Legal

National Security Agency Is Spying On All American Who Use The Internet and Telephone System and They Collect and Store All Your Communications — Includes Trump and Associates — No Warrant Required If President Obama Designates You A Target — Congress Is Enabling The Turnkey Two Party Tyranny — Warrentless Searches — Congress Does Nothing To Stop It! — Videos

Posted on March 17, 2017. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Data, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, European History, External Hard Drives, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Friends, government spending, Heroes, history, Illegal, Immigration, Internal Revenue Service (IRS), IRS, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Sociology, Space, Spying, Strategy, Supreme Court, Systems, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for NSA utah data center

Image result for NSA utah data centerImage result for NSA utah data centerImage result for National security agencyImage result for National security agency

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Published on Jul 8, 2013

The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

If you think you can handle the truth, well here it is folks

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show] 

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

Polygraphin

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting[edit]

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]

Computing[edit]

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[168]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[171] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[175] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[176] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[177] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[175]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[174]

Following the signing in 1946–1956[178] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[179] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[180] New Zealand.[181]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[192]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[193] Today it is a legacy system, and several NSA stations are closing.[175]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[194] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[195]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[206]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[219]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[224] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[225] based on documentation provided by former AT&T technician Mark Klein.[226]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235] Rasmussen Reports found that 59% of Americans disapprove,[236] Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]

July 2015 – WikiLeaks: Espionage against German federal ministries[edit]

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]

Suspected responsibility for hacking operations by the Equation Group[edit]

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31

Software backdoors

Linux kerne

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[263]However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[264]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
Microsoft Windows
Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]

Role in scientific research and development[

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[278]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[279][280]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[281]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[280]
  • KY-57 VINSON tactical radio voice encryptor[281]
  • KG-84 Dedicated Data Encryption/Decryption[281]
  • STU-III secure telephone unit,[281] phased out by the STE[282]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]

Legality

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs

In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

https://en.wikipedia.org/wiki/National_Security_Agency

Read Full Post | Make a Comment ( None so far )

The Rise and Fall of The Roman Empire — Videos

Posted on March 11, 2017. Filed under: American History, Blogroll, Books, Constitution, Corruption, Crisis, Cult, Culture, Documentary, Economics, Elections, Employment, European History, Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Illegal, Immigration, Language, Law, Legal, liberty, Life, Links, Literacy, media, People, Philosophy, Photos, Political Correctness, Politics, Psychology, Raves, Religious, Security, Speech, Strategy, Success, Torture, Video, War, Wealth, Weapons, Weather, Welfare, Wisdom, Work, Writing | Tags: , , , , , |

Will Durant — Why Rome Fell

The Truth About The Fall of Rome: Modern Parallels

Are We Rome? Ben Powell Compares the U.S. with the Roman Empire

Are We Rome

DECLINE of EMPIRES: The Signs of Decay

The Judge on the Decline and Fall of Roman Empire and Future of America

The 7 Signs Of An Empire In Decline

The Roman Empire – Episode 1: The Rise of the Roman Empire (History Documentary)

The Roman Empire – Episode 2: Legions of Conquest (History Documentary)

The Roman Empire – Episode 3: Seduction of Power (History Documentary)

The Roman Empire – Episode 4: Grasp Of An Empire (History Documentary)

The Roman Empire – Episode 5: Cult Of Order (History Documentary)

The Roman Empire – Episode 6: The Fall Of The Roman Empire (History Documentary)

The Roman Empire – Episode 7: Letters From The Roman Front (History Documentary)

Rome: The Rise and Fall of an Empire – Episode 8: Wrath of the Gods (Documentary)

Rome: The Rise and Fall of an Empire – Episode 9: The Soldier’s Emperor (Documentary)

Rome: The Rise and Fall of an Empire – Episode 10: Constantine the Great (Documentary)

Rome: The Rise and Fall of an Empire – Episode 11: The Barbarian General (Documentary)

Rome: The Rise and Fall of an Empire – Episode 12: The Puppet Master (Documentary)

Rome: The Rise and Fall of an Empire – Episode 13: The Last Emperor (Documentary)

[History] The Decline and Fall of the Roman Empire Volume 1, Part 1, Audiobook

[History] The Decline and Fall of the Roman Empire Volume 1, Part 2, Audiobook

[History Audiobook] The Decline and Fall of the Roman Empire, Volume 2, Part 1

[History Audiobook] The Decline and Fall of the Roman Empire, Volume 2, Part 2

The History of the Decline and Fall of the Roman Empire

From Wikipedia, the free encyclopedia
  (Redirected from Rise and fall of rome)
This article is about the book. For the historical events, see History of the Roman Empire and Fall of the Western Roman Empire. For the historiography spawned by Gibbon’s theories, see Historiography of the fall of the Western Roman Empire. For publication details and chapter listings, see Outline of The History of the Decline and Fall of the Roman Empire.
The History of the Decline and Fall of the Roman Empire
Author Edward Gibbon
Country England
Language English
Subject History of the Roman Empire
Publisher Strahan & Cadell, London
Publication date
1776–89
Media type Print
LC Class DG311

Edward Gibbon (1737–1794).

The History of the Decline and Fall of the Roman Empire[1] is a book of history written by the English historian Edward Gibbon, which traces the trajectory of Western civilization (as well as the Islamic and Mongolian conquests) from the height of the Roman Empire to the fall of Byzantium. It was published in six volumes. Volume I was published in 1776 and went through six printings.[2] Volumes II and III were published in 1781;[3][4] volumes IV, V, and VI in 1788–89.[5][6][7] The original volumes were published in quarto sections, a common publishing practice of the time. The work covers the history, from 98 to 1590, of the Roman Empire, the history of early Christianity and then of the Roman State Church, and the history of Europe, and discusses the decline of the Roman Empire in the East and West. Because of its relative objectivity and heavy use of primary sources, unusual at the time, its methodology became a model for later historians. This led to Gibbon being called the first “modern historian of ancient Rome”.[8]

Contents

Thesis

Gibbon offers an explanation for the fall of the Roman Empire, a task made difficult by a lack of comprehensive written sources, though he was not the only historian to attempt the task.[9]

According to Gibbon, the Roman Empire succumbed to barbarian invasions in large part due to the gradual loss of civic virtue among its citizens.[10] They had become weak, outsourcing their duty to defend their empire to barbarian mercenaries, who then became so numerous and ingrained that they were able to take over the Empire. Romans, he believed, were unwilling to live a tougher, military lifestyle. In addition, Gibbon argued that Christianity created a belief that a better life existed after death, which fostered an indifference to the present among Roman citizens, thus sapping their desire to sacrifice for a larger purpose. He also believed that Christianity’s comparative pacifism tended to hamper the traditional Roman martial spirit. Finally, like other Enlightenment thinkers and British citizens of the age steeped in institutional anti-Catholicism, Gibbon held in contempt the Middle Ages as a priest-ridden, superstitious Dark Age. It was not until his own era, the “Age of Reason,” with its emphasis on rational thought, it was believed, that human history could resume its progress.[11]

Gibbon saw the Praetorian Guard as the primary catalyst of the empire’s initial decay and eventual collapse, a seed planted by Augustus when the empire was established. His writings cite repeated examples of the Praetorian Guard abusing their power with calamitous results, including numerous instances of imperial assassination and incessant demands for increased pay.

He compared the reigns of Diocletian (284–305) and Charles V (1519–1556), noting superficial similarities. Both were plagued by continual war and compelled to excessive taxation to fund wars, both chose to abdicate as Emperors at roughly the same age, and both chose to lead a quiet life upon their retirement. However, Gibbon argues that these similarities are only superficial and that the underlying context and character of the two rulers is markedly different.

Style

Gibbon’s style is frequently distinguished by an ironically detached and somewhat dispassionate yet critical tone. He occasionally lapsed into moralization and aphorism:

[A]s long as mankind shall continue to bestow more liberal applause on their destroyers than on their benefactors, the thirst of military glory will ever be the vice of the most exalted characters.

The influence of the clergy, in an age of superstition, might be usefully employed to assert the rights of mankind; but so intimate is the connection between the throne and the altar, that the banner of the church has very seldom been seen on the side of the people (Chapter Three p. 52).

History…is, indeed, little more than the register of the crimes, follies, and misfortune of mankind (ibid. p. 69).

If we contrast the rapid progress of this mischievous discovery [of gunpowder] with the slow and laborious advances of reason, science, and the arts of peace, a philosopher, according to his temper, will laugh or weep at the folly of mankind (Chapter 65, p. 68).[Page numbers in which edition? clarification needed]

Citations and footnotesen humorous style, and have been called “Gibbon’s table talk.”[12] They provide an entertaining moral commentary on both ancient Rome and 18th-century Great Britain. This technique enabled Gibbon to compare ancient Rome to his own contemporary world. Gibbon’s work advocates a rationalist and progressive view of history.

Gibbon’s citations provide in-depth detail regarding his use of sources for his work, which included documents dating back to ancient Rome. The detail within his asides and his care in noting the importance of each document is a precursor to modern-day historical footnoting methodology.

The work is notable for its erratic but exhaustively documented notes and research. John Bury, following him 113 years later with his own History of the Later Roman Empire, commended the depth and accuracy of Gibbon’s work. Unusually for 18th century historians, Gibbon was not content with second-hand accounts when the primary sources were accessible. “I have always endeavoured”, Gibbon wrote, “to draw from the fountain-head; that my curiosity, as well as a sense of duty, has always urged me to study the originals; and that, if they have sometimes eluded my search, I have carefully marked the secondary evidence, on whose faith a passage or a fact were reduced to depend.”[13] The Decline and Fall is a literary monument and a massive step forward in historical method.[14]

Criticism

Numerous tracts were published criticizing his work. In response, Gibbon defended his work with the 1779 publication of, A Vindication … of the Decline and Fall of the Roman Empire.[15] His remarks on Christianity aroused particularly vigorous attacks, but in the mid-twentieth century, at least one author claimed that “church historians allow the substantial justness of [Gibbon’s] main positions.”[16]

Number of Christian martyrs

Gibbon challenged Church history by estimating far smaller numbers of Christian martyrs than had been traditionally accepted. The Church’s version of its early history had rarely been questioned before. Gibbon, however, knew Church writings were secondary sources, and he shunned them in favor of primary sources.

Christianity as a contributor to the fall and to stability: chapters XV, XVI

Volume I was originally published in sections, as was common for large works at the time. The first two were well received and widely praised. The last quarto in Volume I, especially Chapters XV and XVI, was highly controversial, and Gibbon was attacked as a “paganist“. Voltaire was deemed to have influenced Gibbon’s claiming that Christianity was a contributor to the fall of the Roman Empire. As one pro-Christian commenter put it in 1840:

As Christianity advances, disasters befall the [Roman] empire—arts, science, literature, decay—barbarism and all its revolting concomitants are made to seem the consequences of its decisive triumph—and the unwary reader is conducted, with matchless dexterity, to the desired conclusion—the abominable Manicheism of Candide, and, in fact, of all the productions of Voltaire’s historic school—viz., “that instead of being a merciful, ameliorating, and benignant visitation, the religion of Christians would rather seem to be a scourge sent on man by the author of all evil.”[17]

Gibbon thought that Christianity had hastened the Fall, but also ameliorated the results:

As the happiness of a future life is the great object of religion, we may hear without surprise or scandal that the introduction, or at least the abuse of Christianity, had some influence on the decline and fall of the Roman empire. The clergy successfully preached the doctrines of patience and pusillanimity; the active virtues of society were discouraged; and the last remains of military spirit were buried in the cloister: a large portion of public and private wealth was consecrated to the specious demands of charity and devotion; and the soldiers’ pay was lavished on the useless multitudes of both sexes who could only plead the merits of abstinence and chastity. Faith, zeal, curiosity, and more earthly passions of malice and ambition, kindled the flame of theological discord; the church, and even the state, were distracted by religious factions, whose conflicts were sometimes bloody and always implacable; the attention of the emperors was diverted from camps to synods; the Roman world was oppressed by a new species of tyranny; and the persecuted sects became the secret enemies of their country. Yet party-spirit, however pernicious or absurd, is a principle of union as well as of dissension. The bishops, from eighteen hundred pulpits, inculcated the duty of passive obedience to a lawful and orthodox sovereign; their frequent assemblies and perpetual correspondence maintained the communion of distant churches; and the benevolent temper of the Gospel was strengthened, though confirmed, by the spiritual alliance of the Catholics. The sacred indolence of the monks was devoutly embraced by a servile and effeminate age; but if superstition had not afforded a decent retreat, the same vices would have tempted the unworthy Romans to desert, from baser motives, the standard of the republic. Religious precepts are easily obeyed which indulge and sanctify the natural inclinations of their votaries; but the pure and genuine influence of Christianity may be traced in its beneficial, though imperfect, effects on the barbarian proselytes of the North. If the decline of the Roman empire was hastened by the conversion of Constantine, his victorious religion broke the violence of the fall, and mollified the ferocious temper of the conquerors (chap. 38).[18]

Tolerant paganismast 200 years, and whose most eminent representative is Gibbon. Gibbon had written:

The various modes of worship which prevailed in the Roman world were all considered by the people as equally true; by the philosophers as equally false; and by the magistrate as equally useful.

Drake counters:

With such deft strokes, Gibbon enters into a conspiracy with his readers: unlike the credulous masses, he and we are cosmopolitans who know the uses of religion as an instrument of social control. So doing, Gibbon skirts a serious problem: for three centuries prior to Constantine, the tolerant pagans who people the Decline and Fall were the authors of several major persecutions, in which Christians were the victims. …Gibbon covered this embarrassing hole in his argument with an elegant demur. Rather than deny the obvious, he adroitly masked the question by transforming his Roman magistrates into models of Enlightenment rulers — reluctant persecutors, too sophisticated to be themselves religious zealots.

Misinterpretation of Byzantium

Others such as John Julius Norwich, despite their admiration for his furthering of historical methodology, consider Gibbon’s hostile views on the Byzantine Empire flawed and blame him somewhat for the lack of interest shown in the subject throughout the 19th and early 20th centuries.[19] This view might well be admitted by Gibbon himself: “But it is not my intention to expatiate with the same minuteness on the whole series of the Byzantine history.”[20] However the Russian historian George Ostrogorsky writes, “Gibbon and Lebeau were genuine historians — and Gibbon a very great one — and their works, in spite of factual inadequacy, rank high for their presentation of their material.”[21]

Gibbon’s reflections

Gibbon’s initial plan was to write a history “of the decline and fall of the city of Rome”, and only later expanded his scope to the whole Roman Empire.[22]

Although he published other books, Gibbon devoted much of his life to this one work (1772–89). His autobiography Memoirs of My Life and Writings is devoted largely to his reflections on how the book virtually became his life. He compared the publication of each succeeding volume to a newborn child.[23]

Editions

Gibbon continued to revise and change his work even after publication. The complexities of the problem are addressed in Womersley’s introduction and appendices to his complete edition.

  • In-print complete editions
    • J.B. Bury, ed., 7 volumes (London: Methuen, 1909–1914), currently reprinted (New York: AMS Press, 1974). ISBN 0-404-02820-9.
    • Hugh Trevor-Roper, ed., 6 volumes (New York: Everyman’s Library, 1993–1994). The text, including Gibbon’s notes, is from Bury but without his notes. ISBN 0-679-42308-7 (vols. 1–3); ISBN 0-679-43593-X (vols. 4–6).
    • David Womersley, ed., 3 volumes. hardback-(London: Allen Lane, 1994); paperback-(New York: Penguin Books, 2005;1994). Includes the original index, and the Vindication (1779), which Gibbon wrote in response to attacks on his caustic portrayal of Christianity. The 2005 print includes minor revisions and a new chronology. ISBN 0-7139-9124-0 (3360 p.); ISBN 0-14-043393-7 (v.1, 1232 p.); ISBN 0-14-043394-5 (v.2, 1024 pages); ISBN 0-14-043395-3 (v.3, 1360 pages)
  • In-print abridgements
    • David Womersley, ed., 1 volume (New York: Penguin Books, 2000). Includes all footnotes and seventeen of the original seventy-one chapters. ISBN 0-14-043764-9, 848 pages
    • Hans-Friedrich Mueller, ed., one volume abridgment (New York: Random House, 2003). Includes excerpts from all seventy-one chapters. It eliminates footnotes, geographic surveys, details of battle formations, long narratives of military campaigns, ethnographies and genealogies. Based on the Rev. H.H. [Dean] Milman edition of 1845 (see also Gutenberg etext edition). ISBN 0-375-75811-9, (trade paper, 1312 pages); ISBN 0-345-47884-3 (mass market paper, 1536 pages)

Legacy

Many writers have used variations on the series title (including using “Rise and Fall” in place of “Decline and Fall”), especially when dealing with large nations or empires. Piers Brendon notes that Gibbon’s work, “became the essential guide for Britons anxious to plot their own imperial trajectory. They found the key to understanding the British Empire in the ruins of Rome.”[24]

and in film:

and in television:

The title and author are also cited in Noël Coward‘s comedic poem “I Went to a Marvellous Party“.[25] And in the poem “The Foundation of Science Fiction Success“, Isaac Asimov acknowledged that his Foundation series—an epic tale of the fall and rebuilding of a galactic empire—was written “with a tiny bit of cribbin’ / from the works of Edward Gibbon”.[26]

In 1995, an established journal of classical scholarship, Classics Ireland, published punk musician’s Iggy Pop‘s reflections on the applicability of The Decline and Fall of the Roman Empire to the modern world in a short article, Caesar Lives, (Vol. 2, 1995) in which he noted “America is Rome. Of course, why shouldn’t it be? We are all Roman children, for better or worse… I learn much about the way our society really works, because the system-origins – military, religious, political, colonial, agricultural, financial – are all there to be scrutinized in their infancy. I have gained perspective.” [27]

See also

Notes

  1. Jump up^ sometimes shortened to Decline and Fall of the Roman Empire
  2. Jump up^ Edward Gibbon (1776). The History of the Decline and Fall of the Roman Empire. I. W. Strahan and T. Cadell.
  3. Jump up^ Edward Gibbon (1781). The History of the Decline and Fall of the Roman Empire. II.
  4. Jump up^ Edward Gibbon (1781). The History of the Decline and Fall of the Roman Empire. III.
  5. Jump up^ Edward Gibbon (1788). The History Of The Decline And Fall Of The Roman Empire. IV. Strahan and Cadell.
  6. Jump up^ Edward Gibbon (1788). The History of the Decline and Fall of the Roman Empire. V. W. Strahan and T. Cadell.
  7. Jump up^ Edward Gibbon (1788). The History of the Decline and Fall of the Roman Empire. VI.
  8. Jump up^ David S. Potter (2006-05-22). A Companion to the Roman Empire. Wiley. p. 100. ISBN 978-0-631-22644-4.
  9. Jump up^ see for example Henri Pirenne’s (1862–1935) famous thesis published in the early 20th century. As for sources more recent than the ancients, Gibbon certainly drew on Montesquieu‘s short essay, Considérations sur les causes de la grandeur des Romains et de leur décadence, and on previous work published by Bossuet (1627-1704) in his Histoire universelle à Monseigneur le dauphin (1763). see Pocock, EEG. for Bousset, pp. 65, 145; for Montesquieu, pp. 85–88, 114, 223.
  10. Jump up^ J.G.A. Pocock, “Between Machiavelli and Hume: Gibbon as Civic Humanist and Philosophical Historian,” Daedalus 105,3(1976), 153–169; and in Further reading: Pocock, EEG, 303–304; FDF, 304–306.
  11. Jump up^ J.G.A. Pocock, “Between Machiavelli and Hume: Gibbon as Civic Humanist and Philosophical Historian,” Daedulus 105,3(1976), 153–169; and in Further reading: Pocock, EEG, 303–304; FDF, 304–306.
  12. Jump up^ Saunders, Dero A., ed. (1952). Decline and Fall of the Roman Empire. New York: Penguin. p. 23 (Introduction).
  13. Jump up^ Preface to Gibbon’s Volume the Fourth in David Womersley ed., Edward Gibbon – The History of the Decline and Fall of the Roman Empire, vol. 2 (New York: Penguin Books, 1994), p. 520.
  14. Jump up^ In the early 20th century, biographer Sir Leslie Stephen [“Gibbon, Edward (1737–1794),” Dictionary of National Biography, vol. 7, (Oxford, 1921), p. 1134.] summarized The History‘s reputation as a work of unmatched erudition, a degree of professional esteem which remains as strong today as it was then:

    The criticisms upon his book…are nearly unanimous. In accuracy, thoroughness, lucidity, and comprehensive grasp of a vast subject, the History is unsurpassable. It is the one English history which may be regarded as definitive. …Whatever its shortcomings, the book is artistically imposing as well as historically unimpeachable as a vast panorama of a great period.

  15. Jump up^ Edward Gibbon (1779). A vindication of some passages in the fifteenth and sixteenth chapters of The history of the decline and fall of the Roman Empire: By the author..Printed for W. Strahan; and T. Cadell, in the Strand.
  16. Jump up^ The New Schaff-Herzog Encyclopedia of Religious Knowledge, vol. IV, eds. S.M. Jackson, et al. (Grand Rapids, Mich.: Baker Book House, 1952), 483–484. online.
  17. Jump up^ Dublin review: a quarterly and critical journal. Burns, Oates and Washbourne. 1840. pp. 208–. JItKAAAAcAAJ. p. 208 image at Google Books
  18. Jump up^ General Observations On The Fall Of The Roman Empire In The West. Fall In The West — The Decline And Fall Of The Roman Empire by Edward Gibbon. At Christian Classics Ethereal Library, Calvin College Computer Science. http://www.ccel.org/g/gibbon/decline/volume1/chap39.htm
  19. Jump up^ John Julius Norwich, Byzantium (New York: Knopf, 1989); Byzantium: the apogee (London and New York: Viking Press, 1991).
  20. Jump up^ Preface of 1782 online.
  21. Jump up^ Georgije Ostrogorski History of the Byzantine State(1986) p. 5 online
  22. Jump up^ Gibbon, Edward (1781). The History of the Decline and Fall of the Roman Empire. 3. chapter 36, footnote 43. If I prosecute this History, I shall not be unmindful of the decline and fall of the city of Rome; an interesting object, to which my plan was originally confined.
  23. Jump up^ Patricia B. Craddock, Edward Gibbon, Luminous Historian. (Baltimore: Johns Hopkins Univ. Press, 1989), 249–266.
  24. Jump up^ Piers Brendon, The Decline and Fall of the British Empire, 1781-1997 (2008) p. xv
  25. Jump up^ Link to notes on the poem here [1]. Excerpt: “If you have any mind at all, Gibbon’s divine Decline and Fall, Seems pretty flimsy, No more than a whimsy… .”
  26. Jump up^ Asimov, Isaac (October 1954). “The Foundation of S. F. Success”. The Magazine of Fantasy and Science Fiction. p. 69.
  27. Jump up^ “Classics Ireland”. Ucd.ie. Retrieved September 8, 2010.

Further readingnd Intertextuality in Gibbon’s Decline and Fall of the Roman Empire (Newark: Associated University Presses, 1999); ISBN 0-87413-658-X.

  • Craddock, Patricia. “Historical Discovery and Literary Invention in Gibbon’s ‘Decline and Fall’,” Modern Philology 85,4(May 1988), 569–587.
  • Drake, H.A., “Lambs into Lions: explaining early Christian intolerance,” Past and Present 153(1996), 3–36. Oxford Journals
  • Furet, Francois. “Civilization and Barbarism in Gibbon’s History,” Daedalus 105,3(1976), 209–216.
  • Gay, Peter. Style in History (New York: Basic Books, 1974); ISBN 0-465-08304-8.
  • Ghosh, Peter R. “Gibbon’s Dark Ages: Some Remarks on the Genesis of the Decline and Fall,” Journal of Roman Studies 73(1983), 1–23.
  • Homer-Dixon, Thomas “The Upside of Down: Catastrophe, Creativity and the Renewal of Civilization”, 2007 ISBN 978-0-676-97723-3, Chapter 3 pp. 57–60
  • Kelly, Christopher. “A Grand Tour: Reading Gibbon’s ‘Decline and Fall’,” Greece & Rome 2nd ser., 44,1 (Apr. 1997), 39–58.
  • Momigliano, Arnaldo. “Eighteenth-Century Prelude to Mr. Gibbon,” in Pierre Ducrey et al., eds., Gibbon et Rome à la lumière de l’historiographie moderne (Geneva: Librairie Droz, 1977).
  • Momigliano, Arnaldo. “Gibbon from an Italian Point of View,” in G.W. Bowersock et al., eds., Edward Gibbon and the Decline and Fall of the Roman Empire (Cambridge: Harvard Univ. Press, 1977).
  • Momigliano, Arnaldo. “Declines and Falls,” American Scholar 49(Winter 1979), 37–51.
  • Momigliano, Arnaldo. “After Gibbon’s Decline and Fall,” in Kurt Weitzmann, ed. Age of Spirituality : a symposium (Princeton: 1980); ISBN 0-89142-039-8.
  • Pocock, J.G.A. Barbarism and Religion, 4 vols. all Cambridge Univ. Press.
  • Roberts, Charlotte Edward Gibbon and the Shape of History. 2014 Oxford University Press 9780198704836
  • Trevor-Roper, H.R. “Gibbon and the Publication of The Decline and Fall of the Roman Empire, 1776–1976,” Journal of Law and Economics 19,3 (Oct. 1976), 489–505.
  • Womersley, David. The Transformation of ‘The Decline and Fall of the Roman Empire’ (Cambridge: 1988).
  • Womersley, David, ed. Religious Scepticism: Contemporary Responses to Gibbon (Bristol, England: Thoemmes Press, 1997).
  • Wootton, David. “Narrative, Irony, and Faith in Gibbon’s Decline and Fall,” History and Theory 33,4 (Dec., 1994), 77–105.

External links

https://en.wikipedia.org/wiki/The_History_of_the_Decline_and_Fall_of_the_Roman_Empire

Read Full Post | Make a Comment ( None so far )

American Conservative Union CPAC 2017 — Videos

Posted on February 26, 2017. Filed under: American History, Blogroll, College, Congress, conservatives, Constitution, Economics, Education, Employment, Federal Government, Foreign Policy, Freedom, Friends, government, government spending, Health Care, Heroes, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, media, Obamacare, People, Philosophy, Photos, Politics, Religious, Security, Speech, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Image result for CPAC 2017
Image result for Trump at CPAC 2017Image result for dr. larry arn at cpac 2017Image result for Trump at CPAC 2017
Image result for cpac 2017  Trump Speech at CPAC 2017 (FULL) | ABC News

 CPAC 2017 – Dr. Larry Arnn

CPAC 2017 – Dan Schneider

FULL EVENT: President Donald Trump Speech at CPAC 2017 (2/24/2017) Donald Trump Live CPAC Speech

CPAC 2017 – Judge Jeanine Pirro

CPAC 2017 – Vice President Mike Pence’s full #CPAC Speech #CPAC2017

CPAC 2017 – How the Election Has Changed and Expanded the Pro-Life Movement

CPAC 2017 – Mark Levin and Sen. Ted Cruz

Steve Bannon, Reince Priebus Interview at CPAC 2017 | ABC News

CPAC 2017 – Sen. Jim Demint

CPAC 2017 – Ambassador John Bolton

CPAC 2017 – Nigel Farage

CPAC 2017 – Raheem Kassam

CPAC 2017 – Why Government Gets So Much Wrong

CPAC 2017 – When Did WWIII Begin? Part A: Threats at Home

CPAC 2017 – When did World War III Begin? Part B

CPAC 2017 – Armed and Fabulous

CPAC 2017 – Wayne LaPierre, NRA

CPAC 2017 – Chris Cox, NRA-ILA

CPAC 2017 – Prosecutors Gone Wild

CPAC 2017 – Kellyanne Conway

CPAC 2017 – A conversation with Carly Fiorina and Arthur Brooks

CPAC 2017 – The States vs The State Governors

CPAC 2017 – Gov. Pete Ricketts

CPAC 2017 – U.S. Secretary of Education Betsy DeVos

CPAC 2017 – Dan Schneider

CPAC 2017 – FREE stuff vs FREE-dom Panel

CPAC 2017 – Dana Loesch

CPAC 2017 – Robert Davi

CPAC 2017 – Lou Dobbs

Read Full Post | Make a Comment ( None so far )

The Real Reason Hillary Clinton Lost — Adorable Deplorable Deviants (ADDs) Defeated Democrats — Narcissism Defeated Clinton — Videos

Posted on February 9, 2017. Filed under: Articles, Blogroll, Communications, Computers, Congress, Constitution, Corruption, Crime, Crisis, Cult, Culture, Entertainment, Fraud, Illegal, Immigration, Law, Legal, liberty, Life, Links, media, Money, Movies, Newspapers, People, Philosophy, Photos, Police, Political Correctness, Politics, Presidential Candidates, Press, Radio, Radio, Rants, Raves, Sociology, Strategy, Talk Radio, Taxation, Taxes, Television, Unemployment, Video, War, Wealth, Weather, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , |

Image result for adorabel deplorableImage result for adorabel deplorableImage result for adorabel deplorableImage result for adorabel deplorable

Clinton: Trump supporters in ‘basket of deplorables…

Trump supporter leaves CNN anchor speechless

Jon Lovitz Appears as the Pathological Liar on Johnny Carson’s Tonight Show

Comic Relief “John Lovitz” Stand Up Comedy

Donald Trump Campares Hillary DNC to Jon Lovitz Comedy

Hillary Clinton lying for 13 minutes straight.

How to Identify a SOCIOPATH

7. Frequent and Compulsive Lying

Coming up:

10. Surface Charm and Glibness
9. Egoism and Grandiosity
8. High Sensation Seeker
7. Frequent and Compulsive Lying
6. No Guilt or Sense of Responsibility
5. Shallow Emotions
4. Empathy-free
3. Trivial Sexual Life
2. Conduct Problems Prior to Age 15
1. Sadism and Mind Games

The Sociopath

9 Ways Donald Trump Is A Sociopath

Hillary Clinton = Psychopath

Donald Trump = Sociopath

Is Donald Trump a Successful Psychopath?? (Use the Checklist!) The Psychopath Next Door

The Untruth About Donald Trump

The Truth About The Donald Trump Controversy

Why Donald Trump Won | Bill Mitchell and Stefan Molyneux

Victor Davis Hanson – The Mythologies of the 2016 Election

The language of lying — Noah Zandan

Psychopaths vs Sociopaths: What is the difference between a psychopath and a sociopath?

The psychology of narcissism – W. Keith Campbell

Trump, Clinton – Narcissists? “Experts” Spew NONSENSE!

All Narcissists Are Pathological Liars

Trump: Narcissist in the White House?

Published on May 6, 2016

Full text: http://gulagbound.com/51301/how-bad-a…

Trump regards himself as omniscient, an authority on anything and everything, from aesthetics to ethics. He, therefore, lacks intellectual curiosity and regards outside advice as both superfluous and injurious (because it implies that he is less than perfect). He is likely to surround himself with timid yesmen and sycophantic acolytes and generate an impregnable echo chamber rather than a council of wise men and women.

Trump’s grasp of nuanced reality, weak as it already is, is likely to deteriorate further to the point of paranoid psychosis. Faced with opposition, however tenuous, he is likely to react by scapegoating and by inciting street or state violence against targeted groups. Trump is the state, so his enemies (anyone who as much as voices doubt or disagrees with him) is, by definition, an enemy of the state.

Owing to his self-perceived innate superiority, Trump regards himself as above and transcending laws made by lesser mortals. Laws are meant to trap and ensnare giants like him, to drag him down to the pedestrian level of mediocrity. He plays by the rules only when and if they accord with his predilections and self-interest.

Like all narcissists, Trump believes that he is universally loved, adored, and admired. He attributes this ostensible (and utterly delusional) blanket approbation to his effusive charm and irresistibility. He is firmly convinced that he can motivate people to transgress against their own moral convictions and to break the law, if necessary, just by the sheer force of his monumental personality. Trump idealizes and then rapidly devalues people, collectives, and institutions. Trump is in sempiternal flux: he is inconstant in his judgements, opinions, views, and fleeting attachments.

Trump is intellectually lazy, so he is a firm adherent of shortcuts and of “fake it till you make it”. It is a dangerous approach that led him to botch numerous business deals and inflict untold damage and suffering on thousands of people.

Trump is authoritarian in the worst sense of the word. In his disordered, chaotic mind, he is infallible (incapable of erring), omnipotent (can achieve anything if he just sets his mind to it), and omniscient (needs to learn nothing as he is the fount of all true, intuitive knowledge). This precludes any proper team work, orderly governance, institutional capacity, flow of authority and responsibility, and just plain structure. Trump is an artist, led by inconsistent and intermittent inspiration, not by reliable, old-fashioned perspiration. He is not a self-made man, but a self-conjured caricature of a self-made man. Trump is guided by his alleged inner divine wisdom. He is a malevolent guru and cult leader, not a politician or a statesman.

Ironically, Trump’s much trumpeted grandiosity is fragile because it is based on delusional and fantastic assumptions of perfection and intellectual brilliance which are hard to defend. Hence Trump’s relentless and compulsive pursuit of affirmation and adulation. He needs to be constantly idolized just to feel half human. Criticism and disagreement, however minor and well-intentioned, are perceived as unmitigated threats to the precarious house of cards that is Trump’s personality. Consequently, Trump is sadistically vindictive, aiming not just to counter such countervailing opinions regarding his Godlike status, but to deter and intimidate future critics.

Finally, aiming to disavow his own fragility and the indisputable fact that his public persona is nothing but a fabrication, Trump ostentatiously and volubly abhors and berates the weak, the meek, “losers”, “haters” (of which is a prime example), the disabled, women, minorities, and anyone else who might remind him by their very existence of how far from perfect and brilliant he is. The public Trump is about hatred, resentment, rage, envy, and other negative emotions because he is mercilessly driven by these very demons internally. Trump’s quotidien existence is a Kafkaesque trial in which he stands accused of being a mere, average, not-too-bright, mortal and is constantly found wanting and guilty as charged. His entire life is a desperate, last ditch attempt to prove wrong the prosecution in this never-ending courtroom drama.

How & Why Donald Trump Stole America. The Pathological / Malignant Narcissist. Expert

Donald Trump – Full Documentary of a Narcissistic Sociopath (Enhanced)

What is Deviance?

Deviance and Social Control YouTube

Perspectives on deviance: Differential association, labeling theory, and strain theory

Crime and Deviance: A Sociological Perspective

Introduction to Sociology – Deviance, Crime, and Social Control

Read Full Post | Make a Comment ( None so far )

Chris Heffelfinger — Radical Islam in America: Salafism’s Journey from Arabia to the West — Videos

Posted on February 7, 2017. Filed under: American History, Blogroll, Books, Catholic Church, Communications, Computers, Congress, Constitution, Corruption, Crime, Documentary, Employment, Federal Bureau of Investigation (FBI), Foreign Policy, Freedom, government spending, history, Illegal, Immigration, Islam, Islam, Language, Law, Legal, liberty, Life, Middle East, National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Rants, Raves, Religion, Religious, Shite, Speech, Sunni, Talk Radio, Taxation, Taxes, Video, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , |

Image result for book cover radical islam in america

The True Origins of Isis Ideology (Wahhabism/Salafism)

The birth of Wahhabism and the house of Saud

What is a Wahhabi and What is Wahhabism?

Wahhabism Explained

Wahhabism: The School of Ibn Taymiyyah – The Root of Terrorism?

Who Are The Salafis and Wahhabies Yusuf Estes Islam

100% Video Proof of Radical Muslim Terrorist Training Camps in America – Bill O’Reilly

Seymour Hersh’s Latest Bombshell: U.S. Military Undermined Obama on Syria with Tacit Help to Assad

Published on Dec 22, 2015

A new report by the Pulitzer-winning veteran journalist Seymour Hersh says the Joints Chiefs of Staff has indirectly supported Bashar al-Assad in an effort to help him defeat jihadist groups. Hersh reports the Joint Chiefs sent intelligence via Russia, Germany and Israel on the understanding it would be transmitted to help Assad push back Jabhat al-Nusra and the Islamic State. Hersh also claims the military even undermined a U.S. effort to arm Syrian rebels in a bid to prove it was serious about helping Assad fight their common enemies. Hersh says the Joints Chiefs’ maneuvering was rooted in several concerns, including the U.S. arming of unvetted Syrian rebels with jihadist ties, a belief the administration was overly focused on confronting Assad’s ally in Moscow, and anger the White House was unwilling to challenge Turkey and Saudi Arabia over their support of extremist groups in Syria. Hersh joins us to detail his claims and respond to his critics.

British Empire Created Radical Islam

Published on Mar 29, 2016

The Salafist and jihadist ideology behind terror attacks in Brussels, Paris and San Bernardino is a product of Wahhabism, an offshoot of Sunni Islam and the official religion of Saudi Arabia.

Prior to the 9/11 attacks Wahhabism had at best a marginal footprint in the United States. “80 percent of the 1,200 mosques operating in the US were constructed after 2001, more often than not with Saudi financing,” notes World Affairs. “As a result, Wahhabi influence over Islamic institutions in the US was considerable by 2003, according to testimony before the US Senate. Hundreds of publications, published by the Saudi government and its affiliates, and filled with intolerance toward Christians, Jews, and other Americans, had been disseminated across the country by 2006.”

The Saudis have spent billions to propagate the intolerant and hateful ideology of Wahhabism. “Between 1975 and 1987, the Saudis admit to having spent $48 billion or $4 billion per year on ‘overseas development aid,’ a figure which by the end of 2002 grew to over $70 billion (281 billion Saudi rials). These sums are reported to be Saudi state aid and almost certainly do not include private donations which are also distributed by state-controlled charities. Such staggering amounts contrast starkly with the $5 million in terrorist accounts the Saudis claim to have frozen since 9/11,” writes Alex Alexiev.

The US government has encouraged the spread of radical Wahhabism by coddling the Saudi Arabian government and insisting America shares a “special relationship” with the kingdom. The blind eye turned toward Saudi Arabia and its deplorable record in human rights was demonstrated when it was elected to the UN Human Rights Council (in fairness, the vote is primarily the fault of the UK—the British government also shares a “special relationship” with the medieval kings of Saudi Arabia and has allowed the virus of Wahhabism to spread in Britain, hence the term “Londonistan”).
http://www.infowars.com/ted-cruz-igno…

How Did Radical Islam Get Spread Throughout the World?

The Third Jihad – Radical Islam’s Vision for America – (A Clarion Project Film)

Muslims Establishing No-Go Zones in America • 1/14/15 •

Police protected USA Islam Sharia Law Cities Christians arrested End Times News Update

Who Are The Salafis and Wahhabies Yusuf Estes Islam

Radical Islam: The Most Dangerous Ideology

Why Do People Become Islamic Extremists?

Ben Shapiro: The Myth of the Tiny Radical Muslim Minority

David Horowitz – Unholy Alliance: Radical Islam and the American Left

Robert Spencer: The Theological Aspects of Islam That Lead to Jihad

My Jihad blah, blah, blah. what`s yours?

The Leftist / Islamic Alliance

David Horowitz – Progressive Racism

Sharia Law in TEXAS | State votes to secure American Law

Shariah Law? Not in Texas, says Irving Mayor

‘Hannity’ Investigation: Do Muslims Believe Sharia Law Supersedes the U.S. Constitution?

Read Full Post | Make a Comment ( None so far )

David Horowitz — Radicals: Portraits of A Destructive Passion — Videos

Posted on January 22, 2017. Filed under: American History, Articles, Blogroll, Books, Business, Communications, Congress, Constitution, Corruption, Crisis, Culture, Diasters, Documentary, Economics, Education, Employment, Environment, Faith, Family, Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Illegal, Immigration, Islam, Language, Law, Legal, liberty, Life, Links, Non-Fiction, People, Philosophy, Photos, Police, Political Correctness, Press, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Religious, Religious, Speech, Strategy, Success, Talk Radio, Taxation, Taxes, Technology, Terrorism, Unemployment, Video, War, Water | Tags: , , , , , , , , , , , , , , , , |

Image result for david horiwitz radicals: Portraits of a destructive passionImage result for david horiwitz Image result for david horiwitz

David Horowitz: Democratic Party is marching off the cliff

David Horowitz – Left Illusions: An Intellectual Odyssey

David Horowitz – The Left in Power: Clinton to Obama

Published on Jan 1, 2017

December 14, 2016 – David Horowitz’s speaks about his new book, The Left in Power: Clinton to Obama, which is volume 7 of The Black Book of the American Left, a multi-volume collection of his conservative writings that will, when completed, be the most ambitious effort ever undertaken to define the Left and its agenda.

Horowitz on Hillary Clinton and Saul Alinsky

In Depth with David Horowitz

David Horowitz discusses Radicals and who has influence over the media

David Horowitz – Unholy Alliance: Radical Islam and the American Left

A Most Excellent Explanation of the Left’s Takeover of America

David Horowitz – What The Left Believes

David Horowitz – Take No Prisoners: The Battle Plan for Defeating the Left

Rules for Radicals: What Constitutional Conservatives Should Know About Saul Alinsky

David Horowitz – The Professors: The 101 Most Dangerous Academics in America

David Horowitz interview on Charlie Rose (1997)

David Horowitz – Radical Son: A Generational Odyssey (Part 1)

David Horowitz – Radical Son: A Generational Odyssey (Part 2)

The Black Book of the American Left: The Collected Conservative Writings of David Horowitz

Published on Nov 13, 2013

David Horowitz spent the first part of his life in the world of the Communist-progressive left, a politics he inherited from his mother and father, and later in the New Left as one of its founders. When the wreckage he and his comrades had created became clear to him in the mid-1970s, he left. Three decades of second thoughts then made him this movement’s principal intellectual antagonist. “For better or worse,” as Horowitz writes in the preface to this, the first volume of his collected conservative writings, “I have been condemned to spend the rest of my days attempting to understand how the left pursues the agendas from which I have separated myself, and why.”

David Horowitz – Progressive Racism

David Horowitz

From Wikipedia, the free encyclopedia
For other people named David Horowitz, see David Horowitz (disambiguation).
David Horowitz
David Horowitz by Gage Skidmore.jpg

Horowitz in February 2011
Born David Joel Horowitz
January 10, 1939 (age 78)
Forest Hills, Queens, New York, U.S.
Occupation Conservative activist, writer
Nationality United States
Education MA, University of California at Berkeley
BA, Columbia University
Spouse Elissa Krauthamer (1959–19??; 4 children); Sam Moorman (divorced); Shay Marlowe (1990–?; divorced); April Mullvain Horowitz (current)
Children Jonathan Daniel
Ben Horowitz
Anne Pilat
Sarah Rose Horowitz (deceased)[1]

David Joel Horowitz (born January 10, 1939) is an American conservative writer. He is a founder and current president of the think tank the David Horowitz Freedom Center; editor of the Center’s publication, FrontPage Magazine; and director of Discover the Networks, a website that tracks individuals and groups on the political left. Horowitz founded the organization Students for Academic Freedom to oppose what he believed to be political correctness and leftist orientation in academia.[2]

He has written several books with author Peter Collier, including four on prominent 20th-century American political families that had members elected to the presidency. He and Collier have collaborated on books about current cultural criticism. Horowitz has also worked as a columnist for Salon; its then-editor Joan Walsh described him as a “conservative provocateur.”[3]

Horowitz was raised by parents who were members of the Communist Party USA during the Great Depression; they gave up their membership in 1956 after learning of Joseph Stalin‘s purges and abuses. From 1956–75, Horowitz was an outspoken adherent of the New Left. He later rejected leftism completely and has since become a leading proponent of conservatism. Horowitz has recounted his ideological journey in a series of retrospective books, culminating with his 1996 memoir Radical Son: A Generational Odyssey.

Family background

Horowitz is the son of Phil and Blanche Horowitz, who were high school teachers. His father taught English and his mother taught stenography.[4] During years of labor organizing and the Great Depression, Phil and Blanche Horowitz were long-standing members of the American Communist Party and strong supporters of Joseph Stalin. They left the party after Khrushchev published his report in 1956 about Stalin’s excesses and terrorism of the Soviet populations.[5][6]

According to Horowitz:

Underneath the ordinary surfaces of their lives, my parents and their friends thought of themselves as secret agents. The mission they had undertaken, and about which they could not speak freely except with each other, was not just an idea to them. It was more important to their sense of themselves than anything else they did. Nor were its tasks of a kind they could attend or ignore, depending on their moods. They were more like the obligations of a religious faith. Except that their faith was secular, and the millennium they awaited was being instituted, at that moment, in the very country that had become America’s enemy. It was this fact that made their ordinary lives precarious and their secrecy necessary. If they lived under a cloud of suspicion, it was the result of more than just their political passions. The dropping of the atomic bomb on Hiroshima had created a terror in the minds of ordinary people. Newspapers reported on American spy rings working to steal atomic secrets for the Soviet state. When people read these stories, they inevitably thought of progressives like us. And so did we ourselves. Even if we never encountered a Soviet agent or engaged in a single illegal act, each of us knew that our commitment to socialism implied the obligation to commit treason, too.[7]

After the death of Stalin in 1953, his father Phil Horowitz, commenting on how Stalin’s numerous official titles had to be divided among his successors, told his son, “You see what a genius Stalin was. It took five men to replace him.”[8] According to Horowitz:

The publication of the Khrushchev Report was probably the greatest blow struck against the Soviet Empire during the Cold War. When my parents and their friends opened the morning Times and read its text, their world collapsed—and along with it their will to struggle. If the document was true, almost everything they had said and believed was false. Their secret mission had led them into waters so deep that its tide had overwhelmed them, taking with it the very meaning of their lives.[6]

Horowitz received a BA from Columbia University in 1959, majoring in English, and a master’s degree in English literature at University of California, Berkeley.[citation needed]

Career with the New Left

After completing his graduate degree in the late 1960s, Horowitz lived in London and worked for the Bertrand Russell Peace Foundation.[9][10] He identified as a serious Marxist intellectual.

In 1966, Ralph Schoenman persuaded Bertrand Russell to convene a war crimes tribunal to judge United States involvement in the Vietnam War.[11] Horowitz would write three decades later that he had political reservations about the tribunal and did not take part. He described the tribunal’s judges as formidable, world-famous and radical, including Isaac Deutscher, Jean-Paul Sartre, Stokely Carmichael, Simone de Beauvoir, James Baldwin, and Vladimir Dedijer.[12]

While in London, Horowitz became a close friend of Deutscher, and wrote a biography of him which was published in 1971.[13][14] Horowitz wrote The Free World Colossus: A Critique of American Foreign Policy in the Cold War. In January 1968, Horowitz returned to the United States, where he became co-editor of the New Left magazine Ramparts, based in northern California.[10]

During the early 1970s, Horowitz developed a close friendship with Huey P. Newton, founder of the Black Panther Party. Horowitz later portrayed Newton as equal parts gangster, terrorist, intellectual, and media celebrity.[10] As part of their work together, Horowitz helped raise money for, and assisted the Panthers with, the running of a school for poor children in Oakland. He recommended that Newton hire Betty Van Patter as bookkeeper; she was then working for Ramparts. In December 1974, Van Patter’s body was found floating in San Francisco Harbor; she had been murdered. Horowitz has said he believes the Panthers were behind the killing.[10][15]

In 1976, Horowitz was a “founding sponsor” of James Weinstein‘s magazine In These Times.[16]

Writing on the Right

Following this period, Horowitz rejected Marx and socialism, but kept quiet about his changing politics for nearly a decade. In the spring of 1985, Horowitz and longtime collaborator Peter Collier, who had also become conservative, wrote an article for The Washington Post Magazine entitled “Lefties for Reagan“, later retitled as “Goodbye to All That”. The article explained their change of views and recent decision to vote for a second term for Republican President Ronald Reagan.[17][18][19] In 1986, Horowitz published “Why I Am No Longer a Leftist” in The Village Voice.[20]

In 1987, Horowitz co-hosted a “Second Thoughts Conference” in Washington, D.C., described by Sidney Blumenthal in The Washington Post as his “coming out” as a conservative. According to attendee Alexander Cockburn, Horowitz related how his Stalinist parents had not permitted him or his sister to watch the popular Doris Day and Rock Hudson movies of his youth. Instead, they watched propaganda films from the Soviet Union.[21]

In May 1989, Horowitz, Ronald Radosh, and Peter Collier travelled to Poland for a conference in Kraków calling for the end of Communism.[22] After marching with Polish dissidents in an anti-regime protest, Horowitz spoke about his changing thoughts and why he believed that socialism could not create their future. He said his dream was for the people of Poland to be free.[23]

In 1992, Horowitz and Collier founded Heterodoxy, a monthly magazine focused on exposing what it described as excessive political correctness on United States college and university campuses. It was “meant to have the feel of a samizdat publication inside the gulag of the PC [politically correct] university.” The tabloid was directed at university students, whom Horowitz viewed as being indoctrinated by the entrenched Left in American academia.[24] He has maintained his assault on the political left to the present day. Horowitz wrote in his memoir Radical Son that he thought universities were no longer effective in presenting both sides of political arguments. He thought “left-wing professors” had created a kind of “political terror” on campuses.[25]

In a column in Salon magazine, where he is regularly published,[3] Horowitz described his opposition to reparations for slavery. He believed that it represented racism against blacks, as it defined them only in terms of having descended from slaves. He argues that applying labels like “descendants of slaves” to blacks was damaging and would serve to segregate them from mainstream society.[26]

In keeping with his provocateur position, in 2001 during Black History Month Horowitz purchased, or attempted to purchase, advertising space in several student American university publications to express his opposition to reparations for slavery.[3] Many student papers refused to sell him ad space; at some schools, papers which carried his ads were stolen or destroyed.[3][26] Editor Joan Walsh of Salon wrote that the furor had given Horowitz an overwhelming amount of free publicity.[3][27]

Horowitz supported the interventionist foreign policy associated with the Bush Doctrine. But he wrote against US intervention in the Kosovo War, arguing that it was unnecessary and harmful to U.S. interests.[28][29]

In the early 21st century, he has written critically of libertarian anti-war views.[30][31]

In 2004, Horowitz launched Discover the Networks, a conservative watchdog project that monitors funding for, and various ties among, leftists and progressive causes.[2]

In two books, Horowitz accused Dana L. Cloud, associate professor of communication studies at the University of Texas at Austin, as an “anti-American radical” who “routinely repeats the propaganda of the Saddam regime.”[citation needed] Horowitz accused her and 99 other professors listed in his book, The Professors: The 101 Most Dangerous Academics in America, of the “explicit introduction of political agendas into the classroom.”[32]

Cloud replied in Inside Higher Ed that her experience demonstrates that Horowitz damages professors’ lives by his accusations and that he needs to be viewed as more than a political opponent.

Horowitz’s attacks have been significant. People who read the book or his Web site regularly send letters to university officials asking for her to be fired. Personally, she has received—mostly via e-mail—”physical threats, threats of removing my daughter from my custody, threats of sexual assaults, horrible disgusting gendered things,” she said. That Horowitz doesn’t send these isn’t the point, she said. “He builds a climate and culture that emboldens people,” and as a result, shouldn’t be seen as a defender of academic freedom, but as its enemy.[33]

After discussion, the National Communication Association decided against granting Horowitz a spot as a panelist at its national conference in 2008. He had offered to forego the $7,000 speaking fee originally requested. He wrote in Inside Higher Ed, “The fact that no academic group has had the balls to invite me says a lot about the ability of academic associations to discuss important issues if a political minority wants to censor them.”[33] An association official said the decision was based in part on Horowitz’s request to be provided with a stipend for $500 to hire a personal bodyguard. Association officials decided that having a bodyguard present “communicates the expectation of confrontation and violence.”[33]

Horowitz appeared in Occupy Unmasked, a 2012 documentary portraying the Occupy Wall Street movement as a sinister organization formed to violently destroy the American government.[34]

Academic Bill of Rights

In the early 21st century, Horowitz has concentrated on issues of academic freedom, wanting to protect conservative viewpoints. He, Eli Lehrer, and Andrew Jones published a pamphlet, “Political Bias in the Administrations and Faculties of 32 Elite Colleges and Universities” (2004), in which they find the ratio of Democrats to Republicans at 32 schools to be more than 10 to 1.[35]

Horowitz’s book, The Professors: The 101 Most Dangerous Academics in America (2006), criticizes individual professors for, as he alleges, engaging in indoctrination rather than a disinterested pursuit of knowledge. He says his campaign for academic freedom is ideologically neutral.[36] He published an Academic Bill of Rights (ABR), which he proposes to eliminate political bias in university hiring and grading. Horowitz says that conservatives, and particularly Republican Party members, are systematically excluded from faculties, citing statistical studies on faculty party affiliation.[37] Critics such as academic Stanley Fish have argued that “academic diversity”, as Horowitz defines it, is not a legitimate academic value, and that no endorsement of “diversity” can be absolute.[38]

In 2004 the Georgia General Assembly passed a resolution on a 41–5 vote to adopt a version of the ABR for state educational institutions.[39]

In Pennsylvania, the House of Representatives created a special legislative committee to investigate issues of academic freedom, including whether students who hold unpopular views need more protection. In November 2006 it reported that it had not found evidence of problems [clarification needed] with students’ rights.[40][41][42][43][44][45]

Family

Horowitz has been married four times. He married Elissa Krauthamer, in a Yonkers, New York synagogue on June 14, 1959.[46] They had four children together: Jonathan Daniel, Ben, Sarah Rose (deceased), and Mrs. Anne Pilat. Their daughter Sarah Rose Horowitz died in March 2008 at age 44 from Turner syndrome-related heart complications. She had been a teacher, writer and human rights activist.[1][47] She is the subject of Horowitz’s 2009 book, A Cracking of the Heart.[47]

As an activist, she had cooked meals for the homeless, stood vigil at San Quentin on nights when the state of California executed prisoners, worked with autistic children in public schools and, with the American Jewish World Service, helped rebuild homes in El Salvador after a hurricane, and traveled to India to oppose child labor.[48] In a review of Horowitz’s book, FrontPage magazine associate editor David Swindle wrote that she fused “the painful lessons of her father’s life with a mystical Judaism to complete the task he never could: showing how the Left could save itself from self-destruction.”[49]

Horowitz’s son Ben Horowitz is a technology entrepreneur, investor, and co-founder, along with Marc Andreessen, of the venture capital firm Andreessen Horowitz.[50][51]

Horowitz’s second marriage, to Sam Moorman, ended in divorce. On June 24, 1990, Horowitz married Shay Marlowe in an Orthodox Jewish ceremony conducted at the Pacific Jewish Center by Rabbi Daniel Lapin.[52]They divorced. Horowitz’s fourth and present marriage is to April Mullvain.[53]

Horowitz now describes himself as an agnostic.[54]

Funding

Politico claims that Horowitz’s activities, like the David Horowitz Freedom Center are funded in part by Aubrey & Joyce Chernick and The Bradley Foundation. Politico claimed that during 2008-2010, “the lion’s share of the $920,000 it [David Horowitz Freedom Center] provided over the past three years to Jihad Watch came from Chernick”.[55]

Controversy and criticism

Academia

Some of Horowitz’s accounts of U.S. colleges and universities as bastions of liberal indoctrination have been disputed.[56] For example, Horowitz alleged that a University of Northern Colorado student received a failing grade on a final exam for refusing to write an essay arguing that George W. Bush is a war criminal.[57][58] A spokeswoman for the university said that the test question was not as described by Horowitz and that there were nonpolitical reasons for the grade, which was not an F.[59]

Horowitz identified the professor[60] as Robert Dunkley, an assistant professor of criminal justice at Northern Colorado. Dunkley said Horowitz made him an example of “liberal bias” in academia and yet, “Dunkley said that he comes from a Republican family, is a registered Republican and considers himself politically independent, taking pride in never having voted a straight party ticket,” according to Inside Higher Ed magazine.[60]In another instance, Horowitz said that a Pennsylvania State University biology professor showed his students the film Fahrenheit 9/11 just before the 2004 election in an attempt to influence their votes.[61][62] Pressed by Inside Higher Ed, Horowitz later retracted this claim.[63]

Horowitz has been criticized for material in his books, particularly The Professors: The 101 Most Dangerous Academics in America, by noted scholars such as Columbia University professor Todd Gitlin.[64] The group Free Exchange on Campus issued a 50-page report in May 2006 in which they take issue with many of Horowitz’s assertions in the book: they identify specific factual errors, unsubstantiated assertions, and quotations which appear to be either misquoted or taken out of context.[65][66]

Allegations of racism

Chip Berlet, writing for the Southern Poverty Law Center (SPLC), identified Horowitz’s Center for the Study of Popular Culture as one of 17 “right-wing foundations and think tanks support[ing] efforts to make bigoted and discredited ideas respectable.”[67] Berlet accused Horowitz of blaming slavery on “black Africans … abetted by dark-skinned Arabs” and of “attack[ing] minority ‘demands for special treatment’ as ‘only necessary because some blacks can’t seem to locate the ladder of opportunity within reach of others,’ rejecting the idea that they could be the victims of lingering racism.”[67][not in citation given]

Horowitz published an open letter to Morris Dees, president of the SPLC, saying that “[this reminder] that the slaves transported to America were bought from African and Arab slavers” was a response to demands that only whites pay reparations to blacks. He said he never held Africans and Arabs solely responsible for slavery. He said that Berlet’s accusation of racism was a “calculated lie” and asked that the report be removed.[68] The SPLC refused Horowitz’s request.[69] Horowitz has criticized Berlet and the SPLC on his website and personal blog.[70][71]

In 2008, while speaking at University of California, Santa Barbara (UCSB), he criticized Arab culture, saying it was rife with antisemitism.[72][73] He referred to the Palestinian keffiyeh, a traditional Arab head covering that became associated with PLO leader Yasser Arafat, as a symbol of terrorism. In response, UCSB professor Walid Afifi said that Horowitz was “preaching hate” and smearing Arab culture.[73]

Criticizing Islamic organizations

Horowitz has used university student publications and lectures at universities as venues for publishing provocative advertisements or lecturing on issues related to Islamic student and other organizations. In April 2008, his ‘David Horowitz Freedom Center’ advertised in the Daily Nexus, the University of California Santa Barbara school newspaper, saying that the Muslim Students’ Association (MSA) had links with the Muslim Brotherhood, Al Qaeda, and Hamas.[74]

In May 2008, Horowitz, speaking at UCSB, said that the Muslim Students’ Association supports “a second Holocaust of the Jews”.[73] The MSA said they were a peaceful organization and not a political group.[74] The MSA’s faculty adviser said the group had “been involved in interfaith activities with Jewish student groups, and they’ve been involved in charity work for national disaster relief.”[73] Horowitz ran the ad in The GW Hatchet, the student newspaper of George Washington University in Washington, D.C. Jake Sherman, the newspaper’s editor-in-chief, said claims the MSA was radical were “ludicrous”. He vowed to review his newspaper’s editorial and advertising policies.[75]

Horowitz published a 2007 piece in the Columbia University student newspaper, saying that, according to [unnamed and undocumented] public opinion polls, “between 150 million and 750 million Muslims support a holy war against Christians, Jews and other Muslims.”[76] Speaking at the University of Massachusetts Amherst in February 2010, Horowitz compared Islamists to Nazis, saying: “Islamists are worse than the Nazis, because even the Nazis did not tell the world that they want to exterminate the Jews.”[77]

Horowitz created a campaign for what he called “Islamo-Fascism Awareness Week” in parody of multicultural awareness activities. He helped arrange for leading critics of radical Islam to speak at more than a hundred college campuses in October 2007.[78] As a speaker he has met with intense hostility.[79][80][81]

In a 2011 review of anti-Islamic activists in the US, the Southern Poverty Law Center identified Horowitz as one of 10 people in the United States’ “Anti-Muslim Inner Circle”.[82]

Conservatism

Horowitz’s Frontpage Magazine published Ron Radosh‘s critical review of Diana West‘s book American Betrayal. Conservatives John Earl Haynes and Harvey Klehr, scholars of Soviet espionage, defended Horowitz for publishing the review and Radosh for writing it.[83] Vladimir Bukovsky, a Soviet dissident, rejected Radosh’s criticisms and said it was an attempt to portray West as a historically inept conspiracy-monger.[84]Horowitz defended the review in an article on Breitbart’s Big Government website.[85]

Other

In 2007, Lawrence Auster (January 26, 1949 – March 29, 2013) stated that Horowitz had rejected him from publishing in Frontpage Magazine for making racist statements.[86][87]

Books and other publications

Histories

(all co-authored with Peter Collier)

  • The Rockefellers: An American Dynasty (New York: Holt, Rinehart and Winston, 1976) ISBN 0-03-008371-0
  • The Kennedys: An American Drama (New York: Summit Books/Simon & Schuster, 1985) ISBN 0-671-44793-9
  • The Fords: An American Epic (New York: Summit Books/Simon & Schuster, 1987) ISBN 0-671-66951-6
  • The Roosevelts: An American Saga (1994)

https://en.wikipedia.org/wiki/David_Horowitz

Read Full Post | Make a Comment ( None so far )

Trump Selects Former Indiana Senator Dan Coats for National Intelligence Director — Is Julian Assange A Russian Cuttout? — American People Rejected Clinton and Obama — Videos

Posted on January 5, 2017. Filed under: American History, Articles, Blogroll, Communications, Computers, Congress, Constitution, Corruption, Crime, Defense Intelligence Agency (DIA), Documentary, Education, Elections, Employment, Faith, Family, Federal Government, Foreign Policy, Freedom, government, government spending, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, media, Music, National Security Agency (NSA), Newspapers, Photos, Police, Politics, Presidential Candidates, Radio, Rants, Raves, Television, Water, Wealth | Tags: , , , , , , , , , , |

Image result for cartoons democrats blame russia hackImage result for cartoons democrats blame russia hackImage result for cartoons clinton to blame for losing

Image result for cartoons clinton to blame for losing

Image result for cartoons clinton to blame for losing

Former Senator Dan Coats picked as national intel director

Donald Trump Picks Dan Coats For National Intelligence Director | Closing Bell | CNBC

Trump waging war with the intelligence community

Trump Denies Russia’s Involvement In Hacking

Trump blasts claim Russia hacked the election

Julian Assange FULL Interview 1/3/17

Julian Assange NEW LEAKS “Laura Ingraham” Barack Obama Wrong – Vladimir Putin Didn’t Hack Election

JUDGE “RUSSIA DID NOT HACK THE ELECTION”! CHAOS! CHUCK TODD AND REINCE PRIEBUS GO AT IT!

Russia mocks President Obama with ‘lame duck’ tweet

Putin: The Democrats are looking for someone to blame

WOW! The Democratic Leadership in there candidate have lied cheated and tried to steal the….

Who’s To Blame For Hillary Clinton’s Loss?

Democrats losing on all fronts, looking for scapegoats – Putin on US elections

Why Hillary Campaign Tried To Silence Mika Brzezinski

Clinton Refuses To Take The Blame

Democratic Blame Game: Is Obama in Denial?

Why Democrats’ 2020 Candidates Are Already Losers

NSA Chief: Russia Hacked the 2016 Election

Blame Game (VEVO Presents: G.O.O.D. Music)

Read Full Post | Make a Comment ( None so far )

Circling The Drain –The Blaze and Glenn Beck? — A Crash Course — The Inescapable Consequences of Personality Disorders — Get Help — If Beck Gets Help, He Will Comeback! — Progressive Liars Are Going Crazy — Videos

Posted on January 4, 2017. Filed under: American History, Articles, Blogroll, Books, College, Communications, Constitution, Culture, Documentary, Economics, Education, Employment, Family, Fiscal Policy, Freedom, Government Land Ownership, government spending, history, Illegal, Immigration, Inflation, IRS, Law, Legal, liberty, Life, Links, Literacy, Money, Non-Fiction, People, Philosophy, Photos, Political Correctness, Politics, Press, Programming, Psychology, Radio, Religious, Speech, Strategy, Taxation, Taxes, Unemployment, Video, War, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , , , , , , , |

Image result for cartoons glenn beck crazy

Image result for progressive liars book cover glenn beck

Charlie Rose interviews Glen Beck about the 2016 Presidential Campaign

Hannity Interviews Glenn Beck About Donald Trump Not Being Conservative

Glenn Beck Book Signing for Liars

Glenn Beck on Liars.

Tucker Carlson Talks Glenn Beck Sanity / Facebook Meeting & Trump Vp Pick

Intro to Psychology – Crash Course Psychology #1

Feeling All the Feels: Crash Course Psychology #25

Emotion, Stress and Health: Crash Course Psychology #26

Psychological Disorders: Crash Course Psychology #28

OCD & Anxiety Disorders: Crash Course Psychology #29

Depressive and Bipolar Disorders: Crash Course Psychology #30

Trauma & Addiction: Crash Course Psychology #31

Personality Disorders: Crash Course Psychology #34

Getting Help – Psychotherapy: Crash Course Psychology #35

Biomedical Treatments: Crash Course Psychology #36

TO OVERCOME DEPRESSION | ANXIETY | HARD TIMES – Very Motivational

How to get rid of anxiety

Stop Anxiety & Panic Attacks

GLENN BECK’S THEBLAZE MAY FINALLY BE BURNING OUT

Glenn Beck’s Mental Disorder

Posted on March 2, 2016 by Robert Ringer

Font:
Small
Medium
Large

Open Sans
Times New Roman
Hide

I’ve written about Glenn Beck’s painful demise many times over the years, even giving my readers an early heads-up that his days at Fox News were numbered. “Hell hath no fury like a woman scorned,” wrote 16th century playwright William Congreve. And he was right, because when it comes to Beck, I feel like a scorned woman. I really loved the guy in his early days at Fox, then suddenly he turned on me, along with the rest of his viewers.

In his first year at FNC, I was awed by Beck’s raw talent and no-holds-barred disrobement of the radical left. The fact that he was the most hated man in America was de facto proof that he was a fearless truth-teller, because the people of the lie — those millions of chronically dishonest folks in both the radical-left and conservative-establishment wings of the Demopublican Party — harbor venomous contempt for anyone who dares to expose their lies.

But after Beck’s first year at Fox, it was all downhill. The first time the thought crossed my mind that perhaps he wasn’t authentic was when he held a rally in Washington D.C. and a half million people showed up. I was there, and I can honestly say that I didn’t know what the point of the rally was, but the half million people in attendance were clearly mesmerized.

It wasn’t until much later I realized that the only purpose of the D.C. event was to provide a forum for Beck’s followers to assure him how much they loved him. Really, there was absolutely no agenda other than “We love Glenn Beck!”

Once that chink in Beck’s armor was exposed, the second chink came when he started restricting the guests on his show to clergymen and no-name religious scholars like David Barton, whom he stunningly, and often, referred to as “the most important man in America.” It was such a ludicrous statement that it made me wonder if Beck was once again getting cozy with Jack Daniels.

But it got even worse when, in his dwindling days at Fox, Beck sat on the edge of his desk for the entire hour of each show and gave what appeared to be an extemporaneous monologue. I was amazed at his ability to talk for an hour without notes, but, even so, it became very boring after a week or two. Increasingly, he appeared to be a beleaguered and lost soul.

Finally, as I had predicted to my readers, Beck parted ways with Fox News and started a new media company that he said would make his enemies wish he were back at Fox where he was on the air only an hour a day. Unfortunately for him, it hasn’t worked out quite that way.

As Beck began to realize he had become yesterday’s news, he started popping up on “The O’Reilly Factor” and “The Kelly File.” His slobbering all over Bill O’Reilly and Megyn Kelly was difficult to watch. (Fortunately, I no longer watch Malevolent Megyn at all.)

Beck’s attempts at getting attention are nothing short of embarrassing. When he was still at Fox, he somberly announced that his doctor had told him he was on the verge of possibly losing his eyesight. It’s nice to know that that didn’t happen. Then, after he left Fox, he supposedly had a mysterious, life-ending illness, but that apparently disappeared as well.

Finally, there was what he described as “the most deadly decision of [my] career” — announcing that, in a show of compassion, he was going to send truckloads of food and supplies to the Central American refugee kids who flooded the southern border of the U.S. in 2014.

Beck’s personality reminds me of Jim Jones of Jonestown fame. Perhaps becoming a cult leader is his ultimate destiny, because he desperately needs people to follow him, listen to him, and adore him. He is a man in search of true believers who will follow him to the ends of the earth.

On to the next chapter: Just when Beck was almost out of ideas on how to get attention and regain his stardom, along came an unlikely new politician by the name of Donald Trump. It was almost too good to be true. Beck saw what he thought was a golden opportunity to make himself into a hero by focusing his attention on bashing the media’s newest version of the Antichrist.

It’s now become his fulltime job. He demonizes Trump all day, every day, and has literally pleaded with his audiences to vote for anyone but The Donald. He even joined an angry bunch of establishment losers (people for whom he had always expressed considerable contempt) by signing on to the National Review’sdesperation piece to stop Trump.

As one would expect, he has repeatedly warned his listeners and readers that Trump’s rise to power parallels that of Adolf Hitler’s. And speaking of Hitler, in a recent article on his blog, Beck even said that he would vote for Hitlary Clinton if it came down to her or Trump. He then took it over the edge by saying, “I’m warning you now, you will say after two years of Donald Trump, ‘I’d give my right arm for Barack Obama.’”

In truth, of course, Beck’s mental disorder has nothing to do with Donald Trump and everything to do with his psychopathic need for attention. The only other theory I can come up with is that he is — as childish as it may seem — insanely jealous of Trump for all the attention he’s been getting.

It probably brings back painful memories of his own glory days in the spotlight — before those nasty mental demons gained control of his mind. It appears Beck is trying to piggyback onto Trump’s fame in an effort to get noticed. Unfortunately, it’s not working, and he’s only succeeding in making himself look ever more pathetic.

I would hate to see anything bad happen to this once-great talent, but I truly believe that if those closest to Glenn Beck don’t get him some serious psychiatric help soon (Where is Keith Ablow when you need him?), he could end up as a face-in-the-gutter alcoholic once again — or, worse, he might even do harm to himself or others.

Having said all this, in fairness, Glenn Beck isn’t alone when it comes to Trump Derangement Syndrome. The fact is that his views are shared by millions of Trump haters throughout the world.

Putting Beck’s mental issues aside for a moment, the Trump phenomenon is not all that complicated. Thanks to the radical left — and the establishment right that carries the left’s water — people’s anger over their loss of freedom and the intentional destruction of their country has reached the pitchfork stage.

Even so, the D.C. Crime Syndicate remains in denial, and its members are hysterical at the thought that they are in the process of losing their stranglehold — not just over Washington, but over all of America as well. They see Trump as a threat to both their power and their monopoly on legalized theft.

But the truth be known, Trump haters like Beck give Trump far too much credit. There’s no question he’s a narcissist. There’s no question he’s an egomaniac. There’s no question he’s rude, crude, and nasty. No one disputes any of these unflattering Trump qualities.

What Trump haters don’t get, however, is that these are the very qualities that millions of people actually want in a new president, so he can take down the Washington establishment. The best way to think of Trump is as a wrecking ball that has a good chance of destroying the D.C. Crime Syndicate.

Simply put, the Trump phenomenon is nothing more than long-overdue blowbackfrom everyday Americans yet, amazingly, the delusional establishment still has no clue. What Trump actually does if he becomes president is almost secondary to those who support him. Right now, people just want the Washington power structure dismantled, and they figure that once that’s accomplished, they can sort things out later if Trump’s less than endearing qualities prove to be a problem.

In the meantime, in the event you’ve never read Glenn’s Beck’s The Blaze on the Internet, you should do so for a couple of days. His obsession over DT will take your breath away. I tell you, the man has a serious mental disorder, and I mean that literally. Sad … very, very sad.

https://robertringer.com/glenn-becks-mental-disorder/

Glenn Beck’s Blaze Circling The Drain

Published on Oct 5, 2016

Glenn Beck isn’t great at business or money management. Word on the street is The Blaze is about dead. They could really use a random billionaire bailout right about now. Cenk Uygur and John Iadarola, hosts of The Young Turks, break it down. Tell us what you think in the comment section below. http://tytnetwork.com/join

“Sources inside Glenn Beck’s once-mighty multimedia production company say that Beck is falling apart as his media empire collapses around him.

An employee of Beck’s flagship website TheBlaze.com told Huffington Post in an article published Wednesday that the few remaining staff are “looking for an exit” because they expect the site to be shuttered soon for good.

Huffington Post’s Michelle Fields said that TheBlaze.com is “suffering from a lack of editorial direction, staff attrition and internal discord” and that the mood among employees is “somber” as they’ve watched a 25-member editorial team get whittled down to six people — with more cuts expected.

“The few people who are still left are looking for an exit because they know The Blaze is over,” the source told Fields. “They haven’t told us straight up that they’re done with us, but all the signs point to it, and they’re not replacing people who are laid off or get out.”
Other employees report that their healthcare benefits were reduced over the summer and that in September, all of their travel and phone stipends were cut off. In June, the company closed its vast New York City newsroom and the remaining employees are working from home.”*

Read more here: https://www.rawstory.com/2016/10/the-…

[youtube-https://www.youtube.com/watch?v=eQS_mYXof8s]

Glenn Beck Rips Into Ted Cruz For Endorsing Trump

Glenn Beck Goes Bananas After Ted Cruz Endorses Trump

Glenn Beck’s ‘The Blaze’ Is Burning Down

Published on Aug 1, 2016

The Blaze is in a lot of trouble. Cenk Uygur, host of The Young Turks, breaks it down. Tell us what you think in the comment section below.

“Conservative television and radio host Glenn Beck has filed a lawsuit in Texas against the man who used to run his entertainment and news network, TheBlaze, according to sources close to Mr. Beck. The petition, obtained by LawNewz.com, was filed on behalf of Mercury Radio Arts, which serves as Beck’s production and operating company over TheBlaze. The complaint accuses Chris Balfe of breach of contract, general mismanagement, breach of fiduciary duty, and fraud. Balfe served as the COO of Mercury Radio Arts and was CEO of TheBlaze until he left in December 2014 to start his own company, Red Seat Ventures. Balfe had worked for Beck for more than 10 years, and was credited with helping to grow Beck’s business.

“I am embarrassed and saddened it has come to this. It is an ongoing legal matter so you will not hear me speak of this often but as always, I want you to hear it from me,” Beck wrote on his website on Monday.

Beck’s lawsuit comes amid reports of internal financial turmoil at TheBlaze. The complaint alleges between 2009 and 2014, Balfe’s compensation totaled in excess of $13 million.”

Read more here: http://lawnewz.com/high-profile/exclu…

THE FALL OF GLENN BECK!

Glenn Beck: ‘I Think People Think That I’m … Nuts’

Glenn Beck’s Secret Brain Trouble, How He ‘Fixed’ It Is Most Troubling Of All

How Glenn Beck Overcame His Serious Health Issues: “It Was A Miracle”

Glenn Beck Describes His Pivot Point, And The Support of His Wife

Glenn Beck’s Secret Brain Trouble, How He ‘Fixed’ It Is Most Troubling Of All

Glenn Beck’s Mystery Illness Diagnosed By Quack Doctor

The Young Turks Are Falling Apart

“Up/Down” Bipolar Disorder Documentary FULL MOVIE (2011)

Tomi Lahren | Final Thoughts 11/28/16

Aerosmith – Crazy

Paul Simon – Still Crazy After All These Years

Lyrics

I met my old lover
On the street last night
She seemed so glad to see me
I just smiled
And we talked about some old times
And we drank ourselves some beers
Still crazy after all these years
Oh Still crazy after all these years

I’m not the kind of man
Who tends to socialize
I seem to lean on
Old familiar ways
And I ain’t no fool for love songs
That whisper in my ears
Still crazy after all these years
Oh still crazy after all these years

Four in the morning
Crapped out
Yawning
Longing my life away
I’ll never worry
Why should I?
It’s all gonna fade

Now I sit by my window
And I watch the cars
I fear I’ll do some damage
One fine day
But I would not be convicted
By a jury of my peers
Still crazy after all these years
Oh still crazy
Still crazy
Still crazy after all these years

Report: Glenn Beck’s The Blaze ‘Falling Apart’

The Huffington Post reportson the continuing problems engulfing The Blaze founder Glenn Beck’s troubled media empire.

From The Huffington Post:

Glenn Beck’s website The Blaze is coming apart, suffering from a lack of editorial direction, staff attrition and internal discord, according to sources inside the news outlet.

The site, which Beck launched in 2010 to serve as the conservative counterpart to The Huffington Post, has dropped from 25 employees on its editorial side to just six. A source inside The Blaze, who requested anonymity for fear of retribution, told HuffPost that the mood among the rapidly diminishing news team is somber.

“The few people who are still left are looking for an exit because they know The Blaze is over,” the source said. “They haven’t told us straight up that they’re done with us, but all the signs point to it, and they’re not replacing people who are laid off or get out.”

Read the rest here.

http://www.breitbart.com/big-journalism/2016/10/13/report-glenn-becks-blaze-falling-apart/

VIA THE BLAZE

BAD BLOOD

Blazingly Mad Glenn Beck Sues His Fired CEO Christopher Balfe

The suit—in which Beck’s privately held company, Mercury Radio Arts, is the plaintiff and seeks a jury trial—alleges fraud, breach of contract, dereliction of duty, and various other misdeeds.

Lloyd Grove

LLOYD GROVE

08.01.16 5:45 PM ET

In what one former associate of Glenn Beck described as “the last gasp of a dying empire,” the volatile right-wing radio, streaming video, and cable television personality is suing his longtime former chief executive, Christopher Balfe, whom Beck fired in December 2014.

The suit—in which Beck’s privately held company, Mercury Radio Arts, is the plaintiff and seeks a jury trial—alleges fraud, breach of contract, dereliction of duty, and various other misdeeds.

“I feel terrible for Glenn and I hope he finds the help that he needs,” Balfe, who worked closely with Beck for nearly two decades before their split, said Monday in a statement to The Daily Beast.

“The lawsuit speaks for itself,” said a spokesman for Beck—the only comment provided.

Beck, meanwhile, told listeners and viewers Monday of his syndicated radio program, which is video-streamed on his paid-subscription site TheBlaze.com: “I am—[Beck’s wife] Tania and I—are both really saddened by this and saddened that it has come to this.”

The 16-page complaint was filed quietly Friday in Dallas County, Texas, District Court, and apparently leaked Sunday night as an “exclusive” to the Lawnewz.com website, with another account splashed on GlennBeck.com.

“There are articles that have come out today on apparently lawsuit websites. I’m not going to give them publicity,” Beck told his fans. “And you’ll see more articles, I would assume, over the next few days. It’s an ongoing legal matter. And you’re not going to hear me talking much about it.”

Then, despite his insistence on not giving publicity to stories about the lawsuit, Beck recited the web addresses of the articles in question.

He is, of course, well known for changing his mind—campaigning hard during the Republican primaries for former presidential candidate Ted Cruz, for instance, mere months after announcing with spectacular fanfare that he was leaving politics for good.

Beck’s lawsuit is sharply at odds with previous expressions of gratitude he made three months after Balfe, along with fellow ex-Beck executive Joel Cheatwood, left Mercury Radio Arts, where Balfe was chief operating officer, and its subsidiary The Blaze, where Balfe was CEO.

“Chris and Joel helped me build one of the industry’s first truly independent multi-media companies,” Beck declared in March 2015, after Balfe and Cheatwood, who had steered Beck’s cable television career at HLN and Fox News, announced their formation of a new digital media company, Red Seat Ventures, and took several more top Beck executives with them. “I am sad to see them go but they left our company with an incredible foundation.”

Balfe retained minority ownership in The Blaze after he left, according to the lawsuit, and two sources familiar with the arrangement told The Daily Beast that his deferred compensation agreement featured monthly payments to satisfy around a million dollars that Balfe is owed under the agreement for both his ownership stake and his pro-rated share of company revenues.

But in recent weeks, say these sources, The Blaze has experienced cash-flow problems and has been having trouble paying vendors, while the website’s online traffic has plunged from around 26 million monthly global unique visitors in January 2015, the month after Balfe was dismissed, to around 10 million currently, according to the measuring service Quantcast.

Several more key executives have departed in the past year, along with Beck’s longtime television agent, George Hiltzik, as well George’s son Matthew Hiltzik, who recently resigned as the outside publicist for Beck and his companies; New York PR maven Davidson Goldin now has that account.

In another blow to The Blaze’s financial stability, the cable television distributor Cablevision recently stopped carrying Beck’s programming—representing an annual loss to The Blaze estimated at more than $2 million in subscriber fees and advertising sales, according to the sources.

By clicking “Subscribe,” you agree to have read the Terms of Use and Privacy Policy

These sources described Beck’s lawsuit as a pre-emptive strike.

They said that in June, after failing to receive his regular check, Balfe notified Beck’s company that if he wasn’t paid quickly, he would be exploring his options to obtain the money due him.

This none-too-veiled threat prompted Beck to file his own lawsuit claiming, instead, that Balfe actually owes him money—a portion of the $13 million Beck claims Balfe was paid as an executive between 2009 and 2014.

“This is a shockingly excessive amount that far exceeds appropriate compensation for companies of Mercury and TheBlaze’s size and financial performance,” the lawsuit contends.

But back in March of last year, when Balfe and Cheatwood were launching Red Seat Ventures, the 52-year-old Beck gushed: “I am truly grateful that we remain friends and am very excited to see what they do next.”

Their friendship didn’t survive, however, after Beck hired a little-known tech entrepreneur named Jonathan Schreiber, a diehard “superfan” of Beck’s syndicated radio program, who arrived in September 2014 from Israel via Miami, networked his way into Beck’s inner circle, gained the boss’s confidence and began accumulating power in the operations of both Mercury Radio Arts and The Blaze.

According to company employees, as The Daily Beast reported last February, Beck seemed to have become infatuated with Schreiber, who first showed up at The Blaze’s now-defunct Manhattan studios, and later had been regularly spotted in Beck’s expansive, glass-walled office at the rambling company headquarters in the Dallas suburb of Las Colinas—sometimes hugging his idol after a heart-to-heart.

Schreiber’s Orthodox Judaism apparently was in sync with Beck’s ardent religiosity as a Mormon convert, although staffers said Schreiber—who became president of Beck’s parent company—had an off-putting, arrogant manner with underlings, who gave him the nickname “Voldemort.”

Back in February, as Beck increasingly complained about Balfe and others who had helped orchestrate his career, Schreiber defended his own leadership to The Daily Beast.

“Glenn Beck, brilliant media mogul, realized he was unhappy in the direction his company was going so he brought in new blood,” he said in an email. “The goal being to put the company in the right direction. Through that process we separated with many people. Some will be missed, some less so.”

He added: “I am very proud of my work here, I am very proud of the culture we have created AND PROUD OF [his capital letters] the people WE have been able to bring in to the fold… No one likes to admit that they are not here because of themselves, it must be Voldemort.”

http://www.thedailybeast.com/articles/2016/08/01/blazingly-mad-glenn-beck-sues-his-fired-ceo-christopher-balfe.html

Glenn Beck’s Farewell Address to His 40 Laid-Off Troops… from His Pretend Oval Office

 

In a special video posted to his website today, Glenn Beck addressed news reports of the latest mass layoffs at his troubled media empire.

According to a report yesterday in the Daily Beast, Beck laid off 40 employees of his Blaze media organization “in order to satisfy the requirements of a multimillion-dollar bank loan taken out recently to keep Beck’s revenue-challenged enterprise running.”

As the Daily Beast noted, “This latest round of mass firings comes as no surprise to insiders at The Blaze and Mercury Radio Arts, which laid off dozens of employees last May on a day referred to internally as ‘Black Monday,’ around the same time that Beck was purchasing a private jetliner and a $200,000 Maybach sedan.”

In the video released today, Beck is seen seated at a replica of the Resolute desk in his mock Oval Office set delivering the opening monologue of his radio show.

Below is the transcript of his remarks.

***

I wanted to start there today because there’s a story that maybe you have read that came out yesterday that is talking about how yesterday my company, TheBlaze, laid off 40 people. And my media empire is crumbling. And part of it is because I’m traveling around with Ted Cruz.

Well, I want you to know, yes, I’ve lost a lot of money traveling around with Ted Cruz. I’ve lost about half a million dollars. That’s my choice. I believe in something.

Did that cause the 40 people to lose their job? No.

I want to talk to you today because we’re in a community together, and I trust you. And I tried to be trustworthy. And when I make a mistake, I own up to it. And I’m a trusting guy.

I think anybody on the show will tell you my biggest problem is I trust everybody, until they prove otherwise. And I try to live my life in a transparent way. And I try to surround myself with others that I believe are trustworthy.

And then I went on to build my own company with an authentic voice, a trustworthy company. And one of my main principles — and you heard me saying Isaiah it a million times: We take on no debt. Root ourselves in principles and people. Live within our own means.

And I trusted the people that ran my company, that they wanted the same things. And in the beginning, maybe they did want the same things. But a couple of years ago, I realized there were problems in my own company, and that even though the managers were all saying the right things to me, those things were never getting done. And you know this to be true. Because I would talk about things that we were going to do on TheBlaze and everything else, and then they never seemed to materialize. And I was losing credibility with you, but behind the scenes, I was a holy terror for about a year because I couldn’t find out what was going on.

Without saying anything bad about anybody because we just have different principles, the people I had moved down to Dallas and the rest was in New York and Los Angeles and Washington, DC — and we were working now towards being, I guess, a normal, status quo kind of media company, a big media company, and I didn’t ever want that.

But because our team was split from Dallas, Los Angeles — I think we had people at one time in Chicago, Washington, and New York — I didn’t know who really got the vision and who didn’t, who got it and who didn’t.

It was almost two years ago when we had a museum here at the studios in Dallas. And we invited you to come and just see the museum. And I bet there were 10,000 people here that came through — and I loved it. And everybody kept telling me, go home. Go home. Go home. And I wouldn’t go home. None of us did. Nobody on the show went home.

We were there and we spent that whole weekend with you because we love you. We love you.

But I noticed one thing about my company. Not one single person from the management team actually showed up that entire weekend. And I realized, they didn’t love the audience like I did. They weren’t connecting to the message like you did and I did. I’m not sure they were part of the culture of the principles. And I knew I had to get a hold of my company again, and that would mean making really hard choices.

First one was, are you going to stick to your principles? You going to be honest with yourself? Stand for what you believe in, or are you going to give into the status quo and go along to get along? Because these people were my friends, they were my partners, and I don’t know at the time, I thought maybe they were right. But I knew they weren’t in my gut.

And my gut and my spirit said, “Stick by what you know, even if it’s hard and even in the end if you lose.”

I had to start firing people, people that I counted as my friends, best friends, partners. And the process that I began was the hardest process of my life. Yeah, almost as hard as picking myself up off of that carpet when I was facing suicide, that carpet that smelled like soup. But this time I had something I didn’t have before: I had you. I knew you existed. I knew that you believed in the same principles I believe and that we — no, that I had made a promise to you. Our lives, our fortunes, and our sacred honor.

And so I kept going. This has been a really hard five years for me, but the last 18 months have been unbelievable. One thing I had to do was get everyone in my house under one roof so I could look everyone in the eye. Culture matters at a company.

I stopped telling you about the things that were coming on TheBlaze. It’s called the Phoenix project. We’ve been working on it now for about nine months. I haven’t talked to you about it, nor will I until we launch it. I’m tired of telling you the things that I think we’re going to do. I bet you are too. We’re just going to do them. Because I failed you too many times.

The reason the articles like the one that came out yesterday are coming out, part of it is political. Part of it is because Frank Sinatra was right, some people get a kick out of stomping on your dreams. They really do.

Some is, I guess, it’s news when somebody loses their job. Unfortunately, my media company isn’t the only place in America laying people off. My media company is not the only one that’s looking at their balance sheet and saying, “We can’t go into debt, or we’re going to lose all of the jobs.”

They said in this article yesterday — this has been claimed before that my business is failing. I will tell you, two years ago, it was. It was absolutely on fire. Because when I started to go into the books — I was a bad steward. And when I started going into the books and see what had been done to my company that didn’t ever take on debt, I was first told that we were, I think, $4 million in debt. And then it became $7 million in debt. And then when I got the final accounting, 18 months ago, my company that doesn’t take on debt was $13 million in debt.

If I’m going to tell you you shouldn’t have debt, how could I have a company that was $13 million in the hole? I made really hard decisions. And in 18 months, my company that is dying and struggling paid our debt down from 13 million to two.

A couple of months ago, we had a great sponsor of ours, about a 7-million-dollar-a-year sponsor go broke. I feel for that company because everybody that worked for that company, much larger than mine, went out of business. And they left us with a lot of debt.

You see, economies, it’s — it’s like Jenga. One person pulls one big thing out, and the whole thing could fall. But it definitely weakens. And the more pieces of stress or the more pieces that come out of Jenga, the weaker your house becomes. Somebody — Delco goes out of business because GM is no longer making their cars in Ohio, and so that hurts Delco. And then that hurts the grocery store down the street and the restaurants in the town.

We’re in this together. I’m not going to tell you that I’m not running a fail company because the proof is in the pudding. I will just tell you the old managers got us into $13 million of debt. And in less than 18 months, we’ve shaved that off by over $10 million. That doesn’t seem like a failing business. That seems like a business that is thriving and is doing its best to set its principles right.

But I want you to know, when you read TheBlaze, because I’m not happy with it — and I’ve quietly said that recently, over the last year or so. Not happy with it. But it’s changing. We just hired one of the guys who put together American Idol, Oreo cookies. We just hired a guy who was one of the main guys at Good Morning America and CNN. We just hired an HR person from Viacom. I’m rebuilding. And it will be a lot better for me honestly — honestly, it would be a lot better if I would have just filed Chapter 11. But I actually like Harry Truman too much. I don’t believe — Chapter 11, sometimes you have to do. Chapter 7, sometimes you have to do.

But I wanted to pay every single person back because it’s not their fault. It was my fault for not watching what people were doing underneath me.

One last thought and then I’ll move off: When I first put TheBlaze on the air, it was GBTV. And I won a hammer. It’s the Tribeca Disruptive Innovation Award. It’s a disrupter’s award. It goes to some of the best disrupters in the world. I couldn’t believe I was in the room when I won this award. That year, I earned that award because we broke television and we’re the first one to make it an app and put it online.

I haven’t earned this hammer a day since. But I will tell you this: Sometimes it takes a hammer to break what is broken so you can rebuild it. And in today’s world and economy, if you ever get fat and sassy, if you ever start to put profits over people, if you ever decide, “I really don’t need — I really don’t — I don’t care what the people say. Yeah, yeah, they’re customers. They’ll just keep coming.” No, they won’t. You have to innovate every day. You have to actually love your customer every day. You have to actually care about them and wonder, “How can I make their life better or easier?” And when you do that and you understand that by doing that you’re disrupting the entire system and you’ll go places that will scare the living daylights out of you, but you proceed without fear, that’s when you will win.

I’m not going to tell you we’re going to win. I’m just going to tell you, watch us. Watch us over the next year.

http://www.breitbart.com/big-journalism/2016/04/29/glenn-becks-farewell-address-40-laid-off-troops-pretend-oval-office/

PHOTO CHRIS KEANE/REUTERS

Head of Glenn Beck’s Media Empire Quits as The Blaze Burns Down

Kraig Kitchin will stay with the company, but resigned from the top job after friction with fellow Beck executive Jonathan Schreiber. A ‘mass exodus’ of staff may follow.

Lloyd Grove

LLOYD GROVE

01.29.16 5:56 PM ET

In what knowledgeable observers say is a sign of increasing turmoil in Glenn Beck’s troubled media empire, Beck’s longtime mentor and corporate executive, Kraig Kitchin, has quit as CEO of The Blaze.

Kitchin’s replacement, Stewart Padveen, a digital startup entrepreneur who joined Beck’s company last summer, will be the fourth leader of The Blaze since late 2014.

Kitchin, 54, who took over operations of Beck’s conservative-leaning subscription digital and cable television enterprise last June—after two previous CEOs abruptly left in the space of six months—is resigning along with two other senior executives: Jeremy Price, director of advertising sales, and Liz Julis, director of marketing.

Both are based in New York, 1,500 miles removed from corporate headquarters in the Dallas suburb of Irving, Texas.

Several other key employees, including at least two senior producers based in The Blaze’s shrinking New York operation, are expected to follow them out the door.

A source close to the situation predicted a “mass exodus” from the New York studios, which are housed in a largely unoccupied 35,000 square-foot space at Midtown Manhattan’s Bryant Park, previously rented by Yahoo, under a 10-year lease costing Beck’s privately held company an estimated $2 million a year.

Kitchin—who co-founded Premiere Radio Networks three decades ago and has worked with personalities as diverse as Rush Limbaugh, Ryan Seacrest, Whoopi Goldberg, and Beck—tried to put the best face on his resignation in a company-wide email sent out Thursday night.

He described his apparently self-imposed demotion as a result of outside business obligations.

“Our organization—The Blaze—deserves and needs an exclusively focused leader and that’s something I cannot provide, given existing commitments I choose to honor,” Kitchin wrote, adding that “I’m not leaving this company. I’ll stay with The Blaze, working every day as the Interim Head of Sales with a focus on finding the right person for that position, assisting in the transition, on advertiser growth, program development, and industry relations.”

But according to multiple sources, Kitchin’s announcement comes out of frustration after continual friction with top Beck executive Jonathan Schreiber, the recently named president of Beck’s 14-year-old production company, Mercury Radio Arts.

According to multiple sources, Kitchin—who commuted from his home in Los Angeles to Dallas and New York—took the CEO job on an interim basis with the condition that Schreiber would agree not to interfere in The Blaze, an agreement that Kitchin realized was continually being breached. According to people familiar with the situation, Schreiber’s alleged meddling in Kitchin’s operation ultimately became intolerable.

Schreiber didn’t respond to an email from The Daily Beast, and Kitchin declined to comment.

Named president in April 2015 of Mercury Radio Arts—of which The Blaze is a subsidiary, all of it majority-owned by Beck—Schreiber is said to have a penchant for interfering in areas beyond his expertise, namely the staffing and content of The Blaze’s news and opinion site and its television production operation.

The Blaze cable channel reaches an estimated 13 million households which subscribe to DISH, Verizon Fios, and other paid television carriers.

Schreiber’s alleged intrusion is said to have also figured in the departure in June of then-Blaze chief executive Betsy Morgan, an experienced digital media executive who previously ran CBS News’s digital operations, helped grow The Huffington Post, and built TheBlaze.com into a news and aggregation site that—in November 2014—attracted 29 million unique visitors per month.

But by November 2015—according to figures from the Web traffic measuring service Quantcast—monthly traffic for TheBlaze.com had dropped to 16.4 million unique visitors, and traffic for the associated website GlennBeck.com, had plunged from 4.4 million to 1.4 million uniques.

Morgan—ironically, according to sources—had recommended Schreiber to Beck and helped secure his initial position with the company, shouldering a vague responsibility for “strategy and special projects.”

A religious man who practices Orthodox Judaism, Schreiber quickly hit it off with Beck, a devout Mormon convert.

Morgan had replaced Beck’s longtime CEO Chris Balfe, who abruptly exited the company in December 2014, along with fellow exec Joel Cheatwood, as Schreiber was gaining more prominence and influence.

Balfe, who along with Cheatwood retains a minority ownership stake in The Blaze, left after more than a decade of helping Beck build his brand and become a media personality, and was instrumental in the soft launch of The Blaze six years ago while Beck was still hosting his short-lived but wildly popular 5 p.m. program on the Fox News Channel.

Stewart Padveen, Schreiber’s personal friend and “mentor” (as Schreiber describes him in a LinkedIn endorsement), will assume control of The Blaze effective Monday.

Padveen, who lives in Los Angeles, wrote in a staff email that he plans to visit Dallas “next week to kick off this process,” with a later trip planned to New York.

“2015 was a tough year for sure, but thanks to many of you, it was a profitable one,” Padveen wrote concerning this latest corporate shakeup.

“We all owe a debt of gratitude to Kraig for guiding us through some rough times. We still have some history to redress, but if we continue down the path of making solid business decisions, we can get past the past and into the future.”

Besides a period of staff layoffs and turnover that continues to this day, and despite claims of profitability, that “history” apparently includes taking on more debt than the company’s principal owner was comfortable with.

At a staff meeting in New York last February, Beck exhorted his employees to pinch pennies and said the company’s debt was too high at $3 million—a figure sources said later grew to $5 million or more.

“I know much of what has happened since December of 2014, but also much of it has been structural and behind the curtain,” Beck wrote in his own email, in which he thanked Kitchin for his service. “We were a company that was swimming in debt. With the hard work of Kraig, Jonathan, and now Misty [Kawecki, the chief financial officer] we will be debt free by summer. This is miraculous and takes all of the downward pressure off of us.”

Schreiber, a digital startup entrepreneur in his early forties, is a controversial and mysterious figure within Mercury Radio Arts. According to colleagues, he has referred to himself as a “diehard Glenn Beck fan” who, after years of living in Israel, relocated to New York, talked his way into Beck’s confidence, and showed up as a “trusted advisor,” as Beck has called him, in the fall of 2014.

“I want to thank Kraig for everything he has done to help bring the Blaze to the place it is,” Schreiber wrote in his own email, “and welcome Stewart to help bring the Blaze to the places it can go.”

In what a couple of Beck veterans considered ominous corporate-speak, Schreiber added: “All of us, leadership in BOTH companies, have worked together to help ensure that every person will be put into the right role at the right company with clear responsibilities and direction. This will continue to be a process and not an event.”

http://www.thedailybeast.com/articles/2016/01/29/head-of-glenn-beck-s-media-empire-quits-as-the-blaze-burns-down.html

Read Full Post | Make a Comment ( None so far )

American PIE — Propaganda Indoctrination Entertainment — Luce and His Empire –Time Magazine Is Fake News — Circling The Drain (CTD) — Videos

Posted on January 3, 2017. Filed under: American History, Art, Articles, Blogroll, Business, College, Communications, Congress, Constitution, Corruption, Culture, Documentary, Education, Elections, Employment, Films, Freedom, Friends, history, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, media, Money, Music, National Security Agency (NSA), People, Philosophy, Photos, Political Correctness, Private Sector, Public Sector, Radio, Rants, Raves, Raymond Thomas Pronk, Reviews, Spying, Strategy, Success, Talk Radio, Taxation, Taxes, Technology, Unemployment, Union, Unions, Video, War, Wealth, Welfare, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , , , , |

Image result

Image result for Luce and His Empire

Image result for HITLER person of the year

Image result for stalin person of the year

Image result for time magazine man of the year 1960

Image result for time magazine man of the year 1960

Image result for time magazine man of the year ronald reagan

Image result for time magazine man of the year 1960

Image result for time magazine man of the year covers 1923

Image result for trump covers time magazine

Image result for time magazine trump meltdown

Image result for time magazine trump meltdown

Image result for time magazine trump covers

Image result for trump person of the year

Image result for fortune magazine donald trump

Image result for time magazine man of the year covers 1923

Image result for ctd circling the drainImage result for cartoon circling the drain

Image result for circulation of news mapazines

Image result for circulation of news mapazines

Image result for cartoons fake news

Image result for cartoons fake news

Image result for blanco cartoons fake news

Image result for blanco cartoons fake news

Don McLean – American Pie

American Pie – Don McLean – Full Length 1989 Video from Original 1971/72 Song

Don McLean- American Pie (with Lyrics)

Donald Trump: Person Of The Year 2016 | POY 2016 | TIME

Time Magazine Person of the Year: Strangest Picks

Isaiah Wilner – “The Man Time Forgot”

USA – Seventy-five years of Time Magazine

Time Magazine Is Fake News

Henry R. Luce and the 20th Century

Uploaded on Apr 26, 2010

A discussion with two biographers of Henry R. Luce, the Yale graduate who founded Time, Inc. Alan Brinkley, an historian at Columbia University, and Lance Morrow, a contributor at Time, spoke about Luce and his impact on the 20th Century. Professor Shelly Kagan moderated the discussion; Yale University President Richard Levin gave the introduction. The event was sponsored by the Yale Daily News.

The Man Who Revolutionized Magazine Publishing: The Rise of the American News Media (2002)

Published on Dec 5, 2015

Henry Robinson Luce (April 3, 1898 – February 28, 1967), was a Chinese-American magazine magnate, who was called “the most influential private citizen in the America of his day”. About the book: https://www.amazon.com/gp/product/080…

He launched and closely supervised a stable of magazines that transformed journalism and the reading habits of upscale Americans. Time summarized and interpreted the week’s news; Life was a picture magazine of politics, culture, and society that dominated American visual perceptions in the era before television; Fortune explored in depth the economy and the world of business, introducing to executives avant-garde ideas such as Keynesianism; and Sports Illustrated explored the motivations and strategies of sports teams and key players. Counting his radio projects and newsreels, Luce created the first multimedia corporation. He was born in China to missionary parents. He envisaged that the United States would achieve world hegemony, and, in 1941, he declared the 20th century would be the “American Century”.

Nightly discussions of the concept of a news magazine led Luce and Hadden, both age 23, to quit their jobs in 1922. Later that same year, they formed Time Inc. Having raised $86,000 of a $100,000 goal, they published the first issue of Time on March 3, 1923. Luce served as business manager while Hadden was editor-in-chief. Luce and Hadden annually alternated year-to-year the titles of president and secretary-treasurer. In 1925, Luce decided to move headquarters to Cleveland, while Hadden was on a trip to Europe. Cleveland was cheaper, and Luce’s first wife, Lila, wanted out of New York. When Hadden returned, he was horrified and moved Time back to New York. Upon Hadden’s sudden death in 1929, Luce assumed Hadden’s position.

Luce launched the business magazine Fortune in February 1930 and acquired Life in order to relaunch it as a weekly magazine of photojournalism in November 1936; he went on to launch House & Home in 1952 and Sports Illustrated in 1954. He also produced The March of Time weekly newsreel. By the mid 1960s, Time Inc. was the largest and most prestigious magazine publisher in the world. (Dwight Macdonald, a Fortune staffer during the 1930s, referred to him as “Il Luce”, a play on the Italian Dictator Mussolini, who was called “Il Duce”).)

President Franklin D. Roosevelt, aware that most publishers were opposed to him, issued a decree in 1943 that blocked all publishers and media executives from visits to combat areas; he put General George Marshall in charge of enforcement. The main target was Luce, who had long opposed FDR. Historian Alan Brinkley argued the move was “badly mistaken”, for had Luce been allowed to travel, he would have been an enthusiastic cheerleader for American forces around the globe. But stranded in New York City, Luce’s frustration and anger expressed itself in hard-edged partisanship.[4] Luce, supported by Editor-in-Chief T. S. Matthews, appointed Whittaker Chambers as acting Foreign News editor in 1944, despite the feuds Chambers had with reporters in the field.[5]

Luce, who remained editor-in-chief of all his publications until 1964, maintained a position as an influential member of the Republican Party.[6] An instrumental figure behind the so-called “China Lobby”, he played a large role in steering American foreign policy and popular sentiment in favor of Nationalist leader Chiang Kai-shek and his wife Soong Mei-ling in their war against the Japanese. (The Chiangs appeared in the cover of Time eleven times between 1927 and 1955.[7])

It has been reported that Luce, during the 1960s, tried LSD and reported that he had talked to God under its influence.[8]

Once ambitious to become Secretary of State in a Republican administration, Luce penned a famous article in Life magazine in 1941, called “The American Century”, which defined the role of American foreign policy for the remainder of the 20th century (and perhaps beyond).

Firing Line with William F. Buckley Jr. “Reflections on the Current Scene”

Firing Line with William F. Buckley Jr. “Feminism”

Clare Boothe Luce: Legendary Playwright, Politician & Social Seductress – Biography (1997)

Christopher Hitchens on News, Media, Entertainment and Propaganda (1997)

“THE END IS NEAR!” TIME Magazine Releases Cryptic Cover November 2016! TIME’S UP!

Edward Bernays called it PROPAGANDA

What is Propaganda

Devastating Expose on American Journalism and Media Concentration: Leading Thinkers Bernie Sanders

Mainstream Media Lies to the Masses – Media Lies – Media Lies Documentary

Propaganda and Manipulation: How mass media engineers and distorts our perceptions

More on propaganda and collective insanity

Propaganda & Engineering Consent for Empire with Mark Crispin Miller

Ben Shapiro on Fake News, Crumbling Mainstream Media, and Russia’s Hacking (Part 3)

Ben Shapiro and Dave Rubin: Trump, the Alt Right, Fake News, and More (Full Interview)

College Indoctrination Documentary

Education Is a System of Indoctrination of the Young – Noam Chomsky

27. Your Indoctrination

Ben Shapiro on indoctrination of America’s youth in universities

What is “Fake News?”

The Truth About Fake News | Russia Hacked U.S. Election For Donald Trump?

WELCOME TO TRUTH | Full Documentary 2014

The Future of Newspapers and Magazines

The Future of Journalism: Tom Rosenstiel at TEDxAtlanta

Citizen journalism | Paul Lewis | TEDxThessaloniki

The slow journalism revolution | Rob Orchard | TEDxMadrid

Why the majority is always wrong | Paul Rulkens | TEDxMaastricht

Why I read a book a day (and why you should too): the law of 33% | Tai Lopez | TEDxUBIWiltz

George Carlin – Political Correctness is fascism pretending to be Manners………………

George Carlin the illusion of freedom

The Owners of the Country

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for media concentration charts

Image result for Luce and His Empire

CreditIllustration by Javier Jaén

Our new president is a private-jet-setting billionaire Ivy League graduate, a real estate tycoon, a TV star and a son of inherited wealth. But he is no longer, by his own calculations, a member of the “elite.” Nor are the men (and the few women) now joining his inner circle — 1-percenters and corporate executives, Harvard and Yale alumni, Silicon Valley entrepreneurs and Goldman Sachs bankers. The true elite apparently sits elsewhere, among those who, in Sarah Palin’s notable 2008 formulation, think “that they’re — I guess — better than anyone else.”

As an adjective, the word “elite” still conveys something positive, even aspirational: elite athlete, elite model, elite travel services. But as a noun, embodied by actual living people, it has become one of the nastiest epithets in American politics. “Elites have taken all the upside for themselves and pushed the downside to the working- and middle-class Americans,” complains Trump’s adviser Steve Bannon (of Harvard, Goldman Sachs and Hollywood). In this formulation, elites are a destructive, condescending collective, plotting against the beleaguered masses outside their ranks.

And in these attacks, the president-elect and his team are deploying one of the most effective partisan political stereotypes of the modern age. For most of American history, anti-elite sentiment was a matter of up versus down, not left versus right. But about half a century ago, the conservative movement set out to claim anti-elite politics as its own. That meant redefining the term away from class and toward culture, where the “elite” could be identified by its liberal ideas, coastal real estate and highbrow consumer preferences. The right-wing Club for Growth captured this type in a famous 2004 attack ad, instructing the Democrat Howard Dean to “take his tax-hiking, government-expanding, latte-drinking, sushi-eating, Volvo-driving, New York Times-reading, body-piercing, Hollywood-loving, left-wing freak show back to Vermont where it belongs.”

By the 1990s, bashing the ‘liberal elite’ had become a favorite blood sport of the American right.

Trump adjusted the formula for the hot topics of the 2016 campaign. “I was on the right side of that issue, as you know, with the people,” he boasted after Brexit, adding that “Hillary, as always, stood with the elites.” His complaints against “political correctness” conjure a world of absurdist campus politics, where overprivileged students squabble over gender pronouns and the fine points of racial victimization. “Media elites” come in for special attack, cordoned off in pens to be mocked and jeered at during rallies, labeled both liars and incompetents.

But Trump has also ventured beyond mere name-calling, turning the 2016 election into a competition between knowledge systems: the tell-it-like-it-is “people” versus the know-it-all “elites.” His campaign insisted for months that pollsters and technocrats and media would be proven wrong by his electoral success. The fact that he did win dealt a blow to an entire worldview, one in which empirical inquiry and truth-telling were supposed to triumph in the end. The question, now, is whether it’s possible to run an executive branch based on hostility toward experts and professionals of all political stripes — and how many billionaires and Ivy Leaguers Trump can appoint before this rhetorical pose begins to break down altogether.

The notion that distant elites might be conspiring against the people comes straight from the Founding Fathers, whose Declaration of Independence lamented the “long train of abuses and usurpations” inflicted upon ordinary Americans by an arrogant British king. From there on, United States history might be seen as a repeating cycle of anti-elite revolt. The Jacksonians rebelled against the Founders’ aristocratic pretensions. Northern “free labor” went to war against the oligarchical slavocracy. And the Populist revolts of the late 19th century adapted this story to modern capitalism, with farmers and laborers rebelling against robber barons, bankers, time-management experts and college-educated professionals.

The first historians to study those Populists described them as heroic crusaders, champions of the “people” against the “powers.” But by the middle of the 20th century, alarmed by the rise of fascism and homegrown demagogues like Senator Joseph McCarthy, a new generation of scholars took a more anxious view of the anti-elite spirit. In his 1955 book “The Age of Reform,” Richard Hofstadter dismissed the Populists as backward-looking, provincial anti-Semites, the latent fascists of their day. Eight years later, his “Anti-Intellectualism in American Life” documented a dangerous suspicion of “the critical mind” that seemed to course through the national culture. From his perspective, the 1952 election captured everything wrong with American political life, with Dwight Eisenhower’s “philistinism” winning over Adlai Stevenson’s “intellect.”

The question is whether it’s possible to run an executive branch based on hostility toward experts and professionals of all political stripes.

Hofstadter did not usually describe his ideal intellectually minded citizens as members of an “elite.” That word conveyed something different — a ruling class that held direct political and economic power. The most famous articulation of this view came from the sociologist C. Wright Mills, in his 1956 assessment of America’s “power elite.” “They rule the big corporations,” Mills wrote. “They run the machinery of the state and claim its prerogatives. They direct the military establishment.” In Mills’s view, these people were tied together not by culture or ideology but by their positions at the helms of large, ever-more-complex institutions. As individuals, they might be Republicans or Democrats, and might live in Ohio or California. The point was that they were in charge of things.

But that vision never gained much traction in mainstream politics, where a more partisan, targeted definition was starting to emerge. William F. Buckley Jr. carved out some essentials in his first book, “God and Man at Yale,” drawing a neat distinction between respectable Ivy-educated men like himself and the socialistic eggheads of the professoriate. Ronald Reagan chose the term “elite” to bring it all together in his famed 1964 speech, “A Time for Choosing,” delivered on behalf of the Republican presidential candidate Barry Goldwater. “This is the issue of this election,” he said: “whether we believe in our capacity for self-government or whether we abandon the American Revolution and confess that a little intellectual elite in a far-distant capitol can plan our lives for us better than we can plan them ourselves.”

Lyndon Johnson won that election in a blowout, but Reagan’s vision of a smug and detached liberal elite helped spark the oncoming “culture wars,” pitting a supposedly indignant Middle America against the liberal snobs of the coasts. By the 1990s, with the rise of right-wing media stars like Rush Limbaugh and Bill O’Reilly, bashing the “liberal elite” had become a favorite blood sport of the American right.

Despite all the abuse hurled their way, some “liberal elites” have accepted at least part of their detractors’ critique, particularly on the progressive left. It was during Bill Clinton’s presidency that the social critic Christopher Lasch published “The Revolt of the Elites and the Betrayal of Democracy,” which mourned that “upper-middle-class liberals” had turned into “petulant, self-righteous, intolerant” scolds, thoroughly out of touch with the concerns of Middle America. Since then, the torch has passed to a younger generation of writers, including MSNBC’s Chris Hayes, whose 2012 “Twilight of the Elites” called for rethinking the entire ethos of liberal “meritocracy” — a system, he argued, that tends to fuel self-congratulation and incompetence at the top while offering little but contempt and dim prospects for those at the bottom.

So as 2017 begins, we find ourselves in a strange and uncertain political moment. Antipathy toward a wealthy, preening managerial class seems to be gaining popularity across the political spectrum — and, oddly, to have helped elect a wealthy, preening incoming president. Meanwhile, both liberal and conservative “elites” are scrambling to figure out what happens if the president-elect continues to reject basic political norms and even routine intelligence briefings. Under a Trump presidency, such “elites” may have no choice but to attempt a radical redefinition of their role in American life. Otherwise, the man in the White House will do it for them.

http://www.nytimes.com/2017/01/03/magazine/how-elites-became-one-of-the-nastiest-epithets-in-american-politics.html?_r=0

Henry Luce

From Wikipedia, the free encyclopedia
Henry Luce
Clare Boothe Luce and Henry Luce NYWTS.jpg

Luce with wife Clare Boothe Luce, a famous playwright and politician (1954)
Born Henry Robinson Luce
April 3, 1898
Tengchow, China
Died February 28, 1967 (aged 68)
Phoenix, Arizona, U.S.
Occupation Publisher; Journalist
Political party Republican
Spouse(s) Lila Ross Hotz (1923–1935)
Clare Boothe Luce
(1935–1967, his death)
Children 3, including Ann Clare Brokaw (step-daughter)
Parent(s) Henry W. Luce and Elizabeth Middleton Root

Henry Robinson Luce (April 3, 1898 – February 28, 1967) was an American magazine magnate who was called “the most influential private citizen in the America of his day”.[1] He launched and closely supervised a stable of magazines that transformed journalism and the reading habits of upscale Americans. Time summarized and interpreted the week’s news; Life was a picture magazine of politics, culture, and society that dominated American visual perceptions in the era before television; Fortune explored in depth the economy and the world of business, introducing to executives avant-garde ideas such as Keynesianism; and Sports Illustrated explored the motivations and strategies of sports teams and key players. Counting his radio projects and newsreels, Luce created the first multimedia corporation. He was born in China to missionary parents. He envisaged that the United States would achieve world hegemony, and, in 1941, he declared the 20th century would be the “American Century“.[2][3]

Life and career

Luce was born in Tengchow, Shandong, China, (now Penglai) on April 3, 1898, the son of Elizabeth Root Luce and Henry Winters Luce, who was a Presbyterian missionary.[3] He received his education in various Chinese and English boarding schools, including the China Inland Mission Chefoo School.

At 15, he was sent to the US to attend the Hotchkiss School in Connecticut, where he edited the Hotchkiss Literary Monthly. It was there he first met Briton Hadden,[3] who would become a lifelong partner. At the time, Hadden served as editor-in-chief of the school newspaper, and Luce worked as an assistant managing editor. Both went on to Yale College, where Hadden served as chairman and Luce as managing editor of The Yale Daily News. Luce was also a member of Alpha Delta Phi and Skull and Bones. After being voted “most brilliant” of his class and graduating in 1920, he parted ways with Hadden to embark for a year on historical studies at Oxford University, followed by a stint as a cub reporter for the Chicago Daily News.

In December 1921, Luce rejoined Hadden to work at The Baltimore News. Recalling his relationship with Hadden, Luce later said, “Somehow, despite the greatest differences in temperaments and even in interests, we had to work together. We were an organization. At the center of our lives — our job, our function — at that point everything we had belonged to each other.”[citation needed]

Magazines

Nightly discussions of the concept of a news magazine led Luce and Hadden, both age 23, to quit their jobs in 1922. Later that same year, they partnered with Robert Livingston Johnson and another Yale classmate to form Time Inc.[4] Having raised $86,000 of a $100,000 goal, they published the first issue of Time on March 3, 1923. Luce served as business manager while Hadden was editor-in-chief. Luce and Hadden annually alternated year-to-year the titles of president and secretary-treasurer while Johnson served as vice president and advertising director. In 1925, Luce decided to move headquarters to Cleveland, while Hadden was on a trip to Europe. Cleveland was cheaper, and Luce’s first wife, Lila, wanted out of New York. When Hadden returned, he was horrified and moved Time back to New York. Upon Hadden’s sudden death in 1929, Luce assumed Hadden’s position.

Luce launched the business magazine Fortune in February 1930 and acquired Life in order to relaunch it as a weekly magazine of photojournalism in November 1936; he went on to launch House & Home in 1952 and Sports Illustrated in 1954. He also produced The March of Time weekly newsreel. By the mid 1960s, Time Inc. was the largest and most prestigious magazine publisher in the world. (Dwight Macdonald, a Fortune staffer during the 1930s, referred to him as “Il Luce”, a play on the Italian Dictator Mussolini, who was called “Il Duce”).)

President Franklin D. Roosevelt, aware that most publishers were opposed to him, issued a decree in 1943 that blocked all publishers and media executives from visits to combat areas; he put General George Marshall in charge of enforcement.[citation needed] The main target was Luce, who had long opposed Roosevelt. Historian Alan Brinkley argued the move was “badly mistaken” and said had Luce been allowed to travel, he would have been an enthusiastic cheerleader for American forces around the globe.[citation needed] However, stranded in New York City, Luce’s frustration and anger expressed itself in blatant partisanship.[5]

Luce, supported by Editor-in-Chief T. S. Matthews, appointed Whittaker Chambers as acting Foreign News editor in 1944, despite the feuds that Chambers had with reporters in the field.[6]

Luce, who remained editor-in-chief of all his publications until 1964, maintained a position as an influential member of the Republican Party.[7] An instrumental figure behind the so-called “China Lobby“, he played a large role in steering American foreign policy and popular sentiment in favor of Kuomintang leader Chiang Kai-shek and his wife, Soong Mei-ling, in their war against the Japanese. (The Chiangs appeared in the cover of Time eleven times between 1927 and 1955.[8])

It has been reported that Luce, during the 1960s, tried LSD and reported that he had talked to God under its influence.[9]

Once ambitious to become Secretary of State in a Republican administration, Luce penned a famous article in Life magazine in 1941, called “The American Century“, which defined the role of American foreign policy for the remainder of the 20th century (and perhaps beyond).[7]

An ardent anti-Soviet, he once demanded John Kennedy invade Cuba, later to remark to his editors that if he did not, his corporation would act like Hearst during the Spanish–American War. The publisher would advance his concepts of US dominance of the “American Century” through his periodicals with the ideals shared and guided by members of his social circle, John Foster Dulles, Secretary of State and his brother, director of the CIA, Allen Dulles. To highlight the cozy extent of their alliance, rumors swirled that the publisher shared the wartime mistress of the spymaster with Clare Booth Luce.[10]

Family

Luce had two children, Peter Paul and Henry Luce III, with his first wife, Lila Hotz. He married his second wife, Clare Boothe Luce in 1935, who had an 11-year-old daughter, Ann Clare Brokaw, whom he raised as his own. He died in Phoenix, Arizona in 1967. According to the Henry Luce Foundation, he died suddenly at age 68 while visiting his home on Fishers Island, New York, of cardiac arrest. At his death, he was said to be worth $100 million in Time Inc. stock.[11] Most of his fortune went to the Henry Luce Foundation. During his life, Luce supported many philanthropies such as Save the Children Federation, the Metropolitan Museum of Art and United Service to China, Inc. He is interred at Mepkin Plantation in South Carolina.

He was honored by the United States Postal Service with a 32¢ Great Americans series (1980–2000) postage stamp.[12] Mr. Luce was inducted into the Junior Achievement U.S. Business Hall of Fame in 1977.

Designed by I. M. Pei, the Luce Memorial Chapel, on the campus of Tunghai University, Taiwan, was constructed in memoriam of Henry Luce’s father.

References

  1. Jump up^ Robert Edwin Herzstein (2005). Henry R. Luce, Time, and the American Crusade in Asia. Cambridge U.P. p. 1.
  2. Jump up^ Editorial (1941-02-17) The American Century, Life Magazine
  3. ^ Jump up to:a b c Baughman, James L. (April 28, 2004). “Henry R. Luce and the Rise of the American News Media”. American Masters (PBS). Retrieved 19 June 2014.
  4. Jump up^ Warburton, Albert (Winter 1962). “Robert L. Johnson Hall Dedicated at Temple University” (PDF). The Emerald of Sigma Pi. Vol. 48 no. 4. p. 111.
  5. Jump up^ Alan Brinkley, The Publisher: Henry Luce and his American Century (2010) pp 302-3
  6. Jump up^ Brinkley, The Publisher: Henry Luce and his American Century (2010) pp 322-93
  7. ^ Jump up to:a b “Henry R. Luce: End of a Pilgrimage”. – TIME. – March 10, 1967
  8. Jump up^ “Time magazine historical search”. Time magazine. Retrieved 19 June 2014.
  9. Jump up^ Maisto, Stephen A., Galizio, Mark, & Connors, Gerald J. (2008). Drug Use and Abuse: Fifth Edition. Belmont: Thomson Higher Education. ISBN 0-495-09207-X
  10. Jump up^ Talbot, David. “The Devils’ Chessboard: Allen Dulles, The CIA and the Rise of America’s Secret Government.” (2015) Harper-Collins, pub., New York, New York pp. 236-238, 444.
  11. Jump up^ Edwin Diamond (October 23, 1972). “Why the Power Vacuum at Time Inc. Continues”. New York Magazine.
  12. Jump up^ “Henry R. Luce”. US Stamp Gallery. April 3, 1998.

Further reading

  • Baughman, James L. “Henry R. Luce and the Business of Journalism.” Business & Economic History On-Line 9 (2011). online
  • Baughman, James L. Henry R. Luce and the Rise of the American News Media (2001) excerpt and text search
  • Brinkley, Alan. The Publisher: Henry Luce and His American Century, Alfred A. Knopf (2010) 531 pp.
  • Brinkley, Alan. What Would Henry Luce Make of the Digital Age?, TIME (April 19, 2010) excerpt and text search
  • Elson, Robert T. Time Inc: The Intimate History of a Publishing Enterprise, 1923-1941 (1968); vol. 2: The World of Time Inc.: The Intimate History, 1941-1960 (1973), official corporate history
  • Herzstein, Robert E. Henry R. Luce, Time, and the American Crusade in Asia (2006) excerpt and text search
  • Herzstein, Robert E. Henry R. Luce: A Political Portrait of the Man Who Created the American Century (1994).
  • Morris, Sylvia Jukes. Rage for Fame: The Ascent of Clare Boothe Luce (1997).
  • Wilner, Isaiah. The Man Time Forgot: A Tale of Genius, Betrayal, and the Creation of Time Magazine, HarperCollins, New York, 2006

External links

https://en.wikipedia.org/wiki/Henry_Luce

W. A. Swanberg

From Wikipedia, the free encyclopedia

William Andrew Swanberg (November 23, 1907 in St. Paul, Minnesota – September 17, 1992 in Southbury, Connecticut)[1] was an American biographer. He may be known best for Citizen Hearst, a biography of William Randolph Hearst, which was recommended by the Pulitzer Prize board in 1962 but overturned by the trustees.[2] He won the 1973 Pulitzer Prize for Biography or Autobiography for his 1972 biography of Henry Luce,[3] and the National Book Award in 1977 for his 1976 biography of Norman Thomas.[4]

Life

Swanberg was born in Saint Paul, Minnesota in 1907, and earned his B.A. at the University of Minnesota in 1930.[5]

With grudging and only partial help from his father, who wanted his son to be a cabinet maker like himself, Swanberg earned his degree, only to find that employment as a journalist with such local daily newspapers as the St. Paul Daily News and the Minneapolis Star was unsatisfactory, as their staff were shrinking during the Great Depression. Swanberg instead held a succession of low-paying manual labor jobs. After five years he followed a college friend to New York City in September 1935. After months of anxious job-hunting he secured an interview at the Dell Publishing Company with president George T. Delacorte Jr. himself, and was hired as an assistant editor of three lowbrow magazines. Money saved in the next months enabled him to return briefly to the Midwest to marry his college sweetheart Dorothy Green, and bring her to New York. He soon began to climb up the editorial ladder at Dell, and by 1939 he was doing well enough to buy a house in Connecticut.

When the United States entered World War II, Swanberg was 34 years old, the father of two children and suffering from a hearing disability. Rejected by the army, he enlisted in the Office of War Information in 1943 and, after training was sent to England following D-Day. In London, amid the V-1 and V-2 attacks, he prepared and edited pamphlets to be air-dropped behind enemy lines in France and later in Norway.[6] With the end of the war he returned in October 1945 to Dell and the publishing world.

Swanberg did not return to magazine editing but instead did freelance work within and without Dell. By 1953 he began carving out time for researching his first book (Sickles), which Scribner’s purchased, beginning a long-term association. Swanberg’s early hopes of newspaper work never materialized, but by the mid-1950s he had established himself as scholarly biographer. His efforts proved to be labor-intensive and required up to four years apiece, even when assisted by the research and transcription efforts of his wife Dorothy. Upon turning 80 in 1987, Swanberg attempted one last biography, about William Eugene “Pussyfoot” Johnson (1862–1945).[7] He was at work on that project when he succumbed to heart failure at his typewriter in Southbury, Connecticut on September 17, 1992.

Swanberg was a Guggenheim fellow in 1960. His papers are archived at Columbia University.

The Hearst Affair

Swanberg’s 1961 book Citizen Hearst: A Biography of William Randolph Hearst was recommended for a Pulitzer Prize for Biography or Autobiography by the advisory board but rejected by the trustees of Columbia University, apparently because they thought that Hearst was not dignified enough to be the subject of the award. It was the first time in 46 years that the trustees rejected a recommendation from the advisory board, and the news caused sales to soar.[1]

Works

In a statistical overview derived from writings by and about William Andrew Swanberg, OCLC/WorldCat [clarification needed] encompasses roughly 30+ works in 100+ publications in 5 languages and 16,000+ library holdings.[8]

Literary Awards

References

  1. ^ Jump up to:a b www.nytimes.com
  2. ^ Jump up to:a b Hohenberg, John. The Pulitzer Diaries: Inside America’s Greatest Prize. 1997. p. 109.
  3. ^ Jump up to:a b “Biography or Autobiography”. Past winners and finalists by category. The Pulitzer Prizes. Retrieved 2012-03-17.
  4. ^ Jump up to:a b “National Book Awards – 1977”. National Book Foundation. Retrieved 2012-03-17.
  5. Jump up^ Gale Contemporary Authors Online. Volume 13.[page needed]
  6. Jump up^ Gale, p. 264
  7. Jump up^ Gale, p. 277
  8. Jump up^ WorldCat Identities: Swanberg, W. A. 1907-

External links

  • W. A. Swanberg Papers Kislak Center for Special Collections, Rare Books and Manuscripts, University of Pennsylvania

https://en.wikipedia.org/wiki/W._A._Swanberg

Read Full Post | Make a Comment ( None so far )

Rolling Back The 30-50 Million Illegal Alien Invasion of United States Will Be The Political Issue For Next Ten Years — Trump’s Trojan Horse — Republican Touch Back Amnesty or Citizenship For Illegal Aliens Will Lead To Rebellion By American People — Enforce Current Immigration Law (Deport All Illegal Aliens) or Face The Second American Revolution — Videos

Posted on December 31, 2016. Filed under: American History, Babies, Blogroll, Communications, Congress, Constitution, Corruption, Demographics, Documentary, Economics, Faith, Family, Foreign Policy, Freedom, Friends, government spending, history, Homes, Illegal, Immigration, Law, Legal, liberty, Life, Links, Literacy, Movies, Newspapers, People, Philosophy, Photos, Political Correctness, Press, Security, Speech, Strategy, Talk Radio, Taxation, Taxes, Terrorism, Unemployment, Video, War, Welfare, Wisdom, Writing | Tags: , , , , , |

Image result for cartoons trump touch back amnestyImage result for cartoons trump touch back amnestyImage result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnestyImage result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Image result for cartoons trump touch back amnesty

Trump’s Touchback amnesty explained by Marc Thiessen

Donald Trump explains his immigration plan

Is Donald Trump changing his immigration vision?

Is Donald Trump Flip-Flopping on Immigration? A Closer Look

Immigration by the Numbers — Off the Charts

Immigration, World Poverty and Gumballs – NumbersUSA.com

How Many Illegal Aliens Are in the US? – Walsh – 1

How Many Illegal Aliens Are in the US? – Walsh – 2

The Truth About Immigration: What They Won’t Tell You!

WHO KNEW? TRUMP FAVORS AMNESTY FOR UNDOCUMENTED IMMIGRANTS

This article first appeared on the American Enterprise Institute site.

Trump’s supporters loved his promise last week to create a “deportation force” to remove all 11 million illegal immigrants living in America, and his repeated declaration that everyone here illegally will “have to go.”

But his supporters tend to overlook his other promise—repeated in the Fox Business debate in Milwaukee on November 10—that under his immigration plan “they will come back.”

That’s right. Under Trump’s immigration plan, almost all of the 11 million illegal aliens (save for a small minority with criminal records) will get to return and get permanent legal status to stay here in America.

Trump supports amnesty.

On Fox News on November 12, Trump’s son Eric expressed frustration that the media overlooks this:

The point isn’t just deporting them, it’s deporting them and letting them back in legally. He’s been so clear about that and I know the liberal media wants to misconstrue it, but it’s deporting them and letting them back legally.

Eric Trump is right. His father has been crystal clear that he wants all the illegals to return and live in America.

Listen closely to what Trump is actually proposing. In an interview with CNN’s Dana Bash earlier this year, Trump explained his plan this way:

I would get people out and then have an expedited way of getting them back into the country so they can be legal…. A lot of these people are helping us … and sometimes it’s jobs a citizen of the United States doesn’t want to do. I want to move ’em out, and we’re going to move ’em back in and let them be legal.

This is a policy called “touchback” and it was first proposed in 2007 by moderate Republican Senator Kay Bailey Hutchison (Texas). She offered a “touchback” amendment on the Senate floor that would have required illegal immigrants to return to their home countries to apply for a special “Z visa” that would allow them to re-enter the United States in an expedited fashion and work here indefinitely.

Her amendment lost by a relatively close margin, 53-45. It was supported by most Republicans and even got five Democratic votes—senators Claire McCaskill, Max Baucus, Jon Tester, Byron Dorgan and John Rockefeller all voted for it.

The idea was considered so reasonable that in an April 22, 2007, editorial entitled “Progress on Immigration,” The New York Times declared:

It’s not ideal, but if a touchback provision is manageable and reassures people that illegal immigrants are indeed going to the back of the line, then it will be defensible.

So what Trump is proposing today—sending illegal immigrants back to their home countries and then allowing the “good ones” to return in an “expedited” fashion—was endorsed by the liberal New York Times!

In fact, the idea even got the support of—wait for it—illegal immigrants.

In 2007, the Los Angeles Times did the first telephone poll of illegal immigrants and asked whether they would go home under a “touchback” law that allowed them to return with legal status. Sixty-three percent said yes, 27 percent said no and 10 percent were undecided. If they were promised a path to citizenship when they returned, the number who said they would leave and return legally grew to 85 percent.

Donald Trump’s detractors were aghast at his invocation during the Fox Business debate of President Dwight D. Eisenhower’s “Operation Wetback,” which forcibly removed 1.5 million illegal immigrants, and his promise the following day to establish a “deportation force” to remove the 11 million illegal immigrants living in America today.

Never mind the fact that we already have a “deportation force”—it’s called U.S. Immigration and Customs Enforcement (ICE).

The fact is, Trump won’t need a “deportation force” or an “Operation Wetback” to get illegal immigrants to go home—because he has promised that they can return quickly with legal status.

The vast majority of illegal immigrants say they would voluntarily cooperate with Trump’s plan.

If anything, the “touchback” plan Trump endorses was attacked by conservatives back in 2007. In an editorial, National Review called touchback a “fraud” that gives illegal aliens “their own privileged pathway” ahead of “applicants who have complied with US immigration laws.”

That is precisely what Trump is proposing. Under his plan, illegal aliens don’t have to go to the end of the line behind those who have complied with our immigration laws. They get an “expedited way of getting them back into the country so they can be legal.” They get to cut the line and then stay in America.

So if you get past Trump’s bluster, the plan he is proposing is so liberal that it earned the support of The New York Times and the opposition of National Review.

The reason is simple: Trump’s plan is in fact a form of amnesty—you just have to leave the country briefly to get it.

So when Trump says of illegal immigrants “they all have to go,” don’t overlook the fact that under his plan almost all would be able to immediately return—and stay.

This means there is very little difference between his plan and what John Kasich and Jeb Bush are supporting.

And most of his supporters don’t even realize it.

Marc Thiessen is a fellow at the American Enterprise Institute.

 

Central Americans continue to surge across U.S. border, new DHS figures show

December 30 at 6:05 PM

U.S. officials are grappling with a 15 percent surge in illegal immigration, reflecting continued failures by the Obama administration to deter illegal immigration along the country’s southwestern border.

Homeland Security officials apprehended 530,250 illegal immigrants and sent 450,954 people back to their home countries over the 12-month period that ended in September, according to figures released Friday by the Department of Homeland Security.

The majority of those apprehended come from Central American countries and include 137,614 families and unaccompanied children, part of an ongoing flight from high crime and violence in Honduras, El Salvador and Guatemala, which human rights advocates have urged the administration to treat as a refu­gee crisis.

The number of families and children in the past year also exceeded figures from 2015 and 2014, when illegal immigrants from Central America overwhelmed U.S. Border Patrol stations at the Mexican border and President Obama called the flow of children an “urgent humanitariansituation.”

Administration officials said Friday that the latest “removal” figures reflect a concerted policy shift to target convicted criminals over others.

“We continued to better focus our interior resources on removing individuals who may pose threats to public safety — specifically, convicted criminals and threats to national security,” Homeland Security Secretary Jeh Johnson said in a statement. “This prioritization is reflected in actual results.” More than 99 percent of those forcibly removed from the country over the most recent 12-month period fell into the administration’s three priority categories.

Overall deportations have dropped over the past few years, from a peak of more than 400,000 during Obama’s first term.

Immigration human rights advocates, including J. Kevin ­Appleby, the senior director of international migration policy at the Center for Migration Studies, say the priorities were a good move — probably resulting in fewer deportations overall — but have come too late.

“In the end, the president will be remembered as a deporter, not a reformer. In the first four years, he set record numbers in removals, much to the dismay of the immigrant community,” Appleby said.

Immigration advocates have repeatedly criticized the Obama administration for its increased reliance on detention facilities, particularly for Central American families, who they argue should be treated as refugees fleeing violent home countries rather than as priorities for deportation.

They also say that the growing number of apprehended migrants on the border, as reflected in the new Homeland Security figures, indicate that home raids and detentions of families from Central America isn’t working as a deterrent.

Trump’s Transition: Who is Gen. John F. Kelly?

 

President-elect Donald Trump is nominating retired Marine Gen. John F. Kelly for secretary of homeland security. Here’s what you need to know about him. (Video: Sarah Parnass, Osman Malik/Photo: Nikki Kahn/The Washington Post)

According to the Homeland Security report released Friday, U.S. Immigration and Customs Enforcement placed 352,882 people in detention facilities in fiscal 2016, a sharp rise from 193,951 people placed in detention last year.

Officials said Friday that the shifting demographic — from predominantly Mexican adults trying to cross the border 10 years ago to a larger proportion of Central Americans crossing today — has placed an added strain on Homeland Security resources due to the costs of sending people back to Central America and because of longer processes for people with security concerns.

Many of those arriving from Central America have applied for asylum with claims of “credible or reasonable fear of persecution” in their home countries, Homeland Security officials said.

After pressure from immigration rights advocates, the administration last summer announced plans to expand a State Department program to allow Central American minors to apply for refu­gee status.

But human rights activists ­expect detentions to increase under the administration of ­President-elect Donald Trump, who has vowed to step up the deportation of illegal immigrants and build a wall on the Mexican border.

Earlier this month, Trump said he would nominate retired Marine Gen. John F. Kelly, a border security hawk, to run the Department of Homeland Security. Kelly has warned about cross-border threats from Mexico and Central America.

Homeland Security figures released Friday showed that nearly 84 percent of the people removed from the United States in fiscal year 2016 were categorized as Priority 1, which includes ­“national security threats, convicted felons or ‘aggravated felons,’ criminal gang participants, and illegal entrants apprehended at the border,” according to the department’s report.

It was also unclear how many of those convicted were violent criminals or national security threats, as opposed to those whose offenses related only to crossing the border illegally. Twenty-two percent of those sent back to their countries also had no prior criminal convictions, the report said.

https://www.washingtonpost.com/world/national-security/central-americans-continue-to-surge-across-us-border-new-dhs-figures-show/2016/12/30/ed28c0aa-cec7-11e6-b8a2-8c2a61b0436f_story.html?utm_term=.d32dda491561

Read Full Post | Make a Comment ( None so far )

Master of Disaster President Obama — Legacy of Failure: Domestically and Abroad — One Success: Destroyed Democratic Party! — Videos

Posted on December 30, 2016. Filed under: American History, Articles, Blogroll, British History, Central Intelligence Agency (CIA), College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Dirty Bomb, Documentary, Drones, Economics, Education, Elections, Employment, Energy, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Homicide, Illegal, Immigration, Islam, Law, Legal, liberty, Life, Links, Macroeconomics, media, Middle East, Monetary Policy, Money, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Natural Gas, Newspapers, Nuclear, Nuclear Power, Nuclear Proliferation, Oil, Oil, People, Philosophy, Photos, Politics, Press, Radio, Rants, Raves, Raymond Thomas Pronk, Resources, Security, Strategy, Tax Policy, Taxation, Taxes, Television, Trade Policiy, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: |

Image result for master of destruction obama

Image result for master of destruction obama

Image result for master of destruction obama

Image result for cartoons master of destruction obama

Image result for cartoons master of disaster obama

Image result for cartoons master of disaster obama

Image result for cartoons master of disaster obama

Image result for cartoons master of disaster obama

Image result for cartoons obama legacy

 

Image result for cartoons obama legacy

Image result for cartoons obama legacyImage result for cartoons obama legacy

Image result for cartoons obama legacy

Image result for cartoons obama legacy

Image result for cartoons master of disaster obama

Image result for cartoons obama legacy

Image result for cartoons obama legacy

Obama’s Legacy of Failures – 30 documented examples

Report: ‘Obamanomics’ to Blame for Worst Economic Recovery Since 1930s