Films

Richard Condon — The Whisper of The Axe– The Manchurian Candidate — Prizzi’s Honor — Videos

Posted on December 29, 2018. Filed under: American History, Articles, Blogroll, Book, Books, Chinese, College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Cult, Culture, Defense Intelligence Agency (DIA), Drug Cartels, Education, Entertainment, Ethic Cleansing, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Government, Fiction, Films, Foreign Policy, Fraud, Freedom, Friends, Genocide, government, government spending, history, Homicide, Language, liberty, Life, Literacy, Mastery, media, Movies, Movies, Narcissism, National Security Agency (NSA), Newspapers, Oil, People, Philosophy, Photos, Police, Political Correctness, Politics, Press, Psychology, Raves, Raymond Thomas Pronk, Resources, Reviews, Television, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , |

See the source imageSee the source imageSee the source imageSee the source imageSee the source image

See the source image

See the source image

See the source image

 

The Manchurian Candidate – opening scene

The Manchurian Candidate Interviews(1962 film)

The Manchurian Candidate (1962) – Assassination Scene (12/12) | Movieclips

The Remaker: The Manchurian Candidate 1962 vs. 2004

The Manchurian Candidate (1962): Classical Film Review

The Manchurian Candidate – Film, Literature and the New World Order

Anjelica Huston-Prizzi’s Honor-“You wanna do it Charlie” scene

Prizzis Honor 1985

Prizzi’s Honor

Prizzi’s Honor scene.mov

Prizzis Honor 1985

AVE MARIA

Anjelica Huston – Prizzi’s Honor – last scene

About the Archive

This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them.

Occasionally the digitization process introduces transcription errors or other problems. Please send reports of such problems to archive_feedback@nytimes.com.

Richard Condon, the fiendishly inventive novelist and political satirist who wrote “The Manchurian Candidate,” “Winter Kills” and “Prizzi’s Honor,” among other books, died yesterday at Presbyterian Hospital in Dallas. He was 81.

Novelist is too limited a word to encompass the world of Mr. Condon. He was also a visionary, a darkly comic conjurer, a student of American mythology and a master of conspiracy theories, as vividly demonstrated in “The Manchurian Candidate.” That novel, published in 1959, subsequently became a cult film classic, directed by John Frankenheimer. In this spellbinding story, Raymond Shaw, an American prisoner of war (played in the film by Laurence Harvey), is brainwashed and becomes a Communist agent and assassin.

When the 1962 film was re-released in 1988, Janet Maslin wrote in The New York Times that it was “arguably the most chilling piece of cold war paranoia ever committed to film, yet by now it has developed a kind of innocence.”

Mr. Condon was a popular novelist who earned serious critical attention, although he did not always win favorable reviews. His response: “I’m a man of the marketplace as well as an artist.” And he added, “I’m a pawnbroker of myth.” Though others made claims that his novels were prophetic, he admitted only that they were “sometimes about five and a half minutes ahead of their time.”

In “Winter Kills,” a President, evidently modeled on John F. Kennedy, is assassinated in a conspiracy involving the Central Intelligence Agency and the underworld. Obsessed by politics, Mr. Condon once said: “Every book I’ve ever written has been about the abuse of power. I feel very strongly about that. I’d like people to know how deeply their politicians are wronging them.” That abuse could be in contemporary life or as long ago as the 15th century, as in his novel “A Trembling Upon Rome.”

Continue reading the main story

Politicians like Senator Joseph R. McCarthy and President Richard M. Nixon appeared in various guises in his work, Nixon as Walter Slurrie in “Death of a Politician.” Speaking about politics and political thrillers, Mr. Condon once said, “It’s the villains that make good literature, because they’re the only ones in the story who know what they want.”

He did not write his first novel until he was 42, but, once started, he never stopped. The first, “The Oldest Confession” (1958), was filmed as “The Happy Thieves,” starring Rex Harrison and Rita Hayworth. The novel was a success, but the film was a failure, whereas the second, “The Manchurian Candidate,” was popular in both forms. Eventually he wrote 26 novels and two works of nonfiction, “And Then We Moved to Rossenarra,” a memoir of the years he lived in Ireland, and “The Mexican Stove,” a cookbook he wrote with his daughter Wendy Jackson.

When asked how he knew so much about crime families, he said he first learned about the subject as a boy on the streets of Washington Heights. He was born in Manhattan and graduated from De Witt Clinton High School. Because his grades were so poor, he never went to college. He worked as an elevator operator, a hotel clerk and a waiter, then sold an article to Esquire magazine. While working as a copywriter for an advertising agency, he met a model named Evelyn Hunt, whom he married in 1938. Copywriting led him into movie publicity, with his first stop the Disney organization.

For 22 years, he was a movie publicist, working for almost every major Hollywood studio. With characteristic panache, he later described himself as “a drummer boy for the gnomes and elves of the silver screen.” During this period, he saturated himself with movies, watching eight a week. They were, he said, mostly bad films, but they taught him the art of storytelling and the need for the novelist to be entertaining.

In the late 1950’s, he left Hollywood and returned to New York to become a novelist. The idea for “The Oldest Confession” came while he was on location with “The Pride and the Passion” at El Escorial, outside Madrid. Fascinated by Old Master paintings, he wrote his book about art thievery. The consecutive success of “The Oldest Confession” and “The Manchurian Candidate” enabled him to devote himself to fiction.

In 1959, he began a series of migrations, first to Mexico, then to Switzerland, finally to Ireland. His travels added to his backlog of knowledge, but he continued to set most of his novels in the United States. Through the 1960’s and into the 70’s, his books received mixed reviews, with some of the more admiring notices going to “An Infinity of Mirrors” in 1964. “Winter Kills,” in 1974, drew favorable attention, with Christopher Lehmann-Haupt saying in his review in The Times that it was “a grand entertainment” and “the best book Mr. Condon has written since ‘The Manchurian Candidate.’ “

After writing a series of novels in Ireland, Mr. Condon moved back to the United States, settling in Dallas in 1980. In Texas, he had his next comeback, with “Prizzi’s Honor,” about the Prizzi family of mobsters in Brooklyn. John Huston turned the novel into a hit film, starring Jack Nicholson, Kathleen Turner and Anjelica Huston. The screenplay, by Mr. Condon and Janet Roach, was nominated for an Academy Award. Several years later, Mr. Condon completed the fictional cycle with “Prizzi’s Family,” “Prizzi’s Glory” and “Prizzi’s Money,” published in 1994.

Among his other novels are “Some Angry Angel,” “A Talent for Loving,” “Arigato” and “Emperor of America.”

Throughout his life, Mr. Condon displayed a wry, even diabolical streak. He often named his characters after real people. For example, the characters in Raymond Shaw’s infantry squad in “The Manchurian Candidate” were named for people associated with the Phil Silvers television show, “You’ll Never Get Rich.” His longest-running character, Dr. Weiler, was named after A. H. Weiler, a former film critic for The Times. In various Condon novels, Dr. Weiler turns up as an obstetrician, a cardiologist, a psychiatrist and the royal physician.

Mr. Condon is survived by his wife; two daughters, Ms. Jackson, of Dallas, and Deborah Condon, who lives near Salisbury in England, and three grandchildren.

Brainwashed

Where the “Manchurian Candidate” came from.

Most people know John Frankenheimer’s movie “The Manchurian Candidate,” which stars Frank Sinatra, Laurence Harvey, Janet Leigh, and Angela Lansbury in the story of an American soldier who is captured in Korea and programmed by Chinese Communists to kill on command. And most people probably think of the movie as a classic of Cold War culture, like “On the Beach” and “Invasion of the Body Snatchers”—a popular work articulating the anxieties of an era. In fact, “The Manchurian Candidate” was a flop. It was released in the fall of 1962, failed to recover its costs, and was pulled from distribution two years later, after the assassination of John F. Kennedy. It turned up a few times on television, but it was not shown in a movie theatre again until 1987, which—nearly the end of the Cold War—is the year its popularity dates from. The true artifact of Cold War culture is the novel, by Richard Condon, that the movie was based on.

Condon’s book came out in 1959 and was a best-seller. It was praised in the Times (“a wild, vigorous, curiously readable melange”) and The New Yorker (“a wild and exhilarating satire”); Time named it one of the Ten Best Bad Novels—which, from a publisher’s point of view, is far from the worst thing that might be said about a book. The novel’s success made Condon rich; he spent most of the rest of his life abroad, producing many more works in the genre that Timehad identified, including “Winter Kills,” in 1974, and, in 1982, “Prizzi’s Honor.” His adaptation of that novel for the John Huston movie received an Academy Award nomination in 1986. He died in 1996.

Condon was a cynic of the upbeat type, not unlike Tom Wolfe: his belief that everything is basically shit did not get in the way of his pleasure in making fun of it. He learned that attitude in the finest school for it on earth, Hollywood. Before he was a novelist, Condon was a movie publicist. He began, in 1936, at Walt Disney Productions, where he promoted “Fantasia” and “Dumbo,” among other animated masterpieces, and moved on to a succession of studios, finishing up at United Artists, which he left in 1957. He didn’t know what he wanted to do next; he just wanted out. “The only thing I knew how to do was spell,” he later explained, so he did the logical thing and became a writer. Condon claimed that his work in Hollywood had given him three ulcers. He also claimed that he had seen, during his years there, ten thousand movies, an experience that he believed gave him (his words) “an unconscious grounding in storytelling.”

Frankenheimer called “The Manchurian Candidate” “one of the best books I ever read,” but admirers of Frankenheimer’s movie have not been so gracious. Greil Marcus, in a characteristically overheated appreciation of the movie in the British Film Institute’s Film Classics series, calls the novel a “cheaply paranoid fantasy,” and he goes on, “That the story would lodge in the nation’s psyche and stay there was the work of other hands.” The film historian David Thomson describes it as “a book written so that an idiot could film it.” No doubt Condon wrote “The Manchurian Candidate” with a movie deal in mind. It was his second novel; his first, called “The Oldest Confession,” was also made into a movie—“The Happy Thieves,” starring Rex Harrison (a flop that stayed a flop). But the claim that Condon’s “Manchurian Candidate” is not much more than a draft for the screenplay (which was written by George Axelrod, the author of “The Seven Year Itch”) is peculiar. Michael Crichton writes books that any idiot can film; he practically supplies camera angles. But Condon’s is not an easy book to film, in part because its tone is not readily imitated cinematically, and in part because much of it is, or was in 1962, virtually unfilmable. Strange as the movie is—a thriller teetering on the edge of camp—the book is stranger.

Time, a magazine whose editors, after all, have daily experience with overcooked prose, was not wrong in seeing something splendid in the badness of Condon’s book. “The Manchurian Candidate” may be pulp, but it is very tony pulp. It is a man in a tartan tuxedo, chicken à la king with shaved truffles, a signed LeRoy Neiman. It’s Mickey Spillane with an M.F.A., and a kind of summa of the styles of paperback fiction circa 1959. The writing is sometimes hardboiled:

The slightest touchy thing he said to her could knock the old cat over sideways with an off-key moan. But what could he do? He had elected himself Head Chump when he stepped down from Valhalla and telephoned this sweaty little advantage-taker.

Sometimes it adopts a police-blotter, “degree-zero” mode:

“Thank you, Major. Dismiss,” the general said. Marco left the office at four twenty-one in the afternoon. General Jorgenson shot himself to death at four fifty-five.

Occasionally, and usually in an inconvenient place, it drops a mot recherché:

Raymond’s mother came out of her chair, spitting langrel. [“Langrel”: irregular pieces of iron loaded into shell casings for the purpose of ripping the enemy’s sails in naval battles; obsolete.]

VIDEO FROM THE NEW YORKER

A Hundred Years of American Protest, Then and Now

He clutched the telephone like an osculatorium and did not allow himself to think about what lay beyond that instant. [“Osculatorium”: medieval Latin, for a tablet that is kissed during the Mass. There appears to be no connotation involving clutching.]

It signals feeling by waxing poetic:

Such an instant ago he had paddled their wide canoe across that lake of purple wine toward a pin of light high in the sky which would widen and widen and widen while she slept until it had blanched the blackness.

It signals wisdom by waxing incomprehensible:

There is an immutable phrase at large in the languages of the world that places fabulous ransom on every word in it: The love of a good woman. It means what it says and no matter what the perspective or stains of the person who speaks it, the phrase defies devaluing. The bitter and the kind can chase each other around it, this mulberry bush of truth and consequence, and the kind may convert the bitter and the bitter may emasculate the kind but neither can change its meaning because the love of a good woman does not give way to arbitrage.

And, when appropriate, it salivates:

Her lithe, solid figure seemed even more superb because of her flawless carriage. She wore a Chinese dressing gown of a shade so light that it complemented the contrasting color of her eyes. Her long and extremely beautiful legs were stretched out before her on the chaise longue, and any man but her son or her husband, seeing what she had and yet knowing that this magnificent forty-nine-year-old body was only a wasted uniform covering blunted neural energy, might have wept over such a waste.

Some people like their bananas ripe to the point of blackness. “The Manchurian Candidate” is a very ripe banana, and, for those who have the taste for it, delectable.

The magnificent forty-nine-yearold body in the last passage belongs to the mother of Raymond, the assassin, who in Frankenheimer’s movie is played by Angela Lansbury as a proper and steely middle-aged matron. For Condon, though, Raymond’s mother is no matron. She is a sexually predatory heroin addict who commits double incest. She is the serpent in the suburban garden of Cold War domesticity, and, in imagining her and her history, Condon almost certainly had in the back of his mind the book that, three years earlier, had become the first blockbuster in American publishing, Grace Metalious’s “Peyton Place”—a story that also had to be sanitized for the movies. The plot of “Peyton Place” turns on incest (as, for that matter, does the plot of “Lolita,” a sensation when the American edition came out, in 1958). But the luridness of Condon’s novel did not make it to the screen. There is no equivalent in the movie, for example, of the proto-Pynchonesque sequence in which Raymond’s stepfather, Johnny Iselin, attempts to have sex with an Eskimo. Frankenheimer’s idea of satire was a lot more conventional than Condon’s. He was also a Hollywood filmmaker, of course, and obliged to observe a different decorum.

Counterintuitive as it sounds, the secret to making a successful thriller, as Michael Crichton and Tom Clancy have demonstrated, is to slow down the action occasionally with disquisitions on Stuff It Is Interesting to Know—how airplanes are made, how nuclear submarines work, how to build an atomic bomb. Ideally, this information is also topical, food for the national appetite of the day. In “The Manchurian Candidate,” the topic is brainwashing.

Fear of Communist brainwashing seems an example of Cold War hysteria, but in the nineteen-fifties the fear was not without basis. United Nations ground forces began military action in Korea on July 5, 1950. On July 9th, an American soldier who had been captured just two days earlier delivered a radio speech consisting of North Korean propaganda. Similar broadcasts by captured soldiers continued throughout the war. At the end of the war, the Army estimated that one out of every seven American prisoners of war had collaborated with the enemy. (The final, generally accepted estimate is one out of ten.) Twenty-one Americans refused to return to the United States; forty announced that they had become Communists; and fourteen were court-martialled, and eleven of those were convicted.

The term “brainwashing” was coined by a journalist named Edward Hunter, who had served in the Morale Operations section of the U.S. Office of Strategic Services during the Second World War, which he spent mostly in Asia, and who became an outspoken anti-Communist. Hunter’s book “Brainwashing in Red China: The Calculated Destruction of Men’s Minds” appeared in 1951. In it, he explained that “brainwashing” was his translation of the Chinese term hsi-nao, which means “cleansing of the mind,” and which he said he had heard frequently when speaking with Europeans who had been caught inside China in 1949, the year of Mao’s revolution.

In 1955, two years after the armistice ending the Korean War, the Army issued a huge report on the treatment of American prisoners called “POW: The Fight Continues After the Battle.” The Army had interviewed all surviving prisoners of war on the ships that brought them back across the Pacific—more than four thousand soldiers—and had learned that many of them underwent intensive indoctrination by Chinese Communists. The Chinese had carefully segregated the prisoners they had identified as incorrigibles, sometimes housing them in separate camps, and had subjected the prisoners they judged to be potential converts to five hours of indoctrination a day, in classes that combined propaganda by the instructors with “confessions” by the prisoners. In some cases, physical torture accompanied the indoctrination, but in general the Chinese used the traditional methods of psychological coercion: repetition and humiliation. The Army discovered that a shocking number of prisoners had, to one degree or another, succumbed. Some were persuaded to accuse the United States, in signed statements, of engaging in germ warfare—a charge that was untrue but was widely believed in many countries.

The Army report instigated a popular obsession with brainwashing that lasted well into 1957. Stories about the experiences of American prisoners appeared in The Saturday Evening PostLife, the Times Magazine, and The New Yorker. The term itself became a synonym for any sort of effective persuasion, and writers struggled with the question of whether aspects of contemporary American life, such as advertising and psychiatric therapy, might really be forms of brainwashing. Condon must have read much of this material; he did know Andrew Salter’s “Conditioned Reflex Therapy” (1949), a book he has the Chinese psychiatrist in his novel, Yen Lo, cite in the speech in which he announces his successful brainwashing of the American prisoners. Yen Lo names a number of other studies of hypnosis and conditioning, including “The Seduction of the Innocent,” by Frederic Wertham, an alarmist account of the way comic books corrupt the minds of American youth. (Yen Lo evidently has, in addition to his other exceptional powers, a crystal ball, since “Seduction of the Innocent” was not published until 1954, after the Korean War was over.) These books and articles apparently persuaded Condon that brainwashing, or psychological conditioning using a combination of hypnosis and Pavlovian methods, was a real possibility—as the recent experience of the Korean P.O.W.s had persuaded many other Americans that it was.

Condon’s book played on the fear that brainwashing could be permanent, that minds could be altered forever. By the time Frankenheimer’s movie came out, though, it had become clear that most conditioning is temporary. In 1961, in “Thought Reform and the Psychology of Totalism: A Study of ‘Brainwashing’ in China,” the psychiatrist Robert Jay Lifton, who had conducted some of the shipboard interviews with returning P.O.W.s, concluded that the indoctrination of prisoners was a long-term failure. All of the “converts” eventually returned to the United States, and the former prisoners who had come home praising the good life to be had in North Korea soon reverted to American views.

Still, conditioning is the theme (if “theme” is not too grand a term) of Condon’s novel. Even before Raymond falls into the hands of Yen Lo, he is psychologically conditioned, by his mother’s behavior, to despise everyone. His mother is conditioned, by her early incest, to betray everyone. And the American people are conditioned, by political propaganda, to believe her McCarthy-like husband’s baseless charges about Communists in the government. It is not, in Condon’s vision, the Communist world on one side and the free world on the other. It is just the manipulators and the manipulated, the conditioners and the conditioned, the publicists and the public. In such a world, it’s probably better to be the publicist, if you can deal with the ulcers.

Frank Sinatra, who plays Marco, the only friend Raymond has, is supposed to have asked his friend Jack Kennedy for his approval before Frankenheimer’s movie was released. United Artists was apparently afraid that the assassination scene might give some nut an idea. Kennedy, as it happened, loved the movie; he was, after all, the world’s most famous Ian Fleming fan. He was killed a year after “The Manchurian Candidate” came out. Did Lee Harvey Oswald see it? The problem has been examined in depth by John Loken, in a book called “Oswald’s Trigger Films” (2000). Loken concludes that although the evidence is not definitive, Oswald almost certainly did see it. “The Manchurian Candidate” opened in Dallas in November, 1962, and played there for several months; Oswald, who was living in Dallas at the time, had a habit of going to the movies by himself (he was in a movie theatre when he was arrested on November 22, 1963); and Loken has determined that the bus Oswald probably took to work passed within ten yards of a theatre where the movie was playing. (Loken is much struck by the fact that references to “The Manchurian Candidate” are almost nonexistent in the literature, official and otherwise, on the Kennedy assassination. He concludes, in the spirit of all scholars of that assassination, that “the probable Oswald connection, so utterly obvious if one but thinks about it, has been suppressed for decades by a powerful conglomerate that might aptly be called the ‘media-entertainment complex.’ ”)

Immediately after Kennedy was shot, Condon got a call from a newspaper reporter asking if he felt responsible. Condon couldn’t see the relevance, and he was not being defensive. He had not introduced political assassination to popular American culture. Robert Penn Warren’s “All the King’s Men” was published in 1946 and was made into a movie in 1949; a version for television, directed by Sidney Lumet, was broadcast in 1958. Assassination is the subject of John Huston’s “We Were Strangers” (1949) and Lewis Allen’s “Suddenly” (1954), also starring Frank Sinatra. Oswald might easily have seen those movies as well. More to the point: “The Manchurian Candidate” is the story of a man programmed to kill at the command of other people. What self-respecting assassin would take such a character for his role model? Either Oswald acted according to his own wishes, in which case he wasn’t imitating Condon’s killer, or he really was programmed by the Communists, in which case the question isn’t whether Oswald saw Frankenheimer’s movie but whether his Communist masters did.

United Artists withdrew “The Manchurian Candidate” from theatres in 1964, although the movie could occasionally be seen on television and in art houses. In 1972, Sinatra bought the rights and, in 1975, removed it from circulation entirely. Whether or not he was motivated by guilt over Kennedy’s death is unclear. He did, however, give his daughter Tina permission to produce a remake, and it is being shot, this fall, by Jonathan Demme. (Demme’s previous movie, “The Truth About Charlie,” was also a remake, of Stanley Donen’s “Charade,” of 1963. His method, judging from that effort, is to update the story and then salt it with allusions to the period of the original. “Charade” was filmed in Paris at the time of the French New Wave, and so in Demme’s version there are appearances by Charles Aznavour, Agnès Varda, and the grave of François Truffaut—none of which have anything to do with the story. Demme has reportedly set “The Manchurian Candidate” in the time of the Gulf War; Liev Schreiber plays Raymond, Meryl Streep is his dragon mother, and Marco is played by Denzel Washington. We can be fairly confident that at some point Denzel Washington will be seen listening to a Frank Sinatra song.)

The Kennedy assassination does not fulfill Condon and Frankenheimer’s prophecy. On the contrary, it buries it. If any assassin might plausibly have been a Communist puppet, it was Oswald, a man who had lived in the Soviet Union for three years, who had a Russian wife, and who once handed out leaflets for an outfit called the Fair Play for Cuba Committee. These facts were widely known within hours of Oswald’s arrest, and yet the theory that he was an agent who was directed, wittingly or not, by Communist handlers has never been an important part of the folklore of the Kennedy assassination. Until the late nineteen-seventies, the official line (endorsed, incidentally, by Condon at the time) was that Oswald acted alone. Dissenters from that view have been drawn mainly to theories involving the Mafia and the Central Intelligence Agency, even though hooking Oswald up with those entities requires a far greater imaginative stretch than associating him with the Soviets. Almost no one thinks of Kennedy (except in some convoluted way) as a casualty of the Cold War, and his death does not represent the culmination of the national anxiety about Communist infiltration. It represents the end of that obsession, and of the panic that Condon’s novel and Frankenheimer’s movie both so happily exploit. ♦

  • Louis Menand, a staff writer since 2001, was awarded the National Humanities Medal in 2016.

https://www.newyorker.com/magazine/2003/09/15/brainwashed

RICHARD CONDON BOOKS IN ORDER

Publication Order of Prizzi Books

Prizzi’s Honor (1982) Hardcover  Paperback  Kindle
Prizzi’s Family (1986) Hardcover  Paperback  Kindle
Prizzi’s Glory (1988) Hardcover  Paperback  Kindle
Prizzi’s Money (1994) Hardcover  Paperback  Kindle

Publication Order of Standalone Novels

The Oldest Confession (1958) Hardcover  Paperback  Kindle
The Manchurian Cadidate (1959) Hardcover  Paperback  Kindle
Some Angry Angel (1960) Hardcover  Paperback  Kindle
A Talent for Loving aka The Great Cowboy Race (1961) Hardcover  Paperback  Kindle
An Infinity of Mirrors (1964) Hardcover  Paperback  Kindle
Any God Will Do (1966) Hardcover  Paperback  Kindle
The Ecstasy Business (1967) Hardcover  Paperback  Kindle
Mile High (1969) Hardcover  Paperback  Kindle
The Vertical Smile (1971) Hardcover  Paperback  Kindle
Arigato (1972) Hardcover  Paperback  Kindle
Winter Kills (1974) Hardcover  Paperback  Kindle
The Star-spangled Crunch (1975) Hardcover  Paperback  Kindle
Money is Love (1975) Hardcover  Paperback  Kindle
The Whisper of the Axe (1976) Hardcover  Paperback  Kindle
The Abandoned Woman (1977) Hardcover  Paperback  Kindle
Bandicoot (1978) Hardcover  Paperback  Kindle
Death of A Politician (1978) Hardcover  Paperback  Kindle
The Entwining (1980) Hardcover  Paperback  Kindle
A Trembling Upon Rome (1983) Hardcover  Paperback  Kindle
Emperor of America (1990) Hardcover  Paperback  Kindle
The Final Addiction (1991) Hardcover  Paperback  Kindle
The Venerable Bead (1992) Hardcover  Paperback  Kindle

Shop Related Products
$18.44
 (1)
$18.86$20.95
 (2)
$22.54$22.99
$8.99
 (542)
$27.00$45.00
 (43)

Before he began writing fiction stories, Richard Thomas Condon worked for Walt Disney productions as a press agent in the movie business for 20 years where he spent most of his time in the major studios. Prior his moderate success in Hollywood, Condon also worked in the US Merchant Marine. He actually started writing in 1957 in his forties. He often complained of wasting a lot of time in Hollywood when he was employed as an ad writer by United Artists. His boss, Max Youngstein later fired him after deducting amounts from Condon’s salary without his knowledge. Youngstein also offered him a house overlooking a Mexican ocean and told him to write his book, The Manchurian Candidate (1959) which was his second novel. The book was used to make a movie in 1962, making Richard Condon famous. His other book, Prizzi’s Honor (1982) was also made into a successful movie.

Richard Condon was a thriller and satirical novelist, born and raised in New York City and best known for his conspiratorial books like The Oldest Confession (1958), Some Angry Angel (1960), A Talent of Loving (1961), An Infinity of Mirrors (1964) and many more novels. Condon’s writing was famous for its fascination with trivia, complex plotting, and hatred for those in power. For instance, his most popular novel The Manchurian Candidate was highly criticized because it seemed to disturbingly overshadow the assassination of President John F. Kennedy. Furthermore, several books feature a thinly disguised version of Richard Nixon. His characters were driven by family loyalty, and with obsession, usually political and sexual. His plots had elements of a typical tragedy involving protagonists who are led by their pride to places where they destroy what they love. One of his most notable books, Mile High (1969) was best defined as secret history. In the novel, And Then We Moved to Rossenara, Richard Condon gives a humorous autobiography that recounts the various places he has lived in the world and his family’s move to Rossenarra, Ireland in the 1970s.

Apart from writing novels, Richard Condon also wrote some popular book series and bestsellers including; Prizzi’s Honor (1986), Prizzi’s Family (1986), Prizzi’s Glory (1988) and Prizzi’s Money (1994). He died in 1996.

Prizzi’s Honor was Richard Condon’s first book in the Prizzi’s series. This is not an ordinary story of a boy-meets-girl. Prizzis is the most influential Mafia family in New York. Their faithful lieutenant, Charley Partanna has affections for Irene Walker who works as a tax consultant in Los Angeles. She also does freelancing which pays her more. She is also a Mob’s hit woman. She cons the Prizzis an unforgivably huge amount of money. Indeed, this is a very dangerous moonlighting which eventually conflicts Charley’s oldest loyalties with his latest one. This book mixes character and caricature easily, making it one of his best books since The Manchurian Candidate.

The second book in the Prizzi’s series is the Prizzi’s Family. Here, Charley Partanna works for the Prizzi family as a hitman by day and studies for his high school exam by night. When he is not studying, he is juggling two beautiful women, probably more than he can handle. One, Maerose, is the granddaughter of Charley’s boss and is hungry for honor, power and Charley of course. The other, Mardell, is a sensational, one-third fantasy, two-thirds legs. This is a problem to Charley, but hormones seem to keep obstructing him. This book is funny and cheerful, and foams with perversity, obsessional religious mania, rascality, greed and lust, and assault and battery, making it a good read.

The next book in the series is Prizzi’s Glory. In this successful last volume in Prizzi trilogy series, the Prizzi family cleans up the environment, immersing huge benefits. They finally appear as a cruel, vivid and comic portrait of the America’s best-run Mafia institution. For the change, a tired, bored and depressed Charley Fontana weds Maerose, but this does not help because Don Corrado has thought of a bigger change, Prizzi’s respectability. Money flows to the Prizzi’s family through dubious activities like gambling, extortion, prostitution, loan-sharking, and narcotics. Don Corrado uses the money to control a new scam, a national political power which Charley heads. This book offers an accomplished and entertaining satire for a feat of joyful reading.

The last book in the Prizzi’s series is Prizzi’s Money. Richard Condon showcases the Prizzi family’s saga of organized crime. Here, Julia Asbury outwits the Prizzis, walking away with a huge amount of their money (a billion & a quarter) to start a new life. She does this after discovering that the Prizzis and her husband had double-crossed her.

Another noticeable writing style by Richard Condon was the use of real-life names in his books. Condon used names of real people as characters in his writings, but generally minor/peripheral ones. One of the most common names used in all of his novels includes F.M. Heller, Franz Heller, F. Marx Heller, and Frank Heller which are variations of Franklin M. Heller. In real life, Heller was, in fact, a television director based in New York City from the 1950s to 1970s and first lived on Long Island before moving to a house along Rockrimmon Road, Stamford, Connecticut. Starting with Mile High, Rockrimmon House and Rockrimmon Road have been frequently mentioned in the novels. All the fictional Hellers also shared a devotion for needlework and grew a thick-white beard similar to the real-life Heller who made a needlework depiction in Condon’s manor house in Ireland. Condon also had a great actor friend, Allan Melvin, who he wrote a nightclub act. Melvin also played Cpl. Henshaw in The Phil Servers Show which Condon was publicizing. Several Condon books particularly Prizzi’s Honor showcases Melvini as a prominent hit man.

Richard Condon’s legend is not only showcased in his wonderful writings but also some popular films that were adapted from his novels. The films include; The Manchurian Candidate (1962 and 2004), The Talent of Loving (1969), Winter Kills (1979), Prizzi’s Honor (1985), and The Happy Thieves from the novel The Oldest Confession (1962). The Manchurian Candidate is recognized as one of the best films of all time. The book combined several elements including; satire, nefarious conspiracies, black humor, outrage at financial and political corruption in America, as well as breath-taking elements from spy fiction and thrillers, and grotesque and horrific violence.

https://www.bookseriesinorder.com/richard-condon/

Condon, Richard 1915-1996 (Richard Thomas Condon)

Condon, Richard 1915-1996 (Richard Thomas Condon)
PERSONAL:
Born March 18, 1915, in New York, NY; died April 9, 1996, in Dallas, TX; son of Richard Aloysius and Martha Irene Condon; married Evelyn Rose Hunt, January 14, 1938; children: Deborah Weldon, Wendy Jackson. Education: Graduated from high school in New York, NY.

CAREER:
Writer. Publicist in New York, NY, and Hollywood, CA, for Walt Disney Productions, 1936-41, Twentieth Century-Fox Film Corp., 1941-45, Richard Condon, Inc., 1945-48, and Paramount Pictures Corp., 1948-53, and in Europe and Great Britain for United Artists Corp., 1953-57; novelist. Producer, with Jose Ferrer, of Broadway shows Twentieth Century and Stalag 17, 1951-52.

Wolters Kluwer eStore – Payroll & Treatises Law Books
Premier source for legal products & law books from Wolters Kluwer.
lrus.wolterskluwer.com/store | Sponsored▼
MEMBER:
International Confederation of Book Actors (honorary life president), Dramatists Guild, Authors Guild, Authors League of America.

AWARDS, HONORS:
Writers Guild of America award, Bafta Award from British Academy of Film and Television Sciences, and Academy Award nomination, all 1986 for screen adaptation of Prizzi’s Honor,.

Beginner Guide to Options
Eye-Opening Book Shows How To Safely Make Money In Up and Down Market
TradeWins.com | Sponsored▼
WRITINGS:
And Then We Moved to Rossenarra; or, The Art of Emigrating, Dial (New York, NY), 1973.

(With daughter, Wendy Jackson) The Mexican Stove: What to Put on It and in It, Doubleday (Garden City, NY), 1973, reprinted, Taylor Publishing, 1988.

NOVELS
The Oldest Confession (Book-of-the-Month Club alternate selection), Appleton-Century-Crofts (New York, NY), 1958.

The Manchurian Candidate, McGraw (New York, NY), 1959, reprinted, Four Walls Eight Windows (New York, NY), 2003.

Some Angry Angel: A Mid-Century Faerie Tale, McGraw (New York, NY), 1960.

A Talent for Loving; or, The Great Cowboy Race, McGraw (New York, NY), 1961.

An Infinity of Mirrors, Random House (New York, NY), 1964.

Any God Will Do, Random House (New York, NY), 1965.

The Ecstasy Business, Dial (New York, NY), 1967.

Mile High (Literary Guild alternate selection), Dial (New York, NY), 1968.

The Vertical Smile (Literary Guild selection), Dial (New York, NY), 1971.

Arigato, Dial (New York, NY), 1972.

Winter Kills, Dial (New York, NY), 1974.

The Star Spangled Crunch, Bantam (New York, NY), 1974.

Money Is Love, Dial (New York, NY), 1975.

The Whisper of the Axe, Dial (New York, NY), 1976.

The Abandoned Woman: A Tragedy of Manners, Dial (New York, NY), 1977.

Bandicoot, Dial (New York, NY), 1978.

Death of a Politician, Richard Marek (New York, NY), 1978.

The Entwining, Richard Marek (New York, NY), 1980.

Prizzi’s Honor (second novel in trilogy; Book-of-the-Month Club joint main selection; also see below), Coward, McCann & Geoghegan (New York, NY), 1982.

A Trembling upon Rome, Putnam (New York, NY), 1983.

Prizzi’s Family (first novel in trilogy; Literary Guild joint main selection), Putnam, 1986.

Prizzi’s Glory (third novel in trilogy), Dutton (New York, NY), 1988.

The Final Addiction, Saint Martin’s Press (New York, NY), 1991.

Prizzi’s Money, Crown Publishing (New York, NY), 1994.

SCREENPLAYS
(With Janet Roach) Prizzi’s Honor (adaptation; see above), Twentieth Century-Fox Film Corp., 1985.

Report Advertisement
Also author screenplay for A Talent for Loving, 1969, and The Summer Music; author of the play Men of Distinction, produced on Broadway, 1953. Contributor to periodicals, including Holiday, Nation, Vogue, Harper’s, Gourmet, Esquire, Travel and Leisure, and Sunday Times magazine. Novels have been published in twenty-two languages and in braille.

ADAPTATIONS:
Books have been adapted for film, including The Oldest Confession released as the film The Happy Thieves, 1962; Winter Kill, 1979; and The Manchurian Candidate, 1962, and adapted remake, Paramount Pictures, 2004.

SIDELIGHTS:
Novelist Richard Condon began writing at age forty-two following a successful career as a movie publicist. Condon’s reputation as a writer of political thrillers was secured with his first two novels, The Oldest Confession and The Manchurian Candidate. Condon’s body of work included over twenty novels, two nonfiction books, a handful of plays and screenplays, and numerous articles on his twin passions, food and travel. This output netted him an income of about two and a half million dollars.

Condon took full advantage of his freedom as a writer. Although he resided in the United States later in life, for nineteen years Condon and his family lived in countries such as France, Spain, Switzerland, and Ireland. Condon’s focus in his novels, however, usually reflected his concerns about American society, particularly the United States government. Condon’s preoccupation with examining abuses of power made him into a cult figure of sorts to readers who shared his convictions. Condon’s novels are entertaining, despite their underlying seriousness. This assessment is compatible with Condon’s personal goals as a writer, which he discussed in a People magazine interview with Anne Maier. “I have never written for any other reason than to earn a living. This is certainly true of other writers, but some poor souls get mightily confused with art. I am a public entertainer who sees his first duty as the need to entertain himself.”

Report Advertisement
Most of the material for Condon’s blend of reality and bizarre invention came from “the dirty linen closets of politics and money,” according to a New York Review of Books contributor Thomas R. Edwards. “His view—it might be called Condon’s Law—is that when you don’t know the whole truth, the worst you can imagine is bound to be close.” Edwards added: “[He] isn’t an analyst but an exploiter of our need to believe the worst. He does it skillfully, but his books would be less fun than they are if one didn’t suspect that he believes the worst too, that his pictures of a world of fools eternally at the mercy of knaves are also pictures of what, with anger and disgust, he takes to be the case.”

Condon’s second novel, The Manchurian Candidate, was published in 1959 and remains Condon’s most highly acclaimed novel, one that critics frequently cite as a standard of comparison for his later works. The title of the book refers to the main character, Raymond Shaw, a soldier who becomes a prisoner of war in Korea and is unknowingly brainwashed into committing crimes for his former captors after he returns to the United States. Commenting on this novel, reviewers distinguished carefully between Condon’s writing and literature. Most reviewers noted the novel’s many appeals. Michael Rogers, writing a Library Journal review of a 2003 reprint of the novel, commented that “any fan of political thrillers will enjoy this one.”

Condon followed The Manchurian Candidate with several relatively successful novels. Nevertheless, several of Condon’s subsequent novels generally fell out of favor with critics. In 1974, however, his novel Winter Kills was enthusiastically received. Winter Kills closely parallels the lives of members of the Kennedy family. The main character, Nick Thirkield, is the half-brother of John F. Kennedy analogue Tim Kegan, a young, liberal Irish president who is assassinated by a lone maniac. The assassin is caught and charged with the murder, but when Thirkield learns that another man may also have been involved, he has the case reopened.

Report Advertisement
Several reviewers found themselves pleasantly surprised by Winter Kills. New York Times Book Review contributor Leo Braudy, for example, commented that Winter Kills is “a triumph of satire and knowledge, with a delicacy of style and a command of tone that puts Condon once again into the first rank of American novelists.” Braudy explained: “Winter Kills succeeds so brilliantly because the Kennedy assassination furnished Condon with a familiar mythic landscape through which his Gulliver-like hero can wander, simultaneously prey to Lilliputian politics, Brobdingnagian physicality, Laputan science, and Houyhnhnm moralism.” Christopher Lehmann-Haupt expressed a like opinion in the New York Times: “By the time I reached the end of the novel’s incredibly complex plot and had followed Nick Thirkield through the many blind alleys and trapdoors that eventually bring him face to face with the person behind his brother’s assassination, I was a Richard Condon fan once more.”

Extrapolation contributor Joe Sanders observed: “In Condon’s novels, politics determines the shape of society, but politics is not a voluntary, cooperative activity, entered into for some common end; it is a device by which a few clever people manipulate many others to gain their selfish ends.” Lehmann-Haupt expressed disappointment with the ending because he “caught on too early what the ultimate outcome would be,” but he found the novel’s conclusion satisfying. He wrote: “It may not be true that America is run by a small, conspiring oligarchy. It may not be true that things happen in the White House at the whim of movie stars and labor leaders, of courtesans and generals. But the possibilities are no longer inconceivable.”

Winter Kills was made into a critically acclaimed but briefly run film of the same title. Although Condon was not directly involved in the making of Winter Kills, the film’s quality drew his attention and support. After two years of filming for which most of the cast and crew were never paid, Winter Kills opened in New York in 1979 to favorable reviews. The film’s three-week run in showcase theaters was followed by disappearance from theatres, raising Condon’s conspiracy suspicions. Condon’s paranoia was further incited by the murder of one of the producers shortly after the film’s opening; two years later the second producer was sentenced to forty years in prison on a drug charge. The movie was briefly re-released in 1982 and 1983.

Report Advertisement
Condon’s novel Prizzi’s Honor dealt with a similarly sensitive milieu: organized crime. Although this setting has been exploited by several other authors, notably Mario Puzo, reviewers believed that Condon’s novel offered a fresh outlook. Charles Champlin observed in the Los Angeles Times Book Review: “Condon, once again accepting the perceived reality as police leaks, newspaper exposes and Puzo have given it to us—complete with Sicilian litany of consiglieri, caporegimes, sottocapos, soldati, and a godfather with a lethal wheeze and a mind Machiavelli might envy—steps over it to present an outrageous and original love story.” New York Times Book Review contributor Robert Asahina noted: “Richard Condon is not Mario Puzo; suspense, not the family saga, is his forte. And he winds the mainspring of the plot so tight that the surprise ending will knock your reading glasses off. Yet Prizzi’s Honor is also a sendup of the prevailing sentimental picture of the underworld. To Mr. Condon, there is honor among these thieves—but it is precisely in the name of omerta that the fratellanza has been willing to ‘cheat, corrupt, scam, and murder anybody who stands between them and a buck.’”

The novel’s love interest involves Charley Partanna, a gourmet cook, compulsive house cleaner, and hit man for the Prizzi family; and Irene Walker, a tax consultant and freelance killer for hire. “It is something of a challenge to a novelist to create a love interest in a story that pairs two ruthless murderers,” observed Times Literary Supplement contributor Alan Bold. “Irene is presented as a colder fish than Charley—she has risen to the top of her profession on account of her ability to murder without remorse. She is as sound a psychopath as Charley. Condon suggests, however, that such creatures are capable of a great passion and Charley, for one, is sure that his love is the real thing.” New York Times contributor Susan Bolotin likewise commented on the originality of this pairing: “If boy-meets-girl/boy-gets-girl love stories seem poisonously tiresome to you, Richard Condon’s boisterous new novel may prove the perfect antidote. It’s true that Prizzi’s Honor starts off with a familiar melody, … but the book soon turns into a fugue with variations so intricate that the genre may never recover.”

Despite opposition from Charley’s father, Charley and Irene are wed. Condon takes the couple through a convoluted plot that includes “a kidnapping, international financial intrigue, a gangland war, police on the take, the power struggle within the family, contract killings, [and] lots of jolly sex,” wrote Bolotin. According to several reviewers, Condon’s exploration of the seamier side of organized crime is distressing. Best Sellers contributor Tony Bednarczyk wrote: “There is solid storytelling, but the subject raises disturbing questions about morals, and/or the lack thereof. It is a fast-paced, very readable story, but one feels a bit guilty for being interested in what comes next.” While Time critic Michael Demarest also believed that Prizzi’s Honor, “like most of [Condon’s] books, comes sometimes too close to the truth for comfort,” he nevertheless concluded: “Condon’s stylish prose and rich comedic gift once again spice a moral sensibility that has animated sixteen novels since The Manchurian Candidate appeared in 1962. If wit and irony could somehow neutralize villainy, the novelist would make a fine FBI director.” Other reviewers expressed similarly laudatory views. Champlin wrote: “Condon is once again the storytelling satirist with a sharp eye and a high velocity typewriter. Prizzi’s Honor may not be his best work but it ranks well up in the canon.” Concluded Asahina: “Twenty years after The Manchurian Candidate, it’s nice to know that Mr. Condon is still up to his sly tricks. In his case, at least, it’s a pleasure that—as he tells us an old Sicilian proverb has it—‘The less things change, the more they remain the same.’”

Report Advertisement
Prizzi’s Honor was also made into a successful film of the same title, with Jack Nicholson and Kathleen Turner playing the roles of Charley Partanna and Irene Walker. The film was nominated for several Academy Awards, and the screenplay, adapted by Condon and coauthor Janet Roach, received awards from the Writers Guild of America and the British Academy of Film and Television Sciences. The project was initiated and eventually directed by John Huston.

Huston and movie critics alike believed that Prizzi’s Honor was faithful to the novel, a feat they attribute to Condon and Roach’s skillfully adapted screenplay. Chi-cago Tribune contributor Gene Siskel described Prizzi’s Honor as “a classic piece of moviemaking,” and Los Angeles Times film critic Sheila Benson noted: “To say the film is the treasure of the year would be to badmouth it in this disastrous season. Prizzi’s Honor would be the vastly original centerpiece of a great year.” Benson also wrote: “In its dangerous mix of love and murder, Huston is traversing terrain that he (and certainly The Manchurian Candidate author Condon) blazed decades ago. This ’80s-version denouement may distress the squeamish, but it’s right in keeping with Prizzi honor.”

BIOGRAPHICAL AND CRITICAL SOURCES:
BOOKS
Bestsellers 90, Issue 3, Thomson Gale (Detroit, MI), 1990.

Condon, Richard, Death of a Politician, Richard Marek (New York, NY), 1978.

Contemporary Authors Autobiography Series, Volume I, Thomson Gale (Detroit, MI), 1984.

Contemporary Literary Criticism, Thomson Gale (Detroit, MI), Volume IV, 1975, Volume VI, 1976, Volume VIII, 1978, Volume X, 1979, Volume XLIV, 1987.

Newquist, Roy, Conversations, Volume I, Rand McNally (Chicago, IL), 1967.

PERIODICALS
Best Sellers, June, 1982, Tony Bednarczyk, review of Prizzi’s Honor; December, 1986.

Chicago Tribune, June 14, 1985, Gene Siskel, review of Prizzi’s Honor (film adaptation).

Daily Variety, March 8, 2002, Dana Harris and Sharon Swart, “‘Candidate’ for Redo: Paramount Plans Remake of 1962 Classic,” p. 1.

Extrapolation, summer, 1984, Joe Sanders, article about author.

Library Journal, November 1, 2003, Michael Rogers, review of The Manchurian Candidate, p. 129.

Los Angeles Times, June 14, 1985, Sheila Benson, review of Prizzi’s Honor (film adaptation).

Los Angeles Times Book Review, April 25, 1982, Charles Champlin, review of Prizzi’s Honor.

Modern Language Quarterly, September, 2006, Micahel Szalay, review of The Manchurian Candidate, p. 363.

New Statesman, September 5, 1975, review of Money is Love, p. 285; August 13, 1976, review of The Whisper of the Axe, p. 216.

Newsweek, September 14, 1964, review of Manchurian Candidate; June 9, 1975, review of Money Is Love, p. 81.

New Yorker August 25, 1975, review of Money Is Love, p. 87; December 11, 1978, review of Death of a Politician, p. 206; October 28, 1991, review of The Final Addiction, p. 119.

New York Review of Books, February 8, 1979, Thomas R. Edwards, review of Death of a Politician, p. 35.

New York Times, May 24, 1974, Christopher Lehmann-Haupt, review of Winter Kills; May 21, 1976; April 20, 1982, Susan Bolotin, review of Prizzi’s Honor, p. 25.

New York Times Book Review, May 26, 1974, Leo Braudy, review of Winter Kills; May 25, 1975, review of Money Is Love, p. 12; May 23, 1976, review of The Whisper of the Axe, p. 4; April 18, 1982, Robert Asahina, review of Prizzi’s Honor, p. 12; September 4, 1983, John Jay Osborn, Jr., review of A Trembling upon Rome, p. 4; September 28, 1986, Jimmy Breslin, review of Prizzi’s Family, p. 13; October 9, 1988, Vincent Patrick, review of Prizzi’s Glory, p. 24; February 11, 1990, Roy Blount, Jr., review of Emperor of America, p. 14; November 17, 1991, Bill Kent, review of The Final Addiction, p. 20; December 13, 1992, Donald E. Westlake, review of The Venerable Bead, p. 9; February 6, 1994, Joe Queenan, review of Prizzi’s Money, p. 9.

People, December 8, 1986, Anne Maier, interview with author.

Spectator, September 21, 1974, review of Winter Kills, p. 372.

Texas Monthly, August, 1994, William Cobb, “The Don of Dallas,” interview with author, p. 42.

Time, June 2, 1975, review of Money Is Love, p. 72; May 17, 1982, Michael Demarest, review of Prizzi’s Honor, p. 82; September 22, 1986, John Skow, review of Prizzi’s Family, p. 95; September 19, 1988, review of Prizzi’s Glory, p. 95.

Times Literary Supplement, June 11, 1982, Alan Bold, review of Prizzi’s Honor.

ONLINE
Internet Movie Database,http://www.imdb.com/ (December 4, 2006), information on author’s film work.

OBITUARIES
PERIODICALS
New York Times, April 10, 1996, Mel Gussow.

Time, April 22, 1996, p. 33.

U.S. News & World Report, April 22, 1996, p. 26.

https://www.encyclopedia.com/arts/educational-magazines/condon-richard-1915-1996-richard-thomas-condon

Books by Richard Condon
  • The Manchurian Candidate

    Richard Condon

    from: $3.79

  • Prizzi’s Honor

    Richard Condon

    from: $3.79

  • Prizzi’s Family

    Richard Condon

    from: $3.79

  • Prizzi’s Glory

    Richard Condon

    from: $3.99

  • Winter Kills

    Richard Condon

    from: $3.79

  • Bandicoot

    Richard Condon

    from: $4.93

  • Emperor of America

    Richard Condon

    from: $3.79

  • The Final Addiction

    Richard Condon

    from: $3.79

  • Prizzi’s Money

    Richard Condon

    from: $3.79

  • The Whisper of the Axe

    Richard Condon

    from: $3.79

https://www.thriftbooks.com/a/richard-condon/233563/?mkwid=s|dc&pcrid=314797449776&pkw=&pmt=b&plc=&pgrid=34947186125&ptaid=dsa-266516562683&gclid=EAIaIQobChMIvdmawZfG3wIV3bXACh0AgQuYEAAYAyAAEgJjh_D_BwE

 

 

Richard Condon

From Wikipedia, the free encyclopedia

Jump to navigationJump to search

Richard Condon
Born Richard Thomas Condon
March 18, 1915
New York CityNew York, U.S.
Died April 9, 1996 (aged 81)
DallasTexas, U.S.
Occupation Novelist
Genre Fiction

Richard Thomas Condon (March 18, 1915 in New York City – April 9, 1996 in Dallas, Texas) was a prolific and popular American political novelist. Though his works were satire, they were generally transformed into thrillers or semi-thrillers in other mediums, such as cinema. All 26 books were written in distinctive Condon style, which combined fast-pace, outrage, and frequent humor while focusing almost obsessively at monetary greed and political corruption. Condon himself once said: “Every book I’ve ever written has been about abuse of power. I feel very strongly about that. I’d like people to know how deeply their politicians wrong them.”[1] Condon’s books were occasionally bestsellers, and many of his books were made into films; he is primarily remembered for his 1959 The Manchurian Candidate and, many years later, a series of four novels about a family of New York gangsters named Prizzi.

Condon’s writing was known for its complex plotting, fascination with trivia, and loathing for those in power; at least two of his books featured thinly disguised versions of Richard Nixon.[citation needed] His characters tend to be driven by obsession, usually sexual or political, and family loyalty. His plots often have elements of classical tragedy, with protagonists whose pride leads them to destroy what they love. Some of his books, most notably Mile High (1969), are perhaps best described as secret history.[citation needed] And Then We Moved to Rossenarra is a humorous autobiographical recounting of various places in the world where he had lived and his family’s 1970s move to Rossenarra, Co. Kilkenny, Ireland.

Contents

Early life[edit]

Born in New York City, Condon attended DeWitt Clinton High School.[2]

After service in the United States Merchant Marine, Condon achieved moderate success as a Hollywood publicist, ad writer and Hollywood agent. Condon turned to writing in 1957. Employed by United Artists as an ad writer, he complained that he was wasting time in Hollywood and wanted to write a novel. Without Condon’s knowledge, his boss, Max E. Youngstein, deducted money from his salary, then fired him after a year, returning the amount of money he had deducted in the form of a Mexican bank account and the key to a house overlooking the ocean in Mexico. Youngstein told him to write his book.[3] His second novel, The Manchurian Candidate (1959), featured a dedication to Youngstein and was made into a successful film.

Basic theme throughout Condon’s books[edit]

In Mile High, his eighth novel, one primarily about how a single spectacularly ruthless gangster named Eddie West imposes Prohibition upon an unwary populace, Condon sums up the theme of all his books in a single angry cri de coeur:

“Prohibition fused the amateurism and catch-as-catch-can national tendencies of the early days of the republic with a more modern, highly organized lust for violence and the quick buck. It fused the need to massacre twelve hundred thousand American Indians and ten million American buffalo, the lynching bees, the draft riots, bread riots, gold riots and race riots, the constant wars, the largest rats in the biggest slums, boxing and football, the loudest music, the most strident and exploitative press with the entire wonderful promise of tomorrow and tomorrow, always dragging the great nation downward into greater violence and more unnecessary deaths, into newer and more positive celebration of nonlife, all so that the savage, simple-minded people might be educated into greater frenzies of understanding that power and money are the only desirable objects for this life.”[4]

“Manchurian Candidate”[edit]

Although not perhaps actually originated by Condon himself, his use of “the Manchurian Candidate” made that phrase a part of the English language. Frank Rich, for example, in his column in the “Sunday Opinion” of The New York Times of August 17, 2008, writes about Barack Obama with a reference to both a well-known actress and a well-known plot element in the first movie version of Condon’s 1959 book:

“[Obama’s] been done in by that ad with Britney [Spears] and Paris [Hilton] and a new international crisis that allows [John] McCain to again flex his Manchurian Candidate military cred. Let the neocons identify a new battleground for igniting World War III… and McCain gets with the program as if Angela Lansbury has just dealt him the Queen of Hearts“.[5]

“The fiction of information”[edit]

Condon’s works are difficult to categorize precisely: A 1971 Time magazine review declared that, “Condon was never a satirist: he was a riot in a satire factory. He raged at Western civilization and every last one of its works. He decorticated the Third Reich, cheese fanciers, gossip columnists and the Hollywood star system with equal and total frenzy.” [6] The headline of his obituary in The New York Times called him a “political novelist”,[7] but went on to say that, “Novelist is too limited a word to encompass the world of Mr. Condon. He was also a visionary, a darkly comic conjurer, a student of American mythology and a master of conspiracy theories, as vividly demonstrated in ‘The Manchurian Candidate.'”[7] Although his books combined many different elements, including occasional outright fantasy and science fiction, they were, above all, written to entertain the general public. He had, however, a genuine disdain, outrage, and even hatred for many of the mainstream political corruptions that he found so prevalent in American life. In a 1977 quotation, he said that:[8]

“…people are being manipulated, exploited, murdered by their servants, who have convinced these savage, simple-minded populations that they are their masters, and that it hurts the head, if one thinks. People accept servants as masters. My novels are merely entertaining persuasions to get the people to think in other categories.”

With his long lists of absurd trivia and “mania for absolute details”, Condon was, along with Ian Fleming, one of the early exemplars of those called by Pete Hamill in a New York Times review, “the practitioners of what might be called the New Novelism… Condon applies a dense web of facts to fiction…. There might really be two kinds of fiction: the fiction of sensibility and the fiction of information… As a practitioner of the fiction of information, no one else comes close to him.”[9]

Quirks and characteristics[edit]

Condon attacked his targets wholeheartedly but with a uniquely original style and wit that made almost any paragraph from one of his books instantly recognizable. Reviewing one of his works in the International Herald Tribune, playwright George Axelrod (The Seven Year ItchWill Success Spoil Rock Hunter), who had collaborated with Condon on the screenplay for the film adaptation of The Manchurian Candidate, wrote:

“The arrival of a new novel by Richard Condon is like an invitation to a party…. the sheer gusto of the prose, the madness of his similes, the lunacy of his metaphors, his infectious, almost child-like joy in composing complex sentences that go bang at the end in the manner of exploding cigars is both exhilarating and as exhausting as any good party ought to be.”

Metaphors and similes[edit]

From his 1975 novel, Money Is Love, comes a fine example of the “lunacy of his metaphors”: “Mason took in enough cannabis smoke to allow a Lipan Apache manipulating a blanket over it to transmit the complete works of Tennyson.” [10]

The Manchurian Candidate offers:

“The effects of the narcotics, techniques, and suggestions… achieved a result that approximated the impact an entire twenty-five-cent jar of F. W. Woolworth vanishing cream might have on vanishing an aircraft carrier of the Forrestal class when rubbed into the armor plate.”[11]

Lists and trivia[edit]

Condon was also enamored of long lists of detailed trivia that, while at least marginally pertinent to the subject at hand, are almost always an exercise in gleeful exaggeration and joyful spirits. In An Infinity of Mirrors, for instance, those in attendance of the funeral of a famous French actor and notable lover are delineated as:

Seven ballerinas of an amazing spectrum of ages were at graveside. Actresses of films, opera, music halls, the theatre, radio, carnivals, circuses, pantomimes, and lewd exhibitions mourned in the front line. There were also society leaders, lady scientists, women politicians, mannequins, couturières, Salvation Army lassies, all but one of his wives, a lady wrestler, a lady matador, twenty-three lady painters, four lady sculptors, a car-wash attendant, shopgirls, shoplifters, shoppers, and the shopped; a zoo assistant, two choir girls, a Métro attendant from the terminal at the Bois de Vincennes, four beauty-contest winners, a chambermaid; the mothers of children, the mothers of men, the grandmothers of children and the grandmothers of men; and the general less specialized, female public-at-large which had come from eleven European countries, women perhaps whom he had only pinched or kissed absent-mindedly while passing through his busy life. They attended twenty-eight hundred and seventy strong, plus eleven male friends of the deceased.[12]

Writing about The Whisper of the Axe in the daily book review column of Friday, May 21, 1976, in the New York Times, Richard R. Lingeman praised the book in particular and Condon in general for his “extravagance of invention unique with him.” [13]

Not everyone was as exhilarated by Condon’s antics, however. In a long Times Sunday review just two days after Lingeman’s, Roger Sale excoriated Condon as a writer of “how-to books” in general, this book in particular, and Condon’s habit of using lists: “A lot of it is done with numbers arbitrarily chosen to falsely simulate precision.” [14]

Real-life names in his books[edit]

All of Condon’s books have, to an unknown degree, the names of real people in them as characters, generally very minor or peripheral. The most common, which appears in all of his books, is some variation of Franklin M. Heller. Among them are F.M. Heller, Frank Heller, Franz Heller, and F. Marx Heller. The real-life Heller was apparently a television director in New York City in the 1950s, ’60s, and 70s, who initially lived on Long Island and then moved to a house on Rockrimmon Road in Stamford, Connecticut.[15] Beginning with Mile High in 1969, mentions of a Rockrimmon Road or Rockrimmon House also began to appear regularly in the novels. Late in life Heller grew a thick white beard and became a devotee of needlework—both traits that the fictional Hellers shared, sometimes to ludicrous effect, as when a battle-hardened Admiral Heller is depicted issuing orders while absorbed in needlework. The real-life Heller made one needlework depiction of the manor house in Ireland in which Condon was living at the time.

Condon was a great friend of actor Allan Melvin, having written a nightclub act for him. Condon later became a publicist for The Phil Silvers Show (“Sgt. Bilko”), on which Melvin played Cpl. Henshaw. Melvin’s name shows up in several Condon books, most prominently as hitman Al (the Plumber) Melvini in “Prizzi’s Honor” (a play on Melvin’s “Al the Plumber” character in Liquid-Plumr commercials.) In The Manchurian Candidate, with the exception of Marco, Shaw and Mavole, all of Marco’s platoon members are named for the cast/crew of “Bilko”: (Nat) Hiken, (Maurice) Gosfield, (Jimmy) Little, (Phil) Silvers, (Allan) Melvin, (Mickey) Freeman and (Harvey) Lembeck.

Career in films[edit]

For many years a Hollywood publicity man for Walt Disney and other studios, Condon took up writing relatively late in life and his first novel, The Oldest Confession, was not published until he was 43. The demands of his career with United Artists—promoting dreadful movies such as The Pride and the Passion and A King and Four Queens—led to a series of bleeding ulcers and a determination to do something else.

His next book, The Manchurian Candidate, combined all the elements that defined his works for the next 30 years: nefarious conspiracies, satire, black humor, outrage at political and financial corruption in the American scene, breath-taking elements from thrillers and spy fiction, horrific and grotesque violence, and an obsession with the minutiae of food, drink, and fast living. It quickly made him, for a few years at least, the center of a cult devoted to his works. As he rapidly produced more and more books with the same central themes, however, this following fell away and his critical reputation diminished. Still, over the next three decades Condon produced works that returned him to favor, both with the critics and the book-buying public, such as Mile HighWinter Kills, and the first of the Prizzi books, Prizzi’s Honor.

Of his numerous books that were turned into Hollywood movies, The Manchurian Candidate was filmed twice. The first version, in 1962, which starred Frank SinatraLaurence HarveyJanet Leigh, and Angela Lansbury, followed the book with great fidelity, and is now highly regarded as a glimpse into the mindset of its era. Janet Maslin, writing already over two decades ago, said in The New York Times In 1996 that it was “arguably the most chilling piece of cold war paranoia ever committed to film, yet by now it has developed a kind of innocence.”[7]

The Keener’s Manual[edit]

Beginning with his first book, The Oldest Confession, Condon frequently prefaced his novels with excerpts of verse from a so-called Keener’s Manual; these epigraphs foreshadowed the theme of the book or, in several instances, gave the book its title. The Keener’s Manual, however, was a fictional invention by Condon and does not actually exist. A “keen” is a “lamentation for the dead uttered in a loud wailing voice or sometimes in a wordless cry” [16] and a “keener” is a professional mourner, usually a woman in Ireland, who “utters the keen… at a wake or funeral.” [17]

Five of Condon’s first six books derived their titles from the fictional manual, the only exception being his most famous book, The Manchurian Candidate. The epigraph in The Manchurian Candidate, however, “I am you and you are me /and what have we done to each other?” is a recurring theme in earlier Condon’s books: in various forms it also appears as dialog in both The Oldest Confession and Some Angry Angel. Among other epigraphs, the last line of “The riches I bring you /Crowding and shoving, /Are the envy of princes: /A talent for loving.” is the title of Condon’s fourth novel. His fifth and sixth novels, An Infinity of Mirrors and Any God Will Do, also derive their titles from excerpts of the manual.

Plagiarism charge[edit]

In 1998 a California software engineer noticed several paragraphs in The Manchurian Candidate that appeared nearly identical to portions of the celebrated 1934 novel I, Claudius by the English writer Robert Graves. She wrote about the apparent plagiarism on her website but her discovery went unnoticed by most of the world until Adair Lara, a longtime San Francisco Chronicle staff writer, wrote a lengthy article about the accusation in 2003.[18] Reprinting the paragraphs in question, she also solicited the opinion of a British forensic linguist, who concluded that Condon had unquestionably plagiarized at least two paragraphs of Graves’s work. By this time, however, more than seven years had passed since Condon’s death and Lara’s article also failed to generate any literary interest outside the Chronicle.

In Some Angry Angel, the book that followed The Manchurian Candidate, Condon makes a direct reference to Graves. In a long, convoluted passage on page 25 Condon reflects on “mistresses” and their relationship—a peripheral one, to the reader—to Graves’s writings about “Major Male” Deities and “Major Female” Deities. As Angel was published only a year after Candidate, there is no question, therefore, about Condon’s familiarity with the works of Robert Graves.[19]

Condon’s familiarity with Graves is also in evidence on p. 127 of his first novel, The Oldest Confession. One of the characters in the book purchases a copy of Graves’ Antigua, Penny, Puce!

Works[edit]

All novels except as noted:

Films adapted from Condon novels[edit]

Articles[edit]

  • “‘Manchurian Candidate’ in Dallas”. The Nation, December 28, 1963.

References[edit]

This article incorporates material from the Citizendium article “Richard Condon“, which is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License but not under the GFDL.

  1. ^ Locus, The Magazine of the Science Fiction & Fantasy Field, from their May, 1996, issue #424, obituary of Condon, exact page unknown
  2. ^ Buckley, Tom. “THE LITERARY CONSPIRACIES OF RICHARD CONDON”The New York Times, September 2, 1979. Accessed September 14, 2009.
  3. ^ Max E. Youngstein – Biography
  4. ^ Mile High, The Dial Press, New York, 1969, Library of Congress Catalog Card Number: 77-80497, page 156
  5. ^ The New York Times, Sunday, August 17, 2008, Sunday Opinion, “The Candidate We Still Don’t Know” at [1]
  6. ^ Time magazine, “Cheese”, March 4, 1971, at
  7. Jump up to:a b c The New York Times, Wednesday, April 10, 1996, Obituaries, “Richard Condon, Political Novelist, Dies at 81; Wrote ‘Manchurian Candidate’ and ‘Prizzi'” at [2]
  8. ^ Who’s Who in Spy Fiction, Donald McCormick, Sphere Books Ltd., London, 1977, page 64
  9. ^ “For Eddie West, power was all that mattered,” by Pete Hamill, The New York Times, August 31, 1969, at
  10. ^ Time Magazine, “Liederkranz”, a book review by John Skow, June 2, 1975
  11. ^ The Manchurian Candidate, by Richard Condon, paperback edition, Signet, New York, November, 1962, fifth printing, page 261
  12. ^ An Infinity of Mirrors, by Richard Condon, paperback edition, Fawcett Crest, New York, September, 1965, page 36
  13. ^ “A Thriller of the Condon Class”, by Richard R. Lingeman, The New York Times, May 21, 1976, at [3]
  14. ^ Roger Sale, May 23, 1976, in The New York Times, at
  15. ^ Remembrance of Frank Heller,” by Ira Skutch, at
  16. ^ Merriam-Webster’s Collegiate Dictionary, Eleventh Edition, Merriam-Webster, Inc., Springfield, Massachusetts, 2004, ISBN 0-87779-807-9
  17. ^ Webster’s New International Dictionary of the English Language, Second Edition, Unabridged, G. & C. Merriam Co., Publishers, Springfield, Massachusetts, 1943
  18. ^ “Has a local software engineer unmasked ‘The Manchurian Candidate’? Menlo Park woman says author Richard Condon plagiarized”, by Adair Lara, in the San Francisco Chronicle,October 4, 2003; the entire article can be read at [4]
  19. ^ Some Angry Angel: A Mid-Century Faerie Tale, McGraw-Hill, New York, 1960, Library of Congress Catalog Card Number: 60-8826, page 25

 

v

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show — Week in Review — November 14-22, 2017 — Videos

Posted on November 25, 2017. Filed under: American History, Ammunition, Banking, Blogroll, Bomb, Books, Business, Central Intelligence Agency (CIA), Communications, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Culture, Defense Intelligence Agency (DIA), Documentary, Drones, Economics, Employment, Energy, Entertainment, Environment, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Federal Government Budget, Films, Fiscal Policy, Foreign Policy, Fraud, Freedom, Friends, government, Government Land Ownership, government spending, Health, Health Care, History of Economic Thought, Homicide, Illegal, Immigration, Inflation, Internal Revenue Service (IRS), Investments, Islam, Islam, Journalism, Language, Law, Legal, Life, Links, Love, Macroeconomics, media, Medicine, Missiles, Mobile Phones, Monetary Policy, Money, Movies, Movies, Music, Music, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Natural Gas, Newspapers, Non-Fiction, Nuclear, Nuclear Power, Obamacare, Oil, Oil, People, Philosophy, Photos, Police, Political Correctness, Politics, Press, Psychology, Quotations, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Religion, Religious, Resources, Reviews, Security, Shite, Speech, Spying, Strategy, Success, Sunni, Talk Radio, Tax Policy, Taxation, Taxes, Technology, Television, Television, Television, Terrorism, The Pronk Pops Show, Trade, Video, War, Water, Wealth, Weapons, Wisdom, Work, Writing | Tags: , , , |

 

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1005, November 22, 2017

Pronk Pops Show 1004, November 21, 2017

Pronk Pops Show 1003, November 20, 2017

Pronk Pops Show 1002, November 15, 2017

Pronk Pops Show 1001, November 14, 2017 

Pronk Pops Show 1000, November 13, 2017

Pronk Pops Show 999, November 10, 2017

Pronk Pops Show 998, November 9, 2017

Pronk Pops Show 997, November 8, 2017

Pronk Pops Show 996, November 6, 2017

Pronk Pops Show 995, November 3, 2017

Pronk Pops Show 994, November 2, 2017

Pronk Pops Show 993, November 1, 2017

Pronk Pops Show 992, October 31, 2017

Pronk Pops Show 991, October 30, 2017

Pronk Pops Show 990, October 26, 2017

Pronk Pops Show 989, October 25, 2017

Pronk Pops Show 988, October 20, 2017

Pronk Pops Show 987, October 19, 2017

Pronk Pops Show 986, October 18, 2017

Pronk Pops Show 985, October 17, 2017

Pronk Pops Show 984, October 16, 2017 

Pronk Pops Show 983, October 13, 2017

Pronk Pops Show 982, October 12, 2017

Pronk Pops Show 981, October 11, 2017

Pronk Pops Show 980, October 10, 2017

Pronk Pops Show 979, October 9, 2017

Pronk Pops Show 978, October 5, 2017

Pronk Pops Show 977, October 4, 2017

Pronk Pops Show 976, October 2, 2017

Pronk Pops Show 975, September 29, 2017

Pronk Pops Show 974, September 28, 2017

Pronk Pops Show 973, September 27, 2017

Pronk Pops Show 972, September 26, 2017

Pronk Pops Show 971, September 25, 2017

Pronk Pops Show 970, September 22, 2017

Pronk Pops Show 969, September 21, 2017

Pronk Pops Show 968, September 20, 2017

Pronk Pops Show 967, September 19, 2017

Pronk Pops Show 966, September 18, 2017

Pronk Pops Show 965, September 15, 2017

Pronk Pops Show 964, September 14, 2017

Pronk Pops Show 963, September 13, 2017

Pronk Pops Show 962, September 12, 2017

Pronk Pops Show 961, September 11, 2017

Pronk Pops Show 960, September 8, 2017

Pronk Pops Show 959, September 7, 2017

Pronk Pops Show 958, September 6, 2017

Pronk Pops Show 957, September 5, 2017

Pronk Pops Show 956, August 31, 2017

Pronk Pops Show 955, August 30, 2017

Pronk Pops Show 954, August 29, 2017

Pronk Pops Show 953, August 28, 2017

Pronk Pops Show 952, August 25, 2017

Pronk Pops Show 951, August 24, 2017

Pronk Pops Show 950, August 23, 2017

Pronk Pops Show 949, August 22, 2017

Pronk Pops Show 948, August 21, 2017

Pronk Pops Show 947, August 16, 2017

Pronk Pops Show 946, August 15, 2017

Pronk Pops Show 945, August 14, 2017

Pronk Pops Show 944, August 10, 2017

Pronk Pops Show 943, August 9, 2017

Pronk Pops Show 942, August 8, 2017

Pronk Pops Show 941, August 7, 2017

Pronk Pops Show 940, August 3, 2017

Image result for i am mad as hellImage result for illegal alien invasion of united StatesImage result for branco cartoons on roy mooreSee the source image

 

November 22, 2017 06:55 PM PST

The Pronk Pops Show 1005

November 22, 2017

Story 1: The Fed’s Great Unwind or Rolling Over Into 21st Century Greatest Depression — Videos —

Story 2: Will President Trump Be The Next President Hoover? — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/22/the-pronk-pops-show-1005-story-1-the-feds-great-unwind-or-rolling-over-into-21st-century-greatest-depression-videos-story-2-will-president-trump-be-the-next-president-hoover-videos/

November 22, 2017 05:12 PM PST

The Pronk Pops Show 1004

November 21, 2017

Story 1: The Illegal Alien Family That Is Deported Together Stays Together — Let The “Dreamers” Go Back To Their Country of Origin With Families– Enforce All Immigration Laws — Remove and Deport The 30-60 Million Illegal Aliens Who Invaded The United States in Last 20 Years — No DACA Fix Needed — Trump Will Lose Many of His Supporters If He Gives Amnesty or Citizenship To Dreamers — Video —

Story 2: Feral Hog Invasion of America — Hogs Eat Everything — Kill The Hogs — Boar Busters — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/21/the-pronk-pops-show-1004-november-21-2017-story-1-the-illegal-alien-family-that-is-deported-together-stays-together-let-the-dreamers-go-make-to-country-of-origin-with-families-enforce-all/

November 21, 2017 08:25 PM PST

The Pronk Pops Show 1003

November 20, 2017

Story 1: The Great Outing of Sexual Abusers in Big Lie Media and Congress — The CREEP List Grows Longer and Longer — Abuse of Power — Videos —

Story 2: A Two Charlie Day — Charlie Rose, Should Be Fired By CBS, and Charlie Manson, Dead At 83, Should Have Been Executed By State of California — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/20/the-pronk-pops-show-1003-november-20-2017-story-1-the-great-outing-of-sexual-abusers-in-big-lie-media-and-congress-the-creep-list-grows-longer-and-longer-abuse-of-power-videos-story-2/

November 20, 2017 02:08 PM PST

The Pronk Pops Show 1002

November 15, 2017

Story 1: More on Moore: Roy Moore’s Attorney News Briefing — She Said Vs. He Said — Faulty Memory of Witnesses Leading To Wrongful Conviction — Sexual Abuse — Who Do You Believe? — The Voters of Alabama Must Answer This Question on December 12 — Videos —

Story 2: Will The Senate Pass A Tax Reform Bill?– NO — Tax Cut Bill — Yes — Videos —

Story 3: Who is on the Congressional CREEP List of Sexual Harassers in Congress and Their Staffs ? — Who is next to be outed? — Shout Animal House — Intimacy — Getting To Know You– Dance With Me –Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/16/the-pronk-pops-show-1002-november-15-2017-story-1-more-on-moore-roy-moores-attorney-news-briefing-she-said-vs-he-said-faulty-memory-of-witnesses-leading-to-wrongful-conviction-sex/

November 17, 2017 04:39 PM PST

The Pronk Pops Show 1001

November 14, 2017

Story 1: He Is Back — Let The Screaming Begin — Videos —

Story 2: Trial Balloon of Having Sessions Return To The Senate By Write In Campaign Shot Down By Attorney General Jeff Sessions — Political Elitist Establishment Trying To Overturn Alabama Voters —  Videos —

Story 3: Attorney General Sessions Grilled By House Including Whether There Will Special Counsel For Hillary Clinton Alleged Crimes — Vidoes —

Story 4: Sexual Harassment in The Senate and House — Time To Expose the Exposers — Out Them By Naming Them — Publish The Creep List — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/15/the-pronk-pops-show-1001-november-14-20017-story-1-he-is-back-let-the-screaming-begin-videos-story-2-trial-balloon-of-having-sessions-return-to-the-senate-by-write-in-campaign-shot-down/

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1001-1005

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

Getting To Know You — Intimacy — Love — Both Sides Now — Send In The Clowns — Turn Turn Turn — Amazing Grace — Videos

Posted on November 18, 2017. Filed under: Art, Blogroll, Books, Business, Communications, Culture, Dance, Diet, Entertainment, Faith, Family, Films, Food, Health, Law, liberty, Life, Links, Love, media, Money, Movies, Movies, Music, Music, Narcissism, Newspapers, People, Philosophy, Photos, Politics, Psychology, Radio, Radio, Television, Television, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

See the source image

See the source image

See the source image

See the source imageSee the source image

See the source image

See the source image

Why we love repetition in music – Elizabeth Hellmuth Margulis

The Beatles All You Need Is Love (Official Promo)

Sternberg’s Triangular Theory of Love

The Secret to Intimacy | The Science of Love

Looks aren’t everything. Believe me, I’m a model. | Cameron Russell

Cameron Russell’s Mission to Make Beauty About Brains

The secret to desire in a long-term relationship | Esther Perel

How to love and be loved | Billy Ward | TEDxFoggyBottom

Tony Robbins Identifies 4 Types of Love | Oprah’s Life Class | Oprah Winfrey Network

How being heartbroken was the best thing to ever happen to me: Emma Gibbs at TEDxSouthBankWomen

Creating extraordinary intimacy in a shutdown world | Michael J. Russer | TEDxUniversityofNevada

TEDxJaffa — Niveen Rizkalla — Getting Intimate with Intimacy

Mork & Mindy (1978-1982)

Published on Nov 15, 2015

Mork & Mindy was the first tv show to display an incredible talent of Robin Williams. The audience instantly fell in love with the “cute and cuddly” alien Mork and his human friend Mindy. I think of this show with great fondness because it’s extremely funny, lovely and kind. It’s the kind of TV product we really need these days. It was a huge hit back in the day and i think the people in 2015 could really use a little happiness it gives. Anyway, here’s a little video, i hope you gonna like it! Song: Walk The Moon – Shut Up and Dance

The Love Story of Mork & Mindy

Mork & Mindy – Never Thought That I Could Love

Mork & Mindy – Getting To Know You

Mork and Mindy – Dance With Me

Bing Crosby – Getting To Know You

JAMES TAYLOR – GETTING TO KNOW YOU

Getting to Know You from The King and I

Yul Brynner and Deborah Kerr perform “Shall We Dance” from The King and I

Julie Andrews – Getting to Know You

Getting to Know You
It’s a very ancient saying
But a true and honest thought
That if you become a teacher
By your pupils you’ll be taught
As a teacher I’ve been learning
You’ll forgive me if I boast
And I’ve now become an expert
On the subject I like most
Getting to know you
Getting to know you
Getting to know all about you
Getting to like you
Getting to hope you like me
Getting to know you
Putting it my way
But nicely
You are precisely
My cup of tea
Getting to know you
Getting to know all about you
Getting to like you
Getting to hope you like me
Getting to know you
Putting it my way
But nicely
You are precisely
My cup of tea
Getting to know you
Getting to feel free and easy
When I am with you
Getting to know what to say
Haven’t you noticed
Suddenly I’m bright and breezy?
Because of all the beautiful and new
Things I’m learning about you
Day by day
Getting to know you
Getting to feel free and easy
When I am with you
Getting to know what to say
Haven’t you noticed
Suddenly I’m bright and breezy?
Because of all the beautiful and new
Things I’m learning about you
Day by day
Songwriters: Oscar Ii Hammerstein / Richard Rodgers
Getting to Know You lyrics © Imagem Music Inc

Both Sides Now

Both Sides Now

Bows and flows of angel hair and ice cream castles in the air
And feather canyons everywhere, I’ve looked at clouds that way
But now they only block the sun they rain and snow on everyone
So many things I would have done, but clouds got in my way
I’ve looked at clouds from both sides now
From up and down and still somehow
It’s cloud’s illusions I recall
I really don’t know clouds at all
Moons and Junes and Ferris wheels the dizzy dancing way you feel
As every fairy tale comes real, I’ve looked at love that way
But now it’s just another show, you leave ’em laughin’ when you go
And if you care don’t let them know, don’t give yourself away
I’ve looked at love from both sides now
From give and take and still somehow
It’s love’s illusions I recall
I really don’t know love at all
Tears and fears and feeling proud, to say, “I love you” right out loud
Dreams and schemes and circus crowds, I’ve looked at life that way
But now old friends are acting strange they shake their heads, they say
I’ve changed
But something’s lost but something’s gained in living every day
I’ve looked at life from both sides now
From win and lose and still somehow
It’s life’s illusions I recall
I really don’t know life at all
Songwriters: Joni Mitchell
Both Sides Now lyrics © Sony/ATV Music Publishing LLC, Crazy Crow Music / Siquomb Music Publishing

Judy Collins – “Both Sides Now” 1987

Joni Mitchell – Both Sides Now (Live, 1970)

Judy Collins Send in the Clowns

Send in the Clowns
Isn’t it rich?
Are we a pair?
Me here at last on the ground,
You in mid-air,
Where are the clowns?
Isn’t it bliss?
Don’t you approve?
One who keeps tearing around,
One who can’t move,
Where are the clowns?
There ought to be clowns?
Just when I’d stopped opening doors,
Finally knowing the one that I wanted was yours
Making my entrance again with my usual flair
Sure of my lines
No one is there
Don’t you love farce?
My fault, I fear
I thought that you’d want what I want
Sorry, my dear!
But where are the clowns
Send in the clowns
Don’t bother, they’re here
Isn’t it rich?
Isn’t it queer?
Losing my timing this late in my career
But where are the clowns?
There ought to be clowns
Well, maybe next year

JUDY COLLINS – Turn Turn Turn (1966 )

Judy Collins Lyrics

“Turn, Turn, Turn (To Everything There Is A Season)”

Words-adapted from the bible, book of ecclesiastes
Music-pete seegerTo everything (turn, turn, turn)
There is a season (turn, turn, turn)
And a time for every purpose, under heavenA time to be born, a time to die
A time to plant, a time to reap
A time to kill, a time to heal
A time to laugh, a time to weepTo everything (turn, turn, turn)
There is a season (turn, turn, turn)
And a time for every purpose, under heaven

A time to build up, a time to break down
A time to dance, a time to mourn
A time to cast away stones, a time to gather stones together

To everything (turn, turn, turn)
There is a season (turn, turn, turn)
And a time for every purpose, under heaven

A time of love, a time of hate
A time of war, a time of peace
A time you may embrace, a time to refrain from embracing

To everything (turn, turn, turn)
There is a season (turn, turn, turn)
And a time for every purpose, under heaven

A time to gain, a time to lose
A time to rend, a time to sew
A time to love, a time to hate
A time for peace, I swear its not too late

Celtic Woman – Amazing Grace

The Most Beautiful “Amazing Grace” I’ve ever heard

AMAZING GRACE

Amazing grace, How sweet the sound
That saved a wretch like me.
I once was lost, but now I am found,
Was blind, but now I see.’Twas grace that taught my heart to fear,
And grace my fears relieved.
How precious did that grace appear
The hour I first believed.Through many dangers, toils and snares
I have already come,
‘Tis grace has brought me safe thus far
And grace will lead me home.The Lord has promised good to me
His word my hope secures;
He will my shield and portion be,
As long as life endures.Yea, when this flesh and heart shall fail,
And mortal life shall cease
I shall possess within the veil,
A life of joy and peace.When we’ve been there ten thousand years
Bright shining as the sun,
We’ve no less days to sing God’s praise
Than when we’ve first begun.

The Four Faces of Intimacy

By Beverley Golden

December 16, 2011Health, Healthy Living, Living

Intimacy among animals

 

 

 

 

 

 

 

 

It started with what seemed like a simple question I asked myself. That question, not surprisingly for anyone who knows me, led to a series of additional questions. Somehow, I wasn’t getting clear answers for myself, so I started asking people I came in contact with the same questions. The results were fascinating to me and I wanted to explore the topic more fully. The basic question: “What does intimacy mean to you?

The range of responses was wide and varied. I included both men and women, different ages, some were in relationships and others were not. Most people had to stop for a moment to really think about and put into words what intimacy meant to them. As I looked more deeply at the topic, I found that there are in fact four key types of intimacy.

What Does Intimacy Mean to You?

The people I asked generally started with the most common of the four types of intimacy: Sexual. This wasn’t too much of a surprise because sexual intimacy is probably the most stereotypical and most familiar definition of the word in modern society. Having sex, however, often has less to do with intimacy than with a physical act between people. As it ended up, the people I talked to wanted more than just the act of sex — they wanted some depth. They wanted to feel safe while being vulnerable, wanting to be seen by his/her partner. That made sense, as this form of intimacy also includes a wide range of sensuous activity and sensual expression, so it’s much more than having intercourse.

It’s interesting that the word intercourse is also defined as an “exchange especially of thoughts or feelings.” It’s curious why intimacy is challenging to people in their relationships. I continued to look further.

Connecting Emotionally

The next of the four faces of intimacy is emotional intimacy.This happens when two people feel comfortable sharing their feelings with each other. The goal is to try to be aware and understand the other person’s emotional side. My guess is that women have an easier time with this in very close female friendships, but I’d like to believe that men too are becoming more comfortable experiencing emotional intimacy. This form of intimacy I’ve become comfortable with and see as a healthy part of the give-and-take in all relationships, whether female or male.

Margaret Paul, Ph.D, refers to the fears people have in relation to emotional intimacy. She says, “Many people have two major fears that may cause them to avoid intimacy: the fear of rejection (of losing the other person), and the fear of engulfment (of being invaded, controlled, and losing oneself).” This made some sense to me.

Love and Intimacy

However, if we believe that there are only two major energies we humans experience, love and fear (or an absence of love), then I find it interesting that in this area of intimacy, it seems people have moved from their hearts and love to an energy that stops them from experiencing their true essence and what they often yearn for the most. Love and intimacy.

In her book A Return to Love, the brilliant Marianne Williamson says it most eloquently:

“Love is what we were born with. Fear is what we have learned here. The spiritual journey is the relinquishment or unlearning of fear and the acceptance of love back into our hearts. Love is our ultimate reality and our purpose on earth. To be consciously aware of it, to experience love in ourselves and others, is the meaning of life.”

Even the Bible says, “There is no fear where love exists.” Of course I believe that love and intimacy are highly spiritual. In her book Love for No Reason, Marci Shimoff states, “Love for no reason is your natural state.” She also tells a wonderful story about a spiritual teacher who once said to her, “I love you and it’s no concern of yours.” To love, from your heart, just to love. As I talked about in my piece on what makes a good relationship, my ideal is definitely a loving spiritual partnership.

True Intimacy

I kept wondering if true intimacy could be as simple as a matter of moving back to loving ourselves first? To rediscovering the unconditional love we all were born with? The idea of self-intimacy and self-love is a fascinating concept. I’ll leave these as open-ended questions for you to ask yourselves for now. I was curious to look more closely at the other two types of intimacy.Intellectual Intimacy_conversation between men

 

The next, intellectual intimacy, is something I personally have the most comfort with. This one is about communication, and as someone who lives and breathes words, it’s extremely familiar to me. The ability to share ideas in an open and comfortable way can lead to a very intimate relationship indeed, as I’m fortunate to discover quite frequently. As someone who engages in this type of interaction all the time, it offers me a wonderful and fulfilling form of intimacy. I wondered if this was my strongest area of intimacy.

Experiential Intimacy

The fourth kind of intimacy is experiential intimacy, an intimacy of activity. I realized I experience this every time I get together with a group to create art in a silent process. It’s about letting the art unfold, by working together in co-operation. The essence of this intimate activity is that very little is said to each other, it’s not a verbal sharing of thoughts or feelings, but it’s more about involving yourself in the activity and feeling an intimacy from this involvement.

During a recent encounter I had at a contact improv jam, I realized was actually this form of intimacy. I interacted with a young man, letting our body energy lead the dance, with no eye contact and no words, just movement in a sensual and open, if not dramatic, dance. So, I understood that this experiential intimacy is also, somewhat surprisingly, in my intimacy vocabulary.Intimacy_experiential

 Joining and Separating

Rick Hanson, Ph.D says that having intimacy in our lives requires a natural balance of two great themes — joining and separation — that are in fact central to human life. Almost everyone wants both of them, to varying degrees. He goes on to say, “In other words: individuality and relationship, autonomy and intimacy, separation and joining support each other. They are often seen at odds with each other, but this is so not the case!” This also made perfect sense to me. Yin and yang. Light and dark. All the polarities we live in life, lead to a balance.

My understanding and curiosity were greatly expanded after exploring the four faces of intimacy. Maybe this awareness might make it easier to find your own perfect personal balance between them all. For me, it comes down to our willingness to explore intimacy in all its forms. It’s not necessary that every intimate relationship includes all the different types of intimacy. Ultimately it is each individual’s choice.

What I learned, makes me believe that with some balance in these areas, we might find a deeper connection and understanding of the relationships in our life. I also fully recognize that we all have different definitions of intimacy. Are men and women’s definitions dramatically different? It is a fascinating conversation to continue to explore.

Soul Intimacy

Then, as often happens with perfect synchronicity, I received my daily Gaping Void email by Hugh MacLeod with the subject: Has your soul been seen lately? It went on to say, “I saw your soul today and it made me want to cry with joy and thanks.” The topic was intimacy. What followed was a beautiful way to end my piece.

“Intimacy isn’t strictly about romantic relationships, or even relations with family — sometimes it happens quickly, and often times in ways we hardly notice.

I’m talking about that moment when someone allows the world to see what’s inside… what they are really about. It’s about seeing someone for who and what they are and that the glimpse was offered either voluntarily or without the person’s knowledge. This is an incredible moment where our existence suddenly makes sense and all comes together in a singular place.

For those of you who have experienced this, it’s something that never gets lost in memory or time. It’s like a little mirror we take out every now and then to remember a time when something so complex became so inconceivably simple. It’s pretty incredible.”

This is the essence of what intimacy is really all about. Dare to be vulnerable, dare to be seen.

Intimacy is Key to Being Healthy and Vital

Dr. Christiane Northrup in her newest book “Goddesses Never Age”, tells us that intimacy is an important part of life regardless of age. As she shares, “Age is just a number, and agelessness means not buying into the idea that a number determines everything from your state of health to your attractiveness to your value.” As a member of Team Northrup, a team whose mission is to support people to live their most vital and healthy lives, I invite you to a complimentary health and vitality consultation.

Before we talk to customize a plan for you, find out how healthy you are with the True Health Assessment. The three-part report, identifies your top health risk factors, maps out a recommended lifestyle plan that identifies ways you can improve your health and provides you with individualized nutrition recommendations based on your specific assessment answers.

Now let me ask you my starting question: What does intimacy mean to you?

https://www.beverleygolden.com/the-four-faces-of-intimacy/

Read Full Post | Make a Comment ( None so far )

What DVDs Should I Buy or Binge Watch Both Movies and Television Series — Videos

Posted on October 7, 2017. Filed under: American History, Art, Art, Blogroll, Book, Books, British History, Business, Comedy, Communications, Culture, Education, Entertainment, Environment, Essays, European History, Faith, Family, Fiction, Films, Freedom, Friends, Heroes, history, Investments, Middle East, Movies, Music, Non-Fiction, Plays, Strategy, Success, Television, Wealth, Weather, Welfare, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , |

Image result for list of top 100 television shows or seriesImage result for top ten televisions shows in u.s. of all timeImage result for top ten movies of all timeImage result for top ten movies of all time

Image result for top ten movies of all time

Image result for list of top 100 movies of all time

Image result for list of top 100 movies of all time

Image result for list of top 100 movies

15 Best TV Shows to Binge Watch 2017

9 Shows You Should Binge Watch

TV Shows You Should Binge – Right NOW!

Top 10 TV Shows To Binge Watch With Your BFFs

10 Netflix TV Series That Need Binge Watching

Top 10 Best TV Shows Of All Time

Best Shows to Binge Watch on Netflix Right Now

Another Top 10 TV Shows To Binge Watch

TOP 10 Must See Best TV Shows | Netflix Binge Watch Series 2017 HD

Top 10 Showtime Shows of All Time

Top 10 HBO Shows of All Time

Top 10 BBC Shows

Top 10 British Crime Shows

Top 10 American Crime Shows

Top 20 Movies Every Film Fan Must See – Collider Video

16 Action Films You Need To Watch Before You Die

Top 10 Greatest Teen Movies

Top 10 Movies that Exceeded Expectations

Top 10 Movie Sequels That Were Better Than The Original

MDb’s Top 10 Films of the 1910’s

WatchMojo March Madness: Greatest Movies of All Time Series

Top 10 Movies of the 1920s

Top 10 Movies of the 1930s

Top 10 Movies Of the 1940s

Top 10 Movies of the 1950s

Top 10 Movies of the 1960s

Top 10 Movies of the 1970s

Top 10 Movies of the 1980s

Top 10 Movies of the 1990s

Top 10 Movies Of The 2000s

Top 10 Movies of the 2010s So Far

Top 10 Superhero Movies of ALL TIME

Top 10 Movies of All Time

 

Read Full Post | Make a Comment ( None so far )

Orson Scott Card — Xenocide — Videos

Posted on April 29, 2017. Filed under: American History, Art, Blogroll, Books, College, Crisis, Cult, Culture, Education, Entertainment, Fiction, Films, Food, Freedom, Friends, Genocide, government spending, history, Law, liberty, Life, Links, Literacy, Literature, Mastery, media, Movies, Movies, People, Philosophy, Photos, Police, Rants, Raves, Regulations, Religion, Religious, Speech, Strategy, Success, Terrorism, Video, War, Wisdom, Work, Writing | Tags: , , , , , , |

Image result for xenocide orson scott card

Image result for enders game Book Covers

Image result for xenocide orson scott card

Xenocide cover.jpg

Ender’s Game Trailer

Ender’s Game – Colonel Graff Recruits Ender

Ender’s Game Dragon Army Vs Salamander & Leopard

Ender’s Game — Molecular Detachment Device and Ending

Ender’s Game Final / Last Battle Scene!

Ender’s Game | The way we win matters.

Ender’s Game (2013) – Final Few Scenes

Ender’s Game: Creating a Zero-G Battle Room Effects Exclusive-Design FX-WIRED

Orson Scott Card discusses the ‘Ender’s Game’ movie

Interview with Orson Scott Card

Orson Scott Card Interview HD

Published on Apr 19, 2015

World renowned, Orson Scott Card, author of the New York Times Bestseller and Hugo Award winner Ender’s Game and many more, joined Kimberly Quigley in her big red booth for a chat. Not only is he funny and kind but also very humble. His mind has created entire worlds for millions to enjoy. They sit and talk about how he got into writing, about his many novels, about the Ender phenomena, the movie and his future movie plans. Hear Orson’s wonderful advice for aspiring writers. He talks about this and more in this fun half hour interview. Get to know the amazing Orson Scott Card, on The Red Booth!

What is Orson Scott Card’s favorite book? (extended answer)

A Brief Interview with Orson Scott Card (extended answers)

Orson Scott Card on Libraries

Orson Scott Card on literature, logic and scientific method

Orson Scott Card – On the State of Israel

Creative education–how to keep the spark alive in children and adults | Orson Scott Card | TEDxUSU

Published on Dec 6, 2014

This talk was given at a local TEDx event, produced independently of the TED Conferences. Orson Scott Card discusses the importance of creativity and how it can be fostered.

Orson Scott Card is the author of the novels Ender’s Game, Ender’s Shadow, and Speaker for the Dead, which are widely read by adults and younger readers, and are increasingly used in schools. His most recent series, the young adult Pathfinder series (Pathfinder, Ruins, Visitors) and the fantasy Mithermages series (Lost Gate, Gate Thief), are taking readers in new directions. Besides these and other science fiction novels, Orson writes contemporary fantasy (Magic Street, Enchantment, Lost Boys), biblical novels (Stone Tables, Rachel and Leah), the American frontier fantasy series The Tales of Alvin Maker (beginning with Seventh Son), poetry (An Open Book), and many plays and scripts, including his “freshened” Shakespeare scripts for Romeo & Juliet, The Taming of the Shrew and The Merchant of Venice. Orson was born in Washington and grew up in California, Arizona, and Utah. He served a mission for the LDS Church in Brazil in the early 1970s. Besides his writing, he teaches occasional classes and workshops and directs plays. He frequently teaches writing and literature courses at Southern Virginia University. Orson currently lives in Greensboro, North Carolina, with his wife, Kristine Allen Card, where his primary activities are writing a review column for the local Rhino Times and feeding birds, squirrels, chipmunks, possums and raccoons on the patio.

Orson Scott Card On Science Fiction and Religion

‘Enders Game’ Writer’s Ridiculous Racist Rant Against Obama

Ender’s Game – Book vs Movie Part 1/2

Ender’s Game – Book vs Movie Part 2/2

5 REASONS WHY I LIKED THE ENDER’S GAME SERIES

Ender’s Game Cast chat Orson Scott Card controversy

EDA #4 – Orson Scott Card is a Dick

Ender’s Game Xenocide Book 3 Audiobook Part 1

Top 10 Best Books In the Ender Series

Ender’s Game by Orson Scott Card (Book Summary and Review) – Minute Book Report

Xenocide

From Wikipedia, the free encyclopedia
Xenocide
Xenocide cover.jpg

Cover of first edition (hardcover)
Author Orson Scott Card
Country United States
Language English
Series Ender’s Game series
Genre Science fiction
Published 1991 (Tor Books)
Media type Print (Hardcover, Paperback & ebook)
Pages 592 pp
ISBN 0-312-85056-5
OCLC 22909973
813/.54 20
LC Class PS3553.A655 X46 1991
Preceded by Speaker for the Dead
Followed by Children of the Mind

Xenocide (1991) is the third science fiction novel in the Ender’s Game series of books by Orson Scott Card. It was nominated for both the Hugo and Locus Awards for Best Novel in 1992.[1] The title is a combination of ‘xeno-‘, meaning alien, and ‘-cide’, referring to the act of killing; altogether referring to the act of selectively killing populations of aliens, a play on genocide.

Plot summary

On Lusitania, Ender finds a world where humans and pequeninos and the Hive Queen could all live together; where three very different intelligent species could find common ground at last. Or so he thought.

Lusitania also harbors the descolada, a virus that kills all humans it infects, but which the pequininos require in order to become adults. The Starways Congress so fears the effects of the descolada, should it escape from Lusitania, that they have ordered the destruction of the entire planet, and all who live there. With The Fleet on its way, a second xenocide seems inevitable.[2]

Lusitania

Following the events of Speaker for the Dead, a group of characters are depicted living as members of a Brazilian Catholic human colony on Lusitania, a unique planet inhabited by the only other two known species of sentient alien life: the Pequeninos “little ones” and the Hive Queen. The pequeninos are native to the planet, while the Hive Queen was transplanted to this world by Ender, partly in penance for his near-total destruction of her Formic species in Ender’s Game.

The Lusitanian ecosystem is pervaded by a complex virus, dubbed ‘Descolada’ (Portuguese for “no longer glued”) by humans. The Descolada breaks apart and rearranges the basic genetic structure of living cells. It is extremely adaptable to any species or form of known life, and easily transmissible. The native pequeninos and other life that survived on Lusitania after the Descolada’s introduction to the planet thousands (or millions) of years ago are adapted to it. As a result of the deadly virus, the Lusitanian ecosystem is severely limited. Staying alive on Lusitania takes immense effort and research on the part of the Hive Queen and the humans, as they are not adapted to the descolada. Near the end of the story, it is revealed the Descolada is possibly an artificially engineered virus designed to terraform planets, but the original creators of the virus are unknown, and there remains a slim chance it evolved naturally.

After the rebellion of the small human colony on Lusitania in Speaker for the Dead to protect the future of the intelligent alien species, Starways Congress sends a fleet to Lusitania to regain control, which will take several decades to reach its destination. Valentine Wiggin, under her pseudonym Demosthenes, publishes a series of articles revealing the presence of the “Little Doctor” planet-annihilating weapon on the Fleet. Demosthenes calls it the “Second Xenocide,” as using the weapon will result in the obliteration of the only known intelligent alien life. She also claims it to be a brutal crackdown of any colony world striving for autonomy from Starways Congress. Public anger spreads through humanity, and rebellions nearly ensue on several colonies.

After quelling much public discontent, Starways Congress finishes their analysis of the situation while the fleet is en route. Fearing the Descolada virus, further rebellions by colony worlds, and other possible unknown political motives, Starways Congress attempts to relay an order to the fleet to annihilate Lusitania upon arrival. After conferring with friends on whether a cause is worth dying for, Jane (a compassionate AI living in the interstellar ansible communication network) shuts off transmissions to the fleet to block the order. As a consequence of this action, she risks her eventual discovery and death, should the government shut down and wipe the interplanetary network. No known smaller computer system can house her consciousness.

On Lusitania itself, Ender attempts to find solutions to the looming catastrophes of the Congressional fleet, Descolada virus, and conflicts among the humans and intelligent alien species. Much on Lusitania centers around the Ribeira family, including Ender’s wife Novinha and her children. Novinha and Elanora, the mother-daughter team responsible for most of the biological advances countering the complex Descolada virus, are unsure if they can manufacture a harmless replacement virus. Conflicts arise on whether they should even do so, since the Descolada is intrinsically tied in with the life cycles of all Lusitanian organisms and may even be sentient itself. In addition, to try to devise methods to escape the planet, Lusitania’s leading, troublemaking physicist Grego is persuaded by Ender to research faster-than-light travel, despite Grego scoffing at the idea. The third biologista of the family, Quara, is convinced that the Descolada is an intelligent, self-aware species, and deserves attempts from the humans for communication and preservation. An additional sibling and Catholic priest, Quim (Father Estevão), is determined to use faith and theology to head off another form of xenocide: a group of warmongering Pequenino wish to wipe out all Earthborn life via starship, carrying the deadly Descolada within them.

World of Path

Starways Congress wants its fleet back. After all else fails, it sends the dilemma of the fleet’s impossible disappearance to several citizens of the world of Path, a cultural planetary enclave modeled on early China. Path’s culture centers on the godspoken – those who hear the voices of the gods in the form of irresistible compulsions, and are capable of significantly superior intelligence. It later becomes clear that the godspoken of Path are victims of a cruel government project: granted great intelligence by genetic modification, they were also shackled with a form of obsessive-compulsive disorder to control their loyalty. The experiment is set in a culture bound by five dictates – obey the gods, honor the ancestors, love the people, serve the rulers, then serve your self. This is a further safeguard against rebellion. The superintelligent godspoken are considered the most devout and holy of all citizens, and any disloyal thoughts in a godspoken’s mind are immediately suppressed by overwhelming obsessive-compulsive behavior, believed to be a sign from the gods the thoughts are wrong. The most respected godspoken on Path is Han Fei-Tzu, for devising a treaty to prevent the rebellion of several colony worlds after the articles published by Demosthenes. Great things are expected of his daughter and potential successor Han Qing-jao, “Gloriously Bright”. While doubting the existence of the gods himself, Han Fei-Tzu promised his dying wife he would raise Qing-jao with an unwavering belief in the godspoken. The two of them are tasked by Starways Congress with deciphering the disappearance of the Lusitania Fleet. Han Qing-jao’s secret maid, Si Wang-mu, aids her in this task, her intelligence (partially) unfettered by the rigid caste system.

The young and naive Qing-jao eventually traces the identity of Demosthenes. Discovering that Demosthenes is Valentine Wiggin, Ender’s sister – but that Valentine has been on a starship en route to Lusitania for the last thirty years – Qing-Jao concludes that the only possible explanation is advanced computer software closely tied to the communication network. This software must be hiding Demosthenes and publishing her work, while also causing the disappearance of the Fleet. All but discovered, Jane reveals herself to Han Fei-tzu, Han Qing-jao and Si Wang-mu, telling them about their genetic slavery and begging forbearance on their report to Starways Congress.

Already harboring suspicions about the godspoken’s condition, Han Fei-tzu accepts the news of Congress’s atrocity, as does Si Wang-mu, but his daughter Han Qing-jao clings to her belief that Demosthenes and Jane are enemies of the gods. Feeling betrayed by her father, who is violently incapacitated by OCD from the disloyal thoughts, Qing-jao argues with Jane. Jane threatens shutting off all communications from Path, but Si Wang-mu realizes this would eventually lead to the planet’s destruction by Starways Congress. Understanding Jane to be truly alive and compassionate, through tears Si Wang-mu states Jane will not block the report. However, Qing-jao compares Jane to the servants in Path’s caste system, merely a computer program designed to serve humans, containing neither autonomy nor awareness.

Knowing she has exhausted her last possibilities of stopping Qing-jao, Jane sacrifices her future and life, unwilling to bring harm to Qing-jao or the people of Path. A triumphant Qing-jao reports the knowledge of Demosthenes, Jane, and the fate of the Fleet to Starways Congress. Qing-jao recommends a coordinated date set several months from the present, to prepare the massive undertaking of setting up clean computers across the interplanetary network, after which the transition to a new system will kill Jane and allow Congress full control again. Allowing the message to be sent, Jane restores communication with the Fleet, and Congress re-issues the order for the Fleet to obliterate Lusitania.

Han Fei-tzu recovers from the incapacitation of his OCD, despairing over his daughter’s actions, and his unwitting aid in deeply brainwashing her to serve Congress. He and Si Wang-mu assist Jane and those on Lusitania in finding solutions to their impending catastrophes. Planter, a Pequenino on Lusitania, offers his life for an experiment to determine whether the Descolada gives Pequeninos sentience, or if they have the ability innately. Eventually, Elanora Ribeira is able to come up with a possible model for a “recolada:” a refit of the Descolada that allows the native life to survive and retain self-awareness, but doesn’t seek to kill all other life forms. With the available equipment, however, the recolada is impossible to make, and they are running out of time against the soon-to-arrive Fleet.

Outside

While this research takes place, tragedies occur on Lusitania. Father Estevão Ribeira, the priest attempting to sway a distant warmongering sect of the Pequeninos from their goal of attacking humanity, is killed by the Fathertree Warmaker, who took Quim hostage and denied him the food with the anti-descolada chemicals, so the descolada infected and killed him on the 7th day of being hostage. Grego Ribeira spurs a riot of humans to burn down the warmaker’s forest, but the violent mob gets out of his control, and rampages through the neighboring Pequenino forest instead, massacring many of its inhabitants – the original friends and allies of humanity. Under the terms of the treaty with Pequeninos, the Hive Queen is brought in to hold the peace, setting a perimeter guard of hive drones around the human colony and preventing further escalation of violence between the two groups. Grego is locked in jail, despite eventually stepping between the surviving Pequeninos and his own riot. The town realizes their horrific rage, and constructs a chapel surrounding the fallen priest’s grave, trying to find penance for their actions.

Finally, a breakthrough is made. Knowing the Ansible communication network allows instantaneous transfer of information, and through knowledge of how the Hive Queen gives sentience to child queens, Jane, Grego, and Olhado discover the “Outside”. The Outside is a spacetime plane where aiúas initially exist. (Aiúa is the term given to the pattern defining any specific structure of the universe, whether a particular atom, a star, or a sentient consciousness.) Formic hive queens are called from Outside after birth, giving awareness to the new body. Jane is able to contain within her vast computing power the pattern defining the billions of atoms and overall structure comprising a simple “starship” (little more than a room), with passengers included, and take them Outside. By bringing them Outside, where relative location is nonexistent, then back “Inside” at a different spot in the physical universe, instantaneous travel has been achieved, finally matching the instantaneous communication of the Ansibles and Formics. They quickly arrange to take Ender, Ela, and Miro to Outside. While Ela is Outside, she is able to create the recolada virus, which is a safe replacement of the descolada, and a cure to the godspoken genetic defect. Miro envisions his body as it was before he was crippled by paralysis, and upon arrival in the Outside, his consciousness is contained within a new, restored body. Ender discovers, however, the surreal unwitting creation of a new “Valentine” and new “Peter Wiggin” from his subconscious, who embody idealized forms of his altruistic and power-hungry sides.

The recolada begins its spread across Lusitania, converting the formerly lethal virus into a harmless aid to native life. The cure to the people of Path’s genetic-controlling defect is distributed, yet Han Fei-tzu is tragically unable to convince his daughter Qing-jao this was the true course of action. Confronted with the possibility of being lied to all her life and dooming many sentient species to destruction, or an alternative of believing all she ever loved and trusted has betrayed her – Demosthenes, her father, her friend, her world. Qing-jao instead continues her godspoken rite of woodgrain tracing until her death and is honored by those on Path who still believe in the gods as the last true godspoken. She is elevated to god status after her death. Si Wang-mu sets off with Peter to take control over Starways Congress to stop the Fleet closing in on Lusitania. The new Valentine-persona journeys to find a planet to which the population of Lusitania can evacuate. The stage is set for the final book of the four-part series, Children of the Mind.

Connection to “Gloriously Bright”

Parts of “Gloriously Bright” from the January 1991 issue of Analog Science Fiction and Fact are republished in Xenocide as parts of Chapters 1, 3, 5, 7, 9, and 11.[3]

See also

References

External links

https://en.wikipedia.org/wiki/Xenocide

Orson Scott Card

From Wikipedia, the free encyclopedia
Orson Scott Card
Orson Scott Card at BYU Symposium 20080216 closeup.jpg

Born August 24, 1951 (age 65)
Richland, Washington
Residence Greensboro, North Carolina
Nationality American
Alma mater Brigham Young University
University of Utah (M.A.)
University of Notre Dame (1980s graduate student)
Occupation Author, critic, playwright / script writer, poet, public speaker, essayist, political activist, Prof. of Writing and Literature[1]
Notable work Ender’s Game series,
The Tales of Alvin Maker
Style Science fiction, fantasy, thriller, horror, historical fiction and fantasy and biblical fiction, LDS fiction
Board member of Public television station UNC-TV(2013–present)[2]
National Organization for Marriage (2009–2013)[3]
Spouse(s) Kristine Allen Card
Awards Selected list:
Hugo Award (Ender’s Game, 1986
Speaker for the Dead, 1987
How to Write Science Fiction and Fantasy, 1991)

Nebula Award (Ender’s Game,1986
Speaker for the Dead, 1987
“Eye for Eye,” 1988)
Website www.hatrack.com
 
Signature
Signature Orson Scott Card.svg

Orson Scott Card (born August 24, 1951) is an American novelist, critic, public speaker, essayist, and columnist. He writes in several genres but is known best for science fiction. His novel Ender’s Game (1985) and its sequel Speaker for the Dead (1986) both won Hugo[5][6] and Nebula Awards,[5][7]making Card the only author to win both science fiction’s top U.S. prizes in consecutive years.[8][9] A feature film adaptation of Ender’s Game, which Card co-produced, was released in late October 2013 in Europe and on November 1, 2013, in North America.[10]

Card is a professor of English at Southern Virginia University,[11] has written two books on creative writing, hosts writing bootcamps and workshops, and serves as a judge in the Writers of the Future contest.[12] A great-great-grandson of Brigham Young, Card is a practicing member of The Church of Jesus Christ of Latter-day Saints (LDS Church). In addition to producing a large body of fiction works, he has also offered political, religious, and social commentary in his columns and other writing.

Early life

Card is the son of Willard Richards Card and Peggy Jane (née Park), the third of six children and the older brother of composer and arranger Arlen Card.[13][14][15] Card was born in Richland, Washington, and grew up in Santa Clara, California as well as Mesa, Arizona and Orem, Utah. He served as a missionary for the LDS Church in Brazil and graduated from Brigham Young University (BYU) and the University of Utah; he also spent a year in a Ph.D. program at the University of Notre Dame.

For part of the 1970s Card worked as an associate editor of the Ensign, an official magazine of the LDS Church.[16]

Card lives in Greensboro, North Carolina,[13] a place that has played a significant role in Ender’s Game and many of his other works.

Fiction

Card began his writing career primarily as a poet, studying with Clinton F. Larson at BYU. During his studies as a theater major, he began “doctoring” scripts, adapting fiction for readers theater production, and finally writing his own one-act and full-length plays, several of which were produced by faculty directors at BYU. He also explored fiction writing, beginning with stories that eventually evolved into The Worthing Saga.

After returning to Provo, Utah from his LDS mission in Brazil, Card started the Utah Valley Repertory Theatre Company, which for two summers produced plays at “the Castle”, a Depression-era outdoor amphitheater behind the state psychiatric hospital in Provo; his company’s were the first plays ever produced at the Castle. Meanwhile, he took part-time employment as a proofreader at BYU Press, then made the jump to full-time employment as a copy editor. In 1976, in the midst of a paid role performing in the church’s musical celebrating America’s Bicentennial, he secured employment as an assistant editor at the Ensign, and moved to Salt Lake City. It was while working at Ensign that Card published his first piece of fiction. His short story “Gert Fram” appeared in the July 1977 fine arts issue of that magazine under the pseudonym Byron Walley.

Science fiction

He wrote the short story “Ender’s Game” while working at the BYU press, and submitted it to several publications. The idea for the later novel of the same title came from the short story about a school where boys can fight in space. It was eventually purchased by Ben Bova at Analog Science Fiction and Fact and published in the August 1977 issue. Meanwhile, he started writing half-hour audioplays on LDS Church history, the New Testament, and other subjects for Living Scriptures in Ogden, Utah; on the basis of that continuing contract, some freelance editing work, and a novel contract for Hot Sleep and A Planet Called Treason, he left Ensign and began supporting his family as a freelancer.

He completed his master’s degree in English at the University of Utah in 1981 and began a doctoral program at the University of Notre Dame, but the recession of the early 1980s caused the flow of new book contracts to temporarily dry up. He returned to full-time employment as the book editor for Compute! magazine in Greensboro, North Carolina, in 1983. In October of that year, a new contract for the Alvin Maker “trilogy” (now up to six books) allowed him to return to freelancing.

Ender’s Game and its sequel Speaker for the Dead were both awarded the Hugo Award and the Nebula Award, making Card the only author (as of 2015) to win both of science fiction’s top prizes in consecutive years. Card continued the series with Xenocide, Children of the Mind, Ender’s Shadow, Shadow of the Hegemon, Shadow Puppets, “First Meetings in the Enderverse“, Shadow of the Giant, Shadows in Flight, the 2007 release of A War of Gifts, and the 2008 release of Ender in Exile, a book that takes place after Ender’s Game and before Speaker for the Dead. Card has also announced his plan to write Shadows Alive, a book that connects the “Shadow” series and “Speaker” series together. He later also wrote the first formic war saga: Earth Unaware, Earth Afire, and Earth Awakens as a prequel to the Ender novels. This trilogy relays, among other things, the history of Mazer Rackham. In 2008 Card announced that Ender’s Game would be made into a movie, but that he did not have a director lined up (Wolfgang Petersen had previously been scheduled to direct the movie but subsequently moved on to other projects.) It was to be produced by Chartoff Productions, and Card was writing the screenplay himself.[17] The film was made several years later, and released in 2013, with Asa Butterfield in the title role and Gavin Hood directing.

Other works include the alternative histories The Tales of Alvin Maker, Pastwatch: The Redemption of Christopher Columbus, The Homecoming Saga, and Hidden Empire, a story about a near-future civil war in the United States, based on the Xbox Live Arcade video game Shadow Complex. He collaborated with Star Wars artist Doug Chiang on Robota and with Kathryn H. Kidd on Lovelock.

Other genres

He has since branched out into other areas of fiction with novels such as Lost Boys, Treasure Box and Enchantment. Other works include the novelization of the James Cameron film The Abyss, and the comic book Ultimate Iron Man for Marvel Comics’ Ultimate Marvel Universe series. Outside the world of published fiction, Card contributed dialog to at least three video games: Loom, The Secret of Monkey Island and The Dig in the early 1990s.[18]

In 1983 Card published the novel Saints, a historical fiction based loosely on one of his ancestors and her experiences coming into the LDS Church during the early portion of its movement. It continues through her eyes into subsequent events up until the granting of Statehood to Utah.

In 2000, Card published the first novel in The Women of Genesis series. This series explores the lives of the principal women mentioned in the first book of the Bible and includes Sarah (2000), Rebekah (2002), and Rachel and Leah (2004).

In the fall of 2005, Card launched Orson Scott Card’s InterGalactic Medicine Show.[19] He edited the first two issues, but found that the demands of teaching, writing, and directing plays for his local church theater group made it impossible to respond to writers’ submissions in a timely manner; former Card student and experienced freelance writer and editor Edmund R. Schubert took over as editor on June 1, 2006.

The dialog and screenplay (but not the story) for the Xbox video game Advent Rising was written by Card and Cameron Dayton.[20]

In 2008, Card’s novella Hamlet’s Father, a retelling of Shakespeare‘s Hamlet, was published in the anthology The Ghost Quartet (Tor Books). The work re-interpreted all of the characters’ personalities and motivations.

Pseudonyms

Over the years Orson Scott Card has used at least seven pseudonyms.

The names Frederick Bliss and P.Q. Gump were used by Card when he was asked to write an overview of Mormon playwrights “Mormon Shakespeares: A Study of Contemporary Mormon Theatre” for Spring 1976 issue of Sunstone magazine. According to Card he used these pseudonyms because the article included a brief reference to himself and his play “Stone Tables”.[21]

The name Byron Walley was used by Card on his first published piece of fiction “Gert Fram” which appeared in the July 1977 fine arts issue of Ensign magazine. According to Card he used this name because he had a non-fiction article, “Family Art”, a poem, “Looking West”, and a short play, “The Rag Mission”, appearing in the same issue.[21] Card also used the name Byron Walley in stories he published in Friend magazine, New Era magazine and in the anthology Dragons of Darkness. Stories by Byron Walley include: “Gert Fram“, Ensign magazine, July 1977; “Bicicleta“, Friend magazine, October 1977; “The Best Family Home Evening Ever“, Friend magazine, January 1978; “Billy’s Box“, Friend magazine, February 1978; “I Think Mom and Dad Are Going Crazy, Jerry“, New Era magazine, May 1979; and “Middle Woman“, Dragons of Darkness, Ace Books, 1982.

The name Brian Green was also used by Card in the July 1977 fine arts issue of Ensign magazine. He used this name for his short play “The Rag Mission” because he had three other pieces appearing in the same issue.[21]

The name Dinah Kirkham was used to write the short story “The Best Day“, in 1983.[22]

The name Noam D. Pellume was used by Card for his short story “Damn Fine Novel” which appeared in the October 1989 issue of The Green Pages.[23]

Card wrote the novel Zanna’s Gift (2004) under the pen name Scott Richards, saying, “I was trying to establish a separate identity in the marketplace, but for various reasons the marketing strategy didn’t work as we’d hoped.”[24]

On writing

Teaching

In 2005, Card accepted a permanent appointment as “distinguished professor” at Southern Virginia University in Buena Vista, Virginia, a small liberal arts college run according to the principles of The Church of Jesus Christ of Latter-day Saints. Card has cited his frustration with the dismal teaching methodology for creative writing in most universities as a reason for accepting this position, along with his desire to teach the techniques of effective fiction writing to writers whose values are more congruent with his own.[11] Card has worked closely with colleagues to develop ways to educate aspiring writers and has published two books on the subject. He was eager for the opportunity to apply these techniques in a university environment—his assorted workshops did not allow the follow-through he desired. After being deeply moved by stories of his students’ parents in some of their essays, he decided to stop teaching regularly at the university to spend time with his youngest child who still lives at home.[25][non-primary source needed] Card returned to teaching for the spring semester of 2009.

Books on writing

Card has written two books on the subject of creative writing – Characters and Viewpoint, published in 1988, and How to Write Science Fiction and Fantasy, published in 1990. He was also a co-writer for How to Write a Million (though his contribution is actually a reprint of an earlier work).

Card also offered advice about writing in an interview in Leading Edge #23 in 1991.

Writers of the Future

Card serves as a judge in Writers of the Future,[12] a science fiction and fantasy story contest for amateur writers. It originated in the early 1980s by L. Ron Hubbard, a science fiction writer and the founder of the Church of Scientology, and continues to be funded and organized by Author Services Inc., an entity that manages Hubbard’s literary work.

Children’s books

Card won the ALA Margaret Edwards Award in 2008 for his contribution in writing for teens, selected by a panel of YA librarians.[26] “What have I done that made some wonderfully deluded people think that I should get the [award] for lifetime achievement in writing young adult fiction?” he asked in his address, and asserted that “There is no such thing as children’s literature.” Furthermore:[27]

I have not worked with YA editors; my work has never been marketed that way until Tor put a YA cover and a new ISBN on Ender’s Game — fifteen years after the book first came out, and long after it had become popular with young readers. Ender’s Game was written with no concessions to young readers. My protagonists were children, but the book was definitely not aimed at kids. I was perfectly aware that the rule of thumb for children’s literature is that the protagonist must be a couple of years older than the target audience. You want ten-year-old readers, you have a twelve-year-old hero.

At the beginning of the book, Ender is six. Who, exactly, is the target audience?

Poetry

Card created a website, Strong Verse that publishes poetry from authors living and dead with the aim of showcasing works that present a clear message in clear language. The following motto appears on the website’s header: “Good poetry is meant to be understood, not decoded.”[28]

Opinion

Since 2001, Card’s commentary[29] includes the political columns “War Watch”, “World Watch”, or “Civilization Watch” (depending on Card’s topic) and the column “Uncle Orson Reviews Everything,” all published at the Greensboro Rhinoceros Times. The last-named column features personal reviews of movies, books, and restaurants in the greater Greensboro area, in addition to a variety of other topics.[30] The column also later appears on his website, Hatrack River. Since 2008 Card has written a column for the Mormon Times.

Politics

Card’s vocal opposition to same-sex marriage and other views on homosexuality led to a boycott of the film version of Ender’s Game[31] – a development which itself received criticism.[32] Owing to political developments, by the early 2010s Card believed the question of U.S. legalization of same-sex marriage moot.[33]

Describing himself as a political liberal[34] and moral conservative,[35] Card’s ideals concerning society—as well as foundational themes within his fiction—are described as communitarian.[34][36][37] In 2000, Card said, “Most of the program of both the left and the right is so unbelievably stupid it’s hard to wish to identify myself with either. But on economic matters, I’m a committed communitarian. I regard the Soviet Union as simply state monopoly capitalism. It was run the way the United States would be if Microsoft owned everything. Real communism has never been tried! I would like to see government controls expanded, laws that allow capitalism to not reward the most rapacious, exploitative behavior. I believe government has a strong role to protect us from capitalism.”[38]

A vocal supporter of the U.S.’s War on Terror,[39][40] according to Salon, Card is close to neoconservative concerning foreign policy issues.[41]

Views on U.S. presidential politics

A member of the U.S. Democratic Party since 1976,[42] Card supported Republican presidential candidates John McCain in 2008[43] and Newt Gingrich.[44]

In an August 2013 essay, he presented as an experiment in fictional writing of “The game of Unlikely Events”,[45] Card described an alternative future in which President Barack Obama ruled as a “Hitler– or Stalin-style dictator” with his own national police force of young unemployed men; Obama and his wife Michelle would have amended the U.S. Constitution to allow presidents to remain in power for life, as in Nigeria, Zimbabwe, and Hitler’s Germany.[46][47] Card’s essay drew criticism, especially for alleged insensitivity in its reference to urban gangs.[48][49][50]

Views about homosexuality

Card has publicly declared his opposition to homosexuality and same-sex marriage.[41][51] In a 1990 essay he wrote that the laws prohibiting homosexual behavior should remain on the books and be enforced in order to “send a message” that those who break those laws “cannot be permitted to remain as acceptable, equal citizens”.[41][52] In May 2013, however, Card wrote that since the US Supreme Court had ruled those laws unconstitutional in 2003, he has “no interest in criminalizing homosexual acts”.[53]

In a 2008 opinion piece in the Mormon church’s newspaper he wrote that “no matter how close the bonds of affection and friendship might be” for a same-sex couple, their relationship will never be “the same as the coupling between a man and a woman”. He additionally stated that any government attempting to change the definition of marriage is his “mortal enemy” and that he would “act to destroy that government and bring it down”.[54] In 2009 he joined the board of directors of the National Organization for Marriage, a group that campaigns against same-sex marriage,[41] but later resigned from the board in mid-2013.[31] Card has stated that there is “no need to legalize gay marriage”.[55]

Card has also expressed his opinion that paraphilia and homosexuality are linked. In 2004, he claimed that it’s a “myth that homosexuals are ‘born that way‘” and the “dark secret” of homosexuality was that it often resulted from “disturbing seduction”, “rape”, or child abuse.[31][41][55] Additionally, in Card’s 2008 novella Hamlet’s Father, which re-imagines the backstory of Shakespeare’s play Hamlet, Card was accused of directly trying to link the king’s pedophilia with homosexuality. The novella prompted public outcry and its publishers were inundated with complaints.[56][57] Trade journal Publishers Weekly criticized Card’s work, stating that the main purpose of it was to attempt to link homosexuality to pedophilia.[58] Card responded to the claim: “…[T]here is no link whatsoever between homosexuality and pedophilia in this book. Hamlet’s father, in the book, is a pedophile, period. I don’t show him being even slightly attracted to adults of either sex. It is the reviewer, not me, who has asserted this link, which I would not and did not make.”[57]

In 2013, Card was selected as a guest author for DC Comics‘s new Adventures of Superman comic book series,[59] but controversy over Card’s views on homosexuality led illustrator Chris Sprouse to leave the project[60] and DC Comics to put Card’s story on hold indefinitely.[61] A few months later an LGBT group, Geeks OUT!, proposed a boycott of the movie adaptation of Ender’s Game calling Card’s view anti-gay,[62][63] causing the movie studio Lionsgate to publicly distance itself from Card’s opinions.[64]

In July 2013, one week after the U.S. Supreme Court issued rulings in two cases that were widely interpreted as favoring recognition of same-sex marriages, Card wrote in Entertainment Weekly that the gay marriage issue is moot due to the Supreme Court’s decision on DOMA.[33] He further stated, “now it will be interesting to see whether the victorious proponents of gay marriage will show tolerance toward those who disagreed with them when the issue was still in dispute.”[33]

Religion

Card’s membership in The Church of Jesus Christ of Latter-day Saints has been an important facet of his life from early on. He is a great-great-grandson of Brigham Young, the second Latter-day Saint prophet, and all of Card’s ancestors for at least three generations have been members of the LDS Church. His ancestors include several other figures notable in the LDS Church, including the Cardston colony founder Charles Ora Card. As such, his faith has been a source of inspiration and influence for both his writing and his personal views.[14] Since 2008 Card has written a column of Latter-day Saint devotional and cultural commentary for the Sunday national edition of the Deseret News (formerly “the Mormon Times“).[65]

Personal life

Card (right) signing autographs at New York Comic Con in 2008

Card and his wife, Kristine, have had five children, each named after one or more authors he and his wife admire. Their children’s names are Michael Geoffrey (Geoffrey Chaucer), Emily Janice (Emily Brontë and Emily Dickinson), Charles Benjamin (Charles Dickens), Zina Margaret (Margaret Mitchell) and Erin Louisa (Louisa May Alcott). Charles, who had cerebral palsy, died shortly after his 17th birthday and their daughter Erin died the day she was born.[13] Card and his wife live with their youngest child, Zina, in Greensboro, North Carolina.[13]

The life of their son, Charles, influenced some of Card’s fiction, most notably the Homecoming series, Lost Boys and Folk of the Fringe. Their daughter, Emily, along with two other writers, adapted Card’s short stories “Clap Hands and Sing“, “Lifeloop” and “A Sepulchre of Songs” for the stage in Posing as People.[66]

In 2008, he appeared in the short film The Delivery, which starred his daughter, Emily. He plays an author reading an audiobook in this film, which won First Place in Fantasy at Dragon*Con Film Festival. He wrote an original story, “The Emperor of the Air,” specifically for the short film by Gabrielle de Cuir and Stefan Rudnicki.

Card is an avid fan of the science fiction television series Firefly and makes an appearance in the documentary Done the Impossible about Firefly fandom.

Card suffered a mild stroke on January 1, 2011, and was briefly hospitalized. He reported expecting to make a full recovery despite impairment of his left hand.[67][68]

Awards

The ALA Margaret A. Edwards Award recognizes one writer and a particular body of work for “significant and lasting contributions to young adult literature”. Card won the annual award in 2008, citing Ender’s Game (1985), which inaugurated the science fiction Ender Saga, and Ender’s Shadow (1999), the so-called parallel novel featuring another boy in the Battle School. According to the citation, the two boys’ “experiences echo those of teens, beginning as children navigating in an adult world and growing into a state of greater awareness of themselves, their communities and the larger universe.”[26] In the same year, Card won the Lifetime Achievement Award for Mormon writers (Whitney Awards).[69]

He has also won numerous awards for single works.

Works

In 1978, the Harold B. Lee Library acquired the Orson Scott Card papers, which included Card’s works, writing notes and letters, and in 2007 the collection was formally opened.[74][75][76]

See also

https://en.wikipedia.org/wiki/Orson_Scott_Card

Read Full Post | Make a Comment ( None so far )

American PIE — Propaganda Indoctrination Entertainment — Luce and His Empire –Time Magazine Is Fake News — Circling The Drain (CTD) — Videos

Posted on January 3, 2017. Filed under: American History, Art, Articles, Blogroll, Business, College, Communications, Congress, Constitution, Corruption, Culture, Documentary, Education, Elections, Employment, Films, Freedom, Friends, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, media, Money, Music, National Security Agency (NSA), People, Philosophy, Photos, Political Correctness, Private Sector, Public Sector, Radio, Rants, Raves, Raymond Thomas Pronk, Reviews, Spying, Strategy, Success, Talk Radio, Taxation, Taxes, Technology, Unemployment, Union, Unions, Video, War, Wealth, Welfare, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , , , , |

Image result

Image result for Luce and His Empire

Image result for HITLER person of the year

Image result for stalin person of the year

Image result for time magazine man of the year 1960

Image result for time magazine man of the year 1960

Image result for time magazine man of the year ronald reagan

Image result for time magazine man of the year 1960

Image result for time magazine man of the year covers 1923

Image result for trump covers time magazine

Image result for time magazine trump meltdown

Image result for time magazine trump meltdown

Image result for time magazine trump covers

Image result for trump person of the year

Image result for fortune magazine donald trump

Image result for time magazine man of the year covers 1923

Image result for ctd circling the drainImage result for cartoon circling the drain

Image result for circulation of news mapazines

Image result for circulation of news mapazines

Image result for cartoons fake news

Image result for cartoons fake news

Image result for blanco cartoons fake news

Image result for blanco cartoons fake news

Don McLean – American Pie

American Pie – Don McLean – Full Length 1989 Video from Original 1971/72 Song

Don McLean- American Pie (with Lyrics)

Donald Trump: Person Of The Year 2016 | POY 2016 | TIME

Time Magazine Person of the Year: Strangest Picks

Isaiah Wilner – “The Man Time Forgot”

USA – Seventy-five years of Time Magazine

Time Magazine Is Fake News

Henry R. Luce and the 20th Century

Uploaded on Apr 26, 2010

A discussion with two biographers of Henry R. Luce, the Yale graduate who founded Time, Inc. Alan Brinkley, an historian at Columbia University, and Lance Morrow, a contributor at Time, spoke about Luce and his impact on the 20th Century. Professor Shelly Kagan moderated the discussion; Yale University President Richard Levin gave the introduction. The event was sponsored by the Yale Daily News.

The Man Who Revolutionized Magazine Publishing: The Rise of the American News Media (2002)

Published on Dec 5, 2015

Henry Robinson Luce (April 3, 1898 – February 28, 1967), was a Chinese-American magazine magnate, who was called “the most influential private citizen in the America of his day”. About the book: https://www.amazon.com/gp/product/080…

He launched and closely supervised a stable of magazines that transformed journalism and the reading habits of upscale Americans. Time summarized and interpreted the week’s news; Life was a picture magazine of politics, culture, and society that dominated American visual perceptions in the era before television; Fortune explored in depth the economy and the world of business, introducing to executives avant-garde ideas such as Keynesianism; and Sports Illustrated explored the motivations and strategies of sports teams and key players. Counting his radio projects and newsreels, Luce created the first multimedia corporation. He was born in China to missionary parents. He envisaged that the United States would achieve world hegemony, and, in 1941, he declared the 20th century would be the “American Century”.

Nightly discussions of the concept of a news magazine led Luce and Hadden, both age 23, to quit their jobs in 1922. Later that same year, they formed Time Inc. Having raised $86,000 of a $100,000 goal, they published the first issue of Time on March 3, 1923. Luce served as business manager while Hadden was editor-in-chief. Luce and Hadden annually alternated year-to-year the titles of president and secretary-treasurer. In 1925, Luce decided to move headquarters to Cleveland, while Hadden was on a trip to Europe. Cleveland was cheaper, and Luce’s first wife, Lila, wanted out of New York. When Hadden returned, he was horrified and moved Time back to New York. Upon Hadden’s sudden death in 1929, Luce assumed Hadden’s position.

Luce launched the business magazine Fortune in February 1930 and acquired Life in order to relaunch it as a weekly magazine of photojournalism in November 1936; he went on to launch House & Home in 1952 and Sports Illustrated in 1954. He also produced The March of Time weekly newsreel. By the mid 1960s, Time Inc. was the largest and most prestigious magazine publisher in the world. (Dwight Macdonald, a Fortune staffer during the 1930s, referred to him as “Il Luce”, a play on the Italian Dictator Mussolini, who was called “Il Duce”).)

President Franklin D. Roosevelt, aware that most publishers were opposed to him, issued a decree in 1943 that blocked all publishers and media executives from visits to combat areas; he put General George Marshall in charge of enforcement. The main target was Luce, who had long opposed FDR. Historian Alan Brinkley argued the move was “badly mistaken”, for had Luce been allowed to travel, he would have been an enthusiastic cheerleader for American forces around the globe. But stranded in New York City, Luce’s frustration and anger expressed itself in hard-edged partisanship.[4] Luce, supported by Editor-in-Chief T. S. Matthews, appointed Whittaker Chambers as acting Foreign News editor in 1944, despite the feuds Chambers had with reporters in the field.[5]

Luce, who remained editor-in-chief of all his publications until 1964, maintained a position as an influential member of the Republican Party.[6] An instrumental figure behind the so-called “China Lobby”, he played a large role in steering American foreign policy and popular sentiment in favor of Nationalist leader Chiang Kai-shek and his wife Soong Mei-ling in their war against the Japanese. (The Chiangs appeared in the cover of Time eleven times between 1927 and 1955.[7])

It has been reported that Luce, during the 1960s, tried LSD and reported that he had talked to God under its influence.[8]

Once ambitious to become Secretary of State in a Republican administration, Luce penned a famous article in Life magazine in 1941, called “The American Century”, which defined the role of American foreign policy for the remainder of the 20th century (and perhaps beyond).

Firing Line with William F. Buckley Jr. “Reflections on the Current Scene”

Firing Line with William F. Buckley Jr. “Feminism”

Clare Boothe Luce: Legendary Playwright, Politician & Social Seductress – Biography (1997)

Christopher Hitchens on News, Media, Entertainment and Propaganda (1997)

“THE END IS NEAR!” TIME Magazine Releases Cryptic Cover November 2016! TIME’S UP!

Edward Bernays called it PROPAGANDA

What is Propaganda

Devastating Expose on American Journalism and Media Concentration: Leading Thinkers Bernie Sanders

Mainstream Media Lies to the Masses – Media Lies – Media Lies Documentary

Propaganda and Manipulation: How mass media engineers and distorts our perceptions

More on propaganda and collective insanity

Propaganda & Engineering Consent for Empire with Mark Crispin Miller

Ben Shapiro on Fake News, Crumbling Mainstream Media, and Russia’s Hacking (Part 3)

Ben Shapiro and Dave Rubin: Trump, the Alt Right, Fake News, and More (Full Interview)

College Indoctrination Documentary

Education Is a System of Indoctrination of the Young – Noam Chomsky

27. Your Indoctrination

Ben Shapiro on indoctrination of America’s youth in universities

What is “Fake News?”

The Truth About Fake News | Russia Hacked U.S. Election For Donald Trump?

WELCOME TO TRUTH | Full Documentary 2014

The Future of Newspapers and Magazines

The Future of Journalism: Tom Rosenstiel at TEDxAtlanta

Citizen journalism | Paul Lewis | TEDxThessaloniki

The slow journalism revolution | Rob Orchard | TEDxMadrid

Why the majority is always wrong | Paul Rulkens | TEDxMaastricht

Why I read a book a day (and why you should too): the law of 33% | Tai Lopez | TEDxUBIWiltz

George Carlin – Political Correctness is fascism pretending to be Manners………………

George Carlin the illusion of freedom

The Owners of the Country

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for Luce and His Empire

CreditIllustration by Javier Jaén

Our new president is a private-jet-setting billionaire Ivy League graduate, a real estate tycoon, a TV star and a son of inherited wealth. But he is no longer, by his own calculations, a member of the “elite.” Nor are the men (and the few women) now joining his inner circle — 1-percenters and corporate executives, Harvard and Yale alumni, Silicon Valley entrepreneurs and Goldman Sachs bankers. The true elite apparently sits elsewhere, among those who, in Sarah Palin’s notable 2008 formulation, think “that they’re — I guess — better than anyone else.”

As an adjective, the word “elite” still conveys something positive, even aspirational: elite athlete, elite model, elite travel services. But as a noun, embodied by actual living people, it has become one of the nastiest epithets in American politics. “Elites have taken all the upside for themselves and pushed the downside to the working- and middle-class Americans,” complains Trump’s adviser Steve Bannon (of Harvard, Goldman Sachs and Hollywood). In this formulation, elites are a destructive, condescending collective, plotting against the beleaguered masses outside their ranks.

And in these attacks, the president-elect and his team are deploying one of the most effective partisan political stereotypes of the modern age. For most of American history, anti-elite sentiment was a matter of up versus down, not left versus right. But about half a century ago, the conservative movement set out to claim anti-elite politics as its own. That meant redefining the term away from class and toward culture, where the “elite” could be identified by its liberal ideas, coastal real estate and highbrow consumer preferences. The right-wing Club for Growth captured this type in a famous 2004 attack ad, instructing the Democrat Howard Dean to “take his tax-hiking, government-expanding, latte-drinking, sushi-eating, Volvo-driving, New York Times-reading, body-piercing, Hollywood-loving, left-wing freak show back to Vermont where it belongs.”

By the 1990s, bashing the ‘liberal elite’ had become a favorite blood sport of the American right.

Trump adjusted the formula for the hot topics of the 2016 campaign. “I was on the right side of that issue, as you know, with the people,” he boasted after Brexit, adding that “Hillary, as always, stood with the elites.” His complaints against “political correctness” conjure a world of absurdist campus politics, where overprivileged students squabble over gender pronouns and the fine points of racial victimization. “Media elites” come in for special attack, cordoned off in pens to be mocked and jeered at during rallies, labeled both liars and incompetents.

But Trump has also ventured beyond mere name-calling, turning the 2016 election into a competition between knowledge systems: the tell-it-like-it-is “people” versus the know-it-all “elites.” His campaign insisted for months that pollsters and technocrats and media would be proven wrong by his electoral success. The fact that he did win dealt a blow to an entire worldview, one in which empirical inquiry and truth-telling were supposed to triumph in the end. The question, now, is whether it’s possible to run an executive branch based on hostility toward experts and professionals of all political stripes — and how many billionaires and Ivy Leaguers Trump can appoint before this rhetorical pose begins to break down altogether.

The notion that distant elites might be conspiring against the people comes straight from the Founding Fathers, whose Declaration of Independence lamented the “long train of abuses and usurpations” inflicted upon ordinary Americans by an arrogant British king. From there on, United States history might be seen as a repeating cycle of anti-elite revolt. The Jacksonians rebelled against the Founders’ aristocratic pretensions. Northern “free labor” went to war against the oligarchical slavocracy. And the Populist revolts of the late 19th century adapted this story to modern capitalism, with farmers and laborers rebelling against robber barons, bankers, time-management experts and college-educated professionals.

The first historians to study those Populists described them as heroic crusaders, champions of the “people” against the “powers.” But by the middle of the 20th century, alarmed by the rise of fascism and homegrown demagogues like Senator Joseph McCarthy, a new generation of scholars took a more anxious view of the anti-elite spirit. In his 1955 book “The Age of Reform,” Richard Hofstadter dismissed the Populists as backward-looking, provincial anti-Semites, the latent fascists of their day. Eight years later, his “Anti-Intellectualism in American Life” documented a dangerous suspicion of “the critical mind” that seemed to course through the national culture. From his perspective, the 1952 election captured everything wrong with American political life, with Dwight Eisenhower’s “philistinism” winning over Adlai Stevenson’s “intellect.”

The question is whether it’s possible to run an executive branch based on hostility toward experts and professionals of all political stripes.

Hofstadter did not usually describe his ideal intellectually minded citizens as members of an “elite.” That word conveyed something different — a ruling class that held direct political and economic power. The most famous articulation of this view came from the sociologist C. Wright Mills, in his 1956 assessment of America’s “power elite.” “They rule the big corporations,” Mills wrote. “They run the machinery of the state and claim its prerogatives. They direct the military establishment.” In Mills’s view, these people were tied together not by culture or ideology but by their positions at the helms of large, ever-more-complex institutions. As individuals, they might be Republicans or Democrats, and might live in Ohio or California. The point was that they were in charge of things.

But that vision never gained much traction in mainstream politics, where a more partisan, targeted definition was starting to emerge. William F. Buckley Jr. carved out some essentials in his first book, “God and Man at Yale,” drawing a neat distinction between respectable Ivy-educated men like himself and the socialistic eggheads of the professoriate. Ronald Reagan chose the term “elite” to bring it all together in his famed 1964 speech, “A Time for Choosing,” delivered on behalf of the Republican presidential candidate Barry Goldwater. “This is the issue of this election,” he said: “whether we believe in our capacity for self-government or whether we abandon the American Revolution and confess that a little intellectual elite in a far-distant capitol can plan our lives for us better than we can plan them ourselves.”

Lyndon Johnson won that election in a blowout, but Reagan’s vision of a smug and detached liberal elite helped spark the oncoming “culture wars,” pitting a supposedly indignant Middle America against the liberal snobs of the coasts. By the 1990s, with the rise of right-wing media stars like Rush Limbaugh and Bill O’Reilly, bashing the “liberal elite” had become a favorite blood sport of the American right.

Despite all the abuse hurled their way, some “liberal elites” have accepted at least part of their detractors’ critique, particularly on the progressive left. It was during Bill Clinton’s presidency that the social critic Christopher Lasch published “The Revolt of the Elites and the Betrayal of Democracy,” which mourned that “upper-middle-class liberals” had turned into “petulant, self-righteous, intolerant” scolds, thoroughly out of touch with the concerns of Middle America. Since then, the torch has passed to a younger generation of writers, including MSNBC’s Chris Hayes, whose 2012 “Twilight of the Elites” called for rethinking the entire ethos of liberal “meritocracy” — a system, he argued, that tends to fuel self-congratulation and incompetence at the top while offering little but contempt and dim prospects for those at the bottom.

So as 2017 begins, we find ourselves in a strange and uncertain political moment. Antipathy toward a wealthy, preening managerial class seems to be gaining popularity across the political spectrum — and, oddly, to have helped elect a wealthy, preening incoming president. Meanwhile, both liberal and conservative “elites” are scrambling to figure out what happens if the president-elect continues to reject basic political norms and even routine intelligence briefings. Under a Trump presidency, such “elites” may have no choice but to attempt a radical redefinition of their role in American life. Otherwise, the man in the White House will do it for them.

http://www.nytimes.com/2017/01/03/magazine/how-elites-became-one-of-the-nastiest-epithets-in-american-politics.html?_r=0

Henry Luce

From Wikipedia, the free encyclopedia
Henry Luce
Clare Boothe Luce and Henry Luce NYWTS.jpg

Luce with wife Clare Boothe Luce, a famous playwright and politician (1954)
Born Henry Robinson Luce
April 3, 1898
Tengchow, China
Died February 28, 1967 (aged 68)
Phoenix, Arizona, U.S.
Occupation Publisher; Journalist
Political party Republican
Spouse(s) Lila Ross Hotz (1923–1935)
Clare Boothe Luce
(1935–1967, his death)
Children 3, including Ann Clare Brokaw (step-daughter)
Parent(s) Henry W. Luce and Elizabeth Middleton Root

Henry Robinson Luce (April 3, 1898 – February 28, 1967) was an American magazine magnate who was called “the most influential private citizen in the America of his day”.[1] He launched and closely supervised a stable of magazines that transformed journalism and the reading habits of upscale Americans. Time summarized and interpreted the week’s news; Life was a picture magazine of politics, culture, and society that dominated American visual perceptions in the era before television; Fortune explored in depth the economy and the world of business, introducing to executives avant-garde ideas such as Keynesianism; and Sports Illustrated explored the motivations and strategies of sports teams and key players. Counting his radio projects and newsreels, Luce created the first multimedia corporation. He was born in China to missionary parents. He envisaged that the United States would achieve world hegemony, and, in 1941, he declared the 20th century would be the “American Century“.[2][3]

Life and career

Luce was born in Tengchow, Shandong, China, (now Penglai) on April 3, 1898, the son of Elizabeth Root Luce and Henry Winters Luce, who was a Presbyterian missionary.[3] He received his education in various Chinese and English boarding schools, including the China Inland Mission Chefoo School.

At 15, he was sent to the US to attend the Hotchkiss School in Connecticut, where he edited the Hotchkiss Literary Monthly. It was there he first met Briton Hadden,[3] who would become a lifelong partner. At the time, Hadden served as editor-in-chief of the school newspaper, and Luce worked as an assistant managing editor. Both went on to Yale College, where Hadden served as chairman and Luce as managing editor of The Yale Daily News. Luce was also a member of Alpha Delta Phi and Skull and Bones. After being voted “most brilliant” of his class and graduating in 1920, he parted ways with Hadden to embark for a year on historical studies at Oxford University, followed by a stint as a cub reporter for the Chicago Daily News.

In December 1921, Luce rejoined Hadden to work at The Baltimore News. Recalling his relationship with Hadden, Luce later said, “Somehow, despite the greatest differences in temperaments and even in interests, we had to work together. We were an organization. At the center of our lives — our job, our function — at that point everything we had belonged to each other.”[citation needed]

Magazines

Nightly discussions of the concept of a news magazine led Luce and Hadden, both age 23, to quit their jobs in 1922. Later that same year, they partnered with Robert Livingston Johnson and another Yale classmate to form Time Inc.[4] Having raised $86,000 of a $100,000 goal, they published the first issue of Time on March 3, 1923. Luce served as business manager while Hadden was editor-in-chief. Luce and Hadden annually alternated year-to-year the titles of president and secretary-treasurer while Johnson served as vice president and advertising director. In 1925, Luce decided to move headquarters to Cleveland, while Hadden was on a trip to Europe. Cleveland was cheaper, and Luce’s first wife, Lila, wanted out of New York. When Hadden returned, he was horrified and moved Time back to New York. Upon Hadden’s sudden death in 1929, Luce assumed Hadden’s position.

Luce launched the business magazine Fortune in February 1930 and acquired Life in order to relaunch it as a weekly magazine of photojournalism in November 1936; he went on to launch House & Home in 1952 and Sports Illustrated in 1954. He also produced The March of Time weekly newsreel. By the mid 1960s, Time Inc. was the largest and most prestigious magazine publisher in the world. (Dwight Macdonald, a Fortune staffer during the 1930s, referred to him as “Il Luce”, a play on the Italian Dictator Mussolini, who was called “Il Duce”).)

President Franklin D. Roosevelt, aware that most publishers were opposed to him, issued a decree in 1943 that blocked all publishers and media executives from visits to combat areas; he put General George Marshall in charge of enforcement.[citation needed] The main target was Luce, who had long opposed Roosevelt. Historian Alan Brinkley argued the move was “badly mistaken” and said had Luce been allowed to travel, he would have been an enthusiastic cheerleader for American forces around the globe.[citation needed] However, stranded in New York City, Luce’s frustration and anger expressed itself in blatant partisanship.[5]

Luce, supported by Editor-in-Chief T. S. Matthews, appointed Whittaker Chambers as acting Foreign News editor in 1944, despite the feuds that Chambers had with reporters in the field.[6]

Luce, who remained editor-in-chief of all his publications until 1964, maintained a position as an influential member of the Republican Party.[7] An instrumental figure behind the so-called “China Lobby“, he played a large role in steering American foreign policy and popular sentiment in favor of Kuomintang leader Chiang Kai-shek and his wife, Soong Mei-ling, in their war against the Japanese. (The Chiangs appeared in the cover of Time eleven times between 1927 and 1955.[8])

It has been reported that Luce, during the 1960s, tried LSD and reported that he had talked to God under its influence.[9]

Once ambitious to become Secretary of State in a Republican administration, Luce penned a famous article in Life magazine in 1941, called “The American Century“, which defined the role of American foreign policy for the remainder of the 20th century (and perhaps beyond).[7]

An ardent anti-Soviet, he once demanded John Kennedy invade Cuba, later to remark to his editors that if he did not, his corporation would act like Hearst during the Spanish–American War. The publisher would advance his concepts of US dominance of the “American Century” through his periodicals with the ideals shared and guided by members of his social circle, John Foster Dulles, Secretary of State and his brother, director of the CIA, Allen Dulles. To highlight the cozy extent of their alliance, rumors swirled that the publisher shared the wartime mistress of the spymaster with Clare Booth Luce.[10]

Family

Luce had two children, Peter Paul and Henry Luce III, with his first wife, Lila Hotz. He married his second wife, Clare Boothe Luce in 1935, who had an 11-year-old daughter, Ann Clare Brokaw, whom he raised as his own. He died in Phoenix, Arizona in 1967. According to the Henry Luce Foundation, he died suddenly at age 68 while visiting his home on Fishers Island, New York, of cardiac arrest. At his death, he was said to be worth $100 million in Time Inc. stock.[11] Most of his fortune went to the Henry Luce Foundation. During his life, Luce supported many philanthropies such as Save the Children Federation, the Metropolitan Museum of Art and United Service to China, Inc. He is interred at Mepkin Plantation in South Carolina.

He was honored by the United States Postal Service with a 32¢ Great Americans series (1980–2000) postage stamp.[12] Mr. Luce was inducted into the Junior Achievement U.S. Business Hall of Fame in 1977.

Designed by I. M. Pei, the Luce Memorial Chapel, on the campus of Tunghai University, Taiwan, was constructed in memoriam of Henry Luce’s father.

References

  1. Jump up^ Robert Edwin Herzstein (2005). Henry R. Luce, Time, and the American Crusade in Asia. Cambridge U.P. p. 1.
  2. Jump up^ Editorial (1941-02-17) The American Century, Life Magazine
  3. ^ Jump up to:a b c Baughman, James L. (April 28, 2004). “Henry R. Luce and the Rise of the American News Media”. American Masters (PBS). Retrieved 19 June 2014.
  4. Jump up^ Warburton, Albert (Winter 1962). “Robert L. Johnson Hall Dedicated at Temple University” (PDF). The Emerald of Sigma Pi. Vol. 48 no. 4. p. 111.
  5. Jump up^ Alan Brinkley, The Publisher: Henry Luce and his American Century (2010) pp 302-3
  6. Jump up^ Brinkley, The Publisher: Henry Luce and his American Century (2010) pp 322-93
  7. ^ Jump up to:a b “Henry R. Luce: End of a Pilgrimage”. – TIME. – March 10, 1967
  8. Jump up^ “Time magazine historical search”. Time magazine. Retrieved 19 June 2014.
  9. Jump up^ Maisto, Stephen A., Galizio, Mark, & Connors, Gerald J. (2008). Drug Use and Abuse: Fifth Edition. Belmont: Thomson Higher Education. ISBN 0-495-09207-X
  10. Jump up^ Talbot, David. “The Devils’ Chessboard: Allen Dulles, The CIA and the Rise of America’s Secret Government.” (2015) Harper-Collins, pub., New York, New York pp. 236-238, 444.
  11. Jump up^ Edwin Diamond (October 23, 1972). “Why the Power Vacuum at Time Inc. Continues”. New York Magazine.
  12. Jump up^ “Henry R. Luce”. US Stamp Gallery. April 3, 1998.

Further reading

  • Baughman, James L. “Henry R. Luce and the Business of Journalism.” Business & Economic History On-Line 9 (2011). online
  • Baughman, James L. Henry R. Luce and the Rise of the American News Media (2001) excerpt and text search
  • Brinkley, Alan. The Publisher: Henry Luce and His American Century, Alfred A. Knopf (2010) 531 pp.
  • Brinkley, Alan. What Would Henry Luce Make of the Digital Age?, TIME (April 19, 2010) excerpt and text search
  • Elson, Robert T. Time Inc: The Intimate History of a Publishing Enterprise, 1923-1941 (1968); vol. 2: The World of Time Inc.: The Intimate History, 1941-1960 (1973), official corporate history
  • Herzstein, Robert E. Henry R. Luce, Time, and the American Crusade in Asia (2006) excerpt and text search
  • Herzstein, Robert E. Henry R. Luce: A Political Portrait of the Man Who Created the American Century (1994).
  • Morris, Sylvia Jukes. Rage for Fame: The Ascent of Clare Boothe Luce (1997).
  • Wilner, Isaiah. The Man Time Forgot: A Tale of Genius, Betrayal, and the Creation of Time Magazine, HarperCollins, New York, 2006

External links

https://en.wikipedia.org/wiki/Henry_Luce

W. A. Swanberg

From Wikipedia, the free encyclopedia

William Andrew Swanberg (November 23, 1907 in St. Paul, Minnesota – September 17, 1992 in Southbury, Connecticut)[1] was an American biographer. He may be known best for Citizen Hearst, a biography of William Randolph Hearst, which was recommended by the Pulitzer Prize board in 1962 but overturned by the trustees.[2] He won the 1973 Pulitzer Prize for Biography or Autobiography for his 1972 biography of Henry Luce,[3] and the National Book Award in 1977 for his 1976 biography of Norman Thomas.[4]

Life

Swanberg was born in Saint Paul, Minnesota in 1907, and earned his B.A. at the University of Minnesota in 1930.[5]

With grudging and only partial help from his father, who wanted his son to be a cabinet maker like himself, Swanberg earned his degree, only to find that employment as a journalist with such local daily newspapers as the St. Paul Daily News and the Minneapolis Star was unsatisfactory, as their staff were shrinking during the Great Depression. Swanberg instead held a succession of low-paying manual labor jobs. After five years he followed a college friend to New York City in September 1935. After months of anxious job-hunting he secured an interview at the Dell Publishing Company with president George T. Delacorte Jr. himself, and was hired as an assistant editor of three lowbrow magazines. Money saved in the next months enabled him to return briefly to the Midwest to marry his college sweetheart Dorothy Green, and bring her to New York. He soon began to climb up the editorial ladder at Dell, and by 1939 he was doing well enough to buy a house in Connecticut.

When the United States entered World War II, Swanberg was 34 years old, the father of two children and suffering from a hearing disability. Rejected by the army, he enlisted in the Office of War Information in 1943 and, after training was sent to England following D-Day. In London, amid the V-1 and V-2 attacks, he prepared and edited pamphlets to be air-dropped behind enemy lines in France and later in Norway.[6] With the end of the war he returned in October 1945 to Dell and the publishing world.

Swanberg did not return to magazine editing but instead did freelance work within and without Dell. By 1953 he began carving out time for researching his first book (Sickles), which Scribner’s purchased, beginning a long-term association. Swanberg’s early hopes of newspaper work never materialized, but by the mid-1950s he had established himself as scholarly biographer. His efforts proved to be labor-intensive and required up to four years apiece, even when assisted by the research and transcription efforts of his wife Dorothy. Upon turning 80 in 1987, Swanberg attempted one last biography, about William Eugene “Pussyfoot” Johnson (1862–1945).[7] He was at work on that project when he succumbed to heart failure at his typewriter in Southbury, Connecticut on September 17, 1992.

Swanberg was a Guggenheim fellow in 1960. His papers are archived at Columbia University.

The Hearst Affair

Swanberg’s 1961 book Citizen Hearst: A Biography of William Randolph Hearst was recommended for a Pulitzer Prize for Biography or Autobiography by the advisory board but rejected by the trustees of Columbia University, apparently because they thought that Hearst was not dignified enough to be the subject of the award. It was the first time in 46 years that the trustees rejected a recommendation from the advisory board, and the news caused sales to soar.[1]

Works

In a statistical overview derived from writings by and about William Andrew Swanberg, OCLC/WorldCat [clarification needed] encompasses roughly 30+ works in 100+ publications in 5 languages and 16,000+ library holdings.[8]

Literary Awards

References

  1. ^ Jump up to:a b www.nytimes.com
  2. ^ Jump up to:a b Hohenberg, John. The Pulitzer Diaries: Inside America’s Greatest Prize. 1997. p. 109.
  3. ^ Jump up to:a b “Biography or Autobiography”. Past winners and finalists by category. The Pulitzer Prizes. Retrieved 2012-03-17.
  4. ^ Jump up to:a b “National Book Awards – 1977”. National Book Foundation. Retrieved 2012-03-17.
  5. Jump up^ Gale Contemporary Authors Online. Volume 13.[page needed]
  6. Jump up^ Gale, p. 264
  7. Jump up^ Gale, p. 277
  8. Jump up^ WorldCat Identities: Swanberg, W. A. 1907-

External links

  • W. A. Swanberg Papers Kislak Center for Special Collections, Rare Books and Manuscripts, University of Pennsylvania

https://en.wikipedia.org/wiki/W._A._Swanberg

Read Full Post | Make a Comment ( None so far )

United States To Modernize Nuclear Weapons — Bombers, Missiles, Submarines — The U.S. Nuclear Triad — Better Late Than Never — A New Nuclear Arms Race To Modernize Weapon Systems — Trump Is Right — The Nuclear Weapons Are 40-60 Years Old! — The Lying Lunatic Left and Big Lie Media Goes Hysterical — Do Your Homework! — Videos

Posted on December 22, 2016. Filed under: American History, Articles, Blogroll, Book, Books, College, Communications, Crisis, Dirty Bomb, Documentary, Education, Elections, Energy, Fiction, Films, Freedom, Friends, government spending, history, Law, liberty, Life, Links, media, Missiles, Movies, Nuclear, Nuclear Power, Philosophy, Photos, Politics, Press, Psychology, Radio, Rants, Raves, Raymond Thomas Pronk, Talk Radio, Television, Video, War, Wealth, Weapons, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , |

Image result for us nuclear triadImage result for us nuclear triad

Image result for us nuclear triad

Image result for us nuclear triad

Image result for us nuclear triadImage result for us nuclear triad

Image result for Minuteman 3 Nuclear MissileImage result for Minuteman 3 Nuclear MissileImage result for land based icbm us Image result for Minuteman 3 Nuclear MissileImage result for Minuteman 3 Nuclear MissileImage result for us nuclear triadImage result for us nuclear triadImage result for us nuclear triadImage result for submarine launch of nuclear missileImage result for usn submarine launch of nuclear missileImage result for Ohio class replacement submarineImage result for Ohio class replacement submarineImage result for US Navy Nuclear Submarines Ohio replacementImage result for Ohio class replacement submarineImage result for us nuclear triadImage result for us nuclear triadImage result for us nuclear triad

Trump doubles down on nuclear weapons

Trump says “let it be an arms race” when it comes to nuclear weapons

“Absolutely Frightening”: Greenpeace on Trump’s Call for a New Nuclear Arms Race

Trump, Putin both seek to boost their nuclear capability

Published on Dec 22, 2016

President-elect Donald Trump signaled Thursday that he will look to “strengthen and expand” the US’s nuclear capability hours after Russian President Vladimir Putin pledged to enhance his country’s nuclear forces.
The exchange appeared to raise the prospect of a new arms race between the two nuclear superpowers, which between them boast more than 14,000 nuclear warheads, the still deadly legacy of their four-decades long Cold War standoff.
But the comments by Putin, who is presiding over a project to restore Russia’s lost global power and influence, and Trump, who will shortly become the US commander-in-chief, did not spell out exactly what each side is proposing or whether a major change of nuclear doctrine is in the offing.
Trump weighed in with a tweet just hours after Putin spoke following a meeting with his military advisers to review the activity of the past year.
“The United States must greatly strengthen and expand its nuclear capability until such time as the world comes to its senses regarding nukes,” Trump wrote.
It was not immediately clear if the President-elect is proposing an entire new nuclear policy that he would begin to flesh out once he takes office next year.
Trump could also be referring to plans to modernize the current US nuclear arsenal that are currently underway and will cost hundreds of billions of dollars. The Obama administration has outlined a plan to modernize delivery systems, command and control systems and to refurbish warheads in the US nuclear triad — the US force of sea, airborne and missile delivered nuclear weapons.

Trump and nuclear fears

US Nuclear Weapons Systems Need an Upgrade. Here’s Why

America’s nuclear bomb gets a makeover

USA Dropped a Safe Nuclear Bomb in Nevada – F-15 Launching a Brand New B-61 Bomb

B61 US Nuclear Bomb Program

Nuclear Modernization: Is the United States Headed for a New Arms Race?

Stratcom Commander Emphasizes Need to Modernize Nuke “Russia is modernizing their nuclear triad”

Report on Russia’s Nuclear Triad Modernization

INSIDE VIEW !!! US Air Force Minuteman Strategic Missile Silo Mini Documentary

Published on Mar 10, 2016

The LGM-30 Minuteman is a US land-based intercontinental ballistic missile (ICBM), in service with the Air Force Global Strike Command. As of 2014, the LGM-30G Minuteman III version[a] is the only land-based ICBM in service in the United States.[citation needed]

Development of the Minuteman began in the mid-1950s as the outgrowth of basic research into solid fuel rocket motors which indicated an ICBM based on solids was possible. Such a missile could stand ready for extended periods of time with little maintenance, and then launch on command. In comparison, existing US missile designs using liquid fuels required a lengthy fueling process immediately before launch, which left them open to the possibility of surprise attack. This potential for immediate launch gave the missile its name; like the Revolutionary War’s Minutemen, the Minuteman was designed to be launched on a moment’s notice.[2][3]

Minuteman entered service in 1962 as a weapon tasked primarily with the deterrence role, threatening Soviet cities with a counterattack if the US was attacked. However, with the development of the US Navy’s Polaris which addressed the same role, the Air Force began to modify Minuteman into a weapon with much greater accuracy with the specific intent of allowing it to attack hardened military targets, including Soviet missile silos. The Minuteman-II entered service in 1965 with a host of upgrades to improve its accuracy and survivability in the face of an anti-ballistic missile (ABM) system the Soviets were known to be developing. Minuteman-III followed in 1970, using three smaller warheads instead of one large one, which made it very difficult to attack by an anti-ballistic missile system which would have to hit all three widely separated warheads to be effective. Minuteman-III was the first multiple independently targetable reentry vehicle (MIRV) ICBM to be deployed. Each missile can carry up to three nuclear warheads, which have a yield in the range of 300 to 500 kilotons.

Peaking at 1000 missiles in the 1970s, the current US force consists of 450 Minuteman-III missiles[4] in missile silos around Malmstrom AFB, Montana; Minot AFB, North Dakota; and F.E. Warren AFB, Wyoming.[1] By 2018 this will be reduced to 400 armed missiles, with 50 unarmed missiles in reserve, and four non-deployed test launchers to comply with the New START treaty.[5] The Air Force plans to keep the missile in service until at least 2030.[6][7] It is one component of the US nuclear triad—the other two parts of the triad being the Trident submarine-launched ballistic missile (SLBM), and nuclear weapons carried by long-range strategic bombers.

Type Intercontinental ballistic missile
Place of origin United States
Service history
In service 1962 (Minuteman-I)
1965 (Minuteman-II)
1970 (Minuteman-III)
Used by United States
Production history
Manufacturer Boeing
Unit cost $7,000,000
Specifications
Weight 78,000 lb (35,300 kg)
Length 59 ft 9.5 in (18.2 m)
Diameter 5 ft 6 in (1.7 m) (1st stage)
Warhead Nuclear: W62, W78, or (2006–) W87
Detonation
mechanism
Air Burst or Contact (Surface)
Engine Three-stage Solid-fuel rocket engines; first stage: Thiokol TU-122 (M-55); second stage: Aerojet-General SR-19-AJ-1; third stage: Aerojet/Thiokol SR73-AJ/TC-1
Operational
range
approx. 8,100 (exact is classified) miles (13,000 km)
Flight altitude 700 miles (1,120 kilometers)
Speed Approximately 17507 mph (Mach 23, or 28176 km/h, or 7 km/s) (terminal phase)
Guidance
system
Inertial
Accuracy 200 m CEP
Launch
platform
Missile Silo (MLCC)

Minuteman-III (LGM-30G): the current model [edit]

Side view of Minuteman-III ICBM

Airmen work on a Minuteman-III’s multiple independently-targetable re-entry vehicle (MIRV) system. Current missiles carry a single warhead.
The LGM-30G Minuteman-III program started in 1966, and included several improvements over the previous versions. It was first deployed in 1970. Most modifications related to the final stage and reentry system (RS). The final (third) stage was improved with a new fluid-injected motor, giving finer control than the previous four-nozzle system. Performance improvements realized in Minuteman-III include increased flexibility in reentry vehicle (RV) and penetration aids deployment, increased survivability after a nuclear attack, and increased payload capacity.[1] The missile retains a gimballed inertial guidance system.

Minuteman-III originally contained the following distinguishing features:

Armed with W62 warhead, having a yield of only 170 kilotons TNT, instead of previous W56’s yield of 1.2 megatons.[28]
It was the first[29] Multiple Independently Targetable Reentry Vehicles (MIRV) missile. A single missile was then able to target 3 separate locations. This was an improvement from the Minuteman-I and Minuteman-II models, which were only able to carry one large warhead.
An RS capable of deploying, in addition to the warheads, penetration aids such as chaff and decoys.
Minuteman-III introduced in the

Examining the U.S. Nuclear Spending Binge | Arms Control Association

Published on Jul 31, 2016

The Arms Control Association has for years raised warning sirens about the cost and necessity of the modernization plans and have suggested a number of steps that could be taken to put the plans on a more sustainable course. The Pentagon estimates that the proposed modernization effort of the U.S. nuclear triad and its supporting infrastructure over the next 25 years will cost between $350-$450 billion.

The remainder of the Obama administration and that of the next president will likely be faced with a number of increasingly urgent questions about America’s nuclear modernization project, including its affordability, opportunity costs, impacts on global stability and more.

Speakers on this panel addressed the scope of the current nuclear weapons spending plans, challenges and options available to the next president, and the feasibility of the modernization plans given the experience of previous administrations.

• Mark F. Cancian, Senior Advisor with the International Security Program at the Center for Strategic and International Studies
• Hans Kristensen, Director of the Nuclear Information Project at the Federation of American Scientists
• Andrew Weber, former Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense Programs
• Amy Woolf, Specialist in Nuclear Weapons Policy at the Congressional Research Service
• Kingston Reif, Arms Control Association, Moderator

LGM-30 Minuteman Launch – ICBM

Published on May 31, 2016

The LGM-30 Minuteman is a U.S. land-based intercontinental ballistic missile (ICBM), in service with the Air Force Global Strike Command.

As of 2014, the LGM-30G Minuteman III version is the only land-based ICBM in service in the United States.

PONI Live Debate: Triad Modernization

Should the US Spend $1 Trillion on Nuclear Weapons?

Breaking down Russia and U.S. nuclear capabilities

China Nuclear Message to Donald Trump

Nuclear weapons… new Documentary BBC 2016

As Pentagon overhauls nuclear triad, critics advise caution

The Future of US Submarines: Ohio Replacement SSBN(X) Ballistic Missile Subs

Evaluating President-elect Trump so far

President Obama Is Modernizing Nuclear Weapons – Here’s Why You Should Care

Inside Aging American Nuke Base

Presidential Debate Highlights | Trump, Clinton Nuclear Weapons Policy

Donald Trump: Why Can’t We Use Nuclear Weapons If We Have Them?

#LoserDonald: Why Don’t We Use Nukes?

Nuclear weapon states continue to upgrade stockpiles: SIPRI

NEW USA Military Technology threats to Russia & China Navy (2016)

Obama Promised a “World Without Nuclear Weapons,” But May Now Spend $3 Trillion on Weapons Upgrades

This Russian Weapon Can Destroy an Entire Army | WORST NIGHTMARE for US Military

TOP 5 WEAPONS OF U.S.A.

US Military’s new $100 Billion WEAPONS will dominate the World

World Nuclear War scenario… how it would look like – Documentary

Nuclear Weapons (The History)

4th Generation Nuclear Weapons

Fail Safe – Movie (1964)

Fail-Safe, Conclusion

The Making of “Dr. Strangelove”

The Bomb Run Sequence from Dr. Strangelove

Dr. Strangelove Final Scene

Trump Said the U.S. Should Expand Nuclear Weapons. He’s Right.

America needs to bolster its deterrence not to start a war, but to prevent one.

December 23, 2016

On Thursday, Donald Trump created controversy when he tweeted, “The United States must greatly strengthen and expand its nuclear capability until such time as the world comes to its senses regarding nukes.” In case anyone was confused, he followed up Friday morning with an off-air remark to MSNBC’s “Morning Joe” that clarified his intentions: “Let it be an arms race,” he said. “We will outmatch them at every pass and outlast them all.”

The backlash was swift and unanimous. Critics charged that there is no plausible reason to expand U.S. nuclear weapons, that Trump’s comments contradicted a decades-old bipartisan consensus on the need to reduce nuclear stockpiles, and that such reckless statements risk provoking a new nuclear arms race with Russia and China.

On this matter, however, Trump is right.

U.S. nuclear strategy cannot be static, but must take into account the nuclear strategy and capabilities of its adversaries. For decades, the United States was able to reduce its nuclear arsenal from Cold War highs because it did not face any plausible nuclear challengers. But great power political competition has returned and it has brought nuclear weapons, the ultimate instrument of military force, along for the ride.

In recent years, North Korea has continued to grow its nuclear arsenal and means of delivery and has issued chilling nuclear threats against the United States and its Asian allies. As recently as Thursday — before Trump’s offending tweet — Rodong Sinmum, the Pyongyang regime’s official newspaper, published an opinion article calling for bolstering North Korea’s “nuclear deterrence.”

The potential threats are everywhere. Washington faces an increasing risk of conflict with a newly assertive, nuclear-armed China in the South China Sea. Beijing is expanding its nuclear forces and it is estimated that the number of Chinese warheads capable of reaching the U.S. homeland has more than trebled in the past decade and continues to grow. And Russia has become more aggressive in Europe and the Middle East and has engaged in explicit nuclear saber rattling the likes of which we have not seen since the 1980s. At the height of the crisis over Crimea in 2014, for example, Russian President Vladimir Putin ominously declared, “It’s best not to mess with us … I want to remind you that Russia is one of the leading nuclear powers.” And on Tuesday, he vowed to “enhance the combat capability of strategic nuclear forces, primarily by strengthening missile complexes that will be guaranteed to penetrate existing and future missile defense systems.” As former Defense Secretary William Perry correctly notes, “Today, the danger of some sort of a nuclear catastrophe is greater than it was during the Cold War.”

The United States needs a robust nuclear force, therefore, not because anyone wants to fight a nuclear war, but rather, the opposite: to deter potential adversaries from attacking or coercing the United States and its allies with nuclear weapons of their own.

Under President Barack Obama, the United States mindlessly reduced its nuclear arsenal even as other nuclear powers went in the opposite direction, expanding and modernizing their nuclear forces. Such a path was unsustainable and Trump is correct to recognize that America’s aging nuclear arsenal is in need of some long overdue upgrades.

So, what would expanding and strengthening the nuclear arsenal look like?

First, the United States must modernize all three legs of the nuclear triad (submarines; long-range bombers, including a new cruise missile; and intercontinental ballistic missiles, or ICBMs). The Obama administration announced plans to modernize the triad under Republican pressure, but critics are already trying to kill off the ICBM and the cruise missile, and production timelines for these weapon systems keep slipping into the future. The Trump administration must make the timely modernization of all three legs of the triad a top priority.

Second, the United States should increase its deployment of nuclear warheads, consistent with its international obligations. According to New START, the treaty signed with Russia in 2011, each state will deploy no more than 1,550 strategic nuclear warheads, but those restrictions don’t kick in until February 2018. At present, according to the State Department, the United States is roughly 200 warheads below the limit while Russia is almost 250 warheads above it. Accordingly, Russia currently possesses a nuclear superiority of more than 400 warheads, which is worrisome in and of itself and also raises serious questions about whether Moscow intends to comply with this treaty at all. The United States, therefore, should expand its deployed arsenal up to the treaty limits and be fully prepared for further expansion should Russia break out — as Moscow has done with several other legacy arms control agreements.

Third, and finally, the United States and NATO need more flexible nuclear options in Europe. In the event of a losing war with NATO, Russian strategy calls for limited nuclear “de-escalation” strikes against European civilian and military targets. At present, NATO lacks an adequate response to this threat. As I explain in a new report, the United States must develop enhanced nuclear capabilities, including a tactical, air-to-surface cruise missile, in order to disabuse Putin of the notion that he can use nuclear weapons in Europe and get away with it.

These stubborn facts lay bare the ignorance or naivety of those fretting that Trump’s tweets risk starting a new nuclear arms race. It is U.S. adversaries, not Trump, who are moving first. It is a failure to respond that would be most reckless, signaling continued American weakness and only incentivizing further nuclear aggression.

The past eight years have been demoralizing for many in the defense policy community as Obama has consistently placed ideology over reality in the setting of U.S. nuclear policy. The results, an increasingly disordered world filled with intensifying nuclear dangers, speak for themselves.

Rather than express outrage over Trump’s tweet, therefore, we should take heart that we once again have a president who may be willing to do what it takes to defend the country against real, growing and truly existential threats.

Matthew Kroenig is associate professor in the Department of Government and the School of Foreign Service at Georgetown University and senior fellow in the Brent Scowcroft Center on International Security at The Atlantic Council. He is a former strategist in the Office of the Secretary of Defense and is currently writing a book on U.S. nuclear strategy.

http://www.politico.com/magazine/story/2016/12/trump-said-the-us-should-expand-nuclear-weapons-hes-right-214546

How the Pentagon Plans to Modernize the US Nuclear Arsenal

PHOTO: View of a Boeing LGM-30G Minuteman III ICBM missile as it was launched in the 1970s.

President-elect Donald Trump’s tweets this week about strengthening and expanding America’s nuclear weapons capability are raising eyebrows, but they also highlight the Pentagon’s existing programs to update and modernize its nuclear arsenal.

The components of America’s nuclear triad of Intercontinental Ballistic Missiles (ICBM’s), strategic bombers, and submarine-launched ballistic missiles are decades old. While the Pentagon has undergone a modernization process to keep these systems intact over that time, the Pentagon has plans to replace each leg of the triad in the coming decades.

But the Pentagon’s plans to update and modernize the nuclear triad will be a lengthy and costly enterprise. Defense Secretary Ash Carter told Congress earlier this year that it will cost $350 billion to $450 billion to update and modernize beginning in 2021. But there are some estimates that a 30-year modernization program could cost as much as $1 trillion.

And that process has gotten underway since the lifespan of the existing delivery systems ends in the next 15 to 20 years. Replacement systems are currently in the phase of research, development, testing and evaluation.

The U.S. Air Force maintains a fleet of 450 Minuteman III ICBM missiles located in underground silos across the plains states, each carrying multiple nuclear warheads. A key leg of the nuclear triad, the Minuteman III missiles went into service in the 1970’s and have been upgraded ever since to keep them mission ready. No new ICBM missiles have gone into service since the MX missile was deployed in the 1980’s, but those missiles were retired a decade ago.

This summer, the Air Force began the process of soliciting designs for a new ICBM to replace the Minuteman III, with the first new missile scheduled to enter service by 2029.

The Air Force has already begun the process of replacing the 76 B-52 strategic bombers that have been flying since the 1960’s with the new B-21 “Raider” that will begin flying in 2025. Upgrades to the B-52, designed in the 1950’s, have allowed the aircraft to continue serving as a nuclear-capable aircraft and also allowed it to conduct airstrikes against ISIS.

PHOTO: Senior Airmen Mark Pacis, left, and Christopher Carver mount a refurbished nuclear warhead on to the top of a Minuteman III intercontinental ballistic missile inside an underground silo in Scottsbluff, Neb., April 15, 1997.Eric Draper/AP Photo
Senior Airmen Mark Pacis, left, and Christopher Carver mount a refurbished nuclear warhead on to the top of a Minuteman III intercontinental ballistic missile inside an underground silo in Scottsbluff, Neb., April 15, 1997.more +

The Navy has also begun the process to find a replacement for its 14 Ohio Class ballistic missile submarine fleet that first went into service in the 1980’s. But the first Columbia Class submarine is not slated to enter service until 2031.

But it is important to point out that a replacement of these systems, while incredibly expensive, does not equate to an overall growth of the nuclear arsenal.

In other words, the U.S. is looking to become more efficient — it’s not looking for more nuclear weapons. As one defense official put it, with the cost of the new systems, the Pentagon is simply not able to do a one-to-one replacement.

As of September 2015, the United States has a total of 4,571 warheads in its nuclear weapons stockpile, according to a State Department official. The United States has retired thousands of nuclear warheads that are removed from their delivery platform that are not included in this total, the official said, noting those warheads are not functional and are in a queue for dismantlement.

The 2011 New START (Strategic Arms Reduction Treaty) nuclear weapons agreement limits to 1,550 the number of nuclear warheads that can be deployed on ICBMs, submarines or heavy bombers by the U.S. and Russia. Both countries have until February 2018 to meet the New START’s reduction target levels for deployed warheads.

The United States currently has 1,361 deployed nuclear weapons while Russia has 1,796. The larger Russian number is seen as a temporary increase as Russia replaces older warheads with new ones.

http://abcnews.go.com/Politics/pentagon-plans-modernize-us-nuclear-arsenal/story?id=44372054

Donald Trump says he wants to ‘greatly strengthen and expand’ U.S. nuclear capability, a radical break from U.S. foreign policy

Putin praises Russian military’s show of strength in Syria

Embed Share

Russian President Vladimir Putin praised his country’s military on Dec. 22, saying its armed forces had performed well in the fight against “international terrorists” in Syria. (Reuters)

December 22 at 1:05 PM

President-elect Donald Trump on Thursday called for the United States to expand its nuclear arsenal, after Russian President Vladi­mir Putin said his country’s nuclear potential needs fortifying, raising the specter of a new arms race that would reverse decades of efforts to reduce the number and size of the two countries’ nuclear weapons.In a tweet that offered no details, Trump said, “The United States must greatly strengthen and expand its nuclear capability until such time as the world comes to its senses regarding nukes.”During the campaign, Trump talked in one debate about the need to modernize the country’s infrastructure of nuclear weaponry, saying the United States is falling behind. But it is not clear whether Trump is thinking of increasing the number of nuclear weapons the United States possesses, or updating the existing supply.

Trump’s tweet came shortly after Putin, during a defense ministry meeting, talked tough on Russia’s stockpile of nuclear weapons.

“We need to strengthen the military potential of strategic nuclear forces, especially with missile complexes that can reliably penetrate any existing and prospective missile defense systems,” Putin said.

Russia and the United States have worked for decades at first limiting, and then reducing, the number and strength of nuclear arms they produced and maintained under a Cold War strategy of deterrence known as “mutually assured destruction.” Both Republican and Democratic presidents have pursued a policy of nuclear arms reduction, said Daryl G. Kimball, executive director of the Arms Control Association.

Currently, the United States has just under 5,000 warheads in its active arsenal, and more than 1,550 deployed strategic warheads, a number that fluctuates, according to Kimball. In an October assessment by the State Department Bureau of Arms Control Verification and Compliance, Russia has about 400 more nuclear warheads than the United States does. But the United States has about 170 more delivery systems than Russia.

Under the New START Treaty, the main strategic arms treaty in place, both the U.S. and Russia must deploy no more than 1,550 strategic weapons by February of 2018. Kimball said both countries appear to be on track to meet that limit, which will remain in force until 2021, when they could decide to extend the agreement for another five years.

Since President George H.W. Bush’s administration, it has been U.S. policy not to build new nuclear warheads. Under President Obama, the policy has been not to pursue warheads with new military capabilities.

The U.S. military is in the beginning stages of updating its nuclear triad, which covers the delivery systems — bombers, submarines and intercontinental ballistic missiles. Last year, the Pentagon estimated it must spend an average of $18 billion a year over 15 years starting in 2021, to replace weapons that already have been refurbished and upgraded beyond their original shelf life.

Trump’s history of discussing nuclear weapons

President-elect Donald Trump has called nuclear weapons “the single greatest problem the world has” – but he’s also made some controversial statements about them. (Peter Stevenson/The Washington Post)

But independent experts have estimated the total cost of modernizing the aging nuclear arsenal could reach $1 trillion over 30 years, according to the Arms Control Association.

“If Donald Trump is concerned about the rising costs of the F-35, he will be shocked by the skyrocketing costs of the current plan to modernizing the U.S. nuclear arsenal,” Kimball said. “Trump and his people need to explain the basis of his cryptic tweet. What does he mean by expand, and at what cost?”

But others argue that nuclear weapons and the principle of deterrence are essential components of national security, and the Obama administration’s efforts to further reduce its nuclear weapons have been just wishful thinking.

Michaela Dodge, a Heritage Foundation policy analyst specializing in nuclear weapons and missile defense policy, said that the White House in its 2010 Nuclear Posture Review made the erroneous assessment that there was little likelihood of conflict with Russia. Yet Moscow is in the midst of a large-scale nuclear weapons modernization program, and has violated many arms control treaties that it signed, she said.

“There is already an ongoing nuclear arms race, except now the United States isn’t racing,” she said in a telephone interview. “It’s mostly Russia and China.”

Dodge has called for the incoming Trump administration to request funding for nuclear warheads, delivery platforms and nuclear infrastructure. She also said the United States should withdraw from treaties that have eroded defense capabilities.

https://www.washingtonpost.com/world/national-security/donald-trump-says-he-wants-to-greatly-strengthen-and-expand-us-nuclear-capabilitiy-a-radical-break-from-us-foreign-policy/2016/12/22/52745c22-c86e-11e6-85b5-76616a33048d_story.html?utm_term=.1db715df6977

Nuclear triad

From Wikipedia, the free encyclopedia

A nuclear triad refers to the nuclear weapons delivery of a strategic nuclear arsenal which consists of three basic components: land-based intercontinental ballistic missiles (ICBMs), strategic bombers, and submarine-launched ballistic missiles (SLBMs). The purpose of having a three-branched nuclear capability is to significantly reduce the possibility that an enemy could destroy all of a nation’s nuclear forces in a first-strike attack; this, in turn, ensures a credible threat of a second strike, and thus increases a nation’s nuclear deterrence.[1][2][3]

Other methods of nuclear attacks are nuclear torpedos and the use of hypersonic glide vehicles.

Traditional components of a strategic nuclear triad

While traditional nuclear strategy holds that a nuclear triad provides the best level of deterrence from attack, in reality, most nuclear powers do not have the military budget to sustain a full triad. Only the United States and Russia have maintained nuclear triads for most of the nuclear age.[3] Both the US and the Soviet Union composed their triads along the same lines, including the following components:

  1. Bomber aircraft capable of delivering nuclear bombs (carrier-based or land-based; usually armed with long-range missiles).[1]
  2. Land-based missiles (MRBMs or ICBMs).[1][3]
  3. Ballistic missile submarines (SSBNs). Nuclear missiles launched from ships or submarines.[1][3] Although in early years the US Navy sea leg was carrier aircraft based with a very short period using sub launched cruise missiles such as the Regulus before SLBMs were ready to be deployed.

The triad also gives the commander in chief the flexibility to use different types of weapons for the appropriate strike while also preserving a reserve of nuclear armaments theoretically safe from a counter-force strike:

  • ICBMs allow for a long-range strike launched from a controlled or friendly environment at a lower cost per delivered warhead and easiest targeting from a surveyed geographic location.[4] If launched from a fixed position, such as a missile silo, they are vulnerable to a first strike, though their interception once aloft is substantially difficult,[1][3] Some ICBMs are either rail or road mobile. Medium-range ballistic missiles and ground-launched cruise missiles were also assigned for strategic targets based in nations closer to the potential confrontation, but were eventually forbidden by arms control treaty to the US and Russia.
  • SLBMs, launched from submarines, allow for a greater chance of survival from a first strike, giving the commander a second-strike capability.[1][3] Some long-range submarine-launched cruise missiles are counted towards triad status; this was the first type of submarine-launched strategic second-strike nuclear weapon before ballistic missile submarines became available. A SLBM is the most difficult to get accurate targeting for as it requires obtaining an accurate geographical fix to program targeting data to the missile, the total cost of a SLBM is increased by the cost of the submarine force, large crews and deterrence patrols.[4]
  • Strategic bombers have greater flexibility in their deployment and weaponry. They can serve as both a first- and second-strike weapon. A bomber armed with AGM-129 ACM missiles, for example, could be classified as a first-strike weapon. A number of bombers often with aerial refueling aircraft kept at safe points would constitute a second-strike weapon.[1][3] In some strategic contexts either with nearby potential enemies or with forward basing lighter aircraft can be used on the strategic level as either a first-strike weapon or if dispersed at small airfields or aboard an aircraft carrier can reasonably avoid a counterstrike giving them regional second-strike capacity, aircraft such as the Mirage 2000, F-15E, A-5 Vigilante, Sea Harrier, or FB-111 are or were tasked part or full-time with land or sea-based strategic nuclear attack missions. An aerial refueling fleet supports intercontinental strategic operations both for heavy bombers and smaller aircraft; it also makes possible around the clock airborne standby of bombers and command aircraft making these airborne assets nearly impossible to eliminate in a first strike. Bomber airborne alert patrols are very expensive in terms of fuel and aircraft maintenance, even non-airborne alert basing requires both crew training hours and aircraft upkeep.[4]

Tactical nuclear weapons are used in air, land and sea warfare. Air-to-air missiles and rockets, surface-to-air missiles, and small air-to-ground rockets, bombs, and precision munitions have been developed and deployed with nuclear warheads. Ground forces have included tactical nuclear artillery shells, surface-to-surface rockets, land mines, medium and small man-packable nuclear engineering demolition charges, even man-carried or vehicle-mounted recoilless rifles. Naval forces have carried nuclear-armed naval rocket-assisted and standard depth charges and torpedoes, and naval gunnery shells. Tactical nuclear weapons and the doctrine for their use is primarily for use in a non-strategic warfighting role destroying military forces in the battle area; they are not counted toward triad status despite the possibility of many of these systems being usable as strategic weapons depending on the target.

Triad powers

The following nations are considered fully established triad nuclear powers, they have robust capability to launch a worldwide second strike in all three legs and can disperse their air forces and their sea forces on deterrent patrols. They possess nuclear forces consisting of land-based missiles, ballistic or long-range cruise missile submarines, and strategic bombers or long-range tactical aircraft.

China

Unlike the United States and Russia where strategic nuclear forces are enumerated by treaty limits and subject to verification, China, a nuclear power since 1964, is not subject to these requirements but currently has a triad structure smaller in size compared to Russia and the United States. China’s nuclear force is much smaller than the US or Russia and is closer in number and capability to that of France or the United Kingdom. This force is mainly land-based missiles including ICBMs, IRBMs, and tactical ballistic missiles as well as cruise missiles. Unlike the US and Russia, China stores many of its missiles in huge underground tunnel complexes; U.S. Representative Michael Turner[5] referring to 2009 Chinese media reports said “This network of tunnels could be in excess of 5,000 kilometers (3,110 miles), and is used to transport nuclear weapons and forces,”[6] the Chinese Army newsletter calls this tunnel system an Underground Great Wall of China.[7]

Currently China has one Type 092 submarine that is currently active with JL-1 SLBM according to Office of Naval Intelligence.[8][9] In addition, the PLAN has deployed 4 newer Type 094 submarines and plan to deploy up to 8 of these Jin-class SSBN by the end of 2020.[10][11] The new Type 094 fleet uses the newer JL-2 SLBM. China carried out a series of successful JL-2 launches in 2009,[12] 2012[13][14] and 2015.[15] The United States expect the 094 SSBN to carry out its first deterrent patrol by 2015 with the JL-2 missile active.[10] There is an aged albeit upgraded bomber force consisting of Xian H-6s with an unclear nuclear delivery role. The PLAAF has a limited capability fleet of H-6 bombers modified for aerial refuelling as well as forthcoming Russian Ilyushin Il-78 aerial refuelling tankers.[16] China also introduced a newer and modernized H-6 variant the H-6K with enhanced capabilities such as launching long ranged cruise missile the CJ-10. In addition to the H-6 bomber, there are numerous tactical fighter and fighter bombers such as the: J-16, J-10, JH-7A and Su-30 which all capable of carrying nuclear weapons. China is also developing hypersonic glide vehicles.

India

India completed its nuclear triad with the commissioning of INS Arihant in August 2016.[17][18][19][20][21][22] INS Arihant is a nuclear-powered ballistic missile submarine armed with 12 K-15 missiles with a range of 750 km,[23] which will later be upgraded K-4 missiles with an extended range of 3500 km.[24][25][26] India maintains a no first use nuclear policy and has been developing a nuclear triad capability as a part of its credible minimum deterrence doctrine.[27] India’s nuclear-weapons program possesses surface-to-surface missiles such as the Agni III and Agni IV. In addition, the 5,000–8000 km range Agni-V ICBM was also successfully tested for third time on 31 January 2015[28] and is expected to enter service by 2016.[29] India has nuclear-capable fighter aircraft such as the Dassault Mirage 2000H, Dassault Rafale, Sukhoi Su-30 MKI, MIG-29 and SEPECAT Jaguar. Land and air strike capabilities are under the control of Strategic Forces Command which is a part of Nuclear Command Authority.

Russian Federation

Also a nuclear power,[30] Russia inherited the arsenal of all of the former Soviet states; this consists of silo-based as well as rail and road mobile ICBMs, sea-based SLBMs, strategic bombers, strategic aerial refueling aircraft, and long-range tactical aircraft capable of carrying gravity bombs, standoff missiles, and cruise missiles. The Russian Strategic Rocket Forces have ICBMs capable of delivering nuclear warheads,[citation needed] silo-based R-36M2 (SS-18), silo-based UR-100N (SS-19), mobile RT-2PM “Topol” (SS-25), silo-based RT-2UTTH “Topol M” (SS-27), mobile RT-2UTTH “Topol M” (SS-27), mobile RS-24 “Yars” (SS-29) (Future replacement for R-36 & UR-100N missiles). Russian strategic nuclear submarine forces are equipped with the following SLBM’s, R-29R “Vysota”, NATO name SS-N-18 “Stingray”, RSM-54 R-29RMU “Sineva”, NATO name SS-N-23 “Skiff” and the R-29RMU2.1 “Liner” are in use with the Delta-class submarine, but the RSM-56 R-30 “Bulava”, NATO name SS-NX-32 is under development for the Borei-class submarine. The Russian Long Range Aviation operates supersonic Tupolev Tu-22M, and Tupolev Tu-160 bombers and the long range turboprop powered Tupolev Tu-95, they are all mostly armed with strategic stand off missiles or cruise missiles such as the KH-15 and the KH-55/Kh-102. These bombers and nuclear capable strike aircraft such as the Sukhoi Su-24 are supported by Ilyushin Il-78 aerial refuelling aircraft. The USSR was required to destroy its stock of IRBMs in accordance with the INF treaty. In addition to the nuclear triad Russia is also developing nuclear torpedos and hypersonic glide vehicles.

United States

The United States operates Minuteman ICBMs from underground hardened silos, Trident SLBMs carried by Ohio-class submarines, it also operates B-52, B-2 strategic bombers, as well as land-based tactical aircraft, some capable of carrying strategic and tactical B61 and large strategic B83 gravity bombs, and AGM-86 ALCMs. While the US no longer keeps nuclear armed bombers on airborne alert, it has the ability to do so, along with the airborne nuclear command and control aircraft with its fleet of KC-10 and KC-135 aerial refueling planes. Previous to development of submarine-launched ballistic missiles, the US Navy strategic nuclear role was provided by aircraft carrier–based bombers and, for a short time, submarine-launched cruise missiles. With the end of the cold war, the US never deployed the rail-mobile version of the Peacekeeper ICBM or the road mobile Midgetman small ICBM. The US destroyed its stock of road-mobile Pershing II IRBMs and ground-launched cruise missiles in accordance with the INF treaty. The US also has shared strategic nuclear weapons and still deploys shared tactical nuclear weapons to some NATO countries.[1][3][31]

Former triad powers

France

A former triad power, the French Force de frappe possesses sea-based and air-based nuclear forces through the Triomphant-class ballistic missile submarines deployed with M45 intercontinental SLBMs armed with multiple warheads, nuclear capable Dassault Rafale F3 and Dassault Mirage 2000N fighter aircraft (armed with Air-Sol Moyenne Portée) which replaced the long-range Dassault Mirage IV supersonic nuclear bomber and KC-135 aerial refuelling tankers in its inventory. France had S2 and then S3 silo based strategic nuclear IRBMs, the S3 with a 3,500 km range, but these have been phased out of service since the dissolution of the USSR. France operates aircraft with a nuclear strike role from its aircraft carrier.

Non-triad powers

Non-triad powers are nuclear armed nations which have never developed a strategic nuclear delivery triad.

North Korea

North Korea has claimed to have indigenous nuclear weapons technology since a large underground explosion was detected in 2006. The DPRK has both aircraft and missiles which may be tasked to deliver nuclear weapons. The North Korean missile program is largely based on domestically produced variants of the Soviet Scud missile, some of which are sufficiently powerful to attempt satellite launch. The DPRK also has short-range ballistic missiles and cruise missiles. Western researchers believe the current generation of the DPRK’s suspected nuclear weapons are too large to be fitted to the country’s existing missile stock.[32]

Pakistan

Pakistan does not have an active nuclear triad. Its nuclear weapons are primarily land-based. The Minimum Credible Deterrence (MCD) is a defense and strategic principle on which the atomic weapons program of Pakistan is based.[33] This doctrine is not a part of the nuclear doctrine, which is designed for the use of the atomic weapons in a full-scale declared war if the conditions of the doctrine are surpassed.[34] Instead, the MCD policy falls under minimal deterrence as an inverse to Mutually Assured Destruction (MAD).[35] In August 2012, The Economist magazine wrote an article stating that Pakistan was an emerging nuclear triad state. Pakistani plans of responding to any capture or pre-emptive destruction of their nuclear defences seems to be one reason why they are determined to develop a third leg, after air- and land-based delivery systems, to Pakistan’s nuclear triad, consisting of nuclear-armed ships and submarines. As Iskander Rehman of the Carnegie Endowment, a think-tank, observes in a recent paper, Pakistani nuclear expansion and methods of delivery is drifting “from the dusty plains of the Punjab into the world’s most congested shipping lanes… It is only a matter of time before Pakistan formally brings nuclear weapons into its own fleet.”[36]

Pakistan possesses several ballistic missiles such as the Shaheen-1A and the Shaheen-II, missiles having ranges of 900 km and 2000 km respectively. They also contain systems said to be capable of carrying several nuclear warheads as well as being designed to evade missile-defense systems.[37][38] Pakistan also possesses the Babur cruise missile with a range up to 700 km. These land-based missiles are controlled by Army Strategic Forces Command of the Pakistan Army.

The PAF has two dedicated units (the No. 16 Black Panthers and the No. 26 Black Spiders) operating 18 aircraft in each squadron of the JF-17 Thunder, believed to be the preferred vehicle for delivery of nuclear weapons.[39] These units are a major part of the Air Force Strategic Command, a command responsible for nuclear response. The PAF also operates a fleet of F-16 fighters, of which 18 were delivered in 2012 and, as confirmed by General Ashfaq Parvez Kayani, are capable of carrying nuclear weapons.[40] The PAF also possesses the Ra’ad air-launched cruise missile which has a range of 350 km and can carry a nuclear warhead with a yield of between 10 kilotons to 35 kilotons.[41]

In 2004, the Pakistan Navy established the Naval Strategic Forces Command and made it responsible for countering and battling naval-based weapons of mass destruction. It is believed by most experts that Pakistan is developing a sea-based variant of the Hatf VII Babur, which is a nuclear-capable ground-launched cruise missile.[42]

United Kingdom

The UK never rolled out its own land based missile nuclear delivery system. It only possesses sea-based nuclear forces through its Royal Navy Vanguard-class ballistic missile submarines, deployed with Trident II intercontinental SLBMs armed with multiple warheads. The Royal Air Force used to operate V bomber strategic bombers throughout the Cold War and continued airborne delivery using Tornado and Jaguar aircraft until the late 1990s. The planned UK silo-based IRBM, the Blue Streak missile, was cancelled as it was not seen as a credible deterrent, considering the population density of areas in the UK geologically suited for missile silos. The tactical Corporal surface-to-surface missile was operated by the British Army. The American made intermediate range Thor missile aimed at Soviet targets was operated briefly by the RAF but before the arrival of the Polaris SLBM. Previously having a nuclear strike mission for carrier-based Buccaneer attack aircraft and later Sea Harriers, the UK no longer deploys nuclear weapons for delivery by carrier-based naval aircraft or any other means other than the Vanguard submarine-launched Trident SLBM.

Suspected triad powers

Main articles: Jericho (missile), Popeye Turbo, and F-15I

Israel has been reported in congressional testimony by the US Department of Defense of having aircraft-delivered nuclear weapons as early as the mid-1960s, a demonstrated missile-based force since the mid-1960s, an IRBM in the mid-1980s, an ICBM in the early 2000s[43] and the suspected second-strike capability arrived with the Dolphin-class submarine and Popeye Turbo submarine-launched cruise missile. Israel is suspected of using their inventory of nuclear-capable fighter aircraft such as the long-range F-15E Strike Eagle, F-16 and formerly the F-4 Phantom, Dassault Mirage III, A-4 Skyhawk and Nesher. Israel has appreciable and growing numbers of long-range tanker aircraft and aerial refueling capacity on its long-range fighter-bomber aircraft, this capacity was used in the 1985 long-range conventional strike against the PLO in Tunisia.[44] Jane’s Defence Weekly reports that the Israeli Dolphin-class submarines are widely believed to be nuclear armed, offering Israel a second-strike capability with a demonstrated range of at least 1500 km in a 2002 test.[45][46] According to an official report which was submitted to the American congress in 2004,[43] it may be that with a payload of 1,000 kg the Jericho 3 gives Israel nuclear strike capabilities within the entire Middle East, Africa, Europe, Asia and almost all parts of North America, as well as within large parts of South America and North Oceania, Israel also has the regional reach of its Jericho 2 IRBM force. The existence of a nuclear force is often hinted at blatantly and evidence of an advanced weapons program including miniaturized and thermonuclear devices has been presented, especially the extensive photographic evidence given by former Israeli nuclear weapons assembler Mordechai Vanunu. There have been incidents where Israel has been suspected of testing, but so far Israel for diplomatic reasons has not openly admitted to having operational nuclear weapons, and so is only a suspect triad state.

Other nuclear delivery systems

Air Mobile ICBM Feasibility Demonstration—24 October 1974

There is nothing in nuclear strategy to mandate only these three delivery systems. For example, orbital weapons or spacecraft for purposes of orbital bombardment using nuclear devices have been developed and silo deployed by the USSR from 1969 to 1983, these would not fit into the categories listed above. However, actual space-based weapon systems used for weapons of mass destruction have been banned under the Outer Space Treaty and launch ready deployment for the US and former USSR by the SALT II treaty. Another example is the US, UK, and France do or have previously included a strategic nuclear strike mission for carrier-based aircraft, which especially in the past were far harder to track and target with ICBMs or strategic nuclear bombers than fixed bomber or missile bases, permitting some second-strike flexibility; this was the first sea-based deterrent before the SLBM. The US and UK jointly explored an air-launched strategic ballistic nuclear missile, the Skybolt, but canceled the program in favor of submarine-based missiles. In 1974 a Lockheed C-5 Galaxy successfully tested an air launch of a Minuteman ICBM; this system was not deployed, but was used as a bargaining point in the SALT treaty negotiations with the USSR.

See also

https://en.wikipedia.org/wiki/Nuclear_triad

Read Full Post | Make a Comment ( None so far )

Trump Rattles The American Okie Doke Obama Into Stuttering Empty Suit –The Great Pretender — The Truth Hurts — Get Out of Our Lives — Roll It Back To A Full Employment Growing Booming Economy with 67% Labor Participation Rate and Less Than 3% Unemployment Rate — Make America Great Again — Catch Me If You Can — Videos

Posted on June 4, 2016. Filed under: American History, Articles, Babies, Banking, Blogroll, Business, College, Communications, Congress, Constitution, Corruption, Crime, Culture, Documentary, Economics, Education, Elections, Employment, Entertainment, Faith, Family, Federal Government, Federal Government Budget, Films, Fiscal Policy, Foreign Policy, Freedom, Friends, government, government spending, Health Care, history, Illegal, Immigration, Internal Revenue Service (IRS), Investments, IRS, Language, Law, Legal, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, Monetary Policy, Money, Money, Movies, Narcissism, Newspapers, Obamacare, People, Philosophy, Photos, Police, Politics, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Resources, Security, Strategy, Talk Radio, Tax Policy, Taxation, Taxes, Television, Television, Television, The Pronk Pops Show, Unemployment, Video, War, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 691: June 2, 2016

Pronk Pops Show 690: June 1, 2016

Pronk Pops Show 689: May 31, 2016

Pronk Pops Show 688: May 27, 2016

Pronk Pops Show 687: May 26, 2016

Pronk Pops Show 686: May 25, 2016

Pronk Pops Show 685: May 24, 2016

Pronk Pops Show 684: May 23, 2016

Pronk Pops Show 683: May 20, 2016

Pronk Pops Show 682: May 19, 2016

Pronk Pops Show 681: May 17, 2016

Pronk Pops Show 680: May 16, 2016

Pronk Pops Show 679: May 13, 2016

Pronk Pops Show 678: May 12, 2016

Pronk Pops Show 677: May 11, 2016

Pronk Pops Show 676: May 10, 2016

Pronk Pops Show 675: May 9, 2016

Pronk Pops Show 674: May 6, 2016

Pronk Pops Show 673: May 5, 2016

Pronk Pops Show 672: May 4, 2016

Pronk Pops Show 671: May 3, 2016

Pronk Pops Show 670: May 2, 2016

Pronk Pops Show 669: April 29, 2016

Pronk Pops Show 668: April 28, 2016

Pronk Pops Show 667: April 27, 2016

Pronk Pops Show 666: April 26, 2016

Pronk Pops Show 665: April 25, 2016

Pronk Pops Show 664: April 24, 2016

Pronk Pops Show 663: April 21, 2016

Pronk Pops Show 662: April 20, 2016

Pronk Pops Show 661: April 19, 2016

Pronk Pops Show 660: April 18, 2016

Pronk Pops Show 659: April 15, 2016

Pronk Pops Show 658: April 14, 2016

Pronk Pops Show 657: April 13, 2016

Pronk Pops Show 656: April 12, 2016

Pronk Pops Show 655: April 11, 2016

Pronk Pops Show 654: April 8, 2016

Pronk Pops Show 653: April 7, 2016

Pronk Pops Show 652: April 6, 2016

Pronk Pops Show 651: April 4, 2016

Pronk Pops Show 650: April 1, 2016

Pronk Pops Show 649: March 31, 2016

Pronk Pops Show 648: March 30, 2016

Pronk Pops Show 647: March 29, 2016

Pronk Pops Show 646: March 28, 2016

Pronk Pops Show 645: March 24, 2016

Pronk Pops Show 644: March 23, 2016

Pronk Pops Show 643: March 22, 2016

Pronk Pops Show 642: March 21, 2016

Pronk Pops Show 641: March 11, 2016

Pronk Pops Show 640: March 10, 2016

Pronk Pops Show 639: March 9, 2016

Pronk Pops Show 638: March 8, 2016

Pronk Pops Show 637: March 7, 2016

Pronk Pops Show 636: March 4, 2016

Pronk Pops Show 635: March 3, 2016

Pronk Pops Show 634: March 2, 2016

Pronk Pops Show 633: March 1, 2016

Story 1: Trump Rattles The American Okie Doke Obama Into Stuttering Empty Suit –The Great Pretender — The Truth Hurts — Get Out of Our Lives — Roll It Back To A Full Employment Growing Booming Economy with 67% Labor Participation Rate and Less Than 3% Unemployment Rate — Make America Great Again — Catch Me If You Can — Videos

-A joke played on someone. Someone getting played for a fool.

-Also, someone who is fake or is a joke.

“I felt like a dumbass when that nigga hit me with the okie doke.”

“I keep it real homeboy. I ain’t no okie doke.”

Psychological projection is a theory in psychology in which humans defend themselves against their own unpleasant impulses by denying their existence while attributing them to others. For example, a person who is habitually rude may constantly accuse other people of being rude. It incorporates blame shifting.

Immigration moderation. Before any new green cards are issued to foreign workers abroad, there will be a pause where employers will have to hire from the domestic pool of unemployed immigrant and native workers. This will help reverse women’s plummeting workplace participation rate, grow wages, and allow record immigration levels to subside to more moderate historical averages.

https://www.donaldjtrump.com/positions/immigration-reform

sgs-empLabor-force-participation-under-Obama the-labor-force-participation-rate-tanked--heres-the-not-so-scary-reason-why 1606-Labor-Force-Participation Participation Rate1 U.S.-Nonfarm-Payrolls

George Carlin – The American Okie Doke

U.S. Labor Participation Rate – Graph of Reagan vs obama

Obama Tries to Trash Donald Trump and Turns into a Stuttering Mess

Obama attacks Trump in Indiana speech but won’t use his name

Obama Busts GOP Economic Myths

Obama takes a victory lap over Elkhart, Indiana’s resurgence

Why doesn’t Obama say Donald Trump’s name?

The Great Pretender Obama Says Don’t Fall For The Okie-Doke

No Help Wanted – Labor Participation Rate Lowest Since 1977 – Fox & Friends.

Labor participation has hit a 38-year low, and that’s a problem

Labor participation rate is down to unprecedented levels

Unemployment and the Unemployment Rate

Types of Unemployment

Top 10 Greatest Con Artists in Movies

Catch me if you can best scenes

Catch Me If You Can Movie- Check Fraud

Catch Me If You Can Trailer

To Tell the Truth: Frank William Abagnale Jr. (1977)

The Real Frank Abagnale, “Catch me if you can” man – CNN Red Chair

Catch Me If You Can: Frank Abagnale’s Story

Frank Abagnale, who evolved from being a brilliant young mastermind of international deception and fraud into one of the world’s most respected authorities on forgery and embezzlement, tells his life story. His intercontinental saga prompted Steven Spielberg to turn Abagnale’s life into the movie Catch Me If You Can starring Leonardo DiCaprio.

The Platters – The Great Pretender – HD (1955)

Data extracted on: June 2, 2016 (4:31:21 PM)

Labor Force Statistics from the Current Population Survey

Series Id:           LNS11300000
Seasonally Adjusted
Series title:        (Seas) Labor Force Participation Rate
Labor force status:  Civilian labor force participation rate
Type of data:        Percent or rate
Age:                 16 years and over

Download:
Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
1980 64.0 64.0 63.7 63.8 63.9 63.7 63.8 63.7 63.6 63.7 63.8 63.6
1981 63.9 63.9 64.1 64.2 64.3 63.7 63.8 63.8 63.5 63.8 63.9 63.6
1982 63.7 63.8 63.8 63.9 64.2 63.9 64.0 64.1 64.1 64.1 64.2 64.1
1983 63.9 63.8 63.7 63.8 63.7 64.3 64.1 64.3 64.3 64.0 64.1 64.1
1984 63.9 64.1 64.1 64.3 64.5 64.6 64.6 64.4 64.4 64.4 64.5 64.6
1985 64.7 64.7 64.9 64.9 64.8 64.6 64.7 64.6 64.9 65.0 64.9 65.0
1986 64.9 65.0 65.1 65.1 65.2 65.4 65.4 65.3 65.4 65.4 65.4 65.3
1987 65.4 65.5 65.5 65.4 65.7 65.5 65.6 65.7 65.5 65.7 65.7 65.7
1988 65.8 65.9 65.7 65.8 65.7 65.8 65.9 66.1 65.9 66.0 66.2 66.1
1989 66.5 66.3 66.3 66.4 66.3 66.5 66.5 66.5 66.4 66.5 66.6 66.5
1990 66.8 66.7 66.7 66.6 66.6 66.4 66.5 66.5 66.4 66.4 66.4 66.4
1991 66.2 66.2 66.3 66.4 66.2 66.2 66.1 66.0 66.2 66.1 66.1 66.0
1992 66.3 66.2 66.4 66.5 66.6 66.7 66.7 66.6 66.5 66.2 66.3 66.3
1993 66.2 66.2 66.2 66.1 66.4 66.5 66.4 66.4 66.2 66.3 66.3 66.4
1994 66.6 66.6 66.5 66.5 66.6 66.4 66.4 66.6 66.6 66.7 66.7 66.7
1995 66.8 66.8 66.7 66.9 66.5 66.5 66.6 66.6 66.6 66.6 66.5 66.4
1996 66.4 66.6 66.6 66.7 66.7 66.7 66.9 66.7 66.9 67.0 67.0 67.0
1997 67.0 66.9 67.1 67.1 67.1 67.1 67.2 67.2 67.1 67.1 67.2 67.2
1998 67.1 67.1 67.1 67.0 67.0 67.0 67.0 67.0 67.2 67.2 67.1 67.2
1999 67.2 67.2 67.0 67.1 67.1 67.1 67.1 67.0 67.0 67.0 67.1 67.1
2000 67.3 67.3 67.3 67.3 67.1 67.1 66.9 66.9 66.9 66.8 66.9 67.0
2001 67.2 67.1 67.2 66.9 66.7 66.7 66.8 66.5 66.8 66.7 66.7 66.7
2002 66.5 66.8 66.6 66.7 66.7 66.6 66.5 66.6 66.7 66.6 66.4 66.3
2003 66.4 66.4 66.3 66.4 66.4 66.5 66.2 66.1 66.1 66.1 66.1 65.9
2004 66.1 66.0 66.0 65.9 66.0 66.1 66.1 66.0 65.8 65.9 66.0 65.9
2005 65.8 65.9 65.9 66.1 66.1 66.1 66.1 66.2 66.1 66.1 66.0 66.0
2006 66.0 66.1 66.2 66.1 66.1 66.2 66.1 66.2 66.1 66.2 66.3 66.4
2007 66.4 66.3 66.2 65.9 66.0 66.0 66.0 65.8 66.0 65.8 66.0 66.0
2008 66.2 66.0 66.1 65.9 66.1 66.1 66.1 66.1 66.0 66.0 65.9 65.8
2009 65.7 65.8 65.6 65.7 65.7 65.7 65.5 65.4 65.1 65.0 65.0 64.6
2010 64.8 64.9 64.9 65.2 64.9 64.6 64.6 64.7 64.6 64.4 64.6 64.3
2011 64.2 64.1 64.2 64.2 64.1 64.0 64.0 64.1 64.2 64.1 64.1 64.0
2012 63.7 63.8 63.8 63.7 63.7 63.8 63.7 63.5 63.7 63.8 63.6 63.7
2013 63.6 63.4 63.3 63.4 63.4 63.4 63.3 63.2 63.3 62.8 63.0 62.9
2014 62.9 63.0 63.2 62.8 62.8 62.8 62.9 62.9 62.8 62.9 62.9 62.7
2015 62.9 62.8 62.7 62.7 62.8 62.6 62.6 62.6 62.4 62.5 62.5 62.6
2016 62.7 62.9 63.0 62.8

Series Id:           LNS14000000
Seasonally Adjusted
Series title:        (Seas) Unemployment Rate
Labor force status:  Unemployment rate
Type of data:        Percent or rate
Age:                 16 years and over

Download:
Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
1980 6.3 6.3 6.3 6.9 7.5 7.6 7.8 7.7 7.5 7.5 7.5 7.2
1981 7.5 7.4 7.4 7.2 7.5 7.5 7.2 7.4 7.6 7.9 8.3 8.5
1982 8.6 8.9 9.0 9.3 9.4 9.6 9.8 9.8 10.1 10.4 10.8 10.8
1983 10.4 10.4 10.3 10.2 10.1 10.1 9.4 9.5 9.2 8.8 8.5 8.3
1984 8.0 7.8 7.8 7.7 7.4 7.2 7.5 7.5 7.3 7.4 7.2 7.3
1985 7.3 7.2 7.2 7.3 7.2 7.4 7.4 7.1 7.1 7.1 7.0 7.0
1986 6.7 7.2 7.2 7.1 7.2 7.2 7.0 6.9 7.0 7.0 6.9 6.6
1987 6.6 6.6 6.6 6.3 6.3 6.2 6.1 6.0 5.9 6.0 5.8 5.7
1988 5.7 5.7 5.7 5.4 5.6 5.4 5.4 5.6 5.4 5.4 5.3 5.3
1989 5.4 5.2 5.0 5.2 5.2 5.3 5.2 5.2 5.3 5.3 5.4 5.4
1990 5.4 5.3 5.2 5.4 5.4 5.2 5.5 5.7 5.9 5.9 6.2 6.3
1991 6.4 6.6 6.8 6.7 6.9 6.9 6.8 6.9 6.9 7.0 7.0 7.3
1992 7.3 7.4 7.4 7.4 7.6 7.8 7.7 7.6 7.6 7.3 7.4 7.4
1993 7.3 7.1 7.0 7.1 7.1 7.0 6.9 6.8 6.7 6.8 6.6 6.5
1994 6.6 6.6 6.5 6.4 6.1 6.1 6.1 6.0 5.9 5.8 5.6 5.5
1995 5.6 5.4 5.4 5.8 5.6 5.6 5.7 5.7 5.6 5.5 5.6 5.6
1996 5.6 5.5 5.5 5.6 5.6 5.3 5.5 5.1 5.2 5.2 5.4 5.4
1997 5.3 5.2 5.2 5.1 4.9 5.0 4.9 4.8 4.9 4.7 4.6 4.7
1998 4.6 4.6 4.7 4.3 4.4 4.5 4.5 4.5 4.6 4.5 4.4 4.4
1999 4.3 4.4 4.2 4.3 4.2 4.3 4.3 4.2 4.2 4.1 4.1 4.0
2000 4.0 4.1 4.0 3.8 4.0 4.0 4.0 4.1 3.9 3.9 3.9 3.9
2001 4.2 4.2 4.3 4.4 4.3 4.5 4.6 4.9 5.0 5.3 5.5 5.7
2002 5.7 5.7 5.7 5.9 5.8 5.8 5.8 5.7 5.7 5.7 5.9 6.0
2003 5.8 5.9 5.9 6.0 6.1 6.3 6.2 6.1 6.1 6.0 5.8 5.7
2004 5.7 5.6 5.8 5.6 5.6 5.6 5.5 5.4 5.4 5.5 5.4 5.4
2005 5.3 5.4 5.2 5.2 5.1 5.0 5.0 4.9 5.0 5.0 5.0 4.9
2006 4.7 4.8 4.7 4.7 4.6 4.6 4.7 4.7 4.5 4.4 4.5 4.4
2007 4.6 4.5 4.4 4.5 4.4 4.6 4.7 4.6 4.7 4.7 4.7 5.0
2008 5.0 4.9 5.1 5.0 5.4 5.6 5.8 6.1 6.1 6.5 6.8 7.3
2009 7.8 8.3 8.7 9.0 9.4 9.5 9.5 9.6 9.8 10.0 9.9 9.9
2010 9.8 9.8 9.9 9.9 9.6 9.4 9.4 9.5 9.5 9.4 9.8 9.3
2011 9.1 9.0 9.0 9.1 9.0 9.1 9.0 9.0 9.0 8.8 8.6 8.5
2012 8.3 8.3 8.2 8.2 8.2 8.2 8.2 8.1 7.8 7.8 7.7 7.9
2013 8.0 7.7 7.5 7.6 7.5 7.5 7.3 7.3 7.3 7.2 6.9 6.7
2014 6.6 6.7 6.7 6.2 6.2 6.1 6.2 6.2 6.0 5.7 5.8 5.6
2015 5.7 5.5 5.5 5.4 5.5 5.3 5.3 5.1 5.1 5.0 5.0 5.0
2016 4.9 4.9 5.0 5.0

Series Id:           LNS13327709
Seasonally Adjusted
Series title:        (seas) Total unemployed, plus all marginally attached workers plus total employed part time for economic reasons, as a percent of all civilian labor force plus all marginally attached workers
Labor force status:  Aggregated totals unemployed
Type of data:        Percent or rate
Age:                 16 years and over
Percent/rates:       Unemployed and mrg attached and pt for econ reas as percent of labor force plus marg attached

Download:
Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Annual
1994 11.8 11.4 11.4 11.2 10.8 10.9 10.7 10.5 10.4 10.3 10.1 10.0
1995 10.2 9.9 9.9 10.0 10.0 10.1 10.1 10.0 10.1 9.9 10.0 10.0
1996 9.8 10.0 9.8 9.9 9.7 9.6 9.7 9.3 9.4 9.4 9.3 9.5
1997 9.4 9.4 9.1 9.2 8.8 8.8 8.6 8.6 8.7 8.4 8.3 8.4
1998 8.4 8.4 8.4 7.9 7.9 8.0 8.1 7.9 7.9 7.8 7.6 7.6
1999 7.7 7.7 7.6 7.6 7.4 7.5 7.5 7.3 7.4 7.2 7.1 7.1
2000 7.1 7.2 7.1 6.9 7.1 7.0 7.0 7.1 7.0 6.8 7.1 6.9
2001 7.3 7.4 7.3 7.4 7.5 7.9 7.8 8.1 8.7 9.3 9.4 9.6
2002 9.5 9.5 9.4 9.7 9.5 9.5 9.6 9.6 9.6 9.6 9.7 9.8
2003 10.0 10.2 10.0 10.2 10.1 10.3 10.3 10.1 10.4 10.2 10.0 9.8
2004 9.9 9.7 10.0 9.6 9.6 9.5 9.5 9.4 9.4 9.7 9.4 9.2
2005 9.3 9.3 9.1 8.9 8.9 9.0 8.8 8.9 9.0 8.7 8.7 8.6
2006 8.4 8.4 8.2 8.1 8.2 8.4 8.5 8.4 8.0 8.2 8.1 7.9
2007 8.4 8.2 8.0 8.2 8.2 8.3 8.4 8.4 8.4 8.4 8.4 8.8
2008 9.2 9.0 9.1 9.2 9.7 10.1 10.5 10.8 11.0 11.8 12.6 13.6
2009 14.2 15.2 15.8 15.9 16.5 16.5 16.4 16.7 16.7 17.1 17.1 17.1
2010 16.7 17.0 17.1 17.1 16.6 16.4 16.4 16.5 16.8 16.6 16.9 16.6
2011 16.2 16.0 15.9 16.1 15.8 16.1 15.9 16.1 16.4 15.8 15.5 15.2
2012 15.2 15.0 14.6 14.6 14.8 14.8 14.8 14.6 14.8 14.4 14.4 14.4
2013 14.5 14.3 13.8 14.0 13.8 14.2 13.8 13.6 13.7 13.7 13.1 13.1
2014 12.7 12.6 12.6 12.3 12.1 12.0 12.2 12.0 11.8 11.5 11.4 11.2
2015 11.3 11.0 10.9 10.8 10.7 10.5 10.4 10.3 10.0 9.8 9.9 9.9
2016 9.9 9.7 9.8 9.7

Obama in Elkhart: Voters should beware of politicians ‘preying’ on economic fears

President Barack Obama says people should beware of politicians who are “preying” on Americans’ anxieties about the economy in a bid to win headlines and votes.

Obama isn’t naming names. But he says some politicians are running on anti-trade, anti-immigrant policies in an effort to play to people’s fears.

Obama made the remarks during a visit to Elkhart, Indiana. He’s holding up the manufacturing community as a symbol of the nation’s climb from recession to recovery.

Obama says his administration’s “smart” decisions played a part in helping Elkhart come back. He says he wants to bust “myths” that Democratic policies are bad for the economy.

Indiana’s Republican governor, Mike Pence, says Elkhart had rebounded “in spite of Obama’s policies” and that those policies inflicted onerous federal burdens on Indiana.

To Obama, lingering challenges aren’t enough to forestall a planned victory lap. Arguing that his controversial $840 billion stimulus package was ultimately vindicated, Obama will call on the next president to be willing to spend big to enable further economic growth.

The president is making his eighth visit to the state since taking office in January 2009. Here are details on the visits:

  • Feb. 2, 2009: Travels to Elkhart for his first event outside the Washington area since taking office 13 days earlier and speaks about his economic stimulus plan at Concord High School as Elkhart County’s unemployment rate was about 15 percent.
  • May 17, 2009: Delivers commencement address at the University of Notre Dame in South Bend, an appearance that drew weeks of criticism from many Catholic bishops and abortion opponents. Then travels to Indianapolis for two Democratic Party fundraisers.
  • Aug. 5, 2009: Visits Monaco RV factory in Wakarusa and announces $2.4 billion in grants for electric car production.
  • Nov. 23, 2010: Obama and Vice President Joe Biden both fly into Grissom Air Reserve Base then travel to a Chrysler transmission factory in Kokomo, where Obama promotes the U.S. auto industry revival.
  • May 6, 2011: Travels to an Allison Transmission factory in Indianapolis and speaks about how the hybrid transmissions made there can help reduce the country’s need for imported oil.
  • Oct. 3, 2014: Travels to Millennium Steel Services, a minority-owned steel processor near Princeton, and speaks about the nation’s manufacturing gains and the improving U.S. economy.
  • Feb. 6, 2015: Visits an Ivy Tech Community College campus in Indianapolis to tout his proposal for offering two years of college free.
  • June 1, 2016: Scheduled to speak about the economy at Concord Community High School in Elkhart and then take part in a PBS town hall at Elkhart’s Lerner Theatre.

Obama in Elkhart: Voters should beware of politicians ‘preying’ on economic fears

Psychological projection

From Wikipedia, the free encyclopedia
Part of a series of articles on
Psychoanalysis
Unofficial psychoanalysis symbol

Psychological projection is a theory in psychology in which humans defend themselves against their own unpleasant impulses by denying their existence while attributing them to others.[1] For example, a person who is habitually rudemay constantly accuse other people of being rude. It incorporates blame shifting.

According to some research, the projection of one’s negative qualities onto others is a common process in everyday life.[2]

Historical precursors

A prominent precursor in the formulation of the projection principle was Giambattista Vico,[3][4] and an early formulation of it is found in ancient Greek writer Xenophanes, which observed that “the gods of Ethiopians were inevitably black with flat noses while those of the Thracians were blond with blue eyes.”[citation needed] In 1841, Ludwig Feuerbach was the first to employ this concept as the basis for a systematic critique of religion.[5][6][7]

Psychoanalytic developments

Projection (German: Projektion) was conceptualised by Freud in his letters to Wilhelm Fliess,[8] and further refined by Karl Abraham and Anna Freud. Freud considered that in projection thoughts, motivations, desires, and feelings that cannot be accepted as one’s own are dealt with by being placed in the outside world and attributed to someone else.[9] What the ego repudiates is split off and placed in another.[10]

Freud would later come to believe that projection did not take place arbitrarily, but rather seized on and exaggerated an element that already existed on a small scale in the other person.[11] (The related defence of projective identification differs from projection in that there the other person is expected to become identified with the impulse or desire projected outside,[12] so that the self maintains a connection with what is projected, in contrast to the total repudiation of projection proper.)[13]

Melanie Klein saw the projection of good parts of the self as leading potentially to over-idealisation of the object.[14] Equally, it may be one’s conscience that is projected, in an attempt to escape its control: a more benign version of this allows one to come to terms with outside authority.[15]

Theoretical examples

Projection tends to come to the fore in normal people at times of crisis, personal or political[16] but is more commonly found in the neurotic or psychotic[17] in personalities functioning at a primitive level as in narcissistic personality disorder or borderline personality disorder.[18]

Carl Jung considered that the unacceptable parts of the personality represented by the Shadow archetype were particularly likely to give rise to projection, both small-scale and on a national/international basis.[19] Marie-Louise Von Franz extended her view of projection, stating that “wherever known reality stops, where we touch the unknown, there we project an archetypal image”.[20]

Psychological projection is one of the medical explanations of bewitchment used to explain the behavior of the afflicted children at Salem in 1692. The historian John Demos asserts that the symptoms of bewitchment experienced by the afflicted girls were due to the girls undergoing psychological projection of repressed aggression.[21]

Practical examples

  • Victim blaming: The victim of someone else’s accident or bad luck may be offered criticism, the theory being that the victim may be at fault for having attracted the other person’s hostility.[22]
  • Projection of marital guilt: Thoughts of infidelity to a partner may be unconsciously projected in self-defence on to the partner in question, so that the guiltattached to the thoughts can be repudiated or turned to blame instead, in a process linked to denial.[23]
  • Bullying: A bully may project his/her own feelings of vulnerability onto the target(s) of the bullying activity. Despite the fact that a bully’s typically denigrating activities are aimed at the bully’s targets, the true source of such negativity is ultimately almost always found in the bully’s own sense of personal insecurityand/or vulnerability.[24] Such aggressive projections of displaced negative emotions can occur anywhere from the micro-level of interpersonal relationships, all the way up through to the macro-level of international politics, or even international armed conflict.[19]
  • Projection of general guilt: Projection of a severe conscience[25] is another form of defence, one which may be linked to the making of false accusations, personal or political.[19]
  • Projection of hope: Also, in a more positive light, a patient may sometimes project his or her feelings of hope onto the therapist.[26]

Counter-projection

Jung wrote, “All projections provoke counter-projection when the object is unconscious of the quality projected upon it by the subject.”[27] Thus, what is unconscious in the recipient will be projected back onto the projector, precipitating a form of mutual acting out.[28]

In a rather different usage, Harry Stack Sullivan saw counter-projection in the therapeutic context as a way of warding off the compulsive re-enactment of apsychological trauma, by emphasising the difference between the current situation and the projected obsession with the perceived perpetrator of the original trauma.[29]

Clinical approaches

Drawing on Gordon Allport‘s idea of the expression of self onto activities and objects, projective techniques have been devised to aid personality assessment, including the Rorschach ink-blots and the Thematic Apperception Test (TAT).[30]

Projection may help a fragile ego reduce anxiety, but at the cost of a certain dissociation, as in dissociative identity disorder.[31] In extreme cases, an individual’s personality may end up becoming critically depleted.[32] In such cases, therapy may be required which would include the slow rebuilding of the personality through the “taking back” of such projections.[33]

Criticism

Some studies were critical of Freud’s theory. Research supports the existence of a false-consensus effect whereby humans have a broad tendency to believe that others are similar to themselves, and thus “project” their personal traits onto others. This applies to good traits as well as bad traits and is not a defense mechanism for denying the existence of the trait within the self.[34]

Instead, Newman, Duff, and Baumeister (1997) proposed a new model of defensive projection. In this view, people try to suppress thoughts of their undesirable traits, and these efforts make those trait categories highly accessible—so that they are then used all the more often when forming impressions of others. The projection is then only a by-product of the real defensive mechanism.[35]

See also

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 685-691

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Alan Bennet — The History Boys — Videos

Posted on April 20, 2016. Filed under: Art, Art, Blogroll, Books, College, Comedy, Communications, Education, Entertainment, Faith, Family, Fiction, Films, High School, history, Language, liberty, Life, Links, Literature, media, Movies, Music, Music, People, Photos, Plays, Poetry, Raves, Video, Wisdom, Writing | Tags: , , , , , , , , |

alan bennet reading momentsthe history Boysfilm the history boys

THE HISTORY BOYS FROM STAGE TO SCREEN

The History Boys – Trailer

2006 The History Boys

Theater Talk: Alan Bennett on “The History Boys”

Theater Talk: Actor Richard Griffiths of “The History Boys”; Bob Martin of “The Drowsy Chaperone”

Alan Bennett in conversation: part one

Alan Bennett in conversation: part two

Alan Bennett The Lady in The Van Interview

A Chip in the Sugar – Alan Bennett – Talking Heads

Alan Bennett – Sunset Across the Bay (TV Play 1975)

Alan Bennett – Telegram

Alan Bennett & John Fortune: “Men’s Talk”

Peter Cook, Dudley Moore, Alan Bennett and Jonathan Miller

Oxbridge Philosophy – Alan Bennett & Jonathan Miller

The Lady In The Van – Alan Bennett Featurette – Starring Maggie Smith – At Cinemas Now

The Lady In The Van Trailer #2 – Starring Maggie Smith – At Cinemas November 13

Maggie Smith

Dame Margaret Natalie Smith, CH DBE (born 28th December 1934) is an English actress. She made her stage debut in 1952 and has had an extensive, varied career in stage, film and television spanning over sixty years. Smith has appeared in over 50 films and is one of Britain’s most recognisable actresses. She was appointed Dame Commander of the Order of the British Empire (DBE) in the 1990 New Year Honours for services to the performing arts, and Member of the Order of the Companions of Honour (CH) in the 2014 Birthday Honours for services to drama.

Dame Maggie Smith’s brilliant career

Beyond the Fringe (Complete)

Beyond the Fringe was a British comedy stage revue written and performed by Peter Cook, Dudley Moore, Alan Bennett, and Jonathan Miller. It played in London’s West End and then on New York’s Broadway in the early 1960s, and is widely regarded as seminal to the rise of satire in 1960s Britain.

Take A Pew – Alan Bennett

Richard Griffiths (1947-2013)

The History Boys – Broadway

Almost complete recording of the original production during its run on Broadway. Not mine but thanks for sharing whoever it was 🙂

Read Full Post | Make a Comment ( None so far )

President Obama Stalls Islamic State While He Runs Out The Clock On His Failed Presidency — Who is next? President Trump — Obama A Real Loser — Leading On Climate Change — Give Me A Break! — Videos

Posted on October 13, 2015. Filed under: Agriculture, American History, Articles, Biology, Blogroll, Books, Business, Chemistry, Climate, College, Communications, Computers, Corruption, Demographics, Diasters, Documentary, Economics, Education, Employment, Energy, Faith, Family, Farming, Federal Government, Federal Government Budget, Films, Fiscal Policy, Foreign Policy, Freedom, Friends, Genocide, Geology, government, government spending, history, Islam, Law, liberty, Life, Links, media, Natural Gas, Newspapers, Non-Fiction, Nuclear Power, Oil, People, Philosophy, Photos, Physics, Political Correctness, Politics, Press, Radio, Radio, Raves, Religious, Science, Strategy, Tax Policy, Television, Volcano, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

The Pronk Pops Show 551, October 12, 2015, Story 1: President Obama Stalls Islamic State While He Runs Out The Clock On His Failed Presidency — Who is next? President Trump — Obama A Real Loser — Leading On Climate Change — Give Me A Break! — Videos

620px-Climate_influencing_factors

climate model vs observationshot-spot-1979-1999

60 Minutes in 60 Seconds (Day 36)

Obama talks Russia’s escalation in Syria on “60 Minutes”

“60 Minutes” interview: President Obama

Earth's_greenhouse_effect_(US_EPA,_2012) GreenhouseEffectevans_figure1


climate-models-feedbacks-600-2

Dr David Evans on Global Warming

50 to 1 Project – David Evans Interview

Freeman Dyson on the Global Warming Hysteria April, 2015

High Hopes and Missed Opportunities in Iraq

Emma Sky: “The Unraveling”

Reflections on the Future of War with Gen. Raymond Odierno

Thomas Barnett: Rethinking America’s military strategy

Donald Trump Iran Deal FULL SPEECH, Against Iran Nuclear Agreement at Tea Party Rally Sept. 9, 2015

The Iran Nuclear Deal

Iran and the Bomb

Climate Change in 12 Minutes – The Skeptic’s Case

Climategate: What They Aren’t Telling You!

Krauthammer: ‘Sputtering’ Obama Admin Has No Idea What to Do About Russia, Syria

Donald Trump Fox & Friends RIPS Obama 60 Minute Interview & Biden’s Low Poll Numbers FULL Interview

Donald trump Meet The Press FULL Interview 10/4/2015

60 Minutes Host Destroys Barack Obama On Syria

60 Minutes Host Embarrasses Barack Obama On Syria II

Background Articles and Videos

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY DEBATE: PETER HUBER

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY DEBATE: PHILIP STOTT

Professor Fred Singer on Climate Change Pt 1

Professor Fred Singer on Climate Change Pt 2

Global Warming, Lysenkoism & Eugenics Prof Richard Lindzen

Interview with Professor Richard Lindzen

Richard Lindzen, Ph.D. Lecture Deconstructs Global Warming Hysteria (High Quality Version)

Global Warming – Michael Crichton

Michael Crichton | States of Fear: Science or Politics?

Dr Roy Spencer on Global Warming Part 1 of 6

Dr Roy Spencer on Global Warming Part 2 of 6

Dr Roy Spencer on Global Warming Part 3 of 6

Dr Roy Spencer on Global Warming Part 4 of 6

Dr Roy Spencer on Global Warming Part 5 of 6

Dr Roy Spencer on Global Warming Part 6 of 6

Global warming and the Carbon Tax Scam

The Great Global Warming Swindle Full Movie

Global Warming: How Hot Air and Bad Science Will Give YOU Staggeringly Higher Taxes and Prices

Sen. Inhofe To Investigate ClimateGate

Lou Dobbs: ‘Who The Hell Does The President Think He Is?’

The Free-Market Case for Green

ManBearPig, Climategate and Watermelons: A conversation with author James Delingpole

James Delingpole: Great Britain, the Green Movement, and the End of the World

George Carlin on Global Warming

Americans Skeptical of Science Behind Global Warming

“…Most Americans (52%) believe that there continues to be significant disagreement within the scientific community over global warming.

While many advocates of aggressive policy responses to global warming say a consensus exists, the latest Rasmussen Reports national telephone survey finds that just 25% of adults think most scientists agree on the topic. Twenty-three percent (23%) are not sure. …”

http://www.rasmussenreports.com/public_content/politics/current_events/environment_energy/americans_skeptical_of_science_behind_global_warming

Full Interview: President Obama on ISIS, Putin, Trump on “60 Minutes”

108 Shares

President Obama on destroying ISIS in Iraq:

Steve Kroft: The last time we talked was this time last year, and the situation in Syria and Iraq had begun to worsen vis-à-vis ISIS. You had just unveiled a plan to provide air support for troops in Iraq, and also some air strikes in Syria, and the training and equipping of a moderate Syrian force. You said that this would degrade and eventually destroy ISIS.
President Barack Obama: Over time.

Steve Kroft: Over time. It’s been a year, and–

President Barack Obama: I didn’t say it was going to be done in a year.

Steve Kroft: No. But you said…

President Barack Obama: There’s a question in here somewhere.

Steve Kroft: Who’s going to get rid of them?

President Barack Obama: Over time, the community of nations will all get rid of them, and we will be leading getting rid of them. But we are not going to be able to get rid of them unless there is an environment inside of Syria and in portions of Iraq in which local populations, local Sunni populations, are working in a concerted way with us to get rid of them.

On the “moderate opposition” in Syria:

Steve Kroft: You have been talking about the moderate opposition in Syria. It seems very hard to identify. And you talked about the frustrations of trying to find some and train them. You got a half a billion dollars from Congress to train and equip 5,000, and at the end, according to the commander CENTCOM, you got 50 people, most of whom are dead or deserted. He said four or five left?

President Barack Obama: Steve, this is why I’ve been skeptical from the get go about the notion that we were going to effectively create this proxy army inside of Syria. My goal has been to try to test the proposition, can we be able to train and equip a moderate opposition that’s willing to fight ISIL? And what we’ve learned is that as long as Assad remains in power, it is very difficult to get those folks to focus their attention on ISIL.

Steve Kroft: If you were skeptical of the program to find and identify, train and equip moderate Syrians, why did you go through the program?

President Barack Obama: Well, because part of what we have to do here, Steve, is to try different things. Because we also have partners on the ground that are invested and interested in seeing some sort of resolution to this problem. And–

Steve Kroft: And they wanted you to do it.

President Barack Obama: Well, no. That’s not what I said. I think it is important for us to make sure that we explore all the various options that are available.

Steve Kroft: I know you don’t want to talk about this.

President Barack Obama: No, I’m happy to talk about it.

Steve Kroft: I want to talk about the– this program, because it would seem to show, I mean, if you expect 5,000 and you get five, it shows that somebody someplace along the line did not– made– you know, some sort of a serious miscalculation.

President Barack Obama: You know, the– the– Steve, let me just say this.

Steve Kroft: It’s an embarrassment.

President Barack Obama: Look, there’s no doubt that it did not work. And, one of the challenges that I’ve had throughout this heartbreaking situation inside of Syria is, is that– you’ll have people insist that, you know, all you have to do is send in a few– you know, truckloads full of arms and people are ready to fight. And then, when you start a train-and-equip program and it doesn’t work, then people say, “Well, why didn’t it work?” Or, “If it had just started three months earlier it would’ve worked.”

Steve Kroft: But you said yourself you never believed in this.

President Barack Obama: Well– but Steve, what I have also said is, is that surprisingly enough it turns out that in a situation that is as volatile and with as many players as there are inside of Syria, there aren’t any silver bullets. And this is precisely why I’ve been very clear that America’s priorities has to be number one, keeping the American people safe. Number two, we are prepared to work both diplomatically and where we can to support moderate opposition that can help convince the Russians and Iranians to put pressure on Assad for a transition. But that what we are not going to do is to try to reinsert ourselves in a military campaign inside of Syria. Let’s take the situation in Afghanistan, which I suspect you’ll ask about. But I wanted to use this as an example.

Steve Kroft: All right. I feel like I’m being filibustered, Mr. President.

President Barack Obama: No, no, no, no, no. Steve, I think if you want to roll back the tape, you’ve been giving me long questions and statements, and now I’m responding to ’em. So let’s– so– if you ask me big, open-ended questions, expect big, open-ended answers. Let’s take the example of Afghanistan. We’ve been there 13 years now close to 13 years. And it’s still hard in Afghanistan. Today, after all the investments we have there, and we still have thousands of troops there. So the notion that after a year in Syria, a country where the existing government hasn’t invited us in, but is actively keeping us out, that somehow we would be able to solve this quickly– is–

Steve Kroft: We didn’t say quickly.

President Barack Obama: –is– is– is an illusion. And– and–

Steve Kroft: Nobody’s expecting that, Mr. President.

President Barack Obama: Well, the– no, I understand, but what I’m– the simple point I’m making, Steve, is that the solution that we’re going to have inside of Syria is ultimately going to depend not on the United States putting in a bunch of troops there, resolving the underlying crisis is going to be something that requires ultimately the key players there to recognize that there has to be a transition to new government. And, in the absence of that, it’s not going to work.

On Russia:

Steve Kroft: One of the key players now is Russia.

President Barack Obama: Yeah.

Steve Kroft: A year ago when we did this interview, there was some saber-rattling between the United States and Russia on the Ukrainian border. Now it’s also going on in Syria. You said a year ago that the United States– America leads. We’re the indispensible nation. Mr. Putin seems to be challenging that leadership.

President Barack Obama: In what way? Let– let’s think about this– let– let–

Steve Kroft: Well, he’s moved troops into Syria, for one. He’s got people on the ground. Two, the Russians are conducting military operations in the Middle East for the first time since World War II–

President Barack Obama: So that’s–

Steve Kroft: –bombing the people– that we are supporting.

President Barack Obama: So that’s leading, Steve? Let me ask you this question. When I came into office, Ukraine was governed by a corrupt ruler who was a stooge of Mr. Putin. Syria was Russia’s only ally in the region. And today, rather than being able to count on their support and maintain the base they had in Syria, which they’ve had for a long time, Mr. Putin now is devoting his own troops, his own military, just to barely hold together by a thread his sole ally. And in Ukraine–

Steve Kroft: He’s challenging your leadership, Mr. President. He’s challenging your leadership–

President Barack Obama: Well Steve, I got to tell you, if you think that running your economy into the ground and having to send troops in in order to prop up your only ally is leadership, then we’ve got a different definition of leadership. My definition of leadership would be leading on climate change, an international accord that potentially we’ll get in Paris. My definition of leadership is mobilizing the entire world community to make sure that Iran doesn’t get a nuclear weapon. And with respect to the Middle East, we’ve got a 60-country coalition that isn’t suddenly lining up around Russia’s strategy. To the contrary, they are arguing that, in fact, that strategy will not work.

Steve Kroft: My point is– was not that he was leading, my point is that he was challenging your leadership. And he has very much involved himself in the situation. Can you imagine anything happening in Syria of any significance at all without the Russians now being involved in it and having a part of it?

President Barack Obama: But that was true before. Keep in mind that for the last five years, the Russians have provided arms, provided financing, as have the Iranians, as has Hezbollah.

Steve Kroft: But they haven’t been bombing and they haven’t had troops on the ground–

President Barack Obama: And the fact that they had to do this is not an indication of strength, it’s an indication that their strategy did not work.

Steve Kroft: You don’t think–

President Barack Obama: You don’t think that Mr. Putin would’ve preferred having Mr. Assad be able to solve this problem without him having to send a bunch of pilots and money that they don’t have?

Steve Kroft: Did you know he was going to do all this when you met with him in New York?

President Barack Obama: Well, we had seen– we had pretty good intelligence. We watch–

Steve Kroft: So you knew he was planning to do it.

President Barack Obama: We knew that he was planning to provide the military assistance that Assad was needing because they were nervous about a potential imminent collapse of the regime.

Steve Kroft: You say he’s doing this out of weakness. There is a perception in the Middle East among our adversaries, certainly and even among some of our allies that the United States is in retreat, that we pulled our troops out of Iraq and ISIS has moved in and taken over much of that territory. The situation in Afghanistan is very precarious and the Taliban is on the march again. And ISIS controls a large part of Syria.

President Barack Obama: I think it’s fair to say, Steve, that if–

Steve Kroft: It’s– they– let me just finish the thought. They say your–

President Barack Obama: You’re–

Steve Kroft: –they say you’re projecting a weakness, not a strength–

President Barack Obama: –you’re saying “they,” but you’re not citing too many folks. But here–

Steve Kroft: No, I’ll cite– I’ll cite if you want me, too.

President Barack Obama: –here– yes. Here–

Steve Kroft: I’d say the Saudis. I’d say the Israelis. I’d say a lot of our friends in the Middle East. I’d say everybody in the Republican party. Well, you want me to keep going?

President Barack Obama: Yeah. The– the– if you are– if you’re citing the Republican party, I think it’s fair to say that there is nothing I’ve done right over the last seven and a half years. And I think that’s right. It– and– I also think what is true is that these are the same folks who were making an argument for us to go into Iraq and who, in some cases, still have difficulty acknowledging that it was a mistake. And Steve, I guarantee you that there are factions inside of the Middle East, and I guess factions inside the Republican party who think that we should send endless numbers of troops into the Middle East, that the only measure of strength is us sending back several hundred thousand troops, that we are going to impose a peace, police the region, and– that the fact that we might have more deaths of U.S. troops, thousands of troops killed, thousands of troops injured, spend another trillion dollars, they would have no problem with that. There are people who would like to see us do that. And unless we do that, they’ll suggest we’re in retreat.

Steve Kroft: They’ll say you’re throwing in the towel–

President Barack Obama: No. Steve, we have an enormous presence in the Middle East. We have bases and we have aircraft carriers. And our pilots are flying through those skies. And we are currently supporting Iraq as it tries to continue to build up its forces. But the problem that I think a lot of these critics never answered is what’s in the interest of the United States of America and at what point do we say that, “Here are the things we can do well to protect America. But here are the things that we also have to do in order to make sure that America leads and America is strong and stays number one.” And if in fact the only measure is for us to send another 100,000 or 200,000 troops into Syria or back into Iraq, or perhaps into Libya, or perhaps into Yemen, and our goal somehow is that we are now going to be, not just the police, but the governors of this region. That would be a bad strategy Steve. And I think that if we make that mistake again, then shame on us.

Steve Kroft: Do you think the world’s a safer place?

President Barack Obama: America is a safer place. I think that there are places, obviously, like Syria that are not safer than when I came into office. But, in terms of us protecting ourselves against terrorism, in terms of us making sure that we are strengthening our alliances, in terms of our reputation around the world, absolutely we’re stronger.

On Friday, the Pentagon ended the program to train-and-equip Syrian rebels that the president told us did not work. In a moment, he talks about Donald Trump, Hillary Clinton’s emails and Joe Biden’s possible run for president.

http://www.cbsnews.com/common/video/cbsnews_video.swf

On Donald Trump and the 2016 election:

Steve Kroft: OK. Mr. President, there are a lot of serious problems with the world right now, but I want to ask you a few questions about politics.

President Barack Obama: Yeah, go ahead.

Steve Kroft: What do you think of Donald Trump?

President Barack Obama: Well, I think that he is a great publicity-seeker and at a time when the Republican party hasn’t really figured out what it’s for, as opposed to what it’s against. I think that he is tapped into something that exists in the Republican party that’s real. I think there is genuine anti-immigrant sentiment in the large portion of at least Republican primary voters. I don’t think it’s uniform. He knows how to get attention. He is, you know, the classic reality TV character and, at this early stage, it’s not surprising that he’s gotten a lot of attention.
Steve Kroft: You think he’s running out of steam? I mean, you think he’s going to disappear?

President Barack Obama: You know, I’ll leave it up to the pundits to make that determination. I don’t think he’ll end up being president of the United States.

Steve Kroft: Did you know about Hillary Clinton’s use of private email server–

President Barack Obama: No.

Steve Kroft: –while she was Secretary of State?

President Barack Obama: No.

Steve Kroft: Do you think it posed a national security problem?

President Barack Obama: I don’t think it posed a national security problem. I think that it was a mistake that she has acknowledged and– you know, as a general proposition, when we’re in these offices, we have to be more sensitive and stay as far away from the line as possible when it comes to how we handle information, how we handle our own personal data. And, you know, she made a mistake. She has acknowledged it. I do think that the way it’s been ginned-up is in part because of– in part– because of politics. And I think she’d be the first to acknowledge that maybe she could have handled the original decision better and the disclosures more quickly. But–

Steve Kroft: What was your reaction when you found out about it?

President Barack Obama: This is one of those issues that I think is legitimate, but the fact that for the last three months this is all that’s been spoken about is an indication that we’re in presidential political season.

Steve Kroft: Do you agree with what President Clinton has said and Secretary Clinton has said, that this is not– not that big a deal. Do you agree with that?

President Barack Obama: Well, I’m not going to comment on–

Steve Kroft: You think it’s not that big a deal–

President Barack Obama: What I think is that it is important for her to answer these questions to the satisfaction of the American public. And they can make their own judgment. I can tell you that this is not a situation in which America’s national security was endangered.

Steve Kroft: This administration has prosecuted people for having classified material on their private computers.

President Barack Obama: Well, I– there’s no doubt that there had been breaches, and these are all a matter of degree. We don’t get an impression that here there was purposely efforts– on– in– to hide something or to squirrel away information. But again, I’m gonna leave it to–

Steve Kroft: If she had come to you.

President Barack Obama: I’m going to leave it to Hillary when she has an interview with you to address all these questions.

Steve Kroft: Right now, there’s nobody on either side of the aisle that is exactly running on your record. Do you want Joe Biden to get in the race and do it?

President Barack Obama: You know, I am going to let Joe make that decision. And I mean what I say. I think Joe will go down as one of the finest vice presidents in history, and one of the more consequential. I think he has done great work. I don’t think there’s any politician at a national level that has not thought about being the president. And if you’re sitting right next to the president in every meeting and, you know wrestling with these issues, I’m sure that for him he’s saying to himself, “I could do a really good job.”

Steve Kroft: I do want to talk a little bit about Congress. Are you going to miss John Boehner?

President Barack Obama: John Boehner and I disagreed on just about everything. But the one thing I’ll say about John Boehner is he did care about the institution. He recognized that nobody gets 100 percent in our democracy. I won’t say that he and I were ideal partners, but he and I could talk and we could get some things done. And so I am a little concerned that the reason he left was because there are a group of members of Congress who think having somebody who is willing to shut down the government or default on the U.S. debt is going to allow them to get their way 100 percent of the time.

Steve Kroft: Do you think you’re going to be able to get anything through Congress?

President Barack Obama: Well, given that– this Congress hasn’t been able to get much done at all over the last year and a half, two years, for that matter for the last four, it would be surprising if we were able to make huge strides on the things that are important. But I have a more modest goal, which is to make sure that Congress doesn’t do damage to the economy.

The president says that means avoiding another budget crisis and another round of threats to shut down the government, which could happen as early as December. Even with congressional Republicans in disarray, he’s hoping to reach a deal with Congress as he did two years ago, to lift some spending caps in defense and other areas while continuing to reduce the deficit.

President Barack Obama: Right now, our economy is much stronger relative to the rest of the world. China, Europe, emerging markets, they’re all having problems. And so, if we provide another shock to the system by shutting down the government, that could mean that the progress we have made starts going backwards instead of forwards. We have to make sure that we pass a transportation bill. It may not be everything that I want. We should be being much more aggressive in rebuilding America right now. Interest rates are low, construction workers need the work, and our economy would benefit from it. But if we can’t do a big multiyear plan, we have to at least do something that is robust enough– so that we are meeting the demands of a growing economy.

Steve Kroft: A few months back, at a fundraiser, you made a point of saying that the first lady was very pleased that you can’t run again.

President Barack Obama: Yeah, she is.

Steve Kroft: Do you feel the same way?

President Barack Obama: You know, it’s interesting. I– you go into your last year and I think it’s bittersweet. On the one hand, I am very proud of what we’ve accomplished and it makes me think, I’d love to do some more. But by the time I’m finished, I think it will be time for me to go. Because there’s a reason why we considered George Washington one of our greatest presidents. He set a precedent, saying that when you occupy this seat, it is an extraordinary privilege, but the way our democracy is designed, no one person is indispensable. And ultimately you are a citizen. And once you finish with your service, you go back to being a citizen. And I– and I think that– I think having a fresh set of legs in this seat, I think having a fresh perspective, new personnel and new ideas and a new conversation with the American people about issues that may be different a year from now than they were when I started eight years ago, I think that’s all good for our democracy. I think it’s healthy.

Steve Kroft: Do you think if you ran again, could run again, and did run again, you would be elected?

President Barack Obama: Yes.

Steve Kroft: You do.

President Barack Obama: I do.

http://www.realclearpolitics.com/video/2015/10/11/full_interview_president_obama_on_isis_putin_trump_on_60_minutes.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 546-551

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Ray Bradbury — Fahrenheit 451 — Videos

Posted on September 20, 2015. Filed under: American History, Blogroll, Book, Books, Communications, Constitution, Corruption, Culture, Documentary, Economics, Education, Entertainment, Faith, Family, Fiction, Films, Friends, Heroes, history, Law, liberty, Life, media, Money, Movies, People, Philosophy, Photos, Police, Political Correctness, Politics, Press, Radio, Rants, Raves, Regulations, Strategy, Talk Radio, Television, Video, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , |

young ray bradburyray-bradbury

fahrenheit451 fahrenheit-451hardcover_book_411 Farenheit451  ray-bradbury-fahrenheit-451ray-bradbury_1

Ray Bradbury – Story of a Writer

A 25-minute documentary from 1963 about Ray Bradbury – by David L. Wolper

Day at Night: Ray Bradbury

A Conversation with Ray Bradbury

A short film for the National Endowment for the arts feature Ray Bradbury as he discusses his life, literary loves and Fahrenheit 451.

A Conversation with Ray Bradbury by Lawrence Bridges

Fahrenheit 451 – Trailer

Fahrenheit 451 (1966) Full Movie | Julie Christie Full Movies Online

Top 10 Notes: Fahrenheit 451

Feeling More Alive: Fahrenheit 451’s The Hearth and the Salamander

Fahrenheit 451 by Ray Bradbury (Full audiobook)

Ray Bradbury on Writing Persistently

A Conversation with Ray Bradbury

Author Ray Bradbury joins Dean Nelson of Point Loma Nazarene University for a talk about his craft as part of Point Loma Nazarene University’s Writer’s Symposium by the Sea. Series: “Writer’s Symposium By The Sea” [4/2001] [Public Affairs] [Humanities] [Show ID: 5534]

An Evening with Ray Bradbury 2001

Science fiction author Ray Bradbury regales his audience with stories about his life and love of writing in “Telling the Truth,” the keynote address of The Sixth Annual Writer’s Symposium by the Sea, sponsored by Point Loma Nazarene University. Series: Writer’s Symposium By The Sea [4/2001] [Public Affairs] [Humanities] [Show ID: 5533]

Ray Bradbury

From Wikipedia, the free encyclopedia
For the author’s 1975 story collection, see Ray Bradbury (collection).
Ray Bradbury
Ray Bradbury in 1975

Bradbury in 1975
Born Raymond Douglas Bradbury
August 22, 1920
Waukegan, Illinois, U.S.
Died June 5, 2012 (aged 91)
Los Angeles, California, U.S.
Resting place Westwood Memorial Park, Los Angeles
Occupation Writer
Nationality American
Period 1938–2012[1]
Genre Fantasy, social commentary,science fiction, horror fiction,mystery fiction
Notable works
Notable awards American Academy of Arts and Letters (1954); Daytime Emmy Award (1994); National Medal of Arts (2004); Pulitzer Prize(2007)
Spouse Marguerite McClure
(m. 1947–2003; her death)
Children 4 daughters

Signature
Website
www.raybradbury.com

Raymond Douglas “Ray” Bradbury[2] (August 22, 1920 – June 5, 2012) was an Americanfantasy, science fiction, horror and mystery fiction author. Best known for hisdystopian novel Fahrenheit 451 (1953) and for the science fiction and horror stories gathered together as The Martian Chronicles (1950) and The Illustrated Man (1951), Bradbury was one of the most celebrated 20th- and 21st-century American genre writers. He wrote and consulted on many screenplays and television scripts, includingMoby Dick[3] and It Came from Outer Space. Many of his works have been adapted into comic books, television shows, and films.

Early life

Bradbury as a senior in high school, 1938

Bradbury was born on August 22, 1920[4][5] in Waukegan, Illinois,[6] to Esther (née Moberg) Bradbury, a Swedish immigrant, and Leonard Spaulding Bradbury,[7] a power and telephone lineman of English descent.[8] He was given the middle name “Douglas,” after the actor Douglas Fairbanks. Bradbury was related to the American Shakespeare scholar Douglas Spaulding[9] and was descended from Mary Bradbury, who was tried at one of the Salem witch trials in 1692.[10]

Bradbury was surrounded by an extended family during his early childhood and formative years in Waukegan, Illinois. An aunt read him short stories when he was a child.[11] This period provided foundations for both the author and his stories. In Bradbury’s works of fiction, 1920s Waukegan becomes “Green Town,” Illinois.

The Bradbury family lived in Tucson, Arizona, in 1926–27 and 1932–33 as the father pursued employment, each time returning to Waukegan, but eventually settled in Los Angeles in 1934, when Bradbury was 14. The family arrived with only 40 dollars, which paid for rent and food until his father finally found a job making wire at a cable company for $14 a week. This meant that they could stay, however, and Bradbury—who was in love with Hollywood—was ecstatic.

Bradbury attended Los Angeles High School and was active in the drama club. He often roller-skated through Hollywood in hopes of meeting celebrities. Among the creative and talented people Bradbury met this way were special effects pioneer Ray Harryhausen and radio star George Burns. (Bradbury’s first pay as a writer was at the age of fourteen, when Burns hired him to write for the Burns and Allen show.[12][13])

Influences

Literature

Bradbury was a reader and writer throughout his youth.[14] He knew as a young boy that he was “going into one of the arts.” In 1931, at the age of eleven, the young Bradbury began writing his own stories. The country was going through the Great Depression, and sometimes Bradbury wrote on butcher paper.

In his youth, he spent much time in the Carnegie library in Waukegan, reading such authors as H. G. Wells, Jules Verne, and Edgar Allan Poe. At age twelve, Bradbury began writing traditional horror stories and said he tried to imitate Poe until he was about eighteen. In addition to comics, he loved Edgar Rice Burroughs, creator of Tarzan of the Apes,[15] especially Burroughs’ John Carter of Mars series. The Warlord of Marsimpressed him so much that at the age of twelve he wrote his own sequel.[16] The young Bradbury was also a cartoonist and loved to illustrate. He wrote about Tarzan and drew his own Sunday panels. He listened to the radio show Chandu the Magician, and when the show went off the air every night he would sit and write the entire script from memory.

In Beverly Hills, he often visited the science fiction writer Bob Olsen for mentorship as well as friendship while Bradbury was a teenager. They shared ideas and would keep in contact. In 1936, at a secondhand bookstore in Hollywood, Bradbury discovered a handbill promoting meetings of the Los Angeles Science Fiction Society.[17] Thrilled to find there were others with his interests, at the age of sixteen Bradbury joined a weekly Thursday-night conclave.[18]

When he was seventeen, Bradbury read stories published in Astounding Science Fiction, and said he read everything by Robert A. Heinlein, Arthur C. Clarke, and the early writings of Theodore Sturgeon and A. E. van Vogt, but cited H. G. Wells and Jules Verne as his big science fiction influences. Bradbury identified with Verne, saying, “He believes the human being is in a strange situation in a very strange world, and he believes that we can triumph by behaving morally.” [19] Bradbury admitted that he stopped reading genre books in his twenties and embraced a broad field of literature that included Alexander Pope and poet John Donne.[20] Bradbury had just graduated from high school when he met Robert Heinlein, then 31 years old. Bradbury recalled, “He was well known, and he wrote humanistic science fiction, which influenced me to dare to be human instead of mechanical.”[20]

Hollywood

The family lived about four blocks from the Uptown Theater on Western Avenue in Los Angeles, the flagship theater for MGM and Fox. There, Bradbury learned how to sneak in and watched previews almost every week. He roller-skated there as well as all over town, as he put it “hell-bent on getting autographs from glamorous stars. It was glorious.” Among stars the young Bradbury was thrilled to encounter were Norma Shearer, Laurel and Hardy, and Ronald Colman. Sometimes he would spend all day in front of Paramount Pictures or Columbia Pictures and then skate to the Brown Derby to watch the stars who came and went for meals. He recounted seeing Cary Grant, Marlene Dietrich and Mae West, who he would learn made a regular appearance every Friday night, bodyguard in tow.[20]

Bradbury relates the following meeting with Sergei Bondarchuk, director of Soviet epic film series War and Peace, at a Hollywood award ceremony in Bondarchuk’s honor:

They formed a long queue and as Bondarchuk was walking along it he recognized several people: “Oh Mr. Ford, I like your film.” He recognized the director, Greta Garbo, and someone else. I was standing at the very end of the queue and silently watched this. Bondarchuk shouted to me; “Ray Bradbury, is that you?” He rushed up to me, embraced me, dragged me inside, grabbed a bottle ofStolichnaya, sat down at his table where his closest friends were sitting. All the famous Hollywood directors in the queue were bewildered. They stared at me and asked each other “who is this Bradbury?” And, swearing, they left, leaving me alone with Bondarchuk…[21]

Career

Bradbury’s “Undersea Guardians” was the cover story for the December 1944 issue of Amazing Stories

Bradbury’s first published story was “Hollerbochen’s Dilemma”, which appeared in the January 1938 number of Forrest J. Ackerman’s fanzineImagination!.[1] In July 1939, Ackerman gave nineteen-year-old Bradbury the money to head to New York for the First World Science Fiction Convention in New York City, and funded Bradbury’s fanzine, titled Futuria Fantasia.[22] Bradbury wrote most of its four issues, each limited to under 100 copies.[citation needed]Between 1940 and 1947, he was a contributor to Rob Wagner‘s film magazine, Script.[23]

Bradbury was free to start a career in writing when, owing to his bad eyesight, he was rejected admission into the military during World War II. Having been inspired by science fiction heroes like Flash Gordon and Buck Rogers, Bradbury began to publish science fiction stories in fanzines in 1938.[24] Bradbury was invited by Forrest J. Ackerman[citation needed] to attend the Los Angeles Science Fiction Society, which at the time met at Clifton’s Cafeteria in downtown Los Angeles. This was where he met the writers Robert A. Heinlein, Emil Petaja, Fredric Brown, Henry Kuttner, Leigh Brackett, and Jack Williamson.[citation needed]

In 1939, Bradbury joined Laraine Day‘s Wilshire Players Guild where for two years he wrote and acted in several plays. They were, as Bradbury later described, “so incredibly bad” that he gave up playwriting for two decades.[25] Bradbury’s first paid piece, “Pendulum,” written with Henry Hasse, was published in the pulp magazineSuper Science Stories in November 1941, for which he earned $15.[26]

Bradbury sold his first story, “The Lake”, for $13.75 at the age of twenty-two.[20] He became a full-time writer by the end of 1942. His first collection of short stories, Dark Carnival, was published in 1947 by Arkham House, a small press in Sauk City, Wisconsin, owned by writer August Derleth. Reviewing Dark Carnival for the New York Herald Tribune, Will Cuppy proclaimed Bradbury “suitable for general consumption” and predicted that he would become a writer of the caliber of British fantasy author John Collier.[27]

After a rejection notice from the pulp Weird Tales, Bradbury submitted “Homecoming” to Mademoiselle which was spotted by a young editorial assistant named Truman Capote. Capote picked the Bradbury manuscript from a slush pile, which led to its publication. Homecoming won a place in The O. Henry Prize Stories of 1947.[28]

It was in UCLA‘s Powell Library, in a study room with typewriters for rent, that Bradbury wrote his classic story of a book-burning future, The Fireman, which was about 25,000 words long. It was later published at about 50,000 words under the name Fahrenheit 451, for a total cost of $9.80, due to the library’s typewriter-rental fees of ten cents per half-hour.[29]

A chance encounter in a Los Angeles bookstore with the British expatriate writer Christopher Isherwood gave Bradbury the opportunity to put The Martian Chronicles into the hands of a respected critic. Isherwood’s glowing review[30] followed.

Writing

Bradbury attributed to two incidents his lifelong habit of writing every day. The first of these, occurring when he was three years old, was his mother’s taking him to see Lon Chaney‘s performance in The Hunchback of Notre Dame.[31] The second incident occurred in 1932, when a carnival entertainer, one Mr. Electrico, touched the young man on the nose with an electrified sword, made his hair stand on end, and shouted, “Live forever!”[32] Bradbury remarked, “I felt that something strange and wonderful had happened to me because of my encounter with Mr. Electrico…[he] gave me a future…I began to write, full-time. I have written every single day of my life since that day 69 years ago.”[32] It was at that age that Bradbury first started to do magic, which was his first great love. If he had not discovered writing, he would have become a magician.[33]

Bradbury claimed a wide variety of influences, and described discussions he might have with his favorite poets and writers Robert Frost, William Shakespeare, John Steinbeck, Aldous Huxley, and Thomas Wolfe. From Steinbeck, he said he learned “how to write objectively and yet insert all of the insights without too much extra comment.” He studied Eudora Welty for her “remarkable ability to give you atmosphere, character, and motion in a single line.” Bradbury’s favorite writers growing up included Katherine Anne Porter, who wrote about the American South, Edith Wharton, and Jessamyn West.[34]

Bradbury was once described as a “Midwestsurrealist” and is often labeled a science fiction writer, which he described as “the art of the possible.” Bradbury resisted that categorization, however:

First of all, I don’t write science fiction. I’ve only done one science fiction book and that’s Fahrenheit 451, based on reality. It was named so to represent the temperature at which paper ignites. Science fiction is a depiction of the real. Fantasy is a depiction of the unreal. So Martian Chronicles is not science fiction, it’s fantasy. It couldn’t happen, you see? That’s the reason it’s going to be around a long time – because it’s a Greek myth, and myths have staying power.[35]

Bradbury recounted when he came into his own as a writer, the afternoon he wrote a short story about his first encounter with death. When he was a boy, he met a young girl at the beach and she went out into the water and never came back. Years later, as he wrote about it, tears flowed from him. He recognized he had taken the leap from emulating the many writers he admired to connecting with his voice as a writer.[36][37]

When later asked about the lyrical power of his prose, Bradbury replied, “From reading so much poetry every day of my life. My favorite writers have been those who’ve said things well.” He is quoted, “If you’re reluctant to weep, you won’t live a full and complete life.”[38]

In high school, Bradbury was active in both the Poetry Club and the Drama club, continuing plans to become an actor but becoming serious about his writing as his high school years progressed. Bradbury graduated from Los Angeles High School, where he took poetry classes with Snow Longley Housh, and short story writing courses taught by Jeannet Johnson.[39] The teachers recognized his talent and furthered his interest in writing,[40] but he did not attend college. Instead, he sold newspapers at the corner of South Norton Avenue and Olympic Boulevard. In regard to his education, Bradbury said:

Libraries raised me. I don’t believe in colleges and universities. I believe in libraries because most students don’t have any money. When I graduated from high school, it was during the Depression and we had no money. I couldn’t go to college, so I went to the library three days a week for 10 years.[41][42]

He told The Paris Review, “You can’t learn to write in college. It’s a very bad place for writers because the teachers always think they know more than you do – and they don’t.”[43]

“Green Town”

A reinvention of Waukegan, Green Town is a symbol of safety and home, which is often juxtaposed as a contrasting backdrop to tales of fantasy or menace. It serves as the setting of his semi-autobiographical classics Dandelion Wine, Something Wicked This Way Comes, and Farewell Summer as well as in many of his short stories. In Green Town, Bradbury’s favorite uncle sprouts wings, traveling carnivals conceal supernatural powers, and his grandparents provide room and board to Charles Dickens.[44] Perhaps the most definitive usage of the pseudonym for his hometown, in Summer Morning, Summer Night, a collection of short stories and vignettes exclusively about Green Town, Bradbury returns to the signature locale as a look back at the rapidly disappearing small-town world of the American heartland, which was the foundation of his roots.[45]

Cultural contributions

Bradbury wrote many short essays on the arts and culture, attracting the attention of critics in this field, but he used his fiction to explore and criticize his culture and society. Bradbury observed, for example, thatFahrenheit 451 touches on the alienation of people by media:

In writing the short novel Fahrenheit 451 I thought I was describing a world that might evolve in four or five decades. But only a few weeks ago, in Beverly Hills one night, a husband and wife passed me, walking their dog. I stood staring after them, absolutely stunned. The woman held in one hand a small cigarette-package-sized radio, its antenna quivering. From this sprang tiny copper wires which ended in a dainty cone plugged into her right ear. There she was, oblivious to man and dog, listening to far winds and whispers and soap opera cries, sleep walking, helped up and down curbs by a husband who might just as well not have been there. This was not fiction.[46]

In a 1982 essay he wrote, “People ask me to predict the Future, when all I want to do is prevent it.” This intent had been expressed earlier by other authors,[47] who sometimes attributed it to him.

Bradbury hosted The Ray Bradbury Theater which was based on his short stories. Bradbury was a consultant for the American Pavilion at the 1964 New York World’s Fair[48] and the original exhibit housed in Epcot‘sSpaceship Earth geosphere at Walt Disney World.[49][50][51] In the 1980s, Bradbury concentrated on detective fiction.[52]

Bradbury was a strong supporter of public library systems, and helped to raise money to prevent the closure of several in California due to budgetary cuts. He iterated from his past that “libraries raised me”, and shunned colleges and universities, comparing his own lack of funds during the Depression with poor contemporary students.[53] His opinion varied on modern technology. In 1985 Bradbury wrote, “I see nothing but good coming from computers. When they first appeared on the scene, people were saying, ‘Oh my God, I’m so afraid.’ I hate people like that – I call them the neo-Luddites“, and “In a sense [computers] are simply books. Books are all over the place, and computers will be too”.[54] He resisted the conversion of his work into e-books, stating in 2010 “We have too many cellphones. We’ve got too many internets. We have got to get rid of those machines. We have too many machines now”.[55] When the publishing rights for Fahrenheit 451 came up for renewal in December 2011, Bradbury permitted its publication in electronic form provided that the publisher, Simon & Schuster, allowed the e-book to be digitally downloaded by any library patron. The title remains the only book in the Simon & Schuster catalog where this is possible.[56]

Several comic book writers have adapted Bradbury’s stories. Particularly noted among these were EC Comics‘ line of horror and science-fiction comics. Initially, the writers plagiarized his stories, but a diplomatic letter from Bradbury about it led to the company paying him and negotiating properly licensed adaptations of his work. The comics featuring Bradbury’s stories included Tales from the Crypt, Weird Science, Weird Fantasy, Crime Suspenstories, Haunt of Fear and others.

Bradbury remained an enthusiastic playwright all his life, leaving a rich theatrical legacy as well as literary. Bradbury headed the Pandemonium Theatre Company in Los Angeles for many years and had a five-year relationship with the Fremont Centre Theatre in South Pasadena.[57]

Bradbury is featured prominently in two documentaries related to his classic 1950s-’60s era: Jason V Brock‘s Charles Beaumont: The Life of Twilight Zone’s Magic Man,[58] which details his troubles with Rod Serling, and his friendships with writers Charles Beaumont, George Clayton Johnson, and most especially his dear friend William F. Nolan, as well as Brock’s The AckerMonster Chronicles!, which delves into the life of former Bradbury agent, close friend, mega-fan, and Famous Monsters of Filmland editor Forrest J Ackerman.

On May 24, 1956, Bradbury appeared on the popular quiz show, You Bet Your Life hosted by Groucho Marx (Season 6 Episode 35).[59]

Personal life

Bradbury in December 2009.

Bradbury was married to Marguerite McClure (January 16, 1922 – November 24, 2003) from 1947 until her death; they had four daughters:[60] Susan, Ramona, Bettina and Alexandra.[61] Though he lived in Los Angeles, Bradbury never obtained a driver’s license but relied on public transportation or his bicycle.[62] He lived at home until he was twenty-seven and married. His wife of fifty-six years, Maggie, as she was affectionately called, was the only woman Bradbury ever dated.[20]

Bradbury was a close friend of Charles Addams, and Addams illustrated the first of Bradbury’s stories about the Elliotts, a family that would resemble Addams’ own Addams Familyplaced in rural Illinois. Bradbury’s first story about them was “Homecoming,” published in the 1946 Halloween issue of Mademoiselle, with Addams illustrations. He and Addams planned a larger collaborative work that would tell the family’s complete history, but it never materialized, and according to a 2001 interview, they went their separate ways.[63] In October 2001, Bradbury published all the Family stories he had written in one book with a connecting narrative, From the Dust Returned, featuring a wraparound Addams cover of the original “Homecoming” illustration.[64]

Another close friend was animator Ray Harryhausen, who was best man at Bradbury’s wedding.[65] During a BAFTA 2010 awards tribute in honor of Ray Harryhausen‘s 90th birthday, Bradbury spoke of his first meeting Harryhausen at Forrest J Ackerman‘s house when they were both 18 years old. Their shared love for science fiction, King Kong, and the King Vidor-directed film The Fountainhead, written by Ayn Rand, was the beginning of a lifelong friendship. These early influences inspired the pair to believe in themselves and affirm their career choices. After their first meeting, they kept in touch at least once a month, in a friendship that spanned over 70 years.[66]

Late in life, Bradbury retained his dedication and passion despite what he described as the “devastation of illnesses and deaths of many good friends.” Among the losses that deeply grieved Bradbury was the death of Star Trek creator Gene Roddenberry, who was an intimate friend for many years. They remained close friends for nearly three decades after Roddenberry asked him to write for Star Trek, which Bradbury never did, objecting that he “never had the ability to adapt other people’s ideas into any sensible form.”[20]

Bradbury suffered a stroke in 1999[67] that left him partially dependent on a wheelchair for mobility.[68] Despite this he continued to write, and had even written an essay for The New Yorker, about his inspiration for writing, published only a week prior to his death.[69] Bradbury made regular appearances at science fiction conventions until 2009, when he retired from the circuit.

Ray Bradbury’s headstone in May 2012 prior to his death

Bradbury chose a burial place at Westwood Village Memorial Park Cemetery in Los Angeles, with a headstone that reads “Author of Fahrenheit 451”.[70][71][72] On February 6, 2015, the New York Times reported that the house that Bradbury lived and wrote in for fifty years of his life, at 10265 Cheviot Drive in Los Angeles, CA, had been demolished.[73]

Death

Bradbury died in Los Angeles, California, on June 5, 2012, at the age of 91, after a lengthy illness.[74] Bradbury’s personal library was willed to the Waukegan Public Library, where he had many of his formative reading experiences.[75]

The New York Times‍ ’​ obituary stated that Bradbury was “the writer most responsible for bringing modern science fiction into the literary mainstream.”[76] The Los Angeles Times credited Bradbury with the ability “to write lyrically and evocatively of lands an imagination away, worlds he anchored in the here and now with a sense of visual clarity and small-town familiarity”.[77] Bradbury’s grandson, Danny Karapetian, stated that Bradbury’s works had “influenced so many artists, writers, teachers, scientists, and it’s always really touching and comforting to hear their stories”.[61]The Washington Post hallmarked several modern day technologies that Bradbury had envisioned much earlier in his writing, such as the idea of banking ATMs and earbuds and Bluetooth headsets from Fahrenheit 451, and the concepts of artificial intelligence within I Sing the Body Electric.[78]

On June 6, 2012, in an official public statement from the White House Press Office, President Barack Obama said:

For many Americans, the news of Ray Bradbury’s death immediately brought to mind images from his work, imprinted in our minds, often from a young age. His gift for storytelling reshaped our culture and expanded our world. But Ray also understood that our imaginations could be used as a tool for better understanding, a vehicle for change, and an expression of our most cherished values. There is no doubt that Ray will continue to inspire many more generations with his writing, and our thoughts and prayers are with his family and friends.[79]

Several celebrity fans of Bradbury paid tribute to the author by stating the influence of his works on their own careers and creations.[80][81] Filmmaker Steven Spielberg stated that Bradbury was “[his] muse for the better part of [his] sci-fi career…. On the world of science fiction and fantasy and imagination he is immortal”.[82] Writer Neil Gaiman felt that “the landscape of the world we live in would have been diminished if we had not had him in our world”.[81] Author Stephen King released a statement on his website saying, “Ray Bradbury wrote three great novels and three hundred great stories. One of the latter was called ‘A Sound of Thunder.’ The sound I hear today is the thunder of a giant’s footsteps fading away. But the novels and stories remain, in all their resonance and strange beauty.”[83] Bradbury’s influence well exceeded the field of literature. Progressive house music producer and performer, Joel Thomas Zimmerman, who is most commonly known by his stage name Deadmau5, composed a song named after one of Bradbury’s short stories “The Veldt” which was originally published in the Saturday Evening Post.[84] The EP of “The Veldt” was released days after Bradbury’s death and is dedicated to the memory of the author.[85]

Bibliography

Bradbury is credited with writing 27 novels and over 600 short stories.[77] More than eight million copies of his works, published in over 36 languages, have been sold around the world.[76]

First novel

In 1949, Bradbury and his wife were expecting their first child. He took a Greyhound bus to New York and checked into a room at the YMCA for fifty cents a night. He took his short stories to a dozen publishers and no one wanted them. Just before getting ready to go home, Bradbury had dinner with an editor at Doubleday. When Bradbury recounted that everyone wanted a novel and he didn’t have one, the editor, coincidentally named Walter Bradbury, asked if the short stories might be tied together into a book length collection. The title was the editor’s idea; he suggested, “You could call it “The Martian Chronicles.” Bradbury liked the idea and recalled making notes in 1944 to do a book set on Mars. That evening, he stayed up all night at the YMCA and typed out an outline. He took it to the Doubleday editor the next morning, who read it and wrote Bradbury a check for seven hundred and fifty dollars. When Bradbury returned to Los Angeles, he connected all the short stories and that became The Martian Chronicles.[34]

Intended first novel

What was later issued as a collection of stories and vignettes, Summer Morning, Summer Night, started out to be Bradbury’s first true novel. The core of the work was Bradbury’s witnessing of the American small-town and life in the American heartland.

In the winter of 1955–56, after a consultation with his Doubleday editor, Bradbury deferred publication of a novel based on Green Town, the pseudonym for his hometown. Instead, he extracted seventeen stories and, with three other Green Town tales, bridged them into his 1957 book Dandelion Wine. Later, in 2006, Bradbury published the original novel remaining after the extraction, and retitled it Farewell Summer. These two titles show what stories and episodes Bradbury decided to retain as he created the two books out of one.

The most significant of the remaining unpublished stories, scenes, and fragments were published under the originally intended name for the novel, Summer Morning, Summer Night, in 2007.[86]

Adaptations to other media

Bradbury in 1959, when some of his short stories were adapted for television shows like Alfred Hitchcock Presents

From 1951 to 1954, 27 of Bradbury’s stories were adapted by Al Feldstein for EC Comics, and 16 of these were collected in the paperbacks, The Autumn People (1965) andTomorrow Midnight (1966), both published by Ballantine Books with cover illustrations by Frank Frazetta.

Also in the early 1950s, adaptations of Bradbury’s stories were televised in several anthology shows, including Tales of Tomorrow, Lights Out, Out There, Suspense, CBS Television Workshop, Jane Wyman’s Fireside Theatre, Star Tonight, Windows and Alfred Hitchcock Presents. “The Merry-Go-Round,” a half-hour film adaptation of Bradbury’s “The Black Ferris,” praised by Variety, was shown on Starlight Summer Theater in 1954 and NBC’s Sneak Preview in 1956. During that same period, several stories were adapted for radio drama, notably on the science fiction anthologies Dimension X and its successor X Minus One.

Scene from The Beast from 20,000 Fathoms, based on Bradbury’s The Fog Horn.

Producer William Alland first brought Bradbury to movie theaters in 1953 with It Came from Outer Space, a Harry Essex screenplay developed from Bradbury’s screen treatment “Atomic Monster”. Three weeks later came the release of Eugène Lourié’s The Beast from 20,000 Fathoms (1953), which featured one scene based on Bradbury’s “The Fog Horn“, about a sea monster mistaking the sound of a fog horn for the mating cry of a female. Bradbury’s close friend Ray Harryhausen produced the stop-motion animation of the creature. Bradbury would later return the favor by writing a short story, “Tyrannosaurus Rex”, about a stop-motion animator who strongly resembled Harryhausen. Over the next 50 years, more than 35 features, shorts, and TV movies were based on Bradbury’s stories or screenplays.

Bradbury was hired in 1953 by director John Huston to work on the screenplay for his film version of Melville‘s Moby Dick (1956), which stars Gregory Peck as Captain Ahab, Richard Basehart as Ishmael, and Orson Welles as Father Mapple. A significant result of the film was Bradbury’s book Green Shadows, White Whale, a semi-fictionalized account of the making of the film, including Bradbury’s dealings with Huston and his time in Ireland, where exterior scenes that were set in New Bedford, Massachusetts, were filmed.

Bradbury’s short story I Sing the Body Electric (from the book of the same name) was adapted for the 100th episode of The Twilight Zone. The episode was first aired on May 18, 1962.

In 1965, three of Bradbury’s stories were adapted for the stage. These included “The Wonderful Ice Cream Suit”, “The Day It Rained Forever” and “Device Out Of Time”. The latter was adapted from his 1957 novel Dandelion Wine. The plays debuted at the Coronet Theater in Hollywood and featured Booth Coleman, Joby Baker, Fredric Villani, Arnold Lessing, Eddie Sallia, Keith Taylor, Richard Bull, Gene Otis Shane, Henry T. Delgado, F. Murray Abraham, Anne Loos and Len Lesser. The director was Charles Rome Smith and the production company was Pandemonium Productions.

Oskar Werner and Julie Christie starred in Fahrenheit 451 (1966), an adaptation of Bradbury’s novel directed by François Truffaut.

In 1966, Bradbury helped Lynn Garrison create AVIAN, a specialist aviation magazine. For the first issue Bradbury wrote a poem – Planes that land on grass.

In 1969, The Illustrated Man was brought to the big screen, starring Rod Steiger, Claire Bloom and Robert Drivas. Containing the prologue and three short stories from the book, the film received mediocre reviews. The same year, Bradbury approached composer Jerry Goldsmith, who had worked with Bradbury in dramatic radio of the 1950s and later scored the film version of The Illustrated Man, to compose a cantataChristus Apollo based on Bradbury’s text.[87] The work premiered in late 1969, with the California Chamber Symphony performing with narrator Charlton Heston at UCLA.

File:Ray Bradbury at Caltech 12 November 1971.ogv

Ray Bradbury takes part in a symposium at Caltech with Arthur C. Clarke, journalist Walter Sullivan, and scientists Carl Sagan and Bruce Murray. In this excerpt, Bradbury reads his poem ‘If Only We Had Taller Been’ (poem begins at 2:20, full text[88]). Video released by NASA in honor of the naming of Bradbury Landing in 2012.[89]

In 1972 The Screaming Woman was adapted as an ABC Movie-of-the-Week starring Olivia de Havilland.

The Martian Chronicles became a three-part TV miniseries starring Rock Hudson which was first broadcast by NBC in 1980. Bradbury found the miniseries “just boring”.[90]

The 1982 television movie, The Electric Grandmother, was based on Bradbury’s short story “I Sing the Body Electric.”

The 1983 horror film Something Wicked This Way Comes, starring Jason Robards and Jonathan Pryce, is based on the Bradbury novel of the same name.

In 1984, Michael McDonough of Brigham Young University produced “Bradbury 13,” a series of 13 audio adaptations of famous stories from Bradbury, in conjunction with National Public Radio. The full-cast dramatizations featured adaptations of “The Ravine,” “Night Call, Collect,” “The Veldt“, “There Was an Old Woman,” “Kaleidoscope,” “Dark They Were, and Golden-Eyed“, “The Screaming Woman,” “A Sound of Thunder,” “The Man,” “The Wind,” “The Fox and the Forest,” “Here There Be Tygers” and “The Happiness Machine”. Voiceover actor Paul Frees provided narration, while Bradbury himself was responsible for the opening voiceover; Greg Hansen and Roger Hoffman scored the episodes. The series won a Peabody Award as well as two Gold Cindy awards and was released on CD on May 1, 2010. The series began airing on BBC Radio 4 Extra on June 12, 2011.

From 1985 to 1992 Bradbury hosted a syndicated anthology television series, The Ray Bradbury Theater, for which he adapted 65 of his stories. Each episode would begin with a shot of Bradbury in his office, gazing over mementoes of his life, which he states (in narrative) are used to spark ideas for stories. During the first two seasons, Bradbury also provided additional voiceover narration specific to the featured story and appeared on screen.

Deeply respected in the USSR, Bradbury’s fictions has been adapted into five episodes of the Soviet science fiction TV series This Fantastic World which adapted the stories I Sing The Body Electric, Fahrenheit 451, A Piece of Wood, To the Chicago Abyss, and Forever and the Earth.[91] In 1984 a cartoon adaptation of There Will Come Soft Rains («Будет ласковый дождь») came out byUzbek director Nazim Tyuhladziev.[92] He made a film adaptation of The Veldt (“Вельд”) in 1987.[93] In 1989 came out a cartoon adaptation of Here There Be Tygers («Здесь могут водиться тигры») by director Vladimir Samsonov.[94]

Bradbury wrote and narrated the 1993 animated television version of The Halloween Tree, based on his 1972 novel.

The 1998 film The Wonderful Ice Cream Suit, released by Touchstone Pictures, was written by Bradbury. It was based on his story “The Magic White Suit” originally published in The Saturday Evening Post in 1957. The story had also previously been adapted as a play, a musical, and a 1958 television version.

In 2002, Bradbury’s own Pandemonium Theatre Company production of Fahrenheit 451 at Burbank’s Falcon Theatre combined live acting with projected digital animation by the Pixel Pups. In 1984, Telarium released a game for Commodore 64 based on Fahrenheit 451.[95] Bradbury and director Charles Rome Smith co-founded Pandemonium in 1964, staging the New York production of The World of Ray Bradbury(1964), adaptations of “The Pedestrian“, “The Veldt”, and “To the Chicago Abyss.”

In 2005, the film A Sound of Thunder was released, loosely based upon the short story of the same name. The film The Butterfly Effect revolves around the same theory as A Sound of Thunder and contains many references to its inspiration. Short film adaptations of A Piece of Wood and The Small Assassin were released in 2005 and 2007 respectively.

In 2005, it was reported that Bradbury was upset with filmmaker Michael Moore for using the title Fahrenheit 9/11, which is an allusion to Bradbury’s Fahrenheit 451, for his documentary about the George W. Bush administration. Bradbury expressed displeasure with Moore’s use of the title but stated that his resentment was not politically motivated, even though Bradbury was conservative-leaning politically.[96] Bradbury asserted that he did not want any of the money made by the movie, nor did he believe that he deserved it. He pressured Moore to change the name, but to no avail. Moore called Bradbury two weeks before the film’s release to apologize, saying that the film’s marketing had been set in motion a long time ago and it was too late to change the title.[97]

In 2008, the film Ray Bradbury’s Chrysalis was produced by Roger Lay Jr. for Urban Archipelago Films, based upon the short story of the same name. The film won the best feature award at the International Horror and Sci-Fi Film Festival in Phoenix. The film has international distribution by Arsenal Pictures and domestic distribution by Lightning Entertainment.

In 2010, The Martian Chronicles was adapted for radio by Colonial Radio Theatre on the Air.

In 2012, EDM artist deadmau5, along with guest vocalist Chris James, crafted a song called “The Veldt” inspired by Bradbury’s short story of the same title. The lyrics featured various references to the short story.

Bradbury’s works and approach to writing are documented in Terry Sanders‘ film Ray Bradbury: Story of a Writer (1963).

Bradbury’s poem “Groon” was voiced as a tribute in 2012.[98]

Awards and honors

Bradbury receiving the National Medal of Arts in 2004 with PresidentGeorge W. Bush and his wife Laura Bush.

The Ray Bradbury Award for excellency in screenwriting was occasionally presented by the Science Fiction and Fantasy Writers of America – presented to six people on four occasions from 1992 to 2009.[99] Beginning 2010, the Ray Bradbury Award for Outstanding Dramatic Presentation is presented annually according to Nebula Awards rules and procedures, although it is not a Nebula Award.[100] The revamped Bradbury Award replaced the Nebula Award for Best Script.

Documentaries

Bradbury appeared in the documentary The Fantasy Film Worlds of George Pal (1985) (Produced and directed by Arnold Leibovit).

Citations
  • Anderson, James Arthur (2013). The Illustrated Ray Bradbury. Wildside Press. ISBN 978-1-4794-0007-2.
  • Albright, Donn (1990). Bradbury Bits & Pieces: The Ray Bradbury Bibliography, 1974–88. Starmont House. ISBN 1-55742-151-X.
  • Eller, Jonathan R.; Touponce, William F. (2004). Ray Bradbury: The Life of Fiction. Kent State University Press. ISBN 0-87338-779-1.
  • Eller, Jonathan R. (2011). Becoming Ray Bradbury. Urbana, IL: University of Illinois Press. ISBN 0-252-03629-8.
  • Nolan, William F. (1975). The Ray Bradbury Companion: A Life and Career History, Photolog, and Comprehensive Checklist of Writings. Gale Research. ISBN 0-8103-0930-0.
  • Paradowski, Robert J.; Rhynes, Martha E. (2001). Ray Bradbury. Salem Press.
  • Reid, Robin Anne (2000). Ray Bradbury: A Critical Companion. Greenwood Press. ISBN 0-313-30901-9.
  • Tuck, Donald H. (1974). The Encyclopedia of Science Fiction and Fantasy. Chicago: Advent. pp. 61–63. ISBN 0-911682-20-1.
  • Weist, Jerry (2002). Bradbury, an Illustrated Life: A Journey to Far Metaphor. William Morrow and Company. ISBN 0-06-001182-3.
  • Weller, Sam (2005). The Bradbury Chronicles: The Life of Ray Bradbury. HarperCollins. ISBN 0-06-054581-X.

External links

https://en.wikipedia.org/wiki/Ray_Bradbury

Fahrenheit 451

From Wikipedia, the free encyclopedia
This article is about the novel. For other uses, see Fahrenheit 451 (disambiguation).
Fahrenheit 451
Cover shows a drawing of a man, who appears to be made of newspaper and is engulfed in flames, standing on top of some books. His right arm is down and holding what appears to be a paper fireman's hat while his left arm is wiping sweat from the brow of his bowed head. Beside the title and author's name in large text, there is a small caption in the upper left-hand corner that reads, "Wonderful stories by the author of The Golden Apples of the Sun".

First edition cover
Author Ray Bradbury
Illustrator Joseph Mugnaini[1]
Country United States
Language English
Genre Dystopian novel[2]
Published 1953 (Ballantine Books)
Pages 159
ISBN ISBN 978-0-7432-4722-1 (current cover edition)
OCLC 53101079
813.54 22
LC Class PS3503.R167 F3 2003

Fahrenheit 451 is a dystopian novel by Ray Bradbury published in 1953. It is regarded as one of his best works.[3] The novel presents a future American society where books are outlawed and “firemen” burn any that are found.[4] The title refers to the temperature that Bradbury asserted to be the autoignition point of paper[5][6] (In reality, scientists place the autoignition point of paper anywhere from high 440 degrees Fahrenheit to some 30 degrees hotter, depending on the study and type of paper).[7]

The novel has been the subject of interpretations primarily focusing on the historical role of book burning in suppressing dissenting ideas. In a 1956 radio interview,[8]Bradbury stated that he wrote Fahrenheit 451 because of his concerns at the time (during the McCarthy era) about the threat of book burning in the United States. In later years, he stated his motivation for writing the book in more general terms.

The novel has won multiple awards. In 1954, it won the American Academy of Arts and Letters Award in Literature and the Commonwealth Club of California Gold Medal.[9][10][11] It has since won the Prometheus “Hall of Fame” Award in 1984[12] and a 1954 “Retro” Hugo Award, one of only four Best Novel Retro Hugos ever given, in 2004.[13] Bradbury was honored with a Spoken Word Grammy nomination for his 1976 audiobook version.[14]

The novel has been adapted several times. François Truffaut wrote and directed a film adaptation of the novel in 1966, and a BBC Radio dramatization was produced in 1982. Bradbury published a stage play version in 1979[15] and helped develop a 1984 interactive fiction computer game titled Fahrenheit 451. A companion piece titled A Pleasure To Burn, consisting of a selection of Bradbury’s short stories, was released in 2010, less than two years before the author’s death.

Plot summary

Fahrenheit 451 is set in an unspecified city (likely in the American Mid-West) at some unspecified time in the future[notes 1] after the year 1960.[notes 2][16][17]

The novel is divided into three parts: “The Hearth and the Salamander”, “The Sieve and the Sand”, and “Burning Bright”.

“The Hearth and the Salamander”

Guy Montag is a “fireman” hired to burn the possessions of those who read outlawed books. One fall night while returning from work, he meets his new neighbor: a teenage girl named Clarisse McClellan, whose free-thinking ideals and liberating spirit cause him to question his life and his own perceived happiness. Montag returns home to find that his wife Mildred has overdosed on sleeping pills, and calls for medical attention. Mildred survives with no memory of what happened. Over the next days, Clarisse faithfully meets Montag as he walks home. She tells him about how her interests have made her an outcast at school. Montag looks forward to these meetings, and just as he begins to expect them, Clarisse goes absent. He senses something is wrong.[18]

In the following days, while at work with the other firemen ransacking the book-filled house of an old woman before the inevitable burning, Montag steals a book before any of his coworkers notice. The woman refuses to leave her house and her books, choosing instead to light a match and burn herself alive. Montag returns home jarred by the woman’s suicide. While getting ready for bed, he hides the stolen book under his pillow. Still shaken by the night’s events, he attempts to make conversation with Mildred, conversation that only causes him to realize how little he knows her and how little they have in common. Montag asks his wife if she has seen Clarisse recently. Mildred mutters that she believes Clarisse died after getting struck by a speeding car and that her family has moved away. Dismayed by her failure to mention this, Montag uneasily tries to fall asleep. Outside he suspects the presence of “The Hound”, an eight-legged[19] robotic dog-like creature that resides in the firehouse and aids the firemen.

Montag awakens ill the next morning and stays home from work. He relates the story of the burned woman to an apathetic Mildred and mentions perhaps quitting his work. The possibility of becoming destitute over the loss of income provokes a strong reaction from her and she explains that the woman herself is to blame because she had books.

Captain Beatty, Montag’s fire chief, personally visits Montag to see how he is doing. Sensing Montag’s concerns, Beatty recounts how books lost their value and where the firemen fit in: Over the course of several decades, people embraced new media, sports, and a quickening pace of life. Books were ruthlessly abridged or degraded to accommodate a short attention span while minority groups protested over the controversial, outdated content perceived to be found in books. The government took advantage of this and the firemen were soon hired to burn books in the name of public happiness. Beatty adds casually that all firemen eventually steal a book out of curiosity; if the book is burned within 24 hours, the fireman and his family will not get in trouble.

After Beatty has left, Montag reveals to Mildred that over the last year he has accumulated a stash of books that he has kept hidden in their air-conditioning duct. In a panic, Mildred grabs a book and rushes to throw it in their kitchen incinerator; Montag subdues her and tells her that the two of them are going to read the books to see if they have value. If they do not, he promises the books will be burned and all will return to normal.

“The Sieve and the Sand”

While Montag and Mildred are perusing the stolen books, a sniffing occurs at their front door. Montag recognizes it as The Hound while Mildred passes it off as a random dog. They resume their discussion once the sound ceases. Montag laments Mildred’s suicide attempt, the woman who burned herself, and the constant din of bombers flying over their house taking part in a looming war neither he, nor anybody else, knows much about. He states that maybe the books of the past have messages that can save society from its own destruction. The conversation is interrupted by a call from Mildred’s friend Ann Bowles, and they set up a date to watch the “parlor walls” (large televisions lining the walls of her living room) that night at Mildred’s house.

Montag meanwhile concedes that they will need help to understand the books. Montag remembers an old man named Faber he once met in a park a year ago, an English professor before books were banned. He telephones Faber with questions about books and Faber soon hangs up on him. Undeterred, Montag makes a subway trip to Faber’s home along with a rare copy of the Bible, the book he stole at the woman’s house. Montag forces the scared and reluctant Faber into helping him by methodically ripping pages from the Bible. Faber concedes and gives Montag a homemade ear-piece communicator so he can offer constant guidance.

After Montag returns home, Mildred’s friends, Mrs. Bowles and Clara Phelps, arrive to watch the parlor walls. Not interested in the insipid entertainment they are watching, Montag turns off the walls and tries to engage the women in meaningful conversation, only to find them indifferent to all but the most trivial aspects of the upcoming war, friend’s deaths, their families, and politics. Montag leaves momentarily and returns with a book of poetry. This confuses the women and alarms Faber who is listening remotely. He proceeds to recite the poem Dover Beach, causing Mrs. Phelps to cry. At the behest of Faber in the ear-piece, Montag burns the book. Mildred’s friends leave in disgust while Mildred locks herself in the bathroom and takes more sleeping pills.

In the aftermath of the parlor party, Montag hides his books in his backyard before returning to the firehouse late at night with just the stolen Bible. He finds Beatty playing cards with the other firemen. Montag hands him the book, which is unceremoniously tossed into the trash. Beatty tells Montag that he had a dream in which they fought endlessly by quoting books to each other. In describing the dream Beatty reveals that, despite his disillusionment, he was once an enthusiastic reader. A fire alarm sounds and Beatty picks up the address from the dispatcher system. They drive in the firetruck recklessly to the destination. Montag is stunned when the truck arrives at his house.

“Burning Bright”

Beatty orders Montag to destroy his own house, telling him that his wife and her friends were the ones who reported him. Montag tries to talk to Mildred as she quickly leaves the house. Mildred ignores him, gets inside a taxi, and vanishes down the street. Montag obeys the chief, destroying the home piece by piece with a flamethrower. As soon as he has incinerated the house, Beatty discovers Montag’s ear-piece and plans to hunt down Faber. Montag threatens Beatty with the flamethrower and (after Beatty taunts him) burns his boss alive, and knocks his coworkers unconscious. As Montag escapes the scene, the firehouse’s mechanical dog attacks him, managing to inject his leg with a tranquilizer. He destroys it with the flamethrower and limps away.

Montag runs through the city streets towards Faber’s house. Faber urges him to make his way to the countryside and contact the exiled book-lovers who live there. He mentions he will be leaving on an early bus heading to St. Louis and that he and Montag can rendezvous there later. On Faber’s television, they watch news reports of another mechanical hound being released, with news helicopters following it to create a public spectacle. Montag leaves Faber’s house. After an extended manhunt, he escapes by wading into a river and floating downstream.

Montag leaves the river in the countryside, where he meets the exiled drifters, led by a man named Granger. They have each memorized books for an upcoming time when society is ready to rediscover them. While learning the philosophy of the exiles, Montag and the group watch helplessly as bombers fly overhead and attack the city with nuclear weapons, completely annihilating it. While Faber would have left on the early bus, Mildred along with everyone else in the city was surely killed. Montag and the group are injured and dirtied, but manage to survive the shock wave.

In the morning after, Granger teaches Montag and the others about the legendary phoenix and its endless cycle of long life, death in flames, and rebirth. He adds that the phoenix must have some relation to mankind, which constantly repeats its mistakes. Granger emphasizes that man has something the phoenix does not: mankind can remember the mistakes it made from before it destroyed itself, and try to not make them again. Granger then muses that a large factory of mirrors should be built, so that mankind can take a long look at itself. When the meal is over, the band goes back toward the city, to help rebuild society.

Characters

  • Guy Montag is the protagonist and fireman who presents the dystopia through the eyes of a worker loyal to it, a man in conflict about it, and one resolved to be free of it. Through most of the book, Montag lacks knowledge and believes what he hears.
  • Clarisse McClellan walks with Montag on his trips home and is one month short of being a 17-year-old girl.[notes 3][20] She is an unusual sort of person in the bookless, hedonistic society: outgoing, naturally cheerful, unorthodox, and intuitive. She is unpopular among peers and disliked by teachers for asking “why” instead of “how” and focusing on nature rather than on technology. A few days after their first meeting, she disappears without any explanation; Mildred tells Montag (and Captain Beatty confirms) that Clarisse was hit by a speeding car and that her family left following her death. In the afterword of a later edition, Bradbury notes that the film adaptation changed the ending so that Clarisse (who, in the film, is now a 20-year-old school teacher who was fired for being unorthodox) was living with the exiles. Bradbury, far from being displeased by this, was so happy with the new ending that he wrote it into his later stage edition.
  • Mildred “Millie” Montag is Guy Montag’s wife. She is addicted to sleeping pills, absorbed in the shallow dramas played on her “parlor walls” (flat-panel televisions), and indifferent to the oppressive society around her. She is described in the book as “thin as a praying mantis from dieting, and her flesh like white bacon.” Despite her husband’s attempts to break her from the spell society has on her, Mildred continues to be shallow and indifferent. After Montag scares her friends away by reading Dover Beach and unable to live with someone who has been hoarding books, Mildred betrays Montag by reporting him to the firemen and abandoning him.
  • Captain Beatty is Montag’s boss. Once an avid reader, he has come to hate books due to their unpleasant content and contradicting facts and opinions. In a scene written years later by Bradbury for theFahrenheit 451 play, Beatty invites Montag to his house where he shows him walls of books left to molder on their shelves.
  • Stoneman and Black are Montag’s coworkers at the firehouse. They do not have a large impact on the story and function to show the reader the contrast between the firemen who obediently do as they’re told and someone like Montag, who formerly took pride in his job—subsequently realizing how damaging it is to society.
  • Faber is a former English professor. He has spent years regretting that he did not defend books when he saw the moves to ban them. Montag turns to him for guidance, remembering him from a chance meeting in a park some time earlier. Faber at first refuses to help Montag, and later realizes that he is only trying to learn about books, not destroy them. Bradbury notes in his afterword that Faber is part of the name of a German manufacturer of pencils, Faber-Castell.
  • Mrs. Ann Bowles and Mrs. Clara Phelps are Mildred’s friends and representative of the anti-intellectual, hedonistic society presented in the novel. During a social visit to Montag’s house, they brag about ignoring the bad things in their lives and have a cavalier attitude towards the upcoming war, their husbands, their children, and politics. Mrs. Phelps has a husband named Pete who was called in to fight in the upcoming war (and believes that he’ll be back in a week because of how quick the war will be) and thinks having children serves no purpose other than to ruin lives. Mrs. Bowles is a thrice married, single mother. Her first husband divorced her, her second died in a jet accident, and her third committed suicide by shooting himself in the head. She has two children who do not like or even respect her due to her permissive, often negligent and abusive parenting: Mrs. Bowles brags that her kids beat her up and she’s glad that she can hit back. When Montag reads Dover Beach to them, Mrs. Phelps starts crying over how hollow her life is while Mrs. Bowles chastises Montag for reading “silly awful hurting words”.
  • Granger is the leader of a group of wandering intellectual exiles who memorize books in order to preserve their contents.

Historical context

Bradbury’s lifelong passion with books began at an early age. As a frequent visitor to his local libraries in the 1920s and 1930s, he recalls being disappointed because they did not stock popular science fiction novels, like those of H. G. Wells, because, at the time, they were not deemed literary enough. Between this and learning about the destruction of the Library of Alexandria,[21] a great impression was made on the young man about the vulnerability of books to censure and destruction. Later as a teenager, Bradbury was horrified by the Nazi book burnings[22] and later Joseph Stalin‘s campaign of political repression, the “Great Purge“, in which writers and poets, among many others, were arrested and often executed.[23]

After the 1945 conclusion of World War II shortly after the atomic bombings of Hiroshima and Nagasaki, the United States focused its concern on the Soviet atomic bomb project and the expansion of communism. The House Un-American Activities Committee (HUAC)—formed in 1938 to investigate American citizens and organizations suspected of having communist ties—held hearings in 1947 to investigate alleged communist influence in Hollywood movie-making. These hearings resulted in the blacklisting of the so-called “Hollywood Ten“,[24] a group of influential screenwriters and directors. This governmental interference in the affairs of artists and creative types greatly angered Bradbury.[25] Bitter and concerned about the workings of his government, a late 1949 nighttime encounter with an overzealous police officer would inspire Bradbury to write “The Pedestrian“, a short story which would go on to become “The Fireman” and then Fahrenheit 451. The rise of Senator Joseph McCarthy‘s hearings hostile to accused communists starting in 1950, would only deepen Bradbury’s contempt over government overreach.[26][27]

The same year HUAC began investigating Hollywood is often considered the beginning of the Cold War, as in March 1947, the Truman Doctrine was announced. By about 1950, the Cold War was in full swing and the American public’s fear of atomic warfare and communist influence was at a feverish level. The stage was set for Bradbury to write the dramatic nuclear holocaust ending of Fahrenheit 451, exemplifying the type of scenario feared by many Americans of the time.[28]

Bradbury’s early life witnessed the Golden Age of Radio while the transition to the Golden Age of Television began right around the time he started to work on the stories that would eventually lead to Fahrenheit 451. Bradbury saw these forms of media as a threat to the reading of books, indeed as a threat to society, as he believed they could act as a distraction from important affairs. This contempt for mass media and technology would express itself through Mildred and her friends and is an important theme in the book.[29]

Writing and development

Fahrenheit 451 developed out of a series of ideas Bradbury had visited in previously written stories. For many years, he tended to single out “The Pedestrian” in interviews and lectures as sort of a proto-Fahrenheit 451. In the Preface of his 2006 anthology Match to Flame: The Fictional Paths to Fahrenheit 451 he states that this is an oversimplification.[30] The full genealogy of Fahrenheit 451 given in Match to Flame is involved. The following covers the most salient aspects.[citation needed]

Between 1947 and 1948,[31] Bradbury wrote the short story “Bright Phoenix” (not published until the May 1963 issue of The Magazine of Fantasy & Science Fiction[32][33]) about a librarian who confronts a book-burning “Chief Censor” named Jonathan Barnes. Barnes is a clear foreshadow of the ominous Captain Beatty of Fahrenheit 451.[citation needed]

In late 1949,[34] Bradbury was stopped and questioned by a police officer while walking late one night.[35][36] When asked “What are you doing?”, Bradbury wisecracked, “Putting one foot in front of another.”[35][36]This incident inspired Bradbury to write the 1951 short story “The Pedestrian”.[notes 4][35][36] In “The Pedestrian”, Leonard Mead is harassed and detained by the city’s remotely operated police cruiser (there’s only one) for taking nighttime walks, something that has become extremely rare in this future-based setting: everybody else stays inside and watches television (“viewing screens”). Alone and without an alibi, Mead is taken to the “Psychiatric Center for Research on Regressive Tendencies” for his peculiar habit. Fahrenheit 451 would later echo this theme of an authoritarian society distracted by broadcast media.[citation needed]

Bradbury expanded the book-burning premise of “Bright Phoenix”[37] and the totalitarian future of “The Pedestrian”[38] into “The Fireman”, a novella published in the February 1951 issue of Galaxy Science Fiction.[39][40] “The Fireman” was written in the basement of UCLA‘s Powell Library on a typewriter that he rented for a fee of ten cents per half hour.[41] The first draft was 25,000 words long and was completed in nine days.[42]

Urged by a publisher at Ballantine Books to double the length of his story to make a novel, Bradbury returned to the same typing room and expanded his work into Fahrenheit 451, taking just nine days.[41] The completed book was published by Ballantine in 1953.[43]

Supplementary material

Bradbury has supplemented the novel with various front and back matter, including a 1979 coda,[44] a 1982 afterword,[45] a 1993 foreword, and several introductions. In these he provides some commentary on the themes of the novel,[44] thoughts on the movie adaptation, and numerous personal anecdotes related to the writing and development.[citation needed]

Publication history

The first U.S. printing was a paperback version from October 1953 by The Ballantine Publishing Group. Shortly after the paperback, a hardback version was released that included a special edition of 200 signed and numbered copies bound in asbestos.[46][47][48] These were technically collections because the novel was published with two short stories: “The Playground” and “And the Rock Cried Out”, which have been absent in later printings.[1][49] A few months later, the novel was serialized in the March, April, and May 1954 issues of nascent Playboy magazine.[9][50]

Expurgation

Starting in January 1967, Fahrenheit 451 was subject to expurgation by its publisher, Ballantine Books with the release of the “Bal-Hi Edition” aimed at high school students.[51][52] Among the changes made by the publisher were the censorship of the words “hell”, “damn”, and “abortion”; the modification of seventy-five passages; and the changing of two episodes.[52][53] In the one case, a drunk man became a “sick man” while cleaning fluff out of a human navel became “cleaning ears” in the other.[52][54] For a while both the censored and uncensored versions were available concurrently but by 1973 Ballantine was publishing only the censored version.[54][55] This continued until 1979 when it came to Bradbury’s attention:[54][55]

In 1979, one of Bradbury’s friends showed him an expurgated copy. Bradbury demanded that Ballantine Books withdraw that version and replace it with the original, and in 1980 the original version once again became available. In this reinstated work, in the Author’s Afterword, Bradbury relates to the reader that it is not uncommon for a publisher to expurgate an author’s work, but he asserts that he himself will not tolerate the practice of manuscript “mutilation”.

The “Bal-Hi” editions are now referred to by the publisher as the “Revised Bal-Hi” editions.[56]

Non-print publications

An audiobook version read by Bradbury himself was released in 1976 and received a Spoken Word Grammy nomination.[14] Another audiobook was released in 2005 narrated by Christopher Hurt.[57] The e-bookversion was released in December 2011.[58][59]

Reception

In 1954, Galaxy Science Fiction reviewer Groff Conklin placed the novel “among the great works of the imagination written in English in the last decade or more.”[60] The Chicago Sunday Tribunes August Derlethdescribed the book as “a savage and shockingly savage prophetic view of one possible future way of life,” calling it “compelling” and praising Bradbury for his “brilliant imagination”.[61] Over half a century later, Sam Weller wrote, “upon its publication, Fahrenheit 451 was hailed as a visionary work of social commentary.”[62] Today, Fahrenheit 451 is still viewed as an important cautionary tale against conformity and book burning.[63]

When the book was first published there were those who did not find merit in the tale. Anthony Boucher and J. Francis McComas were less enthusiastic, faulting the book for being “simply padded, occasionally with startlingly ingenious gimmickry, … often with coruscating cascades of verbal brilliance [but] too often merely with words.”[64] Reviewing the book for Astounding Science Fiction, P. Schuyler Miller characterized the title piece as “one of Bradbury’s bitter, almost hysterical diatribes,” and praised its “emotional drive and compelling, nagging detail.”[65] Similarly, The New York Times was unimpressed with the novel and further accused Bradbury of developing a “virulent hatred for many aspects of present-day culture, namely, such monstrosities as radio, TV, most movies, amateur and professional sports, automobiles, and other similar aberrations which he feels debase the bright simplicity of the thinking man’s existence.”[66]

Censorship/banning incidents

In the years since its publication, Fahrenheit 451 has occasionally been banned, censored, or redacted in some schools by parents and teaching staff either unaware of or indifferent to the inherent irony of such censorship. The following are some notable incidents:

  • In 1987, Fahrenheit 451 was given “third tier” status by the Bay County School Board in Panama City, Florida, under then-superintendent Leonard Hall’s new three-tier classification system.[67] Third tier was meant for books to be removed from the classroom for “a lot of vulgarity”.[67] After a resident class-action lawsuit, a media stir, and student protests, the school board abandoned their tier-based censorship system and approved all the currently used books.[67]
  • In 1992, Venado Middle School in Irvine, California gave copies of Fahrenheit 451 to students with all “obscene” words blacked out.[68] Parents contacted the local media and succeeded in reinstalling the uncensored copies.[68]
  • In 2006, parents of a tenth grade high school student in Montgomery County, Texas, demanded the book be banned from their daughter’s English class reading list.[69] Their daughter was assigned the book during Banned Books Week, but stopped reading several pages in due to the offensive language and description of the burning of the Bible.[69] In addition, her parents protested the violence, portrayal of Christians, and depictions of firemen in the novel.[69]

Themes

Discussions about Fahrenheit 451 often center on its story foremost as a warning against state-based censorship. Indeed, when Bradbury wrote the novel during the McCarthy era, he was concerned about censorship in the United States. During a radio interview in 1956,[70][71] Bradbury said:

I wrote this book at a time when I was worried about the way things were going in this country four years ago. Too many people were afraid of their shadows; there was a threat of book burning. Many of the books were being taken off the shelves at that time. And of course, things have changed a lot in four years. Things are going back in a very healthy direction. But at the time I wanted to do some sort of story where I could comment on what would happen to a country if we let ourselves go too far in this direction, where then all thinking stops, and the dragon swallows his tail, and we sort of vanish into a limbo and we destroy ourselves by this sort of action.

As time went by, Bradbury tended to dismiss censorship as a chief motivating factor for writing the story. Instead he usually claimed that the real messages of Fahrenheit 451 were about the dangers of an illiterate society infatuated with mass media and the threat of minority and special interest groups to books. In the late 1950s, Bradbury recounted:

In writing the short novel Fahrenheit 451, I thought I was describing a world that might evolve in four or five decades. But only a few weeks ago, in Beverly Hills one night, a husband and wife passed me, walking their dog. I stood staring after them, absolutely stunned. The woman held in one hand a small cigarette-package-sized radio, its antenna quivering. From this sprang tiny copper wires which ended in a dainty cone plugged into her right ear. There she was, oblivious to man and dog, listening to far winds and whispers and soap-opera cries, sleep-walking, helped up and down curbs by a husband who might just as well not have been there. This was not fiction.[72]

This story echoes Mildred’s “Seashell ear-thimbles” (i.e., a brand of in-ear headphones) that act as an emotional barrier between her and Montag. In a 2007 interview, Bradbury maintained that people misinterpret his book and that Fahrenheit 451 is really a statement on how mass media like television marginalizes the reading of literature.[73] Regarding minorities, he wrote in his 1979 Coda:

There is more than one way to burn a book. And the world is full of people running about with lit matches. Every minority, be it Baptist/Unitarian, Irish/Italian/Octogenarian/Zen Buddhist, Zionist/Seventh-day Adventist, Women’s Lib/Republican, Mattachine/Four Square Gospel feels it has the will, the right, the duty to douse the kerosene, light the fuse. […] Fire-Captain Beatty, in my novel Fahrenheit 451, described how the books were burned first by minorities, each ripping a page or a paragraph from this book, then that, until the day came when the books were empty and the minds shut and the libraries closed forever. […] Only six weeks ago, I discovered that, over the years, some cubby-hole editors at Ballantine Books, fearful of contaminating the young, had, bit by bit, censored some seventy-five separate sections from the novel. Students, reading the novel, which, after all, deals with censorship and book-burning in the future, wrote to tell me of this exquisite irony. Judy-Lynn del Rey, one of the new Ballantine editors, is having the entire book reset and republished this summer with all the damns and hells back in place.[74]

Book-burning censorship, Bradbury would argue, was a side-effect of the these two primary factors; this is consistent with Captain Beatty’s speech to Montag about the history of the firemen. According to Bradbury, it is the people, not the state, who are the culprit in Fahrenheit 451.[73] Nevertheless, the role on censorship, state-based or otherwise, is still perhaps the most frequent theme explored in the work.[75][better source needed]

A variety of other themes in the novel besides censorship have been suggested. Two major themes are resistance to conformity and control of individuals via technology and mass media. Bradbury explores how the government is able to use mass media to influence society and suppress individualism through book burning. The characters Beatty and Faber point out the American population is to blame. Due to their constant desire for a simplistic, positive image, books must be suppressed. Beatty blames the minority groups, who would take offense to published works that displayed them in an unfavorable light. Faber went further to state that the American population simply stopped reading on their own. He notes that the book burnings themselves became a form of entertainment to the general public.[76]

Predictions for the future

Bradbury described himself as “a preventor of futures, not a predictor of them.”[77] He did not believe that book burning was an inevitable part of our future; he wanted to warn against its development.[77] In a later interview, when asked if he believes that teaching Fahrenheit 451 in schools will prevent his totalitarian[2] vision of the future, Bradbury replied in the negative. Rather, he states that education must be at the kindergarten and first-grade level. If students are unable to read then, they will be unable to read Fahrenheit 451.[78]

In terms of technology, Sam Weller notes that Bradbury “predicted everything from flat-panel televisions to iPod earbuds and twenty-four-hour banking machines.”[79]

Adaptations

Playhouse 90 broadcast “A Sound of Different Drummers” on CBS in 1957, written by Robert Alan Aurthur. The play combined plot ideas from Fahrenheit 451 and Nineteen Eighty-Four. Bradbury sued and eventually won on appeal.[80][81]

A film adaptation written and directed by François Truffaut and starring Oskar Werner and Julie Christie was released in 1966.[82][83]

BBC Radio produced a one-off dramatization of the novel in 1982[84] starring Michael Pennington.[85] It was broadcast again on February 12, 2012, and April 7 and 8, 2013, on BBC Radio 4 Extra.[86]

In 1984, the novel was adapted into a computer text adventure game of the same name by the software company Trillium.[87]

In 2006, the Drama Desk Award winning Godlight Theatre Company produced and performed the New York City premiere of Ray Bradbury‘s Fahrenheit 451 at 59E59 Theaters.[88] After the completion of the New York run, the production then transferred to the Edinburgh Festival where it was a 2006 Edinburgh Festival Pick of the Fringe.[89]

The Off-Broadway theatre The American Place Theatre presented a one man show adaptation of Fahrenheit 451 as a part of their 2008–2009 Literature to Life season.[90]

In June 2009, a graphic novel edition of the book was published. Entitled Ray Bradbury’s Fahrenheit 451: The Authorized Adaptation,[91] the paperback graphic adaptation was illustrated by Tim Hamilton.[92][93] The introduction in the novel is written by Bradbury.[citation needed]

Fahrenheit 451 inspired the Birmingham Repertory Theatre production Time Has Fallen Asleep in the Afternoon Sunshine, which was performed at the Birmingham Central Library in April 2012.[94]

Notes

  1. Jump up^ During Captain Beatty’s recounting of the history of the firemen to Montag, he says, “Out of the nursery into the college and back to the nursery; there’s your intellectual pattern for the past five centuries or more.” The text is ambiguous regarding which century he is claiming began this pattern. One interpretation is that he means the 20th century, which would place the novel in at least the 24th century. “The Fireman” novella, which was expanded to become Fahrenheit 451, is set in October 2052.
  2. Jump up^ In early editions of the book, Montag says, “We’ve started and won two atomic wars since 1960” in the first pages of The Sieve and the Sand. This sets a lower bound on the time setting. In later decades, some editions have changed this year to 1990 or 2022.
  3. Jump up^ Clarisse tells Montag she is “seventeen and crazy”, later admitting that she will actually be seventeen “next month”.
  4. Jump up^ “The Pedestrian” would go on to be published in The Reporter magazine on August 7, 1951, that is, after the publication in February 1951 of its inspired work “The Fireman”.

See also

Further reading

External links

https://en.wikipedia.org/wiki/Fahrenheit_451

Read Full Post | Make a Comment ( None so far )

Plan A (Awful) Hillary Clinton, Plan B (Bad): Joe Biden, Plan C (California): Jerry Brown, Plan D (Dumb): Bernie Sanders — Obama’s Legacy: The Destruction of Democratic Party — Rupert Murdoch Says Biden Very Likely To Win Nomination and Hard To Beat — Videos

Posted on September 9, 2015. Filed under: American History, Articles, Blogroll, Communications, Congress, Constitution, Corruption, Crime, Culture, Documentary, Economics, Elections, Employment, Entertainment, Faith, Family, Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Films, Fiscal Policy, Foreign Policy, Fraud, Freedom, Friends, government, government spending, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, media, Middle East, Money, Movies, National Security Agency (NSA), National Security Agency (NSA_, People, Philosophy, Police, Political Correctness, Radio, Radio, Raves, Talk Radio, Taxation, Television, Unemployment, Video, War, Wealth, Welfare, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Pronk Pops Show 496: June 30, 2015

Pronk Pops Show 495: June 29, 2015

Pronk Pops Show 494: June 26, 2015

Pronk Pops Show 493: June 25, 2015

Pronk Pops Show 492: June 24, 2015

Pronk Pops Show 491: June 23, 2015

Pronk Pops Show 490: June 22, 2015

Pronk Pops Show 489: June 19, 2015

Pronk Pops Show 488: June 18, 2015

Pronk Pops Show 487: June 17, 2015

Pronk Pops Show 486; June 16, 2015

Pronk Pops Show 485: June 15, 2015

Pronk Pops Show 484: June 12, 2015

Pronk Pops Show 483: June 11, 2015

Pronk Pops Show 482; June 10, 2015

Pronk Pops Show 481: June 9, 2015

Pronk Pops Show 480: June 8, 2015

Pronk Pops Show 479: June 5, 2015

Pronk Pops Show 478: June 4, 2015

Pronk Pops Show 477: June 3, 2015

Pronk Pops Show 476: June 2, 2015

Pronk Pops Show 475: June 1, 2015

Plan A (Awful) Hillary Clinton, Plan B (Bad): Joe Biden, Plan C (California): Jerry Brown, Plan D (Dumb): Bernie Sanders — Obama’s Legacy: The Destruction of Democratic Party — Rupert Murdoch Says Biden Very Likely To Win Nomination and Hard To Beat — Videos

Plan A (Awful) Hillary Clinton

Hillary Clinton ‘Sorry’ Her Use Of Private E-Mail Has Raised Questions

Hillary Clinton on emails: ‘I’m sorry’

Hillary Clinton Interview: One-On-One With Andrea Mitchell | MSNBC

Mounting trouble in Hillary Clinton email investigation

Minute Memo #174 – Clinton Hiding Benghazi Emails

Clinton Emails To Receive 50 State Department Staff

Judge Napolitano: Gut feeling is that Hillary Clinton will be charged over private emails.

• Clinton Insiders Altered Top Secret Emails • Kelly File • 8/12/15 •

Napolitano: Clinton’s emails on home server against the law – FoxTV United States News

Rep. Gowdy: “About damn time” Clinton emails tu..

Newsmax Prime | Gen. Michael Hayden on Hillary Clinton’s having compromised U.S. National Security

Trump Predicts Prison Time for Hillary Clinton

Hillary Clinton vs Bernie Sanders

Hillary Clinton on emails: ‘everything was permitted

Plan B (Bad) Joe Biden

Joe Biden Makes Strides, But Is He Running?

Crowd greets Biden with chants of ‘Run, Joe, run!’

Biden greeted with chants of ‘run, Joe, run!’ in Pittsburgh

Biden Hears Cheers: ‘Run, Joe, Run’

Plan C (California) Jerry Brown

Gov. Jerry Brown: If I were Biden, I’d give 2016 run ‘very serious consideration

Jerry Brown: If I Were Joe Biden, I’d Give 2016 Run ‘Serious Consideration’

Jerry Brown: I Would Run for President if I Was 10 Years Younger

Calif. Gov. Jerry Brown talks drought, political future

Calif. Gov. Jerry Brown Nixes 2016 Presidential Bid

Jerry Brown for President 1992 Report – (The MacNeil/Lehrer NewsHour)

Bill Clinton Versus Jerry Brown 1992

3 California Governors Who Ran for President

Plan D (Dumb) Bernie Sanders

Bernie Sanders Grows NH Lead Over Hillary Clinton, Gains in Iowa

Hillary Clinton vs Bernie Sanders

Bernie Sanders Explains Why Socialist Isn’t a Dirty Word

Things Get Awkward When Matthews Asks DNC Head About Bernie Sanders, Socialism (VIDEO)

Socialist Bernie Sanders Doesn’t Understand Socialism

The Truth About Bernie Sanders

Rupert Murdoch On Why He Supports Immigration Reform

Rupert Murdoch: Donald Trump ‘wrong’ on immigration

Bill O’Reilly Donald Trump Battle over Immigration Plan and 14th Amendment

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

National Security Agency Whistleblower William Binney on Growing State Surveillance

NSA Whistleblower William Binney: The Future of FREEDOM

Operation “Toto” Pulling Back The Curtain: Full NSA Interview

Will Smith Movies Full Length | Enemy of the State 1998 Movie English HD

‘Run, Joe, run!’ Adoring Pittsburgh crowd enthusiastically encourages Joe Biden to run for president

  • Joe Biden given a rapturous welcome by Pittsburgh steelworkers at rally
  • The Vice President gave a rousing speech blaming America’s ills on stagnant wages and an unfair tax code that favors the wealthy
  • Biden, who is still grieving his son, Beau, jogged through the crowd 
  • Biden’s popularity numbers are on par with Trump’s 

Hearing chants of ‘run Joe, run,’ Vice President Joe Biden marched in Pittsburgh’s annual Labor Day parade on Monday as speculation swirled about a potential entry into the Democratic presidential campaign.

The vice president donned a black-and-gold United Steelworkers union hat and told hundreds of union members that the gap between the wealthy and poor was hurting the nation.

The 72-year-old exuberantly jogged through the crowd of supportive well-wishers, who were urging him to join the race for president.

‘Give it a go, Joe!’ shouted one woman.

Scroll down for video 

Joe Biden rouses crowd at Pittsburgh rally

Vice President Joe Biden revved up the crowd at a steelworkers union event in Pittsburgh on Sunday

Joe Biden rouses crowd at Pittsburgh rally
Joe Biden rouses crowd at Pittsburgh rally

Biden was greeted with shouts of ‘Run, Joe, run!’ encouraging him to run for president

Recent polls suggest that those who are abandoning Hillary Clinton back Biden for president, according to CNN.

But Biden deflected questions as to whether or not he would enter the fray, only saying ‘I am definitely going to run part of this parade, I feel like I am home right now.’

But he had much more to say in his speech in front of the union.

‘It used to be when productivity went up in America, everybody got a chance to share,’ said Biden. ‘They got a piece of the action… Why in God’s name should a man or a woman working in a steel mill make $50,000 a year when someone on Wall Street makes millions of dollars a year?’

In introducing Biden for his speech, Trumka and United Steelworkers union chief Leo Gerard gave strong praise to Biden, who was born in Scranton, Pennsylvania.

Biden praises unions as he addressees crowds on Labor Day

Joe Biden rouses crowd at Pittsburgh rally

Joe Biden rouses crowd at Pittsburgh rally

The adoring crowd flocked around the sprightly 72-year-old, who is still reeling from his son Beau’s death in May, but who looked happy and healthy at the rally

Fans clamored for selfies with the VP, who tends to be known for his verbal gaffes

Fans clamored for selfies with the VP, who tends to be known for his verbal gaffes

‘He has never let us down,’ said Gerard.

Biden, in his speech, said the tax code is to blame for the rich getting a bigger piece of the economic pie.

‘The tax code’s not fair. It’s simply not fair,’ Biden said in a city long associated with organized labor. ‘The wealthy aren’t paying their fair share. There used to be one America.’

Biden greeted United Steelworkers President Leo Gerard (right) who said Biden has never let steelworkers down

Biden greeted United Steelworkers President Leo Gerard (right) who said Biden has never let steelworkers down

Biden was cagey about whether he would run for POTUS but he had no issue with jogging through the streets of Pittsburgh 

Biden was cagey about whether he would run for POTUS but he had no issue with jogging through the streets of Pittsburgh

When asked point-blank by young local business owner Chris Fuget asked whether he would announce a 2016 run, the Vice President coyly said, ‘I haven’t made that decision yet,’ according to CNN.

There was some disappointment in the crowd that he didn’t throw his hat into the ring.

‘We thought today might have been the day,’ said Pittsburgh union worker Jack Gaffrey.

'It's hope,' the VP said about the enthusiastic response the crowd gave him 

‘It’s hope,’ the VP said about the enthusiastic response the crowd gave him

His entry could jumble a Democratic contest that has seen front-runner Hillary Rodham Clinton’s lead diminish in early states against Vermont Sen. Bernie Sanders, an independent who describes himself as a democratic socialist.

Biden, however, said last week he wasn’t certain if he and his family had the ’emotional energy’ for another campaign. Biden’s eldest son, Beau, died of brain cancer in May.

Biden blamed America's ills on the tax code which favors the wealthy as well as low and stagnant wages

Biden blamed America’s ills on the tax code which favors the wealthy as well as low and stagnant wages

But AFL-CIO President Richard Trumka, who walked the parade route with Biden, said the vice president got a strong response from the city’s workers.

‘If you’re looking for energy, this is a great place to get energy today,’ the labor leader said.

Asked what he made of the overwhelmingly warm response Pittsburgh gave him, he replied, ‘It’s hope.’

'I am definitely going to run part of this parade,' Biden said and then made good his promise

‘I am definitely going to run part of this parade,’ Biden said and then made good his promise

In a new NBC/Marist poll of New Hampshire primary voters released on Sunday, Biden had support from 16 percent of Democratic voters.

That’s half the total of Clinton, who herself trailed front runner Sanders by nine points in New Hampshire, a state where Bill and Hillary Clinton have deep ties.

In Iowa, Clinton saw her lead over Sanders decline by half and now leads him by 37 percent to 20 precent with Biden at 20 percent.

But Biden still isn’t as quite popular as GOP frontrunner Donald Trump.

The reality star billionaire beats him by a narrow margin in a new national poll 44 percent to 42 percent, according to SurveyUSA.

http://www.dailymail.co.uk/news/article-3225543/Run-Joe-run-Pittsburgh-crowd-enthusiastically-encourages-Joe-Biden-run-president.html

The Best Second Choice

Forget Sanders and Biden, the Democrats’ best 2016 backup is California Gov. Jerry Brown.

Gov. Jerry Brown speaks at a news conference about transportation in Oakland, Calif., Wednesday, Aug. 19, 2015.

The best bet.

By Aug. 21, 2015 | 10:40 a.m. EDT+ MoreIn assessing Hillary Clinton’s chances of being the 2016 Democratic nominee, Sean Trende hits the nail squarely on the head: “Absent an indictment, she remains the solid favorite for the nomination.” Yes, you read that correctly: “absent an indictment.”

In any other year, with any other candidate, that phrase would be ludicrous. How could a party be so solidly behind a person who is so publicly balancing on a razor’s edge between shady practices andillegal dealings? While there are many reasons for this, three stand out and are worth remembering before asking the next logical question: If not her, then who?

First, two large “anti-in-party” midterm elections decimated the Democrats’ bench. Surviving Democratic statewide elected officials are few and far between. And those who are there need more time to acquire political experience and develop a national reputation.

Second, Clinton has been perceived by her fellow partisans as the next in line for the nomination since the day she conceded the 2008 nomination contest to then-Sen. Barack Obama. That year’s epic contest ended with an unspoken but widely understood deal between the two warring factions of Democratic activists: Support for Obama in 2008 will lead to support for Clinton as his successor. This was a tough pill for Clinton’s backers to take because they had been expecting Clinton to become the party’s next nominee since the day John Kerry lost in 2004. But they accepted the trade because they had no choice.

Third, Clinton is not only unique because her gender combines with the Democratic Party’s sincere desire to follow the first African-American president with the first female one (a right time, right place confluence of dynamics, if you will), but also because the country experienced tremendous economic prosperity during her husband’s tenure in the White House and Democrats largely believe that fact will redound favorably on her candidacy.

Of course, her being a Clinton is also a challenge for her campaign. Aside from the dynasty knock, the Clintons have long rankled the feathers of other Democrats, and it was this “anti-Clinton” sentiment thatObama exploited to full benefit in 2008.

Nevertheless, it’s this strange brew of partisan expectations and political realities that have likely kept Clinton’s (older, but no less ambitious) Democratic opponents on the sidelines. If she were indicted, though, all bets are off and the problem of surfeit ambition would likely arise.

Setting aside the unknown probability of an indictment and the known likelihood of Clinton securing the Democratic presidential nomination before next spring, the question of who could possibly replace her is an interesting one to consider.

At the moment, progressive Democrats are increasingly rallying around one of her few declared opponents, Sen. Bernie Sanders of Vermont. But his far-left policy stances and past voting record make him a weak general election candidate. Democrats know this; it’s highly unlikely that the party establishment would support him to become the nominee.

There’s also the undeclared, but publicly ruminating Vice President Joe Biden. Despite his gaffe-pronereputation, most reports suggest that he is the party’s preferred second choice.

Still, if Clinton’s candidacy were to implode, I don’t imagine Biden would be on a glide path to the nomination (unless Obama were to endorse him). Secretary of State John Kerry might decide his time is now. As he lost the 2004 election by fewer than 120,000 votes from Ohio, he can legitimately argue he’s been a better candidate than Biden in past presidential races.

But by far, the Democrats’ strongest septuagenarian is California Gov. Jerry Brown. He has vast political experience. He’s well-liked across the Democratic Party. He continues to enjoy high approval ratings and has widely been perceived as an effective governor.

He’d also offer the Democrats two key talking points Sanders, Biden and Kerry can’t: He’s a Washington outsider and he knows how to make government work because he’s served four terms in the top executive office in California. Further, he has a more than two-decade long reputation of being the “anti-Clinton,” which would not only likely endear him to Sanders’ supporters, but would also place him in good stead were the party needing to wash its hands of all things Clinton in the wake of an indictment.

So while Brown’s candidacy may be a far-fetched possibility, from my view, he’s the best “second choice” for Democrats to mount a competitive general election campaign. But then, all of us Brownsfrom California tend to view politics rather unconventionally.

http://www.usnews.com/opinion/blogs/lara-brown/2015/08/21/jerry-brown-is-the-democrats-best-choice-to-replace-clinton

GINGRICH: JERRY BROWN COULD ENTER PRESIDENTIAL RACE

Former Speaker of the House and 2012 presidential candidate Newt Gingrich told CNN on Monday that California Gov. Jerry Brown could enter the presidential race.

“If Hillary starts to implode you will see a vacuum that you have not seen in many, many years,” Gingrich told Fox News’ Greta van Susteren on her show, On the Record, speculating that Clinton’s mounting scandals could cost her the race.

“[Former New York mayor Michael] Bloomberg, if he shifts, Jerry Brown–I mean, you just don’t know. [Senator]

Sen. Elizabeth Warren (D-MA) 15% …” Gingrich suggested.Gingrich also suggested that Secretary of State John Kerry might run, along with Vice President Joe Biden.

Brown has run for president three times before. He would be 78 years old in 2016, and has suggested that age might be an obstacle to a run, though he has not entirely ruled out a fourth attempt at the Oval Office.

He is, however, among the most popular and successful Democratic governors in the United States, and has more experience than anyone else in the field, currently or potentially.

Gingrich said that Hillary’s main worry will be socialist

Sen. Bernie Sanders (I-VT) 16%, who is running for the Democratic Party nomination.

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 526-528

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Good Will Hunting — Videos

Posted on July 30, 2015. Filed under: Babies, Blogroll, Business, College, Communications, Corruption, Crime, Crisis, Education, Films, Freedom, government, Law, Life, Links, Love, Math, media, Non-Fiction, People, Philosophy, Photos, Radio, Rants, Raves, Terrorism, Video, Wealth, Welfare, Writing | Tags: , , , |

Watch Good Will Hunting Watch Movies Online Free

Read Full Post | Make a Comment ( None so far )

Nobody Does It Better Spying On People of The World — National Security Agency — Turnkey Tyranny Turned On The American People — NSA Budget $100 Billion Plus Paid By The American People — The Patriot Act Expires On June 1, 2015 — Both Republican and Democratic Parties Will Renew It! — Secret Security Surveillance State — Alive, Well and Growing — Videos

Posted on May 8, 2015. Filed under: American History, Articles, Banking, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), College, Communications, Constitution, Corruption, Crime, Crisis, Data, Documentary, Economics, Education, Employment, European History, Faith, Family, Farming, Federal Government, Federal Government Budget, Films, Fiscal Policy, Foreign Policy, Fraud, Freedom, government, government spending, history, History of Economic Thought, Islam, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, Middle East, Monetary Policy, Money, Music, National Security Agency (NSA), National Security Agency (NSA_, People, Philosophy, Photos, Police, Politics, Press, Radio, Rants, Raves, Regulations, Religious, Resources, Security, Speech, Strategy, Talk Radio, Tax Policy, Technology, Terrorism, Video, War, Wealth, Weather | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 461 May 7, 2015

Pronk Pops Show 460 May 6, 2015

Pronk Pops Show 459 May 4, 2015 

Pronk Pops Show 458 May 1, 2015 

Pronk Pops Show 457 April 30, 2015 

Pronk Pops Show 456: April 29, 2015 

Pronk Pops Show 455: April 28, 2015

Pronk Pops Show 454: April 27, 2015

Pronk Pops Show 453: April 24, 2015

Pronk Pops Show 452: April 23, 2015 

Pronk Pops Show 451: April 22, 2015

Pronk Pops Show 450: April 21, 2015

Pronk Pops Show 449: April 20, 2015

Pronk Pops Show 448: April 17, 2015

Pronk Pops Show 447: April 16, 2015

Pronk Pops Show 446: April 15, 2015

Pronk Pops Show 445: April 14, 2015

Pronk Pops Show 444: April 13, 2015

Pronk Pops Show 443: April 9, 2015

Pronk Pops Show 442: April 8, 2015

Pronk Pops Show 441: April 6, 2015

Pronk Pops Show 440: April 2, 2015

Pronk Pops Show 439: April 1, 2015

Pronk Pops Show 438: March 31, 2015

Pronk Pops Show 437: March 30, 2015 

Pronk Pops Show 436: March 27, 2015 

Pronk Pops Show 435: March 26, 2015

Pronk Pops Show 434: March 25, 2015

Pronk Pops Show 433: March 24, 2015

Pronk Pops Show 432: March 23, 2015

Pronk Pops Show 431: March 20, 2015

Pronk Pops Show 430: March 19, 2015

Pronk Pops Show 429: March 18, 2015

Pronk Pops Show 428: March 17, 2015 

Pronk Pops Show 427: March 16, 2015

Pronk Pops Show 426: March 6, 2015

Pronk Pops Show 425: March 4, 2015

Pronk Pops Show 424: March 2, 2015

Pronk Pops Show 423: February 26, 2015

Pronk Pops Show 422: February 25, 2015 

Pronk Pops Show 421: February 20, 2015

Pronk Pops Show 420: February 19, 2015

Pronk Pops Show 419: February 18, 2015

Pronk Pops Show 418: February 16, 2015

Pronk Pops Show 417: February 13, 2015

Pronk Pops Show 416: February 12, 2015

Pronk Pops Show 415: February 11, 2015

Pronk Pops Show 414: February 10, 2015

Pronk Pops Show 413: February 9, 2015

Pronk Pops Show 412: February 6, 2015

Pronk Pops Show 411: February 5, 2015

Pronk Pops Show 410: February 4, 2015

Pronk Pops Show 409: February 3, 2015

Pronk Pops Show 408: February 2, 2015

Story 1: Nobody Does It Better Spying On People of The World — National Security Agency — Turnkey Tyranny Turned On The American People — NSA Budget $100 Billion Plus Paid By The American People — The Patriot Act Expires On June 1, 2015 — Both Republican and Democratic Parties Will Renew It! — Secret Security Surveillance State —  Alive, Well and Growing — Videos

Amendment IV

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Fourth Amendment

The Fourth Amendment originally enforced the notion that “each man’s home is his castle”, secure from unreasonable searches and seizures of property by the government.  It protects against arbitrary arrests, and is the basis of the law regarding search warrants, stop-and-frisk, safety inspections, wiretaps, and other forms of surveillance, as well as being central to many other criminal law topics and to privacy law.

https://www.law.cornell.edu/constitution/fourth_amendment

all your data Patriot Act Renewal patriot act patriotact shopping 4 snowden nsaNSA-Shark-cartoonobama-nsa-cartoon-chappatte-495x357patriots duty, obama cartoons

Carly Simon – Nobody Does It Better

Appellate Court Rules NSA’s Phone Data Collection Is Illegal

McConnell to Push for Pure PATRIOT Act Extension

INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE since 9/11

What You Didn’t Know About The NSA Bluffdale Spy Center – From Former NSA Director Bill Binney

prism1 (1)prismslides-photoshopPrism_slide_2

nsa-prism-slide prism-slide-5

PRISM slide cropprism-slide-7

nsa-prism

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

30c3 keynote with Glenn Greenwald [30c3]

FISA Court: Telecoms okay with NSA data collection

US Supreme Court refuses to let Americans challenge FISA eavesdropping law

FISA Section 215: A Debate about Its Legality, Usefulness and Civil Liberties

The creepy spying power buried in the Patriot Act

Real Talk: The Patriot Act

Patriot Act Powers – GOP Fights To Renew NSA Surveillance Law – Fox & Friends

Marco Rubio blasts colleagues over renewing NSA spying powers

Rand Paul Stalling Patriot Act Extension!

The Obama Administration’s War on Whistleblowers–7 Whistleblowers speak at News Conference 04-27-15

Top NSA Whistleblower William Binney Exposes the Tyranny 3/20/15

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

Former NSA Head Exposes Agency’s Real Crimes

NSA Whistleblower William Binney: The Future of FREEDOM

‘NSA owns entire network anywhere in the world’ – whistleblower William Binney

NSA Whistle-Blower Tells All: The Program | Op-Docs | The New York Times

William Binney – The Government is Profiling You (The NSA is Spying on You)

Alleged NSA whistleblower warns of “turnkey tyranny” in U.S.

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”

NSA Whistleblower Thomas Drake Prevails in Unprecedented Obama Admin Crackdown

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

29C3 Panel: Jesselyn Radack, Thomas Drake, William Binney on whistleblowing and surveillance

Everything We Know About NSA Spying: “Through a PRISM, Darkly” – Kurt Opsahl at CCC

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

Last Week Tonight with John Oliver: Government Surveillance (HBO)

The Lame Duck Show: Turn Key Tyranny Solutions

PBS Nova S36E11 The Spy Factory Full Documentary

Inside The NSA~Americas Cyber Secrets

Full Documentaries – National Security Agency Secrets – (NSA) Special Documentary

NSA can spy on 98 percent of the world

Glenn Becks “SURVEILLANCE STATE”

Glenn Greenwald on Domestic Surveillance: NSA Warrantless Wiretapping Controversy (2006)

Enemy of the State (1998) Predicts Edward Snowden’s Revelations

Enemy Of The State – The NSA Can Read The Time Off Your F**king Wristwatch!

Will Smith | Enemy of the State 1998 Movie Full HD

Ron Paul to Congress: DO NOT Extend the “PATRIOT” Act!

Congressman Ron Paul, MD – We’ve Been NeoConned

Why Shouldn’t I Work for the NSA?

(Good Will Hunting)

N.S.A. Phone Data Collection Is Illegal, Appeals Court Rules

THE COMPUTERS ARE LISTENING

HOW THE NSA CONVERTS SPOKEN WORDS INTO SEARCHABLE TEXT

Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.

But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.

Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.

The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.

Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documentsdescribe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.

The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.

Spying on international telephone calls has always been a staple of NSA surveillance, but the requirement that an actual person do the listening meant it was effectively limited to a tiny percentage of the total traffic. By leveraging advances in automated speech recognition, the NSA has entered the era of bulk listening.

And this has happened with no apparent public oversight, hearings or legislative action. Congress hasn’t shown signs of even knowing that it’s going on.

The USA Freedom Act — the surveillance reform bill that Congress is currently debating — doesn’t address the topic at all. The bill would end an NSA program that does not collect voice content: the government’s bulk collection of domestic calling data, showing who called who and for how long.

Even if becomes law, the bill would leave in place a multitude of mechanisms exposed by Snowden that scoop up vast amounts of innocent people’s text and voice communications in the U.S. and across the globe.

Civil liberty experts contacted by The Intercept said the NSA’s speech-to-text capabilities are a disturbing example of the privacy invasions that are becoming possible as our analog world transitions to a digital one.

“I think people don’t understand that the economics of surveillance have totally changed,” Jennifer Granick, civil liberties director at the Stanford Center for Internet and Society, told The Intercept.

“Once you have this capability, then the question is: How will it be deployed? Can you temporarily cache all American phone calls, transcribe all the phone calls, and do text searching of the content of the calls?” she said. “It may not be what they are doing right now, but they’ll be able to do it.”

And, she asked: “How would we ever know if they change the policy?”

Indeed, NSA officials have been secretive about their ability to convert speech to text, and how widely they use it, leaving open any number of possibilities.

That secrecy is the key, Granick said. “We don’t have any idea how many innocent people are being affected, or how many of those innocent people are also Americans.”

I Can Search Against It

NSA whistleblower Thomas Drake, who was trained as a voice processing crypto-linguist and worked at the agency until 2008, told The Intercept that he saw a huge push after the September 11, 2001 terror attacks to turn the massive amounts of voice communications being collected into something more useful.

Human listening was clearly not going to be the solution. “There weren’t enough ears,” he said.

The transcripts that emerged from the new systems weren’t perfect, he said. “But even if it’s not 100 percent, I can still get a lot more information. It’s far more accessible. I can search against it.”

Converting speech to text makes it easier for the NSA to see what it has collected and stored, according to Drake. “The breakthrough was being able to do it on a vast scale,” he said.

More Data, More Power, Better Performance

The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s.

What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds.

In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited.

Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”

“I would tell you we are not very good at that,” he said.

In an ideal environment like a news broadcast, he said, “we’re getting pretty good at being able to do these types of translations.”

A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing:

(U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing.

A version of the system the NSA uses is now even available commercially.

Experts in speech recognition say that in the last decade or so, the pace of technological improvement has been explosive. As information storage became cheaper and more efficient, technology companies were able to store massive amounts of voice data on their servers, allowing them to continually update and improve the models. Enormous processors, tuned as “deep neural networks” that detect patterns like human brains do, produce much cleaner transcripts.

And the Snowden documents show that the same kinds of leaps forward seen in commercial speech-to-text products have also been happening in secret at the NSA, fueled by the agency’s singular access to astronomical processing power and its own vast data archives.

In fact, the NSA has been repeatedly releasing new and improved speech recognition systems for more than a decade.

The first-generation tool, which made keyword-searching of vast amounts of voice content possible, was rolled out in 2004 and code-named RHINEHART.

“Voice word search technology allows analysts to find and prioritize intercept based on its intelligence content,” says an internal 2006 NSA memo entitled “For Media Mining, the Future Is Now!

The memo says that intelligence analysts involved in counterterrorism were able to identify terms related to bomb-making materials, like “detonator” and “hydrogen peroxide,” as well as place names like “Baghdad” or people like “Musharaf.”

RHINEHART was “designed to support both real-time searches, in which incoming data is automatically searched by a designated set of dictionaries, and retrospective searches, in which analysts can repeatedly search over months of past traffic,” the memo explains (emphasis in original).

As of 2006, RHINEHART was operating “across a wide variety of missions and languages” and was “used throughout the NSA/CSS [Central Security Service] Enterprise.”

But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.”

The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states.

A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)

VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”

Extensive Use Abroad

Voice communications can be collected by the NSA whether they are being sent by regular phone lines, over cellular networks, or through voice-over-internet services. Previously released documents from the Snowden archive describe enormous efforts by the NSA during the last decade to get access to voice-over-internet content like Skype calls, for instance. And other documents in the archive chronicle the agency’s adjustment to the fact that an increasingly large percentage of conversations, even those that start as landline or mobile calls, end up as digitized packets flying through the same fiber-optic cables that the NSA taps so effectively for other data and voice communications.

The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America.

For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.”

The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.

A slide from a June 2006 NSA powerpoint presentation described the role of VoiceRT:

VoiceRT: Index/Search of Voice Cuts

Keyword spotting extended to Iranian intercepts as well. A 2006 memoreported that RHINEHART had been used successfully by Persian-speaking analysts who “searched for the words ‘negotiations’ or ‘America’ in their traffic, and RHINEHART located a very important call that was transcribed verbatim providing information on an important Iranian target’s discussion of the formation of a the new Iraqi government.”

According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations.

“Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”

The memo offers an example from NSA Texas, where an analyst newly trained on the system used a keyword search to find previously unreported information on a target involved in drug-trafficking. In another case, an official at a Special Collection Service site in Latin America “was able to find foreign intelligence regarding a Cuban official in a fraction of the usual time.”

In a 2011 article, “Finding Nuggets — Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan,” an intelligence analysis technical director from NSA Texas described the “rare life-changing instance” when he learned about human language technology, and its ability to “find the exact traffic of interest within a mass of collection.”

Analysts in Texas found the new technology a boon for spying. “From finding tunnels in Tijuana, identifying bomb threats in the streets of Mexico City, or shedding light on the shooting of US Customs officials in Potosi, Mexico, the technology did what it advertised: It accelerated the process of finding relevant intelligence when time was of the essence,” he wrote. (Emphasis in original.)

The author of the memo was also part of a team that introduced the technology to military leaders in Afghanistan. “From Kandahar to Kabul, we have traveled the country explaining NSA leaders’ vision and introducing SIGINT teams to what HLT analytics can do today and to what is still needed to make this technology a game-changing success,” the memo reads.

Extent of Domestic Use Remains Unknown

What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.”

The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”

Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.

“The National Security Agency employs a variety of technologies in the course of its authorized foreign-intelligence mission,” spokesperson Vanee’ Vines wrote in an email to The Intercept. “These capabilities, operated by NSA’s dedicated professionals and overseen by multiple internal and external authorities, help to deter threats from international terrorists, human traffickers, cyber criminals, and others who seek to harm our citizens and allies.”

Vines did not respond to the specific questions about privacy protections in place related to the processing of domestic or domestic-to-international voice communications. But she wrote that “NSA always applies rigorous protections designed to safeguard the privacy not only of U.S. persons, but also of foreigners abroad, as directed by the President in January 2014.”

The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in itspublic reports.

“I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept.

His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.

“We went to the intelligence community and asked them to declassify a significant amount of material,” he said. The “vast majority” of that material was declassified, he said. But not all — including “facts that we thought could be declassified without compromising national security.”

Hypothetically, Medine said, the ability to turn voice into text would raise significant privacy concerns. And it would also raise questions about how the intelligence agencies “minimize” the retention and dissemination of material— particularly involving U.S. persons — that doesn’t include information they’re explicitly allowed to keep.

“Obviously it increases the ability of the government to process information from more calls,” Medine said. “It would also allow the government to listen in on more calls, which would raise more of the kind of privacy issues that the board has raised in the past.”

“I’m not saying the government does or doesn’t do it,” he said, “just that these would be the consequences.”

A New Learning Curve

Speech recognition expert Bhiksha Raj likens the current era to the early days of the Internet, when people didn’t fully realize how the things they typed would last forever.

“When I started using the Internet in the 90s, I was just posting stuff,” said Raj, an associate professor at Carnegie Mellon University’s Language Technologies Institute. “It never struck me that 20 years later I could go Google myself and pull all this up. Imagine if I posted something on alt.binaries.pictures.erotica or something like that, and now that post is going to embarrass me forever.”

The same is increasingly becoming the case with voice communication, he said. And the stakes are even higher, given that the majority of the world’s communication has historically been conducted by voice, and it has traditionally been considered a private mode of communication.

“People still aren’t realizing quite the magnitude that the problem could get to,” Raj said. “And it’s not just surveillance,” he said. “People are using voice services all the time. And where does the voice go? It’s sitting somewhere. It’s going somewhere. You’re living on trust.” He added: “Right now I don’t think you can trust anybody.”

The Need for New Rules

Kim Taipale, executive director of the Stilwell Center for Advanced Studies in Science and Technology Policy, is one of several people who tried a decade ago to get policymakers to recognize that existing surveillance law doesn’t adequately deal with new global communication networks and advanced technologies including  speech recognition.

“Things aren’t ephemeral anymore,” Taipale told The Intercept. “We’re living in a world where many things that were fleeting in the analog world are now on the permanent record. The question then becomes: what are the consequences of that and what are the rules going to be to deal with those consequences?”

Realistically, Taipale said, “the ability of the government to search voice communication in bulk is one of the things we may have to live with under some circumstances going forward.” But there at least need to be “clear public rules and effective oversight to make sure that the information is only used for appropriate law-enforcement or national security purposes consistent with Constitutional principles.”

Ultimately, Taipale said, a system where computers flag suspicious voice communications could be less invasive than one where people do the listening, given the potential for human abuse and misuse to lead to privacy violations. “Automated analysis has different privacy implications,” he said.

But to Jay Stanley, a senior policy analyst with the ACLU’s Speech, Privacy and Technology Project, the distinction between a human listening and a computer listening is irrelevant in terms of privacy, possible consequences, and a chilling effect on speech.

“What people care about in the end, and what creates chilling effects in the end, are consequences,” he said. “I think that over time, people would learn to fear computerized eavesdropping just as much as they fear eavesdropping by humans, because of the consequences that it could bring.”

Indeed, computer listening could raise new concerns. One of the internal NSA memos from 2006 says an “important enhancement under development is the ability for this HLT capability to predict what intercepted data might be of interest to analysts based on the analysts’ past behavior.”

Citing Amazon’s ability to not just track but predict buyer preferences, the memo says that an NSA system designed to flag interesting intercepts “offers the promise of presenting analysts with highly enriched sorting of their traffic.”

To Phillip Rogaway, a professor of computer science at the University of California, Davis, keyword-search is probably the “least of our problems.” In an email to The Intercept, Rogaway warned that “When the NSA identifies someone as ‘interesting’ based on contemporary NLP [Natural Language Processing] methods, it might be that there is no human-understandable explanation as to why beyond: ‘his corpus of discourse resembles those of others whom we thought interesting’; or the conceptual opposite: ‘his discourse looks or sounds different from most people’s.’”

If the algorithms NSA computers use to identify threats are too complex for humans to understand, Rogaway wrote, “it will be impossible to understand the contours of the surveillance apparatus by which one is judged.  All that people will be able to do is to try your best to behave just like everyone else.”

Next: The NSA’s best kept open secret.

Readers with information or insight into these programs are encouraged to get in touch, either by email, or anonymously via SecureDrop.

Documents published with this article:

Research on the Snowden archive was conducted by Intercept researcher Andrew Fishman

https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/

 

Section 215 of the USA PATRIOT Act

EFF sued the Department of Justice (DOJ) on the 10th anniversary of the signing of the USA PATRIOT Act in October 2011 for answers about “secret interpretations” of a controversial section of the law. In June 2013, a leaked FISA court order publicly revealed that “secret interpretation”: the government was using Section 215 of the Patriot Act to collect the phone records of virtually every person in the United States.

Prior to the revelations, several senators warned that the DOJ was using Section 215 of the PATRIOT Act to support what government attorneys called a “sensitive collection program,” targeting large numbers of Americans. The language of Section 215 allows for secret court orders to collect “tangible things” that could be relevant to a government investigation – a far lower threshold and more expansive reach than a warrant based on probable cause.  The list of possible “tangible things” the government can obtain is seemingly limitless, and could include everything from driver’s license records to Internet browsing patterns.

In response to a court order in our lawsuit, in September 2013, the government released hundreds of pages of previously secret FISA documents detailing the court’s interpretation of Section 215, including an opinion excoriating the NSA for misusing its mass surveillance database for years. In October 2013, the government released a second batch of documents related to Section 215, which showed, among other things, that the NSA had collected cell site location without notifying its oversight committees in Congress or the FISA court.

EFF’s lawsuit came after the DOJ failed to respond to a Freedom of Information Act (FOIA) request on the interpretation and use of Section 215.  The suit demanded records describing the types of “tangible things” that have been collected so far, the legal basis for the “sensitive collection program,” and information on the how many people have been affected by Section 215 orders.

The lawsuit remains ongoing.

https://www.eff.org/foia/section-215-usa-patriot-act

Background Articles and Videos

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Published on Dec 30, 2013

Through a PRISM, Darkly
Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.

Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

Glenn Becks “SURVEILLANCE STATE”

Inside the NSA

Ed Snowden, NSA, and Fairy Tales

AT&T Spying On Internet Traffic

For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”

NSA Whistle-Blower Tells All – Op-Docs: The Program

The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Benny – The Government is Profiling You (The NSA is Spying on You)

‘After 9/11 NSA had secret deal with White House’

The story of Whistleblower Thomas Drake

Whistleblowers, Part Two: Thomas Drake

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Meet Edward Snowden: NSA PRISM Whistleblower

The Truth About Edward Snowden

N.S.A. Spying: Why Does It Matter?

Inside The NSA~Americas Cyber Secrets

NSA Whistleblower Exposes Obama’s Dragnet

AT&T whistleblower against immunity for Bush spy program-1/2

AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program

The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.

AT&T whistleblower against immunity for Bush spy program-2/2

Enemy Of The State 1998 (1080p) (Full movie)

Background Articles and Videos

Stellar Wind

Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]

The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]

In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

PRISM

PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.

A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]

According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]

History

Slide showing that much of the world’s communications flow through the US

Details of information collected via PRISM

PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]

PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]

The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]

Response from companies

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]

Initial Public Statements

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]

Slide listing companies and the date that PRISM collection began

  • Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
  • Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
  • Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
  • Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
  • Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
  • Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]

In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13] The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]

“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]

Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]

The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]

While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]

Post-PRISM Transparency Reports

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000” user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]

Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]

Response from United States government

Executive branch

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]

Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]

On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]

The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]

The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]

In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]

Legislative branch

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

  • June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

  • June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
  • June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
  • June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

  • June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]

Representative John Boehner (R-OH), Speaker of the House of Representatives

  • June 11 “He’s a traitor”[50] (referring to Edward Snowden)

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

  • June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

  • June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
  • June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]

Senator Mark Udall (D-CO)

  • June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]

Representative Todd Rokita (R-IN)

  • June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]

Senator Rand Paul (R-KY)

  • June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
  • June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]

Representative Luis Gutierrez (D-IL)

  • June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]

Judicial branch

The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.

Applicable law and practice

On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]

After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.

If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]

If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]

Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]

The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]

Involvement of other countries

Australia

The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]

Canada

Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]

Germany

Germany did not receive any raw PRISM data, according to a Reuters report.[59]

Israel

Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.

New Zealand

In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]

United Kingdom

In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]

Domestic response

Unbalanced scales.svg
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)

The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]

Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]

In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]

In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]

The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]

On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]

International response

Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]

Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]

Protests at Checkpoint Charlie in Berlin

The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]

The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]

William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]

Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]

Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]

Russia has offered to consider an asylum request from Edward Snowden.[91]

Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]

Related government Internet surveillance programs

A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]

A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]

http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29

ThinThread

ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]

http://en.wikipedia.org/wiki/ThinThread

Trailblazer

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.

NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]

Background

Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]

The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing

According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]

In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]

Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]

http://www.youtube.com/watch?v=1AXwwSq_me4

Boundless Informant

Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.

Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]

History

Slide showing that much of the world’s communications flow through the US.

Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]

NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]

Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]

Technology

According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]

Legality and FISA Amendments Act of 2008

The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]

The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]

Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]

http://en.wikipedia.org/wiki/Boundless_Informant

ECHELON

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]

The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Organization

UKUSA Community
Map of UKUSA Community countries with Ireland

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

  • the Government Communications Headquarters of the United Kingdom,
  • the National Security Agency of the United States,
  • the Communications Security Establishment of Canada,
  • the Defence Signals Directorate of Australia, and
  • the Government Communications Security Bureau of New Zealand.
  • the National SIGINT Organisation (NSO) of The Netherlands

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]

Controversy

See also: Industrial espionage

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]

Name

The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

  • Hong Kong (since closed)
  • Australian Defence Satellite Communications Station (Geraldton, Western Australia)
  • Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
  • Misawa Air Base (Japan) Map
  • GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
  • Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
  • Sugar Grove (West Virginia, U.S.) Map
  • Yakima Training Center (Washington, U.S.) Map
  • GCSB Waihopai (New Zealand)
  • GCSB Tangimoana (New Zealand)
  • CFS Leitrim (Ontario, Canada)
  • Teufelsberg (Berlin, Germany) (closed 1992)

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:

  • Ayios Nikolaos (Cyprus – U.K.)
  • BadAibling Station (BadAibling, Germany – U.S.)
    • relocated to Griesheim in 2004[19]
    • deactivated in 2008[20]
  • Buckley Air Force Base (Aurora, Colorado)
  • Fort Gordon (Georgia, U.S.)
  • Gander (Newfoundland & Labrador, Canada)
  • Guam (Pacific Ocean, U.S.)
  • Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
  • Lackland Air Force Base, Medina Annex (San Antonio, Texas)

http://en.wikipedia.org/wiki/ECHELON

Room 641A

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]

Description

Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]

The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]

The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.

Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.

Lawsuit

Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]

More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.

Main article: Hepting v. AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.

http://en.wikipedia.org/wiki/Room_641A

List of government surveillance projects for the United States

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.

http://en.wikipedia.org/wiki/List_of_government_surveillance_projects

Section summary of the Patriot Act, Title II

From Wikipedia, the free encyclopedia

President George W. Bush gestures as he addresses an audience Wednesday, July 20, 2005 at the Port of Baltimore in Baltimore, Md., encouraging the renewal of provisions of the Patriot Act.

The following is a section summary of the USA PATRIOT Act, Title II. The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11, 2001 attacks. Title II: Enhanced Surveillance Procedures gave increased powers of surveillance to various government agencies and bodies. This title has 25 sections, with one of the sections (section 224) containing a sunset clause which sets an expiration date, 31 December 2005, for most of the title’s provisions. On 22 December 2005, the sunset clause expiration date was extended to 3 February 2006.

Title II contains many of the most contentious provisions of the act. Supporters of the Patriot Act claim that these provisions are necessary in fighting the War on Terrorism, while its detractors argue that many of the sections of Title II infringe upon individual and civil rights.

The sections of Title II amend the Foreign Intelligence Surveillance Act of 1978 and its provisions in 18 U.S.C., dealing with “Crimes and Criminal Procedure“. It also amends the Electronic Communications Privacy Act of 1986. In general, the Title expands federal agencies’ powers in intercepting, sharing, and using private telecommunications, especially electronic communications, along with a focus on criminal investigations by updating the rules that govern computer crime investigations. It also sets out procedures and limitations for individuals who feel their rights have been violated to seek redress, including against the United States government. However, it also includes a section that deals with trade sanctions against countries whose government supports terrorism, which is not directly related to surveillance issues.

Contents

 [hide

Sections 201 & 202: Intercepting communications

Patriot Act Titles
Title I: Enhancing Domestic Security against Terrorism
Title II: Enhanced Surveillance Procedures
Title III: International Money Laundering Abatement and Anti-terrorist Financing Act of 2001
Title IV: Protecting the border
Title V: Removing obstacles to investigating terrorism
Title VI: Providing for victims of terrorism, public safety officers and their families
Title VII: Increased information sharing for critical infrastructure protection
Title VIII: Strengthening the criminal laws against terrorism
Title IX: Improved intelligence
Title X: Miscellaneous

Two sections dealt with the interception of communications by the United States government.

Section 201 is titled Authority to intercept wire, oral, and electronic communications relating to terrorism. This section amended 18 U.S.C. § 2516 (Authorization for interception of wire, oral, or electronic communications) of the United States Code. This section allows (under certain specific conditions) the United States Attorney General (or some of his subordinates) to authorize a Federal judge to make an order authorizing or approving the interception of wire or oral communications by the Federal Bureau of Investigation (FBI), or another relevant U.S. Federal agency.

The Attorney General’s subordinates who can use Section 201 are: the Deputy Attorney General, the Associate Attorney General, any Assistant Attorney General, any acting Assistant Attorney General, any Deputy Assistant Attorney General or acting Deputy Assistant Attorney General in the Criminal Division who is specially designated by the Attorney General.

The amendment added a further condition which allowed an interception order to be carried out. The interception order may now be made if a criminal violation is made with respect to terrorism (defined by 18 U.S.C. § 2332):

Note: the legislation states that title 18, section 2516(1), paragraph (p) of the United States Code was redesignated (moved) to become paragraph (q). This paragraph had been previously redesignated by two other pieces of legislation: the Antiterrorism and Effective Death Penalty Act of 1996[dead link][1] and by the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (see section 201(3)).[2]

Section 202 is titled Authority to intercept wire, oral, and electronic communications relating to computer fraud and abuse offenses, and amended the United States Code to include computer fraud and abuse in the list of reasons why an interception order may be granted.[3][4]

Section 203: Authority to share criminal investigative information

Section 203 (Authority to share criminal investigation information) modified the Federal Rules of Criminal Procedure with respect to disclosure of information before the grand jury (Rule 6(e)). Section 203(a) allowed the disclosure of matters in deliberation by the grand jury, which are normally otherwise prohibited, if:

  • a court orders it (before or during a judicial proceeding),
  • a court finds that there are grounds for a motion to dismiss an indictment because of matters before the Grand Jury,
  • if the matters in deliberation are made by an attorney for the government to another Federal grand jury,
  • an attorney for the government requests that matters before the grand jury may reveal a violation of State criminal law,
  • the matters involve foreign intelligence or counterintelligence or foreign intelligence information. Foreign intelligence and counterintelligence was defined in section 3 of the National Security Act of 1947,[5] and “foreign intelligence information” was further defined in the amendment as information about:
    1. an actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power;
    2. sabotage or international terrorism by a foreign power or an agent of a foreign power; or
    3. clandestine intelligence activities by an intelligence service or network of a foreign power or by an agent of foreign power; or
    4. information about a foreign power or foreign territory that relates to the national defense or the security of the United States or the conduct of the foreign affairs of the United States.’.
    5. information about non-U.S. and U.S. citizens

203(a) gave the court the power to order a time within which information may be disclosed, and specified when a government agency may use information disclosed about a foreign power. The rules of criminal procedure now state that “within a reasonable time after such disclosure, an attorney for the government shall file under seal a notice with the court stating the fact that such information was disclosed and the departments, agencies, or entities to which the disclosure was made.”

Section 203(b) modified 18 U.S.C. § 2517, which details who is allowed to learn the results of a communications interception, to allow any investigative or law enforcement officer, or attorney for the Government to divulge foreign intelligence, counterintelligence or foreign intelligence information to a variety of Federal officials. Specifically, any official who has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived from this could divulge this information to any Federal law enforcement, intelligence, protective, immigration, national defense, or national security official. The definition of “foreign intelligence” was the same as section 203(a), with the same ability to define “foreign intelligence” to be intelligence of a non-U.S. and U.S. citizen. The information received must only be used as necessary in the conduct of the official’s official duties.[6]

The definition of “foreign intelligence information” is defined again in Section 203(d).

Section 203(c) specified that the Attorney General must establish procedures for the disclosure of information due to 18 U.S.C. § 2517 (see above), for those people who are defined as U.S. citizens.[7]

Section 204: Limitations on communication interceptions

Section 204 (Clarification of intelligence exceptions from limitations on interception and disclosure of wire, oral, and electronic communication) removed restrictions from the acquisition of foreign intelligence information from international or foreign communications. It was also clarified that the Foreign Intelligence Surveillance Act of 1978 should not only be the sole means of electronic surveillance for just oral and wire intercepts, but should also include electronic communication.[8][9]

Section 205: Employment of translators by the FBI

Under section 205 (Employment of translators by the Federal Bureau of Investigation), the Director of the Federal Bureau of Investigation is now allowed to employ translators to support counterterrorism investigations and operations without regard to applicable Federal personnel requirements and limitations. However, he must report to the House Judiciary Committee and Senate Judiciary Committee the number of translators employed and any legal reasons why he cannot employ translators from federal, state, or local agencies.[10]

Section 206: Roving surveillance authority

The Foreign Intelligence Surveillance Act of 1978[11] allows an applicant access to all information, facilities, or technical assistance necessary to perform electronic surveillance on a particular target. The assistance given must protect the secrecy of and cause as little disruption to the ongoing surveillance effort as possible. The direction could be made at the request of the applicant of the surveillance order, by a common carrier, landlord, custodian or other specified person. Section 206 (Roving surveillance authority under the Foreign Intelligence Surveillance Act of 1978) amended this to add:

or in circumstances where the Court finds that the actions of the target of the application may have the effect of thwarting the identification of a particular person.

This allows intelligence agencies to undertake “roving” surveillance: they do not have to specify the exact facility or location where their surveillance will be done. Roving surveillance was already specified for criminal investigations under 18 U.S.C. § 2518(11), and section 206 brought the ability of intelligence agencies to undertake such roving surveillance into line with such criminal investigations. However, the section was not without controversy, as James X. Dempsey, the Executive Director of the Center for Democracy & Technology, argued that a few months after the Patriot Act was passed the Intelligence Authorization Act was also passed that had the unintended effect of seeming to authorize “John Doe” roving taps — FISA orders that identify neither the target nor the location of the interception (see The Patriot Debates, James X. Dempsey debates Paul Rosenzweig on section 206).[12]

Section 207: Duration of FISA surveillance on agents of a foreign powe

Previously FISA only defined the duration of a surveillance order against a foreign power (defined in 50 U.S.C. § 1805(e)(1)) . This was amended by section 207 (Duration of FISA surveillance of non-United States persons who are agents of a foreign power) to allow surveillance of agents of a foreign power (as defined in section 50 U.S.C. § 1801(b)(1)(A)) for a maximum of 90 days. Section 304(d)(1) was also amended to extend orders for physical searches from 45 days to 90 days, and orders for physical searches against agents of a foreign power are allowed for a maximum of 120 days. The act also clarified that extensions for surveillance could be granted for a maximum of a year against agents of a foreign power.[13]

Section 208: Designation of judges

Section 103(A) of FISA was amended by Section 208 (Designation of judges) of the Patriot Act to increase the number of federal district court judges who must now review surveillance orders from seven to 11. Of these, three of the judges must live within 20 miles (32 km) of the District of Columbia.[14]

Section 209: Seizure of voice-mail messages pursuant to warrants

Section 209 (Seizure of voice-mail messages pursuant to warrants) removed the text “any electronic storage of such communication” from title 18, section 2510 of the United States Code. Before this was struck from the Code, the U.S. government needed to apply for a title III wiretap order[15] before they could open voice-mails, however now the government only need apply for an ordinary search. Section 2703, which specifies when a “provider of electronic communication services” must disclose the contents of stored communications, was also amended to allow such a provider to be compelled to disclose the contents via a search warrant, and not a wiretap order. According to Vermont senator Patrick Leahy, this was done to “harmonizing the rules applicable to stored voice and non-voice (e.g., e-mail) communications”.[16][17]

Section 210 & 211: Scope of subpoenas for records of electronic communications

The U.S. Code specifies when the U.S. government may require a provider of an electronic communication service to hand over communication records.[18] It specifies what that provider must disclose to the government,[19] and was amended by section 210 (Scope of subpoenas for records of electronic communications) to include records of session times and durations of electronic communication as well as any identifying numbers or addresses of the equipment that was being used, even if this may only be temporary. For instance, this would include temporarily assigned IP addresses, such as those established by DHCP.[20]

Section 211 (Clarification of scope) further clarified the scope of such orders. 47 U.S.C. § 551 (Section 631 of the Communications Act of 1934) deals with the privacy granted to users of cable TV. The code was amended to allow the government to have access to the records of cable customers, with the notable exclusion of records revealing cable subscriber selection of video programming from a cable operator.[21]

Section 212: Emergency disclosure of electronic communications

Section 212 (Emergency disclosure of electronic communications to protect life and limb) amended the US Code to stop a communications provider from providing communication records (not necessarily relating to the content itself) about a customer’s communications to others.[22] However, should the provider reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person then the communications provider can now disclose this information. The act did not make clear what “reasonably” meant.

A communications provider could also disclose communications records if:

  • a court orders the disclosure of communications at the request of a government agency (18 U.S.C. § 2703)
  • the customer allows the information to be disclosed
  • if the service provider believes that they must do so to protect their rights or property.

This section was repealed by the Homeland Security Act of 2002 — this act also created the Homeland Security Department — and was replaced with a new and permanent emergency disclosure provision.[23]

Section 213: Delayed search warrant notification

Section 213 (Authority for delaying notice of the execution of a warrant) amended the US Code to allow the notification of search warrants[24] to be delayed.[25] This section has been commonly referred to as the “sneak and peek” section, a phrase originating from the FBI[citation needed] and not, as commonly believed, from opponents of the Patriot Act. The U.S. government may now legally search and seize property that constitutes evidence of a United States criminal offense without immediately telling the owner. The court may only order the delayed notification if they have reason to believe it would hurt an investigation — delayed notifications were already defined in 18 U.S.C. § 2705 — or, if a search warrant specified that the subject of the warrant must be notified “within a reasonable period of its execution,” then it allows the court to extend the period before the notification is given, though the government must show “good cause”. If the search warrant prohibited the seizure of property or communications, then the search warrant could then be delayed.

Before the Patriot Act was enacted, there were three cases before the United States district courts: United States v. Freitas, 800 F.2d 1451 (9th Cir. 1986); United States v. Villegas, 899 F.2d 1324 (2d Cir. 1990); and United States v. Simons, 206 F.3d 392 (4th Cir. 2000). Each determined that, under certain circumstances, it was not unconstitutional to delay the notification of search warrants.[26]

Section 214: Pen register and trap and trace authority

FISA was amended by section 214 (Pen register and trap and trace authority under FISA) to clarify that pen register and trap and trace surveillance can be authorised to allow government agencies to gather foreign intelligence information.[27] Where the law only allowed them to gather surveillance if there was evidence of international terrorism, it now gives the courts the power to grant trap and traces against:

  • non-U.S. citizens.
  • those suspected of being involved with international terrorism,
  • those undertaking clandestine intelligence activities

Any investigation against U.S. citizens must not violate the First Amendment to the United States Constitution.[28]

Section 215: Access to records and other items under FISA

This section is commonly referred to as the “library records” provision[29] because of the wide range of personal material that can be investigated.[30][31]

FISA was modified by section 215 (Access to records and other items under the Foreign Intelligence Surveillance Act) to allow the Director of the FBI (or an official designated by the Director, so long as that official’s rank is no lower than Assistant Special Agent in Charge) to apply for an order to produce materials that assist in an investigation undertaken to protect against international terrorism or clandestine intelligence activities. The act specifically gives an example to clarify what it means by “tangible things”: it includes “books, records, papers, documents, and other items”.

It is specified that any such investigation must be conducted in accordance with guidelines laid out in Executive Order 12333 (which pertains to United States intelligence activities). Investigations must also not be performed on U.S. citizens who are carrying out activities protected by the First Amendment to the Constitution of the United States.

Any order that is granted must be given by a FISA court judge or by a magistrate judge who is publicly designated by the Chief Justice of the United States to allow such an order to be given. Any application must prove that it is being conducted without violating the First Amendment rights of any U.S. citizens. The application can only be used to obtain foreign intelligence information not concerning a U.S. citizen or to protect against international terrorism or clandestine intelligence activities.

This section of the PATRIOT Act is controversial because the order may be granted ex parte, and once it is granted — in order to avoid jeopardizing the investigation — the order may not disclose the reasons behind why the order was granted.

The section carries a gag order stating that “No person shall disclose to any other person (other than those persons necessary to produce the tangible things under this section) that the Federal Bureau of Investigation has sought or obtained tangible things under this section”. Senator Rand Paul stated that the non-disclosure is imposed for one year,[32] though this is not explicitly mentioned in the section.

In order to protect anyone who complies with the order, FISA now prevents any person who complies with the order in “good faith” from being liable for producing any tangible goods required by the court order. The production of tangible items is not deemed to constitute a waiver of any privilege in any other proceeding or context.

As a safeguard, section 502 of FISA compels the Attorney General to inform the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate of all such orders granted. Every six months, the Attorney General must also provide a report to the Committee on the Judiciary of the House of Representatives and the Senate which details the total number of applications made for orders approving requests for the production of tangible things and the total number of such orders either granted, modified, or denied.[33]

During a House Judiciary hearing on domestic spying on July 17, 2013 John C. Inglis, the deputy director of the surveillance agency, told a member of the House judiciary committee that NSA analysts can perform “a second or third hop query” through its collections of telephone data and internet records in order to find connections to terrorist organizations.[34] “Hops” refers to a technical term indicating connections between people. A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with.[34][35] NSA officials had said previously that data mining was limited to two hops, but Inglis suggested that the Foreign Intelligence Surveillance Court has allowed for data analysis extending “two or three hops”.[36]

This section was reauthorized in 2011.

Section 216: Authority to issue pen registers and trap and trace devices[edit]

Section 216 (Modification of authorities relating to use of pen registers and trap and trace devices) deals with three specific areas with regards to pen registers and trap and trace devices: general limitations to the use of such devices, how an order allowing the use of such devices must be made, and the definition of such devices.

Limitations

18 U.S.C. § 3121 details the exceptions related to the general prohibition on pen register and trap and trace devices. Along with gathering information for dialup communications, it allows for gathering routing and other addressing information. It is specifically limited to this information: the Act does not allow such surveillance to capture the actual information that is contained in the communication being monitored. However, organisations such as the EFF have pointed out that certain types of information that can be captured, such as URLs, can have content embedded in them. They object to the application of trap and trace and pen register devices to newer technology using a standard designed for telephones.

Making and carrying out orders

It also details that an order may be applied for ex parte (without the party it is made against present, which in itself is not unusual for search warrants), and allows the agency who applied for the order to compel any relevant person or entity providing wire or electronic communication service to assist with the surveillance. If the party whom the order is made against so requests, the attorney for the Government, law enforcement or investigative officer that is serving the order must provide written or electronic certification that the order applies to the targeted individual.

If a pen register or trap and trace device is used on a packet-switched data network, then the agency doing surveillance must keep a detailed log containing:

  1. any officer or officers who installed the device and any officer or officers who accessed the device to obtain information from the network;
  2. the date and time the device was installed, the date and time the device was uninstalled, and the date, time, and duration of each time the device is accessed to obtain information;
  3. the configuration of the device at the time of its installation and any subsequent modification made to the device; and
  4. any information which has been collected by the device

This information must be generated for the entire time the device is active, and must be provided ex parte and under seal to the court which entered the ex parte order authorizing the installation and use of the device. This must be done within 30 days after termination of the order.

Orders must now include the following information:[37]

  • the identifying number of the device under surveillance
  • the location of the telephone line or other facility to which the pen register or trap and trace device is to be attached or applied
  • if a trap and trace device is installed, the geographic limits of the order must be specified

This section amended the non-disclosure requirements of 18 U.S.C. § 3123(d)(2) by expanding to include those whose facilities are used to establish the trap and trace or pen register or to those people who assist with applying the surveillance order who must not disclose that surveillance is being undertaken. Before this it had only applied to the person owning or leasing the line.

Definitions

The following terms were redefined in the US Code’s chapter 206 (which solely deals with pen registers and trap and trace devices):

  • Court of competent jurisdiction: defined in 18 U.S.C. § 3127(2), subparagraph A was stricken and replaced to redefine the court to be any United States district court (including a magistrate judge of such a court) or any United States court of appeals havingjurisdiction over the offense being investigated (title 18 also allows State courts that have been given authority by their State to use pen register and trap and trace devices)
  • Pen register: defined in 18 U.S.C. § 3127(3), the definition of such a device was expanded to include a device that captures dialing, routing, addressing, or signaling information from an electronics communication device. It limited the usage of such devices to exclude the capturing of any of the contents of communications being monitored. 18 U.S.C. § 3124(b) was also similarly amended.
  • Trap and trace device: defined in 18 U.S.C. § 3127(4), the definition was similarly expanded to include the dialing, routing, addressing, or signaling information from an electronics communication device. However, a trap and trace device can now also be a “process”, not just a device.
  • Contents: 18 U.S.C. § 3127(1) clarifies the term “contents” (as referred to in the definition of trap and trace devices and pen registers) to conform to the definition as defined in 18 U.S.C. § 2510(8), which when used with respect to any wire, oral, or electronic communication, includes any information concerning the substance, purport, or meaning of that communication.

Section 217: Interception of computer trespasser communications

Section 217 (Interception of computer trespasser communications) firstly defines the following terms:

  • Protected computer: this is defined in 18 U.S.C. § 1030(e)(2)(A), and is any computer that is used by a financial institution or the United States Government or one which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
  • Computer trespasser: this is defined in 18 U.S.C. § 2510(21) and references to this phrase means
    1. a person who accesses a protected computer without authorization and thus has no reasonable expectation of privacy in any communication transmitted to, through, or from the protected computer; and
    2. does not include a person known by the owner or operator of the protected computer to have an existing contractual relationship with the owner or operator of the protected computer for access to all or part of the protected computer

Amendments were made to 18 U.S.C. § 2511(2) to make it lawful to allow a person to intercept the communications of a computer trespasser if

  1. the owner or operator of the protected computer authorizes the interception of the computer trespasser’s communications on the protected computer,
  2. the person is lawfully engaged in an investigation,
  3. the person has reasonable grounds to believe that the contents of the computer trespasser’s communications will be relevant to their investigation, and
  4. any communication captured can only relate to those transmitted to or from the computer trespasser.

Section 218: Foreign intelligence information

Section 218 (Foreign intelligence information) amended 50 U.S.C. § 1804(a)(7)(B) and 50 U.S.C. § 1823(a)(7)(B) (both FISA sections 104(a) (7)(B) and section 303(a)(7)(B), respectively) to change “the purpose” of surveillance orders under FISA to gain access to foreign intelligence to “significant purpose”. Mary DeRosa, in The Patriot Debates, explained that the reason behind this was to remove a legal “wall” which arose when criminal and foreign intelligence overlapped. This was because the U.S. Department of Justice interpreted “the purpose” of surveillance was restricted to collecting information for foreign intelligence, which DeRosa says “was designed to ensure that prosecutors and criminal investigators did not use FISA to circumvent the more rigorous warrant requirements for criminal cases”. However, she also says that it is debatable whether this legal tightening of the definition was even necessary, stating that “the Department of Justice argued to the FISA Court of Review in 2002 that the original FISA standard did not require the restrictions that the Department of Justice imposed over the years, and the court appears to have agreed [which] leaves the precise legal effect of a sunset of section 218 somewhat murky.”[38]

Section 219: Single-jurisdiction search warrants for terrorism

Section 219 (Single-jurisdiction search warrants for terrorism) amended the Federal Rules of Criminal Procedure to allow a magistrate judge who is involved in an investigation of domestic terrorism or international terrorism the ability to issue a warrant for a person or property within or outside of their district.[39]

Section 220: Nationwide service of search warrants for electronic evidence

Section 220 (Nationwide service of search warrants for electronic evidence) gives the power to Federal courts to issue nationwide service of search warrants for electronic surveillance. However, only courts with jurisdiction over the offense can order such a warrant. This required amending 18 U.S.C. § 2703 and 18 U.S.C. § 2711.

Section 221: Trade sanctions

Section 221 (Trade sanctions) amended the Trade Sanctions Reform and Export Enhancement Act of 2000.[40] This Act prohibits, except under certain specific circumstances, the President from imposing a unilateral agricultural sanction or unilateral medical sanction against a foreign country or foreign entity. The Act holds various exceptions to this prohibition, and the Patriot Act further amended the exceptions to include holding sanctions against countries that design, develop or produce chemical or biological weapons, missiles, or weapons of mass destruction.[41] It also amended the act to include the Taliban as state sponsors of international terrorism. In amending Title IX, section 906 of the Trade sanctions act, the Taliban was determined by the Secretary of State to have repeatedly provided support for acts of international terrorism and the export of agricultural commodities, medicine, or medical devices is now pursuant to one-year licenses issued and reviewed by the United States Government.[42] However, the export of agricultural commodities, medicine, or medical devices to the Government of Syria or to the Government of North Korea were exempt from such a restriction.[43]

The Patriot Act further states that nothing in the Trade Sanctions Act will limit the application of criminal or civil penalties to those who export agricultural commodities, medicine, or medical devices to:

Section 222: Assistance to law enforcement agencies

Section 222 (Assistance to law enforcement agencies) states that nothing in the Patriot Act shall make a communications provider or other individual provide more technical assistance to a law enforcement agency than what is set out in the Act. It also allows for the reasonable compensation of any expenses incurred while assisting with the establishment of pen registers or trap and trace devices.[47]

Section 223: Civil liability for certain unauthorized disclosures

18 U.S.C. § 2520(a) allows any person who has had their rights violated due to the illegal interception of communications to take civil action against the offending party. Section 223 (Civil liability for certain unauthorized disclosures) excluded the United States from such civil action.

If a court or appropriate department or agency determines that the United States or any of its departments or agencies has violated any provision of chapter 119 of the U.S. Code they may request an internal review from that agency or department. If necessary, an employee may then have administrative action taken against them. If the department or agency do not take action, then they must inform the notify the Inspector General who has jurisdiction over the agency or department, and they must give reasons to them why they did not take action.[48]

A citizen’s rights will also be found to have been violated if an investigative, law enforcement officer or governmental entity discloses information beyond that allowed in 18 U.S.C. § 2517(a).[49]

U.S. Code Title 18, Section 2712 added

A totally new section was appended to Title 18, Chapter 121 of the US Code: Section 2712, “Civil actions against the United States”. It allows people to take action against the US Government if they feel that they had their rights violated, as defined in chapter 121,chapter 119, or sections 106(a), 305(a), or 405(a) of FISA. The court may assess damages no less than $US10,000 and litigation costs that are reasonably incurred. Those seeking damages must present them to the relevant department or agency as specified in the procedures of the Federal Tort Claims Act.

Actions taken against the United States must be initiated within two years of when the claimant has had a reasonable chance to discover the violation. All cases are presented before a judge, not a jury. However, the court will order a stay of proceedings if they determine that if during the court case civil discovery will hurt the ability of the government to conduct a related investigation or the prosecution of a related criminal case. If the court orders the stay of proceedings they will extend the time period that a claimant has to take action on a reported violation. However, the government may respond to any action against it by submitting evidence ex parte in order to avoid disclosing any matter that may adversely affect a related investigation or a related criminal case. The plaintiff is then given an opportunity to make a submission to the court, not ex parte, and the court may request further information from either party.[50]

If a person wishes to discover or obtain applications or orders or other materials relating to electronic surveillance or to discover, obtain, or suppress evidence or information obtained or derived from electronic surveillance under FISA, then the Attorney General may file an affidavit under oath that disclosure or an adversary hearing would harm the national security of the United States. In these cases, the court may review in camera and ex parte the material relating to the surveillance to make sure that such surveillance was lawfully authorized and conducted. The court may then disclose part of material relating to the surveillance. However, the court is restricted in they may only do this “where such disclosure is necessary to make an accurate determination of the legality of the surveillance”.[50] If it then determined that the use of a pen register or trap and trace device was not lawfully authorized or conducted, the result of such surveillance may be suppressed as evidence. However, should the court determine that such surveillance was lawfully authorised and conducted, they may deny the motion of the aggrieved person.[51]

It is further stated that if a court or appropriate department or agency determines that an officer or employee of the United States willfully or intentionally violated any provision of chapter 121 of the U.S. Code they will request an internal review from that agency or department. If necessary, an employee may then have administrative action taken against them. If the department or agency do not take action, then they must inform the notify the Inspector General who has jurisdiction over the agency or department, and they must give reasons to them why they did not take action. (see[49] for a similar part of the Act)

Section 224: Sunset

Section 224 (Sunset) is a sunset clause. Title II and the amendments made by the title originally would have ceased to have effect on December 31, 2005, with the exception of the below sections. However, on December 22, 2005, the sunset clause expiration date was extended to February 3, 2006, and then on February 2, 2006 it was further extended to March 10:

Title II sections that did not expire on March 10, 2006
Section Section title
203(a) Authority to share criminal investigation information : Authority to share Grand Jury information
203(c) Authority to share criminal investigation information : Procedures
205 Employment of translators by the Federal Bureau of Investigation
208 Designation of judges
210 Scope of subpoenas for records of electronic communications
211 Clarification of scope
213 Authority for delaying notice of the execution of a warrant
216 Modification of authorities relating to use of pen registers and trap and trace devices
219 Single-jurisdiction search warrants for terrorism
221 Trade sanctions
222 Assistance to law enforcement agencies

Further, any particular foreign intelligence investigations that are ongoing will continue to be run under the expired sections.

Section 225: Immunity for compliance with FISA wiretap[edit]

Section 225 (Immunity for compliance with FISA wiretap) gives legal immunity to any provider of a wire or electronic communication service, landlord, custodian, or other person that provides any information, facilities, or technical assistance in accordance with a court order or request for emergency assistance. This was added to FISA as section 105 (50 U.S.C. § 1805).

Notes and references

  1. Jump up^ See Antiterrorism and Effective Death Penalty Act of 1996, section 434(2)
  2. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 201. Authority to Intercept Wire, Oral, and Electronic Communications Relating to Terrorism.”, page 7 & Patrick Leahy, Section-bySection Analysis, “Sec. 201.”
  3. Jump up^ 18 U.S.C. § 2516(1)(c)computer crime is a felony violation of 18 U.S.C. § 1030.
  4. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 202. Authority to Intercept Wire, Oral, and Electronic Communications Relating to Computer Fraud and Abuse Offenses.”, page 8 & Patrick Leahy, Section-bySection Analysis, “Sec. 202.”
  5. Jump up^ 20 U.S.C. § 401a
  6. Jump up^ 18 U.S.C. § 2517
  7. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 203. Authority to share criminal investigation information”, page 8 & Patrick Leahy, Section-by-Section Analysis, “Sec. 203.”
  8. Jump up^ 18 U.S.C. § 2511(2)(f) was amended to allow this change
  9. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 204. Clarification of Intelligence Exceptions From Limitations on Interception and Disclosure of Wire, Oral and Electronic Communications.”, page 9 & Patrick Leahy, Section-by-Section Analysis, “Sec. 204.”
  10. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 205. Employment of Translators by the Federal Bureau of Investigation.”, page 9 & Patrick Leahy, Section-by-Section Analysis, “Sec. 205.”
  11. Jump up^ 50 U.S.C. § 1805(c)(2)(B)
  12. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 206. Roving Surveillance Authority Under the Foreign Intelligence Surveillance Act of 1978.”, page 10 & Patrick Leahy, Section-by-Section Analysis, “Sec. 206.”
  13. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 207. Duration of FISA Surveillance of Non-United States Persons Who are Agents of a Foreign Power.”, page 10 & Patrick Leahy, Section-by-Section Analysis, “Sec. 207.”
  14. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 208. Designation of judges”, page 11 & Patrick Leahy, Section-by-Section Analysis, “Sec. 208.”
  15. Jump up^ A “Title III wiretap” is shorthand for Title III of the Omnibus Crime Control and Safe Streets Act of 1968, which deals with wiretaps and was the law that created Title 18, chapter 19 of the United States Code (entitled “Wire Interception and Interception of Oral Communications,” it includes 18 U.S.C. § 251018 U.S.C. § 2520)
  16. Jump up^ Patrick Leahy, section by section analysis of the USA PATRIOT Act, section 209. Accessed November 12, 2005.
  17. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 209. Seizure of voice-mail messages pursuant to warrants”, page 11
  18. Jump up^ 18 U.S.C. § 2703
  19. Jump up^ 18 U.S.C. § 2703(c)(2)
  20. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Scope of subpoenas for records of electronic communications”, page 11 & Patrick Leahy, Section-by-Section Analysis, “Sec. 210.”
  21. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Clarification of scope”, page 11 & Patrick Leahy, Section-by-Section Analysis, “Sec. 211.”
  22. Jump up^ 18 U.S.C. § 2702(a)(3)
  23. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Emergency disclosure of electronic communications to protect life and limb”, page 12 & Patrick Leahy, Section-by-Section Analysis, “Sec. 212.”
  24. Jump up^ 18 U.S.C. § 3103a(a) states that “a warrant may be issued to search for and seize any property that constitutes evidence of a criminal offense in violation of the laws of the United States”
  25. Jump up^ 18 U.S.C. § 3103a
  26. Jump up^ For some analysis of section 213 of the PATRIOT Act, see: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 213: Authority for delaying notice of the execution of a warrant”, page 12 & Patrick Leahy, Section-by-Section Analysis, “Sec. 213.”
  27. Jump up^ Section 402 of FISA (50 U.S.C. § 1842) and Section 403 of FISA (50 U.S.C. § 1843) were both amended
  28. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 214: Pen register and trap and trace authority under FISA”, page 13 & Patrick Leahy, Section-by-Section Analysis, “Sec. 214.”
  29. Jump up^ Carle, David (2011-01-26). “Leahy Renews Effort To Extend Expiring PATRIOT Act Authorities, Increase Oversight”. Press release from Senator Patrick Leahy‘s office (Washington). Archived from the original on 2011-05-27. Retrieved 2011-05-27.
  30. Jump up^ Mascaro, Lisa. “Congress votes in time to extend key Patriot Act provisions”. Los Angeles Times. Retrieved 2011-05-27.
  31. Jump up^ Report on the Telephone Records Program Conducted Under Section 215 of the USA Patriot Act and on the Operations of the Foreign Intelligence Surveillance Court Privacy and Civil Liberties Oversight Board
  32. Jump up^ Paul, Rand (2011-04-15). “Senator Rand Paul’s Letter of Opposition to the Patriot Act”. Archived from the original on 2011-05-27. Retrieved 2011-05-27.
  33. Jump up^ See also: Charles Doyle (December 10, 2001), Terrorism: Section by Section Analysis of the USA PATRIOT Act, “Section 215: Access to records and other items under the Foreign Intelligence Surveillance Act”, page 14 & Patrick Leahy, Section-by-Section Analysis, “Sec. 215.”
  34. ^ Jump up to:a b Ackermann, Spencer (17 July 2013). “NSA warned to rein in surveillance as agency reveals even greater scope”. The Guardian. Retrieved July 18, 2013.
  35. Jump up^ Bump, Philip (17 July 2013). “The NSA Admits It Analyzes More People’s Data Than Previously Revealed”. The Atlantic Wire. RetrievedJuly 18, 2013.
  36. Jump up^ Cite error: The named reference McClatchy20130717 was invoked but never defined (see the help page).
  37. Jump up^ 18 U.S.C. § 3123(b)(1)
  38. Jump up^ Mary DeRosa (undated), “Section 218, amending the FISA Standard, a summary by Mary DeRosa”, The Patriot Debates, accessed January 22, 2006
  39. Jump up^ Federal Rules of Criminal Procedure, rule 41(a)
  40. Jump up^ The Trade Sanctions Reform and Export Enhancement Act of 2000 is defined in title 22, chapter 79 of the United States Code
  41. Jump up^ Trade Sanctions Reform and Export Enhancement Act of 2000, Title IX, section 904(2)(C); corresponds to 22 U.S.C. § 7203(2)(C).
  42. Jump up^ Trade Sanctions Reform and Export Enhancement Act of 2000, title IX, section 906(A)(1) 22 U.S.C. § 7205(A)(1)
  43. Jump up^ Trade Sanctions Reform and Export Enhancement Act of 2000, title IX, section 906(A)(2) 22 U.S.C. § 7205(A)(2)
  44. Jump up^ This is defined in Executive Order No. 12947: “Prohibiting Transactions With Terrorists Who Threaten To Disrupt the Middle East Peace Process”
  45. Jump up^ This is defined in Executive Order No. 13224: “Blocking Property and Prohibiting Transactions With Persons Who Commit, Threaten to Commit, or Support Terrorism”
  46. Jump up^ Defined in Executive Order No. 12978: “Blocking Assets and Prohibiting Transactions with Significant Narcotics Traffickers”; & the Foreign Narcotics Kingpin Designation Act
  47. Jump up^ As defined in section 216 of the Patriot Act.
  48. Jump up^ Defined in 18 U.S.C. § 2520(f) and 18 U.S.C. § 2707(d)
  49. ^ Jump up to:a b Defined in 18 U.S.C. § 2520(g) and 18 U.S.C. § 2707(g)
  50. ^ Jump up to:a b 18 U.S.C. § 2712(b)
  51. Jump up^ 50 U.S.C. § 1845(g)

External links

http://en.wikipedia.org/wiki/Section_summary_of_the_Patriot_Act,_Title_II

Related Posts On Pronk Palisades

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 455-461

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

National Security Agency Whistle-blower William Binney on U.S. Government Efforts to Control American People — Binney Should Be Awarded The Presidential Medal of Freedom — Videos

Posted on May 3, 2015. Filed under: American History, Articles, Blogroll, Books, Business, Central Intelligence Agency (CIA), College, Communications, Computers, Constitution, Corruption, Crime, Crisis, Data Storage, Documentary, Drug Cartels, Economics, Education, Employment, Entertainment, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Federal Government Budget, Films, Fiscal Policy, Foreign Policy, Freedom, government, government spending, history, liberty, Life, Links, Literacy, media, Movies, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Psychology, Radio, Rants, Raves, Security, Speech, Systems, Tax Policy, Terrorism, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

william binneybill-binney-we-are-now-a-police-stateBill-Binney07Former NSA technical director Binney sits in the witness stand of a parliamentary inquiry in Berlinbinney

NSA Whistle-blower William Binney: The Future of FREEDOM

A 36-year veteran of America’s Intelligence Community, William Binney resigned from his position as Director for Global Communications Intelligence (COMINT) at the National Security Agency (NSA) and blew the whistle, after discovering that his efforts to protect the privacy and security of Americans were being undermined by those above him in the chain of command.

The NSA data-monitoring program which Binney and his team had developed — codenamed ThinThread — was being aimed not at foreign targets as intended, but at Americans (codenamed as Stellar Wind); destroying privacy here and around the world. Binney voices his call to action for the billions of individuals whose rights are currently being violated.

William Binney speaks out in this feature-length interview with Tragedy and Hope’s Richard Grove, focused on the topic of the ever-growing Surveillance State in America.

On January 22, 2015: (Berlin, Germany) – The Government Accountability Project (GAP) is proud to announce that retired NSA Technical Director and GAP client, William “Bill” Binney, will accept the Sam Adams Associates for Integrity in Intelligence Award today in Berlin, Germany. The award is presented annually by the Sam Adams Associates for Integrity in Intelligence (SAAII) to a professional who has taken a strong stand for ethics and integrity. http://whistleblower.org/press/nsa-wh…

NSA Whistle-blower: Everyone in US under virtual surveillance, all info stored, no matter the post

Former NSA Head Exposes Agency’s Real Crimes

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

“Where I see it going is toward a totalitarian state,” says William Binney. “You’ve got the NSA doing all this collecting of material on all of its citizens – that’s what the SS, the Gestapo, the Stasi, the KGB, and the NKVD did.”

Binney is talking about the collection of various forms of personal data on American citizens by the National Security Agency (NSA), where he worked for 30 years before quitting in 2001 from his high-placed post as technical leader for intelligence. A registered Republican for most of his life, Binney volunteered for military service during the Vietnam War, which led to his being hired by the NSA in the early ’70s.

In 2002 – long before the revelations of Edward Snowden rocked the world – Binney and several former colleagues went to Congress and the Department of Defense, asking that the NSA be investigated. Not only was the super-secretive agency wasting taxpayer dollars on ineffective programs, they argued, it was broadly violating constitutional guarantees to privacy and due process.

The government didn’t just turn a blind eye to the agency’s activities; it later accused the whistleblowers of leaking state secrets. A federal investigation of Binney – including an FBI search and seizure of his home and office computers that destroyed his consulting business – exonerated him on all charges.

“We are a clear example that [going through] the proper channels doesn’t work,” says Binney, who approves of Edward Snowden’s strategy of going straight to the media. At the same time, Binney criticizes Snowden’s leaking of documents not directly related to the NSA’s surveillance of American citizens and violation of constitutional rights. Binney believes that the NSA is vital to national security but has been become unmoored due to technological advances that vastly extend its capabilities and leadership that has no use for limits on government power. “They took that program designed [to prevent terrorist attacks] and used it to spy on American citizens and everyone else in the world,” flatly declares Binney (33:30).

Binney sat down with Reason TV’s Nick Gillespie to discuss “Trailblazer”, a data-collection program which was used on American citizens (1:00), why he thinks the NSA had the capability to stop the 9/11 attacks (7:00), his experience being raided by the FBI in 2007 (12:50), and why former President Gerald Ford, usually regarded as a hapless time-server, is one of his personal villians (41:25).

NSA Whistle-Blower Tells All: The Program | Op-Docs | The New York Times

William Binney: NSA had 9/11 foreknowledge

NSA Whistleblower Supports 9/11 Truth – William Binney and Richard Gage on GRTV

“The NSA Is Lying”: U.S. Government Has Copies of Most of Your Emails Says NSA Whistleblower

William Binney (U.S. intelligence official)

From Wikipedia, the free encyclopedia
William Binney
William Binney-IMG 9040.jpg

Binney at the Congress on Privacy & Surveillance (2013) of the École polytechnique fédérale de Lausanne (EPFL).
Born William Edward Binney
Pennsylvania, US
Education Pennsylvania State University(B.S., 1970)
Occupation Cryptanalyst-mathematician
Employer National Security Agency (NSA)
Known for Cryptography, SIGINT analysis,whistleblower
Awards Meritorious Civilian Service Award, Joe A. Callaway Award for Civic Courage (2012)[1]

William Edward Binney[2] is a former highly placed intelligence official with the United States National Security Agency (NSA)[3] turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. He was a high-profile critic of his former employers during the George W. Bush administration.

Binney continues to speak out during Barack Obama‘s presidency about the NSA’s data collection policies, and continues interviews in the media regarding his experiences and his views on communication intercepts by governmental agencies of American citizens. In a legal case, Binney has testified in an affidavit that the NSA is in deliberate violation of the U.S. Constitution.

Biography

Binney grew up in rural Pennsylvania and graduated with a Bachelor of Science degree in mathematics from the Pennsylvania State University in 1970. He said that he volunteered for the Army during the Vietnam era in order to select work that would interest him rather than be drafted and have no input. He was found to have strong aptitudes for mathematics, analysis, and code-breaking,[4] and served four years from 1965–1969 at the Army Security Agency before going to the NSA in 1970. Binney was a Russia specialist and worked in the operations side of intelligence, starting as an analyst and ending as Technical Director prior to becoming a geopolitical world Technical Director. In the 1990s, he co-founded a unit on automating signals intelligence with NSA research chief Dr. John Taggart.[5] Binney’s NSA career culminated as Technical Leader for intelligence in 2001. Having expertise in intelligence analysis, traffic analysis, systems analysis, knowledge management, and mathematics (including set theory, number theory, and probability),[6] Binney has been described as one of the best analysts in the NSA’s history.[7] After retiring from the NSA he founded “Entity Mapping, LLC”, a private intelligence agency together with fellow NSA whistleblower J. Kirk Wiebe to market their analysis program to government agencies. NSA continued to retaliate against them, ultimately preventing them from getting work, or causing contracts they had secured to be terminated abruptly.[8]

Whistleblowing

Binney sitting in the offices ofDemocracy Now! in New York City, prior to appearing with hosts Amy Goodman, Juan Gonzalez, and guest Jacob Appelbaum. Photo taken byJacob Appelbaum.

In September 2002, he, along with J. Kirk Wiebe and Edward Loomis, asked the U.S. Defense Department to investigate the NSA for allegedly wasting “millions and millions of dollars” on Trailblazer, a system intended to analyze data carried on communications networks such as the Internet. Binney had been one of the inventors of an alternative system, ThinThread, which was shelved when Trailblazer was chosen instead. Binney has also been publicly critical of the NSA for spying on U.S. citizens, saying of its expanded surveillance after the September 11, 2001 attacks that “it’s better than anything that the KGB, the Stasi, or the Gestapo and SS ever had”[9] as well as noting Trailblazer’s ineffectiveness and unjustified high cost compared to the far less intrusive ThinThread.[10] He was furious that the NSA hadn’t uncovered the 9/11 plot and stated that intercepts it had collected but not analyzed likely would have garnered timely attention with his leaner more focused system.[7]

After he left the NSA in 2001, Binney was one of several people investigated as part of an inquiry into the 2005 New York Times exposé[11][12] on the agency’s warrantless eavesdropping program. Binney was cleared of wrongdoing after three interviews with FBI agents beginning in March 2007, but one morning in July 2007, a dozen agents armed with rifles appeared at his house, one of whom entered the bathroom and pointed his gun at Binney, still towelling off from a shower. In that raid, the FBI confiscated a desktop computer, disks, and personal and business records. The NSA revoked his security clearance, forcing him to close a business he ran with former colleagues at a loss of a reported $300,000 in annual income. In 2012, Binney and his co-plaintiffs went to federal court to get the items back. Binney spent more than $7,000 on legal fees.[13]

During interviews on Democracy Now! in April and May 2012[14] with elaboration in July 2012 at 2600’s hacker conference HOPE[4] and at DEF CON a couple weeks later,[15]Binney repeated estimates that the NSA (particularly its Stellar Wind project[16]) had intercepted 20 trillion communications “transactions” of Americans such as phone calls, emails, and other forms of data (but not including financial data). This includes most of the emails of US citizens. Binney disclosed in an affidavit for Jewel v. NSA[17] that the agency was “purposefully violating the Constitution”.[6] Binney also notes that he found out after retiring that the NSA was pursuing collect-it-all vs. targeted surveillance even before the 9/11 attacks.

Binney was invited as a witness by the NSA commission of the German Bundestag. On July 3, 2014 the Spiegel wrote, he said that the NSA wanted to have information about everything. In Binney’s view this is a totalitarian approach, which had previously been seen only in dictatorships.[18] Binney stated the goal was also to control people. Meanwhile, he said it is possible in principle to survey the whole population, abroad and in the US, which in his view contradicts the United States Constitution. In October 2001, shortly after the 9/11 attacks, the NSA began with its mass surveillance, he said. Therefore, he left the secret service shortly afterwards, after more than 30 years of employment. Binney mentioned that there were about 6000 analysts in the surveillance at NSA already during his tenure. According to him, everything changed after 9/11. The NSA used the attacks as a justification to start indiscriminate data collection. “This was a mistake. But they still do it”, he said. The secret service was saving the data as long as possible: “They do not discard anything. If they have anything they keep it.” Since then, the NSA has been saving collected data indefinitely. Binney said he deplored the NSA’s development of the past few years, to collect data not only on groups who are suspicious for criminal or terrorist activities. “We have moved away from the collection of these data to the collection of data of the 7 billion people on our planet.” Binney said he argued even then, to only pull relevant data from the cables. Access to the data was granted to departments of the government or the IRS.[18]

In August 2014 Binney was among the signatories of an open letter by the group Veteran Intelligence Professionals for Sanity to German chancellor Angela Merkel in which they urged the Chancellor to be suspicious of U.S. intelligence regarding the alleged invasion of Russia in Eastern Ukraine.[19][20]

See also

The Future of Freedom: A Feature Interview with NSA Whistleblower William Binney

http://en.wikipedia.org/wiki/William_Binney_%28U.S._intelligence_official%29

Background Articles and Videos

Presidential Medal of Freedom

From Wikipedia, the free encyclopedia
Presidential Medal of Freedom
PresMedalFreedom.jpg
Awarded by
Seal of the President of the United States.svg
President of the United States
Type Medal
Awarded for “An especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors.”[1]
Status Active
Statistics
Established 1960
First awarded 1960
Distinct
recipients
unknown; an average of fewer than 11 per year since 1993 [2]
Precedence
Next (lower) Presidential Citizens Medal
Presidential Medal of Freedom with Distinction (ribbon).PNG Presidential Medal of Freedom (ribbon).png
Service ribbon of the Presidential Medal of Freedom
(left: Medal with Distinction)

The Presidential Medal of Freedom is an award bestowed by the President of the United States and is—along with the comparable Congressional Gold Medal, bestowed by an act of U.S. Congress—the highest civilian award of the United States. It recognizes those individuals who have made “an especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors”.[3] The award is not limited to U.S. citizens and, while it is a civilian award, it can also be awarded to military personnel and worn on the uniform.

It was established in 1963 and replaced the earlier Medal of Freedom that was established by President Harry S. Truman in 1945 to honor civilian service duringWorld War II.

History of the award

Similar in name to the Medal of Freedom,[3] but much closer in meaning and precedence to the Medal for Merit: the Presidential Medal of Freedom is currently the supreme civilian decoration in precedence, whereas the Medal of Freedom was inferior in precedence to the Medal for Merit; the Medal of Freedom was awarded by any of three Cabinet secretaries, whereas the Medal for Merit was awarded by the president, as is the Presidential Medal of Freedom. Another measure of the difference between these two similarly named but very distinct awards is their per-capita frequency of award: from 1946 to 1961 the average annual incidence of award of the Medal of Freedom was approximately 1 per every 86,500 adult U.S. citizens; from 1996 to 2011 the average annual incidence of award of the Presidential Medal of Freedom was approximately 1 per every 20,500,000 adult U.S. citizens (so on an annualized per capita basis, 240 Medals of Freedom have been awarded per one Presidential Medal of Freedom).[2][4]

President John F. Kennedy established the current decoration in 1963 through Executive Order 11085, with unique and distinctive insignia, vastly expanded purpose, and far higher prestige.[1] It was the first U.S. civilian neck decoration and, in the grade of Awarded With Distinction, is the only U.S. sash and star decoration (the Chief Commander degree of the Legion of Merit – which may only be awarded to foreign heads of state – is a star decoration, but without a sash). The Executive Order calls for the medal to be awarded annually on or around July 4, and at other convenient times as chosen by the president,[5] but it has not been awarded every year (e.g., 2001, 2010). Recipients are selected by the president, either on his own initiative or based on recommendations. The order establishing the medal also expanded the size and the responsibilities of the Distinguished Civilian Service Awards Board so it could serve as a major source of such recommendations.

The medal may be awarded to an individual more than once; John Kenneth Galbraith and Colin Powell each have received two awards; Ellsworth Bunker received both of his awards With Distinction. It may also be awarded posthumously; examples include Cesar Chavez, Paul “Bear” Bryant, Roberto Clemente, Jack Kemp, John F. Kennedy, Thurgood Marshall and Lyndon Johnson.

Insignia

Medal andaccoutrementsincluding undress ribbon, miniature, and lapel badge.

Graphical representation of the Presidential Medal of Freedom with Distinction

The badge of the Presidential Medal of Freedom is in the form of a golden star with white enamel, with a red enamel pentagon behind it; the central disc bears thirteen gold stars on a blue enamel background (taken from the Great Seal of the United States) within a golden ring. Golden American bald eagles with spread wings stand between the points of the star. It is worn around the neck on a blue ribbon with white edge stripes.

A special grade of the medal, known as the Presidential Medal of Freedom with Distinction,[6] has a larger execution of the same medal design worn as a star on the left chest along with a sash over the right shoulder (similar to how the insignia of a Grand Cross is worn), with its rosette (blue with white edge, bearing the central disc of the medal at its center) resting on the left hip. When the medal With Distinction is awarded, the star may be presented depending from a neck ribbon and can be identified by its larger size than the standard medal (compare size of medals in pictures below; President Reagan’s was awarded With Distinction).

Both medals may also be worn in miniature form on a ribbon on the left chest, with a silver American bald eagle with spread wings on the ribbon, or a golden American bald eagle for a medal awarded With Distinction. In addition, the medal is accompanied by a service ribbon for wear on military service uniform, a miniature medal pendant for wear on mess dress or civilian formal wear, and a lapel badge for wear on civilian clothes (all shown in the accompanying photograph of the full presentation set).

Recipients

Gallery

See also

References

  1. ^ Jump up to:a b Executive Order 11085, signed February 22, 1960; Federal Register 28 FR 1759, February 26, 1963
  2. ^ Jump up to:a b Senate.gov
  3. ^ Jump up to:a b Executive Order 9586, signed July 6, 1945; Federal Register 10 FR 8523, July 10, 1945
  4. Jump up^ Census.gov
  5. Jump up^ Presidential Medal of Freedom Award

http://en.wikipedia.org/wiki/Presidential_Medal_of_Freedom

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Published on Dec 30, 2013

Through a PRISM, Darkly
Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.

Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

Glenn Becks “SURVEILLANCE STATE”

Inside the NSA

Ed Snowden, NSA, and Fairy Tales

AT&T Spying On Internet Traffic

For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”

NSA Whistle-Blower Tells All – Op-Docs: The Program

The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Benny – The Government is Profiling You (The NSA is Spying on You)

‘After 9/11 NSA had secret deal with White House’

The story of Whistleblower Thomas Drake

Whistleblowers, Part Two: Thomas Drake

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Meet Edward Snowden: NSA PRISM Whistleblower

The Truth About Edward Snowden

N.S.A. Spying: Why Does It Matter?

Inside The NSA~Americas Cyber Secrets

NSA Whistleblower Exposes Obama’s Dragnet

AT&T whistleblower against immunity for Bush spy program-1/2

AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program

The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.

AT&T whistleblower against immunity for Bush spy program-2/2

Enemy Of The State 1998 (1080p) (Full movie)

Background Articles and Videos

Stellar Wind

Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]

The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]

In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

PRISM

PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.

A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]

According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]

History

Slide showing that much of the world’s communications flow through the US

Details of information collected via PRISM

PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]

PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]

The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]

Response from companies

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]

Initial Public Statements

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]

Slide listing companies and the date that PRISM collection began

  • Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
  • Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
  • Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
  • Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
  • Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
  • Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]

In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13] The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]

“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]

Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]

The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]

While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]

Post-PRISM Transparency Reports

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000” user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]

Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]

Response from United States government

Executive branch

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]

Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]

On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]

The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]

The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]

In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]

Legislative branch

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

  • June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

  • June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
  • June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
  • June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

  • June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]

Representative John Boehner (R-OH), Speaker of the House of Representatives

  • June 11 “He’s a traitor”[50] (referring to Edward Snowden)

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

  • June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

  • June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
  • June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]

Senator Mark Udall (D-CO)

  • June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]

Representative Todd Rokita (R-IN)

  • June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]

Senator Rand Paul (R-KY)

  • June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
  • June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]

Representative Luis Gutierrez (D-IL)

  • June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]

Judicial branch

The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.

Applicable law and practice

On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]

After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.

If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]

If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]

Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]

The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]

Involvement of other countries

Australia

The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]

Canada

Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]

Germany

Germany did not receive any raw PRISM data, according to a Reuters report.[59]

Israel

Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.

New Zealand

In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]

United Kingdom

In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]

Domestic response

Unbalanced scales.svg
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)

The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]

Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]

In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]

In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]

The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]

On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]

International response

Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]

Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]

Protests at Checkpoint Charlie in Berlin

The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]

The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]

William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]

Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]

Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]

Russia has offered to consider an asylum request from Edward Snowden.[91]

Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]

Related government Internet surveillance programs

A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]

A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]

http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29

ThinThread

ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]

http://en.wikipedia.org/wiki/ThinThread

Trailblazer

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.

NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]

Background

Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]

The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing

According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]

In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]

Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]

http://www.youtube.com/watch?v=1AXwwSq_me4

Boundless Informant

Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.

Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]

History

Slide showing that much of the world’s communications flow through the US.

Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]

NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]

Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]

Technology

According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]

Legality and FISA Amendments Act of 2008

The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]

The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]

Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]

http://en.wikipedia.org/wiki/Boundless_Informant

ECHELON

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]

The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Organization

UKUSA Community
Map of UKUSA Community countries with Ireland

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

  • the Government Communications Headquarters of the United Kingdom,
  • the National Security Agency of the United States,
  • the Communications Security Establishment of Canada,
  • the Defence Signals Directorate of Australia, and
  • the Government Communications Security Bureau of New Zealand.
  • the National SIGINT Organisation (NSO) of The Netherlands

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]

Controversy

See also: Industrial espionage

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]

Name

The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

  • Hong Kong (since closed)
  • Australian Defence Satellite Communications Station (Geraldton, Western Australia)
  • Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
  • Misawa Air Base (Japan) Map
  • GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
  • Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
  • Sugar Grove (West Virginia, U.S.) Map
  • Yakima Training Center (Washington, U.S.) Map
  • GCSB Waihopai (New Zealand)
  • GCSB Tangimoana (New Zealand)
  • CFS Leitrim (Ontario, Canada)
  • Teufelsberg (Berlin, Germany) (closed 1992)

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:

  • Ayios Nikolaos (Cyprus – U.K.)
  • BadAibling Station (BadAibling, Germany – U.S.)
    • relocated to Griesheim in 2004[19]
    • deactivated in 2008[20]
  • Buckley Air Force Base (Aurora, Colorado)
  • Fort Gordon (Georgia, U.S.)
  • Gander (Newfoundland & Labrador, Canada)
  • Guam (Pacific Ocean, U.S.)
  • Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
  • Lackland Air Force Base, Medina Annex (San Antonio, Texas)

http://en.wikipedia.org/wiki/ECHELON

Room 641A

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]

Description

Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]

The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]

The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.

Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.

Lawsuit

Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]

More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.

Main article: Hepting v. AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.

http://en.wikipedia.org/wiki/Room_641A

List of government surveillance projects for the United States

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.

http://en.wikipedia.org/wiki/List_of_government_surveillance_projects

Related Posts On Pronk Palisades

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

Nuclear Secrets — Videos

Posted on March 7, 2015. Filed under: American History, Blogroll, Bomb, British History, Central Intelligence Agency (CIA), College, Communications, Diasters, Documentary, Education, Energy, European History, Federal Bureau of Investigation (FBI), Federal Government, Films, Foreign Policy, Genocide, government, government spending, history, Investments, Islam, Law, liberty, Life, Links, media, Missiles, Money, National Security Agency (NSA_, Nuclear, Nuclear Power, People, Physics, Politics, Rants, Raves, Science, Security, Strategy, Technology, Terrorism, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom | Tags: , , , , , , , , , , , , , , , , |

Nuclear Secrets 1 of 5 The Spy from Moscow

Nuclear Secrets 2 of 5 Superspy

Nuclear Secrets 3 of 5 SuperBomb

Nuclear Secrets 4 of 5 Vanunu and the Bomb

Nuclear Secrets 5 of 5 The Terror Trader

Related Posts On Pronk Palisades

Thomas C. Reed and Danny B. Stillman — The Nuclear Express: A Political History of The Bomb and Its Proliferation — Videos

Read Full Post | Make a Comment ( None so far )

Obama’s House Organ The Shrinking Readership New York Times Reveals Obama Angry With Israeli Prime Minister Benjamin Netanyahu — No News Here — Obama’s Failed Foreign Policy Requires U.S. To — Bomb Bomb Bomb Islamic State and Iran — A Twofer — Bombs Away — Beach Boys — Videos

Posted on February 2, 2015. Filed under: American History, Blogroll, Bomb, British History, Business, Central Intelligence Agency (CIA), College, Communications, Constitution, Corruption, Crisis, Culture, Dirty Bomb, Documentary, Economics, Education, Energy, Entertainment, European History, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Films, Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Islam, Islam, Law, liberty, Life, Links, media, Missiles, Movies, Music, Music, National Security Agency (NSA_, Natural Gas, Natural Gas, Nuclear, Nuclear Power, Oil, Oil, People, Philosophy, Photos, Politics, Radio, Rants, Raves, Religion, Resources, Security, Shite, Strategy, Sunni, Talk Radio, Technology, Terrorism, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 406: January 29, 2015

Pronk Pops Show 405: January 28, 2015

Pronk Pops Show 404: January 27, 2015

Pronk Pops Show 403: January 26, 2015

Pronk Pops Show 402: January 23, 2015

Pronk Pops Show 401: January 22, 2015

Pronk Pops Show 400: January 21, 2015

Pronk Pops Show 399: January 16, 2015

Pronk Pops Show 398: January 15, 2015

Pronk Pops Show 397: January 14, 2015

Pronk Pops Show 396: January 13, 2015

Pronk Pops Show 395: January 12, 2015

Pronk Pops Show 394: January 7, 2015

Pronk Pops Show 393: January 5, 2015

Pronk Pops Show 392: December 19, 2014

Pronk Pops Show 391: December 18, 2014

Pronk Pops Show 390: December 17, 2014

Pronk Pops Show 389: December 16, 2014

Pronk Pops Show 388: December 15, 2014

Pronk Pops Show 387: December 12, 2014

Pronk Pops Show 386: December 11, 2014

Pronk Pops Show 385: December 9, 2014

Pronk Pops Show 384: December 8, 2014

Pronk Pops Show 383: December 5, 2014

Pronk Pops Show 382: December 4, 2014

Pronk Pops Show 381: December 3, 2014

Pronk Pops Show 380: December 1, 2014

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Story 1: Obama’s  House Organ The Shrinking Readership New York Times Reveals Obama Angry With Israeli Prime Minister Benjamin Netanyahu  — No News Here — Obama’s Failed Foreign Policy Requires U.S. To  — Bomb Bomb Bomb Islamic State and Iran — A Twofer — Bombs Away — Beach Boys — Videos

Iran-Bomb

Dr. Strangelove: Major Kong Rides The Bomb 1080p

Iran-Obama-Nuclear-Bomb branco-cartoon-netanyahu-obama-iranIRAN SANCTIONS, OBAMACARTOON
Obama-War-Iran-Middle-East

 Beach Boys Good Vibrations

The Beach Boys – Help Me Rhonda

Beach Boys ” I Get Around ” Live 1964

US Senate committee approves bill for further sanctions on Iran

White House says fresh Iran sanctions “unconstructive”

Boehner Invite of Netanyahu Debated by Fox News Sunday Panel

White House furious over Netanyahu and Boehner meeting

Krauthammer On How Israel Tension Raises Questions On Iran

Obama And Netanyahu Are In Awkward New Territory

GOP Leadership’s Invitation to Netanyahu a Provocation Aimed at War with Iran

White House: Obama will not sit down with Netanyahu

Israeli PM Netanyahu: U.S. is Number 1 Target to ISIS

John Bolton: Iranian President Rouhani is playing Obama like a “violin”

FLASHBACK : Obama rejects Netanyahu snubs meeting with the Israeli Prime Minister (Sept 11, 2012)

Iran Facts

Bomb bomb bomb, bomb bomb Iran

The Beach Boys ~ Barbara Ann ~ 1965

Beach Boys The Lost Concert (1964)

“The Beach Boys – 25 Years Together” 1987

 

Obama’s Israel Problem

• BY WILLIAM KRISTOL

The Obama administration is angry with Israel. Here’s the administration’s house organ, the New York Times, this morning:

The Obama administration, after days of mounting tension, signaled on Wednesday how angry it is with Israel that Prime Minister Benjamin Netanyahu accepted Republican leaders’ invitation to address Congress on Iran without consulting the White House.

The outrage the episode has incited within President Obama’s inner circle became clear in unusually sharp criticism by a senior administration official who said that the Israeli ambassador, Ron Dermer, who helped orchestrate the invitation, had repeatedly placed Mr. Netanyahu’s political fortunes above the relationship between Israel and the United States.

The official who made the comments to The New York Times would not be named…

Of course, the official who last summer called Prime Minister Netanyahu a “coward” and a “chickens–t” would not be named either. But there is no reason to think those unnamed angry officials do not speak for an angry president.

The Obama White House usually prides itself on not getting angry. Its self-image is that it’s cool, calm, and collected. And it doesn’t get angry at, for example, the Islamic Republic of Iran. The Obama White House understands and appreciates the complexities of the Islamic Republic’s politics and history. It is only with respect to the Jewish state that the Obama White House is impatient, peremptory, and angry.
Why has Obama been lashing out? Because he had a dream. He was to be the American president who would preside at, and take credit for, the founding of a Palestinian state. Obama would be to Palestine what Harry Truman was to Israel. Now it’s clear that’s not going to happen during his presidency. Obama’s frustrated that it’s not going to happen. So he lashes out.

But Obama is still pursuing another dream: to be the American president who goes to Tehran, who achieves with Iran what Richard Nixon achieved with China. And he thinks Israel, and Israel’s friends in the United States, stand in the way of achieving that dream. So he has another reason to be angry.

Of course, it’s not Israel but reality that stands in the way of Obama’s dreams. His Cairo speech, and the policies that followed from it, have crashed on the shoals of reality. Obama said in Cairo in June 2009, that he hoped that his administration would end the “cycle of suspicion and discord” between the United States and much of the Muslim world:

I have come here to seek a new beginning between the United States and Muslims around the world; one based upon mutual interest and mutual respect; and one based upon the truth that America and Islam are not exclusive, and need not be in competition. Instead, they overlap, and share common principles – principles of justice and progress; tolerance and the dignity of all human beings. …

There must be a sustained effort to listen to each other; to learn from each other; to respect one another; and to seek common ground. As the Holy Koran tells us, “Be conscious of God and speak always the truth.”

But the truth is that Obama’s policies haven’t ameliorated the crisis in Islam or lessened the discord between Islam and the West. They have worsened the discord and exacerbated the crisis. Obama’s policies of retreat have strengthened radical Islam, and undermined those in the Muslim world who do believe in “justice and progress; tolerance and the dignity of all human beings.”

It is Obama’s failures that explain his anger—his failures, and his hopes that a breakthrough with Iran could erase the memories of failure and appear to vindicate his foreign policy. Israel stands in the way, he thinks, of this breakthrough. Prime Minister Netanyahu stands in the way. And so Obama lashes out.

It’s of course unseemly. But it’s also dangerous. Neville Chamberlain and the British establishment were far angrier with Winston Churchill, and much harsher in their attempts to discredit him, in the late 1930s when the dreams of appeasement were failing, than earlier, when hope for the success of appeasement was alive. When you think your policies are going to be vindicated, you ignore or dismiss critics. It’s when you suspect and fear imminent failure that you lash out.

So we have an angry president, increasingly desperate for vindication of his failed foreign policy, accelerating both his appeasement of Iran and his attacks on Israel. The good news is that the Republican party and the conservative movement—and most of the American people—stand with Israel and against President Obama. Of major parts of the American Jewish community, on the other hand, one can say no such thing.

http://www.weeklystandard.com/blogs/obama-s-israel-problem_830240.html

G.O.P.’s Invitation to Netanyahu Is Aiding Obama’s Cause on Iran

President Obama’s relations with Democrats on Capitol Hill have never been especially close. But one man is helping to bring them a little closer together: Benjamin Netanyahu.

The decision by the Israeli prime minister to accept an unusual invitation from House Republicans to address a joint meeting of Congress has had the unintended effect of helping the president rally Democrats as his administration negotiates a delicate nuclear deal with Iran.

For months, the issue of imposing sanctions on Iran split many Democrats from the president, as they feared his posture was emboldening the government in Tehran to further develop itsnuclear program. But Mr. Netanyahu’s planned speech, a provocation of the president that many Democrats found distasteful and undiplomatic, has helped shift the political dynamic.

“For the prime minister to accept made it extremely political, knowing how the invitation played out,” said Senator Joe Manchin III, Democrat of West Virginia and a frequent critic of the White House. Mr. Manchin was one of 10 Democrats who signed a letter agreeing not to vote on a sanctions bill until after the March 24 deadline to have a framework of an agreement in place with the Iranians.

Photo

Senator Joe Manchin III, Democrat of West Virginia, found the invitation to Benjamin Netanyahu off-putting.CreditDoug Mills/The New York Times

Speaker John A. Boehner’s decision to invite Mr. Netanyahu, and the prime minister’s decision to accept without consulting the Obama administration, Mr. Manchin added, struck some Democrats, like him, as off-putting.

“It didn’t show a lot of class,” Mr. Manchin said. “If it had been George W. Bush or Reagan or Clinton or whoever, protocol is protocol.”

The invitation proved to be opportune for Mr. Obama, who had been making steady progress in persuading Democrats to delay a vote on sanctions to give him some diplomatic breathing room.

The president had been “changing minds,” said Senator Chris Murphy, Democrat of Connecticut.

“I don’t think the invitation has been helpful to the debate in Congress,” Mr. Murphy added, saying he believed Mr. Netanyahu’s speech would only further politicize an issue that should be above partisanship. “My worry all along has been that Republicans are going to oppose this deal simply because it’s President Obama’s deal, and the invitation to Netanyahu confirms that there are some Republicans who simply put politics ahead of what’s best for the country.”

Other Democrats were also quickly lining up behind the president. A group of House Democrats will formally ask Mr. Boehner to delay his invitation to the prime minister until after the March deadline passes. Three Democratic representatives were circulating a letter to the speaker among their colleagues on Wednesday. It was already picking up additional signatures.

The letter accuses the speaker of harming American foreign policy and undermining Mr. Obama. “As members of Congress who support Israel, it appears that you are using a foreign leader as a political tool against the president,” said the letter, which was signed by Representatives Keith Ellison of Minnesota, Steve Cohen of Tennessee and Maxine Waters of California. “When the Israeli prime minister visits us outside the specter of partisan politics,” the letter continued, “we will be delighted and honored to greet him or her on the floor of the House.”

Getting lawmakers to go on the record criticizing the prime minister will be complicated, however, because many Democrats fear antagonizing Mr. Netanyahu, the powerful pro-Israeli interests aligned with him, and Jewish voters in their districts.

MULTIMEDIA FEATURE

Timeline on Iran’s Nuclear Program

Whether Iran is racing toward nuclear weapon capabilities is one of the most contentious foreign-policy issues challenging the West.

 

“There’s a lot of people who agree with this letter,” Mr. Ellison said. “Some will put their name on it. Some won’t. But the bottom line is, I haven’t run into anyone on our side who thinks this is a good idea.”

The issue is delicate. Senator Robert Menendez of New Jersey, the senior Democrat on the Foreign Relations Committee and an ardent defender of sanctions against Iran, insisted Wednesday that Mr. Netanyahu’s speech was not a factor in his decision not to press for an immediate vote.

“It had absolutely no effect,” he said.

Mr. Menendez made the surprising announcement on Tuesday that he and a group of nine other Democrats had written to the president to inform him that they would not vote for a sanctions bill before the March 24 deadline. It was a striking step back for a senator who last week likened the administration’s statements on the negotiations to “talking points that come straight out of Tehran.”

Democrats said they saw two political issues in play. Domestically, Mr. Boehner and Republicans want to press their point that Mr. Obama’s foreign policy is weak. And in Israel, which holds its elections March 17, Mr. Netanyahu has political incentive to present himself as a man of steely resolve.

The perception that Republicans and Mr. Netanyahu are approaching the debate over sanctions in an overtly political way has helped those who are opposed to further sanctions make their case, Democrats said.

“It’s been building for days,” said Greg Rosenbaum, the chairman of the National Jewish Democratic Council, speaking about efforts to persuade Democrats to offer the president more flexibility. “But it really let loose this week.”

Typically, policy on Israel has been one area where both political parties agree. And some observers said they feared the Netanyahu-Boehner episode was eroding that.

“When that sense of mutual values and interest starts to be driven apart by partisan politics,” said Jeremy Ben-Ami, the president of J Street, an Israeli advocacy group, “it works to the long-term harm of the state of Israel.”

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 400-406

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Snippers — Videos

Posted on January 28, 2015. Filed under: American History, Blogroll, Communications, Culture, Documentary, Entertainment, Films, Foreign Policy, government, government spending, Language, Law, liberty, Life, Movies, People, Philosophy, Photos, Politics, Rifles, Television, Video, War, Wealth, Wisdom, Writing | Tags: , , , , |

Sniper: Inside The Crosshairs (Full Documentary)

Stalingrad Snipers 2011 English full movie

American Sniper – Featurette [HD]

Top 10 Movie Snipers

Read Full Post | Make a Comment ( None so far )

White House Throws Toga Party For Emperor Obama At Caesar’s Palace Only Democrats Invited– Emperor Obama Has No Clothes — Congress Throws Parade Thanks Obama — Twist and Shout Republicans Dance In The Streets — Videos

Posted on November 20, 2014. Filed under: American History, Blogroll, British History, Business, College, Comedy, Communications, Constitution, Corruption, Crime, Crisis, Diasters, Documentary, Economics, Education, Employment, European History, Faith, Family, Federal Government, Federal Government Budget, Films, Fiscal Policy, Freedom, Friends, government spending, Health Care, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, media, Obamacare, People, Philosophy, Photos, Politics, Press, Private Sector, Public Sector, Radio, Radio, Rants, Raves, Regulations, Strategy, Talk Radio, Tax Policy, Technology, Unemployment, Unions, Video, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014

Story 1: White House Throws Toga Party For Emperor Obama At Caesar’s Palace Only Democrats Invited– Emperor Obama Has No Clothes — Congress Throws Parade Thanks Obama — Twist and Shout Republicans Dance In The Streets — Videos

obama_toga1Barack-Obama-and-Joe-Biden-in-Togas-Caesars-Palace (1)

Caesars_Palace_-_Across_Bellagio_Lakecp_dinju2Caesars-Palacecaesars-palace (2)caesars_palace111Caesars_Palace_-_Statuetoga_partycaesars-palace-casino-las-vegas-bigCaesars_palace_night

toga! toga! toga! Animal House

Animal House

Ferris Bueller’s Twist And Shout

President Obama’s speech on immigration

Ted Cruz: We Are Witnessing A Constitutional Crisis • Kelly File

Krauthammer on Obama’s ‘flagrant assault’ on Constitution Fox News Video

Kurtz: Why broadcast networks are skipping Obama’s speech

O’Reilly to Jose Antonio Vargas: ‘You Don’t Have an Entitlement to Be Here’

Metro Detroit residents react to President Obama’s immigration plans

Locals, Governor Walker react to President Obama’s immigration address

USA: White House asked if Obama thinks he’s ’emperor’ of the US

A Message Before the President’s Immigration Speech

‘Decimating Law Enforcement’: Sessions Slams Obama

Obama: I Am Not A Dictator – 3/1/2013

Obama: The Problem Is … I’m Not the Emperor of the United States

President Obama’s Tea Party ‘Cousin’ Dr.Milton Wolf Wants to Stop Him From ‘Destroying America’

EXPLAINED: Why Obama is Authorizing up to 5 Million Illegals

Obama’s Executive Order on Immigration Is Unlikely to Include Health Benefits

BREAKING TODAY: Obama to Give 5 MILLION “Undocumented Immigrants” Amnesty!

Oath of office of the President of the United States

“I do solemnly swear (or affirm) that I will faithfully execute the Office of President of the United States, and will to the best of my Ability, preserve, protect and defend the Constitution of the United States.

The Constitution of the United States

Excerpts

Article. I.

Section. 1.

All legislative Powers herein granted shall be vested in a Congress of the United States, which shall consist of a Senate and House of Representatives.

 

Article. 2.

Section. 1.

The executive Power shall be vested in a President of the United States of America. He shall hold his Office during the Term of four Years, and, together with the Vice President, chosen for the same Term, be elected, as follows

Section. 3.

He shall from time to time give to the Congress Information of the State of the Union, and recommend to their Consideration such Measures as he shall judge necessary and expedient; he may, on extraordinary Occasions, convene both Houses, or either of them, and in Case of Disagreement between them, with Respect to the Time of Adjournment, he may adjourn them to such Time as he shall think proper; he shall receive Ambassadors and other public Ministers; he shall take Care that the Laws be faithfully executed, and shall Commission all the Officers of the United States.

Section. 4.

The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors.

 

Article. IV.

Section. 4.

The United States shall guarantee to every State in this Union a Republican Form of Government, and shall protect each of them against Invasion; and on Application of the Legislature, or of the Executive (when the Legislature cannot be convened), against domestic Violence.

GOP senator warns of violence after immigration order

Susan Page

Oklahoma Sen. Tom Coburn warns there could be not only a political firestorm but acts of civil disobedience and even violence in reaction to President Obama’s executive order on immigration Thursday.

“The country’s going to go nuts, because they’re going to see it as a move outside the authority of the president, and it’s going to be a very serious situation,” Coburn said on Capital Download. “You’re going to see — hopefully not — but you could see instances of anarchy. … You could see violence.”

Coburn, 66, is a conservative Republican but one who has a personal relationship with Obama. They entered the Senate in the same class, elected in 2004, and the new senators from opposite ends of the political spectrum and their spouses immediately hit it off at an orientation dinner. Last year, the president wrote a tribute in Time magazine to Coburn as “someone who speaks his mind (and) sticks to his principles.”

“I really like the guy,” Coburn, 66, told USA TODAY’s weekly video newsmaker series Wednesday. “I thought he’s neat, and I think Michelle’s a neat lady.”

That history gives Coburn’s stark assessment a special sting. On immigration, he accuses Obama of acting like “an autocratic leader that’s going to disregard what the Constitution says and make law anyway.” He says changes in immigration policy require passage by Congress, not just the president’s signature — a charge the White House disputes and on which legal experts disagree.

“Instead of having the rule of law handling in our country today, now we’re starting to have the rule of rulers, and that’s the total antithesis of what this country was founded on,” Coburn says. “Here’s how people think: Well, if the law doesn’t apply to the president … then why should it apply to me?”

Coburn, who also served three terms in the House of Representatives, is retiring two years before his second Senate term is up as he battles a recurrence of cancer. He has been a leading deficit hawk, nicknamed “Dr. No” for his steadfast opposition to spending and his blunt-spoken manner.

Though he says both parties deserve some of the blame for Washington’s dysfunction, he argues that the president has the ability to chart a different path. Solid Republican control of Congress in the wake of this month’s midterm elections could make it easier to deal with an issue such as the structural problems associated with the deficit. Making the compromises necessary for that “requires divided government,” he says.

“If I were in his office, I’d say, if you want to have a successful second term, dig down, swallow your pride, get what you can get, compromise on everything you can for the best interests of the country,” he says. “Bring us back together.”

http://www.usatoday.com/story/news/politics/2014/11/19/usa-today-capital-download-with-tom-coburn/19263969/

 

 

 

Obama’s immigration speech Thursday night


Nov 20, 12:51 PM (ET)

By JIM KUHNHENN and ERICA WERNER


WASHINGTON (AP) — President Barack Obama is poised to claim broad authority to grant work permits to millions of immigrants living illegally in the United States and to protect them from deportation. But Republicans are vowing an all-out fight against it.

“Congress will act,” Senate Minority Leader Mitch McConnell warned on the Senate floor Thursday, hours before Obama’s 8 p.m. EST address.

Obama “will come to regret” his action, McConnell said. “We’re considering a variety of options. But make no mistake. When the newly elected representatives of the people take their seats, they will act.”

Obama’s measures could make as many as 5 million people eligible for work permits, with the broadest action likely aimed at extending deportation protections to parents of U.S. citizens and permanent residents, as long as those parents have been in the country for at least five years.


Other potential winners under Obama’s actions would be young immigrants who entered the country illegally as children but do not now qualify under a 2012 directive from the president that’s expected to be expanded. Changes also are expected to law enforcement programs and business visas.
However, the plan would leave the fate of millions more unresolved. With more than 11 million immigrants living in the country illegally, Obama’s actions would not offer specific protections to more than half.

Still, Obama was expected to ensure that many of those not covered — immigrants who have lived illegally in the U.S. for 10 years or more or parents of citizens or permanent residents who have been in the country fewer than five years — would be given a lower priority for deportation, essentially sanctioning what is already current practice.

“What I’m going to be laying out is the things that I can do with my lawful authority as president to make the system better, even as I continue to work with Congress and encourage them to get a bipartisan, comprehensive bill that can solve the entire problem,” Obama said in a video posted Wednesday on Facebook.

On Thursday, Obama discussed the need for an overhaul of the immigration system in the context of science and technology, saying the U.S. benefits from innovations and discoveries by scientists and researchers who come here to pursue their work.


“Part of staying competitive in a global economy is making sure we have an immigration 

system that doesn’t send away talent but attracts it,” Obama said at a White House ceremony recognizing achievements in science, technology and innovation. “So that’s what I’ll be talking about a little bit tonight.”But the vehement reactions of Republicans, who will have control of Congress come January, made clear that Obama was courting a serious partisan confrontation.

Some on the right pushed for using must-pass spending legislation to try to stop Obama’s effort. One lawmaker — Republican Rep. Mo Brooks of Alabama — raised the specter of impeachment.

Party leaders warned against such talk and sought to avoid spending-bill tactics that could lead to a government shutdown. They said such moves could backfire, alienating Hispanic voters and others.

In a closed-door meeting with other Senate Republicans, McConnell urged restraint. Still, there were concerns among some Republicans that the potential 2016 presidential candidates in the Senate would use the announcement to elevate their standing, challenging Obama directly.

And as far-reaching as Obama’s steps would be, they fall far short of what a comprehensive immigration overhaul passed by the Senate last year would have accomplished. The House never voted on that legislation. It would have set tougher border security standards, increased caps for visas for foreign high-skilled workers and allowed the 11 million immigrants illegally in the country to obtain work permits and begin a 10-year path toward green cards and, ultimately, citizenship.

“This is not the way we want to proceed. It will not solve the problem permanently,” White House communications director Jennifer Palmieri said Thursday on MSNBC.

None of those affected by Obama’s actions would have a direct path to citizenship, and his actions could be reversed by a new president after he leaves office. Moreover, officials said the eligible immigrants would not be entitled to federal benefits — including health care tax credits — under Obama’s plan.

Some immigrant advocates worried that even though Obama’s actions would make millions eligible for work permits, not all would participate out of fear that Republicans or a new president would reverse the executive orders.

“If the reaction to this is that the Republicans are going to do everything they can to tear this apart, to make it unworkable, the big interesting question will be, will our folks sign up knowing that there is this cloud hanging over it,” said Janet Murguia, president and CEO of the National Council of La Raza.

Still, Democrats battered by election losses two weeks ago welcomed Obama’s steps.

“The last two weeks haven’t been great weeks for us,” said Rep. Joe Crowley of New York, one of 18 congressional Democrats who had dinner Wednesday night with Obama. “The president is about to change that.”

http://apnews.myway.com/article/20141120/us-obama-immigration-2e70f2e672.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos

Posted on November 18, 2014. Filed under: American History, Blogroll, Books, Business, Central Intelligence Agency (CIA), Computers, Constitution, Corruption, Crime, Crisis, Diasters, Documentary, Education, Employment, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Films, Foreign Policy, Fraud, Freedom, Friends, government, government spending, history, Homicide, Illegal, Immigration, Language, Law, liberty, Life, Links, Literacy, media, National Security Agency (NSA_, People, Philosophy, Photos, Politics, Press, Radio, Raves, Regulations, Reviews, Security, Strategy, Unemployment, War, Wealth, Weapons, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014

Story 1: Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos

Stuff They Don’t Want You to Know – Dirty Tricks: Agent Provocateur

Preparing for violence in Missouri

Ferguson Nervously Awaits Grand Jury Decision

How police Agent Provocateur frame people

Provocateur Caught Throwing Bricks At Ferguson Police

John Sayles on New FBI Rules & Role of Agent Provocateurs in Disrupting Social Movements

FBI Warns of Ferguson Violence from ‘Extremists’ After Grand Jury Decision

Ferguson braces for grand jury decision

Biracial couple: We’re staying in Ferguson

Snipers Take Aim and Push Infowars Reporters

Combat Vet Ferguson Missouri Has Turned Into Fallujah Iraq

Infowars Shatters Multiple Mainstream Media Lies in Ferguson, MO

Infowars Recounts Ferguson Police State

Missouri Deploys National Guard

Occupy LA – Police Provocateurs Confirmed

Occupy LA has become victim to police provocateur (under cover cops causing violence) much like other cities around the world. What to look for:

The same boots,
black masks
black backpacks,
specific type of black bandana.

Police Provocateurs are not smart, and they are easy to spot. Do not let your 1st amendment rights be trampled by corrupt police.

LAPD Infiltrators and Agent Provocateurs Targeted Left and Panthers – Johnston on RAI – (2/4)

The Deep State and the Power of Billionaires – David Cay Johnston on Reality Asserts Itself (3/4)

Ferguson on the edge: RT America special on eve of grand jury ruling

Michael Brown Protests Turns Into RIOT…LOOTINGS…VIOLENCE(RIOT Police Called In)

Ferguson, Missouri LOOTERS Target FOOT LOCKER…FAMILY DOLLAR …RIMS… BURNS Down QUICKTRIP!!

Violence erupts in Ferguson

COINTELPRO 101 – The Sabotage Of Legitimate Dissent

Activists Who Stole FBI Documents in 1971 Revealing COINTELPRO Speak Out

Betty Medsger “The Burglary”

TREASON 101 FBI Cointelpro

COINTELPRO: The FBI’s War on Black America

BUSTED! Proof Missouri Riots Were Obama’s Attempt To Implement A Martial Law Police State!

FBI Agent Provocateur Suggested Terror Attack at Mosque

FBI – Don’t post that or I’ll be “livid”

Return of the Ferguson War Zone? Missouri Enacts State of Emergency Ahead of Mike Brown Grand Jury

 Missouri Gov. Jay Nixon has declared a state of emergency in advance of the grand jury’s pending decision in the Michael Brown shooting case. On Monday, Nixon issued an executive order to activate the state’s National Guard in response to what he called “the possibility of expanded unrest.” Nixon cited the protests in Ferguson and the St. Louis area since Brown, an unarmed black teenager, was killed by police officer Darren Wilson on August 9. The grand jury has been meeting for nearly three months, and protests are expected to escalate if they choose not to indict. But while state officials say they fear violence, protesters say they fear a return to the militarized crackdown that turned their community into a war zone. As the grand jury nears a decision and all sides prepare for the unknown under a state of emergency, we are joined by two guests: Jeff Smith, a New School professor and former Missouri state senator whose new book is “Ferguson: In Black and White,” and Montague Simmons, chair of the St. Louis-based Organization for Black Struggle and a key organizer in the movement that has emerged since Brown’s killing.

Under Obama, U.S. personal freedom ranking slips below France

U.S. Secrets: Classified Intelligence, CIA,FBI,NSA,Secret Service, Edward Snowden

 

The No Indictment.org Ferguson protest group released its list of potential targets following the decision by the St. Louis County Courthouse on the Mike Brown case.

The published map shows expected landmarks like the Ferguson City Hall and the County Courthouse.

But it also marks things that have NOTHING to do with the Michael Brown situation, like Anheuser Busch and Boeing.
ferguson targets

Most telling thing is the mark for Emerson Electric. Emerson has been in Ferguson for at least 50 years, long before Ferguson became a minority municipality. Yet not only do they mark Emerson they make note of the CEO’s salary. Maybe they’re mutating into an extortion group straight out of the playbook of Jesse Jackson’s Rainbow Push Coalition?

Below is the published list of potential St. Louis area targets.
Potential Action Locations

  • Robert McCulloch’s office
  • St. Louis County Justice Center
  • Stephanie Karr’s office
  • Olin Corporation Headquarters
  • Judge Maura McShane’s courtroom
  • St. Louis County Police Department
  • Governor Nixon’s Office (Wainwright Building)
  • Clayton School District Office
  • Department of Justice
  • Dean Plocher’s office
  • Ronald Brockmeyer’s office
  • Dan Boyle’s office
  • Thomas Flach’s office
  • Regal III Market
  • Canfield Green Apartments
  • Ferguson Police Department & Jail
  • West Florissant Quick Trip
  • Missouri Botanical Gradens
  • Powell Symphony Hall
  • Monsanto Headquarters
  • Peabody Energy Headquarters
  • Anheuser-Busch Headquarters
  • Emerson Electric Headquarters
  • Steve Stenger’s lawfirm
  • St. Louis Art Museum
  • Gateway Arch
  • Peabody Opera House
  • Ritz Carlton
  • Lambert International Airport
  • Mayor Slay
  • Boeing
  • St. Louis City Police Department
  • St. Louis Galleria
  • Plaza Frontenac
  • Six Stars Market
  • Colonel Jon Belmar
  • Senator Roy Blunt
  • Senator Claire McCaskill
  • St. Louis City Justice Center
  • St. Ann Police Department & Jail
  • Clayton City Hall
  • GCI Security, Inc.
  • St. Louis County Council
  • Clayton Police Department & Jail
  • Ferguson City Hall
  • Lacy Clay’s Office
  • Donors
  • Husch Blackwell LLP
  • Martin Insurance Group LLC
  • Stone, Leyton & Gershman
  • University Square Company
  • Stone & Alter Real Estate
  • Carey & Danis LLC
  • The Law Firm of Thomas C Antoniou LLC
  • Hammond & Shinners Law Firm
  • Collinsville Acquisitions Inc
  • Thompson Coburn
  • Commercial Bank
  • Sanctuaries
  • Greater St. Mark Family Church
  • Veterans for Peace Office
  • St. John’s Episcopal Church
  • Hospitals
  • St. Louis University Hospital
  • SSM Cardinal Glennon Children’s Medical Center
  • SSM St. Mary’s Health Center
  • Barnes Jewish Hospital
  • St. Alexius Hospital
  • Kindred Hospital
  • Southwest Medical Center

The Ferguson Mike Brown protesters are not ruling out violence or looting.

“Rioting and looting are the tools of those without a voice. The rioting and looting, while I didn’t participate in it, was necessary. Without it we would not be standing here today.”

 

http://www.thegatewaypundit.com/2014/11/justice-for-mike-brown-group-releases-list-of-targets-including-anheuser-busch-boeing-emerson-electric-airport/

 

No Indictment Planning

#Ferguson

 

In preparation for a no-indictment decision, here is the important information to know.

 

On August 9, 2014, Mike Brown was killed by Officer Darren Wilson. For nearly 100 days, we have protested to demand an indictment. We are hopeful that Darren Wilson will be indicted for murder, but the recent signs do not seem that this outcome is likely.

 

We will update this page daily with key information regarding post indictment decision announcement planning. And this isn’t meant to replace twitter or the newsletter, but to be a central space for information that can be updated in real-time.

 

If you’d like to donate, please click here.

 

If you have not already done so, please read the last Protestor and Ally Open Letter entitled, “An American Horror Story,” by clicking here.

 

We are on the right side of justice. Stand with us.

 

// Netta (@nettaaaaaaaa) and DeRay (@deray)

 

P.S. To suggest additions to the site, please e-mail us at netta@thisisthemovement.org or deray@thisisthemovement.org.

Possible Protest Spaces

Here is a map of possible protest spaces. Remember, we actively advocate and profess the importance of peaceful protest. We do not support, condone, or encourage violence.

 

Safe Spaces

These are spaces to escape police violence, get updated on protest plans and all are located near protest zones.

 

Shaw: St. John’s Episcopal Church, 3664 Arsenal, 63166

 

Ferguson: Greater St. Mark’s Church, 9950 Glen Owen Drive, 63136

 

Clayton: Veterans for Peace Office, 216 S. Meramec Ave., 63105

 

 

Day of Non-Indictment Decision Announcement

On the day of the non-indictment announcement, protestors are gathering at the #Ferguson PD Lot and at VonDerrit’s memorial site in Shaw.

 

Day AFTER Non-Indictment Decision Announcement

On the day AFTER the non-indictment announcement, protestors are gathering in Clayton. More information is forthcoming.

 

Grand Jury Announcement Text Alert

Click here to sign up to receive a text alert when the Grand Jury makes its decision regarding the killing of Michael Brown Jr. (Here’s the direct link: http://bit.ly/GJText)

 

Rules of Engagement

Protestors publicly proposed Rules of Engagement for police in the event of a non-indictment. Here is the link to the rules: http://media.wix.com/ugd/9c5255_9d5572481c7840fbad088ef6d8ae82d4.pdf

 

Law-Related Volunteers

Lawyers, Legal Workers, and Law Students — The Ferguson Legal Defense Fund, a coalition of St. Louis lawyers and firms, has issued an emergency call to action to find volunteers to assist with legal representation, jail supports and visits, legal research, legal observation, and legal observation and training. Click here to learn more and to volunteer.

 

Nationwide Actions Planned

Click here to learn more about the actions planned across the country in the event of a non-indictment. Actions are currently planned in 50+ cities across America.

 

Protest Preparation

For a primer and re-cap of the direct action trainings, click here to access the core materials. More information will be posted in the coming days.

 

Support With Safe House Supplies

All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.

Food
Apples, Oranges, Pretzels, Chips, Crackers, Peanut Butter, Jelly, Carrots, Granola Bars, Cookies, Chips & Salsa, Nuts, Bread, Jerky, Cheese, Hummus
Drinks
Water, Coffee, Tea, Juice, Gatorade
Cleaning/Eating
Toilet Paper, Paper Towels, Disinfectant Wipes, Hand Soap, Disposable Plates, Cups, Napkins, Utensils, Trash Bags
Electronics
Surge Protectors, Flashlights (w/ batteries), Cell Phone Chargers
Wearables
Blankets, Hand Warmers
Communication
Flip Chart Markers, Pens, Pads of Paper

 

 

Safe Spaces and Sanctuaries

We will publish the list of Safe Spaces and Sanctuaries later this week.

 

Hospitals and urgent care: Name, address, approximate time by car from Canfield Green Apts, phone number, hours.

  • St Louis University Hospital: 3635 Vista Ave, STL. 25 min. 314-577-8000.
  • Concentra Urgent Care: 463 Lynn Haven, Hazelwood. 13 Min. 314-731-0448. M-F 8-5
  • Concentra Urgent Care — North Broadway. 8340 N Broadway, STL. 15 min. 314-385-9563. M-F 8-5.
  • St Luke’s Urgent Care: 8857 Ladue Rd, STL. 18 min. 314-576-8189. M-Su 8-8.

 

 

Protestor Action Kit:

  1. Jail support number written on your body with permanent marker
  2. Change of warm clothes
  3. Plastic gallon bags
  4. Snacks/Water
  5. Portable phone charger
  6. Paper map
  7. Medications
  8. Gloves, hat, scarf, hand warmers
  9. Shatter proof goggles
  10. Quick reference sheet with names (first, last) and date of birth for each member of your team/cohort and any important phone numbers and addresses
  11. Medical supplies: gauze, tape, L.A.W. (liquid antacid and water – Maalox and water), mask, cold pack

 

Support With Protest Supplies

All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.

Signage
White Bed Sheets (for banners), Banners, Spray Paint
Gas Masks
2 liter plastic bottles, box cutters, duct tape, rubber foam, shoestrings, elastic bands, glue
Wooden Shields
Rubber hoses, ¾” and ½” Phillps screws, 11/32” plywood sheathing cut into 32X34” sections, electric drills or Phillips screwdrives
Other

http://noindictment.org/

FBI Warns Ferguson Decision ‘Will Likely’ Lead to Violence By Extremists Protesters

Jeff Roberson/AP Photo
PHOTO: A protester kicks a smoke grenade that had been deployed by police back in the direction of police, Aug. 13, 2014, in Ferguson, Mo.

The bulletin cites a series of recent messages threatening law enforcement, including a message posted online last week by a black separatist group that offered “a $5,000 bounty for the location” of Ferguson police officer Darren Wilson, who fired the shots that killed Brown on Aug. 9.

In interviews with ABC News, police officials said their departments have identified a number of agitators who routinely appear at mass demonstrations.

“How many of those sympathizers are actually sympathizers?” Rick Hite, the chief of the Indianapolis Metropolitan police department, wondered. Many of them see the protests as a way to “chime in with their own personal agenda,” he said.

In its new intelligence bulletin, obtained by ABC News, the FBI says “exploitation” of mass demonstrations “could occur both in the Ferguson area and nationwide.”

“All it takes is one.”

Overall, though, law enforcement officials contacted by ABC News – stretching from Los Angeles to the Atlanta area – remained confident that any protests in their cities would not be tainted by violence.

“We are not expecting any issues in our city,” said Billy Grogan, the chief of police in Dunwoody, Ga., outside Atlanta. “However, we are preparing just in case. I believe most departments are watching the situation closely and are prepared to respond if needed.”

A law enforcement official in Pennsylvania agreed, saying that while authorities there are not enacting any significant new measures they are “monitoring” developments out of Ferguson.

PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.

Scott Olson/Getty Images
PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.

In addition, police officials emphasized that efforts to address a big decision like the one pending in Ferguson actually begin well before that decision.

In Indianapolis, police have held two town-hall meetings in the past two months to discuss the Ferguson issue with concerned residents, and meetings like that help build a “bank of trust,” Hite said.

But it’s sometimes hard to build such trust between a community and the law enforcement officers working its streets.

With several recent cases involving allegations of excessive force by police officers, many in African-American communities can’t help but wonder why seemingly routine encounters escalate so dramatically.

PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.

Jeff Roberson/AP Photo
PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.

In a recent interview with ABC News, Philadelphia Police Chief Charles Ramsey said people in “communities of color” often “don’t view us as people who really have the right to enforce laws or tell them what to do,” and sometimes it’s because of “the way they’ve seen us conduct ourselves in the past.”

“Not all cops, but all it takes is one,” Ramsey said. “As human beings, we tend to remember the one bad incident, not the 10 good ones that we may have experienced.”

On the other side of the spectrum, there are some uncomfortable facts that may be influencing how some police respond to African-Americans they encounter on routine patrols.

In particular, African-Americans are disproportionally represented in crime. According to the FBI, 4,379 blacks were arrested for murder last year, while 3,799 whites were arrested for murder – even though census numbers show there are six times more whites than blacks in the United States.

But as Ramsey said, crime statistics are no excuse for police bias.

“Protest. But protest peacefully. Have your voices be heard.”

And now a grand jury in Ferguson and federal prosecutors are separately looking into whether that type of bias led to Brown’s death.

It’s unclear whether the facts of the case will lead to any prosecution. Indeed, it seems few pieces of evidence are without dispute.

The day after the encounter that resulted in Brown’s death, St. Louis County Police Chief Jon Belmar told reporters that Brown “physically assaulted” Wilson inside his police car and that “there was a struggle over the officer’s weapon.” At least one shot was fired inside the car, but the fatal shot was fired when both Wilson and Brown were outside the car, according to Belmar. At least one witness said Brown was shot “with his arms up in the air,” while the police claim Wilson fired because Brown was advancing towards him.

PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.

Jeff Roberson/AP Photo
PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.

Pressed in September to acknowledge that the Justice Department’s own civil rights investigation may not result in charges, outgoing Attorney General Eric Holder would only say that “at the end of the day, it’s most important that we get it right.”

As for what’s ahead in Ferguson and communities across the country, Ramsey offered this piece of advice: “Protest. But protest peacefully. Have your voices be heard.”

http://abcnews.go.com/Politics/fbi-warns-ferguson-decision-lead-violence-extremist-protesters/story?id=26980624

The Wonderful American World of Informers and Agents Provocateurs


A New York City police officer near the New York Stock Exchange, Wednesday, July 11, 2012, in New York. (AP Photo/Frank Franklin II)

This article originally appeared at TomDispatch.com. To stay on top of important articles like these, sign up to receive the latest updates from TomDispatch.com.

Only Martians, by now, are unaware of the phone and online data scooped up by the National Security Agency (though if it turns out that they are aware, the NSA has surely picked up their signals and crunched their metadata). American high-tech surveillance is not, however, the only kind around. There’s also the lower tech, up-close-and-personal kind that involves informers and sometimes government-instigated violence.

Just how much of this is going on and in how coordinated a way no one out here in the spied-upon world knows. The lower-tech stuff gets reported, if at all, only one singular, isolated event at a time—look over here, look over there, now you see it, now you don’t. What is known about such surveillance as well as the suborning of illegal acts by government agencies, including the FBI, in the name of counterterrorism has not been put together by major news organizations in a way that would give us an overview of the phenomenon. (TheACLU has done by far the best job of compiling reports on this sort of spying on Americans.)

Some intriguing bits about informers and agents provocateurs briefly made it into the public spotlight whenOccupy Wall Street was riding high. But as always, dots need connecting. Here is a preliminary attempt to sort out some patterns behind what could be the next big story about government surveillance and provocation in America.

Two Stories From Occupy Wall Street

The first is about surveillance. The second is about provocation.

On September 17, 2011, Plan A for the New York activists who came to be known as Occupy Wall Street was to march to the territory outside the bank headquarters of JPMorgan Chase. Once there, they discovered that the block was entirely fenced in. Many activists came to believe that the police had learned their initial destination from e-mail circulating beforehand. Whereupon they headed for nearby Zuccotti Park and a movement was born.

The evening before May Day 2012, a rump Occupy groupmarched out of San Francisco’s Dolores Park and into the Mission District, a neighborhood where not so many 1 percenters live, work or shop. There, they proceeded to trash “mom and pop shops, local boutiques and businesses, and cars,” according to Scott Rossi, a medic and eyewitness, who summed his feelings up this way afterward: “We were hijacked.” The people “leading the march tonight,” he added, were

clean cut, athletic, commanding, gravitas not borne of charisma but of testosterone and intimidation. They were decked out in outfits typically attributed to those in the “black bloc” spectrum of tactics, yet their clothes were too new, and something was just off about them. They were very combative and nearly physically violent with the livestreamers on site, and got ignorant with me, a medic, when I intervened.… I didn’t recognize any of these people. Their eyes were too angry, their mouths were too severe. They felt “military” if that makes sense. Something just wasn’t right about them on too many levels.

He was quick to add, “I’m not one of those tin foil hat conspiracy theorists. I don’t subscribe to those theories that Queen Elizabeth’s Reptilian slave driver masters run the Fed. I’ve read up on agents provocateurs and plants and that sort of thing and I have to say that, without a doubt, I believe 100 percent that the people that started tonight’s events in the Mission were exactly that.”

Taken aback, Occupy San Francisco condemned the sideshow: “We consider these acts of vandalism and violence a brutal assault on our community and the 99%.”

Where does such vandalism and violence come from? We don’t know. There are actual activists who believe that they are doing good this way; and there are government infiltrators; and then there are double agents who don’t know who they work for, ultimately, but like smashing things or blowing them up. By definition, masked trashers of windows in Oakland or elsewhere are anonymous. In anonymity, they—and the burners of flags and setters of bombs—magnify their power. They hijack the media spotlight. In this way, tiny groups—incendiary, sincere, fraudulent, whoever they are—seize levers that can move the entire world.

The Sting of the Clueless Bee

Who casts the first stone? Who smashes the first window? Who teaches bombers to build and plant actual or spurious bombs? The history of the secret police planting agents provocateurs in popular movements goes back at least to nineteenth-century France and twentieth-century Russia. In 1905, for example, the priest who led the St. Petersburg’s revolution was some sort of double agent, as was the man who organized the assassination of the czar’s uncle, the grand duke. As it happens, the United States has its own surprisingly full history of such planted agents at work turning small groups or movements in directions that, for better or far more often worse, they weren’t planning on going. One well-documented case is that of “Tommy the Traveler,” a Students for a Democratic Society (SDS) organizer who after years of trying to arouse violent action convinced two 19-year-old students to firebomb an ROTC headquarters at Hobart College in upstate New York. The writer John Schultz reported onlikely provocateurs in Chicago during the Democratic National Convention of 1968. How much of this sort of thing went on? Who knows? Many relevant documents molded in unopened archives, or have been heavily redacted or destroyed.

As the Boston marathon bombing illustrates, there are homegrown terrorists capable of producing the weapons they need and killing Americans without the slightest help from the US government. But historically, it’s surprising how relatively often the gendarme is also a ringleader. Just how often is hard to know, since information on the subject is fiendishly hard to pry loose from the secret world.

Through 2011, 508 defendants in the United States were prosecuted in what the Department of Justice calls “terrorism-related cases.” According to Mother Jones’s Trevor Aaronson, the FBI ran sting operations that “resulted in prosecutions against 158 defendants”—about one-third of the total. “Of that total, forty-nine defendants participated in plots led by an agent provocateur—an FBI operative instigating terrorist action. With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings.”

In Cleveland, on May Day of 2012, in the words of a Rolling Stone exposé, the FBI “turned five stoner misfits into the world’s most hapless terrorist cell.” To do this, the FBI put a deeply indebted, convicted bank robber and bad-check passer on its payroll, and hooked him up with an arms dealer, also paid by the bureau. The FBI undercover man then hustled five wacked-out wannabe anarchists into procuring what they thought was enough C4 plastic explosive to build bombs they thought would blow up a bridge. The bombs were, of course, dummies. The five were arrested and await trial.

What do such cases mean? What is the FBI up to? Trevor Aaronson offers this appraisal:

The FBI’s goal is to create a hostile environment for terrorist recruiters and operators—by raising the risk of even the smallest step toward violent action. It’s a form of deterrence.… Advocates insist it has been effective, noting that there hasn’t been a successful large-scale attack against the United States since 9/11. But what can’t be answered—as many former and current FBI agents acknowledge—is how many of the bureau’s targets would have taken the step over the line at all, were it not for an informant.

Perhaps Aaronson is a bit too generous. The FBI may, at times, be anything but thoughtful in its provocations. It may, in fact, be flatly dopey. COINTELPRO records released since the 1960s under the Freedom of Information Act (FOIA) show that it took FBI Director J. Edgar Hoover until 1968 to discover that there was such a thing as a New Left that might be of interest. Between 1960 and 1968, as the New Left was becoming a formidable force in its own right, the bureau’s top officials seem to have thought that groups like Students for a Democratic Society were simply covers for the Communist Party, which was like mistaking the fleas for the dog. We have been assured that the FBI of today has learned something since the days of J. Edgar Hoover. But of ignorance and stupidity there is no end.

Trivial and Nontrivial Pursuits

Entrapment and instigation to commit crimes are in themselves genuine dangers to American liberties, even when the liberties are those of the reckless and wild. But there is another danger to such pursuits: the attention the authorities pay to nonexistent threats (or the creation of such threats) is attention not paid to actual threats.

Anyone concerned about the security of Americans should cast a suspicious eye on the allocation or simply squandering of resources on wild goose chases. Consider some particulars which have recently come to light. Under the Freedom of Information Act, thePartnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups—during the very time that they were missing actual warnings about actual terrorist actions.

From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places. In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’ ”

Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center, one of seventy-seven coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily. As the investigative journalist Michael Isikoff recently reported, it was not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’ ”

It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber. That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either. The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of… Code Pink and Veterans for Peace.

Public Agencies and the “Private Sector”

So we know that Boston’s master coordinators—its Committee on Public Safety, you might say—were worried about constitutionally protected activity, including its consequences for “commercial and financial sector assets.” Unsurprisingly, the feds worked closely with Wall Street even before the settling of Zuccotti Park. More surprisingly, in Alaska, Alabama, Florida, Mississippi, Tennessee and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations—and vice versa.

Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.” Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.” Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:

• “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”

• “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to…[twenty-two] campus police officials.… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”

• An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on November 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services reported to DSAC on the relationship between OWS and organized labor.”

• DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” It advised corporate employees to dress conservatively, avoid political discussions and “avoid all large gatherings related to civil issues. Even seemingly peaceful rallies can spur violent activity or be met with resistance by security forces.”

• The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.

• In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.” Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’ ”

Sometimes, “intelligence” moves in the opposite direction—from private corporations to public agencies. Among the collectors of such “intelligence” are entities that, like the various intelligence and law enforcement outfits, do not make distinctions between terrorists and nonviolent protesters. Consider TransCanada, the corporation that plans to build the 1,179-mile Keystone-XL tar sands pipeline across the US and in the process realize its “vision to become the leading energy infrastructure company in North America.“ The anti-pipeline group Bold Nebraska filed a successful Freedom of Information Act request with the Nebraska State Patrol and so was able to put TransCanada’s briefing slideshow up online.

So it can be documented in living color that the company lectured federal agents and local police to look into the use of “anti-terrorism statutes” against peaceful anti-Keystone activists. TransCanada showed slides that cited as sinister the “attendance” of Bold Nebraska members at public events, noting “Suspicious Vehicles/Photography.” TransCanada alerted the authorities that Nebraska protesters were guilty of “aggressive/abusive behavior,” citing a local anti-pipeline group that, they said, committed a “slap on the shoulder” at the Merrick County Board Meeting (possessor of said shoulder unspecified). They fingered nonviolent activists by name and photo, paying them the tribute of calling them “’Professionals’ & Organized.” Native News Network pointed out that “although TransCanada’s presentation to authorities contains information about property destruction, sabotage, and booby traps, police in Texas and Oklahoma have never alleged, accused, or charged Tar Sands Blockade activists of any such behaviors.”

Centers for Fusion, Diffusion and Confusion

After September 11, 2001, government agencies at all levels, suddenly eager to break down information barriers and connect the sort of dots that had gone massively unconnected before the Al Qaeda attacks, used Department of Homeland Security funds to start “fusion centers.” These are supposed to coordinate anti-terrorist intelligence gathering and analysis. They are also supposed to “fuse” intelligence reports from federal, state and local authorities, as well as private companies that conduct intelligence operations. According to the ACLU, at least seventy-seven fusion centers currently receive federal funds.

Much is not known about these centers, including just who runs them, by what rules and which public and private entities are among the fused. There is nothing public about most of them. However, some things are known about a few. Several fusion center reports that have gone public illustrate a remarkably slapdash approach to what constitutes “terrorist danger” and just what kinds of data are considered relevant for law enforcement. In 2010, the American Civil Liberties Union of Tennessee learned, for instance, that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents. The letter encourages schools to be supportive of all religious beliefs during the holiday season.” (The map is no longer online.)

So far, the prize for pure fused wordiness goes to a 215-page manual issued in 2009 by theVirginia Fusion Center (VFC), filled with Keystone Kop–style passages among pages that in their intrusive sweep are anything but funny. The VFC warned, for instance, that “the Garbage Liberation Front (GLF) is an ecological direct action group that demonstrates the joining of anarchism and environmental movements.” Among GLF’s dangerous activities well worth the watching, the VFC included “dumpster diving, squatting, and train hopping.”

In a similarly jaw-dropping manner, the manual claimed—the italics are mine—that “Katuah Earth First (KEF), based in Asheville, North Carolina, sends activists throughout the region to train and engage in criminal activity. KEF has trained local environmentalists in non-violent tactics, including blocking roads and leading demonstrations, at action camps in Virginia.While KEF has been primarily involved in protests and university outreach, members have also engaged in vandalism.” Vandalism! Send out an APB!

The VFC also warned that, “although the anarchist threat to Virginia is assessed as low, these individuals view the government as unnecessary, which could lead to threats or attacks against government figures or establishments.” It singled out the following 2008 incidents as worth notice:

• At the Martinsville Speedway, “A temporary employee called in a bomb threat during a Sprint Cup race…because he was tired of picking up trash and wanted to go home.”

• In Missouri, “a mobile security team observed an individual photographing an unspecified oil refinery.… The person abruptly left the scene before he could be questioned.”

• Somewhere in Virginia, “seven passengers aboard a white pontoon boat dressed in traditional Middle Eastern garments immediately sped away after being sighted in the recreational area, which is in close proximity to” a power plant.

What idiot or idiots wrote this script?

Given a disturbing lack of evidence of terrorist actions undertaken or in prospect, the authors even warned:

It is likely that potential incidents of interest are occurring, but that such incidents are either not recognized by initial responders or simply not reported. The lack of detailed information for Virginia instances of monitored trends should not be construed to represent a lack of occurrence.

Lest it be thought that Virginia stands alone and shivering on the summit of bureaucratic stupidity, consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the antiwar movement, a former US Congresswoman, the US Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’ ”

And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies. According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’ ” The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’ ”

Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”

One of these investigations concerned Greenpeace protests planned for ExxonMobil shareholder meetings. (Note: I was on Greenpeace’s board of directors during three of those years.) The inquiry was kept open “for over three years, long past the shareholder meetings that the subjects were supposedly planning to disrupt.” The FBI put the names of Greenpeace members on its federal watch list. Around the same time, an ExxonMobil-funded lobby got the IRS to audit Greenpeace.

This counterintelligence archipelago of malfeasance and stupidity is sometimes fused with ass-covering fabrication. In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department inspector general’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects. The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.

The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor. He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.

The sequel was not quite so droll. The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.

Moreover, at least one fusion center has involved military intelligence in civilian law enforcement. In 2009, a military operative from Fort Lewis, Washington, worked undercovercollecting information on peace groups in the Northwest. In fact, he helped run the Port Militarization Resistance group’s Listserv. Once uncovered, he told activists there were others doing similar work in the Army. How much the military spies on American citizens is unknown and, at the moment at least, unknowable.

Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos—I have some in my own heavily redacted files obtained through an FOIA request—were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case. During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to “Military Surveillance of Civilian Politics, 1967–70,” an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews. They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”

Years later, I met one of these agents, now retired, in San Francisco. He knew more about what I was doing in the late 1960s than my mother did.

Squaring Circles

In 2009, President Obama told the graduating class at the Naval Academy that, “as Americans, we reject the false choice between our security and our ideals.” Security and ideals: officially we want both. But how do you square circles, especially in a world in which “security” has often enough become a stand-in for whatever intelligence operatives decide to do?

Please support our journalism. Get a digital subscription for just $9.50!

The ACLU’s Tennessee office sums the situation up nicely: “While the ostensible purpose of fusion centers, to improve sharing of anti-terrorism intelligence among different levels and arms of government, is legitimate and important, using the centers to monitor protected First Amendment activity clearly crosses the line.” Nationally, the ACLU rightly worries about who is in charge of fusion centers and by what rules they operate, about what becomes of privacy when private corporations are inserted into the intelligence process, about what the military is doing meddling in civilian law enforcement, about data-mining operations that Federal guidelines encourage, and about the secrecy walls behind which the fusion centers operate.

Even when fusion centers do their best to square that circle in their own guidelines, like the ones obtained by the ACLU from Massachusetts’s Commonwealth Fusion Center (CFC), the knots in which they tie themselves are all over the page. Imagine, then, what happens when you let informers or agents provocateurs loose in actual undercover situations.

“Undercovers,” writes the Massachusetts CFC, “may not seek to gain access to private meetings and should not actively participate in meetings.… At the preliminary inquiry stage, sources and informants should not be used to cultivate relationships with persons and groups that are the subject of the preliminary inquiry.” So far so good. Then, it adds, “Investigators may, however, interview, obtain, and accept information known to sources and informants.” By eavesdropping, say? Collecting trash? Hacking? All without warrants? Without probable cause?

“Undercovers and informants,” the guidelines continue, “are strictly prohibited from engaging in any conduct the sole purpose of which is to disrupt the lawful exercise of political activity, from disrupting the lawful operations of an organization, from sowing seeds of distrust between members of an organization involved in lawful activity, or from instigating unlawful acts or engaging in unlawful or unauthorized investigative activities.” Now, go back and note that little, easy-to-miss word “sole.” Who knows just what grim circles that tiny word squares?

The Massachusetts CFC at least addresses the issue of entrapment: “Undercovers should not become so involved in a group that they are participating in directing the operations of a group, either by accepting a formal position in the hierarchy or by informally establishing the group’s policy and priorities. This does not mean an undercover cannot support a group’s policies and priorities; rather an undercover should not become a driving force behind a group’s unlawful activities.” Did Cleveland’s fusion center have such guidelines? Did they follow them? Do other state fusion centers? We don’t know.

Whatever the fog of surveillance, when it comes to informers, agents provocateurs, and similar matters, four things are clear enough:

• Terrorist plots arise, in the United States as elsewhere, with the intent of committing murder and mayhem. Since 2001, in the US, these have been almost exclusively the work of freelance Islamist ideologues like the Tsarnaev brothers of Boston. None have been connected in any meaningful way with any legitimate organization or movement.

• Government surveillance may in some cases have been helpful in scotching such plots, but there is no evidence that it has been essential.

• Even based on the limited information available to us, since September 11, 2001, the net of surveillance has been thrown wide indeed. Tabs have been kept on members of quite a range of suspect populations, including American Muslims, anarchists, and environmentalists, among others—in situation after situation where there was no probable cause to suspect preparations for a crime.

• At least on occasion—we have no way of knowing how often—agents provocateurs on government payrolls have spurred violence.

How much official unintelligence is at work? How many demonstrations are being poked and prodded by undercover agents? How many acts of violence are being suborned? It would be foolish to say we know. At least equally foolish would be to trust the authorities to keep to honest-to-goodness police work when they are so mightily tempted to take the low road into straight-out, unwarranted espionage and instigation.

http://www.thenation.com/article/175005/wonderful-american-world-informers-and-agents-provocateurs#

 

COINTELPRO

COINTELPRO (an acronym for COunter INTELligence PROgram) was a series of covert, and at times illegal,[1][2] projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveying, infiltrating, discrediting, and disrupting domestic political organizations.[3] National Security Agency operation Project MINARET targeted the personal communications of leading Americans who criticized the Vietnam War, including Senators (e.g., Frank Church and Howard Baker), civil rights leaders, journalists, and athletes.[4][5]

The official COINTELPRO label took place between 1956 and 1971.[6][7] The FBI’s stated motivation was “protecting national security, preventing violence, and maintaining the existing social and political order.”[8]

FBI records show that 85% of COINTELPRO resources targeted groups and individuals that the FBI deemed “subversive”,[9]including communist and socialist organizations; organizations and individuals associated with the Civil Rights Movement, including Rev. Dr. Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, theNational Association for the Advancement of Colored People, and the Congress of Racial Equality and other civil rights organizations; black nationalist groups; the Young Lords; the Rainbow Coalition; the American Indian Movement; a broad range of organizations labeled “New Left“, including Students for a Democratic Society and the Weathermen; almost all groupsprotesting the Vietnam War, as well as individual student demonstrators with no group affiliation; the National Lawyers Guild; organizations and individuals associated with the women’s rights movement; nationalist groups such as those seeking independence for Puerto Rico, United Ireland, and Cuban exile movements including Orlando Bosch‘s Cuban Power and theCuban Nationalist Movement; and additional notable Americans (for example, Albert Einstein, who was a socialist and a member of several civil rights groups, came under FBI surveillance during the years just before COINTELPRO’s official inauguration).[10] The remaining 15% of COINTELPRO resources were expended to marginalize and subvert white supremist hate groups, including the Ku Klux Klan and the National States’ Rights Party.[11]

FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and their leaders.[12][13] Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.[14] Attorney General Robert F. Kennedy personally authorized some of these programs.[15] Kennedy would later learn that he also had been a target of FBI surveillance.[citation needed]

History

The FBI engaged in the political repression of “communism” almost from the time of the agency’s inception in 1908, at a time of widespread social disruption due to anarchists and labor movements. Beginning in the 1930s, antecedents to COINTELPRO operated during the Franklin D. Roosevelt and Harry S. Trumanadministrations. Centralized operations under COINTELPRO officially began in August 1956 with a program designed to “increase factionalism, cause disruption and win defections” inside the Communist Party U.S.A. (CPUSA). Tactics included anonymous phone calls, IRS audits, and the creation of documents that would divide American communists internally.[16] An October 1956 memo from Hoover reclassified the FBI’s ongoing surveillance of black leaders, including it within COINTELPRO, with the justification that the movement was infiltrated by communists.[17] In 1956, Hoover sent an open letter denouncing Dr. T.R.M. Howard, a civil rights leader, surgeon, and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders of George W. Lee, Emmett Till, and other blacks in the South.[18] When the Southern Christian Leadership Conference (SCLC) was founded in 1957, the FBI began to monitor and target the group almost immediately, focusing particularly on Bayard Rustin, Stanley Levison, and, eventually, Rev. Martin Luther King, Jr.[19]

After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote:

In the light of King’s powerful demagogic speech. … We must mark him now, if we have not done so before, as the most dangerous Negro of the future in this nation from the standpoint of communism, the Negro, and national security.[20]

Soon after, the FBI was systematically bugging King’s home and his hotel rooms.[21]

In the mid-1960s, King began publicly criticizing the Bureau for giving insufficient attention to the use of terrorism by white supremacists. Hoover responded by publicly calling King the most “notorious liar” in the United States.[22] In his 1991 memoir, Washington Post journalist Carl Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to commit suicide.[23] Historian Taylor Branch documents an anonymous November 21, 1964 “suicide package” sent by the FBI that contained audio recordings of King’s sexual indiscretions combined with a letter telling him “There is only one way out for you. You better take it before your filthy, abnormal, fraudulent self is bared to the nation.”[24]

During the same period the program also targeted Malcolm X. While an FBI spokesman has denied that the FBI was “directly” involved in Malcolm’s murder, it is documented that the Bureau fostered the violent schism between Malcolm and the Nation of Islam that led to the black leader’s death. The FBI heavily infiltrated Malcolm’s Organization of Afro-American Unity in the final month’s of his life. The Pulitzer Prize-winning biography of Malcolm X by Manning Marable asserts that most of the men who plotted Malcolm’s assassination were never apprehended and that the full extent of the FBI’s involvement in his death cannot be known.[25] [26]

Amidst the urban unrest of July–August 1967, the FBI began “COINTELPRO–BLACK HATE”, which focused on King and the SCLC as well as the Student Nonviolent Coordinating Committee (SNCC), the Revolutionary Action Movement (RAM), the Deacons for Defense and Justice, Congress of Racial Equality (CORE), and theNation of Islam.[27] BLACK HATE established the Ghetto Informant Program and instructed 23 FBI offices to “disrupt, misdirect, discredit, or otherwise neutralize the activities of black nationalist hate type organizations”.[28]

A March 1968 memo stated the programs goal was to “prevent the coalition of militant black nationalist groups” ; to “Prevent the RISE OF A ‘MESSIAH’ who could unify…the militant black nationalist movement” ; “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence [against authorities].” ; to “Prevent militant black nationalist groups and leaders from gaining RESPECTABILITY, by discrediting them to…both the responsible community and to liberals who have vestiges of sympathy…”; and to “prevent the long-range GROWTH of militant black organizations, especially among youth.” Dr. King was said to have potential to be the “messiah” figure, should he abandon nonviolence and integrationism;[29] Stokely Carmichael was noted to have “the necessary charisma to be a real threat in this way.” [30]

This program coincided with a broader federal effort to prepare military responses for urban riots, and began increased collaboration between the FBI, Central Intelligence Agency, National Security Agency, and the Department of Defense. The CIA launched its own domestic espionage project in 1967 called Operation CHAOS. [31] A particular target was the Poor People’s Campaign, a national effort organized by King and the SCLC to occupy Washington, D.C. The FBI monitored and disrupted the campaign on a national level, while using targeted smear tactics locally to undermine support for the march.[32]

COINTELPRO–NEW LEFT was created in April 1968, in the wake of Martin Luther King, Jr.‘s assassination in Memphis and mass student protests at Columbia University.[33]

Overall, COINTELPRO encompassed disruption and sabotage of the Socialist Workers Party (1961), the Ku Klux Klan (1964), the Nation of Islam, the Black Panther Party (1967), and the entire New Left social/political movement, which included antiwar, community, and religious groups (1968). A later investigation by the Senate’sChurch Committee (see below) stated that “COINTELPRO began in 1956, in part because of frustration with Supreme Court rulings limiting the Government’s power to proceed overtly against dissident groups …”[34] Official congressional committees and several court cases[35] have concluded that COINTELPRO operations against communist and socialist groups exceeded statutory limits on FBI activity and violated constitutional guarantees of freedom of speech and association.[1]

Program exposed

The building broken into by the Citizen’s Commission to Investigate the FBI, at One Veterans Square, Media, Pennsylvania

The program was successfully kept secret until 1971, when the Citizens’ Commission to Investigate the FBI burglarized an FBI field office in Media, Pennsylvania, took several dossiers, and exposed the program by passing this material to news agencies. Many news organizations initially refused to publish the information. Within the year, Director J. Edgar Hooverdeclared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled on a case-by-case basis.[36][37]

Additional documents were revealed in the course of separate lawsuits filed against the FBI by NBC correspondent Carl Stern, the Socialist Workers Party, and a number of other groups. In 1976 the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the United States Senate, commonly referred to as the “Church Committee” for its chairman, Senator Frank Church of Idaho, launched a major investigation of the FBI and COINTELPRO. Journalists and historians speculate that the government has not released many dossier and documents related to the program. Many released documents have been partly, or entirely, redacted.

Since the conclusion of centralized COINTELPRO operations in 1971, FBI counterintelligence operations have been handled on a “case-by-case basis”; however allegations of improper political repression continue.[38][39]

The Final Report of the Select Committee castigated conduct of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:

The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law.[1] Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that … the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.[34]

The Church Committee documented a history of the FBI exercising political repression as far back as World War I, through the 1920s, when agents were charged with rounding up “anarchists, communists, socialists, reformists and revolutionaries” for deportation. The domestic operations were increased against political and anti-war groups from 1936 through 1976.

Intended effects

The intended effect of the FBI’s COINTELPRO was to “expose, disrupt, misdirect, or otherwise neutralize” groups that the FBI officials believed were “subversive”[40] by instructing FBI field operatives to:[41]

  1. create a negative public image for target groups (e.g. by surveilling activists, and releasing negative personal information to the public)
  2. break down internal organization
  3. create dissension between groups
  4. restrict access to public resources
  5. restrict the ability to organize protests
  6. restrict the ability of individuals to participate in group activities

Range of targets

The main target was the Communist Party.[42]

According to the Church Committee:

While the declared purposes of these programs were to protect the “national security” or prevent violence, Bureau witnesses admit that many of the targets were nonviolent and most had no connections with a foreign power. Indeed, nonviolent organizations and individuals were targeted because the Bureau believed they represented a “potential” for violence—and nonviolent citizens who were against the war in Vietnam were targeted because they gave “aid and comfort” to violent demonstrators by lending respectability to their cause.

The imprecision of the targeting is demonstrated by the inability of the Bureau to define the subjects of the programs. The Black Nationalist program, according to its supervisor, included “a great number of organizations that you might not today characterize as black nationalist but which were in fact primarily black.” Thus, the nonviolent Southern Christian Leadership Conference was labeled as a Black Nationalist-“Hate Group.”

Furthermore, the actual targets were chosen from a far broader group than the titles of the programs would imply. The CPUSA program targeted not only Communist Party members but also sponsors of the National Committee to Abolish the House Un-American Activities Committee and civil rights leaders allegedly under Communist influence or deemed to be not sufficiently “anti-Communist”. The Socialist Workers Party program included non-SWP sponsors of anti-war demonstrations which were cosponsored by the SWP or the Young Socialist Alliance, its youth group. The Black Nationalist program targeted a range of organizations from the Panthers to SNCC to the peaceful Southern Christian Leadership Conference, and included every Black Student Union and many other black student groups. New Left targets ranged from the SDS to the InterUniversity Committee for Debate on Foreign Policy, from Antioch College (“vanguard of the New Left”) to the New Mexico Free University and other “alternate” schools, and from underground newspapers to students’ protesting university censorship of a student publication by carrying signs with four-letter words on them.

Examples of surveillance, spanning all presidents from FDR to Nixon, both legal and illegal, contained in the Church Committee report:[43]

  • President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his “national defense” policy and supporting Col. Charles Lindbergh.
  • President Truman received inside information on a former Roosevelt aide’s efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists.
  • President Eisenhower received reports on purely political and social contacts with foreign officials by Bernard Baruch, Eleanor Roosevelt, and Supreme Court Justice William O. Douglas.
  • The Kennedy administration had the FBI wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm. US Attorney General Robert F. Kennedy received the fruits of an FBI wire tap on Martin Luther King, Jr. and an electronic listening device targeting a congressman, both of which yielded information of a political nature.
  • President Johnson asked the FBI to conduct “name checks” of his critics and members of the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the 1964 Democratic Conventionfrom FBI electronic surveillance.
  • President Nixon authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a Supreme Court Justice.

The COINTELPRO documents show numerous cases of the FBI’s intentions to prevent and disrupt protests against the Vietnam War. Many techniques were used to accomplish this task. “These included promoting splits among antiwar forces, encouraging red-baiting of socialists, and pushing violent confrontations as an alternative to massive, peaceful demonstrations.” One 1966 COINTELPRO operation tried to redirect the Socialist Workers Party from their pledge of support for the antiwar movement.[44]

The FBI claims that it no longer undertakes COINTELPRO or COINTELPRO-like operations. However, critics have claimed that agency programs in the spirit of COINTELPRO targeted groups such as the Committee in Solidarity with the People of El Salvador,[45] the American Indian Movement,[6][46] Earth First!,[47] the White Separatist Movement,[48] and the Anti-Globalization Movement.[citation needed]

Methods

Body of Fred Hampton, national spokesman for the Black Panther Party, who was killed by members of the Chicago Police Department, as part of a COINTELPRO operation.[49][50][7][51]

According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:

  1. Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.
  2. Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketingto create suspicion about targeted activists, sometimes with lethal consequences.[52]
  3. Legal harassment: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.[49]
  4. Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break-ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations.[49][50][7][53] The object was to frighten or eliminate dissidents and disrupt their movements.

The FBI specifically developed tactics intended to heighten tension and hostility between various factions in the black militancy movement, for example between the Black Panthers, the US Organization, and the Blackstone Rangers. This resulted in numerous deaths, among which were San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.[49]

The FBI also conspired with the police departments of many U.S. cities (San Diego, Los Angeles, San Francisco, Oakland, Philadelphia, Chicago) to encourage repeated raids on Black Panther homes—often with little or no evidence of violations of federal, state, or local laws—which resulted directly in the police killing many members of the Black Panther Party, most notably Chicago Black Panther Party Chairman Fred Hampton on December 4, 1969.[49][50][7][54]

In order to eliminate black militant leaders whom they considered dangerous, the FBI is believed to have worked with local police departments to target specific individuals,[55] accuse them of crimes they did not commit, suppress exculpatory evidence and falsely incarcerate them.[citation needed] Elmer “Geronimo” Pratt, a Black Panther Party leader, was incarcerated for 27 years before a California Superior Court vacated his murder conviction, ultimately freeing him. Appearing before the court, an FBI agent testified that he believed Pratt had been framed, because both the FBI and the Los Angeles Police Department knew he had not been in the area at the time the murder occurred.[56][57]

Some sources claim that the FBI conducted more than 200 “black bag jobs“,[58][59] which were warrantless surreptitious entries, against the targeted groups and their members.[60]

J. Edgar Hoover

In 1969 the FBI special agent in San Francisco wrote Hoover that his investigation of the Black Panther Party (BPP) had concluded that in his city, at least, the Panthers were primarily engaged in feeding breakfast to children. Hoover fired back a memo implying the agent’s career goals would be directly affected by his supplying evidence to support Hoover’s view that the BPP was “a violence-prone organization seeking to overthrow the Government by revolutionary means”.[61]

Hoover supported using false claims to attack his political enemies. In one memo he wrote: “Purpose of counterintelligence action is to disrupt the BPP and it is immaterial whether facts exist to substantiate the charge.”[62]

In one particularly controversial 1965 incident, white civil rights worker Viola Liuzzo was murdered by Ku Klux Klansmen, who gave chase and fired shots into her car after noticing that her passenger was a young black man; one of the Klansmen was Gary Thomas Rowe, an acknowledged FBI informant.[63][64] The FBI spread rumors that Liuzzo was a member of theCommunist Party and had abandoned her children to have sexual relationships with African Americans involved in the Civil Rights Movement.[65][66] FBI records show that J. Edgar Hoover personally communicated these insinuations to President Johnson.[67][68] FBI informant Rowe has also been implicated in some of the most violent crimes of the 1960s civil rights era, including attacks on the Freedom Riders and the 1963 Birmingham, Alabama 16th Street Baptist Church bombing.[63]According to Noam Chomsky, in another instance in San Diego, the FBI financed, armed, and controlled an extreme right-wing group of former Minutemen, transforming it into a group called the Secret Army Organization that targeted groups, activists, and leaders involved in the Anti-War Movement, using both intimidation and violent acts.[69][70][71]

Hoover ordered preemptive action “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence.”[12]

Illegal surveillance

The final report of the Church Committee concluded:

Too many people have been spied upon by too many Government agencies and too much information has been illegally collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret and bias informants, but also using other intrusive techniques such as wiretaps, microphone “bugs”, surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous—and even of groups suspected of associating with potentially dangerous organizations—have continued for decades, despite the fact that those groups did not engage in unlawful activity.

Groups and individuals have been assaulted, repressed, harassed and disrupted because of their political views,social believes and their lifestyles. Investigations have been based upon vague standards whose breadth made excessive collection inevitable. Unsavory, harmful and vicious tactics have been employed—including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths. Intelligence agencies have served the political and personal objectives of presidents and other high officials. While the agencies often committed excesses in response to pressure from high officials in the Executive branch and Congress, they also occasionally initiated improper activities and then concealed them from officials whom they had a duty to inform.

Governmental officials—including those whose principal duty is to enforce the law—have violated or ignored the law over long periods of time and have advocated and defended their right to break the law.

The Constitutional system of checks and balances has not adequately controlled intelligence activities. Until recently the Executive branch has neither delineated the scope of permissible activities nor established procedures for supervising intelligence agencies. Congress has failed to exercise sufficient oversight, seldom questioning the use to which its appropriations were being put. Most domestic intelligence issues have not reached the courts, and in those cases when they have reached the courts, the judiciary has been reluctant to grapple with them.[72][73]

Post-COINTELPRO operations

While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI actions indicate that post-COINTELPRO reforms did not succeed in ending COINTELPRO tactics.[74][75][76] Documents released under the FOIA show that the FBI tracked the late David Halberstam—a Pulitzer Prize-winning journalist and author—for more than two decades.[77][78] In 1978, then-acting FBI Director William H. Webster indicated that, by 1976, most of the program’s resources has been rerouted.[79][better source needed]

“Counterterrorism” guidelines implemented during the Reagan administration have been described as allowing a return to COINTELPRO tactics.[80][pages needed] Some radical groups accuse factional opponents of being FBI informants or assume the FBI is infiltrating the movement.[81]

According to a report by the Inspector General (IG) of the U.S. Department of Justice, the FBI improperly opened investigations of American activist groups, even though they were planning nothing more than peaceful protests and civil disobedience. The review by the inspector general was launched in response to complaints by civil liberties groups and members of Congress. The FBI improperly monitored groups including the Thomas Merton Center, a Pittsburgh-based peace group; People for the Ethical Treatment of Animals (PETA); and Greenpeace USA, an environmental activism organization. Also, activists affiliated with Greenpeace were improperly put on a terrorist watch list, although they were planning no violence or illegal activities.

The IG report found these “troubling” FBI practices between 2001 and 2006. In some cases, the FBI conducted investigations of people affiliated with activist groups for “factually weak” reasons. Also, the FBI extended investigations of some of the groups “without adequate basis” and improperly kept information about activist groups in its files. The IG report also found that FBI Director Robert Mueller III provided inaccurate congressional testimony about one of the investigations, but this inaccuracy may have been due to his relying on what FBI officials told him.[82]

Several authors have accused the FBI of continuing to deploy COINTELPRO-like tactics against radical groups after the official COINTELPRO operations were ended. Several authors have suggested the American Indian Movement (AIM) has been a target of such disturbing operations.

Authors such as Ward Churchill, Rex Weyler, and Peter Matthiessen allege that the federal government intended to acquire uranium deposits on the Lakota tribe’s reservation land, and that this motivated a larger government conspiracy against AIM activists on the Pine Ridge reservation.[6][46][83][84][85] Others believe COINTELPRO continues and similar actions are being taken against activist groups.[85][86][87] Caroline Woidat says that, with respect to Native Americans, COINTELPRO should be understood within a historical context in which “Native Americans have been viewed and have viewed the world themselves through the lens of conspiracy theory.”[88] Other authors note that while some conspiracy theories related to COINTELPRO are unfounded, the issue of ongoing government surveillance and repression is real.[39][89]

See also

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 369-373

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Stephen King — Hearts in Atlantis — Videos

Posted on November 16, 2014. Filed under: Blogroll, Books, Communications, Culture, Documentary, Entertainment, Fiction, Films, Life, media, Movies, Music, Music, People, Photos, Video, War, Wisdom, Writing | Tags: , , , , , , |

book_coverHearts-in-Atlantishearts in atlantishearts-in-atlantis-posterMCDHEIN EC035heartsinatlantis04bob_momjpg06tedMCDHEIN EC033hearts_can breakbobby and carol 22901.tif

hearts in atlantis

Hearts In Atlantis (HD) Trailer

Hearts in Atlantis – kiss scene

Hearts In Atlantis (Warner Bros)

Hearts In Atlantis – Kids and Ted scene

Hearts in Atlantis – Bully meets Hannibal

Hearts in Atlantis Ted and Carol

Hearts in Atlantis – 1 – a friend is dead …

Heart In Atlantis Soundtrack “Summer Vacation”

A Conversation With Stephen King (1:38:42)

Stephen King’s “Hearts In Atlantis” Book Review

OMA Reviews Hearts in Atlantis

Hearts in Atlantis By: Stephen King a review

The Platters “Twilight Time”

[youtube-http://www.youtube.com/watch?v=zpdaga8cCxU]

“Twilight Time”

Heavenly shades of night are falling, it’s twilight time
Out of the mist your voice is calling, ’tis twilight time
When purple-colored curtains mark the end of day
I’ll hear you, my dear, at twilight timeDeepening shadows gather splendor as day is done
Fingers of night will soon surrender the setting sun
I count the moments darling till you’re here with me
Together at last at twilight timeHere, in the afterglow of day, we keep our rendezvous beneath the blue
And, in the same and sweet old way I fall in love again as I did then

Deep in the dark your kiss will thrill me like days of old
Lighting the spark of love that fills me with dreams untold
Each day I pray for evening just to be with you
Together at last at twilight time

Here, in the afterglow of day, we keep our rendezvous beneath the blue
And, in the same and sweet old way I fall in love again as I did then

Deep in the dark your kiss will thrill me like days of old
Lighting the spark of love that fills me with dreams untold
Each day I pray for evening just to be with you
Together at last at twilight time
Together at last at twilight time

Read Full Post | Make a Comment ( None so far )

Asset Price Bubble Bursts Coming In October With 69 Months of Near Zero Federal Funds Interest Rates! — Interest Rate Suppression or Price Control and Manipulation Will Blow Up Economy — Suppressing Savings and Investment With Low Interest Rates Is A Formula For Diaster and Depression — Panic Time — Start A War Over Oil — Meltdown America –Videos

Posted on September 21, 2014. Filed under: American History, Banking, Blogroll, Books, Business, College, Communications, Computers, Constitution, Crisis, Culture, Demographics, Diasters, Documentary, Economics, Education, European History, Faith, Family, Federal Government, Federal Government Budget, Films, Fiscal Policy, Food, Foreign Policy, Fraud, Freedom, Friends, Genocide, Government Land Ownership, government spending, Health Care, history, Illegal, Immigration, Inflation, Investments, IRS, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Monetary Policy, Money, Natural Gas, Non-Fiction, Obamacare, Oil, People, Philosophy, Photos, Politics, Press, Programming, Public Sector, Radio, Radio, Rants, Raves, Securities and Exchange Commission, Talk Radio, Tax Policy, Taxes, Technology, Terrorism, Unemployment, Unions, Video, War, Water, Wealth, Weapons, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014 

Pronk Pops Show 306: July 31, 2014

Pronk Pops Show 305: July 30, 2014

Pronk Pops Show 304: July 29, 2014

Pronk Pops Show 303: July 28, 2014

Pronk Pops Show 302: July 24, 2014

Pronk Pops Show 301: July 23, 2014

Pronk Pops Show 300: July 22, 2014

Pronk Pops Show 299: July 21, 2014

Pronk Pops Show 298: July 18, 2014

Pronk Pops Show 297: July 17, 2014

Pronk Pops Show 296: July 16, 2014

Pronk Pops Show 295: July 15, 2014

Pronk Pops Show 294: July 14, 2014

Pronk Pops Show 293: July 11, 2014

Pronk Pops Show 292: July 9, 2014

Pronk Pops Show 291: July 7, 2014

Pronk Pops Show 290: July 3, 2014

Pronk Pops Show 289: July 2, 2014

Pronk Pops Show 288: June 30, 2014

Pronk Pops Show 287: June 27, 2014

Pronk Pops Show 286: June 26, 2014

Pronk Pops Show 285 June 25, 2014

Pronk Pops Show 284: June 23, 2014

Pronk Pops Show 283: June 20, 2014

Pronk Pops Show 282: June 19, 2014

Pronk Pops Show 281: June 17, 2014

Pronk Pops Show 280: June 16, 2014

Pronk Pops Show 279: June 13, 2014

Pronk Pops Show 278: June 12, 2014

Pronk Pops Show 277: June 11, 2014

Pronk Pops Show 276: June 10, 2014

Pronk Pops Show 275: June 9, 2014

Pronk Pops Show 274: June 6, 2014

Pronk Pops Show 273: June 5, 2014

Pronk Pops Show 272: June 4, 2014

Pronk Pops Show 271: June 2, 2014

Story 1: Asset Price Bubble Bursts Coming In October With 69 Months of Near Zero Federal Funds Interest Rates! — Interest Rate Suppression or Price Control and Manipulation Will Blow Up Economy — Suppressing Savings and Investment With Low Interest Rates Is A Formula For Diaster and Depression — Panic Time — Start A War Over Oil — Meltdown America –Videos

U.S. Debt Clock

Current Debt Held by the Public Intragovernmental Holdings Total Public Debt Outstanding
09/17/2014 12,767,522,798,389.80 4,997,219,915,398.95 17,764,742,713,788.75

 

TABLE I -- SUMMARY OF TREASURY SECURITIES OUTSTANDING, AUGUST 31, 2014
(Millions of dollars)
                                              Amount Outstanding
Title                                         Debt Held             Intragovernmental         Totals
                                              By the Public         Holdings
Marketable:
  Bills.......................................        1,450,293                     1,704                1,451,998
  Notes.......................................        8,109,269                     7,365                8,116,634
  Bonds.......................................        1,521,088                        57                1,521,144
  Treasury Inflation-Protected Securities.....        1,031,836                        52                1,031,888
  Floating Rate Notes  21  ...................          109,996                         0                  109,996
  Federal Financing Bank  1  .................                0                    13,612                   13,612
Total Marketable  a...........................       12,222,481                    22,790 2             12,245,271
Nonmarketable:
  Domestic Series.............................           29,995                         0                   29,995
  Foreign Series..............................            2,986                         0                    2,986
  State and Local Government Series...........          105,440                         0                  105,440
  United States Savings Securities............          177,030                         0                  177,030
  Government Account Series...................          193,237                 4,993,277                5,186,514
  Hope Bonds 19...............................                0                       494                      494
  Other.......................................            1,443                         0                    1,443
Total Nonmarketable  b........................          510,130                 4,993,771                5,503,901
Total Public Debt Outstanding ................       12,732,612                 5,016,561               17,749,172
TABLE II -- STATUTORY DEBT LIMIT, AUGUST 31, 2014
(Millions of dollars)
                                              Amount Outstanding
Title                                         Debt Held             Intragovernmental         Totals
                                                 By the Public 17, 2Holdings
Debt Subject to Limit: 17, 20
  Total Public Debt Outstanding...............       12,732,612                 5,016,561               17,749,172
  Less Debt Not Subject to Limit:
    Other Debt ...............................              485                         0                      485
    Unamortized Discount  3...................           15,742                    12,421                   28,163
    Federal Financing Bank  1     ............                0                    13,612                   13,612
    Hope Bonds 19.............................                0                       494                      494
  Plus Other Debt Subject to Limit:
    Guaranteed Debt of Government Agencies  4                 *                         0                        *
  Total Public Debt Subject to Limit .........       12,716,386                 4,990,033               17,706,419
  Statutory Debt Limit  5.....................................................................                   0
COMPILED AND PUBLISHED BY
THE BUREAU OF THE FISCAL SERVICE
www.TreasuryDirect.gov

Interest Expense on the Debt Outstanding

The Interest Expense on the Debt Outstanding includes the monthly interest for:

Amortized discount or premium on bills, notes and bonds is also included in the monthly interest expense.

The fiscal year represents the total interest expense on the Debt Outstanding for a given fiscal year. This includes the months of October through September. View current month details (XLS Format, File size 199KB, uploaded 09/05/2014).

Note: To read or print a PDF document, you need the Adobe Acrobat Reader (v5.0 or higher) software installed on your computer. You can download the Adobe Acrobat Reader from the Adobe Website.

If you need help downloading…

Interest Expense Fiscal Year 2014
August $27,093,517,258.24
July $29,260,530,745.98
June $97,565,768,696.69
May $32,081,384,628.40
April $31,099,852,014.96
March $26,269,559,883.36
February $21,293,863,450.50
January $19,498,592,676.78
December $88,275,817,263.03
November $22,327,099,682.97
October $16,451,313,332.09
Fiscal Year Total $411,217,855,816.94
Available Historical Data Fiscal Year End
2013 $415,688,781,248.40
2012 $359,796,008,919.49
2011 $454,393,280,417.03
2010 $413,954,825,362.17
2009 $383,071,060,815.42
2008 $451,154,049,950.63
2007 $429,977,998,108.20
2006 $405,872,109,315.83
2005 $352,350,252,507.90
2004 $321,566,323,971.29
2003 $318,148,529,151.51
2002 $332,536,958,599.42
2001 $359,507,635,242.41
2000 $361,997,734,302.36
1999 $353,511,471,722.87
1998 $363,823,722,920.26
1997 $355,795,834,214.66
1996 $343,955,076,695.15
1995 $332,413,555,030.62
1994 $296,277,764,246.26
1993 $292,502,219,484.25
1992 $292,361,073,070.74
1991 $286,021,921,181.04
1990 $264,852,544,615.90
1989 $240,863,231,535.71
1988 $214,145,028,847.73

chart

fredgraph

fredgraph

BND-10-Year-Treasury-Yield-09122014

 JIM ROGERS Financial disaster coming – Dollar collapse – Countries Move Away From USD

US Fed signals move to normalize monetary policy

Dollar Meltdown, Massive Financial Bubble, Economic Collapse Marc Faber

Peter Schiff Iraq Crisis Threatens Global Economy

Peter Schiff – Fantasy About US Recovery Is Not Going To Materialize

Most important video Americans will see today – Doug Casey Interview

James Grant: Two Alternative Outcomes From Fed Policy – Much Higher Inflation or More Money Printing

Investor Jim Grant on Bubbles And Bargains

Jim Rogers Discusses Concern Over The Market

Jim Rogers On Economic Collapse And The US Debt‬

US Economy 2014 Collapse – *Peter Schiff* – FED will cause Huge Economic Crisis!

US ECONOMY COLLAPSE WILL LEAVE MILLIONS IN POVERTY

There Will Be No Economic Recovery. Prepare Yourself Accordingly

US Massive Financial Crisis Coming

Dan Mitchell Discussing Harvard Survey, Arguing for Growth over Class Warfare

The Coming Stock Market Crash and The Death of Money with Jim Rickards

Market Crash, Economic collapse 2014, The coming of World War 3 – Stock Market

Forbes: Obama’s Economic Reforms Are the Definition of Insanity

Why America Should Default and You Should Live Abroad: Q&A with Doug Casey

Doug Casey-No Way Out-Stock, Bond and Real Estate Markets Will Collapse

Russia conspired to destroy US dollar with China – clip from Meltdown America documentary

http://www.caseyresearch.com/lg/meltdown-video

 

 

Here a bubble, there a bubble: Ol’ Marc Faber

Even after the Dow and the S&P 500 closed at new all-time highs, closely followed contrarian Marc Faber keeps sounding the alarm.

“We have a bubble in everything, everywhere,” the publisher of The Gloom, Boom & Doom Report told CNBC’s “Squawk Box” on Friday. Faber has long argued that the Federal Reserve’s massive asset purchasing programs and near-zero interest rates have inflated stock prices.

The catalyst for a market decline, as he sees it, could be a “raise in interest rates, not engineered by the Fed,” referring an increase in bond yields.

 

Faber also expressed concern about American consumers. “Their cost of living have gone up more than the salary increases, so they’re getting squeezed. So that’s why retailing is not doing particularly well.”

A real black swan event, he argued, would be a global recession. “The big surprise will be that the global economy slows down and goes into recession. And that will shock markets.”

If economies around the world can’t recovery with the Fed and other central banks pumping easy money into the system, that would send a dire message, Faber added. He believes the best way for world economies to recover is to cut the size of government.

Read MoreBond market hears Fed hawks; stocks see doves

There’s a dual-economy in the U.S. and around the world with the rich doing really well and others struggling, he said. “[But] the rich will get creamed one day, especially in Europe, on wealth taxes.”

On the other end of the market spectrum, longtime stock market bull Jeremy Siegel told CNBC on Tuesday (ahead of Wednesday’s Fed policy statement leaving interest rate guidance unchanged) that he stands by his Dow 18,000 prediction.

The Wharton School professor sees second half economic growth of 3 to 4 percent, S&P 500 earnings near $120, and the start of Fed rate hikes in the spring or summer of 2015

http://www.cnbc.com/id/102016166

 

Fed and TWTR Overvaluation, Evidence of Looming Market Crash: Stockman

The Federal Reserve Wednesday reassured investors that it will hold interest rates near zero for a “considerable time” after it ends the bond-buying program known as quantitative easing in October. In response, the Dow Jones Industrial Average (^DJI) closed at a new record high.

Former Director of the Office of Management and Budget and author of the book, The Great Deformation, David Stockman, has significant concerns about that very policy.

“I’m worried… that we’ve got the greatest bubble created by a central bank in human history,” he told Yahoo Finance.

In a recent blog post, Stockman offered a handful of high-flying stocks as evidence of what he sees as “madness.”

                                               “…Twitter, is all that is required to remind us that once

                                               again markets are trading in the nosebleed section

                                               of history, rivaling even the madness of March 2000.”

Behind the madness

In an interview with Yahoo Finance, Stockman blamed Fed policy for creating that madness.

“We have been shoving zero-cost money into the financial markets for 6-years running,” he said. “That’s the kerosene that drives speculative trading – the carry trades. That’s what the gamblers use to fund their position as they move from one momentum play and trade to another.”

And that, he says, is not sustainable. While Stockman believes tech stocks are especially overvalued, he warns that it’s not just tech valuations that are inflated. “Everything’s massively overvalued, and it’s predicated on zero-cost overnight money that continues these carry trades; It can’t continue.”

And he still believes, as he has for some time – so far, incorrectly – that there will be a day of reckoning.

“When the trades begin to unwind because the carry cost has to normalize, you’re going to have a dramatic re-pricing dislocation in these financial markets.”

As Yahoo Finance’s Lauren Lyster points out in the associated video, investors who heeded Stockman’s advice last year would have missed out on a 28% run-up in stocks. But Stockman remains steadfast in his belief that the current Fed policy and the resultant market behavior can not continue. “I think what the Fed is doing is so unprecedented, what is happening in the markets is so unnatural,” he said. “This is dangerous, combustible stuff, and I don’t know when the explosion occurs – when the collapse suddenly is upon us – but when it happens, people will be happy that they got out of the way if they did.”

 

 

Federal Reserve Statistical Release, H.4.1, Factors Affecting Reserve Balances; title with eagle logo links to Statistical Release home page
Release Date: Thursday, September 11, 2014
Release dates | Data Download Program (DDP) | About | Announcements | Technical Q&As
Current release  Other formats: Screen reader | ASCII | PDF (21 KB)


Try data download now image link

FEDERAL RESERVE statistical release

H.4.1

Factors Affecting Reserve Balances of Depository Institutions and Condition Statement of Federal Reserve Banks September 11, 2014

1. Factors Affecting Reserve Balances of Depository Institutions

Millions of dollars

Reserve Bank credit, related items, and
reserve balances of depository institutions at
Federal Reserve Banks
Averages of daily figures Wednesday
Sep 10, 2014
Week ended
Sep 10, 2014
Change from week ended
Sep 3, 2014 Sep 11, 2013
Reserve Bank credit 4,377,690 +    4,183 +  761,693 4,379,719
Securities held outright1 4,159,537 +    2,675 +  765,361 4,160,521
U.S. Treasury securities 2,439,657 +    2,671 +  401,376 2,440,637
Bills2          0          0          0          0
Notes and bonds, nominal2 2,325,368 +    2,678 +  386,333 2,326,351
Notes and bonds, inflation-indexed2     97,755          0 +   11,737     97,755
Inflation compensation3     16,534 –        7 +    3,306     16,531
Federal agency debt securities2     41,562          0 –   22,868     41,562
Mortgage-backed securities4 1,678,317 +        4 +  386,851 1,678,322
Unamortized premiums on securities held outright5    208,963 –      219 +    5,815    208,907
Unamortized discounts on securities held outright5    -18,664 +       21 –   12,958    -18,654
Repurchase agreements6          0          0          0          0
Loans        291 –        8 +       18        352
Primary credit         10 –       18 –        8         53
Secondary credit          0          0          0          0
Seasonal credit        247 +        9 +       94        266
Term Asset-Backed Securities Loan Facility7         34          0 –       68         34
Other credit extensions          0          0          0          0
Net portfolio holdings of Maiden Lane LLC8      1,664 –        1 +      171      1,665
Net portfolio holdings of Maiden Lane II LLC9         63          0 –        1         63
Net portfolio holdings of Maiden Lane III LLC10         22          0          0         22
Net portfolio holdings of TALF LLC11         44          0 –       80         44
Float       -675 –       69 +       94       -627
Central bank liquidity swaps12         77 +        1 –      243         77
Other Federal Reserve assets13     26,369 +    1,784 +    3,517     27,349
Foreign currency denominated assets14     22,933 –      353 –      737     22,801
Gold stock     11,041          0          0     11,041
Special drawing rights certificate account      5,200          0          0      5,200
Treasury currency outstanding15     46,103 +       14 +      820     46,103
Total factors supplying reserve funds 4,462,967 +    3,844 +  761,776 4,464,863

Note: Components may not sum to totals because of rounding. Footnotes appear at the end of the table.

1. Factors Affecting Reserve Balances of Depository Institutions (continued)

Millions of dollars

Reserve Bank credit, related items, and
reserve balances of depository institutions at
Federal Reserve Banks
Averages of daily figures Wednesday
Sep 10, 2014
Week ended
Sep 10, 2014
Change from week ended
Sep 3, 2014 Sep 11, 2013
Currency in circulation15 1,292,467 –      442 +   84,956 1,291,993
Reverse repurchase agreements16    266,584 +      818 +  173,996    267,602
Foreign official and international accounts    102,228 –      296 +    9,640    107,303
Others    164,356 +    1,115 +  164,356    160,299
Treasury cash holdings        165 +        4 +       23        164
Deposits with F.R. Banks, other than reserve balances     52,715 –    6,170 –   19,233     53,117
Term deposits held by depository institutions          0          0          0          0
U.S. Treasury, General Account     39,081 –    3,787 +      530     31,872
Foreign official      5,432 –    1,134 –    3,562      5,241
Other17      8,202 –    1,248 –   16,201     16,004
Other liabilities and capital18     63,991 –        1 +      818     63,033
Total factors, other than reserve balances,
absorbing reserve funds
1,675,922 –    5,792 +  240,561 1,675,910
Reserve balances with Federal Reserve Banks 2,787,045 +    9,636 +  521,214 2,788,954

Note: Components may not sum to totals because of rounding.

1. Includes securities lent to dealers under the overnight securities lending facility; refer to table 1A.
2. Face value of the securities.
3. Compensation that adjusts for the effect of inflation on the original face value of inflation-indexed securities.
4. Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of
the securities.
5. Reflects the premium or discount, which is the difference between the purchase price and the face value of the securities that has not been amortized.  For U.S. Treasury and Federal agency debt securities, amortization is on a straight-line basis.  For mortgage-backed securities, amortization is on an effective-interest basis.
6. Cash value of agreements.
7. Includes credit extended by the Federal Reserve Bank of New York to eligible borrowers through the Term Asset-Backed Securities Loan Facility.
8. Refer to table 4 and the note on consolidation accompanying table 9.
9. Refer to table 5 and the note on consolidation accompanying table 9.
10. Refer to table 6 and the note on consolidation accompanying table 9.
11. Refer to table 7 and the note on consolidation accompanying table 9.
12. Dollar value of foreign currency held under these agreements valued at the exchange rate to be used when the foreign currency is returned
to the foreign central bank. This exchange rate equals the market exchange rate used when the foreign currency was acquired from the
foreign central bank.
13. Includes accrued interest, which represents the daily accumulation of interest earned, and other accounts receivable.  Also, includes Reserve Bank premises and equipment net of allowances for depreciation.
14. Revalued daily at current foreign currency exchange rates.
15. Estimated.
16. Cash value of agreements, which are collateralized by U.S. Treasury securities, federal agency debt securities, and mortgage-backed securities.
17. Includes deposits held at the Reserve Banks by international and multilateral organizations, government-sponsored enterprises, and designated financial market utilities.
18. Includes the liabilities of Maiden Lane LLC, Maiden Lane II LLC, Maiden Lane III LLC, and TALF LLC to entities other than the Federal Reserve Bank of New York, including liabilities that have recourse only to the portfolio holdings of these LLCs. Refer to table 4 through table 7 and the note on consolidation accompanying table 9. Also includes the liability for interest on Federal Reserve notes due to U.S. Treasury. Refer to table 8 and table 9.

Sources: Federal Reserve Banks and the U.S. Department of the Treasury.

1A. Memorandum Items

Millions of dollars

Memorandum item Averages of daily figures Wednesday
Sep 10, 2014
Week ended
Sep 10, 2014
Change from week ended
Sep 3, 2014 Sep 11, 2013
Securities held in custody for foreign official and international accounts 3,338,309 –      417 +   61,832 3,343,937
Marketable U.S. Treasury securities1 3,010,563 –      456 +   86,414 3,016,027
Federal agency debt and mortgage-backed securities2    285,805 +       28 –   29,008    285,934
Other securities3     41,942 +       12 +    4,427     41,976
Securities lent to dealers     10,669 +    1,648 –    1,429     11,123
Overnight facility4     10,669 +    1,648 –    1,429     11,123
U.S. Treasury securities      9,860 +    1,721 –    1,405     10,373
Federal agency debt securities        810 –       72 –       23        750

Note: Components may not sum to totals because of rounding.

1. Includes securities and U.S. Treasury STRIPS at face value, and inflation compensation on TIPS. Does not include securities pledged as collateral to foreign official and international account holders against reverse repurchase agreements with the Federal Reserve presented in tables 1, 8, and 9.
2. Face value of federal agency securities and current face value of mortgage-backed securities, which is the remaining principal balance of the securities.
3. Includes non-marketable U.S. Treasury securities, supranationals, corporate bonds, asset-backed securities, and commercial paper at face value.
4. Face value. Fully collateralized by U.S. Treasury securities.
2. Maturity Distribution of Securities, Loans, and Selected Other Assets and Liabilities, September 10, 2014

Millions of dollars

Remaining Maturity Within 15
days
16 days to
90 days
91 days to
1 year
Over 1 year
to 5 years
Over 5 year
to 10 years
Over 10
years
All
Loans1        118        234          0          0          0        352
U.S. Treasury securities2
Holdings          0         90      3,194 1,037,162    742,261    657,930 2,440,637
Weekly changes          0          0          0 +    1,615 –        1 +    2,037 +    3,651
Federal agency debt securities3
Holdings      1,556      1,329      3,584     32,746          0      2,347     41,562
Weekly changes          0          0          0          0          0          0          0
Mortgage-backed securities4
Holdings          0          0          0         10      4,698 1,673,614 1,678,322
Weekly changes          0          0          0          0 +      863 –      857 +        6
Asset-backed securities held by
TALF LLC5
         0          0          0          0          0          0          0
Repurchase agreements6          0          0          0
Central bank liquidity swaps7         77          0          0          0          0          0         77
Reverse repurchase agreements6    267,602          0    267,602
Term deposits          0          0          0          0

Note: Components may not sum to totals because of rounding.
…Not applicable.

1. Excludes the loans from the Federal Reserve Bank of New York (FRBNY) to Maiden Lane LLC, Maiden Lane II LLC, Maiden
Lane III LLC, and TALF LLC. The loans were eliminated when preparing the FRBNY’s statement of condition consistent with consolidation
under generally accepted accounting principles.
2. Face value. For inflation-indexed securities, includes the original face value and compensation that adjusts for the effect of inflation on the
original face value of such securities.
3. Face value.
4. Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of the securities.
5. Face value of asset-backed securities held by TALF LLC, which is the remaining principal balance of the underlying assets.
6. Cash value of agreements.
7. Dollar value of foreign currency held under these agreements valued at the exchange rate to be used when the foreign currency is returned to
the foreign central bank. This exchange rate equals the market exchange rate used when the foreign currency was acquired from the foreign
central bank.

3. Supplemental Information on Mortgage-Backed Securities

Millions of dollars

Account name Wednesday
Sep 10, 2014
Mortgage-backed securities held outright1 1,678,322
Commitments to buy mortgage-backed securities2     80,643
Commitments to sell mortgage-backed securities2          0
Cash and cash equivalents3          4
1. Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of the securities.
2. Current face value. Generally settle within 180 days and include commitments associated with outright transactions, dollar rolls, and coupon swaps.
3. This amount is included in other Federal Reserve assets in table 1 and in other assets in table 8 and table 9.

4. Information on Principal Accounts of Maiden Lane LLC

Millions of dollars

Account name Wednesday
Sep 10, 2014
Net portfolio holdings of Maiden Lane LLC1      1,665
Outstanding principal amount of loan extended by the Federal Reserve Bank of New York2          0
Accrued interest payable to the Federal Reserve Bank of New York2          0
Outstanding principal amount and accrued interest on loan payable to JPMorgan Chase & Co.3          0
1. Fair value. Fair value reflects an estimate of the price that would be received upon selling an asset if the transaction were to be conducted in an orderly market on the measurement date. Revalued quarterly. This table reflects valuations as of June 30, 2014. Any assets purchased after
this valuation date are initially recorded at cost until their estimated fair value as of the purchase date becomes available.
2. Book value. This amount was eliminated when preparing the Federal Reserve Bank of New York’s statement of condition consistent with consolidation under generally accepted accounting principles. Refer to the note on consolidation accompanying table 9.
3. Book value. The fair value of these obligations is included in other liabilities and capital in table 1 and in other liabilities and accrued dividends in table 8 and table 9.

Note: On June 26, 2008, the Federal Reserve Bank of New York (FRBNY) extended credit to Maiden Lane LLC under the authority of section 13(3) of the Federal Reserve Act. This limited liability company was formed to acquire certain assets of Bear Stearns and to manage those assets through time to maximize repayment of the credit extended and to minimize disruption to financial markets. Payments by Maiden Lane LLC from the proceeds of the net portfolio holdings will be made in the following order: operating expenses of the LLC, principal due to the FRBNY, interest due to the FRBNY, principal due to JPMorgan Chase & Co., and interest due to JPMorgan Chase & Co. Any remaining funds will be paid to the FRBNY.

5. Information on Principal Accounts of Maiden Lane II LLC

Millions of dollars

Account name Wednesday
Sep 10, 2014
Net portfolio holdings of Maiden Lane II LLC1         63
Outstanding principal amount of loan extended by the Federal Reserve Bank of New York2          0
Accrued interest payable to the Federal Reserve Bank of New York2          0
Deferred payment and accrued interest payable to subsidiaries of American International Group, Inc.3          0
1. Fair value. Fair value reflects an estimate of the price that would be received upon selling an asset if the transaction were to be conducted in an orderly market on the measurement date. Revalued quarterly. This table reflects valuations as of June 30, 2014. Any assets purchased after
this valuation date are initially recorded at cost until their estimated fair value as of the purchase date becomes available.
2. Book value. This amount was eliminated when preparing the Federal Reserve Bank of New York’s statement of condition consistent with consolidation under generally accepted accounting principles. Refer to the note on consolidation accompanying table 9.
3. Book value. The deferred payment represents the portion of the proceeds of the net portfolio holdings due to subsidiaries of American
International Group, Inc. in accordance with the asset purchase agreement. The fair value of this payment and accrued interest payable are
included in other liabilities and capital in table 1 and in other liabilities and accrued dividends in table 8 and table 9.

Note: On December 12, 2008, the Federal Reserve Bank of New York (FRBNY) began extending credit to Maiden Lane II LLC under the authority of section 13(3) of the Federal Reserve Act. This limited liability company was formed to purchase residential mortgage-backed securities from the U.S. securities lending reinvestment portfolio of subsidiaries of American International Group, Inc. (AIG subsidiaries). Payments by Maiden Lane II LLC from the proceeds of the net portfolio holdings will be made in the following order: operating expenses of Maiden Lane II LLC, principal due to the FRBNY, interest due to the FRBNY, and deferred payment and interest due to AIG subsidiaries. Any remaining funds will be shared by the FRBNY and AIG subsidiaries.

6. Information on Principal Accounts of Maiden Lane III LLC

Millions of dollars

Account name Wednesday
Sep 10, 2014
Net portfolio holdings of Maiden Lane III LLC1         22
Outstanding principal amount of loan extended by the Federal Reserve Bank of New York2          0
Accrued interest payable to the Federal Reserve Bank of New York2          0
Outstanding principal amount and accrued interest on loan payable to American International Group, Inc.3          0
1. Fair value. Fair value reflects an estimate of the price that would be received upon selling an asset if the transaction were to be conducted in an orderly market on the measurement date. Revalued quarterly. This table reflects valuations as of June 30, 2014. Any assets purchased after
this valuation date are initially recorded at cost until their estimated fair value as of the purchase date becomes available.
2. Book value. This amount was eliminated when preparing the Federal Reserve Bank of New York’s statement of condition consistent with consolidation under generally accepted accounting principles. Refer to the note on consolidation accompanying table 9.
3. Book value. The fair value of these obligations is included in other liabilities and capital in table 1 and in other liabilities and accrued dividends in table 8 and table 9.

Note: On November 25, 2008, the Federal Reserve Bank of New York (FRBNY) began extending credit to Maiden Lane III LLC under the authority of section 13(3) of the Federal Reserve Act. This limited liability company was formed to purchase multi-sector collateralized debt obligations (CDOs) on which the Financial Products group of American International Group, Inc. (AIG) has written credit default swap (CDS) contracts. In connection with the purchase of CDOs, the CDS counterparties will concurrently unwind the related CDS transactions. Payments by Maiden Lane III LLC from the proceeds of the net portfolio holdings will be made in the following order: operating expenses of Maiden Lane III LLC, principal due to the FRBNY, interest due to the FRBNY, principal due to AIG, and interest due to AIG. Any remaining funds will be shared by the FRBNY and AIG.

7. Information on Principal Accounts of TALF LLC

Millions of dollars

Account name Wednesday
Sep 10, 2014
Asset-backed securities holdings1          0
Other investments, net         44
Net portfolio holdings of TALF LLC         44
Outstanding principal amount of loan extended by the Federal Reserve Bank of New York2          0
Accrued interest payable to the Federal Reserve Bank of New York2          0
Funding provided by U.S. Treasury to TALF LLC, including accrued interest payable3          0
1. Fair value. Fair value reflects an estimate of the price that would be received upon selling an asset if the transaction were to be conducted in an orderly market on the measurement date.
2. Book value. This amount was eliminated when preparing the Federal Reserve Bank of New York’s statement of condition consistent with consolidation under generally accepted accounting principles. Refer to the note on consolidation accompanying table 9.
3. Book value. The fair value of these obligations is included in other liabilities and capital in table 1 and in other liabilities and accrued dividends in table 8 and table 9.

Note: On November 25, 2008, the Federal Reserve announced the creation of the Term Asset-Backed Securities Loan Facility (TALF) under theauthority of section 13(3) of the Federal Reserve Act. The TALF is a facility under which the Federal Reserve Bank of New York (FRBNY) extended loans with a term of up to five years to holders of eligible asset-backed securities. The Federal Reserve closed the TALF for new loan extensions in 2010. The loans provided through the TALF to eligible borrowers are non-recourse, meaning that the obligation of the borrower can be discharged by surrendering the collateral to the FRBNY.

TALF LLC is a limited liability company formed to purchase and manage any asset-backed securities received by the FRBNY in connection with the decision of a borrower not to repay a TALF loan. TALF LLC has committed, for a fee, to purchase all asset-backed securities received by the FRBNY in conjunction with a TALF loan at a price equal to the TALF loan plus accrued but unpaid interest. Prior to January 15, 2013, the U.S. Treasury’s Troubled Asset Relief Program (TARP) committed backup funding to TALF LLC, providing credit protection to the FRBNY. However, the accumulated fees and income collected through the TALF and held by TALF LLC now exceed the remaining amount of TALF loans outstanding. Accordingly, the TARP credit protection commitment has been terminated, and TALF LLC has begun to distribute excess proceeds to the Treasury and the FRBNY. Any remaining funds will be shared by the FRBNY and the U.S. Treasury.

8. Consolidated Statement of Condition of All Federal Reserve Banks

Millions of dollars

Assets, liabilities, and capital Eliminations from consolidation Wednesday
Sep 10, 2014
Change since
Wednesday Wednesday
Sep 3, 2014 Sep 11, 2013
Assets
Gold certificate account     11,037          0          0
Special drawing rights certificate account      5,200          0          0
Coin      1,930 +        8 –       62
Securities, unamortized premiums and discounts, repurchase agreements, and loans 4,351,126 +    3,534 +  756,847
Securities held outright1 4,160,521 +    3,657 +  763,739
U.S. Treasury securities 2,440,637 +    3,651 +  399,549
Bills2          0          0          0
Notes and bonds, nominal2 2,326,351 +    3,661 +  385,784
Notes and bonds, inflation-indexed2     97,755          0 +   10,546
Inflation compensation3     16,531 –       10 +    3,219
Federal agency debt securities2     41,562          0 –   22,654
Mortgage-backed securities4 1,678,322 +        6 +  386,844
Unamortized premiums on securities held outright5    208,907 –      132 +    5,820
Unamortized discounts on securities held outright5    -18,654 +       19 –   12,787
Repurchase agreements6          0          0          0
Loans        352 –       10 +       75
Net portfolio holdings of Maiden Lane LLC7      1,665 +        1 +      167
Net portfolio holdings of Maiden Lane II LLC8         63          0 –        1
Net portfolio holdings of Maiden Lane III LLC9         22          0          0
Net portfolio holdings of TALF LLC10         44          0 –       68
Items in process of collection (0)         94 –       22 –       31
Bank premises      2,255          0 –       29
Central bank liquidity swaps11         77 +        1 –      243
Foreign currency denominated assets12     22,801 –      404 –      925
Other assets13     25,095 +    2,704 +    3,719
Total assets (0) 4,421,408 +    5,821 +  759,373

Note: Components may not sum to totals because of rounding. Footnotes appear at the end of the table.

8. Consolidated Statement of Condition of All Federal Reserve Banks (continued)

Millions of dollars

Assets, liabilities, and capital Eliminations from consolidation Wednesday
Sep 10, 2014
Change since
Wednesday Wednesday
Sep 3, 2014 Sep 11, 2013
Liabilities
Federal Reserve notes, net of F.R. Bank holdings 1,247,980 –    2,086 +   84,510
Reverse repurchase agreements14    267,602 +   17,296 +  175,438
Deposits (0) 2,842,072 –    8,612 +  499,663
Term deposits held by depository institutions          0          0          0
Other deposits held by depository institutions 2,788,954 –   24,799 +  513,312
U.S. Treasury, General Account     31,872 +   10,836 +    1,852
Foreign official      5,241 –    1,326 –    3,524
Other15 (0)     16,004 +    6,676 –   11,978
Deferred availability cash items (0)        721 –      482 –      163
Other liabilities and accrued dividends16      6,693 –      299 –    1,529
Total liabilities (0) 4,365,067 +    5,817 +  757,919
Capital accounts
Capital paid in     28,170 +        2 +      726
Surplus     28,170 +        2 +      726
Other capital accounts          0          0          0
Total capital     56,341 +        4 +    1,454

Note: Components may not sum to totals because of rounding.

1. Includes securities lent to dealers under the overnight securities lending facility; refer to table 1A.
2. Face value of the securities.
3. Compensation that adjusts for the effect of inflation on the original face value of inflation-indexed securities.
4. Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of the securities.
5. Reflects the premium or discount, which is the difference between the purchase price and the face value of the securities that has not been amortized.  For U.S. Treasury and Federal agency debt securities, amortization is on a straight-line basis.  For mortgage-backed securities, amortization is on an effective-interest basis.
6. Cash value of agreements, which are collateralized by U.S. Treasury and federal agency securities.
7. Refer to table 4 and the note on consolidation accompanying table 9.
8. Refer to table 5 and the note on consolidation accompanying table 9.
9. Refer to table 6 and the note on consolidation accompanying table 9.
10. Refer to table 7 and the note on consolidation accompanying table 9.
11. Dollar value of foreign currency held under these agreements valued at the exchange rate to be used when the foreign currency is returned to
the foreign central bank. This exchange rate equals the market exchange rate used when the foreign currency was acquired from the foreign
central bank.
12. Revalued daily at current foreign currency exchange rates.
13. Includes accrued interest, which represents the daily accumulation of interest earned, and other accounts receivable.
14. Cash value of agreements, which are collateralized by U.S. Treasury securities, federal agency debt securities, and mortgage-backed securities.
15. Includes deposits held at the Reserve Banks by international and multilateral organizations, government-sponsored enterprises, and designated financial market utilities.
16. Includes the liabilities of Maiden Lane LLC, Maiden Lane II LLC, Maiden Lane III LLC, and TALF LLC to entities other than the Federal
Reserve Bank of New York, including liabilities that have recourse only to the portfolio holdings of these LLCs. Refer to table 4 through table 7 and the note on consolidation accompanying table 9. Also includes the liability for interest on Federal Reserve notes due to U.S. Treasury.

9. Statement of Condition of Each Federal Reserve Bank, September 10, 2014

Millions of dollars

Assets, liabilities, and capital Total Boston New York Philadelphia Cleveland Richmond Atlanta Chicago St. Louis Minneapolis Kansas Dallas San
City Francisco
Assets
Gold certificate account     11,037        352      4,125        338        464        824      1,349        706        278        173        291        880      1,257
Special drawing rights certificate acct.      5,200        196      1,818        210        237        412        654        424        150         90        153        282        574
Coin      1,930         32         94        124        123        320        222        276         25         46        153        182        332
Securities, unamortized premiums and discounts, repurchase agreements,
and loans
4,351,126     88,009 2,670,390    104,231     94,993    243,168    240,542    177,833     53,725     26,795     57,330    132,586    461,524
Securities held outright1 4,160,521     84,160 2,553,576     99,673     90,839    232,534    229,991    170,046     51,317     25,497     54,804    126,772    441,311
U.S. Treasury securities 2,440,637     49,370 1,497,974     58,470     53,288    136,409    134,917     99,752     30,104     14,957     32,149     74,367    258,881
Bills2          0          0          0          0          0          0          0          0          0          0          0          0          0
Notes and bonds3 2,440,637     49,370 1,497,974     58,470     53,288    136,409    134,917     99,752     30,104     14,957     32,149     74,367    258,881
Federal agency debt securities2     41,562        841     25,509        996        907      2,323      2,298      1,699        513        255        547      1,266      4,409
Mortgage-backed securities4 1,678,322     33,949 1,030,093     40,207     36,644     93,803     92,777     68,595     20,701     10,285     22,107     51,139    178,021
Unamortized premiums on securities held outright5    208,907      4,226    128,220      5,005      4,561     11,676     11,548      8,538      2,577      1,280      2,752      6,365     22,159
Unamortized discounts on securities held outright5    -18,654       -377    -11,449       -447       -407     -1,043     -1,031       -762       -230       -114       -246       -568     -1,979
Repurchase agreements6          0          0          0          0          0          0          0          0          0          0          0          0          0
Loans        352          1         44          0          0          0         34         11         61        132         20         17         33
Net portfolio holdings of Maiden
Lane LLC7      1,665          0      1,665          0          0          0          0          0          0          0          0          0          0
Net portfolio holdings of Maiden
Lane II LLC8         63          0         63          0          0          0          0          0          0          0          0          0          0
Net portfolio holdings of Maiden
Lane III LLC9         22          0         22          0          0          0          0          0          0          0          0          0          0
Net portfolio holdings of TALF LLC10         44          0         44          0          0          0          0          0          0          0          0          0          0
Items in process of collection         94          0          0          0          0          0         93          0          0          1          0          0          0
Bank premises      2,255        121        434         74        110        222        209        198        124         97        243        224        200
Central bank liquidity swaps11         77          4         25          6          6         16          4          2          1          0          1          1         11
Foreign currency denominated assets12     22,801      1,037      7,335      1,714      1,813      4,754      1,311        629        192         96        240        381      3,299
Other assets13     25,095        535     15,039        739        546      1,547      1,374      1,014        356        219        347        798      2,580
Interdistrict settlement account          0 +   10,547 –   58,585 +    2,678 +    9,252 +      197 +    8,040 –   10,297 –   10,950 –    2,083 –      134 +    2,635 +   48,701
Total assets 4,421,408    100,833 2,642,468    110,114    107,543    251,460    253,799    170,787     43,900     25,434     58,623    137,969    518,478

Note: Components may not sum to totals because of rounding. Footnotes appear at the end of the table.

9. Statement of Condition of Each Federal Reserve Bank, September 10, 2014 (continued)

Millions of dollars

Assets, liabilities, and capital Total Boston New York Philadelphia Cleveland Richmond Atlanta Chicago St. Louis Minneapolis Kansas Dallas San
City Francisco
Liabilities
Federal Reserve notes outstanding 1,443,974     44,572    489,349     42,766     65,118    103,568    212,875     94,569     37,360     21,242     36,783    115,911    179,862
Less: Notes held by F.R. Banks    195,994      5,311     63,063      6,357      8,870     11,177     20,690     11,915      4,937      4,278      5,302     25,736     28,359
Federal Reserve notes, net 1,247,980     39,261    426,285     36,409     56,248     92,391    192,186     82,654     32,423     16,964     31,481     90,175    151,503
Reverse repurchase agreements14    267,602      5,413    164,244      6,411      5,843     14,956     14,793     10,937      3,301      1,640      3,525      8,154     28,385
Deposits 2,842,072     53,409 2,030,175     62,876     40,791    131,999     42,547     75,315      7,510      6,356     22,882     38,429    329,783
Term deposits held by depository institutions          0          0          0          0          0          0          0          0          0          0          0          0          0
Other deposits held by depository institutions 2,788,954     53,397 1,977,410     62,837     40,788    131,731     42,538     75,306      7,510      6,355     22,881     38,428    329,774
U.S. Treasury, General Account     31,872          0     31,872          0          0          0          0          0          0          0          0          0          0
Foreign official      5,241          2      5,214          3          3          8          2          1          0          0          0          1          6
Other15     16,004         11     15,679         36          0        260          7          7          0          0          1          0          3
Deferred availability cash items        721          0          0          0          0          0        611          0          0        110          0          0          0
Interest on Federal Reserve notes due
to U.S. Treasury16
     1,693         19      1,199         20         10         23         86         73         20         12         20         54        155
Other liabilities and accrued
dividends17
     5,000        167      2,179        211        208        544        361        282        142        118        126        208        454
Total liabilities 4,365,067     98,270 2,624,083    105,927    103,101    239,913    250,583    169,261     43,395     25,200     58,034    137,021    510,279
Capital
Capital paid in     28,170      1,282      9,193      2,093      2,221      5,773      1,608        763        252        117        295        474      4,099
Surplus     28,170      1,282      9,193      2,093      2,221      5,773      1,608        763        252        117        295        474      4,099
Other capital          0          0          0          0          0          0          0          0          0          0          0          0          0
Total liabilities and capital 4,421,408    100,833 2,642,468    110,114    107,543    251,460    253,799    170,787     43,900     25,434     58,623    137,969    518,478

Note: Components may not sum to totals because of rounding. Footnotes appear at the end of the table.

9. Statement of Condition of Each Federal Reserve Bank, September 10, 2014 (continued)

1. Includes securities lent to dealers under the overnight securities lending facility; refer to table 1A.
2. Face value of the securities.
3. Includes the original face value of inflation-indexed securities and compensation that adjusts for the effect of inflation on the original face value of such securities.
4. Guaranteed by Fannie Mae, Freddie Mac, and Ginnie Mae. The current face value shown is the remaining principal balance of the securities.
5. Reflects the premium or discount, which is the difference between the purchase price and the face value of the securities that has not been amortized.  For U.S. Treasury and Federal agency debt securities, amortization is on a straight-line basis.  For mortgage-backed securities, amortization is on an effective-interest basis.
6. Cash value of agreements, which are collateralized by U.S. Treasury and federal agency securities.
7. Refer to table 4 and the note on consolidation below.
8. Refer to table 5 and the note on consolidation below.
9. Refer to table 6 and the note on consolidation below.
10. Refer to table 7 and the note on consolidation below.
11. Dollar value of foreign currency held under these agreements valued at the exchange rate to be used when the foreign currency is returned to the foreign central bank. This exchange rate
equals the market exchange rate used when the foreign currency was acquired from the foreign central bank.
12. Revalued daily at current foreign currency exchange rates.
13. Includes accrued interest, which represents the daily accumulation of interest earned, and other accounts receivable.
14. Cash value of agreements, which are collateralized by U.S. Treasury securities, federal agency debt securities, and mortgage-backed securities.
15. Includes deposits held at the Reserve Banks by international and multilateral organizations, government-sponsored enterprises, and designated financial market utilities.
16. Represents the estimated weekly remittances to U.S. Treasury as interest on Federal Reserve notes or, in those cases where the Reserve Bank’s net earnings are not sufficient to equate surplus to capital paid-in, the deferred asset for interest on Federal Reserve notes. The amount of any deferred asset, which is presented as a negative amount in this line, represents the amount of the Federal Reserve Bank’s earnings that must be retained before remittances to the U.S. Treasury resume. The amounts on this line are calculated in accordance with Board of Governors policy, which requires the Federal Reserve Banks to remit residual earnings to the U.S. Treasury as interest on Federal Reserve notes after providing for the costs of operations, payment of dividends, and the amount necessary to equate surplus with capital paid-in.
17. Includes the liabilities of Maiden Lane LLC, Maiden Lane II LLC, Maiden Lane III LLC, and TALF LLC to entities other than the Federal Reserve Bank of New York, including liabilities that have recourse only to the portfolio holdings of these LLCs. Refer to table 4 through table 7 and the note on consolidation below.

Note on consolidation:

The Federal Reserve Bank of New York (FRBNY) has extended loans to several limited liability companies under the authority of section 13(3) of the Federal Reserve Act. On June 26, 2008, a loan was extended to Maiden Lane LLC, which was formed to acquire certain assets of Bear Stearns. On November 25, 2008, a loan was extended to Maiden Lane III LLC, which was formed to purchase multi-sector collateralized debt obligations on which the Financial Products group of the American International Group, Inc. has written credit default swap contracts. On December 12, 2008, a loan was extended to Maiden Lane II LLC, which was formed to purchase residential mortgage-backed securities from the U.S. securities lending reinvestment portfolio of subsidiaries of American International Group, Inc. On November 25, 2008, the Federal Reserve Board authorized the FRBNY to extend credit to TALF LLC, which was formed to purchase and manage any asset-backed securities received by the FRBNY in connection with the decision of a borrower not to repay a loan extended under the Term Asset-Backed Securities Loan Facility.

The FRBNY is the primary beneficiary of TALF LLC, because of the two beneficiaries of the LLC, the FRBNY and the U.S. Treasury, the FRBNY is primarily responsible for directing the financial activities of TALF LLC. The FRBNY is the primary beneficiary of the other LLCs cited above because it will receive a majority of any residual returns of the LLCs and absorb a majority of any residual losses of the LLCs. Consistent with generally accepted accounting principles, the assets and liabilities of these LLCs have been consolidated with the assets and liabilities of the FRBNY in the preparation of the statements of condition shown on this release. As a consequence of the consolidation, the extensions of credit from the FRBNY to the LLCs are eliminated, the net assets of the LLCs appear as assets on the previous page (and in table 1 and table 8), and the liabilities of the LLCs to entities other than the FRBNY, including those with recourse only to the portfolio holdings of the LLCs, are included in other liabilities in this table (and table 1 and table 8).

10. Collateral Held against Federal Reserve Notes: Federal Reserve Agents’ Accounts

Millions of dollars

Federal Reserve notes and collateral Wednesday
Sep 10, 2014
Federal Reserve notes outstanding 1,443,974
Less: Notes held by F.R. Banks not subject to collateralization    195,994
Federal Reserve notes to be collateralized 1,247,980
Collateral held against Federal Reserve notes 1,247,980
Gold certificate account     11,037
Special drawing rights certificate account      5,200
U.S. Treasury, agency debt, and mortgage-backed securities pledged1,2 1,231,743
Other assets pledged          0
Memo:
Total U.S. Treasury, agency debt, and mortgage-backed securities1,2 4,160,521
Less: Face value of securities under reverse repurchase agreements    257,508
U.S. Treasury, agency debt, and mortgage-backed securities eligible to be pledged 3,903,013

Note: Components may not sum to totals because of rounding.

1. Includes face value of U.S. Treasury, agency debt, and mortgage-backed securities held outright, compensation to adjust for the effect of inflation on the original face value of inflation-indexed securities, and cash value of repurchase agreements.
2. Includes securities lent to dealers under the overnight securities lending facility; refer to table 1A.

Release dates | Data Download Program (DDP) | About | Announcements | Technical Q&As
Current release   Other formats: Screen reader | ASCII | PDF (21 KB)

Statistical releases


The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 328-332

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Drone Warfare — Videos

Posted on August 2, 2014. Filed under: American History, Blogroll, Bomb, Books, Communications, Computers, Constitution, Crime, Crisis, Data, Diasters, Documentary, Drones, Drug Cartels, Federal Communications Commission, Federal Government, Films, Foreign Policy, Freedom, Friends, Genocide, government, government spending, Heroes, history, Homicide, Islam, Language, Law, liberty, Life, Links, media, Missiles, National Security Agency (NSA_, Natural Gas, Oil, People, Philosophy, Photos, Politics, Press, Psychology, Radio, Radio, Rants, Raves, Resources, Security, Strategy, Talk Radio, Technology, Terrorism, Transportation, Video, War, Weapons | Tags: , , , , , , , , , , , |

Obama defends US drone attacks

Peter Singer: Drone Warfare

The Morality of Drone Warfare

DRONE WARS, PART ONE: THE DRONE LANDSCAPE

DRONE WARS, PART TWO: THE DRONE ECONOMY

DRONE WARS, PART THREE: THE DRONE MORALITY

Drone Boom Why Drones Aren’t Just for Dropping Bombs Anymore

Drone Laws Restrict Civilian UAV’s but allow Government

Rise of the Drones(full documentary)HD

RISE OF THE DRONES – NOVA (full documentary)

The Costs of Drone Warfare – Documentary

Richard Clarke – U.S. Drone Program Under Obama “Got Out of Hand”

EVERYONE needs to see this! Drone Strikes

Top 10 Drones in the world

ex CEO Colin Guinn is ALIVE, Files legal Injunction against DJI Innovations

Related Posts On Pronk Palisades

Obama On War, Peace and Drones To Kill Radical Islamic Jihad Terrorists — National Defense University Speech, May 23, 2013 — Videos

Obama’s Kill List–Drones–Remotely Piloted Aircraft–RPAs–Killing Machines–We Don’t Torture Terrorists–We Kill Americans, Civilians and Children in Undeclared Wars–Obama is Judge, Jury, and Executioner–Hope, Change, and Murder, Inc.–The Mass Murderer In The White House–Videos

NSA–Now Spying on Americans: Big Brother Government Spying On Americans–Progressives Minding Your Business Without Warrants–Remotely Piloted Aircraft a.k.a.Drones–Foreign Intelligence Surveillance Act (FISA)–Cyber Intelligence Sharing and Protection Act (CISA)–Videos

Read Full Post | Make a Comment ( None so far )

Mike Maden — Drone — Videos

Posted on August 2, 2014. Filed under: American History, Blogroll, Books, College, Communications, Crime, Crisis, Doumentary, Drones, Drug Cartels, Education, Energy, Entertainment, Fiction, Films, Foreign Policy, Freedom, government spending, history, Homicide, Illegal, Immigration, Islam, Language, Law, liberty, Life, Links, media, Movies, Natural Gas, Natural Gas, Oil, Oil, People, Philosophy, Photos, Politics, Resources, Reviews, Security, Transportation, Video, War, Weapons, Welfare | Tags: , , , , , , , , , , , , , |

 

drone_

Mike Maden

mike maden

Obama defends US drone attacks

Peter Singer: Drone Warfare

The Morality of Drone Warfare

DRONE WARS, PART ONE: THE DRONE LANDSCAPE

DRONE WARS, PART TWO: THE DRONE ECONOMY

DRONE WARS, PART THREE: THE DRONE MORALITY

Drone Boom Why Drones Aren’t Just for Dropping Bombs Anymore

Drone Laws Restrict Civilian UAV’s but allow Government

Rise of the Drones(full documentary)HD

RISE OF THE DRONES – NOVA (full documentary)

The Costs of Drone Warfare – Documentary

Richard Clarke – U.S. Drone Program Under Obama “Got Out of Hand”

EVERYONE needs to see this! Drone Strikes

Top 10 Drones in the world

ex CEO Colin Guinn is ALIVE, Files legal Injunction against DJI Innovations

 

Read Full Post | Make a Comment ( None so far )

Nuclear Security Summit 2014 — Loose Nuke War Game — 1 Nuclear Weapon — NYC or Washington? — You Choose — Videos

Posted on March 26, 2014. Filed under: American History, Blogroll, Communications, Constitution, Economics, Employment, Energy, Federal Government, Federal Government Budget, Films, Fiscal Policy, Foreign Policy, government, government spending, Health Care, history, Illegal, Immigration, Law, liberty, Life, Links, Literacy, media, Obamacare, People, Philosophy, Politics, Programming, Psychology, Rants, Raves, Regulations, Resources, Strategy, Talk Radio, Tax Policy, Technology, Unemployment, Video, War, Wealth, Weather, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: Nuclear Security Summit 2014 — Loose Nuke War Game — 1 Nuclear Weapon — NYC or Washington? — You Choose — Videos

first-30-cities-to-be-nuked-in-usa

.Wash.DC.nuke

Dr. Strangelove – Precious Bodily Fluids

Dr. Strangelove (1964) – War Room Scene

“Mein Führer…! I can walk!!”

Dr.strangelove ending (good quality)

Obama: ‘The Prospect of a Nuclear Weapon Going Off In Manhattan’

President Obama Speaks at the Nuclear Security Summit

On the Rhodes 3/25/14 – The G7 & Beyond

Nuclear Security Summit 2014

Nuclear Weapons Materials Gone Missing — Nuclear Security Summit Preview 1 of 2

Nuclear Weapons Materials Gone Missing — Nuclear Security Summit Preview 2 of 2

Nuclear Security Summit 2014 in the Hague – Obama & Xi meet

Effects of a Nuclear Bomb Part 1: A Terrorist Nuke Detonates in a City

Effects of a Nuclear Bomb Part 2; Superpower Weapons

Obama and the plan for World War 3

Washington, D.C. gets NUKED! (DAY AFTER DISASTER)

Who’d survive a nuclear attack on D.C.?

Obama’s war games

Nuclear Terrorism and Malaysia Airlines Flight 370 Connection – YouTube

AE 2010: NYC Nuclear Explosion

ATOMIC ATTACK! – New York City Bombed with Nuclear Weapons – How to Survive

Summit goal: Secure “loose nukes”

2012 Young Atlanticist Summit – Conversation with Elizabeth Sherwood-Randall

Fail Safe ending clip

Fail Safe (2000) World Nuclear Holocaust [full movie]

Nuclear Bomb Test Compilation HD

Top 10 Most Powerful Nuclear Bombs In History

 

 

Merkel miffed at Barack Obama and David Cameron ‘nuclear war game’

World leaders played an interactive nuclear war game designed to test their responses to a terrorist atomic “dirty bomb” attack that threatened the lives of hundreds of thousands of people

 

David Cameron joined Barack Obama, Angela Merkel and Xi Jinping and other world leaders to play a “nukes on the loose” war game to see how they would cope with a terrorist nuclear attack.

The German chancellor grumbled at being asked to play games and take tests with the Prime Minister, US and Chinese presidents around a table with dozens of heads of state at a nuclear summit in The Hague.

Her complaints were overruled because Mr Obama was keen on the idea and in on the surprise.

In the war game, played out by actors in a series of short films, a terrorist attack with an atomic “dirty bomb” takes place in the financial heart of an unnamed but Western metropolis. “It could be the City of London, or Wall Street, Milan or anywhere”, summit leaders were told.

As the scenario unfolded, it emerged that the terrorists are from an unidentified global terror network and they have stolen nuclear material from an unidentified country that had poorly secured its radiological and nuclear stockpiles.

The bomb is being built in a clandestine laboratory with stolen uranium. It is an improvised explosive device but deadly and the clock is ticking, the leaders were told. Hundreds of thousands of people could be about to die.

“They had to give an answer on their own, in real time. It was like a test. It put them on the spot. Should they inform the public or keep them in the dark,” said a diplomatic source.

“Should they work with other countries or stand alone to try to thwart or minimise the attack? How should they make the cold calculation of how to get a more sustainable human cost in terms of deaths?”

Each world leader had a computer tablet with a touch screen options to make one of four responses to a series of four scenario films played by actors and mimicking the famous 1983 Cold War Hollywood thriller “War Games”, where a computer hacker triggers a nuclear missile scare.

In a competitive environment, with a ticking clock, the leaders had to make rapid choices before the results were presented to the group, anonymously stripped of their identities and followed by discussion.

Perhaps predictably at a world summit on nuclear security, the war game found that shared, collective international decisions were able to stop the terrorist network before they could actually build the dirty bomb.

US officials said that the unconventional approach had been designed to give a “scare you to death” shock to make leaders seriously think about the security of nuclear materials.

But not everyone was happy about playing the war game with the grumbling led by Mrs Merkel who was unimpressed with role-playing at such a high-powered gathering. Mr Obama, who helped plan the game, overrode the moaning. He had Elizabeth Sherwood-Randall, his lead national security adviser on the issue, helpfully by his side.

“Leaders had their doubts about participation on their own without their expert civil servants. It was about discussion and problem solving without leaders relying on written statements to read out. At the end the leaders were more enthusiastic,” said a spokesman for the summit.

 

Would you survive a nuclear blast?

Nuclear Blast Mapper on the PBS “Race for the Superbomb” web site show how horribly destructive thermonuclear weapons are. The fission bomb detonated over Nagasaki had an explosive power equivalent to 20,000 tons of TNT. Blast Mapper’s 1-million ton hydrogen bomb, hypothetically detonated on the earth’s surface at any location you choose, has 50 times the explosive power of that 1945 explosion. Video clips of actual A-bomb detonations and their effects can also be viewed at: http://www.pbs.org/wgbh/amex/bomb

The adjoining map of the Tri-Cities, Washington, shows circles of destruction from a 1 megaton surface blast centered on Columbia Center mall.

Blast map key

NOTE: Blast pressure within the circles is greater than the indicated values and is less outside the circles. The zones of destruction in the map are broad generalizations and do not take into account factors such as weather and topography. Fatality numbers do not include the significant delayed effects of trauma, fire, or radioactivity.

12 psi (pounds per square inch), Radius: 1.7 miles

At ground zero lies a crater 200 feet deep and 1000 feet in diameter. The rim of the crater is composed of highly radioactive soil and debris. Nothing recognizable remains within about 0.6 mile from the center except, perhaps, the remains of some buildings’ foundations. At 1.7 miles, only some of the strongest buildings — those made of reinforced, poured concrete — are still standing. Ninety-eight percent of the population within this area are dead immediately.

5 psi, radius – 2.7 miles

Virtually everything is destroyed between the 12 and 5 psi circles. The walls of typical multi-story buildings, including apartment buildings, are completely blown out. The bare, structural skeletons of some buildings rise above the debris as you approach the 5 psi circle. Single-family residences within this area are completely blown away — only their foundations remain. Fifty percent of the population between the 12 and 5 psi circles are dead. Forty percent more are injured.

2 psi, radius – 4.7 miles

Any single-family residences that are not completely destroyed are heavily damaged. The windows of office buildings are blown away, as are some of their walls. Everything on these buildings’ upper floors, including the people who were working there, are thrown onto the street. Substantial debris clutters the entire area. Five percent of the population between the 5 and 2 psi circles are dead. Forty-five percent are injured.

1 psi, radius – 7.4 miles

Residences are moderately damaged. Commercial buildings have sustained minimal damage. Twenty-five percent of the population between the 2 and 1 psi circles have been injured, mainly by flying glass and debris. Many others have suffered flash burns from thermal radiation generated by the explosion.

Fallout effects

Radiation effects are for downwind areas.

Assumptions: wind speed – 15 mph, time frame – 7 days

3,000 rem*, distance – 30 miles

Much more than a lethal dose of radiation. Death can occur within hours of exposure. About ten years will need to pass before levels of radioactivity in this area are low enough to be considered safe by U.S. peacetime standards.

900 rem, distance – 90 miles

A lethal dose of radiation. Death occurs from two to fourteen days.

300 rem, distance – 160 miles

Causes extensive internal damage, including harm to nerve cells and the cells that line the digestive tract. Also results in a loss of white blood cells and temporary hair loss.

90 rem, distance – 250 miles

No immediate harmful effects, but does result in a temporary decrease in white blood cells. Two to three years will need to pass before radioactivity levels in this area are low enough to be considered safe by U.S. peacetime standards.

*rem stands for “roentgen equivalent man.” It is a measurement used to quantify the amount of radiation that will produce certain biological effects.

NOTE: This information is drawn mainly from “The Effects of Nuclear War” (Office of Technology Assessment, Congress of the United States, Washington DC, 1979).

http://www.wcpeace.org/nuc_weapons-1.htm

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-231

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Got Google Glass — Explorer 2.0 With New Form Factor — Department of Homeland Security Questions You! — Videos

Posted on January 21, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Constitution, Crime, Culture, Economics, Education, Employment, Enivornment, Entertainment, External Hard Drives, Federal Government, Films, government, government spending, history, Law, liberty, Life, Links, media, Movies, People, Philosophy, Photos, Rants, Raves, Regulations, Resources, Security, Systems, Talk Radio, Technology, Video, Wisdom, Writing | Tags: , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 194-195

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Story 1: Got Google Glass — Explorer 2.0 With New Form Factor — Department of Homeland Security Questions You! — Videos

google_glass

I used Google Glass

Google Glasses (how it works)

How Guys Will Use Google Glass

Google Glass Review

Google Glass Cracked

CNET Top 5 : Best uses for Google Glass

Introduction to Google Glass

Google Glass Hacked?

Google Glass Explorer Edition: Explained!

Explorer Story: Patrick Jackson [through Google Glass]

Google Glass Explorer Edition 2.0 Unboxing and First Impressions

Amazing Google Glasses Demonstration at Google I/O 2012

GOOGLE GLASS FOR KIDS!

GOOGLE GLASS SUCKS!

Introducing Google Nose

Google Glasses Project

Motion Picture Association of America

“TITS and GLASS”: Porn Blocked from Google Glass

WTF- Porn App Coming Soon On Google Glass

Google Glass Bans PORN

Police Wearing Google Glass-type System to Record Encounters

Story 1: Got Google Glass — Explore 2.0 With New Form Factor — Department of Homeland Security Questions You! — Videos

AMC movie theater calls “federal agents” to arrest a Google Glass user

By: Julie Strietelmeier

A long time Gadgeteer reader contacted me today through Google Hangouts to tell me that he had a story that he thought I’d be interested in reading. He then forwarded me a long email with a story from a very good friend of his. It was such a surprising story that I asked if I could have permission to post it here on The Gadgeteer. I ended up communicating with the author of the story and have posted it here for everyone to read…

I have been using Google Glass for about 2 months now, and about 2 weeks ago I got prescription lenses for the glasses. So in the past two weeks I was wearing Google Glass all the time. There were no stories to write about, until yesterday (1/18/2014).

I went to AMC (Easton Mall, Columbus, OH) to watch a movie with my wife (non- Google Glass user). It is the theater we go to every week, so it has probably been the third time I’ve been there wearing Google Glass, and the AMC employees (guy tearing tickets at the entrance, girl at the concession stand) have asked me about Glass in the past and I have told them how awesome Glass is with every occasion.

Because I don’t want Glass to distract me during the movie, I turn them off (but since my prescription lenses are on the frame, I still wear them). About an hour into the movie (Jack Ryan: Shadow Recruit), a guy comes near my seat, shoves a badge that had some sort of a shield on it, yanks the Google Glass off my face and says “follow me outside immediately”. It was quite embarrassing and outside of the theater there were about 5-10 cops and mall cops. Since I didn’t catch his name in the dark of the theater, I asked to see his badge again and I asked what was the problem and I asked for my Glass back. The response was “you see all these cops you know we are legit, we are with the ‘federal service’ and you have been caught illegally taping the movie”.

I was surprised by this and as I was obviously just having a nice Saturday evening night out with my wife and not taping anything whether legally or illegally, I tried to explain that this is a misunderstanding. I tried to explain that he’s holding rather expensive hardware that costed me $1500 for Google Glass and over $600 for the prescription glasses. The response was that I was searched and more stuff was taken away from me (specifically my personal phone, my work phone – both of which were turned off, and my wallet). After an embarrassing 20-30 minutes outside the movie theater, me and my wife were conducted into two separate rooms in the “management” office of Easton Mall, where the guy with the badge introduced himself again and showed me a different ID. His partner introduced herself too and showed me a similar looking badge. I was by that time, too flustered to remember their names (as a matter of fact, now, over 30 hours later I am still shaking when recounting the facts).

What followed was over an hour of the “feds” telling me I am not under arrest, and that this is a “voluntary interview”, but if I choose not to cooperate bad things may happen to me (is it legal for authorities to threaten people like that?). I kept telling them that Glass has a USB port and not only did I allow them, I actually insist they connect to it and see that there was nothing but personal photos with my wife and my dog on it. I also insisted they look at my phone too and clear things out, but they wanted to talk first. They wanted to know who I am, where I live, where I work, how much I’m making, how many computers I have at home, why am I recording the movie, who am I going to give the recording to, why don’t I just give up the guy up the chain, ’cause they are not interested in me. Over and over and over again.

I kept telling them that I wasn’t recording anything – my Glass was off, they insisted they saw it on. I told them there would be a light coming out the little screen if Glass was on, and I could show them that, but they insisted that I cannot touch my Glass for the fear “I will erase the evidence against me that was on Glass”. I didn’t have the intuition to tell them that Glass gets really warm if it records for more than a few minutes and my glasses were not warm. They wanted to know where I got Glass and how did I came by having it. I told them I applied about 1000 times to get in the explorer program, and eventually I was selected, and I got the Glass from Google. I offered to show them receipt and Google Glass website if they would allow me to access any computer with internet. Of course, that was not an option. Then they wanted to know what does Google ask of me in exchange for Glass, how much is Google paying me, who is my boss and why am I recording the movie.

Eventually, after a long time somebody came with a laptop and an USB cable at which point he told me it was my last chance to come clean. I repeated for the hundredth time there is nothing to come clean about and this is a big misunderstanding so the FBI guy finally connected my Glass to the computer, downloaded all my personal photos and started going though them one by one (although they are dated and it was obvious there was nothing on my Glass that was from the time period they accused me of recording). Then they went through my phone, and 5 minutes later they concluded I had done nothing wrong.

I asked why didn’t they just take those five minutes at the beginning of the interrogation and they just left the room. A guy who claimed his name is Bob Hope (he gave me his business card) came in the room, and said he was with the Movie Association and they have problems with piracy at that specific theater and that specific movie. He gave me two free movie passes “so I can see the movie again”. I asked if they thought my Google Glass was such a big piracy machine, why didn’t they ask me not to wear them in the theater? I would have probably sat five or six rows closer to the screen (as I didn’t have any other pair of prescription glasses with me) and none of this would have happened. All he said was AMC called him, and he called the FBI and “here are two more passes for my troubles”. I would have been fine with “I’m sorry this happened, please accept our apologies”. Four free passes just infuriated me.

Considering it was 11:27pm when this happened, and the movie started at 7.45, I guess 3 and a half hours of my time and the scare my wife went through (who didn’t know what was going on as nobody bothered to tell her) is worth about 30 bucks in the eyes of the Movie Association and the federal militia (sorry, I cannot think of other derogatory words). I think I should sue them for this, but I don’t have the time or the energy to deal with “who is my boss – they don’t want me, they want the big guy” again, so I just spilled the beans on this forum, for other to learn from my experience.

I guess until people get more familiar with Google Glass and understand what they are, one should not wear them to the movies. I wish they would have said something before I went to the movies, but it may be my mistake for assuming that if I went and watched movies two times wearing Glass with no incident the third time there won’t be any incident either. As for the federal agents and their level of comprehension… I guess if they deal with petty criminals every day, everybody starts looking like a petty criminal. Again, I wish they would have listened when I told them how to verify I did nothing illegal, or at least apologize afterwards, but hey… this is the free country everybody praises. Somewhere else might be even worse.

Crazy huh? His story read like something out of the Jack Ryan movie that he and his wife had gone to see. Are there any other Google Glass users out there that have been treated badly just for your wearable tech? If not, are you reconsidering wearing a pair to the next movie you attend?

Update (01/21/14):

Wow, this article has completely blown up our web server due to the traffic. I just wanted to follow up with a few comments and info. First of all, I’m not a journalist, I’m a tech geek writer. Posting this article has given me a good learning lesson though, which I’ll use if I ever post a similar article in the future.

I have been criticized for not citing my sources and following up with the theater to verify that the story was true. I didn’t feel the need at the time because the person who gave me the story is a long time Gadgeteer reader and works in law enforcement. I felt 100% confident the story was not a hoax. I did however call the theater in question and tried to get in touch with someone there for a comment. My calls went unanswered.

After the article was posted. Rob Jackson of Phandroid posted his take on the article and asked me for the author’s contact info. With the author’s permission, I forwarded that info and Rob followed up with some questions and answers that he posted on his site. Take a look for more info on this story:

http://phandroid.com/2014/01/20/fbi-google-glass-movie/

Update #2:

I just received info from the author with regards to the agents that questioned him:

For the sake of having all the facts right.
I have been trying to find out who the agents that “interviewed” me at
AMC were, so I asked help from a guy I know at FBI. I worked with this
guy in the past when I was employed at a webhosting company. He did
some digging, and he tells me the “federal agents”
talking to me were DHS.

Update #3:

The title of the article has been changed to reflect the recent update from the author that it was actually the DHS (Department of Homeland Security) who detained him and not the FBI as he originally thought.

Update #4:

The story has been confirmed. I just received this email from the author:

Julie, Rob.

I spoke with a reporter from Columbus Dispatch, who obtained a
statement from DHS and forwarded it to me. Here it is:

From: Walls, Khaalid H [mailto:Khaalid.H.Walls@ice.dhs.gov]
Sent: Tuesday, January 21, 2014 1:16 PM
To: Allison Manning
Subject: ICE

H Ally,

Please attribute the below statement to me:

On Jan. 18, special agents with ICE’s Homeland Security Investigations
and local authorities briefly interviewed a man suspected of using an
electronic recording device to record a film at an AMC theater in
Columbus. The man, who voluntarily answered questions, confirmed to
authorities that the suspected recording device was also a pair of
prescription eye glasses in which the recording function had been
inactive. No further action was taken.

Khaalid Walls, ICE spokesman

Khaalid Walls
Public Affairs Officer
U.S. Immigration and Customs Enforcement (ICE)

Google Glass at the movies gets man interrogated

A man wearing Google Glass in an Ohio movie theater says the FBI pulled him out and accused him of recording the movie with his device.

There are enemies of the state, and then there are enemies of Jack Ryan.

A Google Glass wearer has told an extraordinary story of going to his local movie theater in Ohio and allegedly being accosted by the FBI for wearing his device.

In an impassioned and slightly shiver-making e-mail to The Gadgeteer, the man, who only gave his initials as T.U., said that he went to the AMC theater at the Easton Mall in Columbus in order to see the new Jack Ryan movie, “Shadow Recruit.”

Google Glass wearers, beware.(Credit: Federal Bureau of Investigations)

He was, he said, wearing Google Glass. His wife accompanied him, Glass-less.

What allegedly transpired was macabre. He wrote that it was not the first time he’d worn Glass to that theater.

However, an hour into the movie: “A guy comes near my seat, shoves a badge that had some sort of a shield on it, yanks the Google Glass off my face and says ‘follow me outside immediately.'”

Outside, he said, was a group of policemen. T.U. says that the man who dragged him out explained he was from the “federal service.”

What was the Glass-wearer’s alleged crime? He was, he said, being accused of recording the movie on his device.

He wrote:

I tried to explain that he’s holding rather expensive hardware that costed me $1500 for Google Glass and over $600 for the prescription glasses. The response was that I was searched and more stuff was taken away from me (specifically my personal phone, my work phone – both of which were turned off, and my wallet).

T.U. insisted that he wasn’t recording anything. The Glass was off. He wasn’t believed.

I kept telling them that I wasn’t recording anything — my Glass was off, they insisted they saw it on. I told them there would be a light coming out the little screen if Glass was on, and I could show them that, but they insisted that I cannot touch my Glass for the fear ‘I will erase the evidence against me that was on Glass’

T.U. said that he was happy for his Google Glass to be hooked up to a laptop to prove there was nothing recorded on it.

He wrote:

The FBI guy finally connected my Glass to the computer, downloaded all my personal photos and started going though them one by one (although they are dated and it was obvious there was nothing on my Glass that was from the time period they accused me of recording). Then they went through my phone, and 5 minutes later they concluded I had done nothing wrong.

Finally, T.U. said that the FBI left and a man from the “Movie Association” entered and told him that they’d had trouble with people recording at that theater. He says he was offered free movie passes to see the Jack Ryan movie again.

In the comments section of her piece, the Gadgeteer’s Julie Strietelmeier insisted: “I talked to the author and know his friend who has frequented The Gadgeteer for years. I believe them and the story.”

I have contacted AMC in an attempt to confirm that the substance of this story is true and will update, should I hear. It will be interesting to see if an anti-Google Glass stance is, indeed, AMC policy.

This is merely the latest incident in which Google Glass has caused consternation. Some bars and restaurants have banned wearers. Only last week, software developer Cecilia Abadie won her case against a ticket for driving while Glassing. Just as T.U. claimed, she said hers was turned off.

T.U. seemed merely relieved that the ordeal — which he said lasted more than three hours — was over. Still, he said he wished someone had told him that wearing Glass at the movie theater wasn’t allowed.

As for the “federal service,” he wasn’t impressed with their alleged lack of understanding about Google Glass. He wrote: “I guess if they deal with petty criminals every day, everybody starts looking like a petty criminal.”

Google Glass is becoming anything but petty.

Google Glass moviegoer detained for hours on suspicion of piracy

A man attending a movie on Saturday at an AMC theater in Columbus, Ohio was pulled from a theater, detained, and questioned for over two hours by US Dept. of Homeland Security special agents tasked with fighting piracy – all for wearing Google Glass.

The man, who asked to remain anonymous, said that about an hour into a 19:45 EST showing of ‘Jack Ryan: Shadow Recruit,’ a man who flashed an official-looking badge “yank[ed] the Google Glass” off his face, asking him to exit the theater. The man was attending the film with his wife at the AMC theater at Easton Town Center.

Two officers then ordered him to hand over his wallet and both his work and personal cell phones, according to tech site The Gadgeteer. The man said he was questioned for 20 or 30 minutes on why he was attempting to record the film. Because he had recently added prescription lenses to his Google Glass, the 35-year-old man wore them into the movie. The device has a voice-activated computer and does have an attached camera.

“I said, ‘Want me to prove I’m not recording the movie? It’s very easy,’” the man told the Columbus Dispatch on Tuesday. He said he indicated to the agents that Google Glass has a USB port where the device can be reviewed. “There’s nothing but pictures of my wife and my dog on it,” he told the agents.

The agents declined, electing to detain and question the man in a downstairs “management” office for around two hours, repeatedly asking the same questions again and again. The man says he was asked who he was working for, how many computers he had at home, why he had attempted to record the film, and “why don’t I just give up the guy up the chain.” The agents, of the US Immigration and Customs Enforcement (ICE), finally reviewed the device to see there was no material of interest. He was allowed to leave just after 23:00 EST, with two free movie passes.

The Columbus Dispatch learned the agents were from ICE’s Homeland Security Investigations unit, which is tasked with combating piracy and counterfeit goods.

ICE spokesman Khaalid Walls said the unit and local authorities “briefly interviewed a man suspected of using an electronic recording device to record a film.”

“The man, who voluntarily answered questions, confirmed to authorities that the suspected recording device was also a pair of prescription eye glasses in which the recording function had been inactive. No further action was taken,” Walls said in a statement.

An AMC spokesman said the Motion Picture Association of America (MPAA) was at the same theater last weekend when the man wearing Google Glass was pointed out. An MPAA representative flagged the man thought to be recording the film for the Department of Homeland Security.

“While we’re huge fans of technology and innovation, wearing a device that has the capability to record video is not appropriate at the movie theater,” AMC’s Ryan Noonan said.

The MPAA said in a statement that it has not seen any reason to believe that Google Glass poses a threat that could lead to film piracy.

The man said he acquired Google Glass in November during Google’s exclusive offer, known as the Explorer program. He and around 30,000 others have paid US$1,500 to test-run the device before it is released to the public later this year. In addition, the prescription lenses cost him $600.

He said he regrets wearing Glass to a movie, despite having done so in the recent past at the same theater without issue.

“I realize it’s stupid to have a device with a camera pointed at the screen,” he said. “But I didn’t even think of it, because I don’t use Google Glass to record other people.”

http://rt.com/usa/google-glass-movie-dhs-piracy-993/

Why a creepy new porn app isn’t bad news for Google Glass

The porn industry has a pretty good track record as an early adopter

By John Aziz

G

oogle promises that Glass, its new augmented reality eyepiece, will open up a new world of hands-free computing — a way to search, translate, record video, and take photographs without having to press buttons or rummage through pockets to retrieve a smartphone or tablet.

There are lots of potential applications. To start things off, Google lists cooking, cycling, skiing, golf, and firefighting — physical activities where holding a device is impractical if not impossible. But really, it was only a matter of time before people began using it for sex.

The first attempt, an app called Tits and Glass, allowed Glass users to stream pornographic images to their headset. The app was promptly banned from Google’s app store, but was recently reinstated.

Now a new app for Glass developed by Lebanese product design student Sherif Maktabi and called Sex with Google Glass lets couples use the wearable technology to record their intimate activities, and — if both partners are wearing a headset — even see sex through their partner’s eyes by streaming the view from their respective devices.

The app is controlled through groan-worthy voice commands. For example, saying “Ok Glass, it’s time” begins the recording process. Once sex is over, recording is ended by the voice command “Ok Glass, pull out.” Video can be replayed for up to five hours before being automatically deleted from the app.

Frankly, I think the idea of having sex while watching a stream from the perspective of your partner sounds narcissistic at best, and mildly disturbing at worst, so I highly doubt that this feature will become immensely popular. And putting a barrier of technology between partners may prove a turnoff and intimacy killer for many.

But Glass as a tool to easily record or stream homemade porn? There is probably a big market for this kind of thing.

Concerns about morals or privacy aside, it’s important to remember that porn is a big driver of technology adoption. The adult film industry has been at the forefront of technology for years, at least since it picked VHS over Betamax. Technological innovations pioneered by the porn industryinclude online payment systems, streaming video and video chat, DVD, and HD video formats.

It’s hard to say at this point if augmented reality computing will usurp smartphones, tablets, and laptops, or if it will remain a niche activity. But if augmented reality computing like Google Glass is really going to take off and become a market leader, it should be expected that sex and porn will be a key driver of adoption. The fact that some people are already using Google Glass for sex paints a rosy picture for the technology in the longer term.

http://theweek.com/article/index/255293/why-a-creepy-new-porn-app-isnt-bad-news-for-google-glass

Read Full Post | Make a Comment ( None so far )

Powder — Videos

Posted on August 2, 2013. Filed under: Blogroll, Communications, Culture, Education, Energy, Entertainment, Farming, Films, liberty, Life, Movies, Video, Wisdom | Tags: , , , , , |

 

powder

Powder

Powder is a film about a boy nicknamed “Powder,” with incredible intellect, telepathy, and paranormal powers. It stars Sean Patrick Flanery in the title role, with Jeff Goldblum, Mary Steenburgen, Bradford Tatum, Lance Henriksen, and Brandon Smith in supporting roles. The film questions the limits of the human mind and body while also displaying our capacity for cruelty; it raises hope that humanity will advance to a state of better understanding.

Powder is a 1995 American drama film written and directed by Victor Salva and starring Sean Patrick Flanery in the title role, with Jeff Goldblum, Mary Steenburgen, Bradford Tatum and Lance Henriksen in supporting roles. It is about a boy nicknamed “Powder”, who has incredible intellect, telepathy and paranormal powers. The film questions the limits of the human mind and body while also displaying our capacity for cruelty, although it raises hope that humanity will advance to a state of better understanding.

Plot

Jeremy Reed, whose nickname is Powder, is an albino young man who has incredible intellect and is able to sense the thoughts of the people around him. Jeremy’s brain possesses a powerful electromagnetic charge, which causes electrical objects to function abnormally when he is around them, as well as when he becomes emotional. The electrical charge also prevents hair from growing on his body. Jeremy’s mother was struck by lightning while pregnant with him; she died shortly after the strike, but Jeremy survived. His father disowned him shortly after his premature birth, and he was raised by his grandparents. Jeremy lived in the basement and worked on their farm but never left their property, learning everything he knew from books. He is taken from his home when his grandfather is found dead of natural causes. Jessie Caldwell (Mary Steenburgen), a child services psychologist called in by Sheriff Doug Barnum, takes him to a boy’s home because he is now effectively a ward of the state.

Jessie enrolls him in high school, where Powder meets physics teacher Donald Ripley. Donald finds out that Powder has supernatural powers as well as the highest IQ in the history of mankind. While his abilities mark him as special, they also make him an outcast. On a hunting trip with his schoolmates, Powder is threatened with a gun by John Box (Bradford Tatum), an aggressive student who views him as a freak. Before John can fire, a gun goes off in the distance and everyone rushes to see that Harley Duncan, one of Doug’s deputy who is hunting with the boys, has shot a doe, which is now dying. Anguished by the animal’s death, Powder touches the deer and Harley, inducing in Harley what the students assume is a seizure. However, Harley admits to Doug that Powder had actually caused him to feel the pain and fear of the dying deer, and he cannot bring himself to take another life. Because of the experience, Harley removes all of his guns from his house although Doug allows him to remain as a sheriff’s deputy without a sidearm.

Doug enlists Powder to help speak to his dying wife through telepathy. Through Powder, the sheriff learns that his wife clings onto life because she didn’t want to leave without her wedding ring on her finger and without him reconciling with his estranged son, Steven. She tells him that Steven found the ring and it has been sitting in a silver box on her nightstand throughout the entire movie. Doug then places the ring on his wife’s finger and reconciles with Steven, letting his wife die peacefully.

Powder meets Lindsey Kelloway, a romantic interest, but their relationship is broken by Lindsey’s father. Before the interruption, he tells Lindsey that he can see the truth about people: that they are scared and feel disconnected from the rest of the world, but in truth are all connected to everything that exists. Powder goes back to the juvenile facility and packs away his belongings, planning to run away to his deceased grandparents’ farm. He pauses in the gym to stare at a male student washing, noticing the latter’s luxurious head of hair as well as body hair which he himself lacks, and is caught at it by John Box, who accuses him of homosexuality. John steals Jeremy’s hat and taunts him, but Powder reveals that John’s words mimic what his stepfather said before beating him when he was 12, further angering him. John and the other boys humiliate Powder, stripping him naked and taunting him. His powers begin to manifest by pulling at their metal buttons and any piercings. Eventually a large spherical electric burst erupts throwing Jeremy in a mud puddle and everyone else to the ground. His classmate John is found still, with his heart stopped. Powder uses an electric shock to revive him.

In the final scene Powder returns to the farm where he grew up, now in probate with the bank, and finds that all of his possessions have been removed. He is joined by Jessie, Donald and Doug, who persuade Powder to come with them to find a place where he will not be feared and misunderstood. Instead, a thunderstorm arrives and he runs into a field where a lightning bolt strikes him, and he disappears in a blinding flash of light.

Cast

Reception[edit]

Powder received generally mixed reviews from critics. It currently holds a rating of 47% (“Rotten”) on Rotten Tomatoes based on 19 reviews, as of May 2011. Caryn James of The New York Times described the film as “lethally dull” and said, “This intensely self-important film has no idea how absurd and unconvincing it is.”[1]

Since its release, the film has grossed approximately $31 million worldwide.

Controversy[edit]

The film’s production by Disney resulted in a controversy over the choice of director Victor Salva, who had been convicted of molesting a 12-year-old child actor in 1988. When Powder was released, the victim came forward again in an attempt to get others to boycott the film in protest at Disney’s hiring Salva. Since then, Disney has not picked up any more pictures by Salva.[2][3]

Remake[edit]

The film was remade by Bollywood under the title of Alag.

References[edit]

  1. ^ James, Caryn (October 27, 1995). “Powder (1995)”. The New York Times. Retrieved May 15, 2011.
  2. ^ Infamy that has no end, Chicago Tribune, October 29, 1995
  3. ^ Victim speaks out against molester, TimesDaily, October 25, 1995

External links[edit]

Read Full Post | Make a Comment ( None so far )

Margaret Thatcher — Rest In Peace — Videos

Posted on April 8, 2013. Filed under: American History, Blogroll, Books, Climate, Communications, Culture, Demographics, Diasters, Economics, Entertainment, European History, Films, government spending, history, Language, Law, liberty, Life, Links, Macroeconomics, media, Microeconomics, Monetary Policy, Movies, People, Philosophy, Rants, Raves, Tax Policy, Taxes, Transportation, Unemployment, Unions, Video, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , |

Margaret_Thatcher

David Cameron’s Commons tribute to Margaret Thatcher in full

Malcolm Rifkind: Working with Margaret Thatcher was ‘never dull’

Margaret Thatcher Dead At 87 – “The Iron Lady” – Stuart Varney

‘Iron Lady’ Margaret Thatcher dies at 87 after stroke

Margaret Thatcher “The Iron Lady” Dead At 87

Obituary: Margaret Thatcher

MARGARET THATCHER DIES AT 87 (WARNING! FLASH PHOTOGRAPHY)

BBC News Announcement – Margaret Thatcher Has Died 

Margaret Thatcher dies: David Cameron pays tribute to ‘patriot Prime Minister’ 

Margaret Thatcher: Boris Johnson pays tribute

Margaret Thatcher changed global political landscape: Tony Blair

Remembering Margaret Thatcher: Pioneering Female Politician

Margaret Thatcher on The MacNeil/Lehrer Report

Thatcher and Reagan’s special relationship

Margaret Thatcher, British Conservative Hero, Dies at 87 

MARGARET THATCHER 30TH ANNIVERSARY CLIPS – ’79 RESULT & JANET BROWN SPOOF

Margaret Thatcher – Capitalism and a Free Society

Margaret Thatcher Dies: How She Ended ‘Nanny State’ 

What did Margaret Thatcher do for Britain’s economy?

Margaret Thatcher dead: A look at her role as MP and mother

Sunrise:        Remembering Margaret Thatcher

Sunrise:        Margaret Thatcher: The early years 

Margaret Thatcher – Thames Television – 1971 -1979

Margaret Thatcher, U.K. Prime Minster, Dies at 87

Margaret Thatcher concerned about “U.S. decline”

The Real Legacy of Margaret Thatcher, Britain’s Iron Lady

Mike Pattison | A former private secretary to Margaret Thatcher

Introducing Margaret Thatcher! 5 March 1975

MARGARET THATCHER book discussion “The Downing Street Years” 1993

Former prime minister Margaret Thatcher discussing her memoirs “The Downing Street Years” with Brian Lamb on 4 November 1993.

margaret thatcher on her path to power

mrs thatcher gives an interview on her early life

Margaret Thatcher on Socialism

Would Hayek Have Approved Obamacare?

 

Margaret Thatcher – Falklands War – YouTube

MARGARET THATCHER – Pt 1 The Making of Margaret (Telegraph Documentary)

MARGARET THATCHER – Pt 2 The Falklands (Telegraph Documentary)

MARGARET THATCHER – Pt 3 World Stage (Telegraph Documentary)

MARGARET THATCHER – Pt 4 The Age of Dissent (Telegraph Documentary)

MARGARET THATCHER – Pt 5 Taking on the Unions (Telegraph Documentary)

MARGARET THATCHER – Pt 6 Public Image, Private Life. (Telegraph Documentary)

MARGARET THATCHER – Pt 7 The Fall (Telegraph Documentary)

MARGARET THATCHER – Pt 8 The Legacy (Telegraph Documentary)

Thatcher: The Downing Street Years (1/4 BBC)

Thatcher: The Downing Street Years (2/4 BBC)

Thatcher: The Downing Street Years (3/4 BBC)

Thatcher: The Downing Street Years (4/4 BBC)

Margaret Thatcher – The Long Walk To Finchley Full Movie

Hitchens ’10: Margaret Thatcher & the Unions 

Hitchens 2010: In Love with Argument

Margaret Thatcher – The Flame of Capitalism

1975 Oct 10 Fr
Margaret Thatcher

Speech to Conservative Party Conference

Document type: speeches
Document kind: Speech
Venue: Winter Gardens, Blackpool
Source: Thatcher Archive: speaking text
Journalist:
Editorial comments: 1045. MT spoke for 41 minute 16 seconds; the BBC Sound Archive has a complete recording. Evening Standard (10 October 1975) noted that the audience applauded every passage of the speech – not one was delivered without interruption. Parts of the text have been checked against material broadcast on ITN during the day.
Importance ranking: Key
Word count: 3722
Themes: Conservative Party (organisation), Autobiographical comments, Conservative Party (history), Economy (general discussions), Labour Party and Socialism, Economy (general discussions), Employment, Public spending and borrowing, Economy (general discussions), Labour Party and Socialism, Foreign policy (USSR and successor states), Foreign policy (Central and Eastern Europe), Economy (general discussions), Labour Party and Socialism, Higher and further education, Industry, Science and technology, Conservatism, Social security and welfare, Labour Party and Socialism, Industry, Conservatism, Labour Party and Socialism, Agriculture, Employment, Labour Party and Socialism, Conservatism, Secondary education, Health policy, Private health care, Labour Party and Socialism, Trade unions, British constitution (general discussions), Law and order, Labour Party and Socialism, Northern Ireland

Note by MT: “Relax. Low Speaking Voice. Not too slow”.

The first Conservative Party Conference I attended was in 1946.

I came to it as an undergraduate representing Oxford University Conservative Association (I know our Cambridge supporters will not mind.) That Conference was held in this very hall and the platform then seemed a long way away, and I had no thought of joining the lofty and distinguished people sitting up there.

But our Party is the Party of equality of opportunity—as you can see. (Laughter).[fo 1]

You will understand, I know, the humility I feel at following in the footsteps of great men like our Leader that year,    Winston         Churchill     a man called by destiny who raised the name of Britain to supreme heights in the history of the free world. (Applause).

In the footsteps of    Anthony         Eden    , who set us the goal of a property-owning democracy—a goal we still pursue today.(Applause).

Of    Harold         Macmillan     whose leadership brought so many ambitions within the grasp of every citizen. (Applause).[fo 2]

Of    Alec         Douglas-Home     whose career of selfless public service earned the affection and admiration of us all. (Applause).

And of    Edward         Heath     who successfully led the Party to victory in 1970 and brilliantly led the nation into Europe in 1973. (Applause).

During my lifetime, all the leaders of the Conservative Party have served as Prime Minister. I hope the habit will continue. (Laughter)

Our leaders have been different men with different qualities and different styles. But they have one thing in common. Each met the challenge-of-his-time.[fo 3]

What is the challenge of our time?

I believe there are two—to overcome the country’s economic and financial problems, and to regain our confidence in Britain and ourselves.

The Economic Challenge

The economic challenge has been debated at length in this hall.

Last week it gave rise to the usual scenes of cordial brotherly strife.[fo 4]

Day after day the comrades called one another far from comradely names, and occasionally, when they remembered, they called us names too.

Some of them, for example, suggested that I criticised Britain when I was overseas. They are wrong.

It wasn’t Britain I was criticising. It was-Socialism. (Applause).

And I will go on criticising Socialism, and opposing Socialism because it is bad for Britain—and Britain and Socialism are not the same thing.[fo 5]

As long as I have health and strength, they never will be. (Applause).

But whatever could I say about Britain that is half as damaging as what this Labour Government have done to our country?

Let’s look at the record.

It is the Labour Government that have caused prices to rise at a record rate of 26 per cent a year.[fo 6]

They told us that the Social Contract would solve everything. But now everyone can see that the so-called contract was a fraud—a fraud for which the people of this country have had to pay a very high price.

It is the Labour Government whose policies are forcing unemployment higher than it need have been—thousands more men and women lose their jobs every day.

There are going to be men and women many of them youngsters straight out of school—who will be without a job this winter because Socialist Ministers spent last year attacking us, instead of attacking inflation.[fo 7]Beginning of section checked against ITN News at Ten, 10 October 1975:

And it’s the Labour Government that have brought the level of production below that of the 3-day week in 1974. W’ve really got a 3-day week now,—only it takes five days to do it. (Applause).

It’s the Labour Government that have brought us record peace-time taxation. They’ve got the usual Socialist disease—they’ve run out of other people’s money. (Laughter).

And it’s the Labour Government that have pushed public spending to record levels.

And how’ve they done it? By borrowing, and borrowing and borrowing.

Never in the field of human credit has so much been owed. (Laughter).End of section checked against ITN News at Ten, 10 October 1975.[fo 8]

But serious as the economic challenge is, the political and moral challenge is just as grave, perhaps more so.

POLITICAL AND MORAL CHALLENGE

Economic problems never start with economics. They have deeper roots—in human nature and in politics.

They don’t finish at economics either.

Labour’s failure to cope, to look at the nation’s problems from the point of view of the whole nation, not just one section of it, has led to loss of confidence and a sense of helplessness.[fo 9]

With it goes a feeling that Parliament, which ought to be in charge, is not in charge—that the actions and the decisions are taken elsewhere.

And it goes deeper than that. There are voices that seem anxious not to overcome our economic difficulties, but to exploit them, to destroy the free enterprise society and put a Marxist system in its place.

Today those voices form a sizeable chorus in the Parliamentary Labour Party. A chorus which, aided and abetted by many Constituency Labour Parties, seems to be growing in numbers.[fo 10]

Anyone who says this openly is promptly accused of seeing Reds Under the Bed.

But look who’s seeing them now!

On his own admission, Mr   Wilson     has at last discovered that his own Party is infiltrated by extreme left-wingers—or to use his own words it is infested with them.

When even Mr Wilson gets scared about their success in capturing key positions in the Labour Party, shouldn’t the rest of us be?[fo 11]

And shouldn’t the rest of us ask him “Where have you been while all this has been going on, and what are you doing about it?” (Applause). The answer is nothing.

I sometimes think the Labour Party is like a pub where the mild is running out. If someone doesn’t do something soon, all that’s left will be bitter. (Laughter). And all that’s bitter will be Left. (Laughter).

Whenever I visit Communist countries, their politicians never hesitate to boast about their achievements.[fo 12]

They know them all by heart and reel off the facts and figures, claiming that this is the rich harvest of the Communist system.

Yet they are not prosperous as we in the West are prosperous, and they are not free as we in the West are free.

Our capitalist system produces a far higher standard of prosperity and happiness because it believes in incentive and opportunity, and because it is founded on human dignity and freedom. (Applause).[fo 13]

Even the Russians have to go to a capitalist country, America to buy enough wheat to feed their people. And that aftermore than 50 years of a State controlled economy.

Yet they boast incessantly while we, who have so much more to boast about, forever criticise and decry.

Isn’t it time we spoke up for our way of life? (Applause) After all, no Western nation has to build a wall round itself to keep its people in. (Applause).[fo 14]

So let us have no truck with those who say the free enterprise system has failed. What we face today is not a crisis of capital ism, but of Socialism. No country can flourish if its economic and social life is dominated by nationalisation and state control.

The cause of our shortcomings does not therefore lie in private enterprise. Our problem is not that we have too little socialism. It is that we have too much.

If only the Labour Party in this country would act like Social Democrats in West Germany. If only they would stop trying to prove their Socialist virility by relentlessly nationalising one industry after another.[fo 15]

Of course, a halt to further State control will not on its own restore our belief in ourselves, because something else is happening to this country. We are witnessing a deliberate attack on our values, a deliberate attack on those who wish to promote merit and excellence, a deliberate attack on our heritage and great past. (Applause).Beginning of section checked against ITN News at Ten, 10 October 1975:

And there are those who gnaw away at our national self-respect, rewriting British history as centuries of unrelieved gloom, oppression and failure.

As days of hopelessness—not Days of Hope.[fo 16]

And others, under the shelter of our education system, are ruthlessly attacking the minds of the young. Everyone who believes in freedom must be appalled at the tactics employed by the far Left in the systematic destruction of the North London Polytechnic. (Applause).

Blatant tactics of intimidation, designed to undermine the fundamental beliefs and values of every student.

Tactics pursued by people who are the first to insist on their own civil rights while seeking to deny them to the rest of us. We must not be bullied and brainwashed out of our beliefs. (Applause).[fo 17]

No wonder so many of our people—some of the best and brightest—are depressed and talk of emigrating.

Even so, I think they are wrong at giving up too soon. Many of the things we hold dear are threatened as never before, but none has yet been lost.

So stay here. (Applause). Stay and help us defeat Socialism, so that the Britain you have known may be the Britain your children will know. (Applause).End of section checked against ITN News at Ten, 10 October 1975.[fo 18]

Those are the two great challenges of our time.

The moral and political challenge, and the economic challenge.

They have to be faced together—and we have to master them both.

POTENTIAL

What are our chances of success? It depends what kind of people we are. Well, what kind of people are we?[fo 19]

We are the people that in the past made Great Britain the Workshop of the World. The people who persuaded others to buy British not by begging them to do so, but because it was best.

We are a people who have received more Nobel prizes than any other nation except America, and head for head we have done better than America. Twice as well, in fact.

We are the people who, among other things, invented the computer, refrigerator, electric motor, stethoscope, rayon, steam turbine, stainless steel, the tank, television, penicillin, radar, jet engine, hovercraft, float glass and carbonfibres. Oh, and the best half of Concorde. (Laughter).[fo 20]

We export more of what we produce than either West Germany, France, Japan or the United States.

And well over 90%; of these exports come from private enterprise. It’s a triumph for the private sector and all who work in it. Let us say so, loud and clear. (Applause).

With achievements like that who can doubt that Britain can have a great future? What our friends abroad want to know is whether that future is going to happen.

Well, how can we Conservatives make it happen?[fo 21]

Many of the details have already been dealt with in the various debates. But policies and programmes should not be just a list of unrelated items. They are part of a total vision of the kind of life we want for our country and our children. [Beginning of section checked against ITN Early Evening News, 10 October 1975] Let me give you my vision.

THE FREE SOCIETY AND THE ECONOMY

A man’s right to work as he will to spend what he earns to own property to have the State as servant and not as master these are the British inheritance.

They are the essence of a free economy. And on that freedom all our other freedoms depend. (Applause).End of section checked against ITN Early Evening News, 10 October 1975.[fo 22]

But we want a free economy, not only because it guarantees our liberties, but also because it is the best way of creating wealth and prosperity for the whole country.

It is this prosperity alone which can give us the resources for better services for the community, better services for those in need. (Applause).

By their attack on private enterprise, this Labour Government have made certain that there will be next to nothing available for improvements in our social services over the next few years.[fo 23]

We must get private enterprise back on the road to recovery, not merely to give people more of their own money to spend as they choose, but to have more money to help the old and the sick and the handicapped.

The way to recovery is through profits. Good profits today, leading to high investment, well-paid jobs and a better standard of living tomorrow. (Applause).

No profits mean no investment, and a dying industry geared to yesterday’s world.

Other nations have recognised that for years now. They are going ahead faster than we are; and the gap between us will continue to increase unless we change our ways.[fo 24]

The trouble here is that for years the Labour Party have made people feel that profits are guilty-unless proved innocent.

But when I visit factories and businesses I do not find that those who actually work in them are against profits. On the contrary, they want to work for a prosperous concern. With a future—their future. (Applause).

Governments must learn to leave these companies with enough of their own profits to produce the goods and jobs for tomorrow.

If the Socialists won’t or can’t there will be no profit making industry left to support the losses caused by fresh bouts of nationalisation.[fo 25]

And if anyone says I am preaching laissez-faire, let me say this.

I am not arguing, and never have argued, that all we have to do is to let the economy run by itself.

I believe that, just as each of us has an obligation to make the best of his talents so governments have an obligation to create the framework within which we can do so. Not only individual people, but individual firms and particularly small firms. (Applause).

Some of these will stay small but others will expand and become the great companies of the future.[fo 26]

The Labour Government have pursued a disastrous vendetta against small businesses and the self-employed. We will reverse their damaging policies. (Applause).

Nowhere is this more important than in Agriculture—one of our most successful industries made up entirely of small businesses. We live in a world in which food is no longer cheap or plentiful. Everything we cannot produce here must be imported at a high price.

Yet the Government could not have destroyed the confidence of the industry more effectively if they had tried deliberately to do so, with their formula of empty promises and penal taxation.[fo 27]

So today what is the picture? Depressed profits, low investment, no incentive, and overshadowing everything government spending, spending far beyond the taxpayers means. (Applause).

To recover, to get from where we are to where we want to be, will take time.

“Economic policy” wrote    Maynard         Keynes     “should not be a matter of tearing up by the roots but of slowly training a plant to grow in a different direction.”[fo 28]

It will take time to reduce public spending, rebuild profits and incentives, to benefit from the investments which must be made. The sooner that time starts, the better for Britain’s unemployed.

One of the reasons why this Labour Government has incurred more unemployment than any Conservative Government since the War is because they have concentrated too much on distributing what we have, and too little on seeing that we have more. (Applause).[fo 29]

We Conservatives hate unemployment.

We hate the idea of men and women not being able to use their abilities. We deplore the waste of national resources, and the deep affront to peoples’ dignity from being out of work through no fault of their own. (Applause).

It is ironic that we should be accused of wanting unemployment to solve our economic problems by the very Government which has produced a record post-War unemployment, and is expecting more.[fo 30]

The record of Mr Wilson and his colleagues on this is unparallelled in the history of political hypocricy.

We are now seeing the full consequences of nearly twenty months of Labour Government.

They have done the wrong things at the wrong time in the wrong way.

They have been a disaster for this country.[fo 31]

EQUALITY

Now let me turn to something I spoke about in America.

Some Socialists seem to believe that people should be numbers in a State computer. We believe they should be individuals.

We are all unequal. No one, thank heavens, is like anyone else, however much the Socialists may pretend otherwise.

We believe that everyone has the right to be unequal but to us every human being is equally important.[fo 32]

Engineers, miners, manual workers, shop assistants, farm workers, postmen, housewives—these are the essential foundations of our society. Without them there would be no nation. (Applause).

But their are others with special gifts who should also have their chance, because if the adventurers who strike out in new directions in science, technology, medicine, commerce and industry the arts are hobbled, there can be no advance.

The spirit of envy can destroy. It can never build.[fo 33]

Everyone must be allowed to develop the abilities he knows he has within him, and she knows she has within her, in the way they choose.

CHOICE

Freedom to choose is something we take for granted—until it is in danger of being taken away.

Socialist governments set out perpetually to restrict the area of choice, Conservative governments to increase it.

We believe that you become a responsible citizen by making decisions yourself, not by having them made for you.[fo 34]

But they are made for you under Labour all right.

Take education.

Beginning of section checked against ITN News at Ten, 10 October 1975:

Our education system used to serve us well. A child from an ordinary family, as I was, could use it as a ladder as an advancement.

But the Socialists are better at demolition than reconstruction, are destroying many good grammar schools.

Now this is nothing to do with private education. It’s opportunity and excellence in our State schools that are being diminished under Socialism.

And naturally enough, parents don’t like this. But in a Socialist society parents should be seen and not heard. (Laughter).[fo 35]

And another denial of choice is being applied to health.

The private sector helps to keep some of our best doctors here, and so are available part time to the National Health Service. It also helps to bring in more money for the general health of the nation.

But under Labour, private medicine is being squeezed out, and the result will be to add to the burden on the National Health Service without adding one penny to its income.[fo 36]

Let me make this absolutely clear.

When we return to power we shall reverse Mrs   Castle    ‘s stupid and spiteful attack on hospital pay beds. (Applause).

We Conservatives do not accept that because some people have no choice, no one should have it.

Every family should have the right to spend their money, after tax, as they wish, not as the Government dictates.End of section checked against ITN News at Ten, 10 October 1975.

Let us extend choice, the will to choose and the chance to choose.[fo 37]

TRADE UNIONS

I want to come now to the argument which Mr Wilson is trying to put across the country: namely that the Labour Party is the natural party of Government because it is the only one that the Trade Unions will accept.

From what I saw on television last week, the Labour Party did not look like a party of Government at all, let alone a natural one.

But let’s examine the argument.Beginning of section checked against ITN First Report, 10 October 1975

If we are to be told that a Conservative Government could not govern because certain extreme leaders would not let it, then General Elections are a mockery we’ve arrived at[fo 38] the one party state, and parliamentary democracy in this country will have perished. (Applause).

The democracy for which our fathers fought and died is not to be laid to rest as lightly as that.

When the next Conservative Government comes to power many Trade Unionists will have put it there. Millions of them vote for us at every Election.

I want to say this to them, and to every one of our supporters in industry.[fo 39]

Go out and join in the work of your Union.

Go to its meetings—and stay to the end.

Learn the Union rules as well as the Far Left know them, and remember this. If Parliamentary democracy dies, free Trade Unions die with it. (Applause).End of section checked against ITN First Report, 10 October 1975.[fo 40]

RULE OF LAW

I come last to what many would put first. The Rule of Law.

The first people to uphold the law should be governments. It is tragic that the Socialist Government, to its lasting shame, should have lost its nerve and shed its principles over the People’s Republic of Clay Cross. And that a group of the Labour Party should have tried to turn the Shrewsbury pickets into martyrs.

On both occasions the law was broken. On one, violence was done.[fo 41]No decent society can live like that. No responsible party should condone it. (Applause).

The first duty of Government is to uphold the law. If it tries to bob and weave and duck around that duty when its inconvenient, if government does that, then so will the governed, and then nothing is safe—not home, not liberty, not life itself.

There is one part of this country where tragically defiance of the law is costing life day after day.[fo 42]

In Northern Ireland our troops have the dangerous and thankless task of trying to keep the peace and hold the balance. We are proud of the way they have discharged their duty.

This Party is pledged to support the unity of the United Kingdom. To preserve that unity and to protect the people, Catholic and Protestant alike, we believe that our armed forces must remain until a genuine peace is made.

Our thoughts are with them, and our pride is with them too. (Applause).[fo 43]

I have spoken of the challenges that face us here in Britain. The challenge to recover economically. The challenge to recover our belief in ourselves.

I have shown our potential for recovery.

I have dealt with some aspects of our strength and approach.

And I have tried to tell you something of my personal vision, my belief in the standards on which this nation was greatly built, on which it greatly thrived, and from which in recent years it has greatly fallen away.[fo 44]

We are coming, I think, to yet another turning point in our long history.

We can go on as we have been going and continue down.

Or we can stop—and with a decisive act of will we can say “Enough”.

Let us, all of us, here today and others, far beyond this hall who believe in our cause make that act of will.

Let us proclaim our faith in a new and better future for our Party and our people.[fo 45]

Let us resolve to heal the wounds of a divided nation.

And let that act of healing be the prelude to a lasting victory. (Prolonged applause).

http://www.margaretthatcher.org/document/102777

Note by MT: “It’s over!”

Related Posts On Pronk Palisades

Conservative savior of UK’s economy, Margaret Thatcher dead at 87 — Videos

Claire Berlinski–Why Margaret Thatcher Matters: “There Is No Alternative”–Videos

Friedrich August von Hayek: Fighting the Planners — The Road To Serfdom — A Profile in Liberty — Videos

Read Full Post | Make a Comment ( None so far )

« Previous Entries

Liked it here?
Why not try sites on the blogroll...