Heroes

Angelo Codevilla — The Ruling Class vs. Country Class — Videos

Posted on June 16, 2018. Filed under: American History, Blogroll, Books, Central Intelligence Agency (CIA), College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Cult, Culture, Data, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Economics, Education, Elections, Employment, Entertainment, Essays, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, Friends, government, government spending, Heroes, history, History of Economic Thought, Law, liberty, Life, Links, Macroeconomics, Mastery, media, Movies, Movies, National Security Agency (NSA), National Security Agency (NSA_, Newspapers, Non-Fiction, People, Philosophy, Photos, Politics, Radio, Radio, Raves, Raymond Thomas Pronk, Security, Speech, Spying, State, Strategy, Success, Talk Radio, Tax Policy, Television, Television, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , |

See the source imageImage result for angelo codevilla the ruling classSee the source imageSee the source image

Charles Kesler Introduces Angelo Codevilla

1. America’s Ruling Class

3. What’s Wrong with the CIA?

The Revolution of America’s Regime

Angelo Codevilla – Does America Have a Ruling Class?

456. The Iron Fist of the Ruling Class | Angelo Codevilla

The Role of Intelligence in American National Security

Conservatism in the Trump Era: American Statecraft

See the source image

 

  • ANGELO M. CODEVILLA

July 16, 2010, 10:09 am

After the Republic

September 27, 2016

In today’s America, a network of executive, judicial, bureaucratic, and social kinship channels bypasses the sovereignty of citizens. Our imperial regime, already in force, works on a simple principle: the president and the cronies who populate these channels may do whatever they like so long as the bureaucracy obeys and one third plus one of the Senate protects him from impeachment. If you are on the right side of that network, you can make up the rules as you go along, ignore or violate any number of laws, obfuscate or commit perjury about what you are doing (in the unlikely case they put you under oath), and be certain of your peers’ support. These cronies’ shared social and intellectual identity stems from the uniform education they have received in the universities. Because disdain for ordinary Americans is this ruling class’s chief feature, its members can be equally certain that all will join in celebrating each, and in demonizing their respective opponents.

And, because the ruling class blurs the distinction between public and private business, connection to that class has become the principal way of getting rich in America. Not so long ago, the way to make it here was to start a business that satisfied customers’ needs better than before. Nowadays, more businesses die each year than are started. In this century, all net additions in employment have come from the country’s 1,500 largest corporations. Rent-seeking through influence on regulations is the path to wealth. In the professions, competitive exams were the key to entry and advancement not so long ago. Now, you have to make yourself acceptable to your superiors. More important, judicial decisions and administrative practice have divided Americans into “protected classes”—possessed of special privileges and immunities—and everybody else. Equality before the law and equality of opportunity are memories. Co-option is the path to power. Ever wonder why the quality of our leaders has been declining with each successive generation?

Moreover, since the Kennedy reform of 1965, and with greater speed since 2009, the ruling class’s immigration policy has changed the regime by introducing some 60 million people—roughly a fifth of our population—from countries and traditions different from, if not hostile, to ours. Whereas earlier immigrants earned their way to prosperity, a disproportionate percentage of post-1965 arrivals have been encouraged to become dependents of the state. Equally important, the ruling class chose to reverse America’s historic practice of assimilating immigrants, emphasizing instead what divides them from other Americans. Whereas Lincoln spoke of binding immigrants by “the electric cord” of the founders’ principles, our ruling class treats these principles as hypocrisy. All this without votes or law; just power.

Foul is Fair and Fair is Foul

In short, precisely as the classics defined regime change, people and practices that had been at society’s margins have been brought to its center, while people and ideas that had been central have been marginalized.

Fifty years ago, prayer in the schools was near universal, but no one was punished for not praying. Nowadays, countless people are arrested or fired for praying on school property. West Point’s commanding general reprimanded the football coach for his team’s thanksgiving prayer. Fifty years ago, bringing sexually explicit stuff into schools was treated as a crime, as was “procuring abortion.” Nowadays, schools contract with Planned Parenthood to teach sex, and will not tell parents when they take girls to PP facilities for abortions. Back then, many schools worked with the National Rifle Association to teach gun handling and marksmanship. Now students are arrested and expelled merely for pointing their finger and saying “bang.” In those benighted times, boys who ventured into the girls’ bathroom were expelled as perverts. Now, girls are suspended for objecting to boys coming into the girls’ room under pretense of transgenderism. The mainstreaming of pornography, the invention of abortion as the most inalienable of human rights and, most recently, the designation of opposition to homosexual marriage as a culpable psychosis—none of which is dictated by law enacted by elected officials—is enforced as if it had been. No surprise that America has experienced a drastic drop in the formation of families, with the rise of rates of out-of-wedlock births among whites equal to the rates among blacks that was recognized as disastrous a half-century ago, the near-disappearance of two-parent families among blacks, and the social dislocations attendant to all that.

Ever since the middle of the 20th century our ruling class, pursuing hazy concepts of world order without declarations of war, has sacrificed American lives first in Korea, then in Vietnam, and now throughout the Muslim world. By denigrating Americans who call for peace, or for wars unto victory over America’s enemies; by excusing or glorifying those who take our enemies’ side or who disrespect the American flag; our rulers have drawn down the American regime’s credit and eroded the people’s patriotism.

As the ruling class destroyed its own authority, it wrecked the republic’s as well. This is no longer the “land where our fathers died,” nor even the country that won World War II. It would be surprising if any society, its identity altered and its most fundamental institutions diminished, had continued to function as before. Ours sure does not, and it is difficult to imagine how it can do so ever again. We can be sure only that the revolution underway among us, like all others, will run its unpredictable course.

All we know is the choice that faces us at this stage: either America continues in the same direction, but faster and without restraint, or there’s the hazy possibility of something else.

Imperial Alternatives

The consequences of empowering today’s Democratic Party are crystal clear. The Democratic Party—regardless of its standard bearer—would use its victory to drive the transformations that it has already wrought on America to quantitative and qualitative levels that not even its members can imagine. We can be sure of that because what it has done and is doing is rooted in a logic that has animated the ruling class for a century, and because that logic has shaped the minds and hearts of millions of this class’s members, supporters, and wannabes.

That logic’s essence, expressed variously by Herbert Croly and Woodrow Wilson, FDR’s brains trust, intellectuals of both the old and the new Left, choked back and blurted out by progressive politicians, is this: America’s constitutional republic had given the American people too much latitude to be who they are, that is: religiously and socially reactionary, ignorant, even pathological, barriers to Progress. Thankfully, an enlightened minority exists with the expertise and the duty to disperse the religious obscurantism, the hypocritical talk of piety, freedom, and equality, which excuses Americans’ racism, sexism, greed, and rape of the environment. As we progressives take up our proper responsibilities, Americans will no longer live politically according to their prejudices; they will be ruled administratively according to scientific knowledge.

Progressivism’s programs have changed over time. But its disdain for how other Americans live and think has remained fundamental. More than any commitment to principles, programs, or way of life, this is its paramount feature. The media reacted to Hillary Clinton’s remark that “half of Trump’s supporters could be put into a ‘basket of deplorables’” as if these sentiments were novel and peculiar to her. In fact, these are unremarkable restatements of our ruling class’s perennial creed.

The pseudo-intellectual argument for why these “deplorables” have no right to their opinions is that giving equal consideration to people and positions that stand in the way of Progress is “false equivalence,” as President Obama has put it. But the same idea has been expressed most recently and fully by New York TimesCEO Mark Thompson, as well as Times columnists Jim Rutenberg, Timothy Egan, and William Davies. In short, devotion to truth means not reporting on Donald Trump and people like him as if they or anything they say might be of value.

If trying to persuade irredeemable socio-political inferiors is no more appropriate than arguing with animals, why not just write them off by sticking dismissive names on them? Doing so is less challenging, and makes you feel superior. Why wrestle with the statistical questions implicit in Darwin when you can just dismiss Christians as Bible-thumpers? Why bother arguing for Progressivism’s superiority when you can construct “scientific” studies like Theodor Adorno’s, proving that your opponents suffer from degrees of “fascism” and other pathologies? This is a well-trod path. Why, to take an older example, should General Omar Bradley have bothered trying to refute Douglas MacArthur’s statement that in war there is no substitute for victory when calling MacArthur and his supporters “primitives” did the trick? Why wrestle with our climate’s complexities when you can make up your own “models,” being sure that your class will treat them as truth?

What priorities will the ruling class’s notion of scientific truth dictate to the next Democratic administration? Because rejecting that true and false, right and wrong are objectively ascertainable is part of this class’s DNA, no corpus of fact or canon of reason restrains it or defines its end-point. Its definition of “science” is neither more nor less than what “scientists say” at any given time. In practice, that means “Science R-Us,” now and always, exclusively. Thus has come to pass what President Dwight Eisenhower warned against in his 1960 Farewell address: “A steadily increasing share [of science] is conducted for, by, or at the direction of, the Federal government.… [T]he free university, historically the fountainhead of free ideas and scientific discovery, has experienced a revolution…a government contract becomes virtually a substitute for intellectual curiosity.” Hence, said Ike, “The prospect of domination of the nation’s scholars by Federal employment, project allocations, and the power of money is ever present—and is gravely to be regarded.” The result has been that academics rise through government grants while the government exercises power by claiming to act on science’s behalf. If you don’t bow to the authority of the power that says what is and is not so, you are an obscurantist or worse.

Under our ruling class, “truth” has morphed from the reflection of objective reality to whatever has “normative pull”—i.e., to what furthers the ruling class’s agenda, whatever that might be at any given time. That is the meaning of the term “political correctness,” as opposed to factual correctness.

It’s the Contempt, Stupid!

Who, a generation ago, could have guessed that careers and social standing could be ruined by stating the fact that the paramount influence on the earth’s climate is the sun, that its output of energy varies and with it the climate? Who, a decade ago, could have predicted that stating that marriage is the union of a man and a woman would be treated as a culpable sociopathy, or just yesterday that refusing to let certifiably biological men into women’s bathrooms would disqualify you from mainstream society? Or that saying that the lives of white people “matter” as much as those of blacks is evidence of racism? These strictures came about quite simply because some sectors of the ruling class felt like inflicting them on the rest of America. Insulting presumed inferiors proved to be even more important to the ruling class than the inflictions’ substance.

How far will our rulers go? Because their network is mutually supporting, they will go as far as they want. Already, there is pressure from ruling class constituencies, as well as academic arguments, for morphing the concept of “hate crime” into the criminalization of “hate speech”—which means whatever these loving folks hate. Of course this is contrary to the First Amendment, and a wholesale negation of freedom. But it is no more so than the negation of freedom of association that is already eclipsing religious freedom in the name of anti-discrimination. It is difficult to imagine a Democratic president, Congress, and Supreme Court standing in the way.

Above all, these inflictions, as well as the ruling class’s acceptance of its own members’ misbehavior, came about because millions of its supporters were happy, or happy enough, to support them in the interest of maintaining their own status in a ruling coalition while discomfiting their socio-political opponents. Consider, for example, how republic-killing an event was the ruling class’s support of President Bill Clinton in the wake of his nationally televised perjury. Subsequently, as constituencies of supporters have effectively condoned officials’ abusive, self-serving, and even outright illegal behavior, they have encouraged more and more of it while inuring themselves to it. That is how republics turn into empires from the roots up.

But it is also true, as Mao Tse-Tung used to say, “a fish begins to rot at the head.” If you want to understand why any and all future Democratic Party administrations can only be empires dedicated to injuring and insulting their subjects, look first at their intellectual leaders’ rejection of the American republic’s most fundamental principles.

The Declaration of Independence says that all men “are endowed by their Creator with certain unalienable rights” among which are “life, liberty, and the pursuit of happiness.” These rights—codified in the Constitution’s Bill of Rights—are not civil rights that governments may define. The free exercise of religion, freedom of speech and assembly, keeping and bearing arms, freedom from warrantless searches, protection against double jeopardy and self-incrimination, trial by jury of one’s peers, etc., are natural rights that pertain to human beings as such. Securing them for Americans is what the United States is all about. But today’s U.S. Civil Rights Commission advocates truncating the foremost of these rights because, as it stated in a recent report, “Religious exemptions to the protections of civil rights based upon classifications such as race, color, national origin, sex, disability status, sexual orientation, and gender identity, when they are permissible, significantly infringe upon those civil rights.” The report explains why the rights enumerated in the Declaration of Independence and the Bill of Rights should not be permissible: “The phrases ‘religious liberty’ and ‘religious freedom’ will stand for nothing except hypocrisy so long as they remain code words for discrimination, intolerance, racism, sexism, homophobia, Islamophobia, Christian supremacy, or any form of intolerance.”

Hillary Clinton’s attack on Trump supporters merely matched the ruling class’s current common sense. Why should government workers and all who wield the administrative state’s unaccountable powers not follow their leaders’ judgment, backed by the prestige press, about who are to be treated as citizens and who is to be handled as deplorable refuse? Hillary Clinton underlined once again how the ruling class regards us, and about what it has in store for us.

Electing Donald Trump would result in an administration far less predictable than any Democratic one. In fact, what Trump would or would not do, could or could not do, pales into insignificance next to the certainty of what any Democrat would do. That is what might elect Trump.

The character of an eventual Trump Administration is unpredictable because speculating about Trump’s mind is futile. It is equally futile to guess how he might react to the mixture of flattery and threats sure to be leveled against him. The entire ruling class—Democrats and Republicans, the bulk of the bureaucracy, the judiciary, and the press—would do everything possible to thwart him; and the constituencies that chose him as their candidate, and that might elect him, are surely not united and are by no means clear about the demands they would press. Moreover, it is anyone’s guess whom he would appoint and how he would balance his constituencies’ pressures against those of the ruling class.

Never before has such a large percentage of Americans expressed alienation from their leaders, resentment, even fear. Some two-thirds of Americans believe that elected and appointed officials—plus the courts, the justice system, business leaders, educators—are leading the country in the wrong direction: that they are corrupt, do more harm than good, make us poorer, get us into wars and lose them. Because this majority sees no one in the political mainstream who shares their concerns, because it lacks confidence that the system can be fixed, it is eager to empower whoever might flush the system and its denizens with something like an ungentle enema.

Yet the persons who express such revolutionary sentiments are not a majority ready to support a coherent imperial program to reverse the course of America’s past half-century. Temperamentally conservative, these constituencies had been most attached to the Constitution and been counted as the bedrock of stability. They are not yet wholly convinced that there is little left to conserve. What they want, beyond an end to the ruling class’s outrages, has never been clear. This is not surprising, given that the candidates who appeal to their concerns do so with mere sound bites. Hence they chose as the presidential candidate of the nominal opposition party the man who combined the most provocative anti-establishment sounds with reassurance that it won’t take much to bring back good old America: Donald Trump. But bringing back good old America would take an awful lot. What could he do to satisfy them?

Trump’s propensity for treating pronouncements on policy as flags to be run up and down the flagpole as he measures the volume of the applause does not deprive them of all significance—especially the ones that confirm his anti-establishment bona fides. These few policy items happen to be the ones by which he gained his anti-establishment reputation in the first place: 1) opposition to illegal immigration, especially the importation of Muslims whom Americans reasonably perceive as hostile to us; 2) law and order: stop excusing rioters and coddling criminals; 3) build a wall, throw out the illegals, let in only people who are vetted and certified as supporters of our way of life (that’s the way it was when I got my immigrant visa in 1955), and keep out anybody we can’t be sure isn’t a terrorist. Trump’s tentative, partial retreat from a bit of the latter nearly caused his political standing to implode, prompting the observation that doing something similar regarding abortion would end his political career. That is noteworthy because, although Trump’s support of the pro-life cause is lukewarm at best, it is the defining commitment for much of his constituency. The point here is that, regardless of his own sentiments, Trump cannot wholly discount his constituencies’ demands for a forceful turn away from the country’s current direction.

Trump’s slogan—“make America great again”—is the broadest, most unspecific, common denominator of non-ruling-class Americans’ diverse dissatisfaction with what has happened to the country. He talks about reasserting America’s identity, at least by controlling the borders; governing in America’s own interest rather than in pursuit of objectives of which the American people have not approved; stopping the export of jobs and removing barriers to business; and banishing political correctness’s insults and injuries. But all that together does not amount to making America great again. Nor does Trump begin to explain what it was that had made this country great to millions who have known only an America much diminished.

In fact, the United States of America was great because of a whole bunch of things that now are gone. Yes, the ruling class led the way in personal corruption, cheating on tests, lowering of professional standards, abandoning churches and synagogues for the Playboy Philosophy and lifestyle, disregarding law, basing economic life on gaming the administrative state, basing politics on conflicting identities, and much more. But much of the rest of the country followed. What would it take to make America great again—or indeed to make any of the changes that Trump’s voters demand? Replacing the current ruling class would be only the beginning.

Because it is difficult to imagine a Trump presidency even thinking about something so monumental as replacing an entire ruling elite, much less leading his constituency to accomplishing it, electing Trump is unlikely to result in a forceful turn away from the country’s current direction. Continuing pretty much on the current trajectory under the same class will further fuel revolutionary sentiments in the land all by itself. Inevitable disappointment with Trump is sure to add to them.

We have stepped over the threshold of a revolution. It is difficult to imagine how we might step back, and futile to speculate where it will end. Our ruling class’s malfeasance, combined with insult, brought it about. Donald Trump did not cause it and is by no means its ultimate manifestation. Regardless of who wins in 2016, this revolution’s sentiments will grow in volume and intensity, and are sure to empower politicians likely to make Americans nostalgic for Donald Trump’s moderation.

http://www.claremont.org/crb/basicpage/after-the-republic/

Senior Executive Service (United States)

From Wikipedia, the free encyclopedia

Jump to navigationJump to search

Senior Executive Service
SES Emblem.svg

Seal of the U.S. Senior Executive Service
Flag of the United States Senior Executive Service.svg

Flag of the U.S. Senior Executive Service

The Senior Executive Service (SES) is a position classification in the civil service of the United States federal government, somewhat analogous to general officer or flag officer ranks in the U.S. Armed Forces. It was created in 1979 when the Civil Service Reform Act of 1978 went into effect under President Jimmy Carter.

Origin and attributes

According to the Office of Personnel Management, the SES was designed to be a corps of executives selected for their leadership qualifications, serving in key positions just below the top Presidential appointees as a link between them and the rest of the Federal (civil service) workforce. SES positions are considered to be above the GS-15 level of the General Schedule, and below Level III of the Executive Schedule. Career members of the SES ranks are eligible for the Presidential Rank Awards program.

Up to 10% of SES positions can be filled as political appointments rather than by career employees.[1] About half of the SES is designated “Career Reserved”, which can only be filled by career employees. The other half is designated “General”, which can be filled by either career employees or political appointments as desired by the administration. Due to the 10% limitation, most General positions are still filled by career appointees.[2]

Senior level employees of several agencies are exempt from the SES but have their own senior executive positions; these include the Federal Bureau of InvestigationCentral Intelligence AgencyDefense Intelligence AgencyNational Security AgencyTransportation Security AdministrationFederal Aviation AdministrationGovernment Accountability OfficeMembers of the Foreign Service, and government corporations.

Pay rates

(Effective on the first day of the first applicable pay period beginning on or after January 1, 2015)[3]
Minimum Maximum
Agencies with a Certified SES Performance Appraisal System $121,956 $183,300
Agencies without a Certified SES Performance Appraisal System $121,956 $168,700

Unlike the General Schedule (GS) grades, SES pay is determined at agency discretion within certain parameters, and there is no locality pay adjustment.

The minimum pay level for the SES is set at 120 percent of the basic pay for GS-15 Step 1 employees ($121,956 for 2015). The maximum pay level depends on whether or not the employing agency has a “certified” SES performance appraisal system:[4]

  • If the agency has a certified system, the maximum pay is set at Level II of the Executive Schedule ($183,300 for 2015).
  • If the agency does not have a certified system, the maximum pay is set at Level III of the Executive Schedule ($168,700 for 2015).

Total aggregate pay is limited to the salary of the Vice President of the United States ($230,700 for 2015).

Prior to 2004, the SES used a six-level system. It was replaced with the current open band system on January 1, 2014.[5]

See also

References

  1. Jump up^ Piaker, Zach (2016-03-16). “Help Wanted: 4,000 Presidential Appointees”Partnership for Public Service Center for Presidential Transition. Retrieved 2016-11-16.
  2. Jump up^ “United States Government Policy and Supporting Positions (The Plum Book)” (PDF). U.S. House of Representatives Committee on Oversight and Government Reform. 2012-12-01. p. 201. Retrieved 2016-11-16.
  3. Jump up^ Obama, Barack (2014-12-19). “ADJUSTMENTS OF CERTAIN RATES OF PAY” (PDF). EXECUTIVE ORDER 13686. The White House. Retrieved 2015-09-18.
  4. Jump up^ “Performance & Compensation – Salary”U.S. Office of Personnel Management. Retrieved 2011-09-24.
  5. Jump up^ “Senior Executive Service Pay and Performance Awards”U.S. Office of Personnel Management. 2004. Retrieved 2018-03-31.

External links

Read Full Post | Make a Comment ( None so far )

Albert Jay Nock — Isaiah’s Job — The Remnant — Video

Posted on June 8, 2018. Filed under: Articles, Blogroll, Books, Business, College, Communications, conservatives, Constitution, Corruption, Crisis, Culture, Economics, Education, Essays, Faith, Family, Fiscal Policy, Freedom, government, government spending, Health, Heroes, history, Journalism, Law, liberty, Life, Links, Literacy, media, Non-Fiction, People, Philosophy, Photos, Radio, Rants, Raves, Raymond Thomas Pronk, Religious, Reviews, Speech, State, Talk Radio, Tax Policy, Video, War, Water, Wealth, Wisdom, Work | Tags: , , , , , , , , , , , |

See the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source image

Isaiah’s Job | by Albert Jay Nock

Liberty Classics — Isaiah’s Job

See the source image

Our Enemy, The State (Part 1) by Albert Jay Nock

Our Enemy, The State (Part 2) by Albert Jay Nock

Our Enemy, The State (Part 3) by Albert Jay Nock

Our Enemy, The State (Part 4) by Albert Jay Nock

Our Enemy, The State (Part 5) by Albert Jay Nock

Our Enemy, The State (Part 6) by Albert Jay Nock

Our Enemy, The State, The Video -Albert Jay Nock

The Man versus The State (Introduction) by Albert Jay Nock

Our Enemy the State!

See the source image

Jeffrey Tucker — Liberty Classics: Memoirs of a Superfluous Man

Albert Jay Nock, Memoirs of a Superfluous Man -1/4- mass, democratic education

Albert Jay Nock, Memoirs of a Superfluous Man -2/4- economism, views on politics

Albert Jay Nock, Memoirs of a Superfluous Man -3/4- writing, religion

Albert Jay Nock, Memoirs of a Superfluous Man -4/4- war, human servility

The Natural Law as a Restraint Against Tyranny | Judge Andrew P. Napolitano

Thinkers Who Challenged the State | David Gordon

Against the State | Lew Rockwell

Freedom Doesn’t Come From Government | Ron Paul

Society Without the State | Speaker Panel

How is War Profitable? – Stefan Molyneux and Jeffrey Tucker

Albert Jay Nock and the Libertarian Tradition | by Jeff Riggenbach

The American State was a Predatory Gang of Robbers

State of the Alt-Right | Jordan Peterson & Stefan Molyneux

Firing Line with William F. Buckley Jr.: Bill Buckley and Firing Line Get Roasted

What Individualism Is Not by Frank Chodorov

Rothbard on Strategy

Albert Jay Nock

See the source image

 

“You do not know, and will never know, who the Remnant are, nor what they are doing or will do. Two things you do know, and no more: First, that they exist; second, that they will find you.”

from — Isaiah’s Job by Albert Jay Nock
You are lied to, propagandized, and manipulated largely through fear, even more than you have thought!
To continue awakening SPEND AN HOUR OR MORE HERE

http://www.bigeye.com/remnant.htm

 

 

Albert Jay Nock

From Wikipedia, the free encyclopedia

Jump to navigationJump to search

Albert Jay Nock
Nock.jpg
Born October 13, 1870
Scranton, Pennsylvania
Died August 19, 1945 (aged 74)
Wakefield, Rhode Island
Resting place Riverside Cemetery
South Kingstown, Rhode Island
Occupation Writer and social theorist
Nationality American
Alma mater St. Stephen’s College
(now known as Bard College)
Subject Libertarianism

Albert Jay Nock (October 13, 1870 – August 19, 1945) was an American libertarian author, editor first of The Freeman and then The Nationeducational theorist, Georgist, and social critic of the early and middle 20th century. He was an outspoken opponent of the New Deal, and served as a fundamental inspiration for the modern libertarian and Conservative movements, cited as an influence by William F. Buckley, Jr.[1] He was one of the first Americans to self-identify as “libertarian”. His best-known books are Memoirs of a Superfluous Man and Our Enemy, the State.

Life and work

Throughout his life, Nock was a deeply private man who shared few of the details of his personal life with his working partners. He was born in Scranton, Pennsylvania (U.S.), the son of Emma Sheldon (Jay) and Joseph Albert Nock, who was both a steelworker and an Episcopal priest. He was raised in Brooklyn, New York.[2] Nock attended St. Stephen’s College (now known as Bard College) from 1884 to 1888,[3] where he joined Sigma Alpha Epsilon fraternity.

After graduation he had a brief career playing minor league baseball, and then attended a theological seminary and was ordained as an Episcopal priest in 1897. Nock married Agnes Grumbine in 1900 and the couple had two children, Francis and Samuel (both of whom became college professors). In 1909, Nock left the ministry as well as his wife and children, and became a journalist.[4][5]

In 1914, Nock joined the staff of The Nation magazine, which was at the time supportive of liberal capitalism. Nock was an acquaintance of the influential politician and orator William Jennings Bryan, and in 1915 traveled to Europe on a special assignment for Bryan, who was then Secretary of State. Nock also maintained friendships with many of the leading proponents of the Georgist movement, one of whom had been his bishop in the Episcopal Church.

However, while Nock was a lifelong admirer of Henry George, he was frequently at odds with other Georgists in the left-leaning movement. Further, Nock was influenced by the anti-collectivist writings of the Germansociologist Franz Oppenheimer,[6] whose most famous work, Der Staat, was published in English translation in 1915. In his own writings, Nock would later build on Oppenheimer’s claim that the pursuit of human ends can be divided into two forms: the productive or economic means, and the parasitic, political means.

Between 1920 and 1924, Nock was the co-editor of The FreemanThe Freeman was initially conceived as a vehicle for the single tax movement. It was financed by the wealthy wife of the magazine’s other editor, Francis Neilson,[7] although neither Nock nor Neilson was a dedicated single taxer. Contributors to The Freeman included: Charles A. BeardWilliam Henry ChamberlinThomas MannLewis MumfordBertrand RussellLincoln SteffensLouis UntermeyerThorstein Veblen and Suzanne La Follette, the more libertarian[8] cousin of Senator Robert La Follette. Critic H.L. Mencken wrote:

His editorials during the three brief years of the Freeman set a mark that no other man of his trade has ever quite managed to reach. They were well-informed and sometimes even learned, but there was never the slightest trace of pedantry in them.[9]

When the unprofitable The Freeman ceased publication in 1924, Nock became a freelance journalist in New York City and Brussels, Belgium.

“The Myth of a Guilty Nation,”[10] which came out in 1922, was Albert Jay Nock’s first anti-war book, a cause he backed his entire life as an essential component of a libertarian outlook. The burden of the book is to prove American war propaganda to be false. The purpose of World War I, according to Nock, was not to liberate Europe and the world from German imperialism and threats. If there was a conspiracy, it was by the allied powers to broadcast a public message that was completely contradicted by its own diplomatic cables. Along with that came war propaganda designed to make Germany into a devil nation.

In the mid-1920s, a small group of wealthy American admirers funded Nock’s literary and historical work to enable him to follow his own interests. Shortly thereafter, he published his biography of Thomas Jefferson. When Jefferson was published in 1928, Mencken praised it as “the work of a subtle and highly dexterous craftsman” which cleared “off the vast mountain of doctrinaire rubbish that has risen above Jefferson’s bones and also provides a clear and comprehensive account of the Jeffersonian system,” and the “essence of it is that Jefferson divided all mankind into two classes, the producers and the exploiters, and he was for the former first, last and all the time.” Mencken also thought the book to be accurate, shrewd, well-ordered and charming.[9]

In his two 1932 books, On the Disadvantages of Being Educated and Other Essays and Theory of Education in the United States, Nock launched a scathing critique of modern government-run education.

In his 1936 article “Isaiah’s Job”,[11] which appeared in The Atlantic Monthly and was reprinted in pamphlet form in July 1962 by The Foundation for Economic Education, Nock expressed his complete disillusionment with the idea of reforming the current system. Believing that it would be impossible to persuade any large portion of the general population of the correct course and opposing any suggestion of a violent revolution, Nock instead argued that libertarians should focus on nurturing what he called “the Remnant“.

The Remnant, according to Nock, consisted of a small minority who understood the nature of the state and society, and who would become influential only after the current dangerous course had become thoroughly and obviously untenable, a situation which might not occur until far into the future.[12] Nock’s philosophy of the Remnant was influenced by the deep pessimism and elitism that social critic Ralph Adams Cram expressed in a 1932 essay, “Why We Do Not Behave Like Human Beings”.[13] In his Memoirs of a Superfluous Man, Nock makes no secret that his educators:

did not pretend to believe that everyone is educable, for they knew, on the contrary, that very few are educable, very few indeed. They saw this as a fact of nature, like the fact that few are six feet tall. […] They accepted the fact that there are practicable ranges of intellectual and spiritual experience which nature has opened to some and closed to others.

In 1941, Nock published a two-part essay in The Atlantic Monthly titled “The Jewish Problem in America”.[14] The article was part of a multi-author series, assembled by the editors in response to recent anti-Semitic unrest in Brooklyn and elsewhere “in the hope that a free and forthright debate will reduce the pressure, now dangerously high, and leave us with a healthier understanding of the human elements involved.”

Nock’s argument was that the Jews were an Oriental people, acceptable to the “intelligent Occidental” yet forever strangers to “the Occidental mass-man.”[15] Furthermore, the mass-man “is inclined to be more resentful of the Oriental as a competitor than of another Occidental;” the American masses are “the great rope and lamppost artists of the world;” and in studying Jewish history, “one is struck with the fact that persecutions never have originated in an upper class movement”. This innate hostility of the masses, he concluded, might be exploited by a scapegoating state to distract from “any shocks of an economic dislocation that may occur in the years ahead.” He concluded, “If I keep up my family’s record of longevity, I think it is not impossible that I shall live to see the Nuremberg lawsreenacted in this country and enforced with vigor” and affirmed that the consequences of such a pogrom “would be as appalling in their extent and magnitude as anything seen since the Middle Ages.”

The article was itself declared by some to be anti-Semitic, and Nock was never asked to write another article, effectively ending his career as a social critic. Against charges of anti-Semitism, Nock answered, “Someone asked me years ago if it were true that I disliked Jews, and I replied that it was certainly true, not at all because they are Jews but because they are folks, and I don’t like folks.”[16]

In 1943, two years before his death, Nock published his autobiography, Memoirs of a Superfluous Man, the title of which expressed the degree of Nock’s disillusionment and alienation from current social trends. After the publication of this autobiography, Nock became the sometime guest of oilman William F. Buckley, Sr.,[17] whose son, William F. Buckley, Jr., would later become an influential author and speaker.

Nock died of leukemia in 1945, at the Wakefield, Rhode Island home of his longtime friend, Ruth Robinson, the illustrator of his 1934 book, “A Journey into Rabelais’ France”. He is buried in Riverside Cemetery, in Wakefield.

Thought

Describing himself as a philosophical anarchist,[18] Nock called for a radical vision of society free from the influence of the political state. He described the state as that which “claims and exercises the monopoly of crime”. He opposed centralization, regulation, the income tax, and mandatory education, along with what he saw as the degradation of society. He denounced in equal terms all forms of totalitarianism, including “Bolshevism… FascismHitlerismMarxism, [and] Communism” but also harshly criticized democracy. Instead, Nock argued, “The practical reason for freedom is that freedom seems to be the only condition under which any kind of substantial moral fiber can be developed. Everything else has been tried, world without end. Going dead against reason and experience, we have tried law, compulsion and authoritarianism of various kinds, and the result is nothing to be proud of.”[19]

During the 1930s, Nock was one of the most consistent critics of Franklin Roosevelt‘s New Deal programs. In Our Enemy, the State, Nock argued that the New Deal was merely a pretext for the federal government to increase its control over society. He was dismayed that the president had gathered unprecedented power in his own hands and called this development an out-and-out coup d’état. Nock criticized those who believed that the new regimentation of the economy was temporary, arguing that it would prove a permanent shift. He believed that the inflationary monetary policy of the Republican administrations of the 1920s was responsible for the onset of the Great Depression and that the New Deal was responsible for perpetuating it.

Nock was also a passionate opponent of war, and what he considered the US government’s aggressive foreign policy. He believed that war could bring out only the worst in society and argued that it led inevitably to collectivization and militarization and “fortified a universal faith in violence; it set in motion endless adventures in imperialism, endless nationalist ambitions,” while, at the same time, costing countless human lives. During the First World War, Nock wrote for The Nation, which was censored by the Wilsonadministration for opposing the war.

Despite his distaste for communism, Nock harshly criticized the Allied intervention in the Russian Civil War following the parliamentary revolution and Bolshevik coup in that country. Before the Second World War, Nock wrote a series of articles deploring what he saw as Roosevelt’s gamesmanship and interventionism leading inevitably to US involvement. Nock was one of the few who maintained a principled opposition to the war throughout its course.

Despite becoming considerably more obscure in death than he had been in life, Nock was an important influence on the next generation of laissez-faire capitalist American thinkers, including libertarians such as Murray RothbardFrank Chodorov,[20] and Leonard Read, and conservatives such as William F. Buckley, Jr.. Nock’s conservative view of society would help inspire the paleoconservative movement in response to the development of neoconservatism during the Cold War. In insisting on the state itself as the root problem, Nock’s thought was one of the main precursors to anarcho-capitalism.

Anti-Semitism and disillusionment with democracy

When Albert Jay Nock started The Freeman magazine in 1920, The Nation offered its congratulations to a new voice in liberal journalism. Nock rebuffed the gesture in a letter to the magazine’s owner, Oswald Villard, in which he wrote, “I hate to seem ungrateful, but we haint liberal. We loathes liberalism and loathes it hard.”[21][22] Nock professed allegiance to a detached philosophical objectivity, expressed in his Platonist credo of “seeing things as they are”.[23][24] He had decried anti-Semitism in his earlier writings, but in his sixties he began giving vent to increasingly anti-Semitic and anti-democratic sentiments,[25] leading Robert Sherrill, writing years later in The Nation, to call him “virulently anti-Semitic” and “anti-democratic”.[26]

The historian and biographer, Michael Wreszin,[27] compared Nock’s disillusionment with democracy and his attacks on the Jewish people to similar feelings held by Henry Adams.[28] Before he died, Nock destroyed all his notes and papers, except a few letters and an autobiographical manuscript published posthumously as Journal of Forgotten Days (Nock was so secretive about the details of his personal life that Who’s Who could not find out his birthdate).[29]

In Journal of Forgotten Days, Nock wrote these passages about the Jews of New York City:

31 August—Leaving for New York today, in great dissatisfaction, to be tied to the public libraries, which are infested with Jews, Turks, infidels, and heretics, such as orthodox members of the Church of England are supposed to pray for in the Good Friday collect.[30]

20 September—The Jewish holiday Yom Kippur yesterday closed New York up as tight as a white-oak knot. One would say there was not a hundred dollars’ worth of business done in all the town. It sets one’s mind back on Hitler’s policy. The question is not what one thinks of it as an American, but what one would think of it if one were a German in Germany, where the control of cultural agencies is so largely in the hands of Jews—the press, drama, music, education, etc.—and where there is, or was, a superb native culture essentially antithetical. Is one’s own culture worth fighting for? I think so. I think I would fight for it.[31]

Nock took a jaundiced view of American politics and American democracy itself,[32] and asserted that in all his life he voted in only one presidential election, in which he cast a write-in vote for Jefferson Davis[33][34][35] In an article he wrote for the American Mercury Magazine in 1933, What the American Votes For, Nock claimed, “My first and only presidential vote was cast many, many years ago. It was dictated by pure instinct.”[36]

In Memoirs of a Superfluous Man (1943), Nock had this to say about mass democracy in America:

I could see how “democracy” might do very well in a society of saints and sages led by an Alfred or an Antoninus Pius. Short of that, I was unable to see how it could come to anything but an ochlocracy of mass-men led by a sagacious knave. The collective capacity for bringing forth any other outcome seemed simply not there.”[37]

The author Clifton Fadiman, reviewing Memoirs of a Superfluous Man, wrote: “I have not since the days of the early Mencken read a more eloquently written blast against democracy or enjoyed more fully a display of crusted prejudice. Mr. Nock is a highly civilized man who does not like our civilization and will have no part of it.”[38] Nock’s biographer Michael Wreszin wrote concerning Nock’s reaction to the election of Franklin D. Roosevelt in 1932: “Sailing to Brussels in February 1933, before Roosevelt’s inauguration in March, he repeated in a journal his appreciation of Catherine Wilson’s observation that the skyline of New York was the finest sight in America when viewed from the deck of an outbound steamer.”[39]

In popular culture

In the fictional The Probability Broach by L. Neil Smith, as part of the North American Confederacy Series, in which the United States becomes a Libertarian state after a successful Whiskey Rebellion and the overthrow and execution of George Washington by firing squad for treason in 1794, Albert Jay Nock serves as the 18th President of the North American Confederacy from 1912 to 1928.

Works

  • The Myth of a Guilty Nation.[1] New York: B.W. Huebsch, 1922. [2]
  • The Freeman Book.[3] B.W. Huebsch, 1924.
  • Jefferson.[4] New York: Harcourt, Brace and Company, 1926 (also known as Mr. Jefferson).
  • On Doing the Right Thing, and Other Essays.[5] New York: Harper and Brothers, 1928.
  • Francis Rabelais: The Man and His Work. Harper and Brothers, 1929.
  • The Book of Journeyman: Essays from the New Freeman.[6] New Freeman, 1930.
  • The Theory of Education in the United States.[7] New York: Harcourt, Brace and Company, 1932.
  • A Journey Into Rabelais’s France[8] William Morrow & Company, 1934.
  • A Journal of These Days: June 1932–December 1933. William Morrow & Company, 1934.
  • Our Enemy, the State.[9] ePub MP3 HTML William Morrow & Company, 1935.
  • Free Speech and Plain Language. William Morrow & Company, 1937.
  • Henry George: An Essay. William Morrow & Company, 1939.
  • Memoirs of a Superfluous Man.[10] New York: Harper and Brothers, 1943.

Miscellany

  • World Scouts,[11] World Peace Foundation, 1912.
  • “Officialism and Lawlessness.” [12] In College Readings on Today and its Problems, Oxford University Press, 1933.
  • Meditations in Wall Street, with an introduction by Albert Jay Nock,[13] W. Morrow & Company, 1940.

Published posthumously:

  • A Journal of Forgotten Days: May 1934–October 1935[14] Henry Regnery Company, 1948.
  • Letters from Albert Jay Nock, 1924–1945, to Edmund C. Evans, Mrs. Edmund C. Evans, and Ellen Winsor. The Caxton Printers, 1949.
  • Snoring as a Fine Art and Twelve Other Essays.[15] Richard R. Smith, 1958.
  • Selected Letters of Albert Jay Nock. The Caxton Printers, 1962.
  • Cogitations from Albert Jay Nock.[16] The Nockian Society, 1970, revised edition, 1985.
  • The State of the Union: Essays in Social Criticism. Liberty Press, 1991.
  • The Disadvantages of Being Educated and Other Essays. Hallberg Publishing Corporation, 1996.

Notes

  1. Jump up^ Carl T. Bogus, Buckley: William F. Buckley Jr. and the Rise of American Conservatism, Bloomsbury Publishing USA, 2011.
  2. Jump up^http://www.libertarianism.org/publications/essays/stylish-elegance-biography-albert-jay-nock
  3. Jump up^ Wreszin, Michael (1972). The Superfluous Anarchist: Albert Jay Nock, Brown University Press, p. 11.
  4. Jump up^ Jim Powell (March 1, 1997). “Albert Jay Nock: A Gifted Pen for Radical Individualism”The FreemanFoundation for Economic Education. Retrieved 12 July 2017.
  5. Jump up^ Mark C. Carnes (September 2003). Invisible Giants: Fifty Americans Who Shaped the Nation But Missed the History Books. Oxford University Press. p. 221. ISBN 978-0-19-516883-9This early, quiet career as a minister ended abruptly in 1909, when Nock left the ministry, his wife, and his children to take up journalism.
  6. Jump up^ Albert Jay Nock, Our Enemy, the State, The Caxton Printers, 1950, p. 59.
  7. Jump up^ Neilson, Francis (1946). “The Story of ‘The Freeman'”. The American Journal of Economics and Sociology6(1): 3–53.
  8. Jump up^ Presley, Sharon (1981). “Suzanne La Follette: The Freewoman,” Libertarian Review (Cato Institute).
  9. Jump up to:a b Mencken, H.L. (1926). “The Immortal Democrat”American Mercury9 (33): 123.
  10. Jump up^ Originally published in 1922 by B. W. Huebsch, Inc. Published in 2011 by the Ludwig von Mises Institute.
  11. Jump up^ Nock, Albert Jay (1956). “Isaiah’s Job”The Freeman6 (12): 31–37.
  12. Jump up^ Harris, Michael R. (1970). Five Counterrevolutionists in Higher Education: Irving Babbitt, Albert Jay Nock, Abraham Flexner, Robert Maynard Hutchins, Alexander Meiklejohn, Oregon State University Press, p. 97.
  13. Jump up^ Cram, Ralph Adams (1932). “Why We Do Not Behave Like Human Beings”The American Mercury27(105): 41–48.
  14. Jump up^ Nock, Albert Jay (1941). “The Jewish Problem in America,” The Atlantic Monthly, June 1, pp. 699–705.
  15. Jump up^ Crunden, Robert Morse (1964). The Mind and Art of Albert Jay Nock, Henry Regnery Company, pp. 183–84.
  16. Jump up^ Albert Jay Nock (May 16, 1998). “Autobiographical Sketch (unpublished piece written for Paul Palmer, editor of the American Mercury Magazine, c. 1936)”alumnus.caltech.edu. California Institute of Technology. Archived from the original on June 29, 2017. Retrieved 12 July 2017.
  17. Jump up^ Buckley, Jr., William F. (2008). Let Us Talk of Many Things: The Collected Speeches, Basic Books, p. 430.
  18. Jump up^ Wreszin, Michael (1969). “Albert Jay Nock and the Anarchist Elitist Tradition in America,” American Quarterly, Vol. 21, No. 2, Part 1, pp. 165–89.
  19. Jump up^ Nock, Albert Jay (1924). “On Doing the Right Thing”American Mercury3 (11): 257–62.
  20. Jump up^ Nitsche, Charles G. (1981). Albert Jay Nock and Frank Chodorov: Case Studies in Recent American Individualist and Anti-statist Thought, (Ph.D. Dissertation), University of Maryland.
  21. Jump up^ Christopher Lasch (1972). The American Liberals and the Russian Revolution. McGraw-Hill. p. 143.
  22. Jump up^ Douglas Charles Rossinow (2008). Visions of Progress: The Left-liberal Tradition in America. University of Pennsylvania Press. p. 98. ISBN 0-8122-4049-9.
  23. Jump up^ Francis Neilson, Albert Jay Nock, eds. (1921). The Freeman3. Freeman Incorporated. p. 391.
  24. Jump up^ The Thomist. Thomist Press. 1951. p. 302.
  25. Jump up^ Louis Filler (1 January 1993). American Anxieties: A Collective Portrait of The 1930s. Transaction Publishers. pp. 49–. ISBN 978-1-4128-1687-8.
  26. Jump up^ Robert Sherrill (June 11, 1988). “William F. Buckley Lived Off Evil As Mold Lives Off Garbage”The Nation. The Nation Company. Archived from the original on February 20, 2017. Retrieved 23 July 2017One of Will Sr.’s favorite authors, Albert Jay Nock, became a personal friend and was often in the Buckley household when Bill was growing up. Along with being anti-democratic, Nock was, at least in his later years, “virulently anti-Semitic.” Young Buckley fell under Nock’s spell and never quit quoting him. Another of Will Sr.’s friends, Merwin K. Hart, was one of America’s most notorious anti-Semites for three decades.
  27. Jump up^ Paul Vitello (15 September 2012). “Michael Wreszin, Biographer of American Radicals, Dies at 85”The New York Times. The New York Times Company. Archived from the originalon March 1, 2017. Retrieved 23 July2017.
  28. Jump up^ Michael Wreszin (1972). The Superfluous Anarchist: Albert Jay Nock. Brown University Press. p. 143. Jewish had been for [Henry] Adams what Finkman became for Nock, a synonym for avarice and materialism. When Nock lamented the presence of Jews and other undesirables in what he seemed to consider his private study, the New York Public Library, he echoed the fierce resentment of the elderly Adams against the presence of Jews in places that he loved, and on boats and trains.
  29. Jump up^ Stanley Kunitz (1955). Twentieth Century Authors: A Biographical Dictionary of Modern Literature. Supplement. H. W. Wilson. p. 721.
  30. Jump up^ Albert Jay Nock. Journal of Forgotten Days, May 1934–October 1935. Hinsdale, Illinois: H. Gegnery Company. p. 47.
  31. Jump up^ Albert Jay Nock. Journal of Forgotten Days, May 1934–October 1935. Hinsdale, Illinois: H. Gegnery Company. p. 56.
  32. Jump up^ William F. Buckley Jr. (28 October 2008). Let Us Talk of Many Things: The Collected Speeches. Basic Books. p. 467. ISBN 978-0-465-00334-1A year later, in conversation with Mr. Nock, my father disclosed that he had voted for Willkie, thus departing from a near-lifelong resolution, beginning in his thirties, never to vote for any political candidate. He now affirmed, with Mr. Nock’s hearty approval, his determination to renew his vows of abstinence, Willkie having been revealed—I remember the term he used—as a “mountebank.” “They are all mountebanks,” Mr. Nock said.
  33. Jump up^ Michael Wreszin (1972). The Superfluous Anarchist: Albert Jay Nock. Brown University Press. p. 128. Nock didn’t vote in 1932; in fact, he couldn’t remember when he had last voted. He couldn’t even remember the candidates, but he had, he claimed, weighed the issues carefully before casting a write-in vote for Jefferson Davis.
  34. Jump up^ Gregory L. Schneider (1999). Cadres for Conservatism: Young Americans for Freedom and the Rise of the Contemporary Right. NYU Press. p. 8. ISBN 978-0-8147-8108-1.
  35. Jump up^ Garry Wills (28 May 2013). A Necessary Evil: A History of American Distrust of Government. Simon and Schuster. p. 272. ISBN 978-1-4391-2879-4His attitude toward voting (and toward Jefferson Davis) is given in this passage: I once voted at a presidential election. There being no real issue at stake, and neither candidate commanding any respect whatever, I cast my vote for Jefferson Davis of Mississippi. I knew Jeff was dead, but I voted on Artemus Ward’s principle that if we can’t have a live man who amounts to anything, by all means let’s have a first-rate corpse.
  36. Jump up^ Albert Jay Nock (1933). “What the American Votes For“. In Henry Louis Mencken, George Jean Nathan. The American Mercury28. Knopf. p. 176.
  37. Jump up^ Albert Jay Nock (1964). Memoirs of a Superfluous Man. Ludwig von Mises Institute. p. 131. ISBN 978-1-61016-392-7.
  38. Jump up^ Claude Moore Fuess, Emory Shelvy Basford, eds. (1947). Unseen Harvests: A Treasury of Teaching. Macmillan. p. 610.
  39. Jump up^ Michael Wreszin (1972). The Superfluous Anarchist: Albert Jay Nock. Brown University Press. p. 143.

Further reading

External links

https://en.wikipedia.org/wiki/Albert_Jay_Nock

Read Full Post | Make a Comment ( None so far )

Johnan B. Peterson — 12 Rules For Life: An Antidote to Chaos — Videos

Posted on March 10, 2018. Filed under: Articles, Blogroll, Books, Business, College, Communications, Computers, Computers, Corruption, Diet, Diet, Documentary, Economics, Education, Elections, Employment, Energy, Environment, Essays, Exercise, Faith, Family, Freedom, Friends, Health, Heroes, Homes, Investments, Law, liberty, Life, Links, Literacy, Mastery, media, People, Philosophy, Photos, Political Correctness, Programming, Psychology, Quotations, Radio, Rants, Raves, Raymond Thomas Pronk, Sleep, Spying, Strategy, Stress Reduction, Success, Talk Radio, Taxation, Taxes, Technology, Television, Vacations, Video, War, Water, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , |

See the source imageSee the source imageSee the source image

See the source image

See the source imageSee the source imageSee the source image

Absolutely

Jordan Peterson LIVE: 12 Rules for Life – An Antidote to Chaos

The Perilous State of the University: Jonathan Haidt & Jordan B Peterson

Jordan Peterson’s Life Advice Will Change Your Future (MUST WATCH)

2017/06/15: 12 principles for a 21st century conservatism

Jordan Peterson: Why Globalism Fails and Nationalism is Relatable

White privilege isn’t real – Jordan Peterson

Jordan Peterson – This evil Social Justice mindset Threatens All

The Fundamental Racist idea – Jordan Peterson

Jordan Peterson If You Were In Nazi Germany You Would Be A Nazi

How Hitler was Even More Evil Than You Think – Prof. Jordan Peterson

Why Hitler Bathed Even More Than You Think – Prof. Jordan Peterson

How Ordinary Men Became Nazi Killers – Prof. Jordan Peterson

A Brief Guide To Life – Jordan Peterson | Depression & Success (LIFE CHANGING)

Jordan Peterson – How To Stop Being Lazy & Progress In Life

Jordan Peterson – How To Stop Procrastinating

Jordan Peterson – Don’t Be The Nice Guy

Jordan Peterson: These kinds of men attract women

Jordan Peterson: Eye Contact and Attraction

Jordan Peterson On How Women Rate Men

Jordan Peterson: Men who know this are ahead of the competition

Jordan Peterson – Be Attractive to Many Women But Only Choose One

Jordan Peterson: Traits of Alpha Males

Jordan Peterson: Alpha males & everyone below them

Jordan Peterson: Why I Married My Wife

How Jordan Peterson And His Wife Make Their Marriage Work

How Jordan Peterson Sorted Himself Out at Age 25

Jordan Peterson: ‘My Biggest Regret’

Jordan Peterson gets emotional talking about his daughter and the Final Rule

jordan b peterson crying about individualism

Jordan Peterson On Importance Of Reading

Why You Need to Read Dostoyevsky – Prof. Jordan Peterson

Lectures: Exploring the Psychology of Creativity

What Every Creative Person NEEDS to Know – Prof. Jordan Peterson

Jordan Peterson: Advice for Hyper-Intellectual People

A Critique of Jordan B. Peterson

ALEXANDER BLUM

Far from being a darling of the alt-right or secretly promoting fiendish racist ideology, the largest contradiction in Jordan B. Peterson’s sprawling intellectual enterprise is simply the notion that capitalist classical liberalism is the only game we can successfully play on Earth, even as it contradicts the depths of Christian symbols.

Now, this is not intended to be a hit-piece on Dr. Peterson. I have listened to him since the fall of 2016, and he has radically shaped the way I view the world. He is one of the only people on the North American continent I would consider to be a true intellectual. But in the dregs of hero worship, it is too tempting to simply nod along with all that he says. Why wouldn’t I? He is far older, far wiser. But he is also in the archetypal position of ‘dead father’. He represents the golden sphere of the knowledge of both the ancient past and an intellectual development amid the dynamics of the Cold War. In order to effectively embody the spirit of the son, who resurrects the archaic tradition and redeems the blindness of his father, I must pry where there are cracks and make known the fact that no human being is infallible. In fact, if we believe that any human being has secured the total truth on any subject, then every successive generation is an unnecessary appendage insofar as they seek to develop that subject. The son who is incapable of surpassing the father signals the death of humankind, the end of evolution. As such, I must now bring rhetorical wounds against a man who is simultaneously master, bulwark and gatekeeper.

I attended a New York City talk delivered by Dr. Peterson, where much of his worldview crystallized. He explained that the Soviet Union and the West were engaged in a spiritual war over which type of ‘game’ is tenable to play. He concluded that the system of Western capitalism, built upon Enlightenment and mythological foundations (we will return to the mythological) was objectively superior to the Marxist rejection of hierarchy and obsession with central planning. Human nature, so it goes, aligns with the liberal capitalist mode of production.

But Dr. Peterson has made one profound oversight. It is precisely this: capitalism and classical liberalism have destroyed myth. The technological revolution, and the transformation of communal, local bonds of people with shared values into rent-seekers, wage-searchers and otherwise atomized, separate individuals united only by the search for profit, has destroyed the original foundations of human wellbeing. Economics has completely seized and determined culture. Peterson’s notion that economic success equates to playing a good game, or otherwise participating in the good, ultimately leads to a world defined by Bezos, Zuckerberg, and Trump.

The dominance hierarchy is a point of massive spiritual contention. How can the dominance hierarchies of the West be competent when at the very point of Peterson’s peak fame, they are occupied by Trump, a sophist, a marketer, a chronic liar with no internal life, no self-reflection, who will hand over all his wealth to unremarkable, unspecial, mediocre children? The Trump children earned nothing but by virtue of birth, and yet they are in possession of the keys to the world in ways ordinary lowborn people will never experience. How is this not a fundamental, fatal corruption of hierarchy, existing at the pinnacle of the world’s power? Peterson avoids speaking about Trump for this reason: it would force him to admit that liberal capitalism dissolves, finally, into a kind of madness. Decrying left-right polarization, Peterson upholds a center: that center is capitalist realism. The theorist Mark Fisher wrote a whole book about ‘Capitalist Realism’, the notion that social contract capitalism is the final system of economic-political life, and that’s simply that. Except Fisher rejected it, because capitalism destroys community, tradition and culture. It monetizes all these things and produces economically workshopped monoculture. Is it truly heroic to live in a circle for all of existence, the economization of perpetual Star Wars films serving as the only permanent narrative link between us? That is what Nietzsche’s ‘time is a flat circle’ meant – and it is a kind of hell. A world defined by those who purchased it two generations ago is no treading ground for heroes. Of that, I am certain.

Jordan Peterson lives doing what he loves. He makes a fortune off of Patreon and his new book. There is nothing wrong with that – he played the right game. He lived a life of the mind and was paid for it. The upcoming generation will not know what that feels like. University tenure is a non-starter. Being paid to write means working full-time in retail or food service, and not just throughout one’s 20s. Perhaps for one’s entire life. Monetizing a life of the mind is extremely rare. At Peterson’s lecture, I was surrounded by intensely bright, thoughtful young people, mostly young men. But how many of them will get to live a satisfying life of the mind? How many will instead work in offices, and ultimately aspire toward a more fulfilling life than the conditions of an impersonal network of capital that we are supposed to believe is in any way mythically inspired? I suspect that a new generation of Cains will arise out of the low-wage workers who thought they were promised something better.

When we reach the Biblical stories, we reach deeper problems. Equating Earthly success to playing the right game and achieving the good is, in essence, no better than Oprah’s prosperity gospel. People succeed off of bad ideas all the time. Worse, there are bad ideas we don’t even understand are bad, and are structurally incapable of facing. Here’s one: Professor Peterson gave the example of a person buying land, building a factory, and employing others as a total net good. But what if the factory creates irresolvable climate change over the course of 250+ years and sabotages future generations? What if the factory multiplies and creates a monoculture, stifling all new voices and claiming the globe, as Amazon and Google seek to do? When James Damore was fired by Google, Dr. Peterson was rightfully upset. But this is the consequence of prioritizing economics above culture and spirit – economic entities can slaughter free expression. That is entirely left out of a capitalist’s worldview. In fact, by merely writing controversial material, one can be rightfully denied a job by property owners. Fans of Peterson know as well as I do the deep taboos that linger in science. The subject of IQ alone will ruin lives – if intelligence is the predicate of a good life, and only a minority of us will have high IQs, what is to become of the bulk of us? Well, we will merely be followers, members of a herd. That, again, is no hero’s journey.

I always feel put-off by audiences. I felt frankly alienated, when Dr. Peterson said that rule-breaking, criminal children, if not addressed by the ages of 3 or 4, will be rule-breakers for their entire lives and ultimately end up in jail. Peterson’s words didn’t disgust me, but rather, the audience’s reaction did – it was laughter. We are talking about the doom and mass incarceration of millions of lives. We are talking about fate inscribed in biology – and the audience finds pause to laugh it off as just ‘unruly children are funny’? Perhaps they’re not taking this seriously. Perhaps the depths of this problem aren’t fully understood.

Peterson simultaneously argues for self-improvement in the game of atomized profit-seeking, but also that one’s genes largely determine intelligence and the qualities of success, i.e., disagreeableness, conscientiousness, and so on. Monetizing one’s creativity is largely an expression of personality – intelligence plus conscientiousness, with disagreeableness tossed in to ensure you keep coming out on top of negotiations. If you are born without that cocktail, you must work against your own brain where others have a smooth ride. The same is ultimately true in relation to identity. You can tell black people to pull up their bootstraps all you want – but ultimately, if you don’t understand that black people today bear the culture and last names of their former slave owners, and according to certain insane IQ studies, have a lower IQ on average than whites (a claim that debunks meritocracy and individualism in one swoop), you must prepare for the consequences. You must prepare for moral rebellion. What would you do in their situation? Every anxiety compounded by identity-wounds? It would be a hell that young white men do not face. And imagine being transgender and dealing with the world! Peterson is right to say that you must face the world, no matter what – but also wrong to defend the free market and suggest that pulling up your bootstraps is the only mode of life in which responsibility may properly manifest in individuals. The conservative desire for a totally brutal, independent society for ordinary citizens, while enabling state subsidies and legal tax evasion schemes (Apple pays no taxes) for the wealthy, is an infuriating double standard upheld by centrist capitalism.

In a Quora question from years ago, the Professor once argued against universal health care, saying that it is wrong to ‘force’ the hands of doctors, the same line of argument used by Ben Shapiro. I will never understand this in any sense. If you are paid, you have to do work, whether it’s a private or public hospital. Either way, declining work means getting fired. There is no real distinction in ‘forced’ labor here. Of what use are our myths if we share no common community worth funding, for those who would otherwise be bankrupted by their bills? If you say churches or local organizations should provide these services, then see to it that megachurches provide anything at all from their coffers. I guarantee you these ‘Christians’ will cling to their purse strings.

On the topic of transgender people, I split in certain ways with Peterson. As I understand it, he is only opposed to the legal requirement to adhere to proper pronouns, which I understand. I reject state authority as well. But what is the transgender individual, at a deeper level? At its core, it is an attempt to break free from the constraints of biology and achieve ‘one’ where previously there were two. This is a good thing. I see much hope in the transgender movement. And it is mythologically driven.

For all that Peterson speaks of the Bible, so far, he leaves out one vital figure, perhaps the most vital figure: Sophia. In Carl Jung’s Answer to Job, Jung calls Sophia the logos itself. He names Sophia the mediator between humankind and God. Who is Sophia? Wisdom. She is the feminine wisdom exiled from the world, because in Gnostic Christian mythology, she created the world without consent from God, and in doing so, created a false God called the Demiurge, and the serpent and the fall. The redemption of the world is the return of Sophia from exile.

In his epic work of Christian mysticism, Valentin Tomberg wrote that the complete Holy Trinity is not father-son-holy spirit. In fact, it is the Holy Trinity plus mother, daughter and holy soul. The Holy Trinity, according to the greatest master of Catholic mysticism I have ever read, is actually composed of six parts, not three, and it is feminine and masculine in nature. It is intersex, or both sexes, it is fundamentally androgynous. There is so much we do not yet understand about human identity – why must traditionalists cut off all possibility for transformation out of fear alone?

To combine the feminine and the masculine is the goal of all this gender trouble, to make ‘one’ where there is now division. In the Answer to Job, Jung refers to Yahweh, or God himself, as “unconscious”, a monster, a beast of nature. It is only Sophia who is able to create self-reflection through the mediation between Yahweh and Job. it is the feminine out of which the logos is born. If modern feminism is corrupt in spite of this fact, it is because culture itself is corrupt. If the transgender movement is incomplete, it is because it is too political and not enough immersed in the archaic foundations for transforming gender, the mythical synthesis of male and female. But we also have ourselves to blame for removing Sophia entirely from our retellings of the Biblical story – Sophia is the feminine Christ. Without her, there is only cruel and delusional Yahweh, the primal God who shaped the world but who is not fit to run it alone.

But in the Q&A after the talk, Peterson explicitly defined the relationship between male and female as that of Christ and Mary. In other words, Mary raises Christ. The purpose of women is not to become heroes, but to raise them. That is impossible for a truly ambitious woman. If I were born a woman, obsessed with these mystical and philosophical questions, I would resent that statement so deeply I may never recover. Peterson’s philosophy is centered, in this way, upon a male subject. In order to redeem the father, the next generation of mythical thinkers must reorient the woman out of this secondary position. Perhaps that entails changing the very biology of childbirth – with artificial wombs, who knows what will follow. The tranhumanist idea must return Sophia to the world, not be finished at the half-answer of Mary. Valentin Tomberg, interestingly enough, spoke of the Mary-Sophia as the ultimate form of the woman. Both raiser of heroes and the hero herself. That is completeness and perfection. Not this half-answer of women in one corner, men in another, men striving, women bearing children. The reason for the fall and the progress of history is to return to Eden with higher values and more complete myths, not merely to repeat the past. Of that I am certain.

Lastly, the paradoxes of Genesis are not fully appreciated by Peterson’s focus on Western capitalism, property, and contractual profit-seeking life. Ultimately, success in this world is success of the serpent. That much is clear. Satan, and the serpent, are the Gods of this world. And God obeys the serpent! God listens to evil, and bullies Job. God allows evil to run rampant. And this world, crafted in the image of the serpent, is not the place to lay down and hand over one’s lifeblood. Financial success in this nature, this fallen nature, genetic, cyclical birth-death-birth-death nature, is only temporal. Manipulating the mechanisms of fallen nature to secure a wife and get a job are not the full extent of the hero’s journey. The true extent of the hero’s journey is in solving the problem of the fall. It is the return of Christ crucified to heaven. Now, the Marxists have tried to solve this problem, to create paradise and equality on Earth, and they have failed. But I am still committed to the attempt through means other than Marxism.

Finally, Christ himself is the ultimate paradox. I mean, let’s be serious about this. Pontius Pilate and the Romans who crucified Christ were victorious on the dominance hierarchy. Christ was defeated, destroyed. So why, then, is he the maximal expression of the hero in Christian myth? He was crucified by those who did secure wives and careers, and who passed down judgement, and succeed over others. And yet, the man who was destroyed, and not his destroyers, is the ultimate hero. It is because worldly success is not true success. There is a difference. There is absolutely a difference.

My ultimate concern with Peterson’s capitalism is that the modern world has become a place ill-suited for heroes, designed to make us dumb, dull and conformist, and he acknowledges this – he sees the difficulty of the situation, but it is the young, careerless and unmarried who will truly have to figure out a solution. In truth, we will be the ones who face it. The young, those who grew up immersed in the virtual, and the chaotic fragmentation of the decaying liberal order under Donald Trump. That is our inheritance – not the Cold War, not cultural Marxism. Those are both side-shows that make us feel good about our own cultural signaling, while resolving virtually nothing. At the Q&A, two people who asked questions were indicative of madness. One of them opened the question session by asking why Jews have been trying to destroy Russia for two-hundred years. Peterson, wisely, said “I can’t do it”. Touching that question is touching a fine sprinkled dust born of unkempt hair, the aesthetic of the alt-right, But another questioner was taken seriously, though he bothered me immensely. All I could think when he spoke was “Joseph McCarthy”. This kid asked Peterson: “How can we tell the difference between the Marxists trying to destroy Western civilization and the useful idiots?” Some in the crowd cheered. I saw the true nature of that question – authoritarianism. Let’s not be deluded by present culture wars – the right is just as authoritarian as the left, and more successful at implementing its ideas. The original dissident intellectual was the Western leftist. The pendulum will always swing back and forth, and the only way to reject it is to reject the mindset of these damn inquisitors. Yes, I’ve got problems with Western civilization. I live because there are problems to be solved. They are major problems. If the structure is good enough so that nothing major must be changed, then I was born after history ended, and will simply work my way to a cyclical grave. No. I’d rather make a world fit for heroes.

What is a hero? Someone who redeems the blind sight of the past and renews myth by speaking the truth. Well, the truth is that the world of fetishizing Earthly games as a path to goodness and truth is the world that leads to a monoculture dictated by Google, Amazon and Facebook. Individuals unrestrained by mythical truth, modern capitalists, have transformed their ideas into leviathans more massive and powerful than any idea can functionally be. If Jordan Peterson opposes communism, he must also oppose the corporate communism of a world split between a handful of companies that determine the communications, ideas and structure of the world. And that corporate communism is the consequence of believing that classical liberal capitalism is the only way we can possibly live. One entrepreneur, with one idea, one hero – Mark Zuckerberg? No. Something went wrong. He is no Hercules. The myth has degenerated into marketing. It must be made into something more.

 

 

Jordan Peterson

From Wikipedia, the free encyclopedia
Jordan Peterson
Peterson Lecture (33522701146).png

Peterson at the University of Toronto, 2017
Born Jordan Bernt Peterson
June 12, 1962 (age 55)
EdmontonAlberta, Canada
Residence TorontoOntario, Canada
Citizenship Canadian
Education Political science (B.A., 1982)
Psychology (B.A., 1984)
Clinical psychology (Ph.D., 1991)
Alma mater
Spouse(s) Tammy Roberts (m. 1989)
Children 2
Website jordanbpeterson.com
Scientific career
Fields Psychology
Institutions
Thesis Potential psychological markers for the predisposition to alcoholism (1991)
Doctoral advisor Robert O. Pihl

Jordan Bernt Peterson (born June 12, 1962) is a Canadian clinical psychologistcultural critic, and professor of psychology at the University of Toronto. His main areas of study are in abnormalsocial, and personality psychology,[1] with a particular interest in the psychology of religious and ideological belief,[2] and the assessment and improvement of personality and performance.[3]

Peterson studied at the University of Alberta and McGill University. He remained at McGill as a post-doctoral fellow from 1991 to 1993 before moving to Harvard University, where he was an assistant and an associate professor in the psychology department. In 1998, he moved to the University of Toronto as a full professor.

His first book Maps of Meaning: The Architecture of Belief was published in 1999, a work which examined several academic fields to describe the structure of systems of beliefs and myths, their role in the regulation of emotion, creation of meaning, and motivation for genocide.[4][5][6] His second book, 12 Rules for Life: An Antidote to Chaos, was released in January 2018.[7][8][9]

In 2016, Peterson released a series of videos on his YouTube channel in which he criticized political correctness and the Canadian government’s Bill C-16. He subsequently received significant media coverage.[7][8][9]

Childhood

Peterson was born on June 12, 1962, and grew up in FairviewAlberta, a small town northwest of his birthplace Edmonton, in Canada. He was the eldest of three children born to Beverley, a librarian at the Fairview campus of Grande Prairie Regional College, and Walter Peterson, a schoolteacher.[10] His middle name is Bernt (/bɛərnt/ BAIRNT), after his Norwegian great-grandfather.[11][12]

When he was 13, he was introduced to the writings of George OrwellAldous HuxleyAleksandr Solzhenitsyn, and Ayn Rand by his school librarian Sandy Notley – mother of Rachel Notley, leader of the Alberta New Democratic Party and 17th Premier of Alberta.[13] He also worked for the New Democratic Party (NDP) throughout his teenage years, but grew disenchanted with the party due to what he saw as a preponderance of “the intellectual, tweed-wearing middle-class socialist” who “didn’t like the poor; they just hated the rich”.[10] He left the NDP at age 18.[14]

Education

After graduating from Fairview High School in 1979, Peterson entered the Grande Prairie Regional College to study political science and English literature.[2] He later transferred to the University of Alberta, where he completed his B.A. in 1982.[14] Afterwards, he took a year off to visit Europe. There he developed an interest in the psychological origins of the Cold War, particularly 20th century European totalitarianism,[2][15] and was plagued by apocalyptic nightmares about the escalation of the nuclear arms race. As a result, he became concerned about mankind’s capacity for evil and destruction, and delved into the works of Carl JungFriedrich NietzscheAleksandr Solzhenitsyn,[10] and Fyodor Dostoyevsky.[15] He then returned to the University of Alberta and received a B.A. in psychologyin 1984.[16] In 1985, he moved to Montreal to attend McGill University. He earned his Ph.D. in clinical psychology under the supervision of Robert O. Pihl in 1991, and remained as a post-doctoral fellow at McGill’s Douglas Hospital until June 1993, working with Pihl and Maurice Dongier.[2][17]

Career

From July 1993 to June 1998,[1] Peterson lived in Arlington, Massachusetts, while teaching and conducting research at Harvard University as an assistant and an associate professor in the psychology department. During his time at Harvard, he studied aggressionarising from drug and alcohol abuse and supervised a number of unconventional thesis proposals.[14] Two former Ph.D. students, Shelley Carson, a psychologist and teacher from Harvard, and author Gregg Hurwitz recalled that Peterson’s lectures were already highly admired by the students.[8] In July 1998, he returned to Canada and took up a post as a full professor at the University of Toronto.[1][16]

Peterson’s areas of study and research are in the fields of psychopharmacologyabnormalneuroclinicalpersonalitysocialindustrial and organizational,[1] religiousideological,[2] political, and creativity psychology.[3] Peterson has authored or co-authored more than a hundred academic papers.[18] Peterson has over 20 years of clinical practice, seeing 20 people a week, but in 2017, he decided to put the practice on hold because of new projects.[7]

In 2004, a 13-part TV series based on Peterson’s book Maps of Meaning: The Architecture of Belief aired on TVOntario.[10][16][19] He has also appeared on that network on shows such as Big Ideas, and as a frequent guest and essayist on The Agenda with Steve Paikin since 2008.[20][21]

Works

Books

Maps of Meaning: The Architecture of Belief

Something we cannot see protects us from something we do not understand. The thing we cannot see is culture, in its intrapsychic or internal manifestation. The thing we do not understand is the chaos that gave rise to culture. If the structure of culture is disrupted, unwittingly, chaos returns. We will do anything – anything – to defend ourselves against that return.

— Jordan Peterson, 1998 (Descensus ad Inferos)[22]

In 1999, Routledge published Maps of Meaning: The Architecture of Belief. The book, which took Peterson 13 years to complete, describes a comprehensive theory about how people construct meaningbeliefs and make narratives using ideas from various fields including mythologyreligionliteraturephilosophy and psychology in accordance to the modern scientific understanding of how the brain functions.[14][22][23]

According to Peterson, his main goal was to examine why both individuals and groups participate in social conflict, explore the reasoning and motivation individuals take to support their belief systems (i.e. ideological identification[14]) that eventually results in killing and pathological atrocities like the Gulag, the Auschwitz concentration camp and the Rwandan genocide.[14][22][23] He considers that an “analysis of the world’s religious ideas might allow us to describe our essential morality and eventually develop a universal system of morality”.[23]

12 Rules for Life: An Antidote to Chaos

In January 2018, Penguin Random House published Peterson’s second book, 12 Rules for Life: An Antidote to Chaos. The work contains abstract ethical principles about life, in a more accessible style than Maps of Meaning.[7][8][9] To promote the book, Peterson went on a world tour.[24][25][26] As part of the tour, Peterson was interviewed by Cathy Newman on Channel 4 News. In a short time the interview received considerable attention and over seven million views on YouTube.[27][28][29] The book was ranked the number one bestselling book on Amazon in the United States and Canada and number four in the United Kingdom.[30][31] It also topped bestselling lists in Canada, US and the United Kingdom.[32][33]

YouTube channel and podcasts

In 2013, Peterson began recording his lectures (“Personality and Its Transformations”, “Maps of Meaning: The Architecture of Belief”[34]) and uploading them to YouTube. His YouTube channel has gathered more than 800,000 subscribers and his videos have received more than 35 million views as of January 2018.[35] In January 2017, he hired a production team to film his psychology lectures at the University of Toronto. He used funds received via the crowd-sourced funding website Patreon after he became embroiled in the Bill C-16 controversy in September 2016. His funding through Patreon has increased from $1,000 per month in August 2016 to $14,000 by January 2017 to more than $50,000 by July 2017.[13][35][36]

Peterson has appeared on The Joe Rogan ExperienceThe Gavin McInnes ShowSteven Crowder‘s Louder with CrowderDave Rubin‘s The Rubin ReportStefan Molyneux‘s Freedomain Radioh3h3Productions‘s H3 PodcastSam Harris‘s Waking Up podcast, Gad Saad‘s The Saad Truth series and other online shows.[37] In December 2016, Peterson started his own podcast, The Jordan B. Peterson Podcast, which has 39 episodes as of February 20, 2018, including academic guests such as Camille PagliaMartin Daly, and James W. Pennebaker,[38] while on his channel he has also interviewed Stephen HicksRichard J. Haier, and Jonathan Haidt among others. Peterson supported engineer James Damore in his action against Google.[9]

In May 2017, Peterson began The Psychological Significance of the Biblical stories,[39] a series of live theatre lectures, also published as podcasts, in which he analyzes archetypal narratives in Genesis as patterns of behavior vital for personal, social and cultural stability.[9][40]

Self Authoring Suite

Peterson and his colleagues Robert O. Pihl, Daniel Higgins, and Michaela Schippers[41] produced a writing therapy program with series of online writing exercises, titled the Self Authoring Suite.[42] It includes the Past Authoring Program, a guided autobiography; two Present Authoring Programs, which allow the participant to analyze their personality faults and virtues in terms of the Big Five personality model; and the Future Authoring Program, which guides participants through the process of planning their desired futures. The latter program was used with McGill University undergraduates on academic probation to improve their grades, as well since 2011 at Rotterdam School of Management, Erasmus University.[43][44] The Self Authoring Programs were developed partially from research by James W. Pennebaker at the University of Texas at Austin and Gary Latham at the Rotman School of Management of the University of Toronto. Pennebaker demonstrated that writing about traumatic or uncertain events and situations improved mental and physical health, while Latham demonstrated that personal planning exercises help make people more productive.[44] According to Peterson, more than 10,000 students have used the program as of January 2017, with drop-out rates decreasing by 25% and GPAs rising by 20%.[10]

Critiques of political correctness

Peterson’s critiques of political correctness range over issues such as postmodernismpostmodern feminismwhite privilegecultural appropriation, and environmentalism.[37][45][46] Writing in the National Post, Chris Selley said Peterson’s opponents had “underestimated the fury being inspired by modern preoccupations like white privilege and cultural appropriation, and by the marginalization, shouting down or outright cancellation of other viewpoints in polite society’s institutions”,[47] while in The SpectatorTim Lottstated Peterson became “an outspoken critic of mainstream academia”.[15] Peterson’s social media presence has magnified the impact of these views; Simona Chiose of The Globe and Mail noted: “few University of Toronto professors in the humanities and social sciences have enjoyed the global name recognition Prof. Peterson has won”.[48]

According to his study – conducted with one of his students, Christine Brophy – of the relationship between political belief and personality, political correctness exists in two types: PC-Egalitarianism and PC-Authoritarianism, which is a manifestation of “offense sensitivity”.[49] The first type is represented by a group of classical liberals, while the latter by the group known as “social justice warriors[10] who “weaponize compassion“.[2] The study also found an overlap between PC-authoritarians and right-wing authoritarians.[49]

Peterson considers that the universities should be held as among the most responsible for the wave of political correctness which appeared in North America and Europe.[48] He watched the rise of political correctness on campuses since the early 1990s,[50] and considers that the humanities have become corrupt, less reliant on science, and instead of “intelligent conversation, we are having an ideological conversation”. From his own experience as a university professor, he states that the students who are coming to his classes are uneducated and unaware about the mass exterminations and crimes by Stalinism and Maoism, which were not given the same attention as fascism and Nazism. He also says that “instead of being ennobled or inculcated into the proper culture, the last vestiges of structure are stripped from [the students] by post-modernism and neo-Marxism, which defines everything in terms of relativism and power“.[15][51][52]

Of postmodernism and identity politics

And so since the 1970s, under the guise of postmodernism, we’ve seen the rapid expansion of identity politics throughout the universities, it’s come to dominate all of the humanities – which are dead as far as I can tell – and a huge proportion of the social sciences … We’ve been publicly funding extremely radical, postmodern leftist thinkers who are hellbent on demolishing the fundamental substructure of Western civilization. And that’s no paranoid delusion. That’s their self-admitted goal … Jacques Derrida … most trenchantly formulated the anti-Western philosophy that is being pursued so assiduously by the radical left.

— Peterson, 2017[51]

Peterson believes that postmodern philosophers and sociologists since the 1960s,[45] while typically claiming to reject Marxism and Communism, because they were discredited as economic ideologies as well by the exposure of crimes in the Soviet Union, have actually built upon and extended their core tenets. He states that it is difficult to understand contemporary society without considering the influence of postmodernism which initially spread from France to the United States through the English department at Yale University. He argues that they “started to play a sleight of hand, and instead of pitting the proletariat, the working class, against the bourgeois, they started to pit the oppressed against the oppressor. That opened up the avenue to identifying any number of groups as oppressed and oppressor and to continue the same narrative under a different name … The people who hold this doctrine – this radical, postmodern, communitarian doctrine that makes racial identity or sexual identity or gender identity or some kind of group identity paramount – they’ve got control over most low-to-mid level bureaucratic structures, and many governments as well”.[51][18]

He emphasizes that the state should halt funding to faculties and courses he describes as neo-Marxist, and advises students to avoid disciplines like women’s studiesethnic studies and racial studies, as well other fields of study he believes are “corrupted” by the ideology such as sociologyanthropology and English literature.[53][54] He states that these fields, under the pretense of academic inquiry, propagate unscientific methods, fraudulent peer-review processes for academic journals, publications that garner zero citations,[55] cult-like behaviour,[53] safe-spaces,[56] and radical left-wing political activism for students.[45] Peterson has proposed launching a website which uses AI to identify and showcase the amount of ideologization in specific courses. He announced in November 2017 that he had temporarily postponed the project as “it might add excessively to current polarization”.[57][58]

Peterson has criticized the use of the term “white privilege“, stating that, “being called out on their white privilege, identified with a particular racial group and then made to suffer the consequences of the existence of that racial group and its hypothetical crimes, and that sort of thing has to come to a stop. … [It’s] racist in its extreme”.[45] In response to the 2017 protest in Charlottesville, Virginia, he criticized the far right‘s use of identity politics, and said that “the Caucasians shouldn’t revert to being white. It’s a bad idea, it’s a dangerous idea, and it’s coming fast, and I don’t like to see that!” He stated that the notion of group identity is “seriously pathological … reprehensible … genocidal” and “it will bring down our civilization if we pursue it”.[59] He has also been prominent in the debate about cultural appropriation, stating it promotes self-censorship in society and journalism.[60]

Of Bill C-16

On September 27, 2016, Peterson released the first installment of a three-part lecture video series, entitled “Professor against political correctness: Part I: Fear and the Law”.[13][61] In the video, he stated he would not use the preferred gender pronouns of students and faculty as part of compelled speech, and announced his objection to the Canadian government‘s Bill C-16, which proposed to add “gender identity or expression” as a prohibited ground of discrimination under the Canadian Human Rights Act, and to similarly expand the definitions of promoting genocide and publicly inciting hatred in the Criminal Code.[61][62]

He stated that his objection to the bill was based on potential free speech implications if the Criminal Code is amended, as he claimed he could then be prosecuted under provincial human rights laws if he refuses to call a transsexual student or faculty member by the individual’s preferred pronoun.[63] Furthermore, he argued that the new amendments paired with section 46.3 of the Ontario Human Rights Code would make it possible for employers and organizations to be subject to punishment under the code if any employee or associate says anything that can be construed “directly or indirectly” as offensive, “whether intentionally or unintentionally”.[64] Other academics challenged Peterson’s interpretation of C-16,[63] while some scholars such as Robert P. George supported Peterson’s initiative.[13]

The series of videos drew criticism from transgender activists, faculty and labour unions, and critics accused Peterson of “helping to foster a climate for hate to thrive”.[13] Protests erupted on campus, some including violence, and the controversy attracted international media attention.[65][66][67] When asked in September 2016 if he would comply with the request of a student to use a preferred pronoun, Peterson said “it would depend on how they asked me … If I could detect that there was a chip on their shoulder, or that they were [asking me] with political motives, then I would probably say no … If I could have a conversation like the one we’re having now, I could probably meet them on an equal level”.[67] Two months later, the National Post published an op-ed by Peterson in which he elaborated on his opposition to the bill and explained why he publicly made a stand against it:

I will never use words I hate, like the trendy and artificially constructed words “zhe” and “zher.” These words are at the vanguard of a post-modern, radical leftist ideology that I detest, and which is, in my professional opinion, frighteningly similar to the Marxist doctrines that killed at least 100 million people in the 20th century.

I have been studying authoritarianism on the right and the left for 35 years. I wrote a book, Maps of Meaning: The Architecture of Belief, on the topic, which explores how ideologies hijack language and belief. As a result of my studies, I have come to believe that Marxism is a murderous ideology. I believe its practitioners in modern universities should be ashamed of themselves for continuing to promote such vicious, untenable and anti-human ideas, and for indoctrinating their students with these beliefs. I am therefore not going to mouth Marxist words. That would make me a puppet of the radical left, and that is not going to happen. Period.[68]

In response to the controversy, academic administrators at the University of Toronto sent Peterson two letters of warning, one noting that free speech had to be made in accordance with human rights legislation and the other adding that his refusal to use the preferred personal pronouns of students and faculty upon request could constitute discrimination. Peterson speculated that these warning letters were leading up to formal disciplinary action against him, but in December the university assured him that he would retain his professorship, and in January 2017 he returned to teach his psychology class at the University of Toronto.[13]

In February 2017, Maxime Bernier, candidate for leader of the Conservative Party of Canada, stated that he shifted his position on Bill C-16 after meeting with Peterson and discussing it.[69] Peterson’s analysis of the bill was also frequently cited by senators who were opposed to its passage.[70]

In April 2017, Peterson was denied a Social Sciences and Humanities Research Council grant for the first time in his career, which he interpreted as retaliation for his statements regarding Bill C-16.[71] A media relations adviser for SSHRC said “[c]ommittees assess only the information contained in the application”.[72] In response, The Rebel Media launched an Indiegogo campaign on Peterson’s behalf.[73] The campaign raised $195,000 by its end on May 6, equivalent to over two years of research funding.[74]

In May 2017, Peterson spoke against Bill C-16 at a Senate committee on legal and constitutional affairs hearing. He was one of 24 witnesses who were invited to speak on the bill.[70]

In August 2017, an announced event at Ryerson University titled “The Stifling of Free Speech on University Campuses”, organized by former social worker Sarina Singh with panelists Peterson, Gad Saad, Oren Amitay, and Faith Goldy was shut down because of pressure on the university administration from the group “No Fascists in Our City”.[75] However, another version of the panel (without Goldy) was held on November 11 at Canada Christian College with an audience of 1,500.[76][77]

In November 2017 a teaching assistant (TA) at Wilfrid Laurier University (WLU) was censured by her professors and WLU’s Manager of Gendered Violence Prevention and Support for showing a segment of The Agenda, which featured Peterson debating Bill C-16, during a classroom discussion.[78][79][80] The reasons given for the censure included the clip creating a “toxic climate” and being itself in violation of Bill C-16.[81] The case was criticized by several newspaper editorial boards[82][83][84] and national newspaper columnists[85][86][87][88] as an example of the suppression of free speech on university campuses. WLU announced a third-party investigation.[89] After the release of the audio recording of the meeting in which the TA was censured,[90] WLU President Deborah MacLatchy and the TA’s supervising professor Nathan Rambukkana published letters of formal apology.[91][92][93] According to the investigation no students had complained about the lesson, there was no informal concern related to Laurier policy, and according to MacLatchy the meeting “never should have happened at all”.[94][95]

Personal life

Peterson married Tammy Roberts in 1989.[13] They have one daughter and one son.[10][13] He became a grandfather in August 2017.[96]

Politically, Peterson has described himself as a classic British liberal.[97][15] He is a philosophical pragmatist.[40] In a 2017 interview, Peterson identified as a Christian,[98] but in 2018 he did not.[99] He emphasized his conceptualization of Christianity is probably not what it is generally understood, stating that the ethical responsibility of a Christian is to imitate Christ, for him meaning “something like you need to take responsibility for the evil in the world as if you were responsible for it … to understand that you determine the direction of the world, whether it’s toward heaven or hell”.[99] When asked if he believes in God, Peterson responded: “I think the proper response to that is No, but I’m afraid He might exist”.[7] Writing for The SpectatorTim Lott said Peterson draws inspiration from Jung’s philosophy of religion, and holds views similar to the Christian existentialism of Søren Kierkegaard and Paul Tillich. Lott also said Peterson has respect for Taoism, as it views nature as a struggle between order and chaos, and posits that life would be meaningless without this duality.[15]

Bibliography

Books

Journal articles

Top 15 most cited academic papers from Google Scholar and ResearchGate:

References

https://en.wikipedia.org/wiki/Jordan_Peterson

Read Full Post | Make a Comment ( None so far )

Paul Ekman — Telling Lies: Clues To Deceit in the Marketplace, Politics and Marriage –Pamela Meyer — Lie Spotting — Stan B. Walters — The Truth About Lying: How to Spot a Lie and Protect Yourself from Deception –From Lie Spotting To Truth Seeking — Big Lie Media and Lying Lunatic Left Losers — Videos

Posted on January 6, 2018. Filed under: American History, Blogroll, Books, Business, College, Communications, Congress, conservatives, Corruption, Crisis, Culture, Education, Elections, Employment, Family, Foreign Policy, Freedom, government, government spending, Heroes, history, Journalism, Language, Law, liberty, Life, Links, Literacy, Love, Mastery, Money, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Police, Politics, Radio, Raves, Raymond Thomas Pronk, Resources, Taxation, Taxes, Technology, Unemployment, Video, War, Wealth, Writing | Tags: , , , , , , , , , , , , , , , , , , , , |

See the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source image

Paul Ekman — Telling Lies: Clues To Deceit in the Marketplace, Politics and Marriage — Pamela Meyer — Lie Spotting — Stan B. Walters — The Truth About Lying: How to Spot a Lie and Protect Yourself from Deception –From Lie Spotting To Truth Seeking — Big Lie Media and Lying Lunatic Left Losers — Videos

lying

How to Catch a Liar (Assuming We Want To)

Dr. Paul Ekman on Expression and Gesture and Their Role in Emotion and Deception – Part 1

Dr. Paul Ekman on Expression and Gesture and Their Role in Emotion and Deception – Part 2

Image result for the science of reading faces by paul erkman

Face to Face: The Science of Reading Faces – Part 1

Face to Face: The Science of Reading Faces – Part 2

Face to Face: The Science of Reading Faces – Part 3

Little Known Facts About Lying – Facts About Lying

How to spot a liar | Pamela Meyer

Detecting Deception and a New Path to Trust: Pam Meyer at TEDxMidwest

Pamela Meyer: Liespotting: Proven Techniques to Detect Deception

4 Signs Someone Is Lying To You

Hillary’s Duper’s Delight

How to tell if someone is lying. Stan B. Walters – The Lie Guy® TV Reel Part 1

How to tell if someone is lying. Stan B. Walters “The Lie Guy® TV Reel Part 2

Stan Walters – Examining the 3rd Degree

Interviewing and Interrogation Training: Loss Prevention & Risk Mgmt

Interviewing and Interrogation Techniques & Training | Bizarre Class on Signs of Deception

Former CIA Officer Will Teach You How to Spot a Lie l Digiday

The Science of Lying

Comic Relief “John Lovitz” Stand Up Comedy

Jon Lovitz Appears as the Pathological Liar on Johnny Carson’s Tonight Show

Jon Lovitz on Seinfeld

President Trump says Michael Wolff’s ‘Fire and Fury’ is ‘full of lies’

‘Fire And Fury’ Author Michael Wolff: ‘I Absolutely’ Spoke To President Donald Trump | TODAY

Michael Wolff: ‘Everyone in the liberal media is a Trump enemy’ – BBC Newsnight

Michael Wolff: Donald Trump Most Extraordinary Story Of Our Time | Power Lunch | CNBC

Published on Nov 21, 2016

Michael Wolff, The Man Who Owns The News: Inside the Secret World Of Rupert Murdoch author, discusses his interview with Trump’s campaign CEO, Steve Bannon. Wolff also discusses the problem of fake news.

Who is Michael Wolff?

Michael Wolff’s Trump tell-all ‘full of lies’: David Bossie

Learn to Love TRUMP in 12 Minutes or Less

Trump Inauguration Speech (FULL) | ABC News

Best of Trump – Speech to Congress

FULL RAW: President Trump delivering a speech at the United Nations

#DeepState #Swamp #MSM Push #Bannon #Treason to Ignore #FBI Investigating #ClintonFoundation #Crimes

The Ingraham Angle 1/5/18 With Laura Ingraham – The Ingraham Angle Fox News January 5, 2018

Trump Vs The Smart Set – Trump Outsmarts Them All – Ingraham Angle

Trump Vs The Elites – Trump Outsmarts Them All – Newt Gingrich – Ingraham Angle

Clinton Foundation, Hillary emails now under investigation

The Hill: FBI Launches New Clinton Foundation Investigation – Hannity

Congress Exposes TROUBLING New IRREGULARITIES In The Clinton Email Probe

DOJ reportedly reopens Hillary Clinton email investigation

YES!! Hillary clinton MAY NOT SLEEP WELL Tonight Because of this!

DOJ can’t ignore Clinton’s criminal enterprise: Chris Farrell

Sessions has to retire as a public servant: Dobbs

FBI INVESTIGATING CLINTON FOUNDATION PAY FOR PLAY DONATIONS | JANUARY 5TH, 2018

 

Paul Ekman

From Wikipedia, the free encyclopedia
Paul Ekman
Paulekman bio.jpg
Born February 15, 1934 (age 83)
Washington, D.C.
Residence United States
Known for MicroexpressionsLie to Me
Spouse(s) Mary Ann Mason, J.D., Ph.D.
Awards Named by the American Psychological Association as one of the most influential psychologists of the 20th century based on publications, citations and awards (2001)
Honorary Degree, University of Fernando Pessoa, Portugal (2007)
Honorary Doctor of Humane Letters, Adelphi University (2008)
Honorary Degree, University of Geneva, Switzerland (2008)
Named of the 100 Most Influential People in the World by Time Magazine (2009)
Honorary Degree, Lund University, Sweden (2011)
Scientific career
Fields Psychology
Anthropology
Doctoral advisor John Amsden Starkweather
Influences Charles DarwinSilvan Tomkins

Paul Ekman (born February 15, 1934) is an American psychologist and professor emeritus at the University of California, San Francisco who is a pioneer in the study of emotions and their relation to facial expressions. He has created an “atlas of emotions” with more than ten thousand facial expressions, and has gained a reputation as “the best human lie detector in the world”.[1]

He was ranked 59th out of the 100 most cited psychologists of the twentieth century.[2] Ekman conducted seminal research on the specific biological correlations of specific emotions, demonstrating the universality and discreteness of emotions in a Darwinian approach.[3][4]

Biography

External video
 Conversations with History: Paul Ekman on YouTubeUniversity of California Television, 58:00, April 2008

Childhood

Paul Ekman was born to Jewish parents[5] in 1934 in Washington, D.C., and grew up in New JerseyWashingtonOregon, and California. His father was a pediatrician and his mother was an attorney. His sister, Joyce Steingart, is a psychoanalytic psychologist who before her retirement practiced in New York City.[6]

Ekman originally wanted to be a psychotherapist, but when he was drafted into the army in 1958 he found that research could change army routines, making them more humane. This experience converted him from wanting to be a psychotherapist to wanting to be a researcher, in order to help as many people as possible.[7]

Education

At the age of 15, without graduating from high school, Paul Ekman enrolled at the University of Chicago where he completed three years of undergraduate study. During his time in Chicago he was fascinated by group therapysessions and understanding group dynamics. Notably, his classmates at Chicago included writer Susan Sontag, film director Mike Nichols, and actress Elaine May.[8]

He then studied two years at New York University (NYU), earning his BA in 1954.[4] The subject of his first research project, under the direction of his NYU professor, Margaret Tresselt, was an attempt to develop a test of how people would respond to group therapy.[9]

Next, Ekman was accepted into the Adelphi University graduate program for clinical psychology.[9] While working for his master’s degree, Ekman was awarded a predoctoral research fellowship from the National Institute of Mental Health (NIMH) in 1955.[9] His Master’s thesis was focused on facial expression and body movement he had begun to study in 1954.[9] Ekman eventually went on to receive his Ph.D. in clinical psychology at Adelphi University in 1958, after a one-year internship at the Langley Porter Neuropsychiatric Institute.[9][10]

Military service

Ekman was drafted into the U.S. Army in 1958 to serve 2 years as soon as his internship at Langley Porter was finished.[9] He served as first lieutenant-chief psychologist, at Fort Dix, New Jersey, where he did research on army stockades and psychological changes during infantry basic training.[9][11][12][13]

Career

Upon completion of military service in 1960, he accepted a position as a research associate with Leonard Krasner at the Palo Alto Veterans Administration Hospital, working on a grant focused on the operant conditioning of verbal behavior in psychiatric patients. Ekman also met anthropologist Gregory Bateson in 1960 who was on the staff of the Palo Alto Veterans Administration Hospital. Five years later, Gregory Bateson gave Paul Ekman motion picture films taken in Bali in the mid-1930s to help Ekman with cross-cultural studies of expression and gesture.[9]

From 1960 to 1963, Ekman was supported by a post doctoral fellowship from NIMH. He submitted his first research grant through San Francisco State College with himself as the principal investigator (PI) at the young age of 29.[14] He received this grant from the National Institute of Mental Health (NIMH) in 1963 to study nonverbal behaviour. This award would be continuously renewed for the next 40 years and would pay his salary until he was offered a professorship at the University of California, San Francisco (UCSF) in 1972.

Encouraged by his college friend and teacher Silvan S. Tomkins, Ekman shifted his focus from body movement to facial expressions. He wrote his most famous book, Telling Lies, and published it in 1985. The 4th edition is still in print. He retired in 2004 as professor of psychology in the Department of Psychiatry at the University of California, San Francisco (UCSF). From 1960 to 2004 he also worked at the Langley Porter Psychiatric Institute on a limited basis consulting on various clinical cases.

After retiring from the University of California, San Francisco, Paul Ekman founded the Paul Ekman Group (PEG) and Paul Ekman International.[15] The Paul Ekman Group, “develops and offers online emotional skills-building programs such as the Micro Expression Training Tool, offers workshops, supports researchers in our field, and builds online community around these topics.” They do not take individual cases.[16] Also, PEG offers a micro expression and subtle expression training tool for sale on their website.[17]

Media

In 2001, Ekman collaborated with John Cleese for the BBC documentary series The Human Face.[18]

His work is frequently referred to in the TV series Lie to Me.[19] Dr. Lightman is based on Paul Ekman, and Ekman served as a scientific adviser for the series; he read and edited the scripts and sent video clip-notes of facial expressions for the actors to imitate. While Ekman has written 15 books, the series Lie to Me has more effectively brought Ekman’s research into people’s homes.[19] Lie to Me has aired in more than 60 countries.[20]

He has also collaborated with Pixar‘s film director and animator Pete Docter in preparation of his 2015 film Inside Out.[21] Ekman also wrote a parent’s guide to using Inside Out to help parents talk with their children about emotion, which can be found on his personal website http://www.paulekman.com.

Influence

He was named one of the top Time 100 most influential people in the May 11, 2009 edition of Time magazine.[22] He was also ranked fifteenth among the most influential psychologists of the 21st century in 2014 by the journal Archives of Scientific Psychology.[23] He is currently on the Editorial Board of Greater Good magazine, published by the Greater Good Science Center of the University of California, Berkeley. His contributions include the interpretation of scientific research into the roots of compassion, altruism, and peaceful human relationships.[24]

Research work

Measuring nonverbal communication

Ekman’s interest in nonverbal communication led to his first publication in 1957, describing how difficult it was to develop ways of empirically measuring nonverbal behaviour.[25] He chose the Langley Porter Neuropsychiatric Institute, the psychiatry department of the University of California Medical School, for his clinical internship partly because Jurgen Ruesch and Weldon Kees had recently published a book called Nonverbal Communication (1956).[9][26][27]

Ekman then focused on developing techniques for measuring nonverbal communication. He found that facial muscular movements that created facial expressions could be reliably identified through empirical research. He also found that human beings are capable of making over 10,000 facial expressions; only 3,000 relevant to emotion.[28] Psychologist Silvan Tomkins convinced Ekman to extend his studies of nonverbal communication from body movement to the face, helping him design his classic cross-cultural emotion recognition studies.[29] Interestingly enough, Tomkins also supervised Carroll Izard at the same time, fostering a similar interest in emotion through cross-cultural research.

Emotions as universal categories

In The Expression of the Emotions in Man and Animals published in 1872, Charles Darwin theorized that emotions were evolved traits universal to the human species. However, the prevalent belief during the 1950s, particularly among anthropologists, was that facial expressions and their meanings were determined through behavioural learning processes. A prominent advocate of the latter perspective was the anthropologist Margaret Mead who had travelled to different countries examining how cultures communicated using nonverbal behaviour.

Through a series of studies, Ekman found a high agreement across members of diverse Western and Eastern literate cultures on selecting emotional labels that fit facial expressions. Expressions he found to be universal included those indicating wrath, grossness, scaredness, joy, loneliness, and shock. Findings on contempt were less clear, though there is at least some preliminary evidence that this emotion and its expression are universally recognized.[30] Working with his long-time friend Wallace V. Friesen, Ekman demonstrated that the findings extended to preliterate Fore tribesmen in Papua New Guinea, whose members could not have learned the meaning of expressions from exposure to media depictions of emotion.[31] Ekman and Friesen then demonstrated that certain emotions were exhibited with very specific display rules, culture-specific prescriptions about who can show which emotions to whom and when. These display rules could explain how cultural differences may conceal the universal effect of expression.[32]

In the 1990s, Ekman proposed an expanded list of basic emotions, including a range of positive and negative emotions that are not all encoded in facial muscles.[33] The newly included emotions are: AmusementContemptContentmentEmbarrassmentExcitementGuiltPride in achievementReliefSatisfactionSensory pleasure, and Shame.[33]

Visual depictions of facial actions for studying emotion

Ekman’s famous test of emotion recognition was the Pictures of Facial Affect (POFA) stimulus set published in 1976. Consisting of 110 black and white images of Caucasian actors portraying the six universal emotions plus neutral expressions, the POFA has been used to study emotion recognition rates in normal and psychiatric populations around the world. Ekman used these stimuli in his original cross-cultural research. Many researchers favor the POFA because these photographs have been rated by large normative groups in different cultures. In response to critics, however, Ekman eventually released a more culturally diverse set of stimuli called the Japanese and Caucasian Facial Expressions of Emotion (JACFEE).[34]

By 1978, Ekman and Friesen had finalized and developed the Facial Action Coding System (FACS)[35] to taxonomize every human facial expression. FACS is an anatomically based system for describing all observable facial movement for every emotion. Each observable component of facial movement is called an action unit or AU and all facial expressions can be decomposed into their constituent core AUs.[36] An update of this tool came in the early 2000s.

Other tools have been developed, including the MicroExpressions Training Tool (METT), which can help individuals identify more subtle emotional expressions that occur when people try to suppress their emotions. Application of this tool includes helping people with Asperger’s or autism to recognize emotional expressions in their everyday interactions. The Subtle Expression Training Tool (SETT) teaches recognition of very small, micro signs of emotion. These are very tiny expressions, sometimes registering in only part of the face, or when the expression is shown across the entire face, but is very small. Subtle expressions occur for many reasons, for example, the emotion experienced may be very slight or the emotion may be just beginning. METT and SETT have been shown to increase accuracy in evaluating truthfulness.

Detecting deception

Ekman has contributed to the study of social aspects of lying, why we lie,[37] and why we are often unconcerned with detecting lies.[38] He first became interested in detecting lies while completing his clinical work. As detailed in Ekman’s Telling Lies, a patient he was involved in treating denied that she was suicidal in order to leave the hospital. Ekman began to review videotaped interviews to study people’s facial expressions while lying. In a research project along with Maureen O’Sullivan, called the Wizards Project (previously named the Diogenes Project), Ekman reported on facial “microexpressions” which could be used to assist in lie detection. After testing a total of 20,000 people[39] from all walks of life, he found only 50 people who had the ability to spot deception without any formal training. These naturals are also known as “Truth Wizards”, or wizards of deception detection from demeanor.[40]

In his profession, he also uses oral signs of lying. When interviewed about the Monica Lewinsky scandal, he mentioned that he could detect that former President Bill Clinton was lying because he used distancing language.[41]

Contributions to the world’s understanding of emotion

In his 1993 seminal paper in the psychology journal American Psychologist, Ekman describes nine direct contributions that his research on facial expression has made to the understanding of emotion.[42] Highlights include:

  • Consideration of both nature and nurture: Emotion is now viewed as a physiological phenomenon influenced by our cultural and learning experiences.
  • Emotion-specific physiology: Ekman led the way by trying to find discrete psychophysiological differences across emotions. A number of researchers continue to search for emotion-specific autonomic and central nervous system activations. With the advent of neuroimaging techniques, a topic of intense interest revolves around how specific emotions relate to physiological activations in certain brain areas. Ekman laid the groundwork for the future field of affective neuroscience.
  • An examination of events that precede emotions: Ekman’s finding that voluntarily making one of the universal facial expressions can generate the physiology and some of the subjective experience of emotion provided some difficulty for some of the earlier theoretical conceptualizations of experiencing emotions.
  • Considering emotions as families: Ekman & Friesen (1978) found not one expression for each emotion, but a variety of related but visually different expressions. For example, the authors reported 60 variations of the anger expression which share core configurational properties and distinguish themselves clearly from the families of fearful expressions, disgust expressions, and so on. Variations within a family likely reflect the intensity of the emotion, how the emotion is controlled, whether it is simulated or spontaneous, and the specifics of the event that provoked the emotion.

Criticisms

Most credibility-assessment researchers agree that people are unable to visually detect lies.[43] The application of part of Ekman’s work to airport security via the Transportation Security Administration‘s “Screening Passengers by Observation Techniques” (SPOT) program has been criticized for not having been put through controlled scientific tests.[43] A 2007 report on SPOT stated that “simply put, people (including professional lie-catchers with extensive experience of assessing veracity) would achieve similar hit rates if they flipped a coin”.[44] Since controlled scientific tests typically involve people playing the part of terrorists, Ekman says those people are unlikely to have the same emotions as actual terrorists.[43] The methodology used by Ekman and O’Sullivan in their recent work on Truth wizards has also received criticism on the basis of validation.[45]

Other criticisms of Ekman’s work are based on experimental and naturalistic studies by several other emotion psychologists that did not find evidence in support of Ekman’s proposed taxonomy of discrete emotions and discrete facial expression.[46]

Ekman received hostility from some anthropologists at meetings of the American Psychological Association and the American Anthropological Association from 1967 to 1969. He recounted that, as he was reporting his findings on universality of expression, one anthropologist tried to stop him from finishing by shouting that his ideas were fascist. He compares this to another incident when he was accused of being racist by an activist for claiming that Black expressions are not different from White expressions. In 1975, Margaret Mead, an anthropologist, wrote against Ekman for doing “improper anthropology”, and for disagreeing with Ray Birdwhistell‘s claim opposing universality. Ekman wrote that, while many people agreed with Birdwhistell then, most came to accept his own findings over the next decade.[14] However, some anthropologists continued to suggest that emotions are not universal.[47] Ekman argued that there has been no quantitative data to support the claim that emotions are culture specific. In his 1993 discussion of the topic, Ekman states that there is no instance in which 70% or more of one cultural group select one of the six universal emotions while another culture group labels the same expression as another universal emotion.[42]

Ekman criticized the tendency of psychologists to base their conclusions on surveys of college students. Hank Campbell quotes Ekman saying at the Being Human conference, “We basically have a science of undergraduates.”[48]

The pioneer F-M Facial Action Coding System 2.0 (F-M FACS 2.0) [49] was created in 2017 by Dr. Freitas-Magalhães, and presents 2,000 segments in 4K, using 3D technology and automatic and real-time recognition.

Publications

  • Nonverbal messages: Cracking the Code ISBN 978-0-9915636-3-0
  • Emotional Awareness: Overcoming the Obstacles to Psychological Balance and Compassion (Times Books, 2008) ISBN 0-8050-8712-5
  • Unmasking the Face ISBN 1-883536-36-7
  • Emotions Revealed: Recognizing Faces and Feelings to Improve Communication and Emotional Life (Times Books, 2003) ISBN 0-8050-7516-X
  • Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage (W. W. Norton & Company, 1985) ISBN 0-393-32188-6
  • What the Face Reveals (with Rosenberg, E. L., Oxford University Press, 1998) ISBN 0-19-510446-3
  • The Nature of Emotion: Fundamental Questions (with R. Davidson, Oxford University Press, 1994) ISBN 0-19-508944-8
  • Darwin and Facial Expression: A Century of Research in Review ISBN 0-12-236750-2
  • Facial Action Coding System/Investigator’s ISBN 99936-26-61-9
  • Why Kids Lie: How Parents Can Encourage Truthfulness (Penguin, 1991) ISBN 0-14-014322-X
  • Handbook of Methods in Nonverbal Behavior Research ISBN 0-521-28072-9
  • Face of Man ISBN 0-8240-7130-1
  • Emotion in the Human Face ISBN 0-08-016643-1
  • Handbook of Cognition and Emotion (Sussex, UK John Wiley & Sons, Ltd., 1999)

See also

References

https://en.wikipedia.org/wiki/Paul_Ekman

FBI launches new Clinton Foundation investigation

 The Justice Department has launched a new inquiry into whether the Clinton Foundation engaged in any pay-to-play politics or other illegal activities while Hillary Clinton served as secretary of State, law enforcement officials and a witness tells The Hill.

FBI agents from Little Rock, Ark., where the foundation was started, have taken the lead in the investigation and have interviewed at least one witness in the last month, and law enforcement officials said additional activities are expected in the coming weeks.

The officials, who spoke only on condition of anonymity, said the probe is examining whether the Clintons promised or performed any policy favors in return for largesse to their charitable efforts or whether donors made commitments of donations in hopes of securing government outcomes.

The probe may also examine whether any tax-exempt assets were converted for personal or political use and whether the foundation complied with applicable tax laws, the officials said.One witness recently interviewed by the FBI described the session to The Hill as “extremely professional and unquestionably thorough” and focused on questions about whether donors to Clinton charitable efforts received any favorable treatment from the Obama administration on a policy decision previously highlighted in media reports.

The witness discussed his interview solely on the grounds of anonymity. He said the agents were from Little Rock and their questions focused on government decisions and discussions of donations to Clinton entities during the time Hillary Clinton led President Obama’s State Department.

The FBI office in Little Rock referred a reporter Thursday to Washington headquarters, where officials declined any official comment.

Clinton’s chief spokesman, Nick Merrill, on Friday morning excoriated the FBI for re-opening the case, calling the probe “disgraceful” and suggesting it was nothing more than a political distraction from President Trump‘s Russia controversies.

“Let’s call this what it is: a sham,” Merrill said. “This is a philanthropy that does life-changing work, which Republicans have tried to turn into a political football. It began with a now long-debunked project spearheaded by Steve Bannon during the presidential campaign. It continues with Jeff Sessions doing Trump’s bidding by heeding his calls to meddle with a department that is supposed to function independently.”

Foundation spokesman Craig Minassian took a more muted response, saying the new probe wouldn’t distract the charity from its daily work.
“Time after time, the Clinton Foundation has been subjected to politically motivated allegations, and time after time these allegations have been proven false. None of this has made us waver in our mission to help people,” Minassian said. “The Clinton Foundation has demonstrably improved the lives of millions of people across America and around the world while earning top ratings from charity watchdog groups in the process.”

The Wall Street Journal reported late last year that several FBI field offices, including the one in Little Rock, had been collecting information on the Clinton Foundation for more than a year. The report also said there had been pushback to the FBI from the Justice Department.

A renewed law enforcement focus follows a promise to Congress late last year from top Trump Justice Department officials that law enforcement would revisit some of the investigations and legal issues closed during the Obama years that conservatives felt were given short shrift. It also follows months of relentless criticism on Twitter from President Trump, who has repeatedly questioned why no criminal charges were ever filed against the “crooked” Clintons and their fundraising machine.

For years, news media from The New York Times to The Daily Caller have reported countless stories on donations to the Clinton Foundation or speech fees that closely fell around the time of favorable decisions by Clinton’s State Department. Conservative author Peter Schweizer chronicled the most famous of episodes in his book “Clinton Cash” that gave ammunition to conservatives, including Trump, to beat the drum for a renewed investigation.

Several GOP members of Congress have recently urged Attorney General Jeff Sessions to appoint a special counsel to look at the myriad issues surrounding the Clintons. Justice officials sent a letter to Congress in November suggesting some of those issues were being re-examined, but Sessions later testified the appointment of a special prosecutor required a high legal bar that had not yet been met.

His decision was roundly criticized by Republicans, and recent revelations that his statement was watered down by edits and that he made the decision before all witness interviews were finished have led to renewed criticism.

A senior law enforcement official said the Justice Department was exploring whether any issues from that probe should be re-opened but cautioned the effort was not at the stage of a full investigation.

One challenge for any Clinton-era investigation is that the statute of limitations on most federal felonies is five years, and Clinton left office in early 2013.

http://thehill.com/homenews/campaign/367541-fbi-launches-new-clinton-foundation-investigation

Read Full Post | Make a Comment ( None so far )

Remembering The Attack on Pearl Harbor on December 7, 1941 — Vidoes

Posted on December 7, 2017. Filed under: American History, College, Communications, Documentary, Education, Employment, Family, Foreign Policy, government spending, Heroes, history, Law, liberty, Life, Links, Literacy, media, Money, Newspapers, People, Photos, Politics, Radio, Rants, Raves, Spying, Success, Talk Radio, Technology, Terrorism, Video, War, Water, Wealth, Weapons, Weather, Wisdom, World War II, Writing | Tags: , , , , , , , , , |

See the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source image

See the source image
See the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source image

See the source imageSee the source image

See the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source image

Remembering Pearl Harbor

Published on Dec 7, 2017

December 7, 2017, marks the 76th Anniversary of the surprise attack at Pearl Harbor. Let us honor and remember our two last survivors, all of our U.S. Military and Civilians killed and injured in this attack.

Pearl Harbor: Admiral Chester Nimitz

Tora, Tora, Tora The True Story of Pearl Harbor Documentary

The Attack on Pearl Harbor || Full Documentary with subtitles

Lost Tapes: Pearl Harbor (Full Episode)

How Pearl Harbor Was Attacked. The True Story

Rarely seen Pearl Harbor memorials

American Artifacts: USS Utah Memorial at Pearl Harbor

Pearl Harbor: “Bombing of Pearl Harbor” 1942 Castle News Parade; World War II

Japanese Navy Enters Pearl Harbor Flying The Rising Sun

Gung Ho Vids

Published on Jul 4, 2014

Footage of three ships and one submarine of the Japan Maritime Self-Defense Force (formerly the Imperial Japanese Navy) as they enter Pearl Harbor flying the Japanese “Rising Sun” flag, the Naval ensign. The Imperial Japanese Navy was dissolved in 1945 with the unconditional surrender of Japan at the end of World War II. Since WWII, Japan’s Rising Sun flag has been criticized for its association with the country’s aggressive militaristic past.

The Attack On Pearl Harbor – December 7, 1941

CVL23USSPRINCETON

Published on Dec 5, 2011

The attack on Pearl Harbor (called Hawaii Operation or Operation AI by the Japanese Imperial General Headquarters (Operation Z in planning) and the Battle of Pearl Harbor) was a surprise military strike conducted by the Imperial Japanese Navy against the United States naval base at Pearl Harbor, Hawaii, on the morning of December 7, 1941 (December 8 in Japan). The attack was intended as a preventive action in order to keep the U.S. Pacific Fleet from interfering with military actions the Empire of Japan was planning in Southeast Asia against overseas territories of the United Kingdom, the Netherlands, and the United States. The base was attacked by 353 Japanese fighters, bombers and torpedo planes in two waves, launched from six aircraft carriers. All eight U.S. Navy battleships were damaged, with four being sunk. All but two of the eight were raised, repaired and returned to service later in the war. The Japanese also sank or damaged three cruisers, three destroyers, an anti-aircraft training ship, and one minelayer. One hundred eighty-eight U.S. aircraft were destroyed; 2,402 Americans were killed[12] and 1,282 wounded. The power station, shipyard, maintenance, and fuel and torpedo storage facilities, as well as the submarine piers and headquarters building (also home of the intelligence section) were not attacked. Japanese losses were light: 29 aircraft and five midget submarines lost, and 65 servicemen killed or wounded. One Japanese sailor was captured. The attack came as a profound shock to the American people and led directly to the American entry into World War II in both the Pacific and European theaters. The following day (December 8) the United States declared war on Japan. Domestic support for isolationism, which had been strong, disappeared. Clandestine support of Britain (for example the Neutrality Patrol) was replaced by active alliance. Subsequent operations by the U.S. prompted Germany and Italy to declare war on the U.S. on December 11, which was reciprocated by the U.S. the same day. There were numerous historical precedents for unannounced military action by Japan. However, the lack of any formal warning, particularly while negotiations were still apparently ongoing, led President Franklin D. Roosevelt to proclaim December 7, 1941, “a date which will live in infamy”.

Military Documentary Films Untold Secrets of Pearl Harbor What They Didn’t Tell the World

Pearl harbour 2001 attack scene part 1/5

Pearl harbour 2001 attack scene part 2/5

Pearl harbour 2001 attack scene part 3/5

Pearl harbour 2001 attack scene part 4/5

Pearl harbour 2001 attack scene part 5/5

Favourite scene in Pearl Harbor (2001)

The best part of the movie “Pearl Harbor”

Japan Surrenders (1945)

The Day Japan Lost Face (1945)

Japanese Surrender in HD Color 1945

Japanese Surrender

The Day Japan Surrendered, Ending WWII | NBC News

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show — Week in Review — November 6 -13, 2017 — Videos

Posted on November 15, 2017. Filed under: American History, Articles, Banking, Blogroll, Books, Business, College, Communications, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Culture, Economics, Education, Employment, Faith, Family, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, government, government spending, Heroes, history, Law, liberty, Life, Links, Macroeconomics, Missiles, Monetary Policy, Money, Music, Non-Fiction, Nuclear, People, Philosophy, Photos, Police, Political Correctness, Politics, Psychology, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Security, Strategy, Talk Radio, Tax Policy, Taxation, Trade Policiy, Unemployment, Video, War, Weapons, Welfare, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1000, November 13, 2017

Pronk Pops Show 999, November 10, 2017

Pronk Pops Show 998, November 9, 2017

Pronk Pops Show 997, November 8, 2017

Pronk Pops Show 996, November 6, 2017

Pronk Pops Show 995, November 3, 2017

Pronk Pops Show 994, November 2, 2017

Pronk Pops Show 993, November 1, 2017

Pronk Pops Show 992, October 31, 2017

Pronk Pops Show 991, October 30, 2017

Pronk Pops Show 990, October 26, 2017

Pronk Pops Show 989, October 25, 2017

Pronk Pops Show 988, October 20, 2017

Pronk Pops Show 987, October 19, 2017

Pronk Pops Show 986, October 18, 2017

Pronk Pops Show 985, October 17, 2017

Pronk Pops Show 984, October 16, 2017 

Pronk Pops Show 983, October 13, 2017

Pronk Pops Show 982, October 12, 2017

Pronk Pops Show 981, October 11, 2017

Pronk Pops Show 980, October 10, 2017

Pronk Pops Show 979, October 9, 2017

Pronk Pops Show 978, October 5, 2017

Pronk Pops Show 977, October 4, 2017

Pronk Pops Show 976, October 2, 2017

Pronk Pops Show 975, September 29, 2017

Pronk Pops Show 974, September 28, 2017

Pronk Pops Show 973, September 27, 2017

Pronk Pops Show 972, September 26, 2017

Pronk Pops Show 971, September 25, 2017

Pronk Pops Show 970, September 22, 2017

Pronk Pops Show 969, September 21, 2017

Pronk Pops Show 968, September 20, 2017

Pronk Pops Show 967, September 19, 2017

Pronk Pops Show 966, September 18, 2017

Pronk Pops Show 965, September 15, 2017

Pronk Pops Show 964, September 14, 2017

Pronk Pops Show 963, September 13, 2017

Pronk Pops Show 962, September 12, 2017

Pronk Pops Show 961, September 11, 2017

Pronk Pops Show 960, September 8, 2017

Pronk Pops Show 959, September 7, 2017

Pronk Pops Show 958, September 6, 2017

Pronk Pops Show 957, September 5, 2017

Pronk Pops Show 956, August 31, 2017

Pronk Pops Show 955, August 30, 2017

Pronk Pops Show 954, August 29, 2017

Pronk Pops Show 953, August 28, 2017

Pronk Pops Show 952, August 25, 2017

Pronk Pops Show 951, August 24, 2017

Pronk Pops Show 950, August 23, 2017

Pronk Pops Show 949, August 22, 2017

Pronk Pops Show 948, August 21, 2017

Pronk Pops Show 947, August 16, 2017

Pronk Pops Show 946, August 15, 2017

Pronk Pops Show 945, August 14, 2017

Pronk Pops Show 944, August 10, 2017

Pronk Pops Show 943, August 9, 2017

Pronk Pops Show 942, August 8, 2017

Pronk Pops Show 941, August 7, 2017

Pronk Pops Show 940, August 3, 2017

Image result for trump speech in vietnam APEC 2017U.S. President Donald Trump delivers a speech at the National Assembly in Seoul, South Korea, Nov. 8, 2017.

Image result for cartoons two party tyranny

Image result for branco cartoons new political party
Image result for branco cartoons roy moore and mitchel mcconnell

The Pronk Pops Show 1000

November 13, 2017

Story 1: The People of Alabama Will Decide Who Will Represent Them As Their Senator — Not Kentucky Senator Mitch McConnell — Videos —

Story 2: Follow The Money — The Bought and Paid For Political Elitist Establishment of The Two Party Tyranny — Video —

Story 3: Independents United — Independence Party Time — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/14/the-pronk-pops-show-1000-november-13-20017-story-1-the-people-of-alabama-will-decide-who-will-represent-them-in-the-senator-not-kentucky-senator-mitch-mcconnell-videos-story-2-follow-the/

November 14, 2017 07:24 PM PST

The Pronk Pops Show 999

November 10, 2017

Story 1: President Trump Delivers America First Address With Bilateral Trade Agreements With Nations That Want Free But Fair Trade At The Asia-Pacific Economic Cooperation (APEC) Summit in Da Nang, Vietnam — Videos —

Story 2: From Crying To Screaming — Big Lie Media Joins Lying Lunatic Left Losers —   Sky Screaming — Trump Still President — Videos —

Story 3: Let Voters of Alabama Decide Who They Want For Their Senator — Alabama Republican Senate Candidate, Roy Moore, Denies Accusations Made in Washington Post Attack Article  vs. Democratic Senate Candidate, Doug Jones, Supporter for Pro Abortion Planned Parenthood and Women Should Have The Right To Choose Killing Their Babies in The Womb — Denies Civil Rights Protection of Life To Babies Before Birth — Videos

Story 4: Remembering The Veterans in Music — Lili Marleen — We’ll Meet Again — Sky Pilot — We Gotta Get Out Of This Place — Paint it Black  – – War — Where Have All the Flowers Gone? — Blowing In The Wind –Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/10/the-pronk-pops-show-999-november-10-2017-story-1-president-trump-delivers-america-first-address-at-asia-pacific-economic-cooperation-apec-summit-in-da-nang-vietnam-videos-story-2-from-c/

November 11, 2017 02:07 PM PST

The Pronk Pops Show 998

November 9, 2017

Story 1: President Trump’s Address to South Korea’s National Assembly — Great Speech — Americans and Koreans Loved It — Every Breath You Take — Videos —

Story 2: President Trump Tells It Like It Is — Does Not Blame China For Hugh Trade Deficits But Past Administrations — Videos —

Story 3: Republican Party Senate Bill Wants To Delay Tax Cuts To 2019 Instead of Cutting Spending Now — Need New Political Party Advocating Balanced Budgets, Broad Based Consumption Tax,and Term Limits — Voters Will Stay Home Election Day, November 6, 2018 If Congress Does Not Completely Repeal Obamacare and Enact Fundamental Reform of Tax System — Videos —

Story 4: Alabama Republican Candidate for Senator, Roy Moore, Accused of Sexual Misconduct in 1979 — Desperate Democratic Dirt — Let The Voters of Alabama Decide — Accusations Are Not Evidence — Videos

For additional information and videos

https://pronkpops.wordpress.com/2017/11/09/the-pronk-pops-show-998-november-9-2017-story-1-president-trumps-address-to-south-koreas-national-assembly-great-speech-americans-and-koreans-loved-it-every-breath-you-take-videos/

November 08, 2017 08:32 PM PST

The Pronk Pops Show 997

November 8, 20017

Story 1: Communist Chinese Connection To Trade — Nuclear Proliferation — and — Terrorism (TNT) — Peace or War — China Must Destroy North Korea Nuclear Weapons and Missiles or Face The Consequences of Overthrow of Communist Party — U.S.Complete Embargo on All Chinese Trade and Investment —
Story 2: President Trump Meets With Japanese Prime Minster Shinzo Abe and President Moon Jai-in As U.S. Navy Flexes Air Power — All Options Are On The Table — Video —

Story 3: Saudi Arab On The Brink of War With Lebanon Controlled By Iran-backed Lebanese Shi‘ite group Hezbollah — Saudi Arab Blames Iran For Yemen Missile Attack — Purge and Roundup of Royal Prince Continues — Videos —

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/08/the-pronk-pops-show-997-november-7-2017-story-1-communist-chinese-connection-to-trade-nuclear-proliferation-and-terrorism-tnt-peace-or-war-china-must-destroy-north-korea-nuclear-w/

November 07, 2017 11:23 AM PST

The Pronk Pops Show 996

November 6, 2017

Story 1: Atheist Security Guard Dressed In Black and Wearing Body Armor, Devin Patrick Kelley, 26, Entered The First Baptist Church and Shoot and Killed 26, Including 8 Members of A Single Family with Pregnant Mother, Victim Range in Age From 18 Months to 77 Years and Wounded 20, in The Texas Small Town of Sutherland Springs, Population 400,  A Nearby Neighbor, Stephen Willeford, 55, Shot Killer With His Rifle,Three Times, Twice in The Neck and Once in The Side, Killer Died of Wounds, After Brief High Speed Car Chase — The Times They Are A Changin — Blowing In The Wind — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/07/the-pronk-pops-show-996-story-1-atheist-security-guard-dressed-in-black-and-wearing-body-armor-devin-patrick-kelley-26-entered-the-first-baptist-church-and-shoot-and-killed-26-including-8-member/

November 04, 2017 02:25 PM PDT

The Pronk Pops Show 995

November 3, 2017

Story 1: Democrats (Liberal, Progressive & Socialist Wing) and Republicans (Liberal & Progressive Wing) of The Two Party Tyranny Are All Marxist Now — Big Government Bubble Tax Surcharge of 6% Increases Rate From 39.6% to 45.6% — Class Warfare — Eat The Rich — Videos — Part 2 of 2 —

Story 2: Republican Tax Cut Will Not Make America Great Again — Missing Is Real Government Spending Cuts That Results in A Balanced Budget By 2020 or 2024 — Spending Addiction Disorder (SAD) or Government Spending Obesity — Alive and Well — Videos —

Story 3: A Broad Based Consumption Tax Replacing The Current U.S. Income Tax System Along The Lines of The FairTax or Fair Tax Less With Generous Monthly Tax Prebates and Limiting Federal Government Expenditures to 90% of Taxes Collected Will Make America Great Again — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/03/the-pronk-pops-show-995-november-3-2017-story-1-democrats-liberal-progressive-socialist-wing-and-republicans-liberal-progressive-wing-of-the-two-party-tyranny-are-all-marxist-now/

November 03, 2017 06:44 PM PDT

The Pronk Pops Show 994

November 2, 2017

Story 1: President Trump Nominates Fed Governor Jerome Powell To Chair Federal Reserve Board of Governors — Expect Continuation of Interventionist Easy Monetary Policy — More Money Creation or Quantitative Easing When Economy Enters Next Recession in 2018-2019 — Videos —

Part 1 of 2 — Story 2: No Tax Reform By Changing From Income Tax System to Broad Based Consumption Tax — The FairTax or Fair Tax Less — No Middle Class Tax Relief From Payroll Taxes — No Real Cuts in Federal Spending As Budget Deficits Rise with Rising National Debt and Unfunded Liabilities — Spending Addiction Disorder — Government Obesity — Crash Diet of Balanced Budgets Required — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/02/the-pronk-pops-show-994-part-1-of-2-story-1-president-trump-nominates-fed-governor-jerome-powell-to-chair-federal-reserve-board-of-governors-expect-continuation-of-interventionist-easy-monetar/

November 02, 2017 07:06 PM PDT

The Pronk Pops Show 993

November 1, 2017

Story 1: Update of Radical Islamic Terrorist Jihadist Attack in New York City — President Trump “Send Him To Gitmo” as Enemy Combatant and Get Rid of Chain Migration and Diversity Lottery Immigration Program and Replace With Merit Based System of Immigration — Videos — Breaking —

Story 2: Trump Expected To Name Jerome Powell As Next Federal Reserve Chairman Replacing Chair Janet Yellen — A Dove or Continuation of Interventionist Easy Monetary Policy — Better Choice Was John Taylor — Taylor For Fed Chair and Powell for Vice Chair — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/11/01/the-pronk-pops-show-993-november-2-2017-story-1-update-of-radical-islamic-terrorist-jihadist-attack-in-new-york-city-president-trump-send-him-to-gitmo-as-enemy-combatant-and-get-rid-of-chai/

Read Full Post | Make a Comment ( None so far )

What DVDs Should I Buy or Binge Watch Both Movies and Television Series — Videos

Posted on October 7, 2017. Filed under: American History, Art, Art, Blogroll, Book, Books, British History, Business, Comedy, Communications, Culture, Education, Entertainment, Environment, Essays, European History, Faith, Family, Fiction, Films, Freedom, Friends, Heroes, history, Investments, Middle East, Movies, Music, Non-Fiction, Plays, Strategy, Success, Television, Wealth, Weather, Welfare, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , |

Image result for list of top 100 television shows or seriesImage result for top ten televisions shows in u.s. of all timeImage result for top ten movies of all timeImage result for top ten movies of all time

Image result for top ten movies of all time

Image result for list of top 100 movies of all time

Image result for list of top 100 movies of all time

Image result for list of top 100 movies

15 Best TV Shows to Binge Watch 2017

9 Shows You Should Binge Watch

TV Shows You Should Binge – Right NOW!

Top 10 TV Shows To Binge Watch With Your BFFs

10 Netflix TV Series That Need Binge Watching

Top 10 Best TV Shows Of All Time

Best Shows to Binge Watch on Netflix Right Now

Another Top 10 TV Shows To Binge Watch

TOP 10 Must See Best TV Shows | Netflix Binge Watch Series 2017 HD

Top 10 Showtime Shows of All Time

Top 10 HBO Shows of All Time

Top 10 BBC Shows

Top 10 British Crime Shows

Top 10 American Crime Shows

Top 20 Movies Every Film Fan Must See – Collider Video

16 Action Films You Need To Watch Before You Die

Top 10 Greatest Teen Movies

Top 10 Movies that Exceeded Expectations

Top 10 Movie Sequels That Were Better Than The Original

MDb’s Top 10 Films of the 1910’s

WatchMojo March Madness: Greatest Movies of All Time Series

Top 10 Movies of the 1920s

Top 10 Movies of the 1930s

Top 10 Movies Of the 1940s

Top 10 Movies of the 1950s

Top 10 Movies of the 1960s

Top 10 Movies of the 1970s

Top 10 Movies of the 1980s

Top 10 Movies of the 1990s

Top 10 Movies Of The 2000s

Top 10 Movies of the 2010s So Far

Top 10 Superhero Movies of ALL TIME

Top 10 Movies of All Time

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show — Week in Review — September 1-9, 2017 — Videos

Posted on September 10, 2017. Filed under: American History, Blogroll, Books, Business, Climate, College, Communications, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Cult, Culture, Demographics, Education, Elections, Employment, Entertainment, Essays, Faith, Family, Fraud, Heroes, history, Homes, Law, liberty, Life, Links, Literacy, Love, Mastery, media, Money, Movies, Newspapers, Non-Fiction, Nuclear Proliferation, People, Philosophy, Photos, Plays, Police, Politics, Presidential Candidates, Press, Programming, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Television, Television, Video, War, Water, Wealth, Weapons of Mass Destruction, Weather, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 960, September 8, 2017

Pronk Pops Show 959, September 7, 2017

Pronk Pops Show 958, September 6, 2017

Pronk Pops Show 957, September 5, 2017

Pronk Pops Show 956, August 31, 2017

Pronk Pops Show 955, August 30, 2017

Pronk Pops Show 954, August 29, 2017

Pronk Pops Show 953, August 28, 2017

Pronk Pops Show 952, August 25, 2017

Pronk Pops Show 951, August 24, 2017

Pronk Pops Show 950, August 23, 2017

Pronk Pops Show 949, August 22, 2017

Pronk Pops Show 948, August 21, 2017

Pronk Pops Show 947, August 16, 2017

Pronk Pops Show 946, August 15, 2017

Pronk Pops Show 945, August 14, 2017

Pronk Pops Show 944, August 10, 2017

Pronk Pops Show 943, August 9, 2017

Pronk Pops Show 942, August 8, 2017

Pronk Pops Show 941, August 7, 2017

Pronk Pops Show 940, August 3, 2017

Pronk Pops Show 939,  August 2, 2017

Pronk Pops Show 938, August 1, 2017

Pronk Pops Show 937, July 31, 2017

Pronk Pops Show 936, July 27, 2017

Pronk Pops Show 935, July 26, 2017

Pronk Pops Show 934, July 25, 2017

Pronk Pops Show 934, July 25, 2017

Pronk Pops Show 933, July 24, 2017

Pronk Pops Show 932, July 20, 2017

Pronk Pops Show 931, July 19, 2017

Pronk Pops Show 930, July 18, 2017

Pronk Pops Show 929, July 17, 2017

Pronk Pops Show 928, July 13, 2017

Pronk Pops Show 927, July 12, 2017

Pronk Pops Show 926, July 11, 2017

Pronk Pops Show 925, July 10, 2017

Pronk Pops Show 924, July 6, 2017

Pronk Pops Show 923, July 5, 2017

Pronk Pops Show 922, July 3, 2017

Pronk Pops Show 921, June 29, 2017

Pronk Pops Show 920, June 28, 2017

Pronk Pops Show 919, June 27, 2017

Pronk Pops Show 918, June 26, 2017

Pronk Pops Show 917, June 22, 2017

Pronk Pops Show 916, June 21, 2017

Pronk Pops Show 915, June 20, 2017

Pronk Pops Show 914, June 19, 2017

Pronk Pops Show 913, June 16, 2017

Pronk Pops Show 912, June 15, 2017

Pronk Pops Show 911, June 14, 2017

Pronk Pops Show 910, June 13, 2017

Pronk Pops Show 909, June 12, 2017

Pronk Pops Show 908, June 9, 2017

Pronk Pops Show 907, June 8, 2017

Pronk Pops Show 906, June 7, 2017

Pronk Pops Show 905, June 6, 2017

Pronk Pops Show 904, June 5, 2017

Pronk Pops Show 903, June 1, 2017

Image result for trump's true colors liberal democrat

Image result for hurricane irma Sunday 10 september 2017 5 pm EDTImage result for hurricane irma hits florida 30 minutes ago Image result for hurricane irma latest track

 

The Pronk Pops Show 960

September 8, 2017

The Breaking and Developing Story 1: Category 4 Hurricane Irma Over 500 Miles Wide Bigger Than Texas with 150 MPH Sustained Winds Slows Down Turns Toward West and Tracks Directly Over All of South Florida — Evacuate Now — Hurricane Irma Will Hit Landfall Sunday Morning With Storm Surge  Up To 12 Feet and Rain Fall 10-18 Inches — Over Florida For 24 Hours — All Day Sunday —  Mass Mandatory Evacuation For South Florida — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/09/the-pronk-pops-show-960-september-8-2017-the-breaking-and-developing-story-1-category-4-hurricane-irma-over-500-miles-wide-bigger-than-texas-with-150-mph-sustained-winds-slows-down-turns-toward-we/

September 09, 2017 01:21 PM PDT

The Pronk Pops Show 959

September 7, 2017

The Breaking and Developing Story 1: Mandatory Evacuation Ordered For South Florida — Floridians Flee Monster “Nuclear” Hurricane Irma With Wind Speeds Exceeding 185 MPH That Could Hit Either Coast and Miami/Dade County By Saturday — High Rise Buildings With Glass Windows Near Construction Cranes A Major Concern — Gas Shortage A Serious Major Problem For Those Evacuating — Get Out If You Can Now! — When Will Irma Turn North? — Videos —

Story 2: Perspective Please — Over 1200 Killed by Flood in South Asia (India, Bangladesh, Nepal and Pakistan) vs. Over 60 in Texas By Raining Weather Not Climate Change — Worst Flooding in Decades — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/08/the-pronk-pops-show-959-september-7-2017-the-breaking-and-developing-story-1-mandatory-evacuation-ordered-for-south-florida-floridians-flee-monster-nuclear-hurricane-irma-with-wind-speeds/

September 08, 2017 02:28 PM PDT

The Pronk Pops Show 958

September 6, 2017

Story 1: President Trump Strikes His True Colors Cuts Deal With Democrats — Just Another Big Government Spending Manhattan Liberal Democrat — American “Big Apple” Pie — The Day The Music Died — Videos —

Story 2: The Day The Republican Party and/or President Trump Gives Citizenship To Illegal Alien Dreamers will Be The Day Republican Party Commits Political Suicide and Gives Birth to the American Independence Party — Trump The Flip Flopper –The Night They Drove Old Dixie Down — Helpless — I Shall Be Released — Forever Young — Videos

For additional videos and information:

https://pronkpops.wordpress.com/2017/09/07/the-pronk-pops-show-958-september-6-2017-story-1-president-trump-strikes-his-true-colors-cuts-deal-with-democrats-just-another-big-government-spending-manhattan-liberal-democrat-american-big/

September 07, 2017 01:46 PM PDT

The Pronk Pops Show 957

September 5, 2017

Story 1: Attorney General Sessions Announced The Rescinding of  Deferred Action for Childhood Arrivals (DACA) But Gives Congress Six Months To Enact Law — Deport and Remove All 30-60 Million Estimated Illegal Aliens In The United States — Enforce U.S. Immigration Laws — No Citizenship For Illegal Aliens — Videos —

Story 2: Kim’s Bada Boom — Hydrogen Bomb Test — China Enabled North Korea’s Nuclear and Missile Weapon Programs — China Should Dismantle North Korea’s Nuclear and Missile Programs —  Otherwise on 1 January 2019 U.S. Government Should Impose A Total U.S. Embargo On All Chinese Imports To U.S. and Ban All Exports From U.S. To China Until North Korea’s Nuclear Weapons and Missile Weapon Programs Are Completely Dismantled — Videos —

Story 3: Preparing For Hurricane Irma — Category 5 Destroyer and Killer Hurricane With Sustained Winds Over 180 Miles Per Hour and  Wind Gusts Exceeding 200 Miles Per Hour — Will It Hit Florida? — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/06/the-pronk-pops-show-957-september-5-2017-story-1-attorney-general-sessions-announced-the-rescinding-of-deferred-action-for-childhood-arrivals-daca-but-gives-congress-six-months-to-enact-la/

September 03, 2017 02:54 PM PDT

The Pronk Pop Show 956

August 31, 2017

Part 2 of 2, Story 1: President Trump’s Tax Speech — Very Light On Specifics — Let Congress Fill in The Details — Formula For Failure — Tax Rate Cuts Are Not Fundamental Tax Reform — A Broad Based Consumption Tax Such as The FairTax or Fair Tax Less Not Even Mentioned — What Good Is Dreaming It If You don’t actually do it! — Videos —

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/01/the-pronk-pops-show-956-august-31-2017-part-2-of-2-story-1-president-trumps-tax-speech-very-light-on-specifics-let-congress-fill-in-the-details-formula-for-failure-tax-rate-cuts-are/

September 03, 2017 11:59 AM PDT

The Pronk Pops Show 955

August 30, 2017

Part 1 of 2, Story 1: President Trump’s Tax Speech — Very Light On Specifics — Let Congress Fill in The Details — Formula For Failure — Tax Rate Cuts Are Not Fundamental Tax Reform — A Broad Based Consumption Tax Such as The FairTax or Fair Tax Less Not Even Mentioned — What Good Is Dreaming It If You don’t actually do it! — Videos —

Story 2: Revised Second Estimate of Real GDP Growth in Second Quarter of 2017 Is 3 Percent — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/08/31/the-pronk-pops-show-755-story-1-president-trumps-tax-speech-very-light-on-specifics-let-congress-fill-in-the-details-formula-for-failure-tax-rate-cuts-are-not-fundamental-tax-reform/

 

 

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 955-960

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

National Security Agency Is Spying On All American Who Use The Internet and Telephone System and They Collect and Store All Your Communications — Includes Trump and Associates — No Warrant Required If President Obama Designates You A Target — Congress Is Enabling The Turnkey Two Party Tyranny — Warrentless Searches — Congress Does Nothing To Stop It! — Videos

Posted on March 17, 2017. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Data, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, European History, External Hard Drives, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Friends, government spending, Heroes, history, Illegal, Immigration, Internal Revenue Service (IRS), IRS, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Sociology, Space, Spying, Strategy, Supreme Court, Systems, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for NSA utah data center

Image result for NSA utah data centerImage result for NSA utah data centerImage result for National security agencyImage result for National security agency

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Published on Jul 8, 2013

The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

If you think you can handle the truth, well here it is folks

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show] 

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

Polygraphin

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting[edit]

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]

Computing[edit]

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[168]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[171] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[175] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[176] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[177] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[175]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[174]

Following the signing in 1946–1956[178] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[179] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[180] New Zealand.[181]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[192]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[193] Today it is a legacy system, and several NSA stations are closing.[175]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[194] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[195]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[206]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[219]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[224] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[225] based on documentation provided by former AT&T technician Mark Klein.[226]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235] Rasmussen Reports found that 59% of Americans disapprove,[236] Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]

July 2015 – WikiLeaks: Espionage against German federal ministries[edit]

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]

Suspected responsibility for hacking operations by the Equation Group[edit]

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31

Software backdoors

Linux kerne

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[263]However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[264]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
Microsoft Windows
Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]

Role in scientific research and development[

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[278]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[279][280]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[281]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[280]
  • KY-57 VINSON tactical radio voice encryptor[281]
  • KG-84 Dedicated Data Encryption/Decryption[281]
  • STU-III secure telephone unit,[281] phased out by the STE[282]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]

Legality

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs

In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

https://en.wikipedia.org/wiki/National_Security_Agency

Read Full Post | Make a Comment ( None so far )

American Conservative Union CPAC 2017 — Videos

Posted on February 26, 2017. Filed under: American History, Blogroll, College, Congress, conservatives, Constitution, Economics, Education, Employment, Federal Government, Foreign Policy, Freedom, Friends, government, government spending, Health Care, Heroes, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, media, Obamacare, People, Philosophy, Photos, Politics, Religious, Security, Speech, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Image result for CPAC 2017
Image result for Trump at CPAC 2017Image result for dr. larry arn at cpac 2017Image result for Trump at CPAC 2017
Image result for cpac 2017  Trump Speech at CPAC 2017 (FULL) | ABC News

 CPAC 2017 – Dr. Larry Arnn

CPAC 2017 – Dan Schneider

FULL EVENT: President Donald Trump Speech at CPAC 2017 (2/24/2017) Donald Trump Live CPAC Speech

CPAC 2017 – Judge Jeanine Pirro

CPAC 2017 – Vice President Mike Pence’s full #CPAC Speech #CPAC2017

CPAC 2017 – How the Election Has Changed and Expanded the Pro-Life Movement

CPAC 2017 – Mark Levin and Sen. Ted Cruz

Steve Bannon, Reince Priebus Interview at CPAC 2017 | ABC News

CPAC 2017 – Sen. Jim Demint

CPAC 2017 – Ambassador John Bolton

CPAC 2017 – Nigel Farage

CPAC 2017 – Raheem Kassam

CPAC 2017 – Why Government Gets So Much Wrong

CPAC 2017 – When Did WWIII Begin? Part A: Threats at Home

CPAC 2017 – When did World War III Begin? Part B

CPAC 2017 – Armed and Fabulous

CPAC 2017 – Wayne LaPierre, NRA

CPAC 2017 – Chris Cox, NRA-ILA

CPAC 2017 – Prosecutors Gone Wild

CPAC 2017 – Kellyanne Conway

CPAC 2017 – A conversation with Carly Fiorina and Arthur Brooks

CPAC 2017 – The States vs The State Governors

CPAC 2017 – Gov. Pete Ricketts

CPAC 2017 – U.S. Secretary of Education Betsy DeVos

CPAC 2017 – Dan Schneider

CPAC 2017 – FREE stuff vs FREE-dom Panel

CPAC 2017 – Dana Loesch

CPAC 2017 – Robert Davi

CPAC 2017 – Lou Dobbs

Read Full Post | Make a Comment ( None so far )

Douglas Preston — Impact — Videos

Posted on February 18, 2017. Filed under: Art, Blogroll, Books, Communications, Corruption, Crime, Crisis, Culture, Entertainment, Family, Geology, Heroes, Homicide, Law, liberty, Life, Links, Literacy, Literature, media, Non-Fiction, People, Philosophy, Photos, Physics, Police, Psychology, Rants, Raves, Science, Security, Strategy, Success, Technology, Terrorism, Video, War, Wealth, Work, Writing | Tags: , , , , , , |

Image result for book cover impact preston Image result for  douglas preston

Impact by Douglas Preston–Audiobook Excerpt

Author Interview with Douglas Preston on his book, Blasphemy

Interview with Suspense Author Doug Preston

Douglas Preston: The Lost City of the Monkey God

Ask Amy: Ken Follett- Interview by Douglas Preston

Douglas Preston

From Wikipedia, the free encyclopedia
Douglas Preston
Born Douglas Jerome Preston
May 20, 1956 (age 60)
Cambridge, Massachusetts
Occupation Novelist, journalist
Nationality American
Alma mater Pomona College
Genre Thriller, Techno-thriller, Adventure, Non-Fiction
Notable works Agent Pendergast Series, The Monster of Florence, Wyman Ford series, Gideon Crew series
Spouse Christine Preston
Relatives Richard Preston, David Preston
Website
www.prestonchild.com

Douglas Jerome Preston (born May 20, 1956) is an American author of techno-thriller and horror novels. He has written numerous novels, and although he is most well known for his collaborations with Lincoln Child (including the Agent Pendergast series and Gideon Crew series), he has also written six solo novels, primarily including the Wyman Ford series. He also has authored a number of non-fiction books on history, science, exploration, and true crime.

Life and career

Preston was born in Cambridge, Massachusetts. A graduate of the Cambridge School of Weston in Weston, Massachusetts, and Pomona College in Claremont, California, Preston began his writing career at the American Museum of Natural History in New York.

From 1978 to 1985, Preston worked for the American Museum of Natural History in New York City as a writer, editor, and manager of publications. He served as managing editor for the journal Curator and was a columnist for Natural History magazine.[1] In 1985 he published a history of the museum, Dinosaurs In The Attic: An Excursion into the American Museum of Natural History, which chronicled the explorers and expeditions of the museum’s early days. The editor of that book at St. Martin’s Press was his future writing partner, Lincoln Child.[2] They soon collaborated on a thriller set in the museum titled Relic. It was subsequently made into a motion picture by Paramount Pictures starring Penelope Ann Miller, Tom Sizemore, and Linda Hunt.

In 1986, Preston moved to New Mexico and began to write full-time. Seeking an understanding of the first moment of contact between Europeans and Native Americans in America, he retraced on horseback Francisco Vásquez de Coronado‘s violent and unsuccessful search for the legendary Seven Cities of Gold. That thousand mile journey across the American Southwest resulted in the book Cities of Gold: A Journey Across the American Southwest. Since that time, Preston has undertaken many long horseback journeys retracing historic or prehistoric trails, for which he was inducted into the Long Riders’ Guild.[3] He has also participated in expeditions in other parts of the world, including a journey deep into Khmer Rouge-held territory in the Cambodian jungle with a small army of soldiers, to become the first Westerner to visit a lost Angkor temple. He was the first person in 3,000 years to enter an ancient Egyptian burial chamber in a tomb known as KV5 in the Valley of the Kings.[4] In 1989 and 1990 he taught nonfiction writing at Princeton University. Currently, he’s an active member of the Authors Guild,[5] as well as the International Thriller Writers organization.[6]

Writing career

With his frequent collaborator Lincoln Child, he created the character of FBI Special Agent Pendergast, who appears in many of their novels, including Relic, The Cabinet of Curiosities, Brimstone, and White Fire. Additional novels by the Preston and Child team include Mount Dragon, Riptide, Thunderhead, and The Ice Limit. Later, the duo created the Gideon Crew series, which consists of Gideon’s Sword, Gideon’s Corpse, and The Lost Island.

For his solo career, Preston’s fictional debut was Jennie, a novel about a chimpanzee who is adopted by an American family. His next novel was The Codex, a treasure hunt novel with a style that was much closer to the thriller genre of his collaborations with Child. The Codex introduced the characters of Tom Broadbent and Sally Colorado. Tom and Sally return in Tyrannosaur Canyon, which also features the debut of Wyman Ford, an ex-CIA agent and (at the time) a monk-in-training. Following Tyrannosaur Canyon, Ford leaves the monastery where he is training, forms his own private investigation company, and replaces Broadbent as the main protagonist of Preston’s solo works. Ford subsequently returns in Blasphemy, Impact, and The Kraken Project.

In addition to his collaborations with Child and his solo fictional universe, Preston has written several non-fiction books of his own, mainly dealing with the history of the American Southwest. He has written about archaeology and paleontology for The New Yorker magazine and has also been published in Smithsonian, Harper’s, The Atlantic, Natural History, and National Geographic.[7][8][9][10][11]

In May, 2011, Pomona College conferred on Preston the degree of Doctor of Letters (Honoris Causa).[12] He is the recipient of writing awards in the United States and Europe.[citation needed]

Involvement in the “Monster of Florence” case

Main article: Monster of Florence

In 2000, Preston moved to Florence, Italy with his young family and became fascinated with an unsolved local murder mystery involving a serial killer nicknamed the “Monster of Florence“. The case and his problems with the Italian authorities are the subject of his 2008 book The Monster of Florence, co-authored with Italian journalist Mario Spezi. The book spent three months on the New York Timesbestseller list and won a number of journalism awards in Europe and the United States.[citation needed] It is being developed into a movie by 20th Century Fox, produced by George Clooney. Clooney will play the role of Preston.[13][14]

Involvement in the Amanda Knox case

Preston has criticized the conduct of Italian prosecutor Giuliano Mignini[15] in the trial of American student Amanda Knox, one of three convicted, and eventually cleared,[16] of the murder of British student Meredith Kercher in Perugia in 2007. In 2009, Preston argued on 48 Hours on CBS that the case against Knox was “based on lies, superstition, and crazy conspiracy theories”.[17] In December 2009, after the verdict had been announced, he described his own interrogation by Mignini on Anderson Cooper 360° on CNN. Preston said of Mignini, “this is a very abusive prosecutor. He makes up theories. He’s … obsessed with satanic sex.”[18]

“Operation Thriller” USO Tour

In 2010, Preston participated in the first USO tour sponsored by the International Thriller Writers organization,[19] along with authors David Morrell, Steve Berry, Andy Harp, and James Rollins. After visiting with military personnel at National Navy Medical Center and Walter Reed Army Medical Center, the group spent several days in Kuwait and Iraq, marking “the first time in the USO’s 69-year history that authors visited a combat zone.”[20] Of the experience, Preston said, “As always, we learn a great deal from all of the amazing and dedicated people we meet.”[21]

Authors United

In 2014, during a disagreement over terms between Hachette Book Group and Amazon.com, Inc.,[22] Preston initiated an effort which became known as Authors United.[23] During the contract dispute, books by Hachette authors faced significant shipment delays, blocked availability, and reduced discounts on the Amazon website.[24] Frustrated with tactics he felt unjustly injured authors who were caught in the middle, Preston began garnering the support of like-minded authors from a variety of publishers. In the first open letter from Authors United, over 900 signatories urged Amazon to resolve the dispute and end the policy of sanctions, while calling on readers to contact CEO Jeff Bezos to express their support of authors.[25][26]Not long after, a second open letter, signed by over 1100 authors, was sent to Amazon’s board of directors asking if they personally approved the policy of hindering the sale of certain books.[27]

Describing the motivation behind the campaign, Preston explained: “This is about Amazon’s bullying tactics against authors. Every time they run into difficulty negotiating with a publisher, they target authors’ books for selective retaliation. The authors who were first were from university presses and small presses… Amazon is going to be negotiating with publishers forever. Are they really going to target authors every time they run into a problem with a publisher?”[28]

Bibliography

Novels

  • Preston, Douglas (1994). Jennie. New York: St. Martin’s Press.

Tom Broadbent Novels

Wyman Ford Novels

Collaborations with Lincoln Child

Agent Pendergast series
Gideon Crew series
Short fiction
  • “Gone Fishing” from Thriller: Stories to Keep You Up All Night (2006)
  • “Extraction” [eBook] (2012)
  • “Gaslighted: Slappy the Ventriloquist Dummy vs. Aloysius Pendergast” [eBook] (2014) [35]

Non-fiction

  • Dinosaurs In the Attic: An Excursion into the American Museum of Natural History (1986)
  • Cities of Gold: A Journey Across the American Southwest in Pursuit of Coronado (1992) [36]
  • Talking to the Ground: One Family’s Journey on Horseback Across the Sacred Land of the Navajo (1996)
  • The Royal Road: El Camino Real from Mexico City to Santa Fe (1998)
  • Ribbons of Time: The Dalquest Research Site [photography by Walter W. Nelson, text by Preston] (2006)
  • The Monster of Florence: A True Story [with Mario Spezi] (2008)
  • Trial By Fury: Internet Savagery and the Amanda Knox Case [Kindle Single eBook] (2013)
  • Preston, Douglas (May 6, 2013). “The El Dorado machine : a new scanner’s rain-forest discoveries”. Our Far-Flung Correspondents. The New Yorker. 89 (12): 34–40.
  • The Black Place: Two Seasons [photography by Walter W. Nelson, essay by Preston] (2014)
  • The Lost City of the Monkey God: A True Story (2017)

See also

ttps://en.wikipedia.org/wiki/Douglas_Preston

Impact (novel)

From Wikipedia, the free encyclopedia
Impact
Impact-bookcover.jpg

Hardcover edition
Author Douglas Preston
Country United States
Language English
Series Wyman Ford
Genre Thriller, Science fiction
Publisher Forge Books
Publication date
January 5, 2010
Media type Print (hardback)
Pages 368 pp
ISBN 978-0-7653-1768-1
Preceded by Blasphemy
Followed by The Kraken Project

Impact is a science fiction thriller novel by American writer Douglas Preston, published on January 5, 2010 by Forge Books. The novel is the third book in the Wyman Ford series.[1][2] The book was reviewed on All Things Considered in February 2010.[citation needed]

Plot summary

Ex-CIA agent Wyman Ford returns to Cambodia to investigate the source of radioactive gemstones and uncovers an unusual impact crater. A young woman on the other side of the world photographs a meteoroid‘s passage in the atmosphere with her telescope and deduces that it must have struck on one of the islands just offshore from Round Pond, Maine. A NASA scientist analyzing data from the Mars Mapping Orbiter (MMO) spots unusual spikes in gamma ray activity. These threads intersect with discovery of an alien device that has apparently been on Deimos, one of the two moons of Mars, for at least 100 million years. Something has caused it to activate and fire a strangelet at Earth, setting off the events in the novel.

Timeline

The events in this novel follow those of The Codex, Tyrannosaur Canyon, and Blasphemy. As such, Wyman Ford is the protagonist once again (having appeared in Tyrannosaur Canyon and Blasphemy), and the character of Stanton Lockwood III (who debuted in Blasphemy) also returns.

See also

References

External links