 deadline to have a framework of an agreement in place with the Iranians.
Senator Joe Manchin III, Democrat of West Virginia, found the invitation to Benjamin Netanyahu off-putting.CreditDoug Mills/The New York Times
Speaker John A. Boehner’s decision to invite Mr. Netanyahu, and the prime minister’s decision to accept without consulting the Obama administration, Mr. Manchin added, struck some Democrats, like him, as off-putting.
“It didn’t show a lot of class,” Mr. Manchin said. “If it had been George W. Bush or Reagan or Clinton or whoever, protocol is protocol.”
The invitation proved to be opportune for Mr. Obama, who had been making steady progress in persuading Democrats to delay a vote on sanctions to give him some diplomatic breathing room.
The president had been “changing minds,” said Senator Chris Murphy, Democrat of Connecticut.
“I don’t think the invitation has been helpful to the debate in Congress,” Mr. Murphy added, saying he believed Mr. Netanyahu’s speech would only further politicize an issue that should be above partisanship. “My worry all along has been that Republicans are going to oppose this deal simply because it’s President Obama’s deal, and the invitation to Netanyahu confirms that there are some Republicans who simply put politics ahead of what’s best for the country.”
Other Democrats were also quickly lining up behind the president. A group of House Democrats will formally ask Mr. Boehner to delay his invitation to the prime minister until after the March deadline passes. Three Democratic representatives were circulating a letter to the speaker among their colleagues on Wednesday. It was already picking up additional signatures.
The letter accuses the speaker of harming American foreign policy and undermining Mr. Obama. “As members of Congress who support Israel, it appears that you are using a foreign leader as a political tool against the president,” said the letter, which was signed by Representatives Keith Ellison of Minnesota, Steve Cohen of Tennessee and Maxine Waters of California. “When the Israeli prime minister visits us outside the specter of partisan politics,” the letter continued, “we will be delighted and honored to greet him or her on the floor of the House.”
Getting lawmakers to go on the record criticizing the prime minister will be complicated, however, because many Democrats fear antagonizing Mr. Netanyahu, the powerful pro-Israeli interests aligned with him, and Jewish voters in their districts.
MULTIMEDIA FEATURE
Timeline on Iran’s Nuclear Program
Whether Iran is racing toward nuclear weapon capabilities is one of the most contentious foreign-policy issues challenging the West.
“There’s a lot of people who agree with this letter,” Mr. Ellison said. “Some will put their name on it. Some won’t. But the bottom line is, I haven’t run into anyone on our side who thinks this is a good idea.”
The issue is delicate. Senator Robert Menendez of New Jersey, the senior Democrat on the Foreign Relations Committee and an ardent defender of sanctions against Iran, insisted Wednesday that Mr. Netanyahu’s speech was not a factor in his decision not to press for an immediate vote.
“It had absolutely no effect,” he said.
Mr. Menendez made the surprising announcement on Tuesday that he and a group of nine other Democrats had written to the president to inform him that they would not vote for a sanctions bill before the March 24 deadline. It was a striking step back for a senator who last week likened the administration’s statements on the negotiations to “talking points that come straight out of Tehran.”
Democrats said they saw two political issues in play. Domestically, Mr. Boehner and Republicans want to press their point that Mr. Obama’s foreign policy is weak. And in Israel, which holds its elections March 17, Mr. Netanyahu has political incentive to present himself as a man of steely resolve.
The perception that Republicans and Mr. Netanyahu are approaching the debate over sanctions in an overtly political way has helped those who are opposed to further sanctions make their case, Democrats said.
“It’s been building for days,” said Greg Rosenbaum, the chairman of the National Jewish Democratic Council, speaking about efforts to persuade Democrats to offer the president more flexibility. “But it really let loose this week.”
Typically, policy on Israel has been one area where both political parties agree. And some observers said they feared the Netanyahu-Boehner episode was eroding that.
“When that sense of mutual values and interest starts to be driven apart by partisan politics,” said Jeremy Ben-Ami, the president of J Street, an Israeli advocacy group, “it works to the long-term harm of the state of Israel.”
Story 1: White House Throws Toga Party For Emperor Obama At Caesar’s Palace Only Democrats Invited– Emperor Obama Has No Clothes — Congress Throws Parade Thanks Obama — Twist and Shout Republicans Dance In The Streets — Videos
toga! toga! toga! Animal House
Animal House
Ferris Bueller’s Twist And Shout
President Obama’s speech on immigration
Ted Cruz: We Are Witnessing A Constitutional Crisis • Kelly File
Krauthammer on Obama’s ‘flagrant assault’ on Constitution Fox News Video
Kurtz: Why broadcast networks are skipping Obama’s speech
O’Reilly to Jose Antonio Vargas: ‘You Don’t Have an Entitlement to Be Here’
Metro Detroit residents react to President Obama’s immigration plans
Locals, Governor Walker react to President Obama’s immigration address
USA: White House asked if Obama thinks he’s ’emperor’ of the US
A Message Before the President’s Immigration Speech
‘Decimating Law Enforcement’: Sessions Slams Obama
Obama: I Am Not A Dictator – 3/1/2013
Obama: The Problem Is … I’m Not the Emperor of the United States
President Obama’s Tea Party ‘Cousin’ Dr.Milton Wolf Wants to Stop Him From ‘Destroying America’
EXPLAINED: Why Obama is Authorizing up to 5 Million Illegals
Obama’s Executive Order on Immigration Is Unlikely to Include Health Benefits
BREAKING TODAY: Obama to Give 5 MILLION “Undocumented Immigrants” Amnesty!
Oath of office of the President of the United States
“I do solemnly swear (or affirm) that I will faithfully execute the Office of President of the United States, and will to the best of my Ability, preserve, protect and defend the Constitution of the United States.”
The Constitution of the United States
Excerpts
Article. I.
Section. 1.
All legislative Powers herein granted shall be vested in aCongress of the United States, which shall consist of a Senate and House of Representatives.
Article. 2.
Section. 1.
The executive Powershall be vested in aPresident of the United States of America. He shall hold his Office during the Term of four Years, and, together with the Vice President, chosen for the same Term, be elected, as follows
Section. 3.
He shall from time to time give to the Congress Information of the State of the Union, and recommend to their Consideration such Measures as he shall judge necessary and expedient; he may, on extraordinary Occasions, convene both Houses, or either of them, and in Case of Disagreement between them, with Respect to the Time of Adjournment, he may adjourn them to such Time as he shall think proper; he shall receive Ambassadors and other public Ministers; he shall take Care that the Laws be faithfully executed, and shall Commission all the Officers of the United States.
Section. 4.
The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors.
Article. IV.
Section. 4.
The United States shall guarantee to every State in this Uniona Republican Form of Government, and shallprotect each of them against Invasion; and on Application of the Legislature, or of the Executive (when the Legislature cannot be convened), against domestic Violence.
GOP senator warns of violence after immigration order
Susan Page
Oklahoma Sen. Tom Coburn warns there could be not only a political firestorm but acts of civil disobedience and even violence in reaction to President Obama’s executive order on immigration Thursday.
“The country’s going to go nuts, because they’re going to see it as a move outside the authority of the president, and it’s going to be a very serious situation,” Coburn said on Capital Download. “You’re going to see — hopefully not — but you could see instances of anarchy. … You could see violence.”
Coburn, 66, is a conservative Republican but one who has a personal relationship with Obama. They entered the Senate in the same class, elected in 2004, and the new senators from opposite ends of the political spectrum and their spouses immediately hit it off at an orientation dinner. Last year, the president wrote a tribute in Time magazine to Coburn as “someone who speaks his mind (and) sticks to his principles.”
“I really like the guy,” Coburn, 66, told USA TODAY’s weekly video newsmaker series Wednesday. “I thought he’s neat, and I think Michelle’s a neat lady.”
That history gives Coburn’s stark assessment a special sting. On immigration, he accuses Obama of acting like “an autocratic leader that’s going to disregard what the Constitution says and make law anyway.” He says changes in immigration policy require passage by Congress, not just the president’s signature — a charge the White House disputes and on which legal experts disagree.
“Instead of having the rule of law handling in our country today, now we’re starting to have the rule of rulers, and that’s the total antithesis of what this country was founded on,” Coburn says. “Here’s how people think: Well, if the law doesn’t apply to the president … then why should it apply to me?”
Coburn, who also served three terms in the House of Representatives, is retiring two years before his second Senate term is up as he battles a recurrence of cancer. He has been a leading deficit hawk, nicknamed “Dr. No” for his steadfast opposition to spending and his blunt-spoken manner.
Though he says both parties deserve some of the blame for Washington’s dysfunction, he argues that the president has the ability to chart a different path. Solid Republican control of Congress in the wake of this month’s midterm elections could make it easier to deal with an issue such as the structural problems associated with the deficit. Making the compromises necessary for that “requires divided government,” he says.
“If I were in his office, I’d say, if you want to have a successful second term, dig down, swallow your pride, get what you can get, compromise on everything you can for the best interests of the country,” he says. “Bring us back together.”
WASHINGTON (AP) — President Barack Obama is poised to claim broad authority to grant work permits to millions of immigrants living illegally in the United States and to protect them from deportation. But Republicans are vowing an all-out fight against it.
“Congress will act,” Senate Minority Leader Mitch McConnell warned on the Senate floor Thursday, hours before Obama’s 8 p.m. EST address.
Obama “will come to regret” his action, McConnell said. “We’re considering a variety of options. But make no mistake. When the newly elected representatives of the people take their seats, they will act.”
Obama’s measures could make as many as 5 million people eligible for work permits, with the broadest action likely aimed at extending deportation protections to parents of U.S. citizens and permanent residents, as long as those parents have been in the country for at least five years.
Other potential winners under Obama’s actions would be young immigrants who entered the country illegally as children but do not now qualify under a 2012 directive from the president that’s expected to be expanded. Changes also are expected to law enforcement programs and business visas.However, the plan would leave the fate of millions more unresolved. With more than 11 million immigrants living in the country illegally, Obama’s actions would not offer specific protections to more than half.
Still, Obama was expected to ensure that many of those not covered — immigrants who have lived illegally in the U.S. for 10 years or more or parents of citizens or permanent residents who have been in the country fewer than five years — would be given a lower priority for deportation, essentially sanctioning what is already current practice.
“What I’m going to be laying out is the things that I can do with my lawful authority as president to make the system better, even as I continue to work with Congress and encourage them to get a bipartisan, comprehensive bill that can solve the entire problem,” Obama said in a video posted Wednesday on Facebook.
On Thursday, Obama discussed the need for an overhaul of the immigration system in the context of science and technology, saying the U.S. benefits from innovations and discoveries by scientists and researchers who come here to pursue their work.
“Part of staying competitive in a global economy is making sure we have an immigration
system that doesn’t send away talent but attracts it,” Obama said at a White House ceremony recognizing achievements in science, technology and innovation. “So that’s what I’ll be talking about a little bit tonight.”But the vehement reactions of Republicans, who will have control of Congress come January, made clear that Obama was courting a serious partisan confrontation.
Some on the right pushed for using must-pass spending legislation to try to stop Obama’s effort. One lawmaker — Republican Rep. Mo Brooks of Alabama — raised the specter of impeachment.
Party leaders warned against such talk and sought to avoid spending-bill tactics that could lead to a government shutdown. They said such moves could backfire, alienating Hispanic voters and others.
In a closed-door meeting with other Senate Republicans, McConnell urged restraint. Still, there were concerns among some Republicans that the potential 2016 presidential candidates in the Senate would use the announcement to elevate their standing, challenging Obama directly.
And as far-reaching as Obama’s steps would be, they fall far short of what a comprehensive immigration overhaul passed by the Senate last year would have accomplished. The House never voted on that legislation. It would have set tougher border security standards, increased caps for visas for foreign high-skilled workers and allowed the 11 million immigrants illegally in the country to obtain work permits and begin a 10-year path toward green cards and, ultimately, citizenship.
“This is not the way we want to proceed. It will not solve the problem permanently,” White House communications director Jennifer Palmieri said Thursday on MSNBC.
None of those affected by Obama’s actions would have a direct path to citizenship, and his actions could be reversed by a new president after he leaves office. Moreover, officials said the eligible immigrants would not be entitled to federal benefits — including health care tax credits — under Obama’s plan.
Some immigrant advocates worried that even though Obama’s actions would make millions eligible for work permits, not all would participate out of fear that Republicans or a new president would reverse the executive orders.
“If the reaction to this is that the Republicans are going to do everything they can to tear this apart, to make it unworkable, the big interesting question will be, will our folks sign up knowing that there is this cloud hanging over it,” said Janet Murguia, president and CEO of the National Council of La Raza.
Still, Democrats battered by election losses two weeks ago welcomed Obama’s steps.
“The last two weeks haven’t been great weeks for us,” said Rep. Joe Crowley of New York, one of 18 congressional Democrats who had dinner Wednesday night with Obama. “The president is about to change that.”
Story 1: Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos
Stuff They Don’t Want You to Know – Dirty Tricks: Agent Provocateur
Preparing for violence in Missouri
Ferguson Nervously Awaits Grand Jury Decision
How police Agent Provocateur frame people
Provocateur Caught Throwing Bricks At Ferguson Police
John Sayles on New FBI Rules & Role of Agent Provocateurs in Disrupting Social Movements
FBI Warns of Ferguson Violence from ‘Extremists’ After Grand Jury Decision
Ferguson braces for grand jury decision
Biracial couple: We’re staying in Ferguson
Snipers Take Aim and Push Infowars Reporters
Combat Vet Ferguson Missouri Has Turned Into Fallujah Iraq
Infowars Shatters Multiple Mainstream Media Lies in Ferguson, MO
Infowars Recounts Ferguson Police State
Missouri Deploys National Guard
Occupy LA – Police Provocateurs Confirmed
Occupy LA has become victim to police provocateur (under cover cops causing violence) much like other cities around the world. What to look for:
The same boots,
black masks
black backpacks,
specific type of black bandana.
Police Provocateurs are not smart, and they are easy to spot. Do not let your 1st amendment rights be trampled by corrupt police.
LAPD Infiltrators and Agent Provocateurs Targeted Left and Panthers – Johnston on RAI – (2/4)
The Deep State and the Power of Billionaires – David Cay Johnston on Reality Asserts Itself (3/4)
Ferguson on the edge: RT America special on eve of grand jury ruling
Michael Brown Protests Turns Into RIOT…LOOTINGS…VIOLENCE(RIOT Police Called In)
Ferguson, Missouri LOOTERS Target FOOT LOCKER…FAMILY DOLLAR …RIMS… BURNS Down QUICKTRIP!!
Violence erupts in Ferguson
COINTELPRO 101 – The Sabotage Of Legitimate Dissent
Activists Who Stole FBI Documents in 1971 Revealing COINTELPRO Speak Out
Betty Medsger “The Burglary”
TREASON 101 FBI Cointelpro
COINTELPRO: The FBI’s War on Black America
BUSTED! Proof Missouri Riots Were Obama’s Attempt To Implement A Martial Law Police State!
FBI Agent Provocateur Suggested Terror Attack at Mosque
FBI – Don’t post that or I’ll be “livid”
Return of the Ferguson War Zone? Missouri Enacts State of Emergency Ahead of Mike Brown Grand Jury
Missouri Gov. Jay Nixon has declared a state of emergency in advance of the grand jury’s pending decision in the Michael Brown shooting case. On Monday, Nixon issued an executive order to activate the state’s National Guard in response to what he called “the possibility of expanded unrest.” Nixon cited the protests in Ferguson and the St. Louis area since Brown, an unarmed black teenager, was killed by police officer Darren Wilson on August 9. The grand jury has been meeting for nearly three months, and protests are expected to escalate if they choose not to indict. But while state officials say they fear violence, protesters say they fear a return to the militarized crackdown that turned their community into a war zone. As the grand jury nears a decision and all sides prepare for the unknown under a state of emergency, we are joined by two guests: Jeff Smith, a New School professor and former Missouri state senator whose new book is “Ferguson: In Black and White,” and Montague Simmons, chair of the St. Louis-based Organization for Black Struggle and a key organizer in the movement that has emerged since Brown’s killing.
Under Obama, U.S. personal freedom ranking slips below France
U.S. Secrets: Classified Intelligence, CIA,FBI,NSA,Secret Service, Edward Snowden
#Ferguson Protest Group Releases List of Targets, Including: Anheuser Busch, Boeing, Emerson Electric, Airport
Posted by Jim Hoft on Monday, November 17, 2014, 11:28 AM
The No Indictment.org Ferguson protest group released its list of potential targets following the decision by the St. Louis County Courthouse on the Mike Brown case.
The published map shows expected landmarks like the Ferguson City Hall and the County Courthouse.
But it also marks things that have NOTHING to do with the Michael Brown situation, like Anheuser Busch and Boeing.
Most telling thing is the mark for Emerson Electric. Emerson has been in Ferguson for at least 50 years, long before Ferguson became a minority municipality. Yet not only do they mark Emerson they make note of the CEO’s salary. Maybe they’re mutating into an extortion group straight out of the playbook of Jesse Jackson’s Rainbow Push Coalition?
The Ferguson Mike Brown protesters are not ruling out violence or looting.
“Rioting and looting are the tools of those without a voice. The rioting and looting, while I didn’t participate in it, was necessary. Without it we would not be standing here today.”
In preparation for a no-indictment decision, here is the important information to know.
On August 9, 2014, Mike Brown was killed by Officer Darren Wilson. For nearly 100 days, we have protested to demand an indictment. We are hopeful that Darren Wilson will be indicted for murder, but the recent signs do not seem that this outcome is likely.
We will update this page daily with key information regarding post indictment decision announcement planning. And this isn’t meant to replace twitter or the newsletter, but to be a central space for information that can be updated in real-time.
Here is a map of possible protest spaces. Remember, we actively advocate and profess the importance of peaceful protest. We do not support, condone, or encourage violence.
Safe Spaces
These are spaces to escape police violence, get updated on protest plans and all are located near protest zones.
Shaw: St. John’s Episcopal Church, 3664 Arsenal, 63166
Ferguson: Greater St. Mark’s Church, 9950 Glen Owen Drive, 63136
Clayton: Veterans for Peace Office, 216 S. Meramec Ave., 63105
Day of Non-Indictment Decision Announcement
On the day of the non-indictment announcement, protestors are gathering at the #Ferguson PD Lot and at VonDerrit’s memorial site in Shaw.
Day AFTER Non-Indictment Decision Announcement
On the day AFTER the non-indictment announcement, protestors are gathering in Clayton. More information is forthcoming.
Grand Jury Announcement Text Alert
Click here to sign up to receive a text alert when the Grand Jury makes its decision regarding the killing of Michael Brown Jr. (Here’s the direct link: http://bit.ly/GJText)
Lawyers, Legal Workers, and Law Students — The Ferguson Legal Defense Fund, a coalition of St. Louis lawyers and firms, has issued an emergency call to action to find volunteers to assist with legal representation, jail supports and visits, legal research, legal observation, and legal observation and training. Click here to learn more and to volunteer.
Nationwide Actions Planned
Click here to learn more about the actions planned across the country in the event of a non-indictment. Actions are currently planned in 50+ cities across America.
Protest Preparation
For a primer and re-cap of the direct action trainings, click here to access the core materials. More information will be posted in the coming days.
Support With Safe House Supplies
All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.
FBI Warns Ferguson Decision ‘Will Likely’ Lead to Violence By Extremists Protesters
By MIKE LEVINE, PIERRE THOMAS, JACK DATE and JACK CLOHERTY
As the nation waits to hear whether a Missouri police officer will face charges for killing unarmed teenager Michael Brown in Ferguson, Mo., the FBI is warning law enforcement agencies across the country that the decision “will likely” lead some extremist protesters to threaten and even attack police officers or federal agents.
Peaceful protesters could be caught in the middle, and electrical facilities or water treatment plants could also become targets. In addition, so-called “hacktivists” like the group “Anonymous” could try to launch cyber-attacks against authorities.
“The announcement of the grand jury’s decision … will likely be exploited by some individuals to justify threats and attacks against law enforcement and critical infrastructure,” the FBI says in an intelligence bulletin issued in recent days. “This also poses a threat to those civilians engaged in lawful or otherwise constitutionally protected activities.”
“Those infiltrating and exploiting otherwise legitimate public demonstrations with the intent to incite and engage in violence could be armed…”
The FBI bulletin expresses concern only over those who would exploit peaceful protests, not the masses of demonstrators who will want to legitimately, lawfully and collectively express their views on the grand jury’s decision.
The bulletin “stresses the importance of remaining aware of the protections afforded to all U.S. persons exercising their First Amendment rights of freedom of speech and freedom of assembly.”
Within hours of the FBI issuing its bulletin, some police departments across the country issued their own internal memos urging officers to review procedures and protocols for responding to mass demonstrations.
Still, the bulletin’s conclusions were blunt: “The FBI assesses those infiltrating and exploiting otherwise legitimate public demonstrations with the intent to incite and engage in violence could be armed with bladed weapons or firearms, equipped with tactical gear/gas masks, or bulletproof vests to mitigate law enforcement measures.”
Jeff Roberson/AP Photo
PHOTO: A protester kicks a smoke grenade that had been deployed by police back in the direction of police, Aug. 13, 2014, in Ferguson, Mo.
The bulletin cites a series of recent messages threatening law enforcement, including a message posted online last week by a black separatist group that offered “a $5,000 bounty for the location” of Ferguson police officer Darren Wilson, who fired the shots that killed Brown on Aug. 9.
In interviews with ABC News, police officials said their departments have identified a number of agitators who routinely appear at mass demonstrations.
“How many of those sympathizers are actually sympathizers?” Rick Hite, the chief of the Indianapolis Metropolitan police department, wondered. Many of them see the protests as a way to “chime in with their own personal agenda,” he said.
In its new intelligence bulletin, obtained by ABC News, the FBI says “exploitation” of mass demonstrations “could occur both in the Ferguson area and nationwide.”
“All it takes is one.”
Overall, though, law enforcement officials contacted by ABC News – stretching from Los Angeles to the Atlanta area – remained confident that any protests in their cities would not be tainted by violence.
“We are not expecting any issues in our city,” said Billy Grogan, the chief of police in Dunwoody, Ga., outside Atlanta. “However, we are preparing just in case. I believe most departments are watching the situation closely and are prepared to respond if needed.”
A law enforcement official in Pennsylvania agreed, saying that while authorities there are not enacting any significant new measures they are “monitoring” developments out of Ferguson.
Scott Olson/Getty Images
PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.
In addition, police officials emphasized that efforts to address a big decision like the one pending in Ferguson actually begin well before that decision.
In Indianapolis, police have held two town-hall meetings in the past two months to discuss the Ferguson issue with concerned residents, and meetings like that help build a “bank of trust,” Hite said.
But it’s sometimes hard to build such trust between a community and the law enforcement officers working its streets.
With several recent cases involving allegations of excessive force by police officers, many in African-American communities can’t help but wonder why seemingly routine encounters escalate so dramatically.
Jeff Roberson/AP Photo
PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.
In a recent interview with ABC News, Philadelphia Police Chief Charles Ramsey said people in “communities of color” often “don’t view us as people who really have the right to enforce laws or tell them what to do,” and sometimes it’s because of “the way they’ve seen us conduct ourselves in the past.”
“Not all cops, but all it takes is one,” Ramsey said. “As human beings, we tend to remember the one bad incident, not the 10 good ones that we may have experienced.”
On the other side of the spectrum, there are some uncomfortable facts that may be influencing how some police respond to African-Americans they encounter on routine patrols.
In particular, African-Americans are disproportionally represented in crime. According to the FBI, 4,379 blacks were arrested for murder last year, while 3,799 whites were arrested for murder – even though census numbers show there are six times more whites than blacks in the United States.
But as Ramsey said, crime statistics are no excuse for police bias.
“Protest. But protest peacefully. Have your voices be heard.”
And now a grand jury in Ferguson and federal prosecutors are separately looking into whether that type of bias led to Brown’s death.
It’s unclear whether the facts of the case will lead to any prosecution. Indeed, it seems few pieces of evidence are without dispute.
The day after the encounter that resulted in Brown’s death, St. Louis County Police Chief Jon Belmar told reporters that Brown “physically assaulted” Wilson inside his police car and that “there was a struggle over the officer’s weapon.” At least one shot was fired inside the car, but the fatal shot was fired when both Wilson and Brown were outside the car, according to Belmar. At least one witness said Brown was shot “with his arms up in the air,” while the police claim Wilson fired because Brown was advancing towards him.
Jeff Roberson/AP Photo
PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.
Pressed in September to acknowledge that the Justice Department’s own civil rights investigation may not result in charges, outgoing Attorney General Eric Holder would only say that “at the end of the day, it’s most important that we get it right.”
As for what’s ahead in Ferguson and communities across the country, Ramsey offered this piece of advice: “Protest. But protest peacefully. Have your voices be heard.”
Only Martians, by now, are unaware of the phone and online data scooped up by the National Security Agency (though if it turns out that they are aware, the NSA has surely picked up their signals and crunched their metadata). American high-tech surveillance is not, however, the only kind around. There’s also the lower tech, up-close-and-personal kind that involves informers and sometimes government-instigated violence.
Just how much of this is going on and in how coordinated a way no one out here in the spied-upon world knows. The lower-tech stuff gets reported, if at all, only one singular, isolated event at a time—look over here, look over there, now you see it, now you don’t. What is known about such surveillance as well as the suborning of illegal acts by government agencies, including the FBI, in the name of counterterrorism has not been put together by major news organizations in a way that would give us an overview of the phenomenon. (TheACLU has done by far the best job of compiling reports on this sort of spying on Americans.)
Some intriguing bits about informers and agents provocateurs briefly made it into the public spotlight whenOccupy Wall Street was riding high. But as always, dots need connecting. Here is a preliminary attempt to sort out some patterns behind what could be the next big story about government surveillance and provocation in America.
Two Stories From Occupy Wall Street
The first is about surveillance. The second is about provocation.
On September 17, 2011, Plan A for the New York activists who came to be known as Occupy Wall Street was to march to the territory outside the bank headquarters of JPMorgan Chase. Once there, they discovered that the block was entirely fenced in. Many activists came to believe that the police had learned their initial destination from e-mail circulating beforehand. Whereupon they headed for nearby Zuccotti Park and a movement was born.
The evening before May Day 2012, a rump Occupy groupmarched out of San Francisco’s Dolores Park and into the Mission District, a neighborhood where not so many 1 percenters live, work or shop. There, they proceeded to trash “mom and pop shops, local boutiques and businesses, and cars,” according to Scott Rossi, a medic and eyewitness, who summed his feelings up this way afterward: “We were hijacked.” The people “leading the march tonight,” he added, were
clean cut, athletic, commanding, gravitas not borne of charisma but of testosterone and intimidation. They were decked out in outfits typically attributed to those in the “black bloc” spectrum of tactics, yet their clothes were too new, and something was just off about them. They were very combative and nearly physically violent with the livestreamers on site, and got ignorant with me, a medic, when I intervened.… I didn’t recognize any of these people. Their eyes were too angry, their mouths were too severe. They felt “military” if that makes sense. Something just wasn’t right about them on too many levels.
He was quick to add, “I’m not one of those tin foil hat conspiracy theorists. I don’t subscribe to those theories that Queen Elizabeth’s Reptilian slave driver masters run the Fed. I’ve read up on agents provocateurs and plants and that sort of thing and I have to say that, without a doubt, I believe 100 percent that the people that started tonight’s events in the Mission were exactly that.”
Taken aback, Occupy San Francisco condemned the sideshow: “We consider these acts of vandalism and violence a brutal assault on our community and the 99%.”
Where does such vandalism and violence come from? We don’t know. There are actual activists who believe that they are doing good this way; and there are government infiltrators; and then there are double agents who don’t know who they work for, ultimately, but like smashing things or blowing them up. By definition, masked trashers of windows in Oakland or elsewhere are anonymous. In anonymity, they—and the burners of flags and setters of bombs—magnify their power. They hijack the media spotlight. In this way, tiny groups—incendiary, sincere, fraudulent, whoever they are—seize levers that can move the entire world.
The Sting of the Clueless Bee
Who casts the first stone? Who smashes the first window? Who teaches bombers to build and plant actual or spurious bombs? The history of the secret police planting agents provocateurs in popular movements goes back at least to nineteenth-century France and twentieth-century Russia. In 1905, for example, the priest who led the St. Petersburg’s revolution was some sort of double agent, as was the man who organized the assassination of the czar’s uncle, the grand duke. As it happens, the United States has its own surprisingly full history of such planted agents at work turning small groups or movements in directions that, for better or far more often worse, they weren’t planning on going. One well-documented case is that of “Tommy the Traveler,” a Students for a Democratic Society (SDS) organizer who after years of trying to arouse violent action convinced two 19-year-old students to firebomb an ROTC headquarters at Hobart College in upstate New York. The writer John Schultz reported onlikely provocateurs in Chicago during the Democratic National Convention of 1968. How much of this sort of thing went on? Who knows? Many relevant documents molded in unopened archives, or have been heavily redacted or destroyed.
As the Boston marathon bombing illustrates, there are homegrown terrorists capable of producing the weapons they need and killing Americans without the slightest help from the US government. But historically, it’s surprising how relatively often the gendarme is also a ringleader. Just how often is hard to know, since information on the subject is fiendishly hard to pry loose from the secret world.
Through 2011, 508 defendants in the United States were prosecuted in what the Department of Justice calls “terrorism-related cases.” According to Mother Jones’s Trevor Aaronson, the FBI ran sting operations that “resulted in prosecutions against 158 defendants”—about one-third of the total. “Of that total, forty-nine defendants participated in plots led by an agent provocateur—an FBI operative instigating terrorist action. With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings.”
In Cleveland, on May Day of 2012, in the words of a Rolling Stone exposé, the FBI “turned five stoner misfits into the world’s most hapless terrorist cell.” To do this, the FBI put a deeply indebted, convicted bank robber and bad-check passer on its payroll, and hooked him up with an arms dealer, also paid by the bureau. The FBI undercover man then hustled five wacked-out wannabe anarchists into procuring what they thought was enough C4 plastic explosive to build bombs they thought would blow up a bridge. The bombs were, of course, dummies. The five were arrested and await trial.
What do such cases mean? What is the FBI up to? Trevor Aaronson offers this appraisal:
The FBI’s goal is to create a hostile environment for terrorist recruiters and operators—by raising the risk of even the smallest step toward violent action. It’s a form of deterrence.… Advocates insist it has been effective, noting that there hasn’t been a successful large-scale attack against the United States since 9/11. But what can’t be answered—as many former and current FBI agents acknowledge—is how many of the bureau’s targets would have taken the step over the line at all, were it not for an informant.
Perhaps Aaronson is a bit too generous. The FBI may, at times, be anything but thoughtful in its provocations. It may, in fact, be flatly dopey. COINTELPRO records released since the 1960s under the Freedom of Information Act (FOIA) show that it took FBI Director J. Edgar Hoover until 1968 to discover that there was such a thing as a New Left that might be of interest. Between 1960 and 1968, as the New Left was becoming a formidable force in its own right, the bureau’s top officials seem to have thought that groups like Students for a Democratic Society were simply covers for the Communist Party, which was like mistaking the fleas for the dog. We have been assured that the FBI of today has learned something since the days of J. Edgar Hoover. But of ignorance and stupidity there is no end.
Trivial and Nontrivial Pursuits
Entrapment and instigation to commit crimes are in themselves genuine dangers to American liberties, even when the liberties are those of the reckless and wild. But there is another danger to such pursuits: the attention the authorities pay to nonexistent threats (or the creation of such threats) is attention not paid to actual threats.
Anyone concerned about the security of Americans should cast a suspicious eye on the allocation or simply squandering of resources on wild goose chases. Consider some particulars which have recently come to light. Under the Freedom of Information Act, thePartnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups—during the very time that they were missing actual warnings about actual terrorist actions.
From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places. In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’ ”
Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center, one of seventy-seven coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily. As the investigative journalist Michael Isikoff recently reported, it was not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’ ”
It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber. That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either. The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of… Code Pink and Veterans for Peace.
Public Agencies and the “Private Sector”
So we know that Boston’s master coordinators—its Committee on Public Safety, you might say—were worried about constitutionally protected activity, including its consequences for “commercial and financial sector assets.” Unsurprisingly, the feds worked closely with Wall Street even before the settling of Zuccotti Park. More surprisingly, in Alaska, Alabama, Florida, Mississippi, Tennessee and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations—and vice versa.
Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.” Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.” Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:
• “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”
• “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to…[twenty-two] campus police officials.… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”
• An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on November 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services reported to DSAC on the relationship between OWS and organized labor.”
• DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” It advised corporate employees to dress conservatively, avoid political discussions and “avoid all large gatherings related to civil issues. Even seemingly peaceful rallies can spur violent activity or be met with resistance by security forces.”
• The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.
• In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.” Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’ ”
Sometimes, “intelligence” moves in the opposite direction—from private corporations to public agencies. Among the collectors of such “intelligence” are entities that, like the various intelligence and law enforcement outfits, do not make distinctions between terrorists and nonviolent protesters. Consider TransCanada, the corporation that plans to build the 1,179-mile Keystone-XL tar sands pipeline across the US and in the process realize its “vision to become the leading energy infrastructure company in North America.“ The anti-pipeline group Bold Nebraska filed a successful Freedom of Information Act request with the Nebraska State Patrol and so was able to put TransCanada’s briefing slideshow up online.
So it can be documented in living color that the company lectured federal agents and local police to look into the use of “anti-terrorism statutes” against peaceful anti-Keystone activists. TransCanada showed slides that cited as sinister the “attendance” of Bold Nebraska members at public events, noting “Suspicious Vehicles/Photography.” TransCanada alerted the authorities that Nebraska protesters were guilty of “aggressive/abusive behavior,” citing a local anti-pipeline group that, they said, committed a “slap on the shoulder” at the Merrick County Board Meeting (possessor of said shoulder unspecified). They fingered nonviolent activists by name and photo, paying them the tribute of calling them “’Professionals’ & Organized.” Native News Network pointed out that “although TransCanada’s presentation to authorities contains information about property destruction, sabotage, and booby traps, police in Texas and Oklahoma have never alleged, accused, or charged Tar Sands Blockade activists of any such behaviors.”
Centers for Fusion, Diffusion and Confusion
After September 11, 2001, government agencies at all levels, suddenly eager to break down information barriers and connect the sort of dots that had gone massively unconnected before the Al Qaeda attacks, used Department of Homeland Security funds to start “fusion centers.” These are supposed to coordinate anti-terrorist intelligence gathering and analysis. They are also supposed to “fuse” intelligence reports from federal, state and local authorities, as well as private companies that conduct intelligence operations. According to the ACLU, at least seventy-seven fusion centers currently receive federal funds.
Much is not known about these centers, including just who runs them, by what rules and which public and private entities are among the fused. There is nothing public about most of them. However, some things are known about a few. Several fusion center reports that have gone public illustrate a remarkably slapdash approach to what constitutes “terrorist danger” and just what kinds of data are considered relevant for law enforcement. In 2010, the American Civil Liberties Union of Tennessee learned, for instance, that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents. The letter encourages schools to be supportive of all religious beliefs during the holiday season.” (The map is no longer online.)
So far, the prize for pure fused wordiness goes to a 215-page manual issued in 2009 by theVirginia Fusion Center (VFC), filled with Keystone Kop–style passages among pages that in their intrusive sweep are anything but funny. The VFC warned, for instance, that “the Garbage Liberation Front (GLF) is an ecological direct action group that demonstrates the joining of anarchism and environmental movements.” Among GLF’s dangerous activities well worth the watching, the VFC included “dumpster diving, squatting, and train hopping.”
In a similarly jaw-dropping manner, the manual claimed—the italics are mine—that “Katuah Earth First (KEF), based in Asheville, North Carolina, sends activists throughout the region to train and engage in criminal activity. KEF has trained local environmentalists in non-violent tactics, including blocking roads and leading demonstrations, at action camps in Virginia.While KEF has been primarily involved in protests and university outreach, members have also engaged in vandalism.” Vandalism! Send out an APB!
The VFC also warned that, “although the anarchist threat to Virginia is assessed as low, these individuals view the government as unnecessary, which could lead to threats or attacks against government figures or establishments.” It singled out the following 2008 incidents as worth notice:
• At the Martinsville Speedway, “A temporary employee called in a bomb threat during a Sprint Cup race…because he was tired of picking up trash and wanted to go home.”
• In Missouri, “a mobile security team observed an individual photographing an unspecified oil refinery.… The person abruptly left the scene before he could be questioned.”
• Somewhere in Virginia, “seven passengers aboard a white pontoon boat dressed in traditional Middle Eastern garments immediately sped away after being sighted in the recreational area, which is in close proximity to” a power plant.
What idiot or idiots wrote this script?
Given a disturbing lack of evidence of terrorist actions undertaken or in prospect, the authors even warned:
It is likely that potential incidents of interest are occurring, but that such incidents are either not recognized by initial responders or simply not reported. The lack of detailed information for Virginia instances of monitored trends should not be construed to represent a lack of occurrence.
Lest it be thought that Virginia stands alone and shivering on the summit of bureaucratic stupidity, consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the antiwar movement, a former US Congresswoman, the US Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’ ”
And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies. According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’ ” The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’ ”
Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”
One of these investigations concerned Greenpeace protests planned for ExxonMobil shareholder meetings. (Note: I was on Greenpeace’s board of directors during three of those years.) The inquiry was kept open “for over three years, long past the shareholder meetings that the subjects were supposedly planning to disrupt.” The FBI put the names of Greenpeace members on its federal watch list. Around the same time, an ExxonMobil-funded lobby got the IRS to audit Greenpeace.
This counterintelligence archipelago of malfeasance and stupidity is sometimes fused with ass-covering fabrication. In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department inspector general’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects. The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.
The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor. He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.
The sequel was not quite so droll. The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.
Moreover, at least one fusion center has involved military intelligence in civilian law enforcement. In 2009, a military operative from Fort Lewis, Washington, worked undercovercollecting information on peace groups in the Northwest. In fact, he helped run the Port Militarization Resistance group’s Listserv. Once uncovered, he told activists there were others doing similar work in the Army. How much the military spies on American citizens is unknown and, at the moment at least, unknowable.
Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos—I have some in my own heavily redacted files obtained through an FOIA request—were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case. During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to “Military Surveillance of Civilian Politics, 1967–70,” an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews. They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”
Years later, I met one of these agents, now retired, in San Francisco. He knew more about what I was doing in the late 1960s than my mother did.
Squaring Circles
In 2009, President Obama told the graduating class at the Naval Academy that, “as Americans, we reject the false choice between our security and our ideals.” Security and ideals: officially we want both. But how do you square circles, especially in a world in which “security” has often enough become a stand-in for whatever intelligence operatives decide to do?
The ACLU’s Tennessee office sums the situation up nicely: “While the ostensible purpose of fusion centers, to improve sharing of anti-terrorism intelligence among different levels and arms of government, is legitimate and important, using the centers to monitor protected First Amendment activity clearly crosses the line.” Nationally, the ACLU rightly worries about who is in charge of fusion centers and by what rules they operate, about what becomes of privacy when private corporations are inserted into the intelligence process, about what the military is doing meddling in civilian law enforcement, about data-mining operations that Federal guidelines encourage, and about the secrecy walls behind which the fusion centers operate.
Even when fusion centers do their best to square that circle in their own guidelines, like the ones obtained by the ACLU from Massachusetts’s Commonwealth Fusion Center (CFC), the knots in which they tie themselves are all over the page. Imagine, then, what happens when you let informers or agents provocateurs loose in actual undercover situations.
“Undercovers,” writes the Massachusetts CFC, “may not seek to gain access to private meetings and should not actively participate in meetings.… At the preliminary inquiry stage, sources and informants should not be used to cultivate relationships with persons and groups that are the subject of the preliminary inquiry.” So far so good. Then, it adds, “Investigators may, however, interview, obtain, and accept information known to sources and informants.” By eavesdropping, say? Collecting trash? Hacking? All without warrants? Without probable cause?
“Undercovers and informants,” the guidelines continue, “are strictly prohibited from engaging in any conduct the sole purpose of which is to disrupt the lawful exercise of political activity, from disrupting the lawful operations of an organization, from sowing seeds of distrust between members of an organization involved in lawful activity, or from instigating unlawful acts or engaging in unlawful or unauthorized investigative activities.” Now, go back and note that little, easy-to-miss word “sole.” Who knows just what grim circles that tiny word squares?
The Massachusetts CFC at least addresses the issue of entrapment: “Undercovers should not become so involved in a group that they are participating in directing the operations of a group, either by accepting a formal position in the hierarchy or by informally establishing the group’s policy and priorities. This does not mean an undercover cannot support a group’s policies and priorities; rather an undercover should not become a driving force behind a group’s unlawful activities.” Did Cleveland’s fusion center have such guidelines? Did they follow them? Do other state fusion centers? We don’t know.
Whatever the fog of surveillance, when it comes to informers, agents provocateurs, and similar matters, four things are clear enough:
• Terrorist plots arise, in the United States as elsewhere, with the intent of committing murder and mayhem. Since 2001, in the US, these have been almost exclusively the work of freelance Islamist ideologues like the Tsarnaev brothers of Boston. None have been connected in any meaningful way with any legitimate organization or movement.
• Government surveillance may in some cases have been helpful in scotching such plots, but there is no evidence that it has been essential.
• Even based on the limited information available to us, since September 11, 2001, the net of surveillance has been thrown wide indeed. Tabs have been kept on members of quite a range of suspect populations, including American Muslims, anarchists, and environmentalists, among others—in situation after situation where there was no probable cause to suspect preparations for a crime.
• At least on occasion—we have no way of knowing how often—agents provocateurs on government payrolls have spurred violence.
How much official unintelligence is at work? How many demonstrations are being poked and prodded by undercover agents? How many acts of violence are being suborned? It would be foolish to say we know. At least equally foolish would be to trust the authorities to keep to honest-to-goodness police work when they are so mightily tempted to take the low road into straight-out, unwarranted espionage and instigation.
The official COINTELPRO label took place between 1956 and 1971.[6][7] The FBI’s stated motivation was “protecting national security, preventing violence, and maintaining the existing social and political order.”[8]
FBI DirectorJ. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and their leaders.[12][13] Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.[14] Attorney General Robert F. Kennedy personally authorized some of these programs.[15] Kennedy would later learn that he also had been a target of FBI surveillance.[citation needed]
History
The FBI engaged in the political repression of “communism” almost from the time of the agency’s inception in 1908, at a time of widespread social disruption due to anarchists and labor movements. Beginning in the 1930s, antecedents to COINTELPRO operated during the Franklin D. Roosevelt and Harry S. Trumanadministrations. Centralized operations under COINTELPRO officially began in August 1956 with a program designed to “increase factionalism, cause disruption and win defections” inside the Communist Party U.S.A. (CPUSA). Tactics included anonymous phone calls, IRS audits, and the creation of documents that would divide American communists internally.[16] An October 1956 memo from Hoover reclassified the FBI’s ongoing surveillance of black leaders, including it within COINTELPRO, with the justification that the movement was infiltrated by communists.[17] In 1956, Hoover sent an open letter denouncing Dr. T.R.M. Howard, a civil rights leader, surgeon, and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders of George W. Lee, Emmett Till, and other blacks in the South.[18] When the Southern Christian Leadership Conference (SCLC) was founded in 1957, the FBI began to monitor and target the group almost immediately, focusing particularly on Bayard Rustin, Stanley Levison, and, eventually, Rev. Martin Luther King, Jr.[19]
After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote:
In the light of King’s powerful demagogic speech. … We must mark him now, if we have not done so before, as the most dangerous Negro of the future in this nation from the standpoint of communism, the Negro, and national security.[20]
Soon after, the FBI was systematically bugging King’s home and his hotel rooms.[21]
In the mid-1960s, King began publicly criticizing the Bureau for giving insufficient attention to the use of terrorism by white supremacists. Hoover responded by publicly calling King the most “notorious liar” in the United States.[22] In his 1991 memoir, Washington Post journalist Carl Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to commit suicide.[23] Historian Taylor Branch documents an anonymous November 21, 1964 “suicide package” sent by the FBI that contained audio recordings of King’s sexual indiscretions combined with a letter telling him “There is only one way out for you. You better take it before your filthy, abnormal, fraudulent self is bared to the nation.”[24]
During the same period the program also targeted Malcolm X. While an FBI spokesman has denied that the FBI was “directly” involved in Malcolm’s murder, it is documented that the Bureau fostered the violent schism between Malcolm and the Nation of Islam that led to the black leader’s death. The FBI heavily infiltrated Malcolm’s Organization of Afro-American Unity in the final month’s of his life. The Pulitzer Prize-winning biography of Malcolm X by Manning Marable asserts that most of the men who plotted Malcolm’s assassination were never apprehended and that the full extent of the FBI’s involvement in his death cannot be known.[25][26]
A March 1968 memo stated the programs goal was to “prevent the coalition of militant black nationalist groups” ; to “Prevent the RISE OF A ‘MESSIAH’ who could unify…the militant black nationalist movement” ; “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence [against authorities].” ; to “Prevent militant black nationalist groups and leaders from gaining RESPECTABILITY, by discrediting them to…both the responsible community and to liberals who have vestiges of sympathy…”; and to “prevent the long-range GROWTH of militant black organizations, especially among youth.” Dr. King was said to have potential to be the “messiah” figure, should he abandon nonviolence and integrationism;[29]Stokely Carmichael was noted to have “the necessary charisma to be a real threat in this way.” [30]
This program coincided with a broader federal effort to prepare military responses for urban riots, and began increased collaboration between the FBI, Central Intelligence Agency, National Security Agency, and the Department of Defense. The CIA launched its own domestic espionage project in 1967 called Operation CHAOS. [31] A particular target was the Poor People’s Campaign, a national effort organized by King and the SCLC to occupy Washington, D.C. The FBI monitored and disrupted the campaign on a national level, while using targeted smear tactics locally to undermine support for the march.[32]
Overall, COINTELPRO encompassed disruption and sabotage of the Socialist Workers Party (1961), the Ku Klux Klan (1964), the Nation of Islam, the Black Panther Party (1967), and the entire New Left social/political movement, which included antiwar, community, and religious groups (1968). A later investigation by the Senate’sChurch Committee (see below) stated that “COINTELPRO began in 1956, in part because of frustration with Supreme Court rulings limiting the Government’s power to proceed overtly against dissident groups …”[34] Official congressional committees and several court cases[35] have concluded that COINTELPRO operations against communist and socialist groups exceeded statutory limits on FBI activity and violated constitutional guarantees of freedom of speech and association.[1]
Program exposed
The building broken into by the Citizen’s Commission to Investigate the FBI, at One Veterans Square, Media, Pennsylvania
The program was successfully kept secret until 1971, when the Citizens’ Commission to Investigate the FBI burglarized an FBI field office in Media, Pennsylvania, took several dossiers, and exposed the program by passing this material to news agencies. Many news organizations initially refused to publish the information. Within the year, Director J. Edgar Hooverdeclared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled on a case-by-case basis.[36][37]
Additional documents were revealed in the course of separate lawsuits filed against the FBI by NBC correspondent Carl Stern, the Socialist Workers Party, and a number of other groups. In 1976 the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the United States Senate, commonly referred to as the “Church Committee” for its chairman, Senator Frank Church of Idaho, launched a major investigation of the FBI and COINTELPRO. Journalists and historians speculate that the government has not released many dossier and documents related to the program. Many released documents have been partly, or entirely, redacted.
Since the conclusion of centralized COINTELPRO operations in 1971, FBI counterintelligence operations have been handled on a “case-by-case basis”; however allegations of improper political repression continue.[38][39]
The Final Report of the Select Committee castigated conduct of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:
The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law.[1] Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that … the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.[34]
The Church Committee documented a history of the FBI exercising political repression as far back as World War I, through the 1920s, when agents were charged with rounding up “anarchists, communists, socialists, reformists and revolutionaries” for deportation. The domestic operations were increased against political and anti-war groups from 1936 through 1976.
Intended effects
The intended effect of the FBI’s COINTELPRO was to “expose, disrupt, misdirect, or otherwise neutralize” groups that the FBI officials believed were “subversive”[40] by instructing FBI field operatives to:[41]
create a negative public image for target groups (e.g. by surveilling activists, and releasing negative personal information to the public)
break down internal organization
create dissension between groups
restrict access to public resources
restrict the ability to organize protests
restrict the ability of individuals to participate in group activities
While the declared purposes of these programs were to protect the “national security” or prevent violence, Bureau witnesses admit that many of the targets were nonviolent and most had no connections with a foreign power. Indeed, nonviolent organizations and individuals were targeted because the Bureau believed they represented a “potential” for violence—and nonviolent citizens who were against the war in Vietnam were targeted because they gave “aid and comfort” to violent demonstrators by lending respectability to their cause.
The imprecision of the targeting is demonstrated by the inability of the Bureau to define the subjects of the programs. The Black Nationalist program, according to its supervisor, included “a great number of organizations that you might not today characterize as black nationalist but which were in fact primarily black.” Thus, the nonviolent Southern Christian Leadership Conference was labeled as a Black Nationalist-“Hate Group.”
Furthermore, the actual targets were chosen from a far broader group than the titles of the programs would imply. The CPUSA program targeted not only Communist Party members but also sponsors of the National Committee to Abolish the House Un-American Activities Committee and civil rights leaders allegedly under Communist influence or deemed to be not sufficiently “anti-Communist”. The Socialist Workers Party program included non-SWP sponsors of anti-war demonstrations which were cosponsored by the SWP or the Young Socialist Alliance, its youth group. The Black Nationalist program targeted a range of organizations from the Panthers to SNCC to the peaceful Southern Christian Leadership Conference, and included every Black Student Union and many other black student groups. New Left targets ranged from the SDS to the InterUniversity Committee for Debate on Foreign Policy, from Antioch College (“vanguard of the New Left”) to the New Mexico Free University and other “alternate” schools, and from underground newspapers to students’ protesting university censorship of a student publication by carrying signs with four-letter words on them.
Examples of surveillance, spanning all presidents from FDR to Nixon, both legal and illegal, contained in the Church Committee report:[43]
President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his “national defense” policy and supporting Col. Charles Lindbergh.
President Truman received inside information on a former Roosevelt aide’s efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists.
The Kennedy administration had the FBI wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm. US Attorney GeneralRobert F. Kennedy received the fruits of an FBI wire tap on Martin Luther King, Jr. and an electronic listening device targeting a congressman, both of which yielded information of a political nature.
President Johnson asked the FBI to conduct “name checks” of his critics and members of the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the 1964 Democratic Conventionfrom FBI electronic surveillance.
President Nixon authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a Supreme Court Justice.
The COINTELPRO documents show numerous cases of the FBI’s intentions to prevent and disrupt protests against the Vietnam War. Many techniques were used to accomplish this task. “These included promoting splits among antiwar forces, encouraging red-baiting of socialists, and pushing violent confrontations as an alternative to massive, peaceful demonstrations.” One 1966 COINTELPRO operation tried to redirect the Socialist Workers Party from their pledge of support for the antiwar movement.[44]
According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:
Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.
Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketingto create suspicion about targeted activists, sometimes with lethal consequences.[52]
Legal harassment: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.[49]
Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break-ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations.[49][50][7][53] The object was to frighten or eliminate dissidents and disrupt their movements.
The FBI specifically developed tactics intended to heighten tension and hostility between various factions in the black militancy movement, for example between the Black Panthers, the US Organization, and the Blackstone Rangers. This resulted in numerous deaths, among which were San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.[49]
The FBI also conspired with the police departments of many U.S. cities (San Diego, Los Angeles, San Francisco, Oakland, Philadelphia, Chicago) to encourage repeated raids on Black Panther homes—often with little or no evidence of violations of federal, state, or local laws—which resulted directly in the police killing many members of the Black Panther Party, most notably Chicago Black Panther Party Chairman Fred Hampton on December 4, 1969.[49][50][7][54]
In order to eliminate black militant leaders whom they considered dangerous, the FBI is believed to have worked with local police departments to target specific individuals,[55] accuse them of crimes they did not commit, suppress exculpatory evidence and falsely incarcerate them.[citation needed]Elmer “Geronimo” Pratt, a Black Panther Party leader, was incarcerated for 27 years before a California Superior Court vacated his murder conviction, ultimately freeing him. Appearing before the court, an FBI agent testified that he believed Pratt had been framed, because both the FBI and the Los Angeles Police Department knew he had not been in the area at the time the murder occurred.[56][57]
Some sources claim that the FBI conducted more than 200 “black bag jobs“,[58][59] which were warrantless surreptitious entries, against the targeted groups and their members.[60]
J. Edgar Hoover
In 1969 the FBI special agent in San Francisco wrote Hoover that his investigation of the Black Panther Party (BPP) had concluded that in his city, at least, the Panthers were primarily engaged in feeding breakfast to children. Hoover fired back a memo implying the agent’s career goals would be directly affected by his supplying evidence to support Hoover’s view that the BPP was “a violence-prone organization seeking to overthrow the Government by revolutionary means”.[61]
Hoover supported using false claims to attack his political enemies. In one memo he wrote: “Purpose of counterintelligence action is to disrupt the BPP and it is immaterial whether facts exist to substantiate the charge.”[62]
In one particularly controversial 1965 incident, white civil rights worker Viola Liuzzo was murdered by Ku Klux Klansmen, who gave chase and fired shots into her car after noticing that her passenger was a young black man; one of the Klansmen was Gary Thomas Rowe, an acknowledged FBI informant.[63][64] The FBI spread rumors that Liuzzo was a member of theCommunist Party and had abandoned her children to have sexual relationships with African Americans involved in the Civil Rights Movement.[65][66] FBI records show that J. Edgar Hoover personally communicated these insinuations to President Johnson.[67][68] FBI informant Rowe has also been implicated in some of the most violent crimes of the 1960s civil rights era, including attacks on the Freedom Riders and the 1963 Birmingham, Alabama 16th Street Baptist Church bombing.[63]According to Noam Chomsky, in another instance in San Diego, the FBI financed, armed, and controlled an extreme right-wing group of former Minutemen, transforming it into a group called the Secret Army Organization that targeted groups, activists, and leaders involved in the Anti-War Movement, using both intimidation and violent acts.[69][70][71]
Hoover ordered preemptive action “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence.”[12]
Too many people have been spied upon by too many Government agencies and too much information has been illegally collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret and bias informants, but also using other intrusive techniques such as wiretaps, microphone “bugs”, surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous—and even of groups suspected of associating with potentially dangerous organizations—have continued for decades, despite the fact that those groups did not engage in unlawful activity.
Groups and individuals have been assaulted, repressed, harassed and disrupted because of their political views,social believes and their lifestyles. Investigations have been based upon vague standards whose breadth made excessive collection inevitable. Unsavory, harmful and vicious tactics have been employed—including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths. Intelligence agencies have served the political and personal objectives of presidents and other high officials. While the agencies often committed excesses in response to pressure from high officials in the Executive branch and Congress, they also occasionally initiated improper activities and then concealed them from officials whom they had a duty to inform.
Governmental officials—including those whose principal duty is to enforce the law—have violated or ignored the law over long periods of time and have advocated and defended their right to break the law.
The Constitutional system of checks and balances has not adequately controlled intelligence activities. Until recently the Executive branch has neither delineated the scope of permissible activities nor established procedures for supervising intelligence agencies. Congress has failed to exercise sufficient oversight, seldom questioning the use to which its appropriations were being put. Most domestic intelligence issues have not reached the courts, and in those cases when they have reached the courts, the judiciary has been reluctant to grapple with them.[72][73]
Post-COINTELPRO operations
While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI actions indicate that post-COINTELPRO reforms did not succeed in ending COINTELPRO tactics.[74][75][76] Documents released under the FOIA show that the FBI tracked the late David Halberstam—a Pulitzer Prize-winning journalist and author—for more than two decades.[77][78] In 1978, then-acting FBI Director William H. Webster indicated that, by 1976, most of the program’s resources has been rerouted.[79][better source needed]
“Counterterrorism” guidelines implemented during the Reagan administration have been described as allowing a return to COINTELPRO tactics.[80][pages needed] Some radical groups accuse factional opponents of being FBI informants or assume the FBI is infiltrating the movement.[81]
The IG report found these “troubling” FBI practices between 2001 and 2006. In some cases, the FBI conducted investigations of people affiliated with activist groups for “factually weak” reasons. Also, the FBI extended investigations of some of the groups “without adequate basis” and improperly kept information about activist groups in its files. The IG report also found that FBI Director Robert Mueller III provided inaccurate congressional testimony about one of the investigations, but this inaccuracy may have been due to his relying on what FBI officials told him.[82]
Several authors have accused the FBI of continuing to deploy COINTELPRO-like tactics against radical groups after the official COINTELPRO operations were ended. Several authors have suggested the American Indian Movement (AIM) has been a target of such disturbing operations.
Authors such as Ward Churchill, Rex Weyler, and Peter Matthiessen allege that the federal government intended to acquire uranium deposits on the Lakota tribe’s reservation land, and that this motivated a larger government conspiracy against AIM activists on the Pine Ridge reservation.[6][46][83][84][85] Others believe COINTELPRO continues and similar actions are being taken against activist groups.[85][86][87] Caroline Woidat says that, with respect to Native Americans, COINTELPRO should be understood within a historical context in which “Native Americans have been viewed and have viewed the world themselves through the lens of conspiracy theory.”[88] Other authors note that while some conspiracy theories related to COINTELPRO are unfounded, the issue of ongoing government surveillance and repression is real.[39][89]
Jeff Fort, leader of the Chicago street gang El Rukn, was tried and convicted for conspiring with Libya to perform acts of domestic terrorism by use of COINTELPRO type methods
Judi Bari, organizer, Earth First! & IWW Local #1, targeted by COINTELPRO
Viola Liuzzo, murdered by a shot from a car used by four Ku Klux Klansmen, one of whom was a COINTELPRO informant
Heavenly shades of night are falling, it’s twilight time
Out of the mist your voice is calling, ’tis twilight time
When purple-colored curtains mark the end of day
I’ll hear you, my dear, at twilight timeDeepening shadows gather splendor as day is done
Fingers of night will soon surrender the setting sun
I count the moments darling till you’re here with me
Together at last at twilight timeHere, in the afterglow of day, we keep our rendezvous beneath the blue
And, in the same and sweet old way I fall in love again as I did then
Deep in the dark your kiss will thrill me like days of old
Lighting the spark of love that fills me with dreams untold
Each day I pray for evening just to be with you
Together at last at twilight time
Here, in the afterglow of day, we keep our rendezvous beneath the blue
And, in the same and sweet old way I fall in love again as I did then
Deep in the dark your kiss will thrill me like days of old
Lighting the spark of love that fills me with dreams untold
Each day I pray for evening just to be with you
Together at last at twilight time
Together at last at twilight time
Story 1: Asset Price Bubble Bursts Coming In October With 69 Months of Near Zero Federal Funds Interest Rates! — Interest Rate Suppression or Price Control and Manipulation Will Blow Up Economy — Suppressing Savings and Investment With Low Interest Rates Is A Formula For Diaster and Depression — Panic Time — Start A War Over Oil — Meltdown America –Videos
TABLE I -- SUMMARY OF TREASURY SECURITIES OUTSTANDING, AUGUST 31, 2014
(Millions of dollars)
Amount Outstanding
Title Debt Held Intragovernmental Totals
By the Public Holdings
Marketable:
Bills....................................... 1,450,293 1,704 1,451,998
Notes....................................... 8,109,269 7,365 8,116,634
Bonds....................................... 1,521,088 57 1,521,144
Treasury Inflation-Protected Securities..... 1,031,836 52 1,031,888
Floating Rate Notes 21 ................... 109,996 0 109,996
Federal Financing Bank 1 ................. 0 13,612 13,612
Total Marketable a........................... 12,222,481 22,790 2 12,245,271
Nonmarketable:
Domestic Series............................. 29,995 0 29,995
Foreign Series.............................. 2,986 0 2,986
State and Local Government Series........... 105,440 0 105,440
United States Savings Securities............ 177,030 0 177,030
Government Account Series................... 193,237 4,993,277 5,186,514
Hope Bonds 19............................... 0 494 494
Other....................................... 1,443 0 1,443
Total Nonmarketable b........................ 510,130 4,993,771 5,503,901
Total Public Debt Outstanding ................ 12,732,612 5,016,561 17,749,172
TABLE II -- STATUTORY DEBT LIMIT, AUGUST 31, 2014
(Millions of dollars)
Amount Outstanding
Title Debt Held Intragovernmental Totals
By the Public 17, 2Holdings
Debt Subject to Limit: 17, 20
Total Public Debt Outstanding............... 12,732,612 5,016,561 17,749,172
Less Debt Not Subject to Limit:
Other Debt ............................... 485 0 485
Unamortized Discount 3................... 15,742 12,421 28,163
Federal Financing Bank 1 ............ 0 13,612 13,612
Hope Bonds 19............................. 0 494 494
Plus Other Debt Subject to Limit:
Guaranteed Debt of Government Agencies 4 * 0 *
Total Public Debt Subject to Limit ......... 12,716,386 4,990,033 17,706,419
Statutory Debt Limit 5..................................................................... 0
COMPILED AND PUBLISHED BY
THE BUREAU OF THE FISCAL SERVICE
www.TreasuryDirect.gov
Interest Expense on the Debt Outstanding
The Interest Expense on the Debt Outstanding includes the monthly interest for:
Amortized discount or premium on bills, notes and bonds is also included in the monthly interest expense.
The fiscal year represents the total interest expense on the Debt Outstanding for a given fiscal year. This includes the months of October through September. View current month details (XLS Format, File size 199KB, uploaded 09/05/2014).
Note: To read or print a PDF document, you need the Adobe Acrobat Reader (v5.0 or higher) software installed on your computer. You can download the Adobe Acrobat Reader from the Adobe Website.
Even after the Dow and the S&P 500 closed at new all-time highs, closely followed contrarian Marc Faber keeps sounding the alarm.
“We have a bubble in everything, everywhere,” the publisher of The Gloom, Boom & Doom Report told CNBC’s “Squawk Box” on Friday. Faber has long argued that the Federal Reserve’s massive asset purchasing programs and near-zero interest rates have inflated stock prices.
The catalyst for a market decline, as he sees it, could be a “raise in interest rates, not engineered by the Fed,” referring an increase in bond yields.
Faber also expressed concern about American consumers. “Their cost of living have gone up more than the salary increases, so they’re getting squeezed. So that’s why retailing is not doing particularly well.”
A real black swan event, he argued, would be a global recession. “The big surprise will be that the global economy slows down and goes into recession. And that will shock markets.”
If economies around the world can’t recovery with the Fed and other central banks pumping easy money into the system, that would send a dire message, Faber added. He believes the best way for world economies to recover is to cut the size of government.
There’s a dual-economy in the U.S. and around the world with the rich doing really well and others struggling, he said. “[But] the rich will get creamed one day, especially in Europe, on wealth taxes.”
The Wharton School professor sees second half economic growth of 3 to 4 percent, S&P 500 earnings near $120, and the start of Fed rate hikes in the spring or summer of 2015
Fed and TWTR Overvaluation, Evidence of Looming Market Crash: Stockman
The Federal Reserve Wednesday reassured investors that it will hold interest rates near zero for a “considerable time” after it ends the bond-buying program known as quantitative easing in October. In response, the Dow Jones Industrial Average (^DJI) closed at a new record high.
Former Director of the Office of Management and Budget and author of the book, The Great Deformation, David Stockman, has significant concerns about that very policy.
“I’m worried… that we’ve got the greatest bubble created by a central bank in human history,” he told Yahoo Finance.
In a recent blog post, Stockman offered a handful of high-flying stocks as evidence of what he sees as “madness.”
“…Twitter, is all that is required to remind us that once
again markets are trading in the nosebleed section
of history, rivaling even the madness of March 2000.”
Behind the madness
In an interview with Yahoo Finance, Stockman blamed Fed policy for creating that madness.
“We have been shoving zero-cost money into the financial markets for 6-years running,” he said. “That’s the kerosene that drives speculative trading – the carry trades. That’s what the gamblers use to fund their position as they move from one momentum play and trade to another.”
And that, he says, is not sustainable. While Stockman believes tech stocks are especially overvalued, he warns that it’s not just tech valuations that are inflated. “Everything’s massively overvalued, and it’s predicated on zero-cost overnight money that continues these carry trades; It can’t continue.”
And he still believes, as he has for some time – so far, incorrectly – that there will be a day of reckoning.
“When the trades begin to unwind because the carry cost has to normalize, you’re going to have a dramatic re-pricing dislocation in these financial markets.”
As Yahoo Finance’s Lauren Lyster points out in the associated video, investors who heeded Stockman’s advice last year would have missed out on a 28% run-up in stocks. But Stockman remains steadfast in his belief that the current Fed policy and the resultant market behavior can not continue. “I think what the Fed is doing is so unprecedented, what is happening in the markets is so unnatural,” he said. “This is dangerous, combustible stuff, and I don’t know when the explosion occurs – when the collapse suddenly is upon us – but when it happens, people will be happy that they got out of the way if they did.”
Factors Affecting Reserve Balances of Depository Institutions and Condition Statement of Federal Reserve Banks
September 11, 2014
1. Factors Affecting Reserve Balances of Depository Institutions
Millions of dollars
Reserve Bank credit, related items, and
reserve balances of depository institutions at
Federal Reserve Banks
Averages of daily figures
Wednesday
Sep 10, 2014
Week ended
Sep 10, 2014
Change from week ended
Sep 3, 2014
Sep 11, 2013
Reserve Bank credit
4,377,690
+ 4,183
+ 761,693
4,379,719
Securities held outright1
4,159,537
+ 2,675
+ 765,361
4,160,521
U.S. Treasury securities
2,439,657
+ 2,671
+ 401,376
2,440,637
Bills2
0
0
0
0
Notes and bonds, nominal2
2,325,368
+ 2,678
+ 386,333
2,326,351
Notes and bonds, inflation-indexed2
97,755
0
+ 11,737
97,755
Inflation compensation3
16,534
– 7
+ 3,306
16,531
Federal agency debt securities2
41,562
0
– 22,868
41,562
Mortgage-backed securities4
1,678,317
+ 4
+ 386,851
1,678,322
Unamortized premiums on securities held outright5
208,963
– 219
+ 5,815
208,907
Unamortized discounts on securities held outright5
-18,664
+ 21
– 12,958
-18,654
Repurchase agreements6
0
0
0
0
Loans
291
– 8
+ 18
352
Primary credit
10
– 18
– 8
53
Secondary credit
0
0
0
0
Seasonal credit
247
+ 9
+ 94
266
Term Asset-Backed Securities Loan Facility7
34
0
– 68
34
Other credit extensions
0
0
0
0
Net portfolio holdings of Maiden Lane LLC8
1,664
– 1
+ 171
1,665
Net portfolio holdings of Maiden Lane II LLC9
63
0
– 1
63
Net portfolio holdings of Maiden Lane III LLC10
22
0
0
22
Net portfolio holdings of TALF LLC11
44
0
– 80
44
Float
-675
– 69
+ 94
-627
Central bank liquidity swaps12
77
+ 1
– 243
77
Other Federal Reserve assets13
26,369
+ 1,784
+ 3,517
27,349
Foreign currency denominated assets14
22,933
– 353
– 737
22,801
Gold stock
11,041
0
0
11,041
Special drawing rights certificate account
5,200
0
0
5,200
Treasury currency outstanding15
46,103
+ 14
+ 820
46,103
Total factors supplying reserve funds
4,462,967
+ 3,844
+ 761,776
4,464,863
Note: Components may not sum to totals because of rounding. Footnotes appear at the end of the table.
1. Factors Affecting Reserve Balances of Depository Institutions (continued)
Millions of dollars
Reserve Bank credit, related items, and
reserve balances of depository institutions at
Federal Reserve Banks
Averages of daily figures
Wednesday
Sep 10, 2014
Week ended
Sep 10, 2014
Change from week ended
Sep 3, 2014
Sep 11, 2013
Currency in circulation15
1,292,467
– 442
+ 84,956
1,291,993
Reverse repurchase agreements16
266,584
+ 818
+ 173,996
267,602
Foreign official and international accounts
102,228
– 296
+ 9,640
107,303
Others
164,356
+ 1,115
+ 164,356
160,299
Treasury cash holdings
165
+ 4
+ 23
164
Deposits with F.R. Banks, other than reserve balances
52,715
– 6,170
– 19,233
53,117
Term deposits held by depository institutions
0
0
0
0
U.S. Treasury, General Account
39,081
– 3,787
+ 530
31,872
Foreign official
5,432
– 1,134
– 3,562
5,241
Other17
8,202
– 1,248
– 16,201
16,004
Other liabilities and capital18
63,991
– 1
+ 818
63,033
Total factors, other than reserve balances,
absorbing reserve funds
1,675,922
– 5,792
+ 240,561
1,675,910
Reserve balances with Federal Reserve Banks
2,787,045
+ 9,636
+ 521,214
2,788,954
Note: Components may not sum to totals because of rounding.
1.
Includes securities lent to dealers under the overnight securities lending facility; refer to table 1A.
2.
Face value of the securities.
3.
Compensation that adjusts for the effect of inflation on the original face value of inflation-indexed securities.
4.
Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of
the securities.
5.
Reflects the premium or discount, which is the difference between the purchase price and the face value of the securities that has not been amortized. For U.S. Treasury and Federal agency debt securities, amortization is on a straight-line basis. For mortgage-backed securities, amortization is on an effective-interest basis.
6.
Cash value of agreements.
7.
Includes credit extended by the Federal Reserve Bank of New York to eligible borrowers through the Term Asset-Backed Securities Loan Facility.
8.
Refer to table 4 and the note on consolidation accompanying table 9.
9.
Refer to table 5 and the note on consolidation accompanying table 9.
10.
Refer to table 6 and the note on consolidation accompanying table 9.
11.
Refer to table 7 and the note on consolidation accompanying table 9.
12.
Dollar value of foreign currency held under these agreements valued at the exchange rate to be used when the foreign currency is returned
to the foreign central bank. This exchange rate equals the market exchange rate used when the foreign currency was acquired from the
foreign central bank.
13.
Includes accrued interest, which represents the daily accumulation of interest earned, and other accounts receivable. Also, includes Reserve Bank premises and equipment net of allowances for depreciation.
14.
Revalued daily at current foreign currency exchange rates.
15.
Estimated.
16.
Cash value of agreements, which are collateralized by U.S. Treasury securities, federal agency debt securities, and mortgage-backed securities.
17.
Includes deposits held at the Reserve Banks by international and multilateral organizations, government-sponsored enterprises, and designated financial market utilities.
18.
Includes the liabilities of Maiden Lane LLC, Maiden Lane II LLC, Maiden Lane III LLC, and TALF LLC to entities other than the Federal Reserve Bank of New York, including liabilities that have recourse only to the portfolio holdings of these LLCs. Refer to table 4 through table 7 and the note on consolidation accompanying table 9. Also includes the liability for interest on Federal Reserve notes due to U.S. Treasury. Refer to table 8 and table 9.
Sources: Federal Reserve Banks and the U.S. Department of the Treasury.
1A. Memorandum Items
Millions of dollars
Memorandum item
Averages of daily figures
Wednesday
Sep 10, 2014
Week ended
Sep 10, 2014
Change from week ended
Sep 3, 2014
Sep 11, 2013
Securities held in custody for foreign official and international accounts
3,338,309
– 417
+ 61,832
3,343,937
Marketable U.S. Treasury securities1
3,010,563
– 456
+ 86,414
3,016,027
Federal agency debt and mortgage-backed securities2
285,805
+ 28
– 29,008
285,934
Other securities3
41,942
+ 12
+ 4,427
41,976
Securities lent to dealers
10,669
+ 1,648
– 1,429
11,123
Overnight facility4
10,669
+ 1,648
– 1,429
11,123
U.S. Treasury securities
9,860
+ 1,721
– 1,405
10,373
Federal agency debt securities
810
– 72
– 23
750
Note: Components may not sum to totals because of rounding.
1.
Includes securities and U.S. Treasury STRIPS at face value, and inflation compensation on TIPS. Does not include securities pledged as collateral to foreign official and international account holders against reverse repurchase agreements with the Federal Reserve presented in tables 1, 8, and 9.
2.
Face value of federal agency securities and current face value of mortgage-backed securities, which is the remaining principal balance of the securities.
3.
Includes non-marketable U.S. Treasury securities, supranationals, corporate bonds, asset-backed securities, and commercial paper at face value.
4.
Face value. Fully collateralized by U.S. Treasury securities.
2. Maturity Distribution of Securities, Loans, and Selected Other Assets and Liabilities, September 10, 2014
Millions of dollars
Remaining Maturity
Within 15
days
16 days to
90 days
91 days to
1 year
Over 1 year
to 5 years
Over 5 year
to 10 years
Over 10
years
All
Loans1
118
234
0
0
0
…
352
U.S. Treasury securities2
Holdings
0
90
3,194
1,037,162
742,261
657,930
2,440,637
Weekly changes
0
0
0
+ 1,615
– 1
+ 2,037
+ 3,651
Federal agency debt securities3
Holdings
1,556
1,329
3,584
32,746
0
2,347
41,562
Weekly changes
0
0
0
0
0
0
0
Mortgage-backed securities4
Holdings
0
0
0
10
4,698
1,673,614
1,678,322
Weekly changes
0
0
0
0
+ 863
– 857
+ 6
Asset-backed securities held by
TALF LLC5
0
0
0
0
0
0
0
Repurchase agreements6
0
0
…
…
…
…
0
Central bank liquidity swaps7
77
0
0
0
0
0
77
Reverse repurchase agreements6
267,602
0
…
…
…
…
267,602
Term deposits
0
0
0
…
…
…
0
Note: Components may not sum to totals because of rounding.
…Not applicable.
1.
Excludes the loans from the Federal Reserve Bank of New York (FRBNY) to Maiden Lane LLC, Maiden Lane II LLC, Maiden
Lane III LLC, and TALF LLC. The loans were eliminated when preparing the FRBNY’s statement of condition consistent with consolidation
under generally accepted accounting principles.
2.
Face value. For inflation-indexed securities, includes the original face value and compensation that adjusts for the effect of inflation on the
original face value of such securities.
3.
Face value.
4.
Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of the securities.
5.
Face value of asset-backed securities held by TALF LLC, which is the remaining principal balance of the underlying assets.
6.
Cash value of agreements.
7.
Dollar value of foreign currency held under these agreements valued at the exchange rate to be used when the foreign currency is returned to
the foreign central bank. This exchange rate equals the market exchange rate used when the foreign currency was acquired from the foreign
central bank.
3. Supplemental Information on Mortgage-Backed Securities
Millions of dollars
Account name
Wednesday
Sep 10, 2014
Mortgage-backed securities held outright1
1,678,322
Commitments to buy mortgage-backed securities2
80,643
Commitments to sell mortgage-backed securities2
0
Cash and cash equivalents3
4
1.
Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of the securities.
2.
Current face value. Generally settle within 180 days and include commitments associated with outright transactions, dollar rolls, and coupon swaps.
3.
This amount is included in other Federal Reserve assets in table 1 and in other assets in table 8 and table 9.
4. Information on Principal Accounts of Maiden Lane LLC
Millions of dollars
Account name
Wednesday
Sep 10, 2014
Net portfolio holdings of Maiden Lane LLC1
1,665
Outstanding principal amount of loan extended by the Federal Reserve Bank of New York2
0
Accrued interest payable to the Federal Reserve Bank of New York2
0
Outstanding principal amount and accrued interest on loan payable to JPMorgan Chase & Co.3
0
1.
Fair value. Fair value reflects an estimate of the price that would be received upon selling an asset if the transaction were to be conducted in an orderly market on the measurement date. Revalued quarterly. This table reflects valuations as of June 30, 2014. Any assets purchased after
this valuation date are initially recorded at cost until their estimated fair value as of the purchase date becomes available.
2.
Book value. This amount was eliminated when preparing the Federal Reserve Bank of New York’s statement of condition consistent with consolidation under generally accepted accounting principles. Refer to the note on consolidation accompanying table 9.
3.
Book value. The fair value of these obligations is included in other liabilities and capital in table 1 and in other liabilities and accrued dividends in table 8 and table 9.
Note: On June 26, 2008, the Federal Reserve Bank of New York (FRBNY) extended credit to Maiden Lane LLC under the authority of section 13(3) of the Federal Reserve Act. This limited liability company was formed to acquire certain assets of Bear Stearns and to manage those assets through time to maximize repayment of the credit extended and to minimize disruption to financial markets. Payments by Maiden Lane LLC from the proceeds of the net portfolio holdings will be made in the following order: operating expenses of the LLC, principal due to the FRBNY, interest due to the FRBNY, principal due to JPMorgan Chase & Co., and interest due to JPMorgan Chase & Co. Any remaining funds will be paid to the FRBNY.
5. Information on Principal Accounts of Maiden Lane II LLC
Millions of dollars
Account name
Wednesday
Sep 10, 2014
Net portfolio holdings of Maiden Lane II LLC1
63
Outstanding principal amount of loan extended by the Federal Reserve Bank of New York2
0
Accrued interest payable to the Federal Reserve Bank of New York2
0
Deferred payment and accrued interest payable to subsidiaries of American International Group, Inc.3
0
1.
Fair value. Fair value reflects an estimate of the price that would be received upon selling an asset if the transaction were to be conducted in an orderly market on the measurement date. Revalued quarterly. This table reflects valuations as of June 30, 2014. Any assets purchased after
this valuation date are initially recorded at cost until their estimated fair value as of the purchase date becomes available.
2.
Book value. This amount was eliminated when preparing the Federal Reserve Bank of New York’s statement of condition consistent with consolidation under generally accepted accounting principles. Refer to the note on consolidation accompanying table 9.
3.
Book value. The deferred payment represents the portion of the proceeds of the net portfolio holdings due to subsidiaries of American
International Group, Inc. in accordance with the asset purchase agreement. The fair value of this payment and accrued interest payable are
included in other liabilities and capital in table 1 and in other liabilities and accrued dividends in table 8 and table 9.
Note: On December 12, 2008, the Federal Reserve Bank of New York (FRBNY) began extending credit to Maiden Lane II LLC under the authority of section 13(3) of the Federal Reserve Act. This limited liability company was formed to purchase residential mortgage-backed securities from the U.S. securities lending reinvestment portfolio of subsidiaries of American International Group, Inc. (AIG subsidiaries). Payments by Maiden Lane II LLC from the proceeds of the net portfolio holdings will be made in the following order: operating expenses of Maiden Lane II LLC, principal due to the FRBNY, interest due to the FRBNY, and deferred payment and interest due to AIG subsidiaries. Any remaining funds will be shared by the FRBNY and AIG subsidiaries.
6. Information on Principal Accounts of Maiden Lane III LLC
Millions of dollars
Account name
Wednesday
Sep 10, 2014
Net portfolio holdings of Maiden Lane III LLC1
22
Outstanding principal amount of loan extended by the Federal Reserve Bank of New York2
0
Accrued interest payable to the Federal Reserve Bank of New York2
0
Outstanding principal amount and accrued interest on loan payable to American International Group, Inc.3
0
1.
Fair value. Fair value reflects an estimate of the price that would be received upon selling an asset if the transaction were to be conducted in an orderly market on the measurement date. Revalued quarterly. This table reflects valuations as of June 30, 2014. Any assets purchased after
this valuation date are initially recorded at cost until their estimated fair value as of the purchase date becomes available.
2.
Book value. This amount was eliminated when preparing the Federal Reserve Bank of New York’s statement of condition consistent with consolidation under generally accepted accounting principles. Refer to the note on consolidation accompanying table 9.
3.
Book value. The fair value of these obligations is included in other liabilities and capital in table 1 and in other liabilities and accrued dividends in table 8 and table 9.
Note: On November 25, 2008, the Federal Reserve Bank of New York (FRBNY) began extending credit to Maiden Lane III LLC under the authority of section 13(3) of the Federal Reserve Act. This limited liability company was formed to purchase multi-sector collateralized debt obligations (CDOs) on which the Financial Products group of American International Group, Inc. (AIG) has written credit default swap (CDS) contracts. In connection with the purchase of CDOs, the CDS counterparties will concurrently unwind the related CDS transactions. Payments by Maiden Lane III LLC from the proceeds of the net portfolio holdings will be made in the following order: operating expenses of Maiden Lane III LLC, principal due to the FRBNY, interest due to the FRBNY, principal due to AIG, and interest due to AIG. Any remaining funds will be shared by the FRBNY and AIG.
7. Information on Principal Accounts of TALF LLC
Millions of dollars
Account name
Wednesday
Sep 10, 2014
Asset-backed securities holdings1
0
Other investments, net
44
Net portfolio holdings of TALF LLC
44
Outstanding principal amount of loan extended by the Federal Reserve Bank of New York2
0
Accrued interest payable to the Federal Reserve Bank of New York2
0
Funding provided by U.S. Treasury to TALF LLC, including accrued interest payable3
0
1.
Fair value. Fair value reflects an estimate of the price that would be received upon selling an asset if the transaction were to be conducted in an orderly market on the measurement date.
2.
Book value. This amount was eliminated when preparing the Federal Reserve Bank of New York’s statement of condition consistent with consolidation under generally accepted accounting principles. Refer to the note on consolidation accompanying table 9.
3.
Book value. The fair value of these obligations is included in other liabilities and capital in table 1 and in other liabilities and accrued dividends in table 8 and table 9.
Note: On November 25, 2008, the Federal Reserve announced the creation of the Term Asset-Backed Securities Loan Facility (TALF) under theauthority of section 13(3) of the Federal Reserve Act. The TALF is a facility under which the Federal Reserve Bank of New York (FRBNY) extended loans with a term of up to five years to holders of eligible asset-backed securities. The Federal Reserve closed the TALF for new loan extensions in 2010. The loans provided through the TALF to eligible borrowers are non-recourse, meaning that the obligation of the borrower can be discharged by surrendering the collateral to the FRBNY.
TALF LLC is a limited liability company formed to purchase and manage any asset-backed securities received by the FRBNY in connection with the decision of a borrower not to repay a TALF loan. TALF LLC has committed, for a fee, to purchase all asset-backed securities received by the FRBNY in conjunction with a TALF loan at a price equal to the TALF loan plus accrued but unpaid interest. Prior to January 15, 2013, the U.S. Treasury’s Troubled Asset Relief Program (TARP) committed backup funding to TALF LLC, providing credit protection to the FRBNY. However, the accumulated fees and income collected through the TALF and held by TALF LLC now exceed the remaining amount of TALF loans outstanding. Accordingly, the TARP credit protection commitment has been terminated, and TALF LLC has begun to distribute excess proceeds to the Treasury and the FRBNY. Any remaining funds will be shared by the FRBNY and the U.S. Treasury.
8. Consolidated Statement of Condition of All Federal Reserve Banks
Millions of dollars
Assets, liabilities, and capital
Eliminations from consolidation
Wednesday
Sep 10, 2014
Change since
Wednesday
Wednesday
Sep 3, 2014
Sep 11, 2013
Assets
Gold certificate account
11,037
0
0
Special drawing rights certificate account
5,200
0
0
Coin
1,930
+ 8
– 62
Securities, unamortized premiums and discounts, repurchase agreements, and loans
4,351,126
+ 3,534
+ 756,847
Securities held outright1
4,160,521
+ 3,657
+ 763,739
U.S. Treasury securities
2,440,637
+ 3,651
+ 399,549
Bills2
0
0
0
Notes and bonds, nominal2
2,326,351
+ 3,661
+ 385,784
Notes and bonds, inflation-indexed2
97,755
0
+ 10,546
Inflation compensation3
16,531
– 10
+ 3,219
Federal agency debt securities2
41,562
0
– 22,654
Mortgage-backed securities4
1,678,322
+ 6
+ 386,844
Unamortized premiums on securities held outright5
208,907
– 132
+ 5,820
Unamortized discounts on securities held outright5
-18,654
+ 19
– 12,787
Repurchase agreements6
0
0
0
Loans
352
– 10
+ 75
Net portfolio holdings of Maiden Lane LLC7
1,665
+ 1
+ 167
Net portfolio holdings of Maiden Lane II LLC8
63
0
– 1
Net portfolio holdings of Maiden Lane III LLC9
22
0
0
Net portfolio holdings of TALF LLC10
44
0
– 68
Items in process of collection
(0)
94
– 22
– 31
Bank premises
2,255
0
– 29
Central bank liquidity swaps11
77
+ 1
– 243
Foreign currency denominated assets12
22,801
– 404
– 925
Other assets13
25,095
+ 2,704
+ 3,719
Total assets
(0)
4,421,408
+ 5,821
+ 759,373
Note: Components may not sum to totals because of rounding. Footnotes appear at the end of the table.
8. Consolidated Statement of Condition of All Federal Reserve Banks (continued)
Millions of dollars
Assets, liabilities, and capital
Eliminations from consolidation
Wednesday
Sep 10, 2014
Change since
Wednesday
Wednesday
Sep 3, 2014
Sep 11, 2013
Liabilities
Federal Reserve notes, net of F.R. Bank holdings
1,247,980
– 2,086
+ 84,510
Reverse repurchase agreements14
267,602
+ 17,296
+ 175,438
Deposits
(0)
2,842,072
– 8,612
+ 499,663
Term deposits held by depository institutions
0
0
0
Other deposits held by depository institutions
2,788,954
– 24,799
+ 513,312
U.S. Treasury, General Account
31,872
+ 10,836
+ 1,852
Foreign official
5,241
– 1,326
– 3,524
Other15
(0)
16,004
+ 6,676
– 11,978
Deferred availability cash items
(0)
721
– 482
– 163
Other liabilities and accrued dividends16
6,693
– 299
– 1,529
Total liabilities
(0)
4,365,067
+ 5,817
+ 757,919
Capital accounts
Capital paid in
28,170
+ 2
+ 726
Surplus
28,170
+ 2
+ 726
Other capital accounts
0
0
0
Total capital
56,341
+ 4
+ 1,454
Note: Components may not sum to totals because of rounding.
1.
Includes securities lent to dealers under the overnight securities lending facility; refer to table 1A.
2.
Face value of the securities.
3.
Compensation that adjusts for the effect of inflation on the original face value of inflation-indexed securities.
4.
Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of the securities.
5.
Reflects the premium or discount, which is the difference between the purchase price and the face value of the securities that has not been amortized. For U.S. Treasury and Federal agency debt securities, amortization is on a straight-line basis. For mortgage-backed securities, amortization is on an effective-interest basis.
6.
Cash value of agreements, which are collateralized by U.S. Treasury and federal agency securities.
7.
Refer to table 4 and the note on consolidation accompanying table 9.
8.
Refer to table 5 and the note on consolidation accompanying table 9.
9.
Refer to table 6 and the note on consolidation accompanying table 9.
10.
Refer to table 7 and the note on consolidation accompanying table 9.
11.
Dollar value of foreign currency held under these agreements valued at the exchange rate to be used when the foreign currency is returned to
the foreign central bank. This exchange rate equals the market exchange rate used when the foreign currency was acquired from the foreign
central bank.
12.
Revalued daily at current foreign currency exchange rates.
13.
Includes accrued interest, which represents the daily accumulation of interest earned, and other accounts receivable.
14.
Cash value of agreements, which are collateralized by U.S. Treasury securities, federal agency debt securities, and mortgage-backed securities.
15.
Includes deposits held at the Reserve Banks by international and multilateral organizations, government-sponsored enterprises, and designated financial market utilities.
16.
Includes the liabilities of Maiden Lane LLC, Maiden Lane II LLC, Maiden Lane III LLC, and TALF LLC to entities other than the Federal
Reserve Bank of New York, including liabilities that have recourse only to the portfolio holdings of these LLCs. Refer to table 4 through table 7 and the note on consolidation accompanying table 9. Also includes the liability for interest on Federal Reserve notes due to U.S. Treasury.
9. Statement of Condition of Each Federal Reserve Bank, September 10, 2014
Millions of dollars
Assets, liabilities, and capital
Total
Boston
New York
Philadelphia
Cleveland
Richmond
Atlanta
Chicago
St. Louis
Minneapolis
Kansas
Dallas
San
City
Francisco
Assets
Gold certificate account
11,037
352
4,125
338
464
824
1,349
706
278
173
291
880
1,257
Special drawing rights certificate acct.
5,200
196
1,818
210
237
412
654
424
150
90
153
282
574
Coin
1,930
32
94
124
123
320
222
276
25
46
153
182
332
Securities, unamortized premiums and discounts, repurchase agreements,
and loans
4,351,126
88,009
2,670,390
104,231
94,993
243,168
240,542
177,833
53,725
26,795
57,330
132,586
461,524
Securities held outright1
4,160,521
84,160
2,553,576
99,673
90,839
232,534
229,991
170,046
51,317
25,497
54,804
126,772
441,311
U.S. Treasury securities
2,440,637
49,370
1,497,974
58,470
53,288
136,409
134,917
99,752
30,104
14,957
32,149
74,367
258,881
Bills2
0
0
0
0
0
0
0
0
0
0
0
0
0
Notes and bonds3
2,440,637
49,370
1,497,974
58,470
53,288
136,409
134,917
99,752
30,104
14,957
32,149
74,367
258,881
Federal agency debt securities2
41,562
841
25,509
996
907
2,323
2,298
1,699
513
255
547
1,266
4,409
Mortgage-backed securities4
1,678,322
33,949
1,030,093
40,207
36,644
93,803
92,777
68,595
20,701
10,285
22,107
51,139
178,021
Unamortized premiums on securities held outright5
208,907
4,226
128,220
5,005
4,561
11,676
11,548
8,538
2,577
1,280
2,752
6,365
22,159
Unamortized discounts on securities held outright5
-18,654
-377
-11,449
-447
-407
-1,043
-1,031
-762
-230
-114
-246
-568
-1,979
Repurchase agreements6
0
0
0
0
0
0
0
0
0
0
0
0
0
Loans
352
1
44
0
0
0
34
11
61
132
20
17
33
Net portfolio holdings of Maiden
Lane LLC7
1,665
0
1,665
0
0
0
0
0
0
0
0
0
0
Net portfolio holdings of Maiden
Lane II LLC8
63
0
63
0
0
0
0
0
0
0
0
0
0
Net portfolio holdings of Maiden
Lane III LLC9
22
0
22
0
0
0
0
0
0
0
0
0
0
Net portfolio holdings of TALF LLC10
44
0
44
0
0
0
0
0
0
0
0
0
0
Items in process of collection
94
0
0
0
0
0
93
0
0
1
0
0
0
Bank premises
2,255
121
434
74
110
222
209
198
124
97
243
224
200
Central bank liquidity swaps11
77
4
25
6
6
16
4
2
1
0
1
1
11
Foreign currency denominated assets12
22,801
1,037
7,335
1,714
1,813
4,754
1,311
629
192
96
240
381
3,299
Other assets13
25,095
535
15,039
739
546
1,547
1,374
1,014
356
219
347
798
2,580
Interdistrict settlement account
0
+ 10,547
– 58,585
+ 2,678
+ 9,252
+ 197
+ 8,040
– 10,297
– 10,950
– 2,083
– 134
+ 2,635
+ 48,701
Total assets
4,421,408
100,833
2,642,468
110,114
107,543
251,460
253,799
170,787
43,900
25,434
58,623
137,969
518,478
Note: Components may not sum to totals because of rounding. Footnotes appear at the end of the table.
9. Statement of Condition of Each Federal Reserve Bank, September 10, 2014 (continued)
Millions of dollars
Assets, liabilities, and capital
Total
Boston
New York
Philadelphia
Cleveland
Richmond
Atlanta
Chicago
St. Louis
Minneapolis
Kansas
Dallas
San
City
Francisco
Liabilities
Federal Reserve notes outstanding
1,443,974
44,572
489,349
42,766
65,118
103,568
212,875
94,569
37,360
21,242
36,783
115,911
179,862
Less: Notes held by F.R. Banks
195,994
5,311
63,063
6,357
8,870
11,177
20,690
11,915
4,937
4,278
5,302
25,736
28,359
Federal Reserve notes, net
1,247,980
39,261
426,285
36,409
56,248
92,391
192,186
82,654
32,423
16,964
31,481
90,175
151,503
Reverse repurchase agreements14
267,602
5,413
164,244
6,411
5,843
14,956
14,793
10,937
3,301
1,640
3,525
8,154
28,385
Deposits
2,842,072
53,409
2,030,175
62,876
40,791
131,999
42,547
75,315
7,510
6,356
22,882
38,429
329,783
Term deposits held by depository institutions
0
0
0
0
0
0
0
0
0
0
0
0
0
Other deposits held by depository institutions
2,788,954
53,397
1,977,410
62,837
40,788
131,731
42,538
75,306
7,510
6,355
22,881
38,428
329,774
U.S. Treasury, General Account
31,872
0
31,872
0
0
0
0
0
0
0
0
0
0
Foreign official
5,241
2
5,214
3
3
8
2
1
0
0
0
1
6
Other15
16,004
11
15,679
36
0
260
7
7
0
0
1
0
3
Deferred availability cash items
721
0
0
0
0
0
611
0
0
110
0
0
0
Interest on Federal Reserve notes due
to U.S. Treasury16
1,693
19
1,199
20
10
23
86
73
20
12
20
54
155
Other liabilities and accrued
dividends17
5,000
167
2,179
211
208
544
361
282
142
118
126
208
454
Total liabilities
4,365,067
98,270
2,624,083
105,927
103,101
239,913
250,583
169,261
43,395
25,200
58,034
137,021
510,279
Capital
Capital paid in
28,170
1,282
9,193
2,093
2,221
5,773
1,608
763
252
117
295
474
4,099
Surplus
28,170
1,282
9,193
2,093
2,221
5,773
1,608
763
252
117
295
474
4,099
Other capital
0
0
0
0
0
0
0
0
0
0
0
0
0
Total liabilities and capital
4,421,408
100,833
2,642,468
110,114
107,543
251,460
253,799
170,787
43,900
25,434
58,623
137,969
518,478
Note: Components may not sum to totals because of rounding. Footnotes appear at the end of the table.
9. Statement of Condition of Each Federal Reserve Bank, September 10, 2014 (continued)
1.
Includes securities lent to dealers under the overnight securities lending facility; refer to table 1A.
2.
Face value of the securities.
3.
Includes the original face value of inflation-indexed securities and compensation that adjusts for the effect of inflation on the original face value of such securities.
4.
Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of the securities.
5.
Reflects the premium or discount, which is the difference between the purchase price and the face value of the securities that has not been amortized. For U.S. Treasury and Federal agency debt securities, amortization is on a straight-line basis. For mortgage-backed securities, amortization is on an effective-interest basis.
6.
Cash value of agreements, which are collateralized by U.S. Treasury and federal agency securities.
7.
Refer to table 4 and the note on consolidation below.
8.
Refer to table 5 and the note on consolidation below.
9.
Refer to table 6 and the note on consolidation below.
10.
Refer to table 7 and the note on consolidation below.
11.
Dollar value of foreign currency held under these agreements valued at the exchange rate to be used when the foreign currency is returned to the foreign central bank. This exchange rate
equals the market exchange rate used when the foreign currency was acquired from the foreign central bank.
12.
Revalued daily at current foreign currency exchange rates.
13.
Includes accrued interest, which represents the daily accumulation of interest earned, and other accounts receivable.
14.
Cash value of agreements, which are collateralized by U.S. Treasury securities, federal agency debt securities, and mortgage-backed securities.
15.
Includes deposits held at the Reserve Banks by international and multilateral organizations, government-sponsored enterprises, and designated financial market utilities.
16.
Represents the estimated weekly remittances to U.S. Treasury as interest on Federal Reserve notes or, in those cases where the Reserve Bank’s net earnings are not sufficient to equate surplus to capital paid-in, the deferred asset for interest on Federal Reserve notes. The amount of any deferred asset, which is presented as a negative amount in this line, represents the amount of the Federal Reserve Bank’s earnings that must be retained before remittances to the U.S. Treasury resume. The amounts on this line are calculated in accordance with Board of Governors policy, which requires the Federal Reserve Banks to remit residual earnings to the U.S. Treasury as interest on Federal Reserve notes after providing for the costs of operations, payment of dividends, and the amount necessary to equate surplus with capital paid-in.
17.
Includes the liabilities of Maiden Lane LLC, Maiden Lane II LLC, Maiden Lane III LLC, and TALF LLC to entities other than the Federal Reserve Bank of New York, including liabilities that have recourse only to the portfolio holdings of these LLCs. Refer to table 4 through table 7 and the note on consolidation below.
Note on consolidation:
The Federal Reserve Bank of New York (FRBNY) has extended loans to several limited liability companies under the authority of section 13(3) of the Federal Reserve Act. On June 26, 2008, a loan was extended to Maiden Lane LLC, which was formed to acquire certain assets of Bear Stearns. On November 25, 2008, a loan was extended to Maiden Lane III LLC, which was formed to purchase multi-sector collateralized debt obligations on which the Financial Products group of the American International Group, Inc. has written credit default swap contracts. On December 12, 2008, a loan was extended to Maiden Lane II LLC, which was formed to purchase residential mortgage-backed securities from the U.S. securities lending reinvestment portfolio of subsidiaries of American International Group, Inc. On November 25, 2008, the Federal Reserve Board authorized the FRBNY to extend credit to TALF LLC, which was formed to purchase and manage any asset-backed securities received by the FRBNY in connection with the decision of a borrower not to repay a loan extended under the Term Asset-Backed Securities Loan Facility.
The FRBNY is the primary beneficiary of TALF LLC, because of the two beneficiaries of the LLC, the FRBNY and the U.S. Treasury, the FRBNY is primarily responsible for directing the financial activities of TALF LLC. The FRBNY is the primary beneficiary of the other LLCs cited above because it will receive a majority of any residual returns of the LLCs and absorb a majority of any residual losses of the LLCs. Consistent with generally accepted accounting principles, the assets and liabilities of these LLCs have been consolidated with the assets and liabilities of the FRBNY in the preparation of the statements of condition shown on this release. As a consequence of the consolidation, the extensions of credit from the FRBNY to the LLCs are eliminated, the net assets of the LLCs appear as assets on the previous page (and in table 1 and table 8), and the liabilities of the LLCs to entities other than the FRBNY, including those with recourse only to the portfolio holdings of the LLCs, are included in other liabilities in this table (and table 1 and table 8).
10. Collateral Held against Federal Reserve Notes: Federal Reserve Agents’ Accounts
Millions of dollars
Federal Reserve notes and collateral
Wednesday
Sep 10, 2014
Federal Reserve notes outstanding
1,443,974
Less: Notes held by F.R. Banks not subject to collateralization
195,994
Federal Reserve notes to be collateralized
1,247,980
Collateral held against Federal Reserve notes
1,247,980
Gold certificate account
11,037
Special drawing rights certificate account
5,200
U.S. Treasury, agency debt, and mortgage-backed securities pledged1,2
1,231,743
Other assets pledged
0
Memo:
Total U.S. Treasury, agency debt, and mortgage-backed securities1,2
4,160,521
Less: Face value of securities under reverse repurchase agreements
257,508
U.S. Treasury, agency debt, and mortgage-backed securities eligible to be pledged
3,903,013
Note: Components may not sum to totals because of rounding.
1.
Includes face value of U.S. Treasury, agency debt, and mortgage-backed securities held outright, compensation to adjust for the effect of inflation on the original face value of inflation-indexed securities, and cash value of repurchase agreements.
2.
Includes securities lent to dealers under the overnight securities lending facility; refer to table 1A.
Nuclear Security Summit 2014 in the Hague – Obama & Xi meet
Effects of a Nuclear Bomb Part 1: A Terrorist Nuke Detonates in a City
Effects of a Nuclear Bomb Part 2; Superpower Weapons
Obama and the plan for World War 3
Washington, D.C. gets NUKED! (DAY AFTER DISASTER)
Who’d survive a nuclear attack on D.C.?
Obama’s war games
Nuclear Terrorism and Malaysia Airlines Flight 370 Connection – YouTube
AE 2010: NYC Nuclear Explosion
ATOMIC ATTACK! – New York City Bombed with Nuclear Weapons – How to Survive
Summit goal: Secure “loose nukes”
2012 Young Atlanticist Summit – Conversation with Elizabeth Sherwood-Randall
Fail Safe ending clip
Fail Safe (2000) World Nuclear Holocaust [full movie]
Nuclear Bomb Test Compilation HD
Top 10 Most Powerful Nuclear Bombs In History
Merkel miffed at Barack Obama and David Cameron ‘nuclear war game’
World leaders played an interactive nuclear war game designed to test their responses to a terrorist atomic “dirty bomb” attack that threatened the lives of hundreds of thousands of people
By Bruno Waterfield, and Peter Dominiczak in The Hague and Nick Squires in Rome
David Cameron joined Barack Obama, Angela Merkel and Xi Jinping and other world leaders to play a “nukes on the loose” war game to see how they would cope with a terrorist nuclear attack.
The German chancellor grumbled at being asked to play games and take tests with the Prime Minister, US and Chinese presidents around a table with dozens of heads of state at a nuclear summit inThe Hague.
Her complaints were overruled because Mr Obama was keen on the idea and in on the surprise.
In the war game, played out by actors in a series of short films, a terrorist attack with an atomic “dirty bomb” takes place in the financial heart of an unnamed but Western metropolis. “It could be the City of London, or Wall Street, Milan or anywhere”, summit leaders were told.
As the scenario unfolded, it emerged that the terrorists are from an unidentified global terror network and they have stolen nuclear material from an unidentified country that had poorly secured its radiological and nuclear stockpiles.
The bomb is being built in a clandestine laboratory with stolen uranium. It is an improvised explosive device but deadly and the clock is ticking, the leaders were told. Hundreds of thousands of people could be about to die.
“They had to give an answer on their own, in real time. It was like a test. It put them on the spot. Should they inform the public or keep them in the dark,” said a diplomatic source.
“Should they work with other countries or stand alone to try to thwart or minimise the attack? How should they make the cold calculation of how to get a more sustainable human cost in terms of deaths?”
Each world leader had a computer tablet with a touch screen options to make one of four responses to a series of four scenario films played by actors and mimicking the famous 1983 Cold War Hollywood thriller “War Games”, where a computer hacker triggers a nuclear missile scare.
In a competitive environment, with a ticking clock, the leaders had to make rapid choices before the results were presented to the group, anonymously stripped of their identities and followed by discussion.
Perhaps predictably at a world summit on nuclear security, the war game found that shared, collective international decisions were able to stop the terrorist network before they could actually build the dirty bomb.
US officials said that the unconventional approach had been designed to give a “scare you to death” shock to make leaders seriously think about the security of nuclear materials.
But not everyone was happy about playing the war game with the grumbling led by Mrs Merkel who was unimpressed with role-playing at such a high-powered gathering. Mr Obama, who helped plan the game, overrode the moaning. He had Elizabeth Sherwood-Randall, his lead national security adviser on the issue, helpfully by his side.
“Leaders had their doubts about participation on their own without their expert civil servants. It was about discussion and problem solving without leaders relying on written statements to read out. At the end the leaders were more enthusiastic,” said a spokesman for the summit.
Would you survive a nuclear blast?
Nuclear Blast Mapper on the PBS “Race for the Superbomb” web site show how horribly destructive thermonuclear weapons are. The fission bomb detonated over Nagasaki had an explosive power equivalent to 20,000 tons of TNT. Blast Mapper’s 1-million ton hydrogen bomb, hypothetically detonated on the earth’s surface at any location you choose, has 50 times the explosive power of that 1945 explosion. Video clips of actual A-bomb detonations and their effects can also be viewed at: http://www.pbs.org/wgbh/amex/bomb
The adjoining map of the Tri-Cities, Washington, shows circles of destruction from a 1 megaton surface blast centered on Columbia Center mall.
Blast map key
NOTE: Blast pressure within the circles is greater than the indicated values and is less outside the circles. The zones of destruction in the map are broad generalizations and do not take into account factors such as weather and topography. Fatality numbers do not include the significant delayed effects of trauma, fire, or radioactivity.
12 psi (pounds per square inch), Radius: 1.7 miles
At ground zero lies a crater 200 feet deep and 1000 feet in diameter. The rim of the crater is composed of highly radioactive soil and debris. Nothing recognizable remains within about 0.6 mile from the center except, perhaps, the remains of some buildings’ foundations. At 1.7 miles, only some of the strongest buildings — those made of reinforced, poured concrete — are still standing. Ninety-eight percent of the population within this area are dead immediately.
5 psi, radius – 2.7 miles
Virtually everything is destroyed between the 12 and 5 psi circles. The walls of typical multi-story buildings, including apartment buildings, are completely blown out. The bare, structural skeletons of some buildings rise above the debris as you approach the 5 psi circle. Single-family residences within this area are completely blown away — only their foundations remain. Fifty percent of the population between the 12 and 5 psi circles are dead. Forty percent more are injured.
2 psi, radius – 4.7 miles
Any single-family residences that are not completely destroyed are heavily damaged. The windows of office buildings are blown away, as are some of their walls. Everything on these buildings’ upper floors, including the people who were working there, are thrown onto the street. Substantial debris clutters the entire area. Five percent of the population between the 5 and 2 psi circles are dead. Forty-five percent are injured.
1 psi, radius – 7.4 miles
Residences are moderately damaged. Commercial buildings have sustained minimal damage. Twenty-five percent of the population between the 2 and 1 psi circles have been injured, mainly by flying glass and debris. Many others have suffered flash burns from thermal radiation generated by the explosion.
Fallout effects
Radiation effects are for downwind areas.
Assumptions: wind speed – 15 mph, time frame – 7 days
3,000 rem*, distance – 30 miles
Much more than a lethal dose of radiation. Death can occur within hours of exposure. About ten years will need to pass before levels of radioactivity in this area are low enough to be considered safe by U.S. peacetime standards.
900 rem, distance – 90 miles
A lethal dose of radiation. Death occurs from two to fourteen days.
300 rem, distance – 160 miles
Causes extensive internal damage, including harm to nerve cells and the cells that line the digestive tract. Also results in a loss of white blood cells and temporary hair loss.
90 rem, distance – 250 miles
No immediate harmful effects, but does result in a temporary decrease in white blood cells. Two to three years will need to pass before radioactivity levels in this area are low enough to be considered safe by U.S. peacetime standards.
*rem stands for “roentgen equivalent man.” It is a measurement used to quantify the amount of radiation that will produce certain biological effects.
NOTE: This information is drawn mainly from “The Effects of Nuclear War” (Office of Technology Assessment, Congress of the United States, Washington DC, 1979).
Story 1: Got Google Glass — Explorer 2.0 With New Form Factor — Department of Homeland Security Questions You! — Videos
I used Google Glass
Google Glasses (how it works)
How Guys Will Use Google Glass
Google Glass Review
Google Glass Cracked
CNET Top 5 : Best uses for Google Glass
Introduction to Google Glass
Google Glass Hacked?
Google Glass Explorer Edition: Explained!
Explorer Story: Patrick Jackson [through Google Glass]
Google Glass Explorer Edition 2.0 Unboxing and First Impressions
Amazing Google Glasses Demonstration at Google I/O 2012
GOOGLE GLASS FOR KIDS!
GOOGLE GLASS SUCKS!
Introducing Google Nose
Google Glasses Project
Motion Picture Association of America
“TITS and GLASS”: Porn Blocked from Google Glass
WTF- Porn App Coming Soon On Google Glass
Google Glass Bans PORN
Police Wearing Google Glass-type System to Record Encounters
Story 1: Got Google Glass — Explore 2.0 With New Form Factor — Department of Homeland Security Questions You! — Videos
AMC movie theater calls “federal agents” to arrest a Google Glass user
By: Julie Strietelmeier
A long time Gadgeteer reader contacted me today through Google Hangouts to tell me that he had a story that he thought I’d be interested in reading. He then forwarded me a long email with a story from a very good friend of his. It was such a surprising story that I asked if I could have permission to post it here on The Gadgeteer. I ended up communicating with the author of the story and have posted it here for everyone to read…
I have been using Google Glass for about 2 months now, and about 2 weeks ago I got prescription lenses for the glasses. So in the past two weeks I was wearing Google Glass all the time. There were no stories to write about, until yesterday (1/18/2014).
I went to AMC (Easton Mall, Columbus, OH) to watch a movie with my wife (non- Google Glass user). It is the theater we go to every week, so it has probably been the third time I’ve been there wearing Google Glass, and the AMC employees (guy tearing tickets at the entrance, girl at the concession stand) have asked me about Glass in the past and I have told them how awesome Glass is with every occasion.
Because I don’t want Glass to distract me during the movie, I turn them off (but since my prescription lenses are on the frame, I still wear them). About an hour into the movie (Jack Ryan: Shadow Recruit), a guy comes near my seat, shoves a badge that had some sort of a shield on it, yanks the Google Glass off my face and says “follow me outside immediately”. It was quite embarrassing and outside of the theater there were about 5-10 cops and mall cops. Since I didn’t catch his name in the dark of the theater, I asked to see his badge again and I asked what was the problem and I asked for my Glass back. The response was “you see all these cops you know we are legit, we are with the ‘federal service’ and you have been caught illegally taping the movie”.
I was surprised by this and as I was obviously just having a nice Saturday evening night out with my wife and not taping anything whether legally or illegally, I tried to explain that this is a misunderstanding. I tried to explain that he’s holding rather expensive hardware that costed me $1500 for Google Glass and over $600 for the prescription glasses. The response was that I was searched and more stuff was taken away from me (specifically my personal phone, my work phone – both of which were turned off, and my wallet). After an embarrassing 20-30 minutes outside the movie theater, me and my wife were conducted into two separate rooms in the “management” office of Easton Mall, where the guy with the badge introduced himself again and showed me a different ID. His partner introduced herself too and showed me a similar looking badge. I was by that time, too flustered to remember their names (as a matter of fact, now, over 30 hours later I am still shaking when recounting the facts).
What followed was over an hour of the “feds” telling me I am not under arrest, and that this is a “voluntary interview”, but if I choose not to cooperate bad things may happen to me (is it legal for authorities to threaten people like that?). I kept telling them that Glass has a USB port and not only did I allow them, I actually insist they connect to it and see that there was nothing but personal photos with my wife and my dog on it. I also insisted they look at my phone too and clear things out, but they wanted to talk first. They wanted to know who I am, where I live, where I work, how much I’m making, how many computers I have at home, why am I recording the movie, who am I going to give the recording to, why don’t I just give up the guy up the chain, ’cause they are not interested in me. Over and over and over again.
I kept telling them that I wasn’t recording anything – my Glass was off, they insisted they saw it on. I told them there would be a light coming out the little screen if Glass was on, and I could show them that, but they insisted that I cannot touch my Glass for the fear “I will erase the evidence against me that was on Glass”. I didn’t have the intuition to tell them that Glass gets really warm if it records for more than a few minutes and my glasses were not warm. They wanted to know where I got Glass and how did I came by having it. I told them I applied about 1000 times to get in the explorer program, and eventually I was selected, and I got the Glass from Google. I offered to show them receipt and Google Glass website if they would allow me to access any computer with internet. Of course, that was not an option. Then they wanted to know what does Google ask of me in exchange for Glass, how much is Google paying me, who is my boss and why am I recording the movie.
Eventually, after a long time somebody came with a laptop and an USB cable at which point he told me it was my last chance to come clean. I repeated for the hundredth time there is nothing to come clean about and this is a big misunderstanding so the FBI guy finally connected my Glass to the computer, downloaded all my personal photos and started going though them one by one (although they are dated and it was obvious there was nothing on my Glass that was from the time period they accused me of recording). Then they went through my phone, and 5 minutes later they concluded I had done nothing wrong.
I asked why didn’t they just take those five minutes at the beginning of the interrogation and they just left the room. A guy who claimed his name is Bob Hope (he gave me his business card) came in the room, and said he was with the Movie Association and they have problems with piracy at that specific theater and that specific movie. He gave me two free movie passes “so I can see the movie again”. I asked if they thought my Google Glass was such a big piracy machine, why didn’t they ask me not to wear them in the theater? I would have probably sat five or six rows closer to the screen (as I didn’t have any other pair of prescription glasses with me) and none of this would have happened. All he said was AMC called him, and he called the FBI and “here are two more passes for my troubles”. I would have been fine with “I’m sorry this happened, please accept our apologies”. Four free passes just infuriated me.
Considering it was 11:27pm when this happened, and the movie started at 7.45, I guess 3 and a half hours of my time and the scare my wife went through (who didn’t know what was going on as nobody bothered to tell her) is worth about 30 bucks in the eyes of the Movie Association and the federal militia (sorry, I cannot think of other derogatory words). I think I should sue them for this, but I don’t have the time or the energy to deal with “who is my boss – they don’t want me, they want the big guy” again, so I just spilled the beans on this forum, for other to learn from my experience.
I guess until people get more familiar with Google Glass and understand what they are, one should not wear them to the movies. I wish they would have said something before I went to the movies, but it may be my mistake for assuming that if I went and watched movies two times wearing Glass with no incident the third time there won’t be any incident either. As for the federal agents and their level of comprehension… I guess if they deal with petty criminals every day, everybody starts looking like a petty criminal. Again, I wish they would have listened when I told them how to verify I did nothing illegal, or at least apologize afterwards, but hey… this is the free country everybody praises. Somewhere else might be even worse.
Crazy huh? His story read like something out of the Jack Ryan movie that he and his wife had gone to see. Are there any other Google Glass users out there that have been treated badly just for your wearable tech? If not, are you reconsidering wearing a pair to the next movie you attend?
Update (01/21/14):
Wow, this article has completely blown up our web server due to the traffic. I just wanted to follow up with a few comments and info. First of all, I’m not a journalist, I’m a tech geek writer. Posting this article has given me a good learning lesson though, which I’ll use if I ever post a similar article in the future.
I have been criticized for not citing my sources and following up with the theater to verify that the story was true. I didn’t feel the need at the time because the person who gave me the story is a long time Gadgeteer reader and works in law enforcement. I felt 100% confident the story was not a hoax. I did however call the theater in question and tried to get in touch with someone there for a comment. My calls went unanswered.
After the article was posted. Rob Jackson of Phandroid posted his take on the article and asked me for the author’s contact info. With the author’s permission, I forwarded that info and Rob followed up with some questions and answers that he posted on his site. Take a look for more info on this story:
I just received info from the author with regards to the agents that questioned him:
For the sake of having all the facts right.
I have been trying to find out who the agents that “interviewed” me at
AMC were, so I asked help from a guy I know at FBI. I worked with this
guy in the past when I was employed at a webhosting company. He did
some digging, and he tells me the “federal agents”
talking to me were DHS.
Update #3:
The title of the article has been changed to reflect the recent update from the author that it was actually the DHS (Department of Homeland Security) who detained him and not the FBI as he originally thought.
Update #4:
The story has been confirmed. I just received this email from the author:
Julie, Rob.
I spoke with a reporter from Columbus Dispatch, who obtained a
statement from DHS and forwarded it to me. Here it is:
From: Walls, Khaalid H [mailto:Khaalid.H.Walls@ice.dhs.gov]
Sent: Tuesday, January 21, 2014 1:16 PM
To: Allison Manning
Subject: ICE
H Ally,
Please attribute the below statement to me:
On Jan. 18, special agents with ICE’s Homeland Security Investigations
and local authorities briefly interviewed a man suspected of using an
electronic recording device to record a film at an AMC theater in
Columbus. The man, who voluntarily answered questions, confirmed to
authorities that the suspected recording device was also a pair of
prescription eye glasses in which the recording function had been
inactive. No further action was taken.
Khaalid Walls, ICE spokesman
Khaalid Walls
Public Affairs Officer
U.S. Immigration and Customs Enforcement (ICE)
Google Glass at the movies gets man interrogated
A man wearing Google Glass in an Ohio movie theater says the FBI pulled him out and accused him of recording the movie with his device.
There are enemies of the state, and then there are enemies of Jack Ryan.
A Google Glass wearer has told an extraordinary story of going to his local movie theater in Ohio and allegedly being accosted by the FBI for wearing his device.
Google Glass wearers, beware.(Credit: Federal Bureau of Investigations)
He was, he said, wearing Google Glass. His wife accompanied him, Glass-less.
What allegedly transpired was macabre. He wrote that it was not the first time he’d worn Glass to that theater.
However, an hour into the movie: “A guy comes near my seat, shoves a badge that had some sort of a shield on it, yanks the Google Glass off my face and says ‘follow me outside immediately.'”
Outside, he said, was a group of policemen. T.U. says that the man who dragged him out explained he was from the “federal service.”
What was the Glass-wearer’s alleged crime? He was, he said, being accused of recording the movie on his device.
He wrote:
I tried to explain that he’s holding rather expensive hardware that costed me $1500 for Google Glass and over $600 for the prescription glasses. The response was that I was searched and more stuff was taken away from me (specifically my personal phone, my work phone – both of which were turned off, and my wallet).
T.U. insisted that he wasn’t recording anything. The Glass was off. He wasn’t believed.
I kept telling them that I wasn’t recording anything — my Glass was off, they insisted they saw it on. I told them there would be a light coming out the little screen if Glass was on, and I could show them that, but they insisted that I cannot touch my Glass for the fear ‘I will erase the evidence against me that was on Glass’
T.U. said that he was happy for his Google Glass to be hooked up to a laptop to prove there was nothing recorded on it.
He wrote:
The FBI guy finally connected my Glass to the computer, downloaded all my personal photos and started going though them one by one (although they are dated and it was obvious there was nothing on my Glass that was from the time period they accused me of recording). Then they went through my phone, and 5 minutes later they concluded I had done nothing wrong.
Finally, T.U. said that the FBI left and a man from the “Movie Association” entered and told him that they’d had trouble with people recording at that theater. He says he was offered free movie passes to see the Jack Ryan movie again.
In the comments section of her piece, the Gadgeteer’s Julie Strietelmeier insisted: “I talked to the author and know his friend who has frequented The Gadgeteer for years. I believe them and the story.”
I have contacted AMC in an attempt to confirm that the substance of this story is true and will update, should I hear. It will be interesting to see if an anti-Google Glass stance is, indeed, AMC policy.
This is merely the latest incident in which Google Glass has caused consternation. Some bars and restaurants have banned wearers. Only last week, software developer Cecilia Abadie won her case against a ticket for driving while Glassing. Just as T.U. claimed, she said hers was turned off.
T.U. seemed merely relieved that the ordeal — which he said lasted more than three hours — was over. Still, he said he wished someone had told him that wearing Glass at the movie theater wasn’t allowed.
As for the “federal service,” he wasn’t impressed with their alleged lack of understanding about Google Glass. He wrote: “I guess if they deal with petty criminals every day, everybody starts looking like a petty criminal.”
Google Glass is becoming anything but petty.
Google Glass moviegoer detained for hours on suspicion of piracy
A man attending a movie on Saturday at an AMC theater in Columbus, Ohio was pulled from a theater, detained, and questioned for over two hours by US Dept. of Homeland Security special agents tasked with fighting piracy – all for wearing Google Glass.
The man, who asked to remain anonymous, said that about an hour into a 19:45 EST showing of ‘Jack Ryan: Shadow Recruit,’ a man who flashed an official-looking badge “yank[ed] the Google Glass” off his face, asking him to exit the theater. The man was attending the film with his wife at the AMC theater at Easton Town Center.
Two officers then ordered him to hand over his wallet and both his work and personal cell phones, according to tech site The Gadgeteer. The man said he was questioned for 20 or 30 minutes on why he was attempting to record the film. Because he had recently added prescription lenses to his Google Glass, the 35-year-old man wore them into the movie. The device has a voice-activated computer and does have an attached camera.
“I said, ‘Want me to prove I’m not recording the movie? It’s very easy,’” the man told the Columbus Dispatch on Tuesday. He said he indicated to the agents that Google Glass has a USB port where the device can be reviewed. “There’s nothing but pictures of my wife and my dog on it,” he told the agents.
The agents declined, electing to detain and question the man in a downstairs “management” office for around two hours, repeatedly asking the same questions again and again. The man says he was asked who he was working for, how many computers he had at home, why he had attempted to record the film, and “why don’t I just give up the guy up the chain.” The agents, of the US Immigration and Customs Enforcement (ICE), finally reviewed the device to see there was no material of interest. He was allowed to leave just after 23:00 EST, with two free movie passes.
The Columbus Dispatch learned the agents were from ICE’s Homeland Security Investigations unit, which is tasked with combating piracy and counterfeit goods.
ICE spokesman Khaalid Walls said the unit and local authorities “briefly interviewed a man suspected of using an electronic recording device to record a film.”
“The man, who voluntarily answered questions, confirmed to authorities that the suspected recording device was also a pair of prescription eye glasses in which the recording function had been inactive. No further action was taken,” Walls said in a statement.
An AMC spokesman said the Motion Picture Association of America (MPAA) was at the same theater last weekend when the man wearing Google Glass was pointed out. An MPAA representative flagged the man thought to be recording the film for the Department of Homeland Security.
“While we’re huge fans of technology and innovation, wearing a device that has the capability to record video is not appropriate at the movie theater,” AMC’s Ryan Noonan said.
The MPAA said in a statement that it has not seen any reason to believe that Google Glass poses a threat that could lead to film piracy.
The man said he acquired Google Glass in November during Google’s exclusive offer, known as the Explorer program. He and around 30,000 others have paid US$1,500 to test-run the device before it is released to the public later this year. In addition, the prescription lenses cost him $600.
He said he regrets wearing Glass to a movie, despite having done so in the recent past at the same theater without issue.
“I realize it’s stupid to have a device with a camera pointed at the screen,” he said. “But I didn’t even think of it, because I don’t use Google Glass to record other people.”
oogle promises that Glass, its new augmented reality eyepiece, will open up a new world of hands-free computing — a way to search, translate, record video, and take photographs without having to press buttons or rummage through pockets to retrieve a smartphone or tablet.
There are lots of potential applications. To start things off, Google lists cooking, cycling, skiing, golf, and firefighting — physical activities where holding a device is impractical if not impossible. But really, it was only a matter of time before people began using it for sex.
The first attempt, an app called Tits and Glass, allowed Glass users to stream pornographic images to their headset. The app was promptly banned from Google’s app store, but was recently reinstated.
Now a new app for Glass developed by Lebanese product design student Sherif Maktabi and called Sex with Google Glass lets couples use the wearable technology to record their intimate activities, and — if both partners are wearing a headset — even see sex through their partner’s eyes by streaming the view from their respective devices.
The app is controlled through groan-worthy voice commands. For example, saying “Ok Glass, it’s time” begins the recording process. Once sex is over, recording is ended by the voice command “Ok Glass, pull out.” Video can be replayed for up to five hours before being automatically deleted from the app.
Frankly, I think the idea of having sex while watching a stream from the perspective of your partner sounds narcissistic at best, and mildly disturbing at worst, so I highly doubt that this feature will become immensely popular. And putting a barrier of technology between partners may prove a turnoff and intimacy killer for many.
But Glass as a tool to easily record or stream homemade porn? There is probably a big market for this kind of thing.
Concerns about morals or privacy aside, it’s important to remember that porn is a big driver of technology adoption. The adult film industry has been at the forefront of technology for years, at least since it picked VHS over Betamax. Technological innovations pioneered by the porn industryinclude online payment systems, streaming video and video chat, DVD, and HD video formats.
It’s hard to say at this point if augmented reality computing will usurp smartphones, tablets, and laptops, or if it will remain a niche activity. But if augmented reality computing like Google Glass is really going to take off and become a market leader, it should be expected that sex and porn will be a key driver of adoption. The fact that some people are already using Google Glass for sex paints a rosy picture for the technology in the longer term.
Powder is a film about a boy nicknamed “Powder,” with incredible intellect, telepathy, and paranormal powers. It stars Sean Patrick Flanery in the title role, with Jeff Goldblum, Mary Steenburgen, Bradford Tatum, Lance Henriksen, and Brandon Smith in supporting roles. The film questions the limits of the human mind and body while also displaying our capacity for cruelty; it raises hope that humanity will advance to a state of better understanding.
Powder is a 1995 American drama film written and directed by Victor Salva and starring Sean Patrick Flanery in the title role, with Jeff Goldblum, Mary Steenburgen, Bradford Tatum and Lance Henriksen in supporting roles. It is about a boy nicknamed “Powder”, who has incredible intellect, telepathy and paranormal powers. The film questions the limits of the human mind and body while also displaying our capacity for cruelty, although it raises hope that humanity will advance to a state of better understanding.
Jeremy Reed, whose nickname is Powder, is an albino young man who has incredible intellect and is able to sense the thoughts of the people around him. Jeremy’s brain possesses a powerful electromagnetic charge, which causes electrical objects to function abnormally when he is around them, as well as when he becomes emotional. The electrical charge also prevents hair from growing on his body. Jeremy’s mother was struck by lightning while pregnant with him; she died shortly after the strike, but Jeremy survived. His father disowned him shortly after his premature birth, and he was raised by his grandparents. Jeremy lived in the basement and worked on their farm but never left their property, learning everything he knew from books. He is taken from his home when his grandfather is found dead of natural causes. Jessie Caldwell (Mary Steenburgen), a child services psychologist called in by Sheriff Doug Barnum, takes him to a boy’s home because he is now effectively a ward of the state.
Jessie enrolls him in high school, where Powder meets physics teacher Donald Ripley. Donald finds out that Powder has supernatural powers as well as the highest IQ in the history of mankind. While his abilities mark him as special, they also make him an outcast. On a hunting trip with his schoolmates, Powder is threatened with a gun by John Box (Bradford Tatum), an aggressive student who views him as a freak. Before John can fire, a gun goes off in the distance and everyone rushes to see that Harley Duncan, one of Doug’s deputy who is hunting with the boys, has shot a doe, which is now dying. Anguished by the animal’s death, Powder touches the deer and Harley, inducing in Harley what the students assume is a seizure. However, Harley admits to Doug that Powder had actually caused him to feel the pain and fear of the dying deer, and he cannot bring himself to take another life. Because of the experience, Harley removes all of his guns from his house although Doug allows him to remain as a sheriff’s deputy without a sidearm.
Doug enlists Powder to help speak to his dying wife through telepathy. Through Powder, the sheriff learns that his wife clings onto life because she didn’t want to leave without her wedding ring on her finger and without him reconciling with his estranged son, Steven. She tells him that Steven found the ring and it has been sitting in a silver box on her nightstand throughout the entire movie. Doug then places the ring on his wife’s finger and reconciles with Steven, letting his wife die peacefully.
Powder meets Lindsey Kelloway, a romantic interest, but their relationship is broken by Lindsey’s father. Before the interruption, he tells Lindsey that he can see the truth about people: that they are scared and feel disconnected from the rest of the world, but in truth are all connected to everything that exists. Powder goes back to the juvenile facility and packs away his belongings, planning to run away to his deceased grandparents’ farm. He pauses in the gym to stare at a male student washing, noticing the latter’s luxurious head of hair as well as body hair which he himself lacks, and is caught at it by John Box, who accuses him of homosexuality. John steals Jeremy’s hat and taunts him, but Powder reveals that John’s words mimic what his stepfather said before beating him when he was 12, further angering him. John and the other boys humiliate Powder, stripping him naked and taunting him. His powers begin to manifest by pulling at their metal buttons and any piercings. Eventually a large spherical electric burst erupts throwing Jeremy in a mud puddle and everyone else to the ground. His classmate John is found still, with his heart stopped. Powder uses an electric shock to revive him.
In the final scene Powder returns to the farm where he grew up, now in probate with the bank, and finds that all of his possessions have been removed. He is joined by Jessie, Donald and Doug, who persuade Powder to come with them to find a place where he will not be feared and misunderstood. Instead, a thunderstorm arrives and he runs into a field where a lightning bolt strikes him, and he disappears in a blinding flash of light.
Powder received generally mixed reviews from critics. It currently holds a rating of 47% (“Rotten”) on Rotten Tomatoes based on 19 reviews, as of May 2011. Caryn James of The New York Times described the film as “lethally dull” and said, “This intensely self-important film has no idea how absurd and unconvincing it is.”[1]
Since its release, the film has grossed approximately $31 million worldwide.
The film’s production by Disney resulted in a controversy over the choice of director Victor Salva, who had been convicted of molesting a 12-year-old child actor in 1988. When Powder was released, the victim came forward again in an attempt to get others to boycott the film in protest at Disney’s hiring Salva. Since then, Disney has not picked up any more pictures by Salva.[2][3]
David Cameron’s Commons tribute to Margaret Thatcher in full
Malcolm Rifkind: Working with Margaret Thatcher was ‘never dull’
Margaret Thatcher Dead At 87 – “The Iron Lady” – Stuart Varney
‘Iron Lady’ Margaret Thatcher dies at 87 after stroke
Margaret Thatcher “The Iron Lady” Dead At 87
Obituary: Margaret Thatcher
MARGARET THATCHER DIES AT 87 (WARNING! FLASH PHOTOGRAPHY)
BBC News Announcement – Margaret Thatcher Has Died
Margaret Thatcher dies: David Cameron pays tribute to ‘patriot Prime Minister’
Margaret Thatcher: Boris Johnson pays tribute
Margaret Thatcher changed global political landscape: Tony Blair
Remembering Margaret Thatcher: Pioneering Female Politician
Margaret Thatcher on The MacNeil/Lehrer Report
Thatcher and Reagan’s special relationship
Margaret Thatcher, British Conservative Hero, Dies at 87
MARGARET THATCHER 30TH ANNIVERSARY CLIPS – ’79 RESULT & JANET BROWN SPOOF
Margaret Thatcher – Capitalism and a Free Society
Margaret Thatcher Dies: How She Ended ‘Nanny State’
What did Margaret Thatcher do for Britain’s economy?
Margaret Thatcher dead: A look at her role as MP and mother
Sunrise: Remembering Margaret Thatcher
Sunrise: Margaret Thatcher: The early years
Margaret Thatcher – Thames Television – 1971 -1979
Margaret Thatcher, U.K. Prime Minster, Dies at 87
Margaret Thatcher concerned about “U.S. decline”
The Real Legacy of Margaret Thatcher, Britain’s Iron Lady
Mike Pattison | A former private secretary to Margaret Thatcher
Introducing Margaret Thatcher! 5 March 1975
MARGARET THATCHER book discussion “The Downing Street Years” 1993
Former prime minister Margaret Thatcher discussing her memoirs “The Downing Street Years” with Brian Lamb on 4 November 1993.
margaret thatcher on her path to power
mrs thatcher gives an interview on her early life
Margaret Thatcher on Socialism
Would Hayek Have Approved Obamacare?
Margaret Thatcher – Falklands War – YouTube
MARGARET THATCHER – Pt 1 The Making of Margaret (Telegraph Documentary)
MARGARET THATCHER – Pt 2 The Falklands (Telegraph Documentary)
MARGARET THATCHER – Pt 3 World Stage (Telegraph Documentary)
MARGARET THATCHER – Pt 4 The Age of Dissent (Telegraph Documentary)
MARGARET THATCHER – Pt 5 Taking on the Unions (Telegraph Documentary)
MARGARET THATCHER – Pt 6 Public Image, Private Life. (Telegraph Documentary)
MARGARET THATCHER – Pt 7 The Fall (Telegraph Documentary)
MARGARET THATCHER – Pt 8 The Legacy (Telegraph Documentary)
Thatcher: The Downing Street Years (1/4 BBC)
Thatcher: The Downing Street Years (2/4 BBC)
Thatcher: The Downing Street Years (3/4 BBC)
Thatcher: The Downing Street Years (4/4 BBC)
Margaret Thatcher – The Long Walk To Finchley Full Movie
Hitchens ’10: Margaret Thatcher & the Unions
Hitchens 2010: In Love with Argument
Margaret Thatcher – The Flame of Capitalism
1975 Oct 10 Fr
Margaret Thatcher
Speech to Conservative Party Conference
Document type:
speeches
Document kind:
Speech
Venue:
Winter Gardens, Blackpool
Source:
Thatcher Archive: speaking text
Journalist:
–
Editorial comments:
1045. MT spoke for 41 minute 16 seconds; the BBC Sound Archive has a complete recording. Evening Standard (10 October 1975) noted that the audience applauded every passage of the speech – not one was delivered without interruption. Parts of the text have been checked against material broadcast on ITN during the day.
Importance ranking:
Key
Word count:
3722
Themes:
Conservative Party (organisation), Autobiographical comments, Conservative Party (history), Economy (general discussions), Labour Party and Socialism, Economy (general discussions), Employment, Public spending and borrowing, Economy (general discussions), Labour Party and Socialism, Foreign policy (USSR and successor states), Foreign policy (Central and Eastern Europe), Economy (general discussions), Labour Party and Socialism, Higher and further education, Industry, Science and technology, Conservatism, Social security and welfare, Labour Party and Socialism, Industry, Conservatism, Labour Party and Socialism, Agriculture, Employment, Labour Party and Socialism, Conservatism, Secondary education, Health policy, Private health care, Labour Party and Socialism, Trade unions, British constitution (general discussions), Law and order, Labour Party and Socialism, Northern Ireland
Note by MT: “Relax. Low Speaking Voice. Not too slow”.
The first Conservative Party Conference I attended was in 1946.
I came to it as an undergraduate representing Oxford University Conservative Association (I know our Cambridge supporters will not mind.) That Conference was held in this very hall and the platform then seemed a long way away, and I had no thought of joining the lofty and distinguished people sitting up there.
But our Party is the Party of equality of opportunity—as you can see. (Laughter).[fo 1]
You will understand, I know, the humility I feel at following in the footsteps of great men like our Leader that year, Winston Churchill a man called by destiny who raised the name of Britain to supreme heights in the history of the free world. (Applause).
In the footsteps of Anthony Eden , who set us the goal of a property-owning democracy—a goal we still pursue today.(Applause).
Of Harold Macmillan whose leadership brought so many ambitions within the grasp of every citizen. (Applause).[fo 2]
Of Alec Douglas-Home whose career of selfless public service earned the affection and admiration of us all. (Applause).
And of Edward Heath who successfully led the Party to victory in 1970 and brilliantly led the nation into Europe in 1973. (Applause).
During my lifetime, all the leaders of the Conservative Party have served as Prime Minister. I hope the habit will continue. (Laughter)
Our leaders have been different men with different qualities and different styles. But they have one thing in common. Each met the challenge-of-his-time.[fo 3]
What is the challenge of our time?
I believe there are two—to overcome the country’s economic and financial problems, and to regain our confidence in Britain and ourselves.
The Economic Challenge
The economic challenge has been debated at length in this hall.
Last week it gave rise to the usual scenes of cordial brotherly strife.[fo 4]
Day after day the comrades called one another far from comradely names, and occasionally, when they remembered, they called us names too.
Some of them, for example, suggested that I criticised Britain when I was overseas. They are wrong.
It wasn’t Britain I was criticising. It was-Socialism. (Applause).
And I will go on criticising Socialism, and opposing Socialism because it is bad for Britain—and Britain and Socialism are not the same thing.[fo 5]
As long as I have health and strength, they never will be. (Applause).
But whatever could I say about Britain that is half as damaging as what this Labour Government have done to our country?
Let’s look at the record.
It is the Labour Government that have caused prices to rise at a record rate of 26 per cent a year.[fo 6]
They told us that the Social Contract would solve everything. But now everyone can see that the so-called contract was a fraud—a fraud for which the people of this country have had to pay a very high price.
It is the Labour Government whose policies are forcing unemployment higher than it need have been—thousands more men and women lose their jobs every day.
There are going to be men and women many of them youngsters straight out of school—who will be without a job this winter because Socialist Ministers spent last year attacking us, instead of attacking inflation.[fo 7]Beginning of section checked against ITN News at Ten, 10 October 1975:
And it’s the Labour Government that have brought the level of production below that of the 3-day week in 1974. W’ve really got a 3-day week now,—only it takes five days to do it. (Applause).
It’s the Labour Government that have brought us record peace-time taxation. They’ve got the usual Socialist disease—they’ve run out of other people’s money. (Laughter).
And it’s the Labour Government that have pushed public spending to record levels.
And how’ve they done it? By borrowing, and borrowing and borrowing.
Never in the field of human credit has so much been owed. (Laughter).End of section checked against ITN News at Ten, 10 October 1975.[fo 8]
But serious as the economic challenge is, the political and moral challenge is just as grave, perhaps more so.
POLITICAL AND MORAL CHALLENGE
Economic problems never start with economics. They have deeper roots—in human nature and in politics.
They don’t finish at economics either.
Labour’s failure to cope, to look at the nation’s problems from the point of view of the whole nation, not just one section of it, has led to loss of confidence and a sense of helplessness.[fo 9]
With it goes a feeling that Parliament, which ought to be in charge, is not in charge—that the actions and the decisions are taken elsewhere.
And it goes deeper than that. There are voices that seem anxious not to overcome our economic difficulties, but to exploit them, to destroy the free enterprise society and put a Marxist system in its place.
Today those voices form a sizeable chorus in the Parliamentary Labour Party. A chorus which, aided and abetted by many Constituency Labour Parties, seems to be growing in numbers.[fo 10]
Anyone who says this openly is promptly accused of seeing Reds Under the Bed.
But look who’s seeing them now!
On his own admission, Mr Wilson has at last discovered that his own Party is infiltrated by extreme left-wingers—or to use his own words it is infested with them.
When even Mr Wilson gets scared about their success in capturing key positions in the Labour Party, shouldn’t the rest of us be?[fo 11]
And shouldn’t the rest of us ask him “Where have you been while all this has been going on, and what are you doing about it?” (Applause). The answer is nothing.
I sometimes think the Labour Party is like a pub where the mild is running out. If someone doesn’t do something soon, all that’s left will be bitter. (Laughter). And all that’s bitter will be Left. (Laughter).
Whenever I visit Communist countries, their politicians never hesitate to boast about their achievements.[fo 12]
They know them all by heart and reel off the facts and figures, claiming that this is the rich harvest of the Communist system.
Yet they are not prosperous as we in the West are prosperous, and they are not free as we in the West are free.
Our capitalist system produces a far higher standard of prosperity and happiness because it believes in incentive and opportunity, and because it is founded on human dignity and freedom. (Applause).[fo 13]
Even the Russians have to go to a capitalist country, America to buy enough wheat to feed their people. And that aftermore than 50 years of a State controlled economy.
Yet they boast incessantly while we, who have so much more to boast about, forever criticise and decry.
Isn’t it time we spoke up for our way of life? (Applause) After all, no Western nation has to build a wall round itself to keep its people in. (Applause).[fo 14]
So let us have no truck with those who say the free enterprise system has failed. What we face today is not a crisis of capital ism, but of Socialism. No country can flourish if its economic and social life is dominated by nationalisation and state control.
The cause of our shortcomings does not therefore lie in private enterprise. Our problem is not that we have too little socialism. It is that we have too much.
If only the Labour Party in this country would act like Social Democrats in West Germany. If only they would stop trying to prove their Socialist virility by relentlessly nationalising one industry after another.[fo 15]
Of course, a halt to further State control will not on its own restore our belief in ourselves, because something else is happening to this country. We are witnessing a deliberate attack on our values, a deliberate attack on those who wish to promote merit and excellence, a deliberate attack on our heritage and great past. (Applause).Beginning of section checked against ITN News at Ten, 10 October 1975:
And there are those who gnaw away at our national self-respect, rewriting British history as centuries of unrelieved gloom, oppression and failure.
As days of hopelessness—not Days of Hope.[fo 16]
And others, under the shelter of our education system, are ruthlessly attacking the minds of the young. Everyone who believes in freedom must be appalled at the tactics employed by the far Left in the systematic destruction of the North London Polytechnic. (Applause).
Blatant tactics of intimidation, designed to undermine the fundamental beliefs and values of every student.
Tactics pursued by people who are the first to insist on their own civil rights while seeking to deny them to the rest of us. We must not be bullied and brainwashed out of our beliefs. (Applause).[fo 17]
No wonder so many of our people—some of the best and brightest—are depressed and talk of emigrating.
Even so, I think they are wrong at giving up too soon. Many of the things we hold dear are threatened as never before, but none has yet been lost.
So stay here. (Applause). Stay and help us defeat Socialism, so that the Britain you have known may be the Britain your children will know. (Applause).End of section checked against ITN News at Ten, 10 October 1975.[fo 18]
Those are the two great challenges of our time.
The moral and political challenge, and the economic challenge.
They have to be faced together—and we have to master them both.
POTENTIAL
What are our chances of success? It depends what kind of people we are. Well, what kind of people are we?[fo 19]
We are the people that in the past made Great Britain the Workshop of the World. The people who persuaded others to buy British not by begging them to do so, but because it was best.
We are a people who have received more Nobel prizes than any other nation except America, and head for head we have done better than America. Twice as well, in fact.
We are the people who, among other things, invented the computer, refrigerator, electric motor, stethoscope, rayon, steam turbine, stainless steel, the tank, television, penicillin, radar, jet engine, hovercraft, float glass and carbonfibres. Oh, and the best half of Concorde. (Laughter).[fo 20]
We export more of what we produce than either West Germany, France, Japan or the United States.
And well over 90%; of these exports come from private enterprise. It’s a triumph for the private sector and all who work in it. Let us say so, loud and clear. (Applause).
With achievements like that who can doubt that Britain can have a great future? What our friends abroad want to know is whether that future is going to happen.
Well, how can we Conservatives make it happen?[fo 21]
Many of the details have already been dealt with in the various debates. But policies and programmes should not be just a list of unrelated items. They are part of a total vision of the kind of life we want for our country and our children. [Beginning of section checked against ITN Early Evening News, 10 October 1975] Let me give you my vision.
THE FREE SOCIETY AND THE ECONOMY
A man’s right to work as he will to spend what he earns to own property to have the State as servant and not as master these are the British inheritance.
They are the essence of a free economy. And on that freedom all our other freedoms depend. (Applause).End of section checked against ITN Early Evening News, 10 October 1975.[fo 22]
But we want a free economy, not only because it guarantees our liberties, but also because it is the best way of creating wealth and prosperity for the whole country.
It is this prosperity alone which can give us the resources for better services for the community, better services for those in need. (Applause).
By their attack on private enterprise, this Labour Government have made certain that there will be next to nothing available for improvements in our social services over the next few years.[fo 23]
We must get private enterprise back on the road to recovery, not merely to give people more of their own money to spend as they choose, but to have more money to help the old and the sick and the handicapped.
The way to recovery is through profits. Good profits today, leading to high investment, well-paid jobs and a better standard of living tomorrow. (Applause).
No profits mean no investment, and a dying industry geared to yesterday’s world.
Other nations have recognised that for years now. They are going ahead faster than we are; and the gap between us will continue to increase unless we change our ways.[fo 24]
The trouble here is that for years the Labour Party have made people feel that profits are guilty-unless proved innocent.
But when I visit factories and businesses I do not find that those who actually work in them are against profits. On the contrary, they want to work for a prosperous concern. With a future—their future. (Applause).
Governments must learn to leave these companies with enough of their own profits to produce the goods and jobs for tomorrow.
If the Socialists won’t or can’t there will be no profit making industry left to support the losses caused by fresh bouts of nationalisation.[fo 25]
And if anyone says I am preaching laissez-faire, let me say this.
I am not arguing, and never have argued, that all we have to do is to let the economy run by itself.
I believe that, just as each of us has an obligation to make the best of his talents so governments have an obligation to create the framework within which we can do so. Not only individual people, but individual firms and particularly small firms. (Applause).
Some of these will stay small but others will expand and become the great companies of the future.[fo 26]
The Labour Government have pursued a disastrous vendetta against small businesses and the self-employed. We will reverse their damaging policies. (Applause).
Nowhere is this more important than in Agriculture—one of our most successful industries made up entirely of small businesses. We live in a world in which food is no longer cheap or plentiful. Everything we cannot produce here must be imported at a high price.
Yet the Government could not have destroyed the confidence of the industry more effectively if they had tried deliberately to do so, with their formula of empty promises and penal taxation.[fo 27]
So today what is the picture? Depressed profits, low investment, no incentive, and overshadowing everything government spending, spending far beyond the taxpayers means. (Applause).
To recover, to get from where we are to where we want to be, will take time.
“Economic policy” wrote Maynard Keynes “should not be a matter of tearing up by the roots but of slowly training a plant to grow in a different direction.”[fo 28]
It will take time to reduce public spending, rebuild profits and incentives, to benefit from the investments which must be made. The sooner that time starts, the better for Britain’s unemployed.
One of the reasons why this Labour Government has incurred more unemployment than any Conservative Government since the War is because they have concentrated too much on distributing what we have, and too little on seeing that we have more. (Applause).[fo 29]
We Conservatives hate unemployment.
We hate the idea of men and women not being able to use their abilities. We deplore the waste of national resources, and the deep affront to peoples’ dignity from being out of work through no fault of their own. (Applause).
It is ironic that we should be accused of wanting unemployment to solve our economic problems by the very Government which has produced a record post-War unemployment, and is expecting more.[fo 30]
The record of Mr Wilson and his colleagues on this is unparallelled in the history of political hypocricy.
We are now seeing the full consequences of nearly twenty months of Labour Government.
They have done the wrong things at the wrong time in the wrong way.
They have been a disaster for this country.[fo 31]
EQUALITY
Now let me turn to something I spoke about in America.
Some Socialists seem to believe that people should be numbers in a State computer. We believe they should be individuals.
We are all unequal. No one, thank heavens, is like anyone else, however much the Socialists may pretend otherwise.
We believe that everyone has the right to be unequal but to us every human being is equally important.[fo 32]
Engineers, miners, manual workers, shop assistants, farm workers, postmen, housewives—these are the essential foundations of our society. Without them there would be no nation. (Applause).
But their are others with special gifts who should also have their chance, because if the adventurers who strike out in new directions in science, technology, medicine, commerce and industry the arts are hobbled, there can be no advance.
The spirit of envy can destroy. It can never build.[fo 33]
Everyone must be allowed to develop the abilities he knows he has within him, and she knows she has within her, in the way they choose.
CHOICE
Freedom to choose is something we take for granted—until it is in danger of being taken away.
Socialist governments set out perpetually to restrict the area of choice, Conservative governments to increase it.
We believe that you become a responsible citizen by making decisions yourself, not by having them made for you.[fo 34]
But they are made for you under Labour all right.
Take education.
Beginning of section checked against ITN News at Ten, 10 October 1975:
Our education system used to serve us well. A child from an ordinary family, as I was, could use it as a ladder as an advancement.
But the Socialists are better at demolition than reconstruction, are destroying many good grammar schools.
Now this is nothing to do with private education. It’s opportunity and excellence in our State schools that are being diminished under Socialism.
And naturally enough, parents don’t like this. But in a Socialist society parents should be seen and not heard. (Laughter).[fo 35]
And another denial of choice is being applied to health.
The private sector helps to keep some of our best doctors here, and so are available part time to the National Health Service. It also helps to bring in more money for the general health of the nation.
But under Labour, private medicine is being squeezed out, and the result will be to add to the burden on the National Health Service without adding one penny to its income.[fo 36]
Let me make this absolutely clear.
When we return to power we shall reverse Mrs Castle ‘s stupid and spiteful attack on hospital pay beds. (Applause).
We Conservatives do not accept that because some people have no choice, no one should have it.
Every family should have the right to spend their money, after tax, as they wish, not as the Government dictates.End of section checked against ITN News at Ten, 10 October 1975.
Let us extend choice, the will to choose and the chance to choose.[fo 37]
TRADE UNIONS
I want to come now to the argument which Mr Wilson is trying to put across the country: namely that the Labour Party is the natural party of Government because it is the only one that the Trade Unions will accept.
From what I saw on television last week, the Labour Party did not look like a party of Government at all, let alone a natural one.
But let’s examine the argument.Beginning of section checked against ITN First Report, 10 October 1975
If we are to be told that a Conservative Government could not govern because certain extreme leaders would not let it, then General Elections are a mockery we’ve arrived at[fo 38] the one party state, and parliamentary democracy in this country will have perished. (Applause).
The democracy for which our fathers fought and died is not to be laid to rest as lightly as that.
When the next Conservative Government comes to power many Trade Unionists will have put it there. Millions of them vote for us at every Election.
I want to say this to them, and to every one of our supporters in industry.[fo 39]
Go out and join in the work of your Union.
Go to its meetings—and stay to the end.
Learn the Union rules as well as the Far Left know them, and remember this. If Parliamentary democracy dies, free Trade Unions die with it. (Applause).End of section checked against ITN First Report, 10 October 1975.[fo 40]
RULE OF LAW
I come last to what many would put first. The Rule of Law.
The first people to uphold the law should be governments. It is tragic that the Socialist Government, to its lasting shame, should have lost its nerve and shed its principles over the People’s Republic of Clay Cross. And that a group of the Labour Party should have tried to turn the Shrewsbury pickets into martyrs.
On both occasions the law was broken. On one, violence was done.[fo 41]No decent society can live like that. No responsible party should condone it. (Applause).
The first duty of Government is to uphold the law. If it tries to bob and weave and duck around that duty when its inconvenient, if government does that, then so will the governed, and then nothing is safe—not home, not liberty, not life itself.
There is one part of this country where tragically defiance of the law is costing life day after day.[fo 42]
In Northern Ireland our troops have the dangerous and thankless task of trying to keep the peace and hold the balance. We are proud of the way they have discharged their duty.
This Party is pledged to support the unity of the United Kingdom. To preserve that unity and to protect the people, Catholic and Protestant alike, we believe that our armed forces must remain until a genuine peace is made.
Our thoughts are with them, and our pride is with them too. (Applause).[fo 43]
I have spoken of the challenges that face us here in Britain. The challenge to recover economically. The challenge to recover our belief in ourselves.
I have shown our potential for recovery.
I have dealt with some aspects of our strength and approach.
And I have tried to tell you something of my personal vision, my belief in the standards on which this nation was greatly built, on which it greatly thrived, and from which in recent years it has greatly fallen away.[fo 44]
We are coming, I think, to yet another turning point in our long history.
We can go on as we have been going and continue down.
Or we can stop—and with a decisive act of will we can say “Enough”.
Let us, all of us, here today and others, far beyond this hall who believe in our cause make that act of will.
Let us proclaim our faith in a new and better future for our Party and our people.[fo 45]
Let us resolve to heal the wounds of a divided nation.
And let that act of healing be the prelude to a lasting victory. (Prolonged applause).
Trump Rattles The American Okie Doke Obama Into Stuttering Empty Suit –The Great Pretender — The Truth Hurts — Get Out of Our Lives — Roll It Back To A Full Employment Growing Booming Economy with 67% Labor Participation Rate and Less Than 3% Unemployment Rate — Make America Great Again — Catch Me If You Can — Videos
Posted on June 4, 2016. Filed under: American History, Articles, Babies, Banking, Blogroll, Business, College, Communications, Congress, Constitution, Corruption, Crime, Culture, Documentary, Economics, Education, Elections, Employment, Entertainment, Faith, Family, Federal Government, Federal Government Budget, Films, Fiscal Policy, Foreign Policy, Freedom, Friends, government, government spending, Health Care, history, Illegal, Immigration, Internal Revenue Service (IRS), Investments, IRS, Language, Law, Legal, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, Monetary Policy, Money, Money, Movies, Narcissism, Newspapers, Obamacare, People, Philosophy, Photos, Police, Politics, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Resources, Security, Strategy, Talk Radio, Tax Policy, Taxation, Taxes, Television, Television, Television, The Pronk Pops Show, Unemployment, Video, War, Wealth, Welfare, Wisdom, Work, Writing | Tags: 2 June 2016, 2016 Election, America, American people, articles, Audio, Big Government Parties, Breaking News, Broadcasting, capitalism, Cartoons, Catch Me If You Can, Charity, Citizenship, Clarity, Classical Liberalism, Collectivism, Commentary, Commitment, Communicate, Communication, Concise, Cons, Convincing, Courage, Culture, Current Affairs, Current Events, Democratic Party, Donald J. Trump, economic growth, economic policy, Economic Reality, Economics, Education, Evil, Experience, Faith, Family, First, fiscal policy, Fools, free enterprise, freedom, freedom of speech, Friends, George Carlin, Give It A Listen, God, Good, Goodwill, Growth, Hope, Independents, Individualism, Jobs, Knowledge, Labor Participation Rate, liberty, Life, Love, Lovers of Liberty, monetary policy, MPEG3, News, Okie Doke, Opinions, Peace, Photos, Podcasts, Political Philosophy, Politics, President Barack Obama, Progressives, prosperity, Radio, Raymond Thomas Pronk, Representative Republic, Republic, Republican Party, Resources, Respect, rule of law, Rule of Men, Show Notes, Talk Radio, The American Okie Doke, The Great Pretender, The Pronk Pops Show, The Pronk Pops Show 691, Truth, Tyranny, U-3 Unemployment Rate, U-6 Unemployment Rate, U.S. Constitution, United States of America, Videos, Virtue, War, Wisdom |
The Pronk Pops Show Podcasts
Pronk Pops Show 691: June 2, 2016
Pronk Pops Show 690: June 1, 2016
Pronk Pops Show 689: May 31, 2016
Pronk Pops Show 688: May 27, 2016
Pronk Pops Show 687: May 26, 2016
Pronk Pops Show 686: May 25, 2016
Pronk Pops Show 685: May 24, 2016
Pronk Pops Show 684: May 23, 2016
Pronk Pops Show 683: May 20, 2016
Pronk Pops Show 682: May 19, 2016
Pronk Pops Show 681: May 17, 2016
Pronk Pops Show 680: May 16, 2016
Pronk Pops Show 679: May 13, 2016
Pronk Pops Show 678: May 12, 2016
Pronk Pops Show 677: May 11, 2016
Pronk Pops Show 676: May 10, 2016
Pronk Pops Show 675: May 9, 2016
Pronk Pops Show 674: May 6, 2016
Pronk Pops Show 673: May 5, 2016
Pronk Pops Show 672: May 4, 2016
Pronk Pops Show 671: May 3, 2016
Pronk Pops Show 670: May 2, 2016
Pronk Pops Show 669: April 29, 2016
Pronk Pops Show 668: April 28, 2016
Pronk Pops Show 667: April 27, 2016
Pronk Pops Show 666: April 26, 2016
Pronk Pops Show 665: April 25, 2016
Pronk Pops Show 664: April 24, 2016
Pronk Pops Show 663: April 21, 2016
Pronk Pops Show 662: April 20, 2016
Pronk Pops Show 661: April 19, 2016
Pronk Pops Show 660: April 18, 2016
Pronk Pops Show 659: April 15, 2016
Pronk Pops Show 658: April 14, 2016
Pronk Pops Show 657: April 13, 2016
Pronk Pops Show 656: April 12, 2016
Pronk Pops Show 655: April 11, 2016
Pronk Pops Show 654: April 8, 2016
Pronk Pops Show 653: April 7, 2016
Pronk Pops Show 652: April 6, 2016
Pronk Pops Show 651: April 4, 2016
Pronk Pops Show 650: April 1, 2016
Pronk Pops Show 649: March 31, 2016
Pronk Pops Show 648: March 30, 2016
Pronk Pops Show 647: March 29, 2016
Pronk Pops Show 646: March 28, 2016
Pronk Pops Show 645: March 24, 2016
Pronk Pops Show 644: March 23, 2016
Pronk Pops Show 643: March 22, 2016
Pronk Pops Show 642: March 21, 2016
Pronk Pops Show 641: March 11, 2016
Pronk Pops Show 640: March 10, 2016
Pronk Pops Show 639: March 9, 2016
Pronk Pops Show 638: March 8, 2016
Pronk Pops Show 637: March 7, 2016
Pronk Pops Show 636: March 4, 2016
Pronk Pops Show 635: March 3, 2016
Pronk Pops Show 634: March 2, 2016
Pronk Pops Show 633: March 1, 2016
Story 1: Trump Rattles The American Okie Doke Obama Into Stuttering Empty Suit –The Great Pretender — The Truth Hurts — Get Out of Our Lives — Roll It Back To A Full Employment Growing Booming Economy with 67% Labor Participation Rate and Less Than 3% Unemployment Rate — Make America Great Again — Catch Me If You Can — Videos
-A joke played on someone. Someone getting played for a fool.
-Also, someone who is fake or is a joke.
“I felt like a dumbass when that nigga hit me with the okie doke.”
“I keep it real homeboy. I ain’t no okie doke.”
Psychological projection is a theory in psychology in which humans defend themselves against their own unpleasant impulses by denying their existence while attributing them to others. For example, a person who is habitually rude may constantly accuse other people of being rude. It incorporates blame shifting.
Immigration moderation. Before any new green cards are issued to foreign workers abroad, there will be a pause where employers will have to hire from the domestic pool of unemployed immigrant and native workers. This will help reverse women’s plummeting workplace participation rate, grow wages, and allow record immigration levels to subside to more moderate historical averages.
https://www.donaldjtrump.com/positions/immigration-reform
George Carlin – The American Okie Doke
U.S. Labor Participation Rate – Graph of Reagan vs obama
Obama Tries to Trash Donald Trump and Turns into a Stuttering Mess
Obama attacks Trump in Indiana speech but won’t use his name
Obama Busts GOP Economic Myths
Obama takes a victory lap over Elkhart, Indiana’s resurgence
Why doesn’t Obama say Donald Trump’s name?
The Great Pretender Obama Says Don’t Fall For The Okie-Doke
No Help Wanted – Labor Participation Rate Lowest Since 1977 – Fox & Friends.
Labor participation has hit a 38-year low, and that’s a problem
Labor participation rate is down to unprecedented levels
Unemployment and the Unemployment Rate
Types of Unemployment
Top 10 Greatest Con Artists in Movies
Catch me if you can best scenes
Catch Me If You Can Movie- Check Fraud
Catch Me If You Can Trailer
To Tell the Truth: Frank William Abagnale Jr. (1977)
The Real Frank Abagnale, “Catch me if you can” man – CNN Red Chair
Catch Me If You Can: Frank Abagnale’s Story
Frank Abagnale, who evolved from being a brilliant young mastermind of international deception and fraud into one of the world’s most respected authorities on forgery and embezzlement, tells his life story. His intercontinental saga prompted Steven Spielberg to turn Abagnale’s life into the movie Catch Me If You Can starring Leonardo DiCaprio.
The Platters – The Great Pretender – HD (1955)
Data extracted on: June 2, 2016 (4:31:21 PM)
Labor Force Statistics from the Current Population Survey
Obama in Elkhart: Voters should beware of politicians ‘preying’ on economic fears
President Barack Obama says people should beware of politicians who are “preying” on Americans’ anxieties about the economy in a bid to win headlines and votes.
Obama isn’t naming names. But he says some politicians are running on anti-trade, anti-immigrant policies in an effort to play to people’s fears.
Obama made the remarks during a visit to Elkhart, Indiana. He’s holding up the manufacturing community as a symbol of the nation’s climb from recession to recovery.
Obama says his administration’s “smart” decisions played a part in helping Elkhart come back. He says he wants to bust “myths” that Democratic policies are bad for the economy.
Indiana’s Republican governor, Mike Pence, says Elkhart had rebounded “in spite of Obama’s policies” and that those policies inflicted onerous federal burdens on Indiana.
To Obama, lingering challenges aren’t enough to forestall a planned victory lap. Arguing that his controversial $840 billion stimulus package was ultimately vindicated, Obama will call on the next president to be willing to spend big to enable further economic growth.
The president is making his eighth visit to the state since taking office in January 2009. Here are details on the visits:
Psychological projection
Psychological projection is a theory in psychology in which humans defend themselves against their own unpleasant impulses by denying their existence while attributing them to others.[1] For example, a person who is habitually rudemay constantly accuse other people of being rude. It incorporates blame shifting.
According to some research, the projection of one’s negative qualities onto others is a common process in everyday life.[2]
Historical precursors
A prominent precursor in the formulation of the projection principle was Giambattista Vico,[3][4] and an early formulation of it is found in ancient Greek writer Xenophanes, which observed that “the gods of Ethiopians were inevitably black with flat noses while those of the Thracians were blond with blue eyes.”[citation needed] In 1841, Ludwig Feuerbach was the first to employ this concept as the basis for a systematic critique of religion.[5][6][7]
Psychoanalytic developments
Projection (German: Projektion) was conceptualised by Freud in his letters to Wilhelm Fliess,[8] and further refined by Karl Abraham and Anna Freud. Freud considered that in projection thoughts, motivations, desires, and feelings that cannot be accepted as one’s own are dealt with by being placed in the outside world and attributed to someone else.[9] What the ego repudiates is split off and placed in another.[10]
Freud would later come to believe that projection did not take place arbitrarily, but rather seized on and exaggerated an element that already existed on a small scale in the other person.[11] (The related defence of projective identification differs from projection in that there the other person is expected to become identified with the impulse or desire projected outside,[12] so that the self maintains a connection with what is projected, in contrast to the total repudiation of projection proper.)[13]
Melanie Klein saw the projection of good parts of the self as leading potentially to over-idealisation of the object.[14] Equally, it may be one’s conscience that is projected, in an attempt to escape its control: a more benign version of this allows one to come to terms with outside authority.[15]
Theoretical examples
Projection tends to come to the fore in normal people at times of crisis, personal or political[16] but is more commonly found in the neurotic or psychotic[17] in personalities functioning at a primitive level as in narcissistic personality disorder or borderline personality disorder.[18]
Carl Jung considered that the unacceptable parts of the personality represented by the Shadow archetype were particularly likely to give rise to projection, both small-scale and on a national/international basis.[19] Marie-Louise Von Franz extended her view of projection, stating that “wherever known reality stops, where we touch the unknown, there we project an archetypal image”.[20]
Psychological projection is one of the medical explanations of bewitchment used to explain the behavior of the afflicted children at Salem in 1692. The historian John Demos asserts that the symptoms of bewitchment experienced by the afflicted girls were due to the girls undergoing psychological projection of repressed aggression.[21]
Practical examples
Counter-projection
Jung wrote, “All projections provoke counter-projection when the object is unconscious of the quality projected upon it by the subject.”[27] Thus, what is unconscious in the recipient will be projected back onto the projector, precipitating a form of mutual acting out.[28]
In a rather different usage, Harry Stack Sullivan saw counter-projection in the therapeutic context as a way of warding off the compulsive re-enactment of apsychological trauma, by emphasising the difference between the current situation and the projected obsession with the perceived perpetrator of the original trauma.[29]
Clinical approaches
Drawing on Gordon Allport‘s idea of the expression of self onto activities and objects, projective techniques have been devised to aid personality assessment, including the Rorschach ink-blots and the Thematic Apperception Test (TAT).[30]
Projection may help a fragile ego reduce anxiety, but at the cost of a certain dissociation, as in dissociative identity disorder.[31] In extreme cases, an individual’s personality may end up becoming critically depleted.[32] In such cases, therapy may be required which would include the slow rebuilding of the personality through the “taking back” of such projections.[33]
Criticism
Some studies were critical of Freud’s theory. Research supports the existence of a false-consensus effect whereby humans have a broad tendency to believe that others are similar to themselves, and thus “project” their personal traits onto others. This applies to good traits as well as bad traits and is not a defense mechanism for denying the existence of the trait within the self.[34]
Instead, Newman, Duff, and Baumeister (1997) proposed a new model of defensive projection. In this view, people try to suppress thoughts of their undesirable traits, and these efforts make those trait categories highly accessible—so that they are then used all the more often when forming impressions of others. The projection is then only a by-product of the real defensive mechanism.[35]
See also
https://en.wikipedia.org/wiki/Psychological_projection
The Pronk Pops Show Podcasts Portfolio
Listen To Pronk Pops Podcast or Download Shows 685-691
Listen To Pronk Pops Podcast or Download Shows 675-684
Listen To Pronk Pops Podcast or Download Shows 668-674
Listen To Pronk Pops Podcast or Download Shows 660-667
Listen To Pronk Pops Podcast or Download Shows 651-659
Listen To Pronk Pops Podcast or Download Shows 644-650
Listen To Pronk Pops Podcast or Download Shows 637-643
Listen To Pronk Pops Podcast or Download Shows 629-636
Listen To Pronk Pops Podcast or Download Shows 617-628
Listen To Pronk Pops Podcast or Download Shows 608-616
Listen To Pronk Pops Podcast or Download Shows 599-607
Listen To Pronk Pops Podcast or Download Shows 590-598
Listen To Pronk Pops Podcast or Download Shows 585- 589
Listen To Pronk Pops Podcast or Download Shows 575-584
Listen To Pronk Pops Podcast or Download Shows 565-574
Listen To Pronk Pops Podcast or Download Shows 556-564
Listen To Pronk Pops Podcast or Download Shows 546-555
Listen To Pronk Pops Podcast or Download Shows 538-545
Listen To Pronk Pops Podcast or Download Shows 532-537
Listen To Pronk Pops Podcast or Download Shows 526-531
Listen To Pronk Pops Podcast or Download Shows 519-525
Listen To Pronk Pops Podcast or Download Shows 510-518
Listen To Pronk Pops Podcast or Download Shows 500-509
Listen To Pronk Pops Podcast or Download Shows 490-499
Listen To Pronk Pops Podcast or Download Shows 480-489
Listen To Pronk Pops Podcast or Download Shows 473-479
Listen To Pronk Pops Podcast or Download Shows 464-472
Listen To Pronk Pops Podcast or Download Shows 455-463
Listen To Pronk Pops Podcast or Download Shows 447-454
Listen To Pronk Pops Podcast or Download Shows 439-446
Listen To Pronk Pops Podcast or Download Shows 431-438
Listen To Pronk Pops Podcast or Download Shows 422-430
Listen To Pronk Pops Podcast or Download Shows 414-421
Listen To Pronk Pops Podcast or Download Shows 408-413
Listen To Pronk Pops Podcast or Download Shows 400-407
Listen To Pronk Pops Podcast or Download Shows 391-399
Listen To Pronk Pops Podcast or Download Shows 383-390
Listen To Pronk Pops Podcast or Download Shows 376-382
Listen To Pronk Pops Podcast or Download Shows 369-375
Listen To Pronk Pops Podcast or Download Shows 360-368
Listen To Pronk Pops Podcast or Download Shows 354-359
Listen To Pronk Pops Podcast or Download Shows 346-353
Listen To Pronk Pops Podcast or Download Shows 338-345
Listen To Pronk Pops Podcast or Download Shows 328-337
Listen To Pronk Pops Podcast or Download Shows 319-327
Listen To Pronk Pops Podcast or Download Shows 307-318
Listen To Pronk Pops Podcast or Download Shows 296-306
Listen To Pronk Pops Podcast or Download Shows 287-295
Listen To Pronk Pops Podcast or Download Shows 277-286
Listen To Pronk Pops Podcast or Download Shows 264-276
Listen To Pronk Pops Podcast or Download Shows 250-263
Listen To Pronk Pops Podcast or Download Shows 236-249
Listen To Pronk Pops Podcast or Download Shows 222-235
Listen To Pronk Pops Podcast or Download Shows 211-221
Listen To Pronk Pops Podcast or Download Shows 202-210
Listen To Pronk Pops Podcast or Download Shows 194-201
Listen To Pronk Pops Podcast or Download Shows 184-193
Listen To Pronk Pops Podcast or Download Shows 174-183
Listen To Pronk Pops Podcast or Download Shows 165-173
Listen To Pronk Pops Podcast or Download Shows 158-164
Listen To Pronk Pops Podcast or Download Shows151-157
Listen To Pronk Pops Podcast or Download Shows 143-150
Listen To Pronk Pops Podcast or Download Shows 135-142
Listen To Pronk Pops Podcast or Download Shows 131-134
Listen To Pronk Pops Podcast or Download Shows 124-130
Listen To Pronk Pops Podcast or Download Shows 121-123
Listen To Pronk Pops Podcast or Download Shows 118-120
Listen To Pronk Pops Podcast or Download Shows 113 -117
Listen To Pronk Pops Podcast or Download Show 112
Listen To Pronk Pops Podcast or Download Shows 108-111
Listen To Pronk Pops Podcast or Download Shows 106-108
Listen To Pronk Pops Podcast or Download Shows 104-105
Listen To Pronk Pops Podcast or Download Shows 101-103
Listen To Pronk Pops Podcast or Download Shows 98-100
Listen To Pronk Pops Podcast or Download Shows 94-97
Listen To Pronk Pops Podcast or Download Show 93
Listen To Pronk Pops Podcast or Download Show 92
Listen To Pronk Pops Podcast or Download Show 91
Listen To Pronk Pops Podcast or Download Shows 88-90
Listen To Pronk Pops Podcast or Download Shows 84-87
Listen To Pronk Pops Podcast or Download Shows 79-83
Listen To Pronk Pops Podcast or Download Shows 74-78
Listen To Pronk Pops Podcast or Download Shows 71-73
Listen To Pronk Pops Podcast or Download Shows 68-70
Listen To Pronk Pops Podcast or Download Shows 65-67
Listen To Pronk Pops Podcast or Download Shows 62-64
Listen To Pronk Pops Podcast or Download Shows 58-61
Listen To Pronk Pops Podcast or Download Shows 55-57
Listen To Pronk Pops Podcast or Download Shows 52-54
Listen To Pronk Pops Podcast or Download Shows 49-51
Listen To Pronk Pops Podcast or Download Shows 45-48
Listen To Pronk Pops Podcast or Download Shows 41-44
Listen To Pronk Pops Podcast or Download Shows 38-40
Listen To Pronk Pops Podcast or Download Shows 34-37
Listen To Pronk Pops Podcast or Download Shows 30-33
Listen To Pronk Pops Podcast or Download Shows 27-29
Listen To Pronk Pops Podcast or Download Shows 17-26
Listen To Pronk Pops Podcast or Download Shows 16-22
Listen To Pronk Pops Podcast or Download Shows 10-15
Listen To Pronk Pops Podcast or Download Shows 01-09
Read Full Post | Make a Comment ( None so far )