Friends

Orson Scott Card — Xenocide — Videos

Posted on April 29, 2017. Filed under: American History, Art, Blogroll, Books, College, Crisis, Cult, Culture, Education, Entertainment, Fiction, Films, Food, Freedom, Friends, Genocide, government spending, history, Law, liberty, Life, Links, Literacy, Literature, Mastery, media, Movies, Movies, People, Philosophy, Photos, Police, Rants, Raves, Regulations, Religion, Religious, Speech, Strategy, Success, Terrorism, Video, War, Wisdom, Work, Writing | Tags: , , , , , , |

Image result for xenocide orson scott card

Image result for enders game Book Covers

Image result for xenocide orson scott card

Xenocide cover.jpg

Ender’s Game Trailer

Ender’s Game – Colonel Graff Recruits Ender

Ender’s Game Dragon Army Vs Salamander & Leopard

Ender’s Game — Molecular Detachment Device and Ending

Ender’s Game Final / Last Battle Scene!

Ender’s Game | The way we win matters.

Ender’s Game (2013) – Final Few Scenes

Ender’s Game: Creating a Zero-G Battle Room Effects Exclusive-Design FX-WIRED

Orson Scott Card discusses the ‘Ender’s Game’ movie

Interview with Orson Scott Card

Orson Scott Card Interview HD

Published on Apr 19, 2015

World renowned, Orson Scott Card, author of the New York Times Bestseller and Hugo Award winner Ender’s Game and many more, joined Kimberly Quigley in her big red booth for a chat. Not only is he funny and kind but also very humble. His mind has created entire worlds for millions to enjoy. They sit and talk about how he got into writing, about his many novels, about the Ender phenomena, the movie and his future movie plans. Hear Orson’s wonderful advice for aspiring writers. He talks about this and more in this fun half hour interview. Get to know the amazing Orson Scott Card, on The Red Booth!

What is Orson Scott Card’s favorite book? (extended answer)

A Brief Interview with Orson Scott Card (extended answers)

Orson Scott Card on Libraries

Orson Scott Card on literature, logic and scientific method

Orson Scott Card – On the State of Israel

Creative education–how to keep the spark alive in children and adults | Orson Scott Card | TEDxUSU

Published on Dec 6, 2014

This talk was given at a local TEDx event, produced independently of the TED Conferences. Orson Scott Card discusses the importance of creativity and how it can be fostered.

Orson Scott Card is the author of the novels Ender’s Game, Ender’s Shadow, and Speaker for the Dead, which are widely read by adults and younger readers, and are increasingly used in schools. His most recent series, the young adult Pathfinder series (Pathfinder, Ruins, Visitors) and the fantasy Mithermages series (Lost Gate, Gate Thief), are taking readers in new directions. Besides these and other science fiction novels, Orson writes contemporary fantasy (Magic Street, Enchantment, Lost Boys), biblical novels (Stone Tables, Rachel and Leah), the American frontier fantasy series The Tales of Alvin Maker (beginning with Seventh Son), poetry (An Open Book), and many plays and scripts, including his “freshened” Shakespeare scripts for Romeo & Juliet, The Taming of the Shrew and The Merchant of Venice. Orson was born in Washington and grew up in California, Arizona, and Utah. He served a mission for the LDS Church in Brazil in the early 1970s. Besides his writing, he teaches occasional classes and workshops and directs plays. He frequently teaches writing and literature courses at Southern Virginia University. Orson currently lives in Greensboro, North Carolina, with his wife, Kristine Allen Card, where his primary activities are writing a review column for the local Rhino Times and feeding birds, squirrels, chipmunks, possums and raccoons on the patio.

Orson Scott Card On Science Fiction and Religion

‘Enders Game’ Writer’s Ridiculous Racist Rant Against Obama

Ender’s Game – Book vs Movie Part 1/2

Ender’s Game – Book vs Movie Part 2/2

5 REASONS WHY I LIKED THE ENDER’S GAME SERIES

Ender’s Game Cast chat Orson Scott Card controversy

EDA #4 – Orson Scott Card is a Dick

Ender’s Game Xenocide Book 3 Audiobook Part 1

Top 10 Best Books In the Ender Series

Ender’s Game by Orson Scott Card (Book Summary and Review) – Minute Book Report

Xenocide

From Wikipedia, the free encyclopedia
Xenocide
Xenocide cover.jpg

Cover of first edition (hardcover)
Author Orson Scott Card
Country United States
Language English
Series Ender’s Game series
Genre Science fiction
Published 1991 (Tor Books)
Media type Print (Hardcover, Paperback & ebook)
Pages 592 pp
ISBN 0-312-85056-5
OCLC 22909973
813/.54 20
LC Class PS3553.A655 X46 1991
Preceded by Speaker for the Dead
Followed by Children of the Mind

Xenocide (1991) is the third science fiction novel in the Ender’s Game series of books by Orson Scott Card. It was nominated for both the Hugo and Locus Awards for Best Novel in 1992.[1] The title is a combination of ‘xeno-‘, meaning alien, and ‘-cide’, referring to the act of killing; altogether referring to the act of selectively killing populations of aliens, a play on genocide.

Plot summary

On Lusitania, Ender finds a world where humans and pequeninos and the Hive Queen could all live together; where three very different intelligent species could find common ground at last. Or so he thought.

Lusitania also harbors the descolada, a virus that kills all humans it infects, but which the pequininos require in order to become adults. The Starways Congress so fears the effects of the descolada, should it escape from Lusitania, that they have ordered the destruction of the entire planet, and all who live there. With The Fleet on its way, a second xenocide seems inevitable.[2]

Lusitania

Following the events of Speaker for the Dead, a group of characters are depicted living as members of a Brazilian Catholic human colony on Lusitania, a unique planet inhabited by the only other two known species of sentient alien life: the Pequeninos “little ones” and the Hive Queen. The pequeninos are native to the planet, while the Hive Queen was transplanted to this world by Ender, partly in penance for his near-total destruction of her Formic species in Ender’s Game.

The Lusitanian ecosystem is pervaded by a complex virus, dubbed ‘Descolada’ (Portuguese for “no longer glued”) by humans. The Descolada breaks apart and rearranges the basic genetic structure of living cells. It is extremely adaptable to any species or form of known life, and easily transmissible. The native pequeninos and other life that survived on Lusitania after the Descolada’s introduction to the planet thousands (or millions) of years ago are adapted to it. As a result of the deadly virus, the Lusitanian ecosystem is severely limited. Staying alive on Lusitania takes immense effort and research on the part of the Hive Queen and the humans, as they are not adapted to the descolada. Near the end of the story, it is revealed the Descolada is possibly an artificially engineered virus designed to terraform planets, but the original creators of the virus are unknown, and there remains a slim chance it evolved naturally.

After the rebellion of the small human colony on Lusitania in Speaker for the Dead to protect the future of the intelligent alien species, Starways Congress sends a fleet to Lusitania to regain control, which will take several decades to reach its destination. Valentine Wiggin, under her pseudonym Demosthenes, publishes a series of articles revealing the presence of the “Little Doctor” planet-annihilating weapon on the Fleet. Demosthenes calls it the “Second Xenocide,” as using the weapon will result in the obliteration of the only known intelligent alien life. She also claims it to be a brutal crackdown of any colony world striving for autonomy from Starways Congress. Public anger spreads through humanity, and rebellions nearly ensue on several colonies.

After quelling much public discontent, Starways Congress finishes their analysis of the situation while the fleet is en route. Fearing the Descolada virus, further rebellions by colony worlds, and other possible unknown political motives, Starways Congress attempts to relay an order to the fleet to annihilate Lusitania upon arrival. After conferring with friends on whether a cause is worth dying for, Jane (a compassionate AI living in the interstellar ansible communication network) shuts off transmissions to the fleet to block the order. As a consequence of this action, she risks her eventual discovery and death, should the government shut down and wipe the interplanetary network. No known smaller computer system can house her consciousness.

On Lusitania itself, Ender attempts to find solutions to the looming catastrophes of the Congressional fleet, Descolada virus, and conflicts among the humans and intelligent alien species. Much on Lusitania centers around the Ribeira family, including Ender’s wife Novinha and her children. Novinha and Elanora, the mother-daughter team responsible for most of the biological advances countering the complex Descolada virus, are unsure if they can manufacture a harmless replacement virus. Conflicts arise on whether they should even do so, since the Descolada is intrinsically tied in with the life cycles of all Lusitanian organisms and may even be sentient itself. In addition, to try to devise methods to escape the planet, Lusitania’s leading, troublemaking physicist Grego is persuaded by Ender to research faster-than-light travel, despite Grego scoffing at the idea. The third biologista of the family, Quara, is convinced that the Descolada is an intelligent, self-aware species, and deserves attempts from the humans for communication and preservation. An additional sibling and Catholic priest, Quim (Father Estevão), is determined to use faith and theology to head off another form of xenocide: a group of warmongering Pequenino wish to wipe out all Earthborn life via starship, carrying the deadly Descolada within them.

World of Path

Starways Congress wants its fleet back. After all else fails, it sends the dilemma of the fleet’s impossible disappearance to several citizens of the world of Path, a cultural planetary enclave modeled on early China. Path’s culture centers on the godspoken – those who hear the voices of the gods in the form of irresistible compulsions, and are capable of significantly superior intelligence. It later becomes clear that the godspoken of Path are victims of a cruel government project: granted great intelligence by genetic modification, they were also shackled with a form of obsessive-compulsive disorder to control their loyalty. The experiment is set in a culture bound by five dictates – obey the gods, honor the ancestors, love the people, serve the rulers, then serve your self. This is a further safeguard against rebellion. The superintelligent godspoken are considered the most devout and holy of all citizens, and any disloyal thoughts in a godspoken’s mind are immediately suppressed by overwhelming obsessive-compulsive behavior, believed to be a sign from the gods the thoughts are wrong. The most respected godspoken on Path is Han Fei-Tzu, for devising a treaty to prevent the rebellion of several colony worlds after the articles published by Demosthenes. Great things are expected of his daughter and potential successor Han Qing-jao, “Gloriously Bright”. While doubting the existence of the gods himself, Han Fei-Tzu promised his dying wife he would raise Qing-jao with an unwavering belief in the godspoken. The two of them are tasked by Starways Congress with deciphering the disappearance of the Lusitania Fleet. Han Qing-jao’s secret maid, Si Wang-mu, aids her in this task, her intelligence (partially) unfettered by the rigid caste system.

The young and naive Qing-jao eventually traces the identity of Demosthenes. Discovering that Demosthenes is Valentine Wiggin, Ender’s sister – but that Valentine has been on a starship en route to Lusitania for the last thirty years – Qing-Jao concludes that the only possible explanation is advanced computer software closely tied to the communication network. This software must be hiding Demosthenes and publishing her work, while also causing the disappearance of the Fleet. All but discovered, Jane reveals herself to Han Fei-tzu, Han Qing-jao and Si Wang-mu, telling them about their genetic slavery and begging forbearance on their report to Starways Congress.

Already harboring suspicions about the godspoken’s condition, Han Fei-tzu accepts the news of Congress’s atrocity, as does Si Wang-mu, but his daughter Han Qing-jao clings to her belief that Demosthenes and Jane are enemies of the gods. Feeling betrayed by her father, who is violently incapacitated by OCD from the disloyal thoughts, Qing-jao argues with Jane. Jane threatens shutting off all communications from Path, but Si Wang-mu realizes this would eventually lead to the planet’s destruction by Starways Congress. Understanding Jane to be truly alive and compassionate, through tears Si Wang-mu states Jane will not block the report. However, Qing-jao compares Jane to the servants in Path’s caste system, merely a computer program designed to serve humans, containing neither autonomy nor awareness.

Knowing she has exhausted her last possibilities of stopping Qing-jao, Jane sacrifices her future and life, unwilling to bring harm to Qing-jao or the people of Path. A triumphant Qing-jao reports the knowledge of Demosthenes, Jane, and the fate of the Fleet to Starways Congress. Qing-jao recommends a coordinated date set several months from the present, to prepare the massive undertaking of setting up clean computers across the interplanetary network, after which the transition to a new system will kill Jane and allow Congress full control again. Allowing the message to be sent, Jane restores communication with the Fleet, and Congress re-issues the order for the Fleet to obliterate Lusitania.

Han Fei-tzu recovers from the incapacitation of his OCD, despairing over his daughter’s actions, and his unwitting aid in deeply brainwashing her to serve Congress. He and Si Wang-mu assist Jane and those on Lusitania in finding solutions to their impending catastrophes. Planter, a Pequenino on Lusitania, offers his life for an experiment to determine whether the Descolada gives Pequeninos sentience, or if they have the ability innately. Eventually, Elanora Ribeira is able to come up with a possible model for a “recolada:” a refit of the Descolada that allows the native life to survive and retain self-awareness, but doesn’t seek to kill all other life forms. With the available equipment, however, the recolada is impossible to make, and they are running out of time against the soon-to-arrive Fleet.

Outside

While this research takes place, tragedies occur on Lusitania. Father Estevão Ribeira, the priest attempting to sway a distant warmongering sect of the Pequeninos from their goal of attacking humanity, is killed by the Fathertree Warmaker, who took Quim hostage and denied him the food with the anti-descolada chemicals, so the descolada infected and killed him on the 7th day of being hostage. Grego Ribeira spurs a riot of humans to burn down the warmaker’s forest, but the violent mob gets out of his control, and rampages through the neighboring Pequenino forest instead, massacring many of its inhabitants – the original friends and allies of humanity. Under the terms of the treaty with Pequeninos, the Hive Queen is brought in to hold the peace, setting a perimeter guard of hive drones around the human colony and preventing further escalation of violence between the two groups. Grego is locked in jail, despite eventually stepping between the surviving Pequeninos and his own riot. The town realizes their horrific rage, and constructs a chapel surrounding the fallen priest’s grave, trying to find penance for their actions.

Finally, a breakthrough is made. Knowing the Ansible communication network allows instantaneous transfer of information, and through knowledge of how the Hive Queen gives sentience to child queens, Jane, Grego, and Olhado discover the “Outside”. The Outside is a spacetime plane where aiúas initially exist. (Aiúa is the term given to the pattern defining any specific structure of the universe, whether a particular atom, a star, or a sentient consciousness.) Formic hive queens are called from Outside after birth, giving awareness to the new body. Jane is able to contain within her vast computing power the pattern defining the billions of atoms and overall structure comprising a simple “starship” (little more than a room), with passengers included, and take them Outside. By bringing them Outside, where relative location is nonexistent, then back “Inside” at a different spot in the physical universe, instantaneous travel has been achieved, finally matching the instantaneous communication of the Ansibles and Formics. They quickly arrange to take Ender, Ela, and Miro to Outside. While Ela is Outside, she is able to create the recolada virus, which is a safe replacement of the descolada, and a cure to the godspoken genetic defect. Miro envisions his body as it was before he was crippled by paralysis, and upon arrival in the Outside, his consciousness is contained within a new, restored body. Ender discovers, however, the surreal unwitting creation of a new “Valentine” and new “Peter Wiggin” from his subconscious, who embody idealized forms of his altruistic and power-hungry sides.

The recolada begins its spread across Lusitania, converting the formerly lethal virus into a harmless aid to native life. The cure to the people of Path’s genetic-controlling defect is distributed, yet Han Fei-tzu is tragically unable to convince his daughter Qing-jao this was the true course of action. Confronted with the possibility of being lied to all her life and dooming many sentient species to destruction, or an alternative of believing all she ever loved and trusted has betrayed her – Demosthenes, her father, her friend, her world. Qing-jao instead continues her godspoken rite of woodgrain tracing until her death and is honored by those on Path who still believe in the gods as the last true godspoken. She is elevated to god status after her death. Si Wang-mu sets off with Peter to take control over Starways Congress to stop the Fleet closing in on Lusitania. The new Valentine-persona journeys to find a planet to which the population of Lusitania can evacuate. The stage is set for the final book of the four-part series, Children of the Mind.

Connection to “Gloriously Bright”

Parts of “Gloriously Bright” from the January 1991 issue of Analog Science Fiction and Fact are republished in Xenocide as parts of Chapters 1, 3, 5, 7, 9, and 11.[3]

See also

References

External links

https://en.wikipedia.org/wiki/Xenocide

Orson Scott Card

From Wikipedia, the free encyclopedia
Orson Scott Card
Orson Scott Card at BYU Symposium 20080216 closeup.jpg

Born August 24, 1951 (age 65)
Richland, Washington
Residence Greensboro, North Carolina
Nationality American
Alma mater Brigham Young University
University of Utah (M.A.)
University of Notre Dame (1980s graduate student)
Occupation Author, critic, playwright / script writer, poet, public speaker, essayist, political activist, Prof. of Writing and Literature[1]
Notable work Ender’s Game series,
The Tales of Alvin Maker
Style Science fiction, fantasy, thriller, horror, historical fiction and fantasy and biblical fiction, LDS fiction
Board member of Public television station UNC-TV(2013–present)[2]
National Organization for Marriage (2009–2013)[3]
Spouse(s) Kristine Allen Card
Awards Selected list:
Hugo Award (Ender’s Game, 1986
Speaker for the Dead, 1987
How to Write Science Fiction and Fantasy, 1991)

Nebula Award (Ender’s Game,1986
Speaker for the Dead, 1987
“Eye for Eye,” 1988)
Website www.hatrack.com
 
Signature
Signature Orson Scott Card.svg

Orson Scott Card (born August 24, 1951) is an American novelist, critic, public speaker, essayist, and columnist. He writes in several genres but is known best for science fiction. His novel Ender’s Game (1985) and its sequel Speaker for the Dead (1986) both won Hugo[5][6] and Nebula Awards,[5][7]making Card the only author to win both science fiction’s top U.S. prizes in consecutive years.[8][9] A feature film adaptation of Ender’s Game, which Card co-produced, was released in late October 2013 in Europe and on November 1, 2013, in North America.[10]

Card is a professor of English at Southern Virginia University,[11] has written two books on creative writing, hosts writing bootcamps and workshops, and serves as a judge in the Writers of the Future contest.[12] A great-great-grandson of Brigham Young, Card is a practicing member of The Church of Jesus Christ of Latter-day Saints (LDS Church). In addition to producing a large body of fiction works, he has also offered political, religious, and social commentary in his columns and other writing.

Early life

Card is the son of Willard Richards Card and Peggy Jane (née Park), the third of six children and the older brother of composer and arranger Arlen Card.[13][14][15] Card was born in Richland, Washington, and grew up in Santa Clara, California as well as Mesa, Arizona and Orem, Utah. He served as a missionary for the LDS Church in Brazil and graduated from Brigham Young University (BYU) and the University of Utah; he also spent a year in a Ph.D. program at the University of Notre Dame.

For part of the 1970s Card worked as an associate editor of the Ensign, an official magazine of the LDS Church.[16]

Card lives in Greensboro, North Carolina,[13] a place that has played a significant role in Ender’s Game and many of his other works.

Fiction

Card began his writing career primarily as a poet, studying with Clinton F. Larson at BYU. During his studies as a theater major, he began “doctoring” scripts, adapting fiction for readers theater production, and finally writing his own one-act and full-length plays, several of which were produced by faculty directors at BYU. He also explored fiction writing, beginning with stories that eventually evolved into The Worthing Saga.

After returning to Provo, Utah from his LDS mission in Brazil, Card started the Utah Valley Repertory Theatre Company, which for two summers produced plays at “the Castle”, a Depression-era outdoor amphitheater behind the state psychiatric hospital in Provo; his company’s were the first plays ever produced at the Castle. Meanwhile, he took part-time employment as a proofreader at BYU Press, then made the jump to full-time employment as a copy editor. In 1976, in the midst of a paid role performing in the church’s musical celebrating America’s Bicentennial, he secured employment as an assistant editor at the Ensign, and moved to Salt Lake City. It was while working at Ensign that Card published his first piece of fiction. His short story “Gert Fram” appeared in the July 1977 fine arts issue of that magazine under the pseudonym Byron Walley.

Science fiction

He wrote the short story “Ender’s Game” while working at the BYU press, and submitted it to several publications. The idea for the later novel of the same title came from the short story about a school where boys can fight in space. It was eventually purchased by Ben Bova at Analog Science Fiction and Fact and published in the August 1977 issue. Meanwhile, he started writing half-hour audioplays on LDS Church history, the New Testament, and other subjects for Living Scriptures in Ogden, Utah; on the basis of that continuing contract, some freelance editing work, and a novel contract for Hot Sleep and A Planet Called Treason, he left Ensign and began supporting his family as a freelancer.

He completed his master’s degree in English at the University of Utah in 1981 and began a doctoral program at the University of Notre Dame, but the recession of the early 1980s caused the flow of new book contracts to temporarily dry up. He returned to full-time employment as the book editor for Compute! magazine in Greensboro, North Carolina, in 1983. In October of that year, a new contract for the Alvin Maker “trilogy” (now up to six books) allowed him to return to freelancing.

Ender’s Game and its sequel Speaker for the Dead were both awarded the Hugo Award and the Nebula Award, making Card the only author (as of 2015) to win both of science fiction’s top prizes in consecutive years. Card continued the series with Xenocide, Children of the Mind, Ender’s Shadow, Shadow of the Hegemon, Shadow Puppets, “First Meetings in the Enderverse“, Shadow of the Giant, Shadows in Flight, the 2007 release of A War of Gifts, and the 2008 release of Ender in Exile, a book that takes place after Ender’s Game and before Speaker for the Dead. Card has also announced his plan to write Shadows Alive, a book that connects the “Shadow” series and “Speaker” series together. He later also wrote the first formic war saga: Earth Unaware, Earth Afire, and Earth Awakens as a prequel to the Ender novels. This trilogy relays, among other things, the history of Mazer Rackham. In 2008 Card announced that Ender’s Game would be made into a movie, but that he did not have a director lined up (Wolfgang Petersen had previously been scheduled to direct the movie but subsequently moved on to other projects.) It was to be produced by Chartoff Productions, and Card was writing the screenplay himself.[17] The film was made several years later, and released in 2013, with Asa Butterfield in the title role and Gavin Hood directing.

Other works include the alternative histories The Tales of Alvin Maker, Pastwatch: The Redemption of Christopher Columbus, The Homecoming Saga, and Hidden Empire, a story about a near-future civil war in the United States, based on the Xbox Live Arcade video game Shadow Complex. He collaborated with Star Wars artist Doug Chiang on Robota and with Kathryn H. Kidd on Lovelock.

Other genres

He has since branched out into other areas of fiction with novels such as Lost Boys, Treasure Box and Enchantment. Other works include the novelization of the James Cameron film The Abyss, and the comic book Ultimate Iron Man for Marvel Comics’ Ultimate Marvel Universe series. Outside the world of published fiction, Card contributed dialog to at least three video games: Loom, The Secret of Monkey Island and The Dig in the early 1990s.[18]

In 1983 Card published the novel Saints, a historical fiction based loosely on one of his ancestors and her experiences coming into the LDS Church during the early portion of its movement. It continues through her eyes into subsequent events up until the granting of Statehood to Utah.

In 2000, Card published the first novel in The Women of Genesis series. This series explores the lives of the principal women mentioned in the first book of the Bible and includes Sarah (2000), Rebekah (2002), and Rachel and Leah (2004).

In the fall of 2005, Card launched Orson Scott Card’s InterGalactic Medicine Show.[19] He edited the first two issues, but found that the demands of teaching, writing, and directing plays for his local church theater group made it impossible to respond to writers’ submissions in a timely manner; former Card student and experienced freelance writer and editor Edmund R. Schubert took over as editor on June 1, 2006.

The dialog and screenplay (but not the story) for the Xbox video game Advent Rising was written by Card and Cameron Dayton.[20]

In 2008, Card’s novella Hamlet’s Father, a retelling of Shakespeare‘s Hamlet, was published in the anthology The Ghost Quartet (Tor Books). The work re-interpreted all of the characters’ personalities and motivations.

Pseudonyms

Over the years Orson Scott Card has used at least seven pseudonyms.

The names Frederick Bliss and P.Q. Gump were used by Card when he was asked to write an overview of Mormon playwrights “Mormon Shakespeares: A Study of Contemporary Mormon Theatre” for Spring 1976 issue of Sunstone magazine. According to Card he used these pseudonyms because the article included a brief reference to himself and his play “Stone Tables”.[21]

The name Byron Walley was used by Card on his first published piece of fiction “Gert Fram” which appeared in the July 1977 fine arts issue of Ensign magazine. According to Card he used this name because he had a non-fiction article, “Family Art”, a poem, “Looking West”, and a short play, “The Rag Mission”, appearing in the same issue.[21] Card also used the name Byron Walley in stories he published in Friend magazine, New Era magazine and in the anthology Dragons of Darkness. Stories by Byron Walley include: “Gert Fram“, Ensign magazine, July 1977; “Bicicleta“, Friend magazine, October 1977; “The Best Family Home Evening Ever“, Friend magazine, January 1978; “Billy’s Box“, Friend magazine, February 1978; “I Think Mom and Dad Are Going Crazy, Jerry“, New Era magazine, May 1979; and “Middle Woman“, Dragons of Darkness, Ace Books, 1982.

The name Brian Green was also used by Card in the July 1977 fine arts issue of Ensign magazine. He used this name for his short play “The Rag Mission” because he had three other pieces appearing in the same issue.[21]

The name Dinah Kirkham was used to write the short story “The Best Day“, in 1983.[22]

The name Noam D. Pellume was used by Card for his short story “Damn Fine Novel” which appeared in the October 1989 issue of The Green Pages.[23]

Card wrote the novel Zanna’s Gift (2004) under the pen name Scott Richards, saying, “I was trying to establish a separate identity in the marketplace, but for various reasons the marketing strategy didn’t work as we’d hoped.”[24]

On writing

Teaching

In 2005, Card accepted a permanent appointment as “distinguished professor” at Southern Virginia University in Buena Vista, Virginia, a small liberal arts college run according to the principles of The Church of Jesus Christ of Latter-day Saints. Card has cited his frustration with the dismal teaching methodology for creative writing in most universities as a reason for accepting this position, along with his desire to teach the techniques of effective fiction writing to writers whose values are more congruent with his own.[11] Card has worked closely with colleagues to develop ways to educate aspiring writers and has published two books on the subject. He was eager for the opportunity to apply these techniques in a university environment—his assorted workshops did not allow the follow-through he desired. After being deeply moved by stories of his students’ parents in some of their essays, he decided to stop teaching regularly at the university to spend time with his youngest child who still lives at home.[25][non-primary source needed] Card returned to teaching for the spring semester of 2009.

Books on writing

Card has written two books on the subject of creative writing – Characters and Viewpoint, published in 1988, and How to Write Science Fiction and Fantasy, published in 1990. He was also a co-writer for How to Write a Million (though his contribution is actually a reprint of an earlier work).

Card also offered advice about writing in an interview in Leading Edge #23 in 1991.

Writers of the Future

Card serves as a judge in Writers of the Future,[12] a science fiction and fantasy story contest for amateur writers. It originated in the early 1980s by L. Ron Hubbard, a science fiction writer and the founder of the Church of Scientology, and continues to be funded and organized by Author Services Inc., an entity that manages Hubbard’s literary work.

Children’s books

Card won the ALA Margaret Edwards Award in 2008 for his contribution in writing for teens, selected by a panel of YA librarians.[26] “What have I done that made some wonderfully deluded people think that I should get the [award] for lifetime achievement in writing young adult fiction?” he asked in his address, and asserted that “There is no such thing as children’s literature.” Furthermore:[27]

I have not worked with YA editors; my work has never been marketed that way until Tor put a YA cover and a new ISBN on Ender’s Game — fifteen years after the book first came out, and long after it had become popular with young readers. Ender’s Game was written with no concessions to young readers. My protagonists were children, but the book was definitely not aimed at kids. I was perfectly aware that the rule of thumb for children’s literature is that the protagonist must be a couple of years older than the target audience. You want ten-year-old readers, you have a twelve-year-old hero.

At the beginning of the book, Ender is six. Who, exactly, is the target audience?

Poetry

Card created a website, Strong Verse that publishes poetry from authors living and dead with the aim of showcasing works that present a clear message in clear language. The following motto appears on the website’s header: “Good poetry is meant to be understood, not decoded.”[28]

Opinion

Since 2001, Card’s commentary[29] includes the political columns “War Watch”, “World Watch”, or “Civilization Watch” (depending on Card’s topic) and the column “Uncle Orson Reviews Everything,” all published at the Greensboro Rhinoceros Times. The last-named column features personal reviews of movies, books, and restaurants in the greater Greensboro area, in addition to a variety of other topics.[30] The column also later appears on his website, Hatrack River. Since 2008 Card has written a column for the Mormon Times.

Politics

Card’s vocal opposition to same-sex marriage and other views on homosexuality led to a boycott of the film version of Ender’s Game[31] – a development which itself received criticism.[32] Owing to political developments, by the early 2010s Card believed the question of U.S. legalization of same-sex marriage moot.[33]

Describing himself as a political liberal[34] and moral conservative,[35] Card’s ideals concerning society—as well as foundational themes within his fiction—are described as communitarian.[34][36][37] In 2000, Card said, “Most of the program of both the left and the right is so unbelievably stupid it’s hard to wish to identify myself with either. But on economic matters, I’m a committed communitarian. I regard the Soviet Union as simply state monopoly capitalism. It was run the way the United States would be if Microsoft owned everything. Real communism has never been tried! I would like to see government controls expanded, laws that allow capitalism to not reward the most rapacious, exploitative behavior. I believe government has a strong role to protect us from capitalism.”[38]

A vocal supporter of the U.S.’s War on Terror,[39][40] according to Salon, Card is close to neoconservative concerning foreign policy issues.[41]

Views on U.S. presidential politics

A member of the U.S. Democratic Party since 1976,[42] Card supported Republican presidential candidates John McCain in 2008[43] and Newt Gingrich.[44]

In an August 2013 essay, he presented as an experiment in fictional writing of “The game of Unlikely Events”,[45] Card described an alternative future in which President Barack Obama ruled as a “Hitler– or Stalin-style dictator” with his own national police force of young unemployed men; Obama and his wife Michelle would have amended the U.S. Constitution to allow presidents to remain in power for life, as in Nigeria, Zimbabwe, and Hitler’s Germany.[46][47] Card’s essay drew criticism, especially for alleged insensitivity in its reference to urban gangs.[48][49][50]

Views about homosexuality

Card has publicly declared his opposition to homosexuality and same-sex marriage.[41][51] In a 1990 essay he wrote that the laws prohibiting homosexual behavior should remain on the books and be enforced in order to “send a message” that those who break those laws “cannot be permitted to remain as acceptable, equal citizens”.[41][52] In May 2013, however, Card wrote that since the US Supreme Court had ruled those laws unconstitutional in 2003, he has “no interest in criminalizing homosexual acts”.[53]

In a 2008 opinion piece in the Mormon church’s newspaper he wrote that “no matter how close the bonds of affection and friendship might be” for a same-sex couple, their relationship will never be “the same as the coupling between a man and a woman”. He additionally stated that any government attempting to change the definition of marriage is his “mortal enemy” and that he would “act to destroy that government and bring it down”.[54] In 2009 he joined the board of directors of the National Organization for Marriage, a group that campaigns against same-sex marriage,[41] but later resigned from the board in mid-2013.[31] Card has stated that there is “no need to legalize gay marriage”.[55]

Card has also expressed his opinion that paraphilia and homosexuality are linked. In 2004, he claimed that it’s a “myth that homosexuals are ‘born that way‘” and the “dark secret” of homosexuality was that it often resulted from “disturbing seduction”, “rape”, or child abuse.[31][41][55] Additionally, in Card’s 2008 novella Hamlet’s Father, which re-imagines the backstory of Shakespeare’s play Hamlet, Card was accused of directly trying to link the king’s pedophilia with homosexuality. The novella prompted public outcry and its publishers were inundated with complaints.[56][57] Trade journal Publishers Weekly criticized Card’s work, stating that the main purpose of it was to attempt to link homosexuality to pedophilia.[58] Card responded to the claim: “…[T]here is no link whatsoever between homosexuality and pedophilia in this book. Hamlet’s father, in the book, is a pedophile, period. I don’t show him being even slightly attracted to adults of either sex. It is the reviewer, not me, who has asserted this link, which I would not and did not make.”[57]

In 2013, Card was selected as a guest author for DC Comics‘s new Adventures of Superman comic book series,[59] but controversy over Card’s views on homosexuality led illustrator Chris Sprouse to leave the project[60] and DC Comics to put Card’s story on hold indefinitely.[61] A few months later an LGBT group, Geeks OUT!, proposed a boycott of the movie adaptation of Ender’s Game calling Card’s view anti-gay,[62][63] causing the movie studio Lionsgate to publicly distance itself from Card’s opinions.[64]

In July 2013, one week after the U.S. Supreme Court issued rulings in two cases that were widely interpreted as favoring recognition of same-sex marriages, Card wrote in Entertainment Weekly that the gay marriage issue is moot due to the Supreme Court’s decision on DOMA.[33] He further stated, “now it will be interesting to see whether the victorious proponents of gay marriage will show tolerance toward those who disagreed with them when the issue was still in dispute.”[33]

Religion

Card’s membership in The Church of Jesus Christ of Latter-day Saints has been an important facet of his life from early on. He is a great-great-grandson of Brigham Young, the second Latter-day Saint prophet, and all of Card’s ancestors for at least three generations have been members of the LDS Church. His ancestors include several other figures notable in the LDS Church, including the Cardston colony founder Charles Ora Card. As such, his faith has been a source of inspiration and influence for both his writing and his personal views.[14] Since 2008 Card has written a column of Latter-day Saint devotional and cultural commentary for the Sunday national edition of the Deseret News (formerly “the Mormon Times“).[65]

Personal life

Card (right) signing autographs at New York Comic Con in 2008

Card and his wife, Kristine, have had five children, each named after one or more authors he and his wife admire. Their children’s names are Michael Geoffrey (Geoffrey Chaucer), Emily Janice (Emily Brontë and Emily Dickinson), Charles Benjamin (Charles Dickens), Zina Margaret (Margaret Mitchell) and Erin Louisa (Louisa May Alcott). Charles, who had cerebral palsy, died shortly after his 17th birthday and their daughter Erin died the day she was born.[13] Card and his wife live with their youngest child, Zina, in Greensboro, North Carolina.[13]

The life of their son, Charles, influenced some of Card’s fiction, most notably the Homecoming series, Lost Boys and Folk of the Fringe. Their daughter, Emily, along with two other writers, adapted Card’s short stories “Clap Hands and Sing“, “Lifeloop” and “A Sepulchre of Songs” for the stage in Posing as People.[66]

In 2008, he appeared in the short film The Delivery, which starred his daughter, Emily. He plays an author reading an audiobook in this film, which won First Place in Fantasy at Dragon*Con Film Festival. He wrote an original story, “The Emperor of the Air,” specifically for the short film by Gabrielle de Cuir and Stefan Rudnicki.

Card is an avid fan of the science fiction television series Firefly and makes an appearance in the documentary Done the Impossible about Firefly fandom.

Card suffered a mild stroke on January 1, 2011, and was briefly hospitalized. He reported expecting to make a full recovery despite impairment of his left hand.[67][68]

Awards

The ALA Margaret A. Edwards Award recognizes one writer and a particular body of work for “significant and lasting contributions to young adult literature”. Card won the annual award in 2008, citing Ender’s Game (1985), which inaugurated the science fiction Ender Saga, and Ender’s Shadow (1999), the so-called parallel novel featuring another boy in the Battle School. According to the citation, the two boys’ “experiences echo those of teens, beginning as children navigating in an adult world and growing into a state of greater awareness of themselves, their communities and the larger universe.”[26] In the same year, Card won the Lifetime Achievement Award for Mormon writers (Whitney Awards).[69]

He has also won numerous awards for single works.

Works

In 1978, the Harold B. Lee Library acquired the Orson Scott Card papers, which included Card’s works, writing notes and letters, and in 2007 the collection was formally opened.[74][75][76]

See also

https://en.wikipedia.org/wiki/Orson_Scott_Card

Read Full Post | Make a Comment ( None so far )

National Security Agency Is Spying On All American Who Use The Internet and Telephone System and They Collect and Store All Your Communications — Includes Trump and Associates — No Warrant Required If President Obama Designates You A Target — Congress Is Enabling The Turnkey Two Party Tyranny — Warrentless Searches — Congress Does Nothing To Stop It! — Videos

Posted on March 17, 2017. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Data, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, European History, External Hard Drives, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Friends, government spending, Heroes, history, Illegal, Immigration, Internal Revenue Service (IRS), IRS, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Sociology, Space, Spying, Strategy, Supreme Court, Systems, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for NSA utah data center

Image result for NSA utah data centerImage result for NSA utah data centerImage result for National security agencyImage result for National security agency

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Published on Jul 8, 2013

The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

If you think you can handle the truth, well here it is folks

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show] 

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

Polygraphin

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting[edit]

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]

Computing[edit]

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[168]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[171] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[175] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[176] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[177] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[175]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[174]

Following the signing in 1946–1956[178] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[179] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[180] New Zealand.[181]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[192]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[193] Today it is a legacy system, and several NSA stations are closing.[175]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[194] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[195]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[206]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[219]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[224] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[225] based on documentation provided by former AT&T technician Mark Klein.[226]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235] Rasmussen Reports found that 59% of Americans disapprove,[236] Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]

July 2015 – WikiLeaks: Espionage against German federal ministries[edit]

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]

Suspected responsibility for hacking operations by the Equation Group[edit]

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31

Software backdoors

Linux kerne

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[263]However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[264]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
Microsoft Windows
Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]

Role in scientific research and development[

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[278]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[279][280]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[281]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[280]
  • KY-57 VINSON tactical radio voice encryptor[281]
  • KG-84 Dedicated Data Encryption/Decryption[281]
  • STU-III secure telephone unit,[281] phased out by the STE[282]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]

Legality

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs

In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

https://en.wikipedia.org/wiki/National_Security_Agency

Read Full Post | Make a Comment ( None so far )

The Rise and Fall of The Roman Empire — Videos

Posted on March 11, 2017. Filed under: American History, Blogroll, Books, Constitution, Corruption, Crisis, Cult, Culture, Documentary, Economics, Elections, Employment, European History, Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Illegal, Immigration, Language, Law, Legal, liberty, Life, Links, Literacy, media, People, Philosophy, Photos, Political Correctness, Politics, Psychology, Raves, Religious, Security, Speech, Strategy, Success, Torture, Video, War, Wealth, Weapons, Weather, Welfare, Wisdom, Work, Writing | Tags: , , , , , |

Will Durant — Why Rome Fell

The Truth About The Fall of Rome: Modern Parallels

Are We Rome? Ben Powell Compares the U.S. with the Roman Empire

Are We Rome

DECLINE of EMPIRES: The Signs of Decay

The Judge on the Decline and Fall of Roman Empire and Future of America

The 7 Signs Of An Empire In Decline

The Roman Empire – Episode 1: The Rise of the Roman Empire (History Documentary)

The Roman Empire – Episode 2: Legions of Conquest (History Documentary)

The Roman Empire – Episode 3: Seduction of Power (History Documentary)

The Roman Empire – Episode 4: Grasp Of An Empire (History Documentary)

The Roman Empire – Episode 5: Cult Of Order (History Documentary)

The Roman Empire – Episode 6: The Fall Of The Roman Empire (History Documentary)

The Roman Empire – Episode 7: Letters From The Roman Front (History Documentary)

Rome: The Rise and Fall of an Empire – Episode 8: Wrath of the Gods (Documentary)

Rome: The Rise and Fall of an Empire – Episode 9: The Soldier’s Emperor (Documentary)

Rome: The Rise and Fall of an Empire – Episode 10: Constantine the Great (Documentary)

Rome: The Rise and Fall of an Empire – Episode 11: The Barbarian General (Documentary)

Rome: The Rise and Fall of an Empire – Episode 12: The Puppet Master (Documentary)

Rome: The Rise and Fall of an Empire – Episode 13: The Last Emperor (Documentary)

[History] The Decline and Fall of the Roman Empire Volume 1, Part 1, Audiobook

[History] The Decline and Fall of the Roman Empire Volume 1, Part 2, Audiobook

[History Audiobook] The Decline and Fall of the Roman Empire, Volume 2, Part 1

[History Audiobook] The Decline and Fall of the Roman Empire, Volume 2, Part 2

The History of the Decline and Fall of the Roman Empire

From Wikipedia, the free encyclopedia
  (Redirected from Rise and fall of rome)
This article is about the book. For the historical events, see History of the Roman Empire and Fall of the Western Roman Empire. For the historiography spawned by Gibbon’s theories, see Historiography of the fall of the Western Roman Empire. For publication details and chapter listings, see Outline of The History of the Decline and Fall of the Roman Empire.
The History of the Decline and Fall of the Roman Empire
Author Edward Gibbon
Country England
Language English
Subject History of the Roman Empire
Publisher Strahan & Cadell, London
Publication date
1776–89
Media type Print
LC Class DG311

Edward Gibbon (1737–1794).

The History of the Decline and Fall of the Roman Empire[1] is a book of history written by the English historian Edward Gibbon, which traces the trajectory of Western civilization (as well as the Islamic and Mongolian conquests) from the height of the Roman Empire to the fall of Byzantium. It was published in six volumes. Volume I was published in 1776 and went through six printings.[2] Volumes II and III were published in 1781;[3][4] volumes IV, V, and VI in 1788–89.[5][6][7] The original volumes were published in quarto sections, a common publishing practice of the time. The work covers the history, from 98 to 1590, of the Roman Empire, the history of early Christianity and then of the Roman State Church, and the history of Europe, and discusses the decline of the Roman Empire in the East and West. Because of its relative objectivity and heavy use of primary sources, unusual at the time, its methodology became a model for later historians. This led to Gibbon being called the first “modern historian of ancient Rome”.[8]

Contents

Thesis

Gibbon offers an explanation for the fall of the Roman Empire, a task made difficult by a lack of comprehensive written sources, though he was not the only historian to attempt the task.[9]

According to Gibbon, the Roman Empire succumbed to barbarian invasions in large part due to the gradual loss of civic virtue among its citizens.[10] They had become weak, outsourcing their duty to defend their empire to barbarian mercenaries, who then became so numerous and ingrained that they were able to take over the Empire. Romans, he believed, were unwilling to live a tougher, military lifestyle. In addition, Gibbon argued that Christianity created a belief that a better life existed after death, which fostered an indifference to the present among Roman citizens, thus sapping their desire to sacrifice for a larger purpose. He also believed that Christianity’s comparative pacifism tended to hamper the traditional Roman martial spirit. Finally, like other Enlightenment thinkers and British citizens of the age steeped in institutional anti-Catholicism, Gibbon held in contempt the Middle Ages as a priest-ridden, superstitious Dark Age. It was not until his own era, the “Age of Reason,” with its emphasis on rational thought, it was believed, that human history could resume its progress.[11]

Gibbon saw the Praetorian Guard as the primary catalyst of the empire’s initial decay and eventual collapse, a seed planted by Augustus when the empire was established. His writings cite repeated examples of the Praetorian Guard abusing their power with calamitous results, including numerous instances of imperial assassination and incessant demands for increased pay.

He compared the reigns of Diocletian (284–305) and Charles V (1519–1556), noting superficial similarities. Both were plagued by continual war and compelled to excessive taxation to fund wars, both chose to abdicate as Emperors at roughly the same age, and both chose to lead a quiet life upon their retirement. However, Gibbon argues that these similarities are only superficial and that the underlying context and character of the two rulers is markedly different.

Style

Gibbon’s style is frequently distinguished by an ironically detached and somewhat dispassionate yet critical tone. He occasionally lapsed into moralization and aphorism:

[A]s long as mankind shall continue to bestow more liberal applause on their destroyers than on their benefactors, the thirst of military glory will ever be the vice of the most exalted characters.

The influence of the clergy, in an age of superstition, might be usefully employed to assert the rights of mankind; but so intimate is the connection between the throne and the altar, that the banner of the church has very seldom been seen on the side of the people (Chapter Three p. 52).

History…is, indeed, little more than the register of the crimes, follies, and misfortune of mankind (ibid. p. 69).

If we contrast the rapid progress of this mischievous discovery [of gunpowder] with the slow and laborious advances of reason, science, and the arts of peace, a philosopher, according to his temper, will laugh or weep at the folly of mankind (Chapter 65, p. 68).[Page numbers in which edition? clarification needed]

Citations and footnotesen humorous style, and have been called “Gibbon’s table talk.”[12] They provide an entertaining moral commentary on both ancient Rome and 18th-century Great Britain. This technique enabled Gibbon to compare ancient Rome to his own contemporary world. Gibbon’s work advocates a rationalist and progressive view of history.

Gibbon’s citations provide in-depth detail regarding his use of sources for his work, which included documents dating back to ancient Rome. The detail within his asides and his care in noting the importance of each document is a precursor to modern-day historical footnoting methodology.

The work is notable for its erratic but exhaustively documented notes and research. John Bury, following him 113 years later with his own History of the Later Roman Empire, commended the depth and accuracy of Gibbon’s work. Unusually for 18th century historians, Gibbon was not content with second-hand accounts when the primary sources were accessible. “I have always endeavoured”, Gibbon wrote, “to draw from the fountain-head; that my curiosity, as well as a sense of duty, has always urged me to study the originals; and that, if they have sometimes eluded my search, I have carefully marked the secondary evidence, on whose faith a passage or a fact were reduced to depend.”[13] The Decline and Fall is a literary monument and a massive step forward in historical method.[14]

Criticism

Numerous tracts were published criticizing his work. In response, Gibbon defended his work with the 1779 publication of, A Vindication … of the Decline and Fall of the Roman Empire.[15] His remarks on Christianity aroused particularly vigorous attacks, but in the mid-twentieth century, at least one author claimed that “church historians allow the substantial justness of [Gibbon’s] main positions.”[16]

Number of Christian martyrs

Gibbon challenged Church history by estimating far smaller numbers of Christian martyrs than had been traditionally accepted. The Church’s version of its early history had rarely been questioned before. Gibbon, however, knew Church writings were secondary sources, and he shunned them in favor of primary sources.

Christianity as a contributor to the fall and to stability: chapters XV, XVI

Volume I was originally published in sections, as was common for large works at the time. The first two were well received and widely praised. The last quarto in Volume I, especially Chapters XV and XVI, was highly controversial, and Gibbon was attacked as a “paganist“. Voltaire was deemed to have influenced Gibbon’s claiming that Christianity was a contributor to the fall of the Roman Empire. As one pro-Christian commenter put it in 1840:

As Christianity advances, disasters befall the [Roman] empire—arts, science, literature, decay—barbarism and all its revolting concomitants are made to seem the consequences of its decisive triumph—and the unwary reader is conducted, with matchless dexterity, to the desired conclusion—the abominable Manicheism of Candide, and, in fact, of all the productions of Voltaire’s historic school—viz., “that instead of being a merciful, ameliorating, and benignant visitation, the religion of Christians would rather seem to be a scourge sent on man by the author of all evil.”[17]

Gibbon thought that Christianity had hastened the Fall, but also ameliorated the results:

As the happiness of a future life is the great object of religion, we may hear without surprise or scandal that the introduction, or at least the abuse of Christianity, had some influence on the decline and fall of the Roman empire. The clergy successfully preached the doctrines of patience and pusillanimity; the active virtues of society were discouraged; and the last remains of military spirit were buried in the cloister: a large portion of public and private wealth was consecrated to the specious demands of charity and devotion; and the soldiers’ pay was lavished on the useless multitudes of both sexes who could only plead the merits of abstinence and chastity. Faith, zeal, curiosity, and more earthly passions of malice and ambition, kindled the flame of theological discord; the church, and even the state, were distracted by religious factions, whose conflicts were sometimes bloody and always implacable; the attention of the emperors was diverted from camps to synods; the Roman world was oppressed by a new species of tyranny; and the persecuted sects became the secret enemies of their country. Yet party-spirit, however pernicious or absurd, is a principle of union as well as of dissension. The bishops, from eighteen hundred pulpits, inculcated the duty of passive obedience to a lawful and orthodox sovereign; their frequent assemblies and perpetual correspondence maintained the communion of distant churches; and the benevolent temper of the Gospel was strengthened, though confirmed, by the spiritual alliance of the Catholics. The sacred indolence of the monks was devoutly embraced by a servile and effeminate age; but if superstition had not afforded a decent retreat, the same vices would have tempted the unworthy Romans to desert, from baser motives, the standard of the republic. Religious precepts are easily obeyed which indulge and sanctify the natural inclinations of their votaries; but the pure and genuine influence of Christianity may be traced in its beneficial, though imperfect, effects on the barbarian proselytes of the North. If the decline of the Roman empire was hastened by the conversion of Constantine, his victorious religion broke the violence of the fall, and mollified the ferocious temper of the conquerors (chap. 38).[18]

Tolerant paganismast 200 years, and whose most eminent representative is Gibbon. Gibbon had written:

The various modes of worship which prevailed in the Roman world were all considered by the people as equally true; by the philosophers as equally false; and by the magistrate as equally useful.

Drake counters:

With such deft strokes, Gibbon enters into a conspiracy with his readers: unlike the credulous masses, he and we are cosmopolitans who know the uses of religion as an instrument of social control. So doing, Gibbon skirts a serious problem: for three centuries prior to Constantine, the tolerant pagans who people the Decline and Fall were the authors of several major persecutions, in which Christians were the victims. …Gibbon covered this embarrassing hole in his argument with an elegant demur. Rather than deny the obvious, he adroitly masked the question by transforming his Roman magistrates into models of Enlightenment rulers — reluctant persecutors, too sophisticated to be themselves religious zealots.

Misinterpretation of Byzantium

Others such as John Julius Norwich, despite their admiration for his furthering of historical methodology, consider Gibbon’s hostile views on the Byzantine Empire flawed and blame him somewhat for the lack of interest shown in the subject throughout the 19th and early 20th centuries.[19] This view might well be admitted by Gibbon himself: “But it is not my intention to expatiate with the same minuteness on the whole series of the Byzantine history.”[20] However the Russian historian George Ostrogorsky writes, “Gibbon and Lebeau were genuine historians — and Gibbon a very great one — and their works, in spite of factual inadequacy, rank high for their presentation of their material.”[21]

Gibbon’s reflections

Gibbon’s initial plan was to write a history “of the decline and fall of the city of Rome”, and only later expanded his scope to the whole Roman Empire.[22]

Although he published other books, Gibbon devoted much of his life to this one work (1772–89). His autobiography Memoirs of My Life and Writings is devoted largely to his reflections on how the book virtually became his life. He compared the publication of each succeeding volume to a newborn child.[23]

Editions

Gibbon continued to revise and change his work even after publication. The complexities of the problem are addressed in Womersley’s introduction and appendices to his complete edition.

  • In-print complete editions
    • J.B. Bury, ed., 7 volumes (London: Methuen, 1909–1914), currently reprinted (New York: AMS Press, 1974). ISBN 0-404-02820-9.
    • Hugh Trevor-Roper, ed., 6 volumes (New York: Everyman’s Library, 1993–1994). The text, including Gibbon’s notes, is from Bury but without his notes. ISBN 0-679-42308-7 (vols. 1–3); ISBN 0-679-43593-X (vols. 4–6).
    • David Womersley, ed., 3 volumes. hardback-(London: Allen Lane, 1994); paperback-(New York: Penguin Books, 2005;1994). Includes the original index, and the Vindication (1779), which Gibbon wrote in response to attacks on his caustic portrayal of Christianity. The 2005 print includes minor revisions and a new chronology. ISBN 0-7139-9124-0 (3360 p.); ISBN 0-14-043393-7 (v.1, 1232 p.); ISBN 0-14-043394-5 (v.2, 1024 pages); ISBN 0-14-043395-3 (v.3, 1360 pages)
  • In-print abridgements
    • David Womersley, ed., 1 volume (New York: Penguin Books, 2000). Includes all footnotes and seventeen of the original seventy-one chapters. ISBN 0-14-043764-9, 848 pages
    • Hans-Friedrich Mueller, ed., one volume abridgment (New York: Random House, 2003). Includes excerpts from all seventy-one chapters. It eliminates footnotes, geographic surveys, details of battle formations, long narratives of military campaigns, ethnographies and genealogies. Based on the Rev. H.H. [Dean] Milman edition of 1845 (see also Gutenberg etext edition). ISBN 0-375-75811-9, (trade paper, 1312 pages); ISBN 0-345-47884-3 (mass market paper, 1536 pages)

Legacy

Many writers have used variations on the series title (including using “Rise and Fall” in place of “Decline and Fall”), especially when dealing with large nations or empires. Piers Brendon notes that Gibbon’s work, “became the essential guide for Britons anxious to plot their own imperial trajectory. They found the key to understanding the British Empire in the ruins of Rome.”[24]

and in film:

and in television:

The title and author are also cited in Noël Coward‘s comedic poem “I Went to a Marvellous Party“.[25] And in the poem “The Foundation of Science Fiction Success“, Isaac Asimov acknowledged that his Foundation series—an epic tale of the fall and rebuilding of a galactic empire—was written “with a tiny bit of cribbin’ / from the works of Edward Gibbon”.[26]

In 1995, an established journal of classical scholarship, Classics Ireland, published punk musician’s Iggy Pop‘s reflections on the applicability of The Decline and Fall of the Roman Empire to the modern world in a short article, Caesar Lives, (Vol. 2, 1995) in which he noted “America is Rome. Of course, why shouldn’t it be? We are all Roman children, for better or worse… I learn much about the way our society really works, because the system-origins – military, religious, political, colonial, agricultural, financial – are all there to be scrutinized in their infancy. I have gained perspective.” [27]

See also

Notes

  1. Jump up^ sometimes shortened to Decline and Fall of the Roman Empire
  2. Jump up^ Edward Gibbon (1776). The History of the Decline and Fall of the Roman Empire. I. W. Strahan and T. Cadell.
  3. Jump up^ Edward Gibbon (1781). The History of the Decline and Fall of the Roman Empire. II.
  4. Jump up^ Edward Gibbon (1781). The History of the Decline and Fall of the Roman Empire. III.
  5. Jump up^ Edward Gibbon (1788). The History Of The Decline And Fall Of The Roman Empire. IV. Strahan and Cadell.
  6. Jump up^ Edward Gibbon (1788). The History of the Decline and Fall of the Roman Empire. V. W. Strahan and T. Cadell.
  7. Jump up^ Edward Gibbon (1788). The History of the Decline and Fall of the Roman Empire. VI.
  8. Jump up^ David S. Potter (2006-05-22). A Companion to the Roman Empire. Wiley. p. 100. ISBN 978-0-631-22644-4.
  9. Jump up^ see for example Henri Pirenne’s (1862–1935) famous thesis published in the early 20th century. As for sources more recent than the ancients, Gibbon certainly drew on Montesquieu‘s short essay, Considérations sur les causes de la grandeur des Romains et de leur décadence, and on previous work published by Bossuet (1627-1704) in his Histoire universelle à Monseigneur le dauphin (1763). see Pocock, EEG. for Bousset, pp. 65, 145; for Montesquieu, pp. 85–88, 114, 223.
  10. Jump up^ J.G.A. Pocock, “Between Machiavelli and Hume: Gibbon as Civic Humanist and Philosophical Historian,” Daedalus 105,3(1976), 153–169; and in Further reading: Pocock, EEG, 303–304; FDF, 304–306.
  11. Jump up^ J.G.A. Pocock, “Between Machiavelli and Hume: Gibbon as Civic Humanist and Philosophical Historian,” Daedulus 105,3(1976), 153–169; and in Further reading: Pocock, EEG, 303–304; FDF, 304–306.
  12. Jump up^ Saunders, Dero A., ed. (1952). Decline and Fall of the Roman Empire. New York: Penguin. p. 23 (Introduction).
  13. Jump up^ Preface to Gibbon’s Volume the Fourth in David Womersley ed., Edward Gibbon – The History of the Decline and Fall of the Roman Empire, vol. 2 (New York: Penguin Books, 1994), p. 520.
  14. Jump up^ In the early 20th century, biographer Sir Leslie Stephen [“Gibbon, Edward (1737–1794),” Dictionary of National Biography, vol. 7, (Oxford, 1921), p. 1134.] summarized The History‘s reputation as a work of unmatched erudition, a degree of professional esteem which remains as strong today as it was then:

    The criticisms upon his book…are nearly unanimous. In accuracy, thoroughness, lucidity, and comprehensive grasp of a vast subject, the History is unsurpassable. It is the one English history which may be regarded as definitive. …Whatever its shortcomings, the book is artistically imposing as well as historically unimpeachable as a vast panorama of a great period.

  15. Jump up^ Edward Gibbon (1779). A vindication of some passages in the fifteenth and sixteenth chapters of The history of the decline and fall of the Roman Empire: By the author..Printed for W. Strahan; and T. Cadell, in the Strand.
  16. Jump up^ The New Schaff-Herzog Encyclopedia of Religious Knowledge, vol. IV, eds. S.M. Jackson, et al. (Grand Rapids, Mich.: Baker Book House, 1952), 483–484. online.
  17. Jump up^ Dublin review: a quarterly and critical journal. Burns, Oates and Washbourne. 1840. pp. 208–. JItKAAAAcAAJ. p. 208 image at Google Books
  18. Jump up^ General Observations On The Fall Of The Roman Empire In The West. Fall In The West — The Decline And Fall Of The Roman Empire by Edward Gibbon. At Christian Classics Ethereal Library, Calvin College Computer Science. http://www.ccel.org/g/gibbon/decline/volume1/chap39.htm
  19. Jump up^ John Julius Norwich, Byzantium (New York: Knopf, 1989); Byzantium: the apogee (London and New York: Viking Press, 1991).
  20. Jump up^ Preface of 1782 online.
  21. Jump up^ Georgije Ostrogorski History of the Byzantine State(1986) p. 5 online
  22. Jump up^ Gibbon, Edward (1781). The History of the Decline and Fall of the Roman Empire. 3. chapter 36, footnote 43. If I prosecute this History, I shall not be unmindful of the decline and fall of the city of Rome; an interesting object, to which my plan was originally confined.
  23. Jump up^ Patricia B. Craddock, Edward Gibbon, Luminous Historian. (Baltimore: Johns Hopkins Univ. Press, 1989), 249–266.
  24. Jump up^ Piers Brendon, The Decline and Fall of the British Empire, 1781-1997 (2008) p. xv
  25. Jump up^ Link to notes on the poem here [1]. Excerpt: “If you have any mind at all, Gibbon’s divine Decline and Fall, Seems pretty flimsy, No more than a whimsy… .”
  26. Jump up^ Asimov, Isaac (October 1954). “The Foundation of S. F. Success”. The Magazine of Fantasy and Science Fiction. p. 69.
  27. Jump up^ “Classics Ireland”. Ucd.ie. Retrieved September 8, 2010.

Further readingnd Intertextuality in Gibbon’s Decline and Fall of the Roman Empire (Newark: Associated University Presses, 1999); ISBN 0-87413-658-X.

  • Craddock, Patricia. “Historical Discovery and Literary Invention in Gibbon’s ‘Decline and Fall’,” Modern Philology 85,4(May 1988), 569–587.
  • Drake, H.A., “Lambs into Lions: explaining early Christian intolerance,” Past and Present 153(1996), 3–36. Oxford Journals
  • Furet, Francois. “Civilization and Barbarism in Gibbon’s History,” Daedalus 105,3(1976), 209–216.
  • Gay, Peter. Style in History (New York: Basic Books, 1974); ISBN 0-465-08304-8.
  • Ghosh, Peter R. “Gibbon’s Dark Ages: Some Remarks on the Genesis of the Decline and Fall,” Journal of Roman Studies 73(1983), 1–23.
  • Homer-Dixon, Thomas “The Upside of Down: Catastrophe, Creativity and the Renewal of Civilization”, 2007 ISBN 978-0-676-97723-3, Chapter 3 pp. 57–60
  • Kelly, Christopher. “A Grand Tour: Reading Gibbon’s ‘Decline and Fall’,” Greece & Rome 2nd ser., 44,1 (Apr. 1997), 39–58.
  • Momigliano, Arnaldo. “Eighteenth-Century Prelude to Mr. Gibbon,” in Pierre Ducrey et al., eds., Gibbon et Rome à la lumière de l’historiographie moderne (Geneva: Librairie Droz, 1977).
  • Momigliano, Arnaldo. “Gibbon from an Italian Point of View,” in G.W. Bowersock et al., eds., Edward Gibbon and the Decline and Fall of the Roman Empire (Cambridge: Harvard Univ. Press, 1977).
  • Momigliano, Arnaldo. “Declines and Falls,” American Scholar 49(Winter 1979), 37–51.
  • Momigliano, Arnaldo. “After Gibbon’s Decline and Fall,” in Kurt Weitzmann, ed. Age of Spirituality : a symposium (Princeton: 1980); ISBN 0-89142-039-8.
  • Pocock, J.G.A. Barbarism and Religion, 4 vols. all Cambridge Univ. Press.
  • Roberts, Charlotte Edward Gibbon and the Shape of History. 2014 Oxford University Press 9780198704836
  • Trevor-Roper, H.R. “Gibbon and the Publication of The Decline and Fall of the Roman Empire, 1776–1976,” Journal of Law and Economics 19,3 (Oct. 1976), 489–505.
  • Womersley, David. The Transformation of ‘The Decline and Fall of the Roman Empire’ (Cambridge: 1988).
  • Womersley, David, ed. Religious Scepticism: Contemporary Responses to Gibbon (Bristol, England: Thoemmes Press, 1997).
  • Wootton, David. “Narrative, Irony, and Faith in Gibbon’s Decline and Fall,” History and Theory 33,4 (Dec., 1994), 77–105.

External links

https://en.wikipedia.org/wiki/The_History_of_the_Decline_and_Fall_of_the_Roman_Empire

Read Full Post | Make a Comment ( None so far )

Michel de Montaigne — Essays — Videos

Posted on March 11, 2017. Filed under: Blogroll, Books, Communications, Essays, Foreign Policy, Freedom, Friends, Non-Fiction, People, Philosophy, Politics, Raves, Success, Video, War, Water, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , |

Image result for Michel de Montaigne essaysImage result for Michel de Montaigne quotesImage result for Michel de MontaigneImage result for Michel de MontaigneImage result for Michel de MontaigneImage result for Michel de Montaigne quotesImage result for Michel de Montaigne quotesImage result for Michel de Montaigne quotesImage result for Michel de Montaigne quotes

Image result for Michel de Montaigne quotes

Image result for Michel de Montaigne quotesImage result for Michel de Montaigne quotesImage result for Michel de Montaigne quotesImage result for Michel de Montaigne quotes

Image result for Michel de Montaigne quotes

Image result for Michel de Montaigne quotes

Image result for Michel de Montaigne quotes

Image result for Michel de Montaigne quotes
Image result for Michel de Montaigne quotes

PHILOSOPHY – Montaigne

Philosophy – A Guide to Happiness: Montaigne on Self-Esteem

Will Durant — Michel de Montaigne

Michel de Montaigne (1533-1592)

“That to Study Philosophy is to Learn to Die” Essay by Michel De Montaigne

Essays – Book 1 by Michel Eyquem de Montaigne – Audiobook ( Part 1/3 )

Essays – Book 1 by Michel Eyquem de Montaigne – Audiobook ( Part 2/3 )

Essays – Book 1 by Michel Eyquem de Montaigne – Audiobook ( Part 3/3 )

Essays – Book 2 by Michel Eyquem de Montaigne – Audiobook ( Part 1/5 )

Essays – Book 2 by Michel Eyquem de Montaigne – Audiobook ( Part 2/5 )

Essays – Book 2 by Michel Eyquem de Montaigne – Audiobook ( Part 3/5 )

Essays – Book 2 by Michel Eyquem de Montaigne – Audiobook ( Part 4/5 )

Essays – Book 2 by Michel Eyquem de Montaigne – Audiobook ( Part 5/5 )

Essays – Book 3 by Michel Eyquem de Montaigne – Audiobook ( Part 1/4 )

Essays – Book 3 by Michel Eyquem de Montaigne – Audiobook ( Part 2/4 )

Essays – Book 3 by Michel Eyquem de Montaigne – Audiobook ( Part 3/4 )

Essays – Book 3 by Michel Eyquem de Montaigne – Audiobook ( Part 4/4 )

Documentary – Western Philosophy, Part 1 – Classical Education

Documentary – Western Philosophy, Part 2 – Classical Education

Michel de Montaigne

From Wikipedia, the free encyclopedia
“Montaigne” redirects here. For the Australian singer-songwriter, see Montaigne (musician).
Michel de Montaigne
Michel de Montaigne 1.jpg
Born Michel de Montaigne
28 February 1533
Château de Montaigne, Guyenne, France
Died 13 September 1592 (aged 59)
Château de Montaigne, Guyenne, France
Alma mater College of Guienne
Collège Royal
University of Toulouse
Era Renaissance philosophy
Region Western Philosophy
School Renaissance humanismRenaissance skepticism
Notable ideas
The essay,
Montaigne’s wheel argument[1]
Signature
Unterschrift des Michel de Montaigne.png

Michel Eyquem de Montaigne, Lord of Montaigne (/mɒnˈtn/;[3]French: [miʃɛl ekɛm də mɔ̃tɛɲ]; 28 February 1533 – 13 September 1592) was one of the most significant philosophers of the French Renaissance, known for popularizing the essay as a literary genre. His work is noted for its merging of casual anecdotes[4] and autobiography with serious intellectual insight; his massive volume Essais (translated literally as “Attempts” or “Trials”) contains some of the most influential essays ever written.

Montaigne had a direct influence on writers all over the world, including Francis Bacon, René Descartes,[5] Blaise Pascal, Jean-Jacques Rousseau, Albert Hirschman, William Hazlitt,[6] Ralph Waldo Emerson, Friedrich Nietzsche, Stefan Zweig, Eric Hoffer,[7] Isaac Asimov, and possibly on the later works of William Shakespeare.

In his own lifetime, Montaigne was admired more as a statesman than as an author. The tendency in his essays to digress into anecdotes and personal ruminations was seen as detrimental to proper style rather than as an innovation, and his declaration that, “I am myself the matter of my book”, was viewed by his contemporaries as self-indulgent. In time, however, Montaigne would come to be recognized as embodying, perhaps better than any other author of his time, the spirit of freely entertaining doubt which began to emerge at that time. He is most famously known for his skeptical remark, “Que sçay-je?” (“What do I know?”, in Middle French; now rendered as Que sais-je? in modern French).

Remarkably modern even to readers today, Montaigne’s attempt to examine the world through the lens of the only thing he can depend on implicitly—his own judgment—makes him more accessible to modern readers than any other author of the Renaissance. Much of modern literary non-fiction has found inspiration in Montaigne and writers of all kinds continue to read him for his masterful balance of intellectual knowledge and personal storytelling.

Life

Château de Montaigne, a house built on the land once owned by Montaigne’s family. His original family home no longer exists, though the tower in which he wrote still stands.

Portrait of Michel de Montaigne by Dumonstier around 1578.

The Tour de Montaigne (Montaigne’s tower), mostly unchanged since the 16th century, where Montaigne’s library was located

Montaigne was born in the Aquitaine region of France, on the family estate Château de Montaigne, in a town now called Saint-Michel-de-Montaigne, close to Bordeaux. The family was very wealthy; his great-grandfather, Ramon Felipe Eyquem, had made a fortune as a herring merchant and had bought the estate in 1477, thus becoming the Lord of Montaigne. His father, Pierre Eyquem, Seigneur of Montaigne, was a French Catholic soldier in Italy for a time and had also been the mayor of Bordeaux.

Although there were several families bearing the patronym “Eyquem” in Guyenne, his family is thought to have had some degree of Marrano (Spanish and Portuguese Jewish) origins.[8] His mother, Antoinette López de Villanueva, was a convert to Protestantism.[9] His maternal grandfather, Pedro Lopez,[10] from Zaragoza, was from a wealthy Marrano (Sephardic Jewish) family who had converted to Catholicism.[11][12][13][14] His maternal grandmother, Honorette Dupuy, was from a Catholic family in Gascony, France.[15]

The coat of arms of Michel Eyquem, Lord of Montaigne

His mother lived a great part of Montaigne’s life near him, and even survived him, but is mentioned only twice in his essays. Montaigne’s relationship with his father, however, is frequently reflected upon and discussed in his essays.

Montaigne’s education began in early childhood and followed a pedagogical plan that his father had developed, refined by the advice of the latter’s humanist friends. Soon after his birth, Montaigne was brought to a small cottage, where he lived the first three years of life in the sole company of a peasant family, in order to, according to the elder Montaigne, “draw the boy close to the people, and to the life conditions of the people, who need our help”.[16] After these first spartan years, Montaigne was brought back to the château. The objective was for Latin to become his first language.

The intellectual education of Montaigne was assigned to a German tutor (a doctor named Horstanus, who could not speak French). His father hired only servants who could speak Latin, and they also were given strict orders always to speak to the boy in Latin. The same rule applied to his mother, father, and servants, who were obliged to use only Latin words he himself employed, and thus acquired a knowledge of the very language his tutor taught him. Montaigne’s Latin education was accompanied by constant intellectual and spiritual stimulation. He was familiarized with Greek by a pedagogical method that employed games, conversation, and exercises of solitary meditation, rather than the more traditional books.

The atmosphere of the boy’s upbringing, although designed by highly refined rules taken under advisement by his father, created in the boy’s life the spirit of “liberty and delight” to “make me relish… duty by an unforced will, and of my own voluntary motion…without any severity or constraint”; yet he would have everything to take advantage of his freedom. And so a musician woke him every morning, playing one instrument or another,[17] and an épinettier (with a zither) was the constant companion to Montaigne and his tutor, playing a tune to alleviate boredom and tiredness.

Around the year 1539, Montaigne was sent to study at a prestigious boarding school in Bordeaux, the Collège de Guyenne, then under the direction of the greatest Latin scholar of the era, George Buchanan, where he mastered the whole curriculum by his thirteenth year. He then began his study of law at the University of Toulouse in 1546 and entered a career in the local legal system. He was a counselor of the Court des Aides of Périgueux and, in 1557, he was appointed counselor of the Parlement in Bordeaux (a high court). From 1561 to 1563 he was courtier at the court of Charles IX; he was present with the king at the siege of Rouen (1562). He was awarded the highest honour of the French nobility, the collar of the Order of St. Michael, something to which he aspired from his youth. While serving at the Bordeaux Parlement, he became very close friends with the humanist poet Étienne de la Boétie, whose death in 1563 deeply affected Montaigne. It has been suggested by Donald M. Frame, in his introduction to The Complete Essays of Montaigne that because of Montaigne’s “imperious need to communicate” after losing Étienne, he began the Essais as his “means of communication” and that “the reader takes the place of the dead friend”.[18]

Montaigne wed Françoise de la Cassaigne in 1565, not of his own free will but by prearrangement and under pressure from his family;[citation needed] they had six daughters, but only the second-born survived childhood.

Following the petition of his father, Montaigne started to work on the first translation of the Catalan monk Raymond Sebond‘s Theologia naturalis, which he published a year after his father’s death in 1568 (In 1595, Sebond’s Prologue was put on the Index Librorum Prohibitorum for its declaration that the Bible is not the only source of revealed truth). After this, he inherited the family’s estate, the Château de Montaigne, to which he moved back in 1570, thus becoming the Lord of Montaigne. Another literary accomplishment was Montaigne’s posthumous edition of his friend Boétie’s works.

In 1571, he retired from public life to the Tower of the Château, his so-called “citadel”, in the Dordogne, where he almost totally isolated himself from every social and family affair. Locked up in his library, which contained a collection of some 1,500 works, he began work on his Essais (“Essays”), first published in 1580. On the day of his 38th birthday, as he entered this almost ten-year period of self-imposed reclusion, he had the following inscription crown the bookshelves of his working chamber:

In the year of Christ 1571, at the age of thirty-eight, on the last day of February, his birthday, Michael de Montaigne, long weary of the servitude of the court and of public employments, while still entire, retired to the bosom of the learned virgins, where in calm and freedom from all cares he will spend what little remains of his life, now more than half run out. If the fates permit, he will complete this abode, this sweet ancestral retreat; and he has consecrated it to his freedom, tranquility, and leisure.[19]

During this time of the Wars of Religion in France, Montaigne, a Roman Catholic, acted as a moderating force,[citation needed]respected both by the Catholic King Henry III and the Protestant Henry of Navarre.

In 1578, Montaigne, whose health had always been excellent, started suffering from painful kidney stones, a sickness he had inherited from his father’s family. Throughout this illness, he would have nothing to do with doctors or drugs.[20] From 1580 to 1581, Montaigne traveled in France, Germany, Austria, Switzerland, and Italy, partly in search of a cure, establishing himself at Bagni di Lucca where he took the waters. His journey was also a pilgrimage to the Holy House of Loreto, to which he presented a silver relief depicting himself and his wife and daughter kneeling before the Madonna, considering himself fortunate that it should be hung on a wall within the shrine.[21] He kept a fascinating journal recording regional differences and customs[22] and a variety of personal episodes, including the dimensions of the stones he succeeded in ejecting from his bladder. This was published much later, in 1774, after its discovery in a trunk which is displayed in his tower.[23]

During Montaigne’s visit to the Vatican, as he described in his travel journal, the Essais were examined by Sisto Fabri who served as Master of the Sacred Palace under Pope Gregory XIII. After Fabri examined Montaigne’s Essais the text was returned to its author on 20 March 1581. Montaigne had apologized for references to the pagan notion of “fortuna” as well as for writing favorably of Julian the Apostate and of heretical poets, and was released to follow his own conscience in making emendations to the text.[24]

Journey to Italy by Michel de Montaigne 1580–1581

While in the city of Lucca in 1581, he learned that he had been elected mayor of Bordeaux; he returned and served as mayor. He was re-elected in 1583 and served until 1585, again moderating between Catholics and Protestants. The plague broke out in Bordeaux toward the end of his second term in office, in 1585. In 1586, the plague and the Wars of Religion prompted him to leave his château for two years.[20]

Montaigne continued to extend, revise, and oversee the publication of Essais. In 1588 he wrote its third book and also met the writer Marie de Gournay, who admired his work and later edited and published it. Montaigne called her his adopted daughter.[20] King Henry III was assassinated in 1589, and Montaigne then helped to keep Bordeaux loyal to Henry of Navarre, who would go on to become King Henry IV.

Montaigne died of quinsy at the age of 59, in 1592 at the Château de Montaigne. The disease in his case “brought about paralysis of the tongue”,[25] and he had once said “the most fruitful and natural play of the mind is conversation. I find it sweeter than any other action in life; and if I were forced to choose, I think I would rather lose my sight than my hearing and voice.”[26] Remaining in possession of all his other faculties, he requested mass, and died during the celebration of that mass.[27]

He was buried nearby. Later his remains were moved to the church of Saint Antoine at Bordeaux. The church no longer exists: it became the Convent des Feuillants, which has also disappeared.[28] The Bordeaux Tourist Office says that Montaigne is buried at the Musée Aquitaine, Faculté des Lettres, Université Bordeaux 3 Michel de Montaigne, Pessac. His heart is preserved in the parish church of Saint-Michel-de-Montaigne.

The humanities branch of the University of Bordeaux is named after him: Université Michel de Montaigne Bordeaux 3.

Michel de Montaigne.

Essais

Main article: Essays (Montaigne)

His fame rests on the Essais, a collection of a large number of short subjective treatments of various topics published in 1580, inspired by his studies in the classics, especially by the works of Plutarch and Lucretius.[29] Montaigne’s stated goal is to describe humans, and especially himself, with utter frankness. Montaigne’s writings are studied as literature and philosophy around the world.

Inspired by his consideration of the lives and ideals of the leading figures of his age, he finds the great variety and volatility of human nature to be its most basic features. He describes his own poor memory, his ability to solve problems and mediate conflicts without truly getting emotionally involved, his disdain for the human pursuit of lasting fame, and his attempts to detach himself from worldly things to prepare for his timely death. He writes about his disgust with the religious conflicts of his time. He believed that humans are not able to attain true certainty. The longest of his essays, Apology for Raymond Sebond, contains his famous motto, “What do I know?”

Montaigne considered marriage necessary for the raising of children, but disliked strong feelings of passionate love because he saw them as detrimental to freedom. In education, he favored concrete examples and experience over the teaching of abstract knowledge that has to be accepted uncritically. His essay “On the Education of Children” is dedicated to Diana of Foix.

The Essais exercised important influence on both French and English literature, in thought and style.[30] Francis Bacon‘s Essays, published over a decade later, in 1596, are usually assumed to be directly influenced by Montaigne’s collection, and Montaigne is cited by Bacon alongside other classical sources in later essays.[31]

Montaigne’s influence on psychology

Though not a scientist, Montaigne made observations on topics in psychology.[32] In his essays, he developed and explained his observations of these topics. His thoughts and ideas covered topics such as thought, motivation, fear, happiness, child education, experience, and human action. Montaigne’s ideas have influenced psychology and are a part of psychology’s rich history.

Child education

Child education was among the psychological topics that he wrote about.[32] His essays On the Education of Children, On Pedantry, and On Experience explain the views he had on child education.[33]:61:62:70 Some of his views on child education are still relevant today.[34]

Montaigne’s views on the education of children were opposed to the common educational practices of his day.[33]:63:67He found fault with both what was taught and how it was taught.[33]:62 Much of the education during Montaigne’s time was focused on the reading of the classics and learning through books.[33]:67Montaigne disagreed with learning strictly through books. He believed it was necessary to educate children in a variety of ways. He also disagreed with the way information was being presented to students. It was being presented in a way that encouraged students to take the information that was taught to them as absolute truth. Students were denied the chance to question the information. Therefore, students could not truly learn. Montaigne believed that to truly learn, a student had to take the information and make it their own.

At the foundation Montaigne believed that the selection of a good tutor was important for the student to become well educated.[33]:66 Education by a tutor was to be done at the pace of the student.[33]:67He believed that a tutor should be in dialogue with the student, letting the student speak first. The tutor should also allow for discussions and debates to be had. Through this dialogue, it was meant to create an environment in which students would teach themselves. They would be able to realize their mistakes and make corrections to them as necessary.

Individualized learning was also integral to his theory of child education. He argued that the student combines information he already knows with what is learned, and forms a unique perspective on the newly learned information.[35]:356 Montaigne also thought that tutors should encourage a student’s natural curiosity and allow them to question things.[33]:68He postulated that successful students were those who were encouraged to question new information and study it for themselves, rather than simply accepting what they had heard from the authorities on any given topic. Montaigne believed that a child’s curiosity could serve as an important teaching tool when the child is allowed to explore the things that they are curious about.

Experience was also a key element to learning for Montaigne. Tutors needed to teach students through experience rather than through the mere memorization of knowledge often practised in book learning.[33]:62:67He argued that students would become passive adults; blindly obeying and lacking the ability to think on their own.[35]:354 Nothing of importance would be retained and no abilities would be learned.[33]:62 He believed that learning through experience was superior to learning through the use of books.[34] For this reason he encouraged tutors to educate their students through practice, travel, and human interaction. In doing so, he argued that students would become active learners, who could claim knowledge for themselves.

Montaigne’s views on child education continue to have an influence in the present. Variations of Montaigne’s ideas on education are incorporated into modern learning in some ways. He argued against the popular way of teaching in his day, encouraging individualized learning. He believed in the importance of experience over book learning and memorization. Ultimately, Montaigne postulated that the point of education was to teach a student how to have a successful life by practising an active and socially interactive lifestyle.[35]:355

Related writers and influence

Student taking notes on Montaigne’s Essays at Shimer College.

Thinkers exploring similar ideas to Montaigne include Erasmus, Thomas More, and Guillaume Budé, who all worked about fifty years before Montaigne.[36] Many of Montaigne’s Latin quotations are from Erasmus’ Adagia, and most critically, all of his quotations from Socrates. Plutarch remains perhaps Montaigne’s strongest influence, in terms of substance and style.[37] Montaigne’s quotations from Plutarch in the Essays number well over 500.[38]

Ever since Edward Capell first made the suggestion in 1780, scholars have suggested Montaigne to be an influence on Shakespeare.[39] The latter would have had access to John Florio‘s translation of Montaigne’s Essais, published in English in 1603, and a scene in The Tempest “follows the wording of Florio [translating Of Cannibals] so closely that his indebtedness is unmistakable”.[40] However, most parallels between the two can be explained as commonplaces:[39] as with Cervantes, Shakespeare‘s similarities with writers in other nations could be due simply to their simultaneous study of Latin moral and philosophical writers such as Seneca the Younger, Horace, Ovid and Virgil.

Much of Blaise Pascal‘s skepticism in his Pensées has been traditionally attributed to his reading Montaigne.[41]

The English essayist William Hazlitt expressed boundless admiration for Montaigne, exclaiming that “he was the first who had the courage to say as an author what he felt as a man. … He was neither a pedant nor a bigot. … In treating of men and manners, he spoke of them as he found them, not according to preconceived notions and abstract dogmas”.[42] Beginning most overtly with the essays in the “familiar” style in his own Table-Talk, Hazlitt tried to follow Montaigne’s example.[6]

Ralph Waldo Emerson chose “Montaigne; or, the Skeptic” as a subject of one of his series of lectures entitled Representative Men, alongside other subjects such as Shakespeare and Plato. In “The Skeptic” Emerson writes of his experience reading Montaigne, “It seemed to me as if I had myself written the book, in some former life, so sincerely it spoke to my thought and experience.” Friedrich Nietzsche judged of Montaigne: “That such a man wrote has truly augmented the joy of living on this Earth”.[43] Saint-Beuve advises us that “to restore lucidity and proportion to our judgments, let us read every evening a page of Montaigne.” [44]

The American philosopher Eric Hoffer employed Montaigne both stylistically and in thought. In Hoffer’s memoir, Truth Imagined, he said of Montaigne, “He was writing about me. He knew my innermost thoughts.” The Welsh novelist John Cowper Powys expressed his admiration for Montaigne’s philosophy in his books Suspended Judgements (1916) and The Pleasures of Literature (1938). Judith N. Shklar introduces her book Ordinary Vices (1984), “It is only if we step outside the divinely ruled moral universe that we can really put our minds to the common ills we inflict upon one another each day. That is what Montaigne did and that is why he is the hero of this book. In spirit he is on every one of its pages…”

20th century literary critic Erich Auerbach called Montaigne the first modern man. “Among all his contemporaries,” writes Auerbach (Mimesis, Chapter 12), “he had the clearest conception of the problem of man’s self-orientation; that is, the task of making oneself at home in existence without fixed points of support.” [45]

References

  1. Jump up^ Robert P. Amico, The Problem of the Criterion, Rowman & Littlefield, 1995, p. 42. Primary source: Montaigne, Essais, II, 12: “Pour juger des apparences que nous recevons des subjets, il nous faudroit un instrument judicatoire ; pour verifier cet instrument, il nous y faut de la demonstration ; pour verifier la demonstration, un instrument : nous voilà au rouet [To judge of the appearances that we receive of subjects, we had need have a judicatorie instrument: to verifie this instrument we should have demonstration; and to approve demonstration, an instrument; thus are we ever turning round]” (transl. by Charles Cotton).
  2. Jump up^ FT.com “Small Talk: José Saramago”. “Everything I’ve read has influenced me in some way. Having said that, Kafka, Borges, Gogol, Montaigne, Cervantes are constant companions.”
  3. Jump up^ “Montaigne”. Random House Webster’s Unabridged Dictionary.
  4. Jump up^ His anecdotes are ‘casual’ only in appearance; Montaigne writes: ‘Neither my anecdotes nor my quotations are always employed simply as examples, for authority, or for ornament…They often carry, off the subject under discussion, the seed of a richer and more daring matter, and they resonate obliquely with a more delicate tone,’ Michel de Montaigne, Essais, Pléiade, Paris (ed. A. Thibaudet) 1937, Bk. 1, ch.40, p. 252 (tr. Charles Rosen)
  5. Jump up^ Buckley, Michael J., At the Origins of Modern Atheism, Yale UP, 1990, p. 69.
  6. ^ Jump up to:a b Kinnaird, John, William Hazlitt: Critic of Power, Columbia University Press, 1978, p. 274.
  7. Jump up^ from Truth Imagined, memoir by Eric Hoffer.
  8. Jump up^ Sophie Jama, L’Histoire Juive de Montaigne [The Jewish History of Montaigne], Paris, Flammarion, 2001, p. 76.
  9. Jump up^ “His mother was a Jewish Protestant, his father a Catholic who achieved wide culture as well as a considerable fortune.” Civilization, Kenneth Clark, (Harper & Row: 1969), p. 161.
  10. Jump up^ Winkler, Emil (1942). “Zeitschrift für Französische Sprache und Literatur”.
  11. Jump up^ Goitein, Denise R (2008). “Montaigne, Michel de”. Encyclopaedia Judaica. The Gale Group. Retrieved 2014-03-06.
  12. Jump up^ Introduction: Montaigne’s Life and Times, in Apology for Raymond Sebond, By Michel de Montaigne (Roger Ariew), (Hackett: 2003), p. iv: “Michel de Montaigne was born in 1533 at the chateau de Montagine (about 30 miles east of Bordeaux), the son of Pierre Eyquem, Seigneur de Montaigne, and Antoinette de Louppes (or Lopez), who came from a wealthy (originally Iberian) Jewish family”.
  13. Jump up^ “…the family of Montaigne’s mother, Antoinette de Louppes (Lopez) of Toulouse, was of Spanish Jewish origin….” The Complete Essays of Montaigne, Translated by Donald M. Frame, “Introduction,” p. vii ff., Stanford University Press, Stanford, 1989 ISBN 0-8047-0486-4
  14. Jump up^ Popkin, Richard H (2003-03-20). “The History of Scepticism: From Savonarola to Bayle”. ISBN 9780195107678.
  15. Jump up^ Green, Toby (2009-03-17). “Inquisition: The Reign of Fear”. ISBN 9781429938532.
  16. Jump up^ Montaigne. Essays, III, 13
  17. Jump up^ Hutchins, Robert Maynard; Hazlitt, W. Carew, eds. (1952). The Essays of Michel Eyquem de Montaigne. Great Books of the Western World. twenty-five. Trans. Charles Cotton. Encyclopedia Britannica. p. v. He had his son awakened each morning by ‘the sound of a musical instrument’
  18. Jump up^ Frame, Donald (translator). The Complete Essays of Montaigne. 1958. p. v.
  19. Jump up^ As cited by Richard L. Regosin, ‘Montaigne and His Readers’, in Denis Hollier (ed.) A New History of French Literature, Harvard University Press, Cambridge, Massachusetts, London 1995, pp. 248–52, p. 249. The Latin original runs: ‘An. Christi 1571 aet. 38, pridie cal. mart., die suo natali, Mich. Montanus, servitii aulici et munerum publicorum jamdudum pertaesus, dum se integer in doctarum virginum recessit sinus, ubi quietus et omnium securus (quan)tillum in tandem superabit decursi multa jam plus parte spatii: si modo fata sinunt exigat istas sedes et dulces latebras, avitasque, libertati suae, tranquillitatique, et otio consecravit.’ as cited in Helmut Pfeiffer, ‘Das Ich als Haushalt:Montaignes ökonomische Politik’, in Rudolf Behrens,Roland Galle (eds.) Historische Anthropologie und Literatur:Romanistische Beträge zu einem neuen Paradigma der Literaturwissenschaft, Königshausen und Neumann, Würzburg, 1995 pp. 69–90 p. 75
  20. ^ Jump up to:a b c  Reynolds, Francis J., ed. (1921). “Montaigne, Michel, Seigneur“. Collier’s New Encyclopedia. New York: P.F. Collier & Son Company.
  21. Jump up^ Edward Chaney, The Evolution of the Grand Tour: Anglo-Italian Cultural Relations since the Renaissance, 2nd ed. (London, 2000), p. 89.
  22. Jump up^ Cazeaux, Guillaume (2015). Montaigne et la coutume[Montaigne and the custom]. Milan: Mimésis. ISBN 9788869760044.
  23. Jump up^ Montaigne’s Travel Journal, translated with an introduction by Donald M. Frame and foreword by Guy Davenport, San Francisco, 1983
  24. Jump up^ Treccani.it, L’encicolpedia Italiana, Dizionario Biografico. Accessed 10 August 2013
  25. Jump up^ Montaigne, Michel de, Essays of Michel de Montaigne, tr. Charles Cotton, ed. William Carew Hazlitt, 1877, “The Life of Montaigne” in v. 1. n.p., Kindle edition.
  26. Jump up^ “The Autobiography of Michel De Montaign”, translated, introduced, and edited by Marvin Lowenthal, David R. Godine Publishing, p. 165
  27. Jump up^ “Biographical Note”, Encyclopedia Britannica “Great Books of the Western World”, Vol. 25, p. vi “Montaigne”
  28. Jump up^ Bakewell, Sarah. How to Live – or – A Life of Montaigne in One Question and Twenty Attempts at an Answer (2010), pp. 325–26, 365 n. 325.
  29. Jump up^ “Titi Lucretii Cari De rerum natura libri sex (Montaigne.1.4.4)”. Cambridge Digital Library. Retrieved 9 July 2015.
  30. Jump up^ Bloom, Harold. The Western Canon.
  31. Jump up^ Bakewell, Sarah (2010). How to live : a life of Montaigne in one question and twenty attempts at an answer. London: Vintage. p. 280. ISBN 9780099485155.
  32. ^ Jump up to:a b King, Brett; Viney, Wayne; Woody, William.A History of Psychology: Ideas and Context, 4th ed., Pearson Education, Inc. 2009, p. 112.
  33. ^ Jump up to:a b c d e f g h i Hall, Michael L. Montaigne’s Uses of Classical Learning. “Journal of Education” 1997, Vol. 179 Issue 1, p. 61
  34. ^ Jump up to:a b Ediger, Marlow. Influence of ten leading educators on American education.Education Vol. 118, Issue 2, p. 270
  35. ^ Jump up to:a b c Worley, Virginia. Painting With Impasto: Metaphors, Mirrors, and Reflective Regression in Montagne’s ‘Of the Education of Children.’ Educational Theory, June 2012, Vol. 62 Issue 3, p. 343–70.
  36. Jump up^ Friedrich, Hugo; Desan, Philippe (1991). Montaigne. ISBN 9780520072534.
  37. Jump up^ Friedrich 1991, p. 71.
  38. Jump up^ Billault, Alain (2002). “Plutarch’s Lives“. In Gerald N. Sandy. The Classical Heritage in France. p. 226. ISBN 9789004119161.
  39. ^ Jump up to:a b Olivier, T. (1980). “Shakespeare and Montaigne: A Tendency of Thought”. Theoria. 54: 43–59.
  40. Jump up^ Harmon, Alice (1942). “How Great Was Shakespeare’s Debt to Montaigne?”. PMLA. 57 (4): 988–1008. JSTOR 458873.
  41. Jump up^ Eliot, Thomas Stearns (1958). Introduction to Pascal’s Essays. New York: E. P. Dutton and Co. p. viii.
  42. Jump up^ Quoted from Hazlitt’s “On the Periodical Essayists” in Park, Roy, Hazlitt and the Spirit of the Age, Oxford, Clarendon Press, 1971, pp. 172–73.
  43. Jump up^ Nietzsche, Untimely Meditations, Chapter 3, “Schopenhauer as Educator,” Cambridge University Press, 1988, p. 135
  44. Jump up^ Saint-Beuve, “Montaigne”, “Literary and Philosophical Essays”, Ed. Charles W. Eliot, New York: P. F. Collier & Son, 1938.
  45. Jump up^ Auerbach, Erich , Mimesis: Representations of Reality in Western Literature, Princeton UP, 1974, p.311

Further reading

  • Album Montaigne. Iconographie choisie et annotée par Jean Lacouture. Bibliothèque de la Pléiade. Éditions Gallimard, 2007. ISBN 9782070118298.
  • Kuznicki, Jason (2008). “Montaigne, Michel (1533–1592)”. In Hamowy, Ronald. The Encyclopedia of Libertarianism. Thousand Oaks, CA: SAGE; Cato Institute. pp. 339–41. doi:10.4135/9781412965811.n208. ISBN 978-1-4129-6580-4. LCCN 2008009151. OCLC 750831024.
  • The Autobiography of Michel de Montaigne. Comprising the Life of the Wisest Man of his Times: his Childhood, Youth, and Prime; his Adventures in Love and Marriage, at Court, and in Office, War, Revolution, and Plague; his Travels at Home and Abroad; his Habits, Tastes, Whims, and Opinions. Composed, Prefaced, and Translated from the Essays, Letters, Travel Diary, Family Journal, etc., withholding no signal or curious detail, by Marvin Lowenthal. Houghton Mifflin, 1935.
  • No greater mmonster nor miracle than myself. Charlotte Thomas, ed. 2014. Mercer University Press.

External links

https://en.wikipedia.org/wiki/Michel_de_Montaigne

Read Full Post | Make a Comment ( None so far )

American Conservative Union CPAC 2017 — Videos

Posted on February 26, 2017. Filed under: American History, Blogroll, College, Congress, conservatives, Constitution, Economics, Education, Employment, Federal Government, Foreign Policy, Freedom, Friends, government, government spending, Health Care, Heroes, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, media, Obamacare, People, Philosophy, Photos, Politics, Religious, Security, Speech, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Image result for CPAC 2017
Image result for Trump at CPAC 2017Image result for dr. larry arn at cpac 2017Image result for Trump at CPAC 2017
Image result for cpac 2017  Trump Speech at CPAC 2017 (FULL) | ABC News

 CPAC 2017 – Dr. Larry Arnn

CPAC 2017 – Dan Schneider

FULL EVENT: President Donald Trump Speech at CPAC 2017 (2/24/2017) Donald Trump Live CPAC Speech

CPAC 2017 – Judge Jeanine Pirro

CPAC 2017 – Vice President Mike Pence’s full #CPAC Speech #CPAC2017

CPAC 2017 – How the Election Has Changed and Expanded the Pro-Life Movement

CPAC 2017 – Mark Levin and Sen. Ted Cruz

Steve Bannon, Reince Priebus Interview at CPAC 2017 | ABC News

CPAC 2017 – Sen. Jim Demint

CPAC 2017 – Ambassador John Bolton

CPAC 2017 – Nigel Farage

CPAC 2017 – Raheem Kassam

CPAC 2017 – Why Government Gets So Much Wrong

CPAC 2017 – When Did WWIII Begin? Part A: Threats at Home

CPAC 2017 – When did World War III Begin? Part B

CPAC 2017 – Armed and Fabulous

CPAC 2017 – Wayne LaPierre, NRA

CPAC 2017 – Chris Cox, NRA-ILA

CPAC 2017 – Prosecutors Gone Wild

CPAC 2017 – Kellyanne Conway

CPAC 2017 – A conversation with Carly Fiorina and Arthur Brooks

CPAC 2017 – The States vs The State Governors

CPAC 2017 – Gov. Pete Ricketts

CPAC 2017 – U.S. Secretary of Education Betsy DeVos

CPAC 2017 – Dan Schneider

CPAC 2017 – FREE stuff vs FREE-dom Panel

CPAC 2017 – Dana Loesch

CPAC 2017 – Robert Davi

CPAC 2017 – Lou Dobbs

Read Full Post | Make a Comment ( None so far )

Ann Swidler — Introduction to Sociology –University of California, Berkeley — Videos

Posted on January 29, 2017. Filed under: American History, Articles, Blogroll, College, College Courses Online Videos, Congress, Constitution, Culture, Economics, Education, Elections, Employment, Faith, Family, Freedom, Friends, government, government spending, history, History of Economic Thought, Language, Law, liberty, Life, media, People, Philosophy, Politics, Rants, Raves, Sociology, Sociology, Video, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , |

Image result for Ann Swidler sociologistsImage result for Ann SwidlerImage result for Ann Swidler

Sociology 1 – Lecture 1

Sociology 1 – Lecture 2

Sociology 1 – Lecture 3

Sociology 1 – Lecture 4

Lecture 5

Milgram Obedience Study

The Milgram Experiment 1962 Full Documentary

Milgram Experiment (Derren Brown)

Sociology 1 – Lecture 6

Sociology 1 – Lecture 7

Sociology 1 – Lecture 8

Sociology 1 – Lecture 9

Sociology 1 – Lecture 10

Sociology 1 – Lecture 11

Sociology 1 – Lecture 12

Sociology 1 – Lecture 13

Review Lecture

Midterm Exam

Sociology 1 – Lecture 14

Sociology 1 – Lecture 15

Sociology 1 – Lecture 16

Sociology 1 – Lecture 17

Sociology 1 – Lecture 18

Sociology 1 – Lecture 19

Sociology 1 – Lecture 20

Sociology 1 – Lecture 21

Sociology 1 – Lecture 22

Sociology 1 – Lecture 23

Sociology 1 – Lecture 24

Sociology 1 – Lecture 25

Sociology 1 – Lecture 26

Ann Swidler

Ann Swidler

Professor
Research Interests:
Culture, religion, theory, institutionalization, African responses to HIV/AIDS
Office:
444 Barrows
Curriculum Vitae:
Profile:

Ann Swidler (PhD UC Berkeley; BA Harvard) studies the interplay of culture and institutions. She asks how culture works–both how people use it and how it shapes social life. She is best known for her books Talk of Love, and the co-authored works Habits of the Heart and The Good Society, as well as her classic article, “Culture in Action: Symbols and Strategies” (American Sociological Review, 1986).  Her most recent book, Talk of Love: How Culture Matters (Chicago, 2001), examines how actors select among elements of their cultural repertoires and how culture gets organized “from the outside in” by Codes, Contexts, and Institutions. In the co-authored Habits of the Heart and The Good Society, she and her collaborators analyzed the consequences of American individualism for individual selfhood, community, and political and economic institutions. With colleagues from the Canadian Institute for Advanced Research, she has been engaged in an ambitious project to understand the societal determinants of human health and well being.

Swidler’s current research is on cultural and institutional responses to the AIDS epidemic in sub-Saharan Africa. Swidler’s research on AIDS Africa has led both to work on NGOs and the international response to the epidemic and to work on transactional sex, cultural barriers to condom use, and factors that have made the responses to the epidemic more successful in some African countries than in others. She is interested in how the massive international AIDS effort in sub-Saharan Africa–the infusion of money, organizations, programs and projects–interacts with existing cultural and institutional patterns to create new dilemmas and new possibilities. She is exploring these issues from two directions:

From the international side, she examines how the international AIDS effort is structured (who provides money to whom, how collaborative networks are structured, how programs get organized on the ground); why some interventions are favored over others; and what organizational forms international funders opt for.  From the African side, she is exploring why the NGO sector is more robust in some countries than others; when international AIDS efforts stimulate vs. impede or derail local efforts; and what organizational syncretisms sometimes emerge.

Swidler’s most recent work examines African religion and the institutions of African chieftaincy in order to understand the cultural and religious sources of collective capacities for social action.

Professor Swidler teaches sociology of culture, sociology of religion, and sociological theory. Her interests increasingly touch on political sociology, development, and sociology of science and medicine as well.

Representative Publications:

Books

  • 2001 Talk of Love: How Culture Matters (University of Chicago Press).
  • 2001 (eds.), Meaning and Modernity: Religion, Polity, Self (University of California Press). (with Madsen, Sullivan, Tipton)
  • 1996 Inequality by Design: Cracking the Bell Curve Myth (Princeton University Press). (with Fischer, Hout, Jankowski, Lucas, and Voss)
  • 1991 The Good Society (Alfred A. Knopf). (with Bellah, Madsen, Sullivan, and Tipton)
  • 1985 Habits of the Heart: Individualism and Commitment in American Life (University of California Press). (with Bellah, Madsen, Sullivan, and Tipton)
  • 1979 Organization Without Authority: Dilemmas of Social Control in Free Schools (Harvard University Press).

Selected Articles and Chapters

Read Full Post | Make a Comment ( None so far )

David Horowitz — Radicals: Portraits of A Destructive Passion — Videos

Posted on January 22, 2017. Filed under: American History, Articles, Blogroll, Books, Business, Communications, Congress, Constitution, Corruption, Crisis, Culture, Diasters, Documentary, Economics, Education, Employment, Environment, Faith, Family, Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Illegal, Immigration, Islam, Language, Law, Legal, liberty, Life, Links, Non-Fiction, People, Philosophy, Photos, Police, Political Correctness, Press, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Religious, Religious, Speech, Strategy, Success, Talk Radio, Taxation, Taxes, Technology, Terrorism, Unemployment, Video, War, Water | Tags: , , , , , , , , , , , , , , , , |

Image result for david horiwitz radicals: Portraits of a destructive passionImage result for david horiwitz Image result for david horiwitz

David Horowitz: Democratic Party is marching off the cliff

David Horowitz – Left Illusions: An Intellectual Odyssey

David Horowitz – The Left in Power: Clinton to Obama

Published on Jan 1, 2017

December 14, 2016 – David Horowitz’s speaks about his new book, The Left in Power: Clinton to Obama, which is volume 7 of The Black Book of the American Left, a multi-volume collection of his conservative writings that will, when completed, be the most ambitious effort ever undertaken to define the Left and its agenda.

Horowitz on Hillary Clinton and Saul Alinsky

In Depth with David Horowitz

David Horowitz discusses Radicals and who has influence over the media

David Horowitz – Unholy Alliance: Radical Islam and the American Left

A Most Excellent Explanation of the Left’s Takeover of America

David Horowitz – What The Left Believes

David Horowitz – Take No Prisoners: The Battle Plan for Defeating the Left

Rules for Radicals: What Constitutional Conservatives Should Know About Saul Alinsky

David Horowitz – The Professors: The 101 Most Dangerous Academics in America

David Horowitz interview on Charlie Rose (1997)

David Horowitz – Radical Son: A Generational Odyssey (Part 1)

David Horowitz – Radical Son: A Generational Odyssey (Part 2)

The Black Book of the American Left: The Collected Conservative Writings of David Horowitz

Published on Nov 13, 2013

David Horowitz spent the first part of his life in the world of the Communist-progressive left, a politics he inherited from his mother and father, and later in the New Left as one of its founders. When the wreckage he and his comrades had created became clear to him in the mid-1970s, he left. Three decades of second thoughts then made him this movement’s principal intellectual antagonist. “For better or worse,” as Horowitz writes in the preface to this, the first volume of his collected conservative writings, “I have been condemned to spend the rest of my days attempting to understand how the left pursues the agendas from which I have separated myself, and why.”

David Horowitz – Progressive Racism

David Horowitz

From Wikipedia, the free encyclopedia
For other people named David Horowitz, see David Horowitz (disambiguation).
David Horowitz
David Horowitz by Gage Skidmore.jpg

Horowitz in February 2011
Born David Joel Horowitz
January 10, 1939 (age 78)
Forest Hills, Queens, New York, U.S.
Occupation Conservative activist, writer
Nationality United States
Education MA, University of California at Berkeley
BA, Columbia University
Spouse Elissa Krauthamer (1959–19??; 4 children); Sam Moorman (divorced); Shay Marlowe (1990–?; divorced); April Mullvain Horowitz (current)
Children Jonathan Daniel
Ben Horowitz
Anne Pilat
Sarah Rose Horowitz (deceased)[1]

David Joel Horowitz (born January 10, 1939) is an American conservative writer. He is a founder and current president of the think tank the David Horowitz Freedom Center; editor of the Center’s publication, FrontPage Magazine; and director of Discover the Networks, a website that tracks individuals and groups on the political left. Horowitz founded the organization Students for Academic Freedom to oppose what he believed to be political correctness and leftist orientation in academia.[2]

He has written several books with author Peter Collier, including four on prominent 20th-century American political families that had members elected to the presidency. He and Collier have collaborated on books about current cultural criticism. Horowitz has also worked as a columnist for Salon; its then-editor Joan Walsh described him as a “conservative provocateur.”[3]

Horowitz was raised by parents who were members of the Communist Party USA during the Great Depression; they gave up their membership in 1956 after learning of Joseph Stalin‘s purges and abuses. From 1956–75, Horowitz was an outspoken adherent of the New Left. He later rejected leftism completely and has since become a leading proponent of conservatism. Horowitz has recounted his ideological journey in a series of retrospective books, culminating with his 1996 memoir Radical Son: A Generational Odyssey.

Family background

Horowitz is the son of Phil and Blanche Horowitz, who were high school teachers. His father taught English and his mother taught stenography.[4] During years of labor organizing and the Great Depression, Phil and Blanche Horowitz were long-standing members of the American Communist Party and strong supporters of Joseph Stalin. They left the party after Khrushchev published his report in 1956 about Stalin’s excesses and terrorism of the Soviet populations.[5][6]

According to Horowitz:

Underneath the ordinary surfaces of their lives, my parents and their friends thought of themselves as secret agents. The mission they had undertaken, and about which they could not speak freely except with each other, was not just an idea to them. It was more important to their sense of themselves than anything else they did. Nor were its tasks of a kind they could attend or ignore, depending on their moods. They were more like the obligations of a religious faith. Except that their faith was secular, and the millennium they awaited was being instituted, at that moment, in the very country that had become America’s enemy. It was this fact that made their ordinary lives precarious and their secrecy necessary. If they lived under a cloud of suspicion, it was the result of more than just their political passions. The dropping of the atomic bomb on Hiroshima had created a terror in the minds of ordinary people. Newspapers reported on American spy rings working to steal atomic secrets for the Soviet state. When people read these stories, they inevitably thought of progressives like us. And so did we ourselves. Even if we never encountered a Soviet agent or engaged in a single illegal act, each of us knew that our commitment to socialism implied the obligation to commit treason, too.[7]

After the death of Stalin in 1953, his father Phil Horowitz, commenting on how Stalin’s numerous official titles had to be divided among his successors, told his son, “You see what a genius Stalin was. It took five men to replace him.”[8] According to Horowitz:

The publication of the Khrushchev Report was probably the greatest blow struck against the Soviet Empire during the Cold War. When my parents and their friends opened the morning Times and read its text, their world collapsed—and along with it their will to struggle. If the document was true, almost everything they had said and believed was false. Their secret mission had led them into waters so deep that its tide had overwhelmed them, taking with it the very meaning of their lives.[6]

Horowitz received a BA from Columbia University in 1959, majoring in English, and a master’s degree in English literature at University of California, Berkeley.[citation needed]

Career with the New Left

After completing his graduate degree in the late 1960s, Horowitz lived in London and worked for the Bertrand Russell Peace Foundation.[9][10] He identified as a serious Marxist intellectual.

In 1966, Ralph Schoenman persuaded Bertrand Russell to convene a war crimes tribunal to judge United States involvement in the Vietnam War.[11] Horowitz would write three decades later that he had political reservations about the tribunal and did not take part. He described the tribunal’s judges as formidable, world-famous and radical, including Isaac Deutscher, Jean-Paul Sartre, Stokely Carmichael, Simone de Beauvoir, James Baldwin, and Vladimir Dedijer.[12]

While in London, Horowitz became a close friend of Deutscher, and wrote a biography of him which was published in 1971.[13][14] Horowitz wrote The Free World Colossus: A Critique of American Foreign Policy in the Cold War. In January 1968, Horowitz returned to the United States, where he became co-editor of the New Left magazine Ramparts, based in northern California.[10]

During the early 1970s, Horowitz developed a close friendship with Huey P. Newton, founder of the Black Panther Party. Horowitz later portrayed Newton as equal parts gangster, terrorist, intellectual, and media celebrity.[10] As part of their work together, Horowitz helped raise money for, and assisted the Panthers with, the running of a school for poor children in Oakland. He recommended that Newton hire Betty Van Patter as bookkeeper; she was then working for Ramparts. In December 1974, Van Patter’s body was found floating in San Francisco Harbor; she had been murdered. Horowitz has said he believes the Panthers were behind the killing.[10][15]

In 1976, Horowitz was a “founding sponsor” of James Weinstein‘s magazine In These Times.[16]

Writing on the Right

Following this period, Horowitz rejected Marx and socialism, but kept quiet about his changing politics for nearly a decade. In the spring of 1985, Horowitz and longtime collaborator Peter Collier, who had also become conservative, wrote an article for The Washington Post Magazine entitled “Lefties for Reagan“, later retitled as “Goodbye to All That”. The article explained their change of views and recent decision to vote for a second term for Republican President Ronald Reagan.[17][18][19] In 1986, Horowitz published “Why I Am No Longer a Leftist” in The Village Voice.[20]

In 1987, Horowitz co-hosted a “Second Thoughts Conference” in Washington, D.C., described by Sidney Blumenthal in The Washington Post as his “coming out” as a conservative. According to attendee Alexander Cockburn, Horowitz related how his Stalinist parents had not permitted him or his sister to watch the popular Doris Day and Rock Hudson movies of his youth. Instead, they watched propaganda films from the Soviet Union.[21]

In May 1989, Horowitz, Ronald Radosh, and Peter Collier travelled to Poland for a conference in Kraków calling for the end of Communism.[22] After marching with Polish dissidents in an anti-regime protest, Horowitz spoke about his changing thoughts and why he believed that socialism could not create their future. He said his dream was for the people of Poland to be free.[23]

In 1992, Horowitz and Collier founded Heterodoxy, a monthly magazine focused on exposing what it described as excessive political correctness on United States college and university campuses. It was “meant to have the feel of a samizdat publication inside the gulag of the PC [politically correct] university.” The tabloid was directed at university students, whom Horowitz viewed as being indoctrinated by the entrenched Left in American academia.[24] He has maintained his assault on the political left to the present day. Horowitz wrote in his memoir Radical Son that he thought universities were no longer effective in presenting both sides of political arguments. He thought “left-wing professors” had created a kind of “political terror” on campuses.[25]

In a column in Salon magazine, where he is regularly published,[3] Horowitz described his opposition to reparations for slavery. He believed that it represented racism against blacks, as it defined them only in terms of having descended from slaves. He argues that applying labels like “descendants of slaves” to blacks was damaging and would serve to segregate them from mainstream society.[26]

In keeping with his provocateur position, in 2001 during Black History Month Horowitz purchased, or attempted to purchase, advertising space in several student American university publications to express his opposition to reparations for slavery.[3] Many student papers refused to sell him ad space; at some schools, papers which carried his ads were stolen or destroyed.[3][26] Editor Joan Walsh of Salon wrote that the furor had given Horowitz an overwhelming amount of free publicity.[3][27]

Horowitz supported the interventionist foreign policy associated with the Bush Doctrine. But he wrote against US intervention in the Kosovo War, arguing that it was unnecessary and harmful to U.S. interests.[28][29]

In the early 21st century, he has written critically of libertarian anti-war views.[30][31]

In 2004, Horowitz launched Discover the Networks, a conservative watchdog project that monitors funding for, and various ties among, leftists and progressive causes.[2]

In two books, Horowitz accused Dana L. Cloud, associate professor of communication studies at the University of Texas at Austin, as an “anti-American radical” who “routinely repeats the propaganda of the Saddam regime.”[citation needed] Horowitz accused her and 99 other professors listed in his book, The Professors: The 101 Most Dangerous Academics in America, of the “explicit introduction of political agendas into the classroom.”[32]

Cloud replied in Inside Higher Ed that her experience demonstrates that Horowitz damages professors’ lives by his accusations and that he needs to be viewed as more than a political opponent.

Horowitz’s attacks have been significant. People who read the book or his Web site regularly send letters to university officials asking for her to be fired. Personally, she has received—mostly via e-mail—”physical threats, threats of removing my daughter from my custody, threats of sexual assaults, horrible disgusting gendered things,” she said. That Horowitz doesn’t send these isn’t the point, she said. “He builds a climate and culture that emboldens people,” and as a result, shouldn’t be seen as a defender of academic freedom, but as its enemy.[33]

After discussion, the National Communication Association decided against granting Horowitz a spot as a panelist at its national conference in 2008. He had offered to forego the $7,000 speaking fee originally requested. He wrote in Inside Higher Ed, “The fact that no academic group has had the balls to invite me says a lot about the ability of academic associations to discuss important issues if a political minority wants to censor them.”[33] An association official said the decision was based in part on Horowitz’s request to be provided with a stipend for $500 to hire a personal bodyguard. Association officials decided that having a bodyguard present “communicates the expectation of confrontation and violence.”[33]

Horowitz appeared in Occupy Unmasked, a 2012 documentary portraying the Occupy Wall Street movement as a sinister organization formed to violently destroy the American government.[34]

Academic Bill of Rights

In the early 21st century, Horowitz has concentrated on issues of academic freedom, wanting to protect conservative viewpoints. He, Eli Lehrer, and Andrew Jones published a pamphlet, “Political Bias in the Administrations and Faculties of 32 Elite Colleges and Universities” (2004), in which they find the ratio of Democrats to Republicans at 32 schools to be more than 10 to 1.[35]

Horowitz’s book, The Professors: The 101 Most Dangerous Academics in America (2006), criticizes individual professors for, as he alleges, engaging in indoctrination rather than a disinterested pursuit of knowledge. He says his campaign for academic freedom is ideologically neutral.[36] He published an Academic Bill of Rights (ABR), which he proposes to eliminate political bias in university hiring and grading. Horowitz says that conservatives, and particularly Republican Party members, are systematically excluded from faculties, citing statistical studies on faculty party affiliation.[37] Critics such as academic Stanley Fish have argued that “academic diversity”, as Horowitz defines it, is not a legitimate academic value, and that no endorsement of “diversity” can be absolute.[38]

In 2004 the Georgia General Assembly passed a resolution on a 41–5 vote to adopt a version of the ABR for state educational institutions.[39]

In Pennsylvania, the House of Representatives created a special legislative committee to investigate issues of academic freedom, including whether students who hold unpopular views need more protection. In November 2006 it reported that it had not found evidence of problems [clarification needed] with students’ rights.[40][41][42][43][44][45]

Family

Horowitz has been married four times. He married Elissa Krauthamer, in a Yonkers, New York synagogue on June 14, 1959.[46] They had four children together: Jonathan Daniel, Ben, Sarah Rose (deceased), and Mrs. Anne Pilat. Their daughter Sarah Rose Horowitz died in March 2008 at age 44 from Turner syndrome-related heart complications. She had been a teacher, writer and human rights activist.[1][47] She is the subject of Horowitz’s 2009 book, A Cracking of the Heart.[47]

As an activist, she had cooked meals for the homeless, stood vigil at San Quentin on nights when the state of California executed prisoners, worked with autistic children in public schools and, with the American Jewish World Service, helped rebuild homes in El Salvador after a hurricane, and traveled to India to oppose child labor.[48] In a review of Horowitz’s book, FrontPage magazine associate editor David Swindle wrote that she fused “the painful lessons of her father’s life with a mystical Judaism to complete the task he never could: showing how the Left could save itself from self-destruction.”[49]

Horowitz’s son Ben Horowitz is a technology entrepreneur, investor, and co-founder, along with Marc Andreessen, of the venture capital firm Andreessen Horowitz.[50][51]

Horowitz’s second marriage, to Sam Moorman, ended in divorce. On June 24, 1990, Horowitz married Shay Marlowe in an Orthodox Jewish ceremony conducted at the Pacific Jewish Center by Rabbi Daniel Lapin.[52]They divorced. Horowitz’s fourth and present marriage is to April Mullvain.[53]

Horowitz now describes himself as an agnostic.[54]

Funding

Politico claims that Horowitz’s activities, like the David Horowitz Freedom Center are funded in part by Aubrey & Joyce Chernick and The Bradley Foundation. Politico claimed that during 2008-2010, “the lion’s share of the $920,000 it [David Horowitz Freedom Center] provided over the past three years to Jihad Watch came from Chernick”.[55]

Controversy and criticism

Academia

Some of Horowitz’s accounts of U.S. colleges and universities as bastions of liberal indoctrination have been disputed.[56] For example, Horowitz alleged that a University of Northern Colorado student received a failing grade on a final exam for refusing to write an essay arguing that George W. Bush is a war criminal.[57][58] A spokeswoman for the university said that the test question was not as described by Horowitz and that there were nonpolitical reasons for the grade, which was not an F.[59]

Horowitz identified the professor[60] as Robert Dunkley, an assistant professor of criminal justice at Northern Colorado. Dunkley said Horowitz made him an example of “liberal bias” in academia and yet, “Dunkley said that he comes from a Republican family, is a registered Republican and considers himself politically independent, taking pride in never having voted a straight party ticket,” according to Inside Higher Ed magazine.[60]In another instance, Horowitz said that a Pennsylvania State University biology professor showed his students the film Fahrenheit 9/11 just before the 2004 election in an attempt to influence their votes.[61][62] Pressed by Inside Higher Ed, Horowitz later retracted this claim.[63]

Horowitz has been criticized for material in his books, particularly The Professors: The 101 Most Dangerous Academics in America, by noted scholars such as Columbia University professor Todd Gitlin.[64] The group Free Exchange on Campus issued a 50-page report in May 2006 in which they take issue with many of Horowitz’s assertions in the book: they identify specific factual errors, unsubstantiated assertions, and quotations which appear to be either misquoted or taken out of context.[65][66]

Allegations of racism

Chip Berlet, writing for the Southern Poverty Law Center (SPLC), identified Horowitz’s Center for the Study of Popular Culture as one of 17 “right-wing foundations and think tanks support[ing] efforts to make bigoted and discredited ideas respectable.”[67] Berlet accused Horowitz of blaming slavery on “black Africans … abetted by dark-skinned Arabs” and of “attack[ing] minority ‘demands for special treatment’ as ‘only necessary because some blacks can’t seem to locate the ladder of opportunity within reach of others,’ rejecting the idea that they could be the victims of lingering racism.”[67][not in citation given]

Horowitz published an open letter to Morris Dees, president of the SPLC, saying that “[this reminder] that the slaves transported to America were bought from African and Arab slavers” was a response to demands that only whites pay reparations to blacks. He said he never held Africans and Arabs solely responsible for slavery. He said that Berlet’s accusation of racism was a “calculated lie” and asked that the report be removed.[68] The SPLC refused Horowitz’s request.[69] Horowitz has criticized Berlet and the SPLC on his website and personal blog.[70][71]

In 2008, while speaking at University of California, Santa Barbara (UCSB), he criticized Arab culture, saying it was rife with antisemitism.[72][73] He referred to the Palestinian keffiyeh, a traditional Arab head covering that became associated with PLO leader Yasser Arafat, as a symbol of terrorism. In response, UCSB professor Walid Afifi said that Horowitz was “preaching hate” and smearing Arab culture.[73]

Criticizing Islamic organizations

Horowitz has used university student publications and lectures at universities as venues for publishing provocative advertisements or lecturing on issues related to Islamic student and other organizations. In April 2008, his ‘David Horowitz Freedom Center’ advertised in the Daily Nexus, the University of California Santa Barbara school newspaper, saying that the Muslim Students’ Association (MSA) had links with the Muslim Brotherhood, Al Qaeda, and Hamas.[74]

In May 2008, Horowitz, speaking at UCSB, said that the Muslim Students’ Association supports “a second Holocaust of the Jews”.[73] The MSA said they were a peaceful organization and not a political group.[74] The MSA’s faculty adviser said the group had “been involved in interfaith activities with Jewish student groups, and they’ve been involved in charity work for national disaster relief.”[73] Horowitz ran the ad in The GW Hatchet, the student newspaper of George Washington University in Washington, D.C. Jake Sherman, the newspaper’s editor-in-chief, said claims the MSA was radical were “ludicrous”. He vowed to review his newspaper’s editorial and advertising policies.[75]

Horowitz published a 2007 piece in the Columbia University student newspaper, saying that, according to [unnamed and undocumented] public opinion polls, “between 150 million and 750 million Muslims support a holy war against Christians, Jews and other Muslims.”[76] Speaking at the University of Massachusetts Amherst in February 2010, Horowitz compared Islamists to Nazis, saying: “Islamists are worse than the Nazis, because even the Nazis did not tell the world that they want to exterminate the Jews.”[77]

Horowitz created a campaign for what he called “Islamo-Fascism Awareness Week” in parody of multicultural awareness activities. He helped arrange for leading critics of radical Islam to speak at more than a hundred college campuses in October 2007.[78] As a speaker he has met with intense hostility.[79][80][81]

In a 2011 review of anti-Islamic activists in the US, the Southern Poverty Law Center identified Horowitz as one of 10 people in the United States’ “Anti-Muslim Inner Circle”.[82]

Conservatism

Horowitz’s Frontpage Magazine published Ron Radosh‘s critical review of Diana West‘s book American Betrayal. Conservatives John Earl Haynes and Harvey Klehr, scholars of Soviet espionage, defended Horowitz for publishing the review and Radosh for writing it.[83] Vladimir Bukovsky, a Soviet dissident, rejected Radosh’s criticisms and said it was an attempt to portray West as a historically inept conspiracy-monger.[84]Horowitz defended the review in an article on Breitbart’s Big Government website.[85]

Other

In 2007, Lawrence Auster (January 26, 1949 – March 29, 2013) stated that Horowitz had rejected him from publishing in Frontpage Magazine for making racist statements.[86][87]

Books and other publications

Histories

(all co-authored with Peter Collier)

  • The Rockefellers: An American Dynasty (New York: Holt, Rinehart and Winston, 1976) ISBN 0-03-008371-0
  • The Kennedys: An American Drama (New York: Summit Books/Simon & Schuster, 1985) ISBN 0-671-44793-9
  • The Fords: An American Epic (New York: Summit Books/Simon & Schuster, 1987) ISBN 0-671-66951-6
  • The Roosevelts: An American Saga (1994)

https://en.wikipedia.org/wiki/David_Horowitz

Read Full Post | Make a Comment ( None so far )

American PIE — Propaganda Indoctrination Entertainment — Luce and His Empire –Time Magazine Is Fake News — Circling The Drain (CTD) — Videos

Posted on January 3, 2017. Filed under: American History, Art, Articles, Blogroll, Business, College, Communications, Congress, Constitution, Corruption, Culture, Documentary, Education, Elections, Employment, Films, Freedom, Friends, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, media, Money, Music, National Security Agency (NSA), People, Philosophy, Photos, Political Correctness, Private Sector, Public Sector, Radio, Rants, Raves, Raymond Thomas Pronk, Reviews, Spying, Strategy, Success, Talk Radio, Taxation, Taxes, Technology, Unemployment, Union, Unions, Video, War, Wealth, Welfare, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , , , , |

Image result

Image result for Luce and His Empire

Image result for HITLER person of the year

Image result for stalin person of the year

Image result for time magazine man of the year 1960

Image result for time magazine man of the year 1960

Image result for time magazine man of the year ronald reagan

Image result for time magazine man of the year 1960

Image result for time magazine man of the year covers 1923

Image result for trump covers time magazine

Image result for time magazine trump meltdown

Image result for time magazine trump meltdown

Image result for time magazine trump covers

Image result for trump person of the year

Image result for fortune magazine donald trump

Image result for time magazine man of the year covers 1923

Image result for ctd circling the drainImage result for cartoon circling the drain

Image result for circulation of news mapazines

Image result for circulation of news mapazines

Image result for cartoons fake news

Image result for cartoons fake news

Image result for blanco cartoons fake news

Image result for blanco cartoons fake news

Don McLean – American Pie

American Pie – Don McLean – Full Length 1989 Video from Original 1971/72 Song

Don McLean- American Pie (with Lyrics)

Donald Trump: Person Of The Year 2016 | POY 2016 | TIME

Time Magazine Person of the Year: Strangest Picks

Isaiah Wilner – “The Man Time Forgot”

USA – Seventy-five years of Time Magazine

Time Magazine Is Fake News

Henry R. Luce and the 20th Century

Uploaded on Apr 26, 2010

A discussion with two biographers of Henry R. Luce, the Yale graduate who founded Time, Inc. Alan Brinkley, an historian at Columbia University, and Lance Morrow, a contributor at Time, spoke about Luce and his impact on the 20th Century. Professor Shelly Kagan moderated the discussion; Yale University President Richard Levin gave the introduction. The event was sponsored by the Yale Daily News.

The Man Who Revolutionized Magazine Publishing: The Rise of the American News Media (2002)

Published on Dec 5, 2015

Henry Robinson Luce (April 3, 1898 – February 28, 1967), was a Chinese-American magazine magnate, who was called “the most influential private citizen in the America of his day”. About the book: https://www.amazon.com/gp/product/080…

He launched and closely supervised a stable of magazines that transformed journalism and the reading habits of upscale Americans. Time summarized and interpreted the week’s news; Life was a picture magazine of politics, culture, and society that dominated American visual perceptions in the era before television; Fortune explored in depth the economy and the world of business, introducing to executives avant-garde ideas such as Keynesianism; and Sports Illustrated explored the motivations and strategies of sports teams and key players. Counting his radio projects and newsreels, Luce created the first multimedia corporation. He was born in China to missionary parents. He envisaged that the United States would achieve world hegemony, and, in 1941, he declared the 20th century would be the “American Century”.

Nightly discussions of the concept of a news magazine led Luce and Hadden, both age 23, to quit their jobs in 1922. Later that same year, they formed Time Inc. Having raised $86,000 of a $100,000 goal, they published the first issue of Time on March 3, 1923. Luce served as business manager while Hadden was editor-in-chief. Luce and Hadden annually alternated year-to-year the titles of president and secretary-treasurer. In 1925, Luce decided to move headquarters to Cleveland, while Hadden was on a trip to Europe. Cleveland was cheaper, and Luce’s first wife, Lila, wanted out of New York. When Hadden returned, he was horrified and moved Time back to New York. Upon Hadden’s sudden death in 1929, Luce assumed Hadden’s position.

Luce launched the business magazine Fortune in February 1930 and acquired Life in order to relaunch it as a weekly magazine of photojournalism in November 1936; he went on to launch House & Home in 1952 and Sports Illustrated in 1954. He also produced The March of Time weekly newsreel. By the mid 1960s, Time Inc. was the largest and most prestigious magazine publisher in the world. (Dwight Macdonald, a Fortune staffer during the 1930s, referred to him as “Il Luce”, a play on the Italian Dictator Mussolini, who was called “Il Duce”).)

President Franklin D. Roosevelt, aware that most publishers were opposed to him, issued a decree in 1943 that blocked all publishers and media executives from visits to combat areas; he put General George Marshall in charge of enforcement. The main target was Luce, who had long opposed FDR. Historian Alan Brinkley argued the move was “badly mistaken”, for had Luce been allowed to travel, he would have been an enthusiastic cheerleader for American forces around the globe. But stranded in New York City, Luce’s frustration and anger expressed itself in hard-edged partisanship.[4] Luce, supported by Editor-in-Chief T. S. Matthews, appointed Whittaker Chambers as acting Foreign News editor in 1944, despite the feuds Chambers had with reporters in the field.[5]

Luce, who remained editor-in-chief of all his publications until 1964, maintained a position as an influential member of the Republican Party.[6] An instrumental figure behind the so-called “China Lobby”, he played a large role in steering American foreign policy and popular sentiment in favor of Nationalist leader Chiang Kai-shek and his wife Soong Mei-ling in their war against the Japanese. (The Chiangs appeared in the cover of Time eleven times between 1927 and 1955.[7])

It has been reported that Luce, during the 1960s, tried LSD and reported that he had talked to God under its influence.[8]

Once ambitious to become Secretary of State in a Republican administration, Luce penned a famous article in Life magazine in 1941, called “The American Century”, which defined the role of American foreign policy for the remainder of the 20th century (and perhaps beyond).

Firing Line with William F. Buckley Jr. “Reflections on the Current Scene”

Firing Line with William F. Buckley Jr. “Feminism”

Clare Boothe Luce: Legendary Playwright, Politician & Social Seductress – Biography (1997)

Christopher Hitchens on News, Media, Entertainment and Propaganda (1997)

“THE END IS NEAR!” TIME Magazine Releases Cryptic Cover November 2016! TIME’S UP!

Edward Bernays called it PROPAGANDA

What is Propaganda

Devastating Expose on American Journalism and Media Concentration: Leading Thinkers Bernie Sanders

Mainstream Media Lies to the Masses – Media Lies – Media Lies Documentary

Propaganda and Manipulation: How mass media engineers and distorts our perceptions

More on propaganda and collective insanity

Propaganda & Engineering Consent for Empire with Mark Crispin Miller

Ben Shapiro on Fake News, Crumbling Mainstream Media, and Russia’s Hacking (Part 3)

Ben Shapiro and Dave Rubin: Trump, the Alt Right, Fake News, and More (Full Interview)

College Indoctrination Documentary

Education Is a System of Indoctrination of the Young – Noam Chomsky

27. Your Indoctrination

Ben Shapiro on indoctrination of America’s youth in universities

What is “Fake News?”

The Truth About Fake News | Russia Hacked U.S. Election For Donald Trump?

WELCOME TO TRUTH | Full Documentary 2014

The Future of Newspapers and Magazines

The Future of Journalism: Tom Rosenstiel at TEDxAtlanta

Citizen journalism | Paul Lewis | TEDxThessaloniki

The slow journalism revolution | Rob Orchard | TEDxMadrid

Why the majority is always wrong | Paul Rulkens | TEDxMaastricht

Why I read a book a day (and why you should too): the law of 33% | Tai Lopez | TEDxUBIWiltz

George Carlin – Political Correctness is fascism pretending to be Manners………………

George Carlin the illusion of freedom

The Owners of the Country

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for Luce and His Empire

CreditIllustration by Javier Jaén

Our new president is a private-jet-setting billionaire Ivy League graduate, a real estate tycoon, a TV star and a son of inherited wealth. But he is no longer, by his own calculations, a member of the “elite.” Nor are the men (and the few women) now joining his inner circle — 1-percenters and corporate executives, Harvard and Yale alumni, Silicon Valley entrepreneurs and Goldman Sachs bankers. The true elite apparently sits elsewhere, among those who, in Sarah Palin’s notable 2008 formulation, think “that they’re — I guess — better than anyone else.”

As an adjective, the word “elite” still conveys something positive, even aspirational: elite athlete, elite model, elite travel services. But as a noun, embodied by actual living people, it has become one of the nastiest epithets in American politics. “Elites have taken all the upside for themselves and pushed the downside to the working- and middle-class Americans,” complains Trump’s adviser Steve Bannon (of Harvard, Goldman Sachs and Hollywood). In this formulation, elites are a destructive, condescending collective, plotting against the beleaguered masses outside their ranks.

And in these attacks, the president-elect and his team are deploying one of the most effective partisan political stereotypes of the modern age. For most of American history, anti-elite sentiment was a matter of up versus down, not left versus right. But about half a century ago, the conservative movement set out to claim anti-elite politics as its own. That meant redefining the term away from class and toward culture, where the “elite” could be identified by its liberal ideas, coastal real estate and highbrow consumer preferences. The right-wing Club for Growth captured this type in a famous 2004 attack ad, instructing the Democrat Howard Dean to “take his tax-hiking, government-expanding, latte-drinking, sushi-eating, Volvo-driving, New York Times-reading, body-piercing, Hollywood-loving, left-wing freak show back to Vermont where it belongs.”

By the 1990s, bashing the ‘liberal elite’ had become a favorite blood sport of the American right.

Trump adjusted the formula for the hot topics of the 2016 campaign. “I was on the right side of that issue, as you know, with the people,” he boasted after Brexit, adding that “Hillary, as always, stood with the elites.” His complaints against “political correctness” conjure a world of absurdist campus politics, where overprivileged students squabble over gender pronouns and the fine points of racial victimization. “Media elites” come in for special attack, cordoned off in pens to be mocked and jeered at during rallies, labeled both liars and incompetents.

But Trump has also ventured beyond mere name-calling, turning the 2016 election into a competition between knowledge systems: the tell-it-like-it-is “people” versus the know-it-all “elites.” His campaign insisted for months that pollsters and technocrats and media would be proven wrong by his electoral success. The fact that he did win dealt a blow to an entire worldview, one in which empirical inquiry and truth-telling were supposed to triumph in the end. The question, now, is whether it’s possible to run an executive branch based on hostility toward experts and professionals of all political stripes — and how many billionaires and Ivy Leaguers Trump can appoint before this rhetorical pose begins to break down altogether.

The notion that distant elites might be conspiring against the people comes straight from the Founding Fathers, whose Declaration of Independence lamented the “long train of abuses and usurpations” inflicted upon ordinary Americans by an arrogant British king. From there on, United States history might be seen as a repeating cycle of anti-elite revolt. The Jacksonians rebelled against the Founders’ aristocratic pretensions. Northern “free labor” went to war against the oligarchical slavocracy. And the Populist revolts of the late 19th century adapted this story to modern capitalism, with farmers and laborers rebelling against robber barons, bankers, time-management experts and college-educated professionals.

The first historians to study those Populists described them as heroic crusaders, champions of the “people” against the “powers.” But by the middle of the 20th century, alarmed by the rise of fascism and homegrown demagogues like Senator Joseph McCarthy, a new generation of scholars took a more anxious view of the anti-elite spirit. In his 1955 book “The Age of Reform,” Richard Hofstadter dismissed the Populists as backward-looking, provincial anti-Semites, the latent fascists of their day. Eight years later, his “Anti-Intellectualism in American Life” documented a dangerous suspicion of “the critical mind” that seemed to course through the national culture. From his perspective, the 1952 election captured everything wrong with American political life, with Dwight Eisenhower’s “philistinism” winning over Adlai Stevenson’s “intellect.”

The question is whether it’s possible to run an executive branch based on hostility toward experts and professionals of all political stripes.

Hofstadter did not usually describe his ideal intellectually minded citizens as members of an “elite.” That word conveyed something different — a ruling class that held direct political and economic power. The most famous articulation of this view came from the sociologist C. Wright Mills, in his 1956 assessment of America’s “power elite.” “They rule the big corporations,” Mills wrote. “They run the machinery of the state and claim its prerogatives. They direct the military establishment.” In Mills’s view, these people were tied together not by culture or ideology but by their positions at the helms of large, ever-more-complex institutions. As individuals, they might be Republicans or Democrats, and might live in Ohio or California. The point was that they were in charge of things.

But that vision never gained much traction in mainstream politics, where a more partisan, targeted definition was starting to emerge. William F. Buckley Jr. carved out some essentials in his first book, “God and Man at Yale,” drawing a neat distinction between respectable Ivy-educated men like himself and the socialistic eggheads of the professoriate. Ronald Reagan chose the term “elite” to bring it all together in his famed 1964 speech, “A Time for Choosing,” delivered on behalf of the Republican presidential candidate Barry Goldwater. “This is the issue of this election,” he said: “whether we believe in our capacity for self-government or whether we abandon the American Revolution and confess that a little intellectual elite in a far-distant capitol can plan our lives for us better than we can plan them ourselves.”

Lyndon Johnson won that election in a blowout, but Reagan’s vision of a smug and detached liberal elite helped spark the oncoming “culture wars,” pitting a supposedly indignant Middle America against the liberal snobs of the coasts. By the 1990s, with the rise of right-wing media stars like Rush Limbaugh and Bill O’Reilly, bashing the “liberal elite” had become a favorite blood sport of the American right.

Despite all the abuse hurled their way, some “liberal elites” have accepted at least part of their detractors’ critique, particularly on the progressive left. It was during Bill Clinton’s presidency that the social critic Christopher Lasch published “The Revolt of the Elites and the Betrayal of Democracy,” which mourned that “upper-middle-class liberals” had turned into “petulant, self-righteous, intolerant” scolds, thoroughly out of touch with the concerns of Middle America. Since then, the torch has passed to a younger generation of writers, including MSNBC’s Chris Hayes, whose 2012 “Twilight of the Elites” called for rethinking the entire ethos of liberal “meritocracy” — a system, he argued, that tends to fuel self-congratulation and incompetence at the top while offering little but contempt and dim prospects for those at the bottom.

So as 2017 begins, we find ourselves in a strange and uncertain political moment. Antipathy toward a wealthy, preening managerial class seems to be gaining popularity across the political spectrum — and, oddly, to have helped elect a wealthy, preening incoming president. Meanwhile, both liberal and conservative “elites” are scrambling to figure out what happens if the president-elect continues to reject basic political norms and even routine intelligence briefings. Under a Trump presidency, such “elites” may have no choice but to attempt a radical redefinition of their role in American life. Otherwise, the man in the White House will do it for them.

http://www.nytimes.com/2017/01/03/magazine/how-elites-became-one-of-the-nastiest-epithets-in-american-politics.html?_r=0

Henry Luce

From Wikipedia, the free encyclopedia
Henry Luce
Clare Boothe Luce and Henry Luce NYWTS.jpg

Luce with wife Clare Boothe Luce, a famous playwright and politician (1954)
Born Henry Robinson Luce
April 3, 1898
Tengchow, China
Died February 28, 1967 (aged 68)
Phoenix, Arizona, U.S.
Occupation Publisher; Journalist
Political party Republican
Spouse(s) Lila Ross Hotz (1923–1935)
Clare Boothe Luce
(1935–1967, his death)
Children 3, including Ann Clare Brokaw (step-daughter)
Parent(s) Henry W. Luce and Elizabeth Middleton Root

Henry Robinson Luce (April 3, 1898 – February 28, 1967) was an American magazine magnate who was called “the most influential private citizen in the America of his day”.[1] He launched and closely supervised a stable of magazines that transformed journalism and the reading habits of upscale Americans. Time summarized and interpreted the week’s news; Life was a picture magazine of politics, culture, and society that dominated American visual perceptions in the era before television; Fortune explored in depth the economy and the world of business, introducing to executives avant-garde ideas such as Keynesianism; and Sports Illustrated explored the motivations and strategies of sports teams and key players. Counting his radio projects and newsreels, Luce created the first multimedia corporation. He was born in China to missionary parents. He envisaged that the United States would achieve world hegemony, and, in 1941, he declared the 20th century would be the “American Century“.[2][3]

Life and career

Luce was born in Tengchow, Shandong, China, (now Penglai) on April 3, 1898, the son of Elizabeth Root Luce and Henry Winters Luce, who was a Presbyterian missionary.[3] He received his education in various Chinese and English boarding schools, including the China Inland Mission Chefoo School.

At 15, he was sent to the US to attend the Hotchkiss School in Connecticut, where he edited the Hotchkiss Literary Monthly. It was there he first met Briton Hadden,[3] who would become a lifelong partner. At the time, Hadden served as editor-in-chief of the school newspaper, and Luce worked as an assistant managing editor. Both went on to Yale College, where Hadden served as chairman and Luce as managing editor of The Yale Daily News. Luce was also a member of Alpha Delta Phi and Skull and Bones. After being voted “most brilliant” of his class and graduating in 1920, he parted ways with Hadden to embark for a year on historical studies at Oxford University, followed by a stint as a cub reporter for the Chicago Daily News.

In December 1921, Luce rejoined Hadden to work at The Baltimore News. Recalling his relationship with Hadden, Luce later said, “Somehow, despite the greatest differences in temperaments and even in interests, we had to work together. We were an organization. At the center of our lives — our job, our function — at that point everything we had belonged to each other.”[citation needed]

Magazines

Nightly discussions of the concept of a news magazine led Luce and Hadden, both age 23, to quit their jobs in 1922. Later that same year, they partnered with Robert Livingston Johnson and another Yale classmate to form Time Inc.[4] Having raised $86,000 of a $100,000 goal, they published the first issue of Time on March 3, 1923. Luce served as business manager while Hadden was editor-in-chief. Luce and Hadden annually alternated year-to-year the titles of president and secretary-treasurer while Johnson served as vice president and advertising director. In 1925, Luce decided to move headquarters to Cleveland, while Hadden was on a trip to Europe. Cleveland was cheaper, and Luce’s first wife, Lila, wanted out of New York. When Hadden returned, he was horrified and moved Time back to New York. Upon Hadden’s sudden death in 1929, Luce assumed Hadden’s position.

Luce launched the business magazine Fortune in February 1930 and acquired Life in order to relaunch it as a weekly magazine of photojournalism in November 1936; he went on to launch House & Home in 1952 and Sports Illustrated in 1954. He also produced The March of Time weekly newsreel. By the mid 1960s, Time Inc. was the largest and most prestigious magazine publisher in the world. (Dwight Macdonald, a Fortune staffer during the 1930s, referred to him as “Il Luce”, a play on the Italian Dictator Mussolini, who was called “Il Duce”).)

President Franklin D. Roosevelt, aware that most publishers were opposed to him, issued a decree in 1943 that blocked all publishers and media executives from visits to combat areas; he put General George Marshall in charge of enforcement.[citation needed] The main target was Luce, who had long opposed Roosevelt. Historian Alan Brinkley argued the move was “badly mistaken” and said had Luce been allowed to travel, he would have been an enthusiastic cheerleader for American forces around the globe.[citation needed] However, stranded in New York City, Luce’s frustration and anger expressed itself in blatant partisanship.[5]

Luce, supported by Editor-in-Chief T. S. Matthews, appointed Whittaker Chambers as acting Foreign News editor in 1944, despite the feuds that Chambers had with reporters in the field.[6]

Luce, who remained editor-in-chief of all his publications until 1964, maintained a position as an influential member of the Republican Party.[7] An instrumental figure behind the so-called “China Lobby“, he played a large role in steering American foreign policy and popular sentiment in favor of Kuomintang leader Chiang Kai-shek and his wife, Soong Mei-ling, in their war against the Japanese. (The Chiangs appeared in the cover of Time eleven times between 1927 and 1955.[8])

It has been reported that Luce, during the 1960s, tried LSD and reported that he had talked to God under its influence.[9]

Once ambitious to become Secretary of State in a Republican administration, Luce penned a famous article in Life magazine in 1941, called “The American Century“, which defined the role of American foreign policy for the remainder of the 20th century (and perhaps beyond).[7]

An ardent anti-Soviet, he once demanded John Kennedy invade Cuba, later to remark to his editors that if he did not, his corporation would act like Hearst during the Spanish–American War. The publisher would advance his concepts of US dominance of the “American Century” through his periodicals with the ideals shared and guided by members of his social circle, John Foster Dulles, Secretary of State and his brother, director of the CIA, Allen Dulles. To highlight the cozy extent of their alliance, rumors swirled that the publisher shared the wartime mistress of the spymaster with Clare Booth Luce.[10]

Family

Luce had two children, Peter Paul and Henry Luce III, with his first wife, Lila Hotz. He married his second wife, Clare Boothe Luce in 1935, who had an 11-year-old daughter, Ann Clare Brokaw, whom he raised as his own. He died in Phoenix, Arizona in 1967. According to the Henry Luce Foundation, he died suddenly at age 68 while visiting his home on Fishers Island, New York, of cardiac arrest. At his death, he was said to be worth $100 million in Time Inc. stock.[11] Most of his fortune went to the Henry Luce Foundation. During his life, Luce supported many philanthropies such as Save the Children Federation, the Metropolitan Museum of Art and United Service to China, Inc. He is interred at Mepkin Plantation in South Carolina.

He was honored by the United States Postal Service with a 32¢ Great Americans series (1980–2000) postage stamp.[12] Mr. Luce was inducted into the Junior Achievement U.S. Business Hall of Fame in 1977.

Designed by I. M. Pei, the Luce Memorial Chapel, on the campus of Tunghai University, Taiwan, was constructed in memoriam of Henry Luce’s father.

References

  1. Jump up^ Robert Edwin Herzstein (2005). Henry R. Luce, Time, and the American Crusade in Asia. Cambridge U.P. p. 1.
  2. Jump up^ Editorial (1941-02-17) The American Century, Life Magazine
  3. ^ Jump up to:a b c Baughman, James L. (April 28, 2004). “Henry R. Luce and the Rise of the American News Media”. American Masters (PBS). Retrieved 19 June 2014.
  4. Jump up^ Warburton, Albert (Winter 1962). “Robert L. Johnson Hall Dedicated at Temple University” (PDF). The Emerald of Sigma Pi. Vol. 48 no. 4. p. 111.
  5. Jump up^ Alan Brinkley, The Publisher: Henry Luce and his American Century (2010) pp 302-3
  6. Jump up^ Brinkley, The Publisher: Henry Luce and his American Century (2010) pp 322-93
  7. ^ Jump up to:a b “Henry R. Luce: End of a Pilgrimage”. – TIME. – March 10, 1967
  8. Jump up^ “Time magazine historical search”. Time magazine. Retrieved 19 June 2014.
  9. Jump up^ Maisto, Stephen A., Galizio, Mark, & Connors, Gerald J. (2008). Drug Use and Abuse: Fifth Edition. Belmont: Thomson Higher Education. ISBN 0-495-09207-X
  10. Jump up^ Talbot, David. “The Devils’ Chessboard: Allen Dulles, The CIA and the Rise of America’s Secret Government.” (2015) Harper-Collins, pub., New York, New York pp. 236-238, 444.
  11. Jump up^ Edwin Diamond (October 23, 1972). “Why the Power Vacuum at Time Inc. Continues”. New York Magazine.
  12. Jump up^ “Henry R. Luce”. US Stamp Gallery. April 3, 1998.

Further reading

  • Baughman, James L. “Henry R. Luce and the Business of Journalism.” Business & Economic History On-Line 9 (2011). online
  • Baughman, James L. Henry R. Luce and the Rise of the American News Media (2001) excerpt and text search
  • Brinkley, Alan. The Publisher: Henry Luce and His American Century, Alfred A. Knopf (2010) 531 pp.
  • Brinkley, Alan. What Would Henry Luce Make of the Digital Age?, TIME (April 19, 2010) excerpt and text search
  • Elson, Robert T. Time Inc: The Intimate History of a Publishing Enterprise, 1923-1941 (1968); vol. 2: The World of Time Inc.: The Intimate History, 1941-1960 (1973), official corporate history
  • Herzstein, Robert E. Henry R. Luce, Time, and the American Crusade in Asia (2006) excerpt and text search
  • Herzstein, Robert E. Henry R. Luce: A Political Portrait of the Man Who Created the American Century (1994).
  • Morris, Sylvia Jukes. Rage for Fame: The Ascent of Clare Boothe Luce (1997).
  • Wilner, Isaiah. The Man Time Forgot: A Tale of Genius, Betrayal, and the Creation of Time Magazine, HarperCollins, New York, 2006

External links

https://en.wikipedia.org/wiki/Henry_Luce

W. A. Swanberg

From Wikipedia, the free encyclopedia

William Andrew Swanberg (November 23, 1907 in St. Paul, Minnesota – September 17, 1992 in Southbury, Connecticut)[1] was an American biographer. He may be known best for Citizen Hearst, a biography of William Randolph Hearst, which was recommended by the Pulitzer Prize board in 1962 but overturned by the trustees.[2] He won the 1973 Pulitzer Prize for Biography or Autobiography for his 1972 biography of Henry Luce,[3] and the National Book Award in 1977 for his 1976 biography of Norman Thomas.[4]

Life

Swanberg was born in Saint Paul, Minnesota in 1907, and earned his B.A. at the University of Minnesota in 1930.[5]

With grudging and only partial help from his father, who wanted his son to be a cabinet maker like himself, Swanberg earned his degree, only to find that employment as a journalist with such local daily newspapers as the St. Paul Daily News and the Minneapolis Star was unsatisfactory, as their staff were shrinking during the Great Depression. Swanberg instead held a succession of low-paying manual labor jobs. After five years he followed a college friend to New York City in September 1935. After months of anxious job-hunting he secured an interview at the Dell Publishing Company with president George T. Delacorte Jr. himself, and was hired as an assistant editor of three lowbrow magazines. Money saved in the next months enabled him to return briefly to the Midwest to marry his college sweetheart Dorothy Green, and bring her to New York. He soon began to climb up the editorial ladder at Dell, and by 1939 he was doing well enough to buy a house in Connecticut.

When the United States entered World War II, Swanberg was 34 years old, the father of two children and suffering from a hearing disability. Rejected by the army, he enlisted in the Office of War Information in 1943 and, after training was sent to England following D-Day. In London, amid the V-1 and V-2 attacks, he prepared and edited pamphlets to be air-dropped behind enemy lines in France and later in Norway.[6] With the end of the war he returned in October 1945 to Dell and the publishing world.

Swanberg did not return to magazine editing but instead did freelance work within and without Dell. By 1953 he began carving out time for researching his first book (Sickles), which Scribner’s purchased, beginning a long-term association. Swanberg’s early hopes of newspaper work never materialized, but by the mid-1950s he had established himself as scholarly biographer. His efforts proved to be labor-intensive and required up to four years apiece, even when assisted by the research and transcription efforts of his wife Dorothy. Upon turning 80 in 1987, Swanberg attempted one last biography, about William Eugene “Pussyfoot” Johnson (1862–1945).[7] He was at work on that project when he succumbed to heart failure at his typewriter in Southbury, Connecticut on September 17, 1992.

Swanberg was a Guggenheim fellow in 1960. His papers are archived at Columbia University.

The Hearst Affair

Swanberg’s 1961 book Citizen Hearst: A Biography of William Randolph Hearst was recommended for a Pulitzer Prize for Biography or Autobiography by the advisory board but rejected by the trustees of Columbia University, apparently because they thought that Hearst was not dignified enough to be the subject of the award. It was the first time in 46 years that the trustees rejected a recommendation from the advisory board, and the news caused sales to soar.[1]

Works

In a statistical overview derived from writings by and about William Andrew Swanberg, OCLC/WorldCat [clarification needed] encompasses roughly 30+ works in 100+ publications in 5 languages and 16,000+ library holdings.[8]

Literary Awards

References

  1. ^ Jump up to:a b www.nytimes.com
  2. ^ Jump up to:a b Hohenberg, John. The Pulitzer Diaries: Inside America’s Greatest Prize. 1997. p. 109.
  3. ^ Jump up to:a b “Biography or Autobiography”. Past winners and finalists by category. The Pulitzer Prizes. Retrieved 2012-03-17.
  4. ^ Jump up to:a b “National Book Awards – 1977”. National Book Foundation. Retrieved 2012-03-17.
  5. Jump up^ Gale Contemporary Authors Online. Volume 13.[page needed]
  6. Jump up^ Gale, p. 264
  7. Jump up^ Gale, p. 277
  8. Jump up^ WorldCat Identities: Swanberg, W. A. 1907-

External links

  • W. A. Swanberg Papers Kislak Center for Special Collections, Rare Books and Manuscripts, University of Pennsylvania

https://en.wikipedia.org/wiki/W._A._Swanberg

Read Full Post | Make a Comment ( None so far )

Rolling Back The 30-50 Million Illegal Alien Invasion of United States Will Be The Political Issue For Next Ten Years — Trump’s Trojan Horse — Republican Touch Back Amnesty or Citizenship For Illegal Aliens Will Lead To Rebellion By American People — Enforce Current Immigration Law (Deport All Illegal Aliens) or Face The Second American Revolution — Videos

Posted on December 31, 2016. Filed under: American History, Babies, Blogroll, Communications, Congress, Constitution, Corruption, Demographics, Documentary, Economics, Faith, Family, Foreign Policy, Freedom, Friends, government spending, history, Homes, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, Movies, Newspapers, People, Philosophy, Photos, Political Correctness, Press, Security, Speech, Strategy, Talk Radio, Taxation, Taxes, Terrorism, Unemployment, Video, War, Welfare, Wisdom, Writing | Tags: , , , , , |

Image result for cartoons trump touch back amnestyImage result for cartoons trump touch back amnestyImage result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnestyImage result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Trump’s Touchback amnesty explained by Marc Thiessen

Donald Trump explains his immigration plan

Is Donald Trump changing his immigration vision?

Is Donald Trump Flip-Flopping on Immigration? A Closer Look

Immigration by the Numbers — Off the Charts

Immigration, World Poverty and Gumballs – NumbersUSA.com

How Many Illegal Aliens Are in the US? – Walsh – 1

How Many Illegal Aliens Are in the US? – Walsh – 2

The Truth About Immigration: What They Won’t Tell You!

WHO KNEW? TRUMP FAVORS AMNESTY FOR UNDOCUMENTED IMMIGRANTS

This article first appeared on the American Enterprise Institute site.

Trump’s supporters loved his promise last week to create a “deportation force” to remove all 11 million illegal immigrants living in America, and his repeated declaration that everyone here illegally will “have to go.”

But his supporters tend to overlook his other promise—repeated in the Fox Business debate in Milwaukee on November 10—that under his immigration plan “they will come back.”

That’s right. Under Trump’s immigration plan, almost all of the 11 million illegal aliens (save for a small minority with criminal records) will get to return and get permanent legal status to stay here in America.

Trump supports amnesty.

On Fox News on November 12, Trump’s son Eric expressed frustration that the media overlooks this:

The point isn’t just deporting them, it’s deporting them and letting them back in legally. He’s been so clear about that and I know the liberal media wants to misconstrue it, but it’s deporting them and letting them back legally.

Eric Trump is right. His father has been crystal clear that he wants all the illegals to return and live in America.

Listen closely to what Trump is actually proposing. In an interview with CNN’s Dana Bash earlier this year, Trump explained his plan this way:

I would get people out and then have an expedited way of getting them back into the country so they can be legal…. A lot of these people are helping us … and sometimes it’s jobs a citizen of the United States doesn’t want to do. I want to move ’em out, and we’re going to move ’em back in and let them be legal.

This is a policy called “touchback” and it was first proposed in 2007 by moderate Republican Senator Kay Bailey Hutchison (Texas). She offered a “touchback” amendment on the Senate floor that would have required illegal immigrants to return to their home countries to apply for a special “Z visa” that would allow them to re-enter the United States in an expedited fashion and work here indefinitely.

Her amendment lost by a relatively close margin, 53-45. It was supported by most Republicans and even got five Democratic votes—senators Claire McCaskill, Max Baucus, Jon Tester, Byron Dorgan and John Rockefeller all voted for it.

The idea was considered so reasonable that in an April 22, 2007, editorial entitled “Progress on Immigration,” The New York Times declared:

It’s not ideal, but if a touchback provision is manageable and reassures people that illegal immigrants are indeed going to the back of the line, then it will be defensible.

So what Trump is proposing today—sending illegal immigrants back to their home countries and then allowing the “good ones” to return in an “expedited” fashion—was endorsed by the liberal New York Times!

In fact, the idea even got the support of—wait for it—illegal immigrants.

In 2007, the Los Angeles Times did the first telephone poll of illegal immigrants and asked whether they would go home under a “touchback” law that allowed them to return with legal status. Sixty-three percent said yes, 27 percent said no and 10 percent were undecided. If they were promised a path to citizenship when they returned, the number who said they would leave and return legally grew to 85 percent.

Donald Trump’s detractors were aghast at his invocation during the Fox Business debate of President Dwight D. Eisenhower’s “Operation Wetback,” which forcibly removed 1.5 million illegal immigrants, and his promise the following day to establish a “deportation force” to remove the 11 million illegal immigrants living in America today.

Never mind the fact that we already have a “deportation force”—it’s called U.S. Immigration and Customs Enforcement (ICE).

The fact is, Trump won’t need a “deportation force” or an “Operation Wetback” to get illegal immigrants to go home—because he has promised that they can return quickly with legal status.

The vast majority of illegal immigrants say they would voluntarily cooperate with Trump’s plan.

If anything, the “touchback” plan Trump endorses was attacked by conservatives back in 2007. In an editorial, National Review called touchback a “fraud” that gives illegal aliens “their own privileged pathway” ahead of “applicants who have complied with US immigration laws.”

That is precisely what Trump is proposing. Under his plan, illegal aliens don’t have to go to the end of the line behind those who have complied with our immigration laws. They get an “expedited way of getting them back into the country so they can be legal.” They get to cut the line and then stay in America.

So if you get past Trump’s bluster, the plan he is proposing is so liberal that it earned the support of The New York Times and the opposition of National Review.

The reason is simple: Trump’s plan is in fact a form of amnesty—you just have to leave the country briefly to get it.

So when Trump says of illegal immigrants “they all have to go,” don’t overlook the fact that under his plan almost all would be able to immediately return—and stay.

This means there is very little difference between his plan and what John Kasich and Jeb Bush are supporting.

And most of his supporters don’t even realize it.

Marc Thiessen is a fellow at the American Enterprise Institute.

 

Central Americans continue to surge across U.S. border, new DHS figures show

December 30 at 6:05 PM

U.S. officials are grappling with a 15 percent surge in illegal immigration, reflecting continued failures by the Obama administration to deter illegal immigration along the country’s southwestern border.

Homeland Security officials apprehended 530,250 illegal immigrants and sent 450,954 people back to their home countries over the 12-month period that ended in September, according to figures released Friday by the Department of Homeland Security.

The majority of those apprehended come from Central American countries and include 137,614 families and unaccompanied children, part of an ongoing flight from high crime and violence in Honduras, El Salvador and Guatemala, which human rights advocates have urged the administration to treat as a refu­gee crisis.

The number of families and children in the past year also exceeded figures from 2015 and 2014, when illegal immigrants from Central America overwhelmed U.S. Border Patrol stations at the Mexican border and President Obama called the flow of children an “urgent humanitariansituation.”

Administration officials said Friday that the latest “removal” figures reflect a concerted policy shift to target convicted criminals over others.

“We continued to better focus our interior resources on removing individuals who may pose threats to public safety — specifically, convicted criminals and threats to national security,” Homeland Security Secretary Jeh Johnson said in a statement. “This prioritization is reflected in actual results.” More than 99 percent of those forcibly removed from the country over the most recent 12-month period fell into the administration’s three priority categories.

Overall deportations have dropped over the past few years, from a peak of more than 400,000 during Obama’s first term.

Immigration human rights advocates, including J. Kevin ­Appleby, the senior director of international migration policy at the Center for Migration Studies, say the priorities were a good move — probably resulting in fewer deportations overall — but have come too late.

“In the end, the president will be remembered as a deporter, not a reformer. In the first four years, he set record numbers in removals, much to the dismay of the immigrant community,” Appleby said.

Immigration advocates have repeatedly criticized the Obama administration for its increased reliance on detention facilities, particularly for Central American families, who they argue should be treated as refugees fleeing violent home countries rather than as priorities for deportation.

They also say that the growing number of apprehended migrants on the border, as reflected in the new Homeland Security figures, indicate that home raids and detentions of families from Central America isn’t working as a deterrent.

Trump’s Transition: Who is Gen. John F. Kelly?

 

President-elect Donald Trump is nominating retired Marine Gen. John F. Kelly for secretary of homeland security. Here’s what you need to know about him. (Video: Sarah Parnass, Osman Malik/Photo: Nikki Kahn/The Washington Post)

According to the Homeland Security report released Friday, U.S. Immigration and Customs Enforcement placed 352,882 people in detention facilities in fiscal 2016, a sharp rise from 193,951 people placed in detention last year.

Officials said Friday that the shifting demographic — from predominantly Mexican adults trying to cross the border 10 years ago to a larger proportion of Central Americans crossing today — has placed an added strain on Homeland Security resources due to the costs of sending people back to Central America and because of longer processes for people with security concerns.

Many of those arriving from Central America have applied for asylum with claims of “credible or reasonable fear of persecution” in their home countries, Homeland Security officials said.

After pressure from immigration rights advocates, the administration last summer announced plans to expand a State Department program to allow Central American minors to apply for refu­gee status.

But human rights activists ­expect detentions to increase under the administration of ­President-elect Donald Trump, who has vowed to step up the deportation of illegal immigrants and build a wall on the Mexican border.

Earlier this month, Trump said he would nominate retired Marine Gen. John F. Kelly, a border security hawk, to run the Department of Homeland Security. Kelly has warned about cross-border threats from Mexico and Central America.

Homeland Security figures released Friday showed that nearly 84 percent of the people removed from the United States in fiscal year 2016 were categorized as Priority 1, which includes ­“national security threats, convicted felons or ‘aggravated felons,’ criminal gang participants, and illegal entrants apprehended at the border,” according to the department’s report.

It was also unclear how many of those convicted were violent criminals or national security threats, as opposed to those whose offenses related only to crossing the border illegally. Twenty-two percent of those sent back to their countries also had no prior criminal convictions, the report said.

https://www.washingtonpost.com/world/national-security/central-americans-continue-to-surge-across-us-border-new-dhs-figures-show/2016/12/30/ed28c0aa-cec7-11e6-b8a2-8c2a61b0436f_story.html?utm_term=.d32dda491561

Read Full Post | Make a Comment ( None so far )

Master of Disaster President Obama — Legacy of Failure: Domestically and Abroad — One Success: Destroyed Democratic Party! — Videos

Posted on December 30, 2016. Filed under: American History, Articles, Blogroll, British History, Central Intelligence Agency (CIA), College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Dirty Bomb, Documentary, Drones, Economics, Education, Elections, Employment, Energy, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Homicide, Illegal, Immigration, Islam, Law, Legal, liberty, Life, Links, Macroeconomics, media, Middle East, Monetary Policy, Money, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Natural Gas, Newspapers, Nuclear, Nuclear Power, Nuclear Proliferation, Oil, Oil, People, Philosophy, Photos, Politics, Press, Radio, Rants, Raves, Raymond Thomas Pronk, Resources, Security, Strategy, Tax Policy, Taxation, Taxes, Television, Trade Policiy, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: |

Image result for master of destruction obama

Image result for master of destruction obama

Image result for master of destruction obama

Image result for cartoons master of destruction obama

Image result for cartoons master of disaster obama

Image result for cartoons master of disaster obama

Image result for cartoons master of disaster obama

Image result for cartoons master of disaster obama

Image result for cartoons obama legacy

 

Image result for cartoons obama legacy

Image result for cartoons obama legacyImage result for cartoons obama legacy

Image result for cartoons obama legacy

Image result for cartoons obama legacy

Image result for cartoons master of disaster obama

Image result for cartoons obama legacy

Image result for cartoons obama legacy

Obama’s Legacy of Failures – 30 documented examples

Report: ‘Obamanomics’ to Blame for Worst Economic Recovery Since 1930s

BREAKING NEWS !!! Barack Obama HAS MADE HIS FINAL IDIOTIC MOVE !!!!!!!!

Barack Obama IS DISINTEGRATING IN FRONT OF YOUR EYES !!!!!!!!

Obama sums up his failed presidency in under sixty seconds

Idiot Obama Worst President in History.

Barack Obama Has Failed Us Miserably

Obama’s Legacy Is One Of Absolute Failure

Obamanation: Crash Course US History #47

The Great Depression: Crash Course US History #33

TV Ad: Barack Obama’s Legacy of FAILURE

Is Obama the worst President ever? Worst Obama moments

Worst President Ever – Obama’s Legacy

Barrack Obama | America’s Worst President In History | Biography Documentary Films

MSNBC: JOE SCARBOROUGH ‘RATING OBAMA LEGACY” – ‘OBAMA’S GREATEST FAILURES “

Top 10 Worst American Presidents

 

Obama unleashes 3,853 regs, 18 for every law, record 97,110 pages of red tape

President Obama‘s lame duck administration poured on thousands more new regulations in 2016 at a rate of 18 for every new law passed, according to a Friday analysis of his team’s expansion of federal authority.

While Congress passed just 211 laws, Obama’s team issued an accompanying 3,852 new federal regulations, some costing billions of dollars.

The 2016 total was the highest annual number of regulations under Obama. Former President Bush issued more in the wake of 9/11.

The proof that it was an overwhelming year for rules and regulations is in the Federal Register, which ended the year Friday by printing a record-setting 97,110 pages, according to the analysis from the Competitive Enterprise Institute.

The annual “Unconstitutional Index” from Clyde Wayne Crews, CEI’s vice president for policy, said that it was much higher under Obama than under former President George W. Bush.

“The multiple did tend to be higher during Obama administration. Bush’s eight years averaged 20, while Obama’s almost-eight have averaged 29,” said his report, first provided to Secrets.

His index is meant to show that it is the federal bureaucracy, not Congress, that levies the most rules. “There’s no pattern to any of this, since the numerators and denominators can vary widely; there had been 114 laws in 2015, and a multiple of 39. The multiple can be higher with fewer laws, or with more regulations, holding the other constant. The point is that agencies do the bulk of lawmaking, no matter the party in power,” he wrote.

President-elect Trump has promised to slash federal regulations, even pledging to cut two current rules for every one he imposes. Congressional leaders have also promised to slash rules and regulations that have escalated under Obama.

http://www.washingtonexaminer.com/obama-unleashes-3853-regs-18-for-every-law-record-97110-pages-of-red-tape/article/2610592#!

Read Full Post | Make a Comment ( None so far )

People vs. “Elites”: Nationalist Capitalism Winning — Global Socialism Losing — Videos

Posted on December 29, 2016. Filed under: American History, Articles, Banking, Blogroll, British History, Business, College, Communications, Constitution, Corruption, Crime, Crisis, Documentary, Economics, Education, Elections, Employment, European History, Faith, Family, Federal Government Budget, Fiscal Policy, Foreign Policy, Fraud, Freedom, Friends, Genocide, government, history, History of Economic Thought, Illegal, Immigration, Law, Legal, liberty, Life, Links, Macroeconomics, media, Microeconomics, Middle East, Monetary Policy, Money, Money, People, Philosophy, Politics, Radio, Rants, Raves, Raymond Thomas Pronk, Religious, Speech, Tax Policy, Trade Policiy, Video, War, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

Image result for cartoons nationalism vs. globalismImage result for cartoons nationalism vs. globalism

Image result for cartoons nationalism vs. globalism

Image result for cartoons nationalism vs. globalismImage result for cartoons new world order

Image result for cartoons new world orderImage result for cartoons new world order

Image result for cartoons brexit nigel farageImage result for cartoons brexit nigel farageImage result for cartoons brexit nigel farageImage result for cartoons brexit nigel farage

Steve Davies and Dave Rubin: Brexit, Classical Liberalism, Libertarianism (Full Interview)

The Difference Between Classical Liberals and Libertarians (Steve Davies Part 2)

Syria, the Middle East, and America’s War on Drugs (Steve Davies Part 3)

Nigel Farage speech in The United States about Brexit and Trump

Emergency! Man Behind Brexit Issues Warning For America

Nigel Farage : The Speech That WON Us Our BREXIT – 24 June 2016

Nigel Farage roasts the EU Parliament before & after Brexit

Nigel Farage on Fox News after Brexit

Epic Rant – ‘Nigel Farage Was Right!’

George Carlin – It’s a Big Club and You Ain’t In It! The American Dream

George Carlin – Dumb Americans

The Collapse of The American Dream Explained in Animation

Obama: We Must Guard Against American Nationalism

Trump’s Nationalism Is Destroying Globalism

BREXIT & America First: The Battle of Globalism vs Nationalism

The Most Important Reason Why the European Union Will Surely Fail

Italy Rejects EU Globalism, Defeats Referendum to Give Globalists Limitless Power

Tony Blankley – At Last, an American Nationalist!

Three Big Ideas: Liberalism, Socialism, Nationalism

 Nationalism: Crash Course World History #34

Capitalism and Socialism: Crash Course World History #33

07 Nationalism, Imperialism & Globalization the good, the bad and the really, really ugly

What is Classical Liberalism? – Learn Liberty

The History of Classical Liberalism – Learn Liberty

Libertarianism 101 with Dr Stephen Davies

The Decline and Triumph of Classical Liberalism (Pt. 1) – Learn Liberty

The Decline and Triumph of Classical Liberalism (Pt. 2) – Learn Liberty

 

Dawn of the New World Order: 2017 will be the year EVERYTHING changes

A NEW World Order is set to emerge next year as huge political changes sweep across Europe including the rise of the mega-alliance under Vladimir Putin and Donald Trump.

Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUGETTY/DSNEW WORLD ORDER: Vladimir Putin and Donald Trump will trigger a revolution across Europe
Putin’s growing power and Trump’s extraordinary US Election victory are both herald’s of a growing movement against the established world governments.Anti-establishment parties raging against the political class could sweep to victory in a swathes of elections next year and change the face of the West.

From Germany, to France, to the Netherlands – fringe and extremist parties are gaining momentum hand over fist and looked primed to seize power.

Notable victories have already been won – with a shocking referendum win in Italy causing Prime Minister Matteo Renzi to resign in a move said to pave the way for the collapse of the EU.

Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUDSEND OF THE EU: Anti-establishment parties are set to sweep to power in Europe

“The new axis between Trump’s America, Putin’s Russia, and European populists represents a toxic mix”

Fredrik Wesslau

Fredrik Wesslau, from the European Council of Foreign Relations, predicted the “unthinkable is now thinkable” after Trump was swept into the White House.

He said the political parties are trying to unseat the “liberal order” in a campaign backed by Putin and Trump.

Politicians look to overthrow the established order are hailing Trump’s election victory as the beginning of the “Patriotic Spring”.

There are six key elections coming up in 2017 which could very easily be won by right-wing parties with nationalist policies which would spell the end of the EU.

Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUGETTYGOLDEN DAWN: The Neo-nazi movement in Greece is the most extreme example
Marine Le Pen, leader of France’s National Front, could be poised to take power after the election in May in a move which could pull France out of the EU.
She has described the coming year as a “global revolution” after the election of Trump and the victory of Brexit.Mrs Le Pen has promised to pull france out of NATO and “push migrants who want to come to Europe back into international waters”.The alliance is feared to be a further casualty of the looming political shift – with NATO bosses “preparing for the worst” as they fear Putin will invade Eastern Europe and Trump will pull all US support.
Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUGETTYMARINE LE PEN: France’s National Front leader could seize power next year
Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUGEERT WILDERS: The Netherlands’ Party for Freedom leader has compared the Koran to Mein Kampf
Meanwhile, anti-Islam and anti-migrant leader of the Party of Freedom Geert Wilders ended 2016 leading the polls in the Netherlands – contesting the general election in March.He tweeted a picture of Angela Merkel with blood on her hands following the Berlin Christmas market attack – and shared the message “they hate and kill us. An nobody protects us”.He has also compared the Koran to Adolf Hitler’s book Mein Kampf – campaigning to have the Muslim holy book banned – and coined the phrase “patriotic spring”.
Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUFRAUKE PETRY: Angela Merkel faces losing Chancellor’s seat next year after major unrest
Frauke Petry is also contesting the German federal election next year as the aftermath of the Berlin attack rocks the government of Angelea Merkel.While she does not have a seat in the Bundestag – the German parliament – approval of her Alternative for Germany party has been swelling in wake of backlash against refugees following terrorist attacks.In her first election manifesto she declared “Islam is not part of Germany” and has previously called on border guard to use “firearms if necessary” when dealing with refugees. 
Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUGETTYGERMANY: Unrest is sweeping across the European nation after terror attacks
Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUGETTYBEPE GRILLO: This comedian turned politician has already struck a blow to the EU
Leader of Italy’s Five Star Movement TV comedian Beppe Grillo has already caused a stir as the the Italian government lost a key referendum.Savagedly anti-EU, he has said “political amateurs are conquering the world”, called Trump’s victory an “extraordinary turning point” and his party won two key mayoral seats in Turin and Rome.He has been called the “Italian Donald Trump” and his party could be a key player with elections expected to be held in 2017.
Europe Right Wing Politics Brexit Donald Trump Vladimir Putin New World Order Polls EUGETTYJIMMIE AKESSON: Sweden Democrats’ outspoken leader led a campaign against migrants
The Czech Republic is also set to hold elections in 2017 while Sweden goes to the polls in 2018, both with own Trump-esque leaders who could make a shocking grab for power.Andrej Babis, the second richest man in the Czech Republic, is expected to win the general election for the ANO party and has been reported to have close ties to Putin’s Russia.While in Sweden, anti-immigration Jimmie Akesson of the Sweden Democrats is gaining in popularity – campaigning against his nation’s membership of the EU and advocating a campaign to tell people not to come to Sweden.
With Europe’s biggest economies set to go to the polls, struggling Greece could also follow suit.The extreme right fringes of their politics is dominated by the neo-nazi party Golden Dawn – who have launched attacks on refugee camps.While it is very unlikely they have any chance at power, their nationalist cause is of the most intense and hate-filed in Europe.Centre-right party New Democracy is the most likely to unseat the government should a snap election be called.
The former EU diplomat Wesslau said: “The new axis between Trump’s America, Putin’s Russia, and European populists represents a toxic mix for the liberal order in Europe.”He added: “Within Europe, populists on the left and right are trying to roll back the liberal order.”This insurgency is being actively backed by Putin’s Russia, and, now, it seems, Trump’s America.”The European Union itself risks being an early casualty.”

The Globalists Have Declared War on Nationalists

 

Trump’s populist views of self-determination are sweeping the planet and the elite are in a sheer panic. Only a few weeks ago, the sheep of the planet were being marched to their Armageddon. The dumbed down masses have managed to mount a ninth inning rally that have sent the elite into frenzy.

 

Hillary Clinton Was Supposed to Usher in the New World Order Through the Fall of America

The lies are exposed. Hillary and Bill cannot unring the bill, the truth has been exposed for millions of people to see.

The lies are exposed. Hillary and Bill cannot unring the bill, the truth has been exposed for millions of people to see.

Two months ago, I called upon the Independent Media to step up their attacks on Hillary Clinton’s criminal behavior in a last-ditch and desperate effort to derail her presidential aspirations. After issuing my plea, I can happily report that I got more than I had hoped for. Merely a year ago, I was one of the few voices that was pounding away at Hillary Clinton’s sociopathic behavior. Today, the attacks are so bombastic and vitriolic, that I am joyfully reporting that I feel that my voice is being drowned out by a relentless chorus of voices that has Hillary Clinton in a death grip and they won’t let go. This is a great time for humanity. Even if the criminal elite unleash genocidal hell on Earth, at least humanity will die on their feet. There is absolutely no way that the criminal elite can stem the tide of rebellion against their corrupt and satanically inspired rule over the people.

The criminal elite had pinned their hopes on Hillary Clinton ushering in the NWO by tearing down what was left of American sovereignty. From a Bilderberg, Trilateral and CFR perspective, this woman was sociopathic enough to do what would need to be done to complete this task. However, the criminal elite forgot to do one thing. They neglected to manage her public image. It is leaders like Clinton and Cameron which have awakened the masses, through their abject criminality, and the people are saying enough is enough.

Clinton’s role in the emails, her treason by selling uranium to the Russians to raise money for her foundation, the Benghazi affair, etc., etc, are exploding on the national scene. Former Clinton campaign leaders and Secret Service personnel are speaking out against this despot. The genie will not fit back into the bottle. The elite know this and they are on the verge of a mass nervous breakdown. The playground bully has just been punched in the nose by the 98 pound weakling.

Zbigniew Brzezinski saw this awakening coming in 2011 which prompted him to say the following:

brzezinski kill a million

This is what wounded animals do, they lash out in an uncontrollable manner.

The following op-ed piece written for the Council on Foreign Relations captures the criminal elite’s sense of desperation.

The Face of Global Elite Arrogance