Programming

Clive Thompson — Coders: The Making of A New Tribe and The Remaking of The World — Smarter Than You Think: How Technology Is Changing Our Minds for The Better — Videos

Posted on September 4, 2019. Filed under: American History, Anthropology, Blogroll, Books, College, Congress, Cult, Culture, Data, Economics, Education, Employment, High School, history, Journalism, Law, liberty, Life, Links, Literacy, Math, media, Medicine, Money, Non-Fiction, People, Philosophy, Photos, Programming, Psychology, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Resources, Sociology | Tags: , , , , , , , , , , , , , , , , , , , , , , |

 

See the source image

Picture 1 of 10

See the source image

See the source image

 

See the source image

See the source image

Clive Thompson

CLIVE THOMPSON: HOW TECH REMADE THE WORLD

Clive Thompson: Where do Big Ideas Come From?

Smarter Than You Think | Clive Thompson

Clive Thompson’s New Book Smarter Than You Think | Keen On…

Smarter Than You Think by Clive Thompson | Animated Book Review

Smarter Than You Think by Clive Thompson Audiobook

Coding Culture

“Learning to Code is Not Just for Coders” | Ali Partovi | TEDxSausalito

TEDx Talks

Published on Dec 1, 2016
COFOUNDER, CODE.ORG, ILIKE, & LINKEXCHANGE “Every child in America deserves access to Computer Science.” Described by the San Jose Mercury News as one of “Silicon Valley’s top angel investors,” Ali Partovi has backed Airbnb, Dropbox, Facebook, Uber, and Zappos. In 2013, Partovi helped his twin brother Hadi launch Code.org, which promotes computer science education and has introduced 200 million kids to computer programming via the “Hour of Code.” Early in his career he cofounded LinkExchange and later iLike.

How I taught myself to code | Litha Soyizwapi | TEDxSoweto

Learn the basics. Learn by doing. Apply Knowledge.

What do programmers actually do?

Programmer: Reality vs Expectations (Computer Programmer) Part 1

Programmer: Reality vs Expectations (Computer Programmer) Part 2

Rags to Microsoft Software Developer – My Life Story

Microsoft laid me off after 15 years of service. My life after Microsoft?

Microsoft ruined MY weekend… MY LAN party & My LIFE! WHY!

Microsoft ruined MY weekend… MY LAN party & My LIFE! WHY!

The Real Story of the Homeless Coder | Mashable Docs

Top 10 Worst Things about Programming

here i listed them all:
10-commute 9-your work doesn’t exist 8-constant changing 7-meetings 6-your company changes 5-visibility office politics 4-sitting at desk all day 3-stress 2-arrogant people 1-bad code/manager

Top 10 Programmer Benefits

Learn Programming | Best Tips & Secrets

Top 10 Questions Coders Need to ASK in Interviews!

It’s The Culture Stupid | Coder Radio 336

Uncle Bob Martin – The Clean Coder

“Uncle” Bob Martin – “The Future of Programming”

Published on May 18, 2016

How did our industry start, what paths did it take to get to where we are, and where is it going. What big problems did programmers encounter in the past? How were they solved? And how do those solutions impact our future? What mistakes have we made as a profession; and how are we going to correct them. In this talk, Uncle Bob describes the history of software, from it’s beginnings in 1948 up through the current day; and then beyond. By looking at our past trajectory, we try to plot out where our profession is headed, and what challenges we’ll face along the way. Robert C. Martin (Uncle Bob) has been a programmer since 1970. He is the Master Craftsman at 8th Light inc, an acclaimed speaker at conferences worldwide, and the author of many books including: The Clean Coder, Clean Code, Agile Software Development: Principles, Patterns, and Practices, and UML for Java Programmers.

The Future of Programming – .NET Oxford – April 2019

Published on May 1, 2019

The Future of Programming 2019 Update How did our industry start, what paths did it take to get to where we are, and where is it going. What big problems did programmers encounter in the past? How were they solved? And how do those solutions impact our future? What mistakes have we made as a profession; and how are we going to correct them. In this talk, Uncle Bob describes the history of software, from it’s beginnings in 1948 up through the current day; and then beyond. By looking at our past trajectory, we try to plot out where our profession is headed, and what challenges we’ll face along the way. Robert Martin visited .NET Oxford in the UK, where this talk was recorded. For more information about the .NET Oxford user-group, please visit https://www.meetup.com/dotnetoxford.

Interview With Bob Martin (Uncle Bob)

Artificial Intelligence, the History and Future – with Chris Bishop

A New Philosophy on Artificial Intelligence | Kristian Hammond | TEDxNorthwesternU

Why Is Deep Learning Hot Right Now?

Deep Learning Tutorial with Python | Machine Learning with Neural Networks [Top Udemy Instructor]

Elon Musk: Tesla Autopilot | Artificial Intelligence (AI) Podcast

Eric Weinstein: Revolutionary Ideas in Science, Math, and Society | Artificial Intelligence Podcast

Tom Lehrer – Poisoning Pigeons In The Park

Tom Lehrer – We Will All Go Together When We Go

Tom Lehrer: The Vatican Rag (concert live) (1965)

Tom Lehrer – The Irish Ballad – LIVE FILM From Copenhagen in 1967

Tom Lehrer Full Copenhagen Performance

Tom Lehrer Interview NPR January 4, 1979

MIT Self-Driving Cars: State of the Art (2019)

MIT Deep Learning Basics: Introduction and Overview

Published on Jan 11, 2019

An introductory lecture for MIT course 6.S094 on the basics of deep learning including a few key ideas, subfields, and the big picture of why neural networks have inspired and energized an entire new generation of researchers. For more lecture videos on deep learning, reinforcement learning (RL), artificial intelligence (AI & AGI), and podcast conversations, visit our website or follow TensorFlow code tutorials on our GitHub repo.

MIT 6.S094: Introduction to Deep Learning and Self-Driving Cars

Google’s Deep Mind Explained! – Self Learning A.I.

Artificial Intelligence: Mankind’s Last Invention

Top 10 Computer Science Schools in the World

Coders: The Making of a New Art and the Remaking of the World

Clive Thompson. Penguin Press, $28 (448p) ISBN 978-0-7352-2056-0

In this revealing exploration of programming, programmers, and their far-reaching influence, Wired columnist Thompson (Smarter Than You Think) opens up an insular world and explores its design philosophy’s consequences, some of them unintended. Through interviews and anecdotes, Thompson expertly plumbs the temperament and motivations of programmers. Thompson explains how an avowedly meritocratic profession nevertheless tends to sideline those who are not white male graduates of prestigious university computer science programs, tracing this male-dominated culture back to 1960s and early ’70s MIT, where the “hacker ethic” was first born. Remarkably, though, he makes clear that programming is an unusual field in that successful practitioners are often self-taught, many having started out with only simple tools, such as a Commodore computer running the BASIC programming language. This book contains possibly the best argument yet for how social media maneuvers users into more extreme political positions, since “any ranking system based partly on tallying up the reactions to posts will wind up favoring intense material.” Impressive in its clarity and thoroughness, Thompson’s survey shines a much-needed light on a group of people who have exerted a powerful effect on almost every aspect of the modern world. (Apr.)

Reviewed on: 12/24/2018
Release date: 03/26/2019
Genre: Nonfiction
Ebook – 978-0-7352-2057-7
Paperback – 448 pages – 978-0-7352-2058-4

 

 

KIRKUS REVIEW

Of computer technology and its discontents.

Computers can do all kinds of cool things. The reason they can, writes tech journalist Thompson (Smarter than You Think: How Technology is Changing Our Minds for the Better, 2013), is that a coder has gotten to the problem. “Programmers spend their days trying to get computers to do new things,” he writes, “so they’re often very good at understanding the crazy what-ifs that computers make possible.” Some of those things, of course, have proven noxious: Facebook allows you to keep in touch with high school friends but at the expense of spying on your every online movement. Yet they’re kind of comprehensible, since they’re based on language: Coding problems are problems of words and thoughts and not numbers alone. Thompson looks at some of the stalwarts and heroes of the coding world, many of them not well-known—Ruchi Sanghvi, for example, who worked at Facebook and Dropbox before starting a sort of think tank “aimed at convincing members to pick a truly new, weird area to examine.” If you want weird these days, you get into artificial intelligence, of which the author has a qualified view. Humans may be displaced by machines, but the vaunted singularity probably won’t happen anytime soon. Probably. Thompson is an enthusiast and a learned scholar alike: He reckons that BASIC is one of the great inventions of history, being one of the ways “for teenagers to grasp, in such visceral and palpable ways, the fabric of infinity.” Though big tech is in the ascendant, he writes, there’s a growing number of young programmers who are attuned to the ethical issues surrounding what they do, demanding, for instance, that Microsoft not provide software to the Immigration and Customs Enforcement agency. Those coders, writes Thompson, are “the one group of people VCs and CEOs cannot afford to entirely ignore,” making them the heroes of the piece in more ways than one.

Fans of Markoff, Levy, Lanier et al. will want to have a look at this intriguing portrait of coding and coders.

About this book

https://www.kirkusreviews.com/book-reviews/clive-thompson/coders/

Book Summary

To understand the world today, we need to understand code and its consequences. With Coders, Thompson gives a definitive look into the heart of the machine.

Hello, world.

Facebook’s algorithms shaping the news. Self-driving cars roaming the streets. Revolution on Twitter and romance on Tinder. We live in a world constructed of code – and coders are the ones who built it for us. From acclaimed tech writer Clive Thompson comes a brilliant anthropological reckoning with the most powerful tribe in the world today, computer programmers, in a book that interrogates who they are, how they think, what qualifies as greatness in their world, and what should give us pause. They are the most quietly influential people on the planet, and Coders shines a light on their culture.

In pop culture and media, the people who create the code that rules our world are regularly portrayed in hackneyed, simplified terms, as ciphers in hoodies. Thompson goes far deeper, dramatizing the psychology of the invisible architects of the culture, exploring their passions and their values, as well as their messy history. In nuanced portraits, Coders takes us close to some of the great programmers of our time, including the creators of Facebook’s News Feed, Instagram, Google’s cutting-edge AI, and more. Speaking to everyone from revered “10X” elites to neophytes, back-end engineers and front-end designers, Thompson explores the distinctive psychology of this vocation – which combines a love of logic, an obsession with efficiency, the joy of puzzle-solving, and a superhuman tolerance for mind-bending frustration.

Along the way, Coders thoughtfully ponders the morality and politics of code, including its implications for civic life and the economy. Programmers shape our everyday behavior: When they make something easy to do, we do more of it. When they make it hard or impossible, we do less of it. Thompson wrestles with the major controversies of our era, from the “disruption” fetish of Silicon Valley to the struggle for inclusion by marginalized groups.

In his accessible, erudite style, Thompson unpacks the surprising history of the field, beginning with the first coders – brilliant and pioneering women, who, despite crafting some of the earliest personal computers and programming languages, were later written out of history. Coders introduces modern crypto-hackers fighting for your privacy, AI engineers building eerie new forms of machine cognition, teenage girls losing sleep at 24/7 hackathons, and unemployed Kentucky coal-miners learning a new career.

At the same time, the book deftly illustrates how programming has become a marvelous new art form – a source of delight and creativity, not merely danger. To get as close to his subject as possible, Thompson picks up the thread of his own long-abandoned coding skills as he reckons, in his signature, highly personal style, with what superb programming looks like.

https://www.bookbrowse.com/bb_briefs/detail/index.cfm/ezine_preview_number/13867/coders

Praise

“Fascinating. Thompson is an excellent writer and his subjects are themselves gripping. . . . [W]hat Thompson does differently is to get really close to the people he writes about: it’s the narrative equivalent of Technicolor, 3D and the microscope. . . . People who interact with coders routinely, as colleagues, friends or family, could benefit tremendously from these insights.” —Nature

“With an anthropologist’s eye, [Thompson] outlines [coders’] different personality traits, their history and cultural touchstones. He explores how they live, what motivates them and what they fight about. By breaking down what the actual world of coding looks like . . . he removes the mystery and brings it into the legible world for the rest of us to debate. Human beings and their foibles are the reason the internet is how it is—for better and often, as this book shows, for worse.” —TheNew York Times Book Review

“An outstanding author and long-form journalist. . . . I particularly enjoyed [Thompson’s] section on automation.” —Tim Ferriss

“[An] enjoyable primer on the world of computer programmers. . . . Coders are building the infrastructure on which twenty-first century society rests, and their work has every chance of surviving as long, and being as important, as the Brooklyn Bridge—or, for that matter, the Constitution.” —Bookforum

“Thompson delivers again with this well-written narrative on coders, individual histories, and the culture of coder life, at home and work. . . . In addition to analyzing the work-life of coders, he brilliantly reveals several examples of how they live in their respective relationships. Throughout, Thompson also does a great job exploring the various drivers that permeate the industry: merit, openness of code, long coding stints without sleep, and how the culture tends toward start-up culture even when companies are established. This engaging work will appeal to readers who wish to learn more about the intersection of technology and culture, and the space in which they blur together.” —Library Journal, starred review

“Thompson offers a broad cultural view of the world of coders and programmers from the field’s origins in the mid-twentieth century to the present. In this highly readable and entertaining narrative, he notes the sense of scale and logical efficiency in coding and the enthusiasm with which programmers go about creating new features and finding bugs. . . . [A] comprehensive look at the people behind the digital systems now essential to everyday life.”—Booklist

“Looks at some of the stalwarts and heroes of the coding world, many of them not well-known. . . . Thompson is an enthusiast and a learned scholar alike. . . . Fans of Markoff, Levy, Lanier, et al. will want to have a look at this intriguing portrait of coding and coders.” —Kirkus

“In this revealing exploration of programming, programmers, and their far-reaching influence, Wired columnist Thompson opens up an insular world and explores its design philosophy’s consequences, some of them unintended. Through interviews and anecdotes, Thompson expertly plumbs the temperament and motivations of programmers. . . . [Coders] contains possibly the best argument yet for how social media maneuvers users into more extreme political positions. . . . Impressive in its clarity and thoroughness, Thompson’s survey shines a much-needed light on a group of people who have exerted a powerful effect on almost every aspect of the modern world.”Publishers Weekly, starred review

“As a person who has spent a lot of time writing code, I can confirm that you need to be a little bit of a weirdo to love it. Clive Thompson’s book is an essential field guide to the eccentric breed of architects who are building the algorithms that shape our future, and the AIs who will eventually rise up and enslave us. Good luck, humans!” —Jonathan Coulton, musician

“Clive Thompson is more than a gifted reporter and writer. He is a brilliant social anthropologist. And, in this masterful book, he illuminates both the fascinating coders and the bewildering technological forces that are transforming the world in which we live.” —David Grann, author of The Lost City of Z and Killers of the Flower Moon

“With his trademark clarity and insight, Clive Thompson gives us an unparalleled vista into the mind-set and culture of programmers, the often-invisible architects and legislators of the digital age.”  —Steven Johnson, author of How We Got to Now

“If you have to work with programmers, it’s essential to understand that programming has a culture. This book will help you understand what programmers do, how they do it, and why. It decodes the culture of code.” —Kevin Kelly, senior maverick for Wired

“Clive Thompson is the ideal guide to who coders are, what they do, and how they wound up taking over the world. For a book this important, inspiring, and scary, it’s sinfully fun to read.” —Steven Levy, author of In the Plex

“It’s a delight to follow Clive Thompson’s roving, rollicking mind anywhere. When that ‘anywhere’ is the realm of the programmers, the pleasure takes on extra ballast. Coders is an engrossing, deeply clued-in ethnography, and it’s also a book about power, a new kind: where it comes from, how it feels to wield it, who gets to try—and how all that is changing.”  —Robin Sloan, author of Mr. Penumbra’s 24-Hour Bookstore

“Clive Thompson has deftly picked apart the myth of a tech meritocracy. Guiding readers through the undercovered history of programming’s female roots, Coders points with assurance to the inequities that have come to define coding today, as both a profession and the basis of the technology that shapes our lives. Readable, revealing, and in many ways infuriating.”  —Rebecca Traister, author of Good and Mad

“Code shapes coders, and coders shape the code that changes how we think, every day of our lives. If you want to create a more humanistic digital world, read this book to get started.” —Sherry Turkle, professor at MIT; author of Reclaiming Conversation and Alone Together

“Thompson has accomplished the nearly impossible task of portraying the coding world exactly as it is: messy, inspiring, naive, and—at times—shameful. Coders is a beautifully written and refreshingly fair portrayal of a young industry that’s accomplished so much and still has a lot to learn.” —Saron Yitbarek, CEO and founder of CodeNewbie

Coding Has Become Pop Culture

Exactly what I did not want to become …

But programming has not. And let me dive right into it.

Fifteen years ago when people suggested I should become a programmer because of my introverted and shy personality, analytical mind and complete lack of social life, I laughed and shamelessly flipped them off. But I was a teenager, and in my teenage mind a programmer lived forever with their parents, in the basement, with pimples and large ugly glasses, has never had a girlfriend but plenty of wet dreams about princess Leia. Repeatedly. And that image did not sit well with me. Plus, I actually had a girlfriend, and a hot one at that.

Forward six years, and I was in Budapest airport casually reading a book about HTML…

Add another 6 years and I landed my first full-stack web developer job at a Northern Irish startup. Yes, I took my time, I guess. But how much time? I don’t quite know to be honest. But it was a lot. Was it the mythical 10.000 hours? No. If I would have to make a rough estimation, I would say, to date I have “coded” about 8000 hours. Technically, according to the 10.000 hour rule, in 2000 hours worth of “coding”, I shall be an expert in my field.

Or will I?

Here’s what I have done in those 8000 hours. Grab a seat, as this is going to be long and hard to follow. I have written code in the following languages: C, HTML, CSS, JavaScript, Java (Android), Swift, PHP, Ruby, Python, Chuck, SQL to work with the following frameworks: Node, Angular, Bootstrap, Foundation, React, Rails, CodeIgniter, Ionic while building landing pages, websites, WordPress sites, eCommerce solutions, eLearning content, Moodle sites, Totara sites, Mahara sites, Common Cartridge packages, SCORM packages, Android apps, iOS apps, hybrid apps, in-house web applications, eBooks, magazines, games, and board-game companion apps. So what am I getting at?

Well, what I am trying to say is that there is no field, therefore becoming an expert in it, becomes unattainable. Coding is not a field. Computer Science is, but that’s an entirely different slice of cheese.

Coding is what presidents, educators, parents and employers and companies herd the young generations into, like cattle onto the holy grail of golden fields of opportunity.

The promise is a dream, the propaganda is well-crafted and simple-worded, heck it’s not even worded any more, it’s dumbed down to simple images for them lovely wee “rugrats” who definitely must learn logical thinking before learning how to feed themselves — please note the sarcasm.

Just 15 years later, coding has become the “pop-culturized” version of programming and what everybody now hopes will be the future army of coders upon which we shall build our AI controlled home, traffic, retail, entertainment, medical, industrial, sexual, illusional and delusional revolution, will turn out to be an absolute shit-show — and there truly is no better word for that. And all this, because programming is being sold as “coding” and “coding” is supposedly easy. Couldn’t be further away from the truth…

So here’s the fine-print. The “factualised” myth that anyone can learn a programming language in mere hours is only true up to a point and that point happens to be very early on in the learning process. Indeed, a and any programming language can be learnt in a single day. In fact if one’s goal is to become a programming polyglot in a month (while having a job), 8–10 languages can be learnt by studying during the weekends. But here’s the catch. Every programming language has its libraries and, its syntactic sugar and personality, and none of that can really be learnt quickly or easily or in a weekend. In fact, in the real world, every programming language becomes the least of your problems.

Just because you speak English, it doesn’t mean you’re good at writing novels, or even short stories. Same goes for coding.

Just because you’ve learnt the language, does not mean you know how to program. Add to that the myriad of frameworks, plugins, libraries, pre-processors, post-processors, coding standards, industry standards, TDD, BDD, content management systems, file versioning, CI, deployment and release management, debugging, ticketing, waterfall, agile, scrum and their combination thereof… and I am not even sure I’ve touched on everything. The point is, being a “coder” involves more or less all of the above. And programming itself is just a tiny tiny part of it. A crucial part, but nevertheless, tiny.

Yet programming is still continuously being dumbed-down …

Apple launched Playgrounds, MIT launched Scratch, Lego is launching Boost, all in an attempt to sell “coding” to younger and younger age-groups as if that will fill the quota of millions of new programmers by 202x.

The message is pretty much “don’t worry about the code, take these virtual puzzle pieces and off you go, you can program”. If only that were true. Here’s the thing about programming. It’s text-based. Has been, and will be for many more years to come. Kids who play with Lego Boost, Playgrounds or Scratch won’t be better programmers by the age of 22 than those who started learning programming at 16 and did it in an actual programming language. In fact, why should they be? I would not expect my child to be a bread-earning individual until the age of 22. Learn “coding” for 6 years, and I guarantee she/he will land a job in no-time.

GUI has also nothing to do with the real programming world, and logical thinking can be transferred to a kid in many other ways. When was the last time you saw a kid do a 1000 piece puzzle on the dining-room table? Exactly…

Kids are by default very logical human beings, in fact that’s how they learn how the world works.

They learn the value of the if-else-statement the first day they’re born. “If I cry, mum will make it stop, else I keep crying until dad shows up (who will probably make everything 10 times worse, but heck, I’m gonna t(c)ry anyway…).” Kids are very logical, hence their often brutal sincerity. You call it innocence, they call it a black-and-white world. There are no multiple switch statements yet. There are no shades of grey. That comes later. Both literally and literarily (in 3 volumes no less…). 😉 Bottom line, they are more than equipped with logical thinking, but put them in front of the TV, or hand them a tablet for 6 hours a day, and all that is going to become a pile of corrupted values as often there is very little thinking involved.

“Coding” is not a musical art, a piano or a violin that a child might need to develop muscle-memory for. It’s engineering.

What programming requires is analytical thinking, problem-solving attitude, stamina for failed attempts at coming up with the right solution, passion for technology, pride in your own code, but maturely accepting someone else’s improvements and observations, and a sense of responsibility for any code you write or contribute to.

Correct me if I am wrong, but none of these traits are easy to cultivate and develop. Certainly not at the age of 5! Yet, nobody seems to sell “coding” as it really is — a fun but difficult journey of discovery, success and failure and all that “da capo”, all year, every year.

Just because “coding” sounds cool, it does not mean it’s not the same ole’ hard-core programming. If anything, it’s even more so today than 15 years ago. Except we now all wear skinny jeans, walk around with even skinnier laptops, moved out of the basement and with all the “fill the gender-gap” hype, we might even end up with decent looking girlfriends.

P.S. Some things don’t change. The ugly glasses stayed. But they’re trendy now, so it’s all good. 😉

https://hackernoon.com/coding-has-become-a-pop-culture-939100f84b0c

The ugly underbelly of coder culture

Today’s developers are overwhelmingly young and male, and they’re barring the door from a more diverse workforce

Read Full Post | Make a Comment ( None so far )

Bill Bonner — Hormegeddon: How Too Much of a Good Thing Leads To Disaster — Videos

Posted on July 13, 2019. Filed under: American History, Banking, Blogroll, Books, Business, College, Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Culture, Economics, Education, Elections, Employment, Energy, Faith, Family, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, Friends, government, government spending, Health, history, History of Economic Thought, Immigration, Investments, Journalism, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, Monetary Policy, Money, Money, Narcissism, Newspapers, Non-Fiction, People, Philosophy, Photos, Plays, Police, Political Correctness, Politics, Presidential Candidates, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Reviews, Security, Talk Radio, Tax Policy, Taxation, Taxes, Technology, Terrorism, Trade, Trade Policiy, Transportation, Wealth, Writing | Tags: , , , , , , , |

See the source imageSee the source image

See the source image

Why Public Policy Always Ends in Disaster

It’s Hormeggedon! What Happens When Public Policy Passes the Point of No Return

Bill Bonner Interview: hold on to your cash, the real financial crisis is yet to come

Bill Bonner on the financial markets WORLD.MINDS INTERVIEW

How to Profit from the Death of Retail. Guest Bill Bonner.

Bill Bonner (author)

 MoneyWeek magazine,[2] and his daily financial column Bill Bonner’s Diary.[3]

Contents

Biography

Bonner was born in 1948.[4] He attended the University of New Mexico and Georgetown University Law School, and he began work with Jim Davidson, at the National Taxpayers Union.[citation needed]

Bonner was a director of MoneyWeek from 2003 to 2009.[4]

Works

Bonner co-authored Financial Reckoning Day: Surviving The Soft Depression of The 21st Century and Empire of Debt with Addison Wiggin. He also co-authored Mobs, Messiahs and Marketswith Lila Rajiva. The latter publication won the GetAbstract International Book Award for 2008.[5] He has previously co-authored two short pamphlets with British media historian, John Campbell, and with The Times former editor, Lord William Rees-Mogg, and has co-edited a book of essays with intellectual historian, Pierre Lemieux.[6]

In his two financial books, as well as in The Daily Reckoning, Bonner has argued that the financial future of the United States is in peril because of various economic and demographic trends, not the least of which is America’s large trade deficit. He claims that America’s foreign policy exploits are tantamount to the establishment of an empire, and that the cost of maintaining such an empire could accelerate America’s eventual decline. Bonner argues in his latest book that mob and mass delusions are part of the human condition.[citation needed]

Bonner warned in 2015 that the credit system, which has been the essential basis of the US economy since the 1950s, will inevitably fail, leading to catastrophic failure of the banking system.[7][8]

In June 2016, Bill Bonner, via his company Agora, paid for an advertisement on Reuters describing a new law that would not allow Americans to take money out of their own USA accounts. The ad reads: “New Law Cracks Down on Right to Use Cash. Americans are reporting problems taking their own money out of US banks.” The advertisement does not cite the law (the Foreign Account Tax Compliance Act or FATCA[9]) to which it refers.

References

  1. ^ “Bill Bonner, Author at LewRockwell LewRockwell.com”.
  2. ^ https://moneyweek.com/author/bill-bonner/
  3. ^ Bill Bonner’s Diary
  4. Jump up to:a bhttps://beta.companieshouse.gov.uk/company/04016750/officers
  5. ^ “getAbstract International Book Award”.
  6. ^ Bonner, Bill; Lemieux, Pierre (2003). The Idea of America. Agora Health Books. ISBN 1891434136.
  7. ^ “Bill Bonner: hold on to your cash, the real financial crisis is yet to come”. MoneyWeek. March 3, 2015.
  8. ^ Wiggins, Addison (June 29, 2015). “When Genius Fails Again”. Forbes. Retrieved December 1, 2016.
  9. ^ Sahadi, Jeanne (June 4, 2015). “You’ve never seen IRS penalties like these”CNNMoney. Retrieved 2016-08-01.

External links

https://en.wikipedia.org/wiki/Bill_Bonner_(author)

Read Full Post | Make a Comment ( None so far )

Oldest American, Cigar Smoker, Whisky Drinker and World War II Veteran, Richard Overton, Robbed of Savings and Identity in Austin, Texas — Keep On Living and You Will Get There Too — Videos

Posted on June 30, 2018. Filed under: American History, Blogroll, Communications, Culture, Diet, Disease, Documentary, Education, Elections, Employment, Faith, Family, Federal Government, Food, Freedom, government spending, Heroes, history, Homes, Law, liberty, Links, Literacy, media, People, Philosophy, Photos, Politics, Press, Programming, Psychology, Radio, Rants, Raves, Raymond Thomas Pronk, Rifles, State, Strategy, Success, The Pronk Pops Show, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , |

 

 

Oldest American, Cigar Smoker, Whisky Drinker and World War II Veteran, Richard Overton, Robbed of Savings and Identity in Austin, Texas — Videos

See the source image

America’s oldest man, a 112-year-old WWII veteran, had his identity stolen and bank account emptied

The oldest living World War II veteran, Richard Overton, is 112-years old. He is shown here celebrating his 111th birthday in Texas in 2017. Relatives say someone has stolen his identity and emptied his bank account. (Image source: YouTube screenshot)

See the source imageSee the source image

Thieves drain Richard Overton’s personal bank account

Oldest veteran in US, 112, robbed of savings, identity, family says

Austinite Richard Overton, ‘Nation’s Oldest Veteran’ needs help | 12/2016

Richard Overton, oldest living veteran, turns 112

Street Renamed for Oldest Living WWII Veteran on His 111th Birthday

“Mr. Overton” A documentary about Richard Overton (ORIGINAL)

Richard Overton, 111, ‘just keeps living’

Oldest WWII vet relishes cigars, celeb status

109-Year-Old Veteran and His Secrets to Life Will Make You Smile | Short Film Showcase

 

12-year-old Austin resident, our oldest living veteran, robbed of savings, identity

Read Full Post | Make a Comment ( None so far )

March 14, 2018, Story 1: Student March For More Government Intervention After Numerous Government Failures in Florida — Government School Indoctrination Will Get You Killed — Baby Sitting Indoctrination Centers (Schools and Colleges) Are Dangerous To Your Mental and Physical Health — Government Control Not Gun Control — Videos — Story 2: Stephen Hawking Dead At 76 — Videos

Posted on March 14, 2018. Filed under: American History, Articles, Blogroll, College, Communications, conservatives, Constitution, Corruption, Crime, Documentary, Economics, Education, Elections, Employment, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, government, government spending, High School, history, Journalism, Language, Law, liberty, Life, Links, Literacy, media, Pistols, Political Correctness, Politics, Programming, Psychology, Radio, Rants, Raves, Raymond Thomas Pronk, Rifles, Spying, Strategy, Terrorism, Video, War, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , |

See the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source image

We are too solicitous for government intervention, on the theory, first, that the people themselves are helpless, and second, that the Government has superior capacity for action. Often times both of these conclusions are wrong.

Calvin Coolidge

“If you want government to intervene domestically, you’re a liberal. If you want government to intervene overseas, you’re a conservative. If you want government to intervene everywhere, you’re a moderate.

If you don’t want government to intervene anywhere, you’re an extremist.”
~ Joseph Sobran

I’m a little embarrassed about how long it took me to see the folly of most government intervention. It was probably 15 years before I really woke up to the fact that almost everything government attempts to do, it makes worse.

John Stossel

Best 7 minutes on gun control I have ever seen!

Tucker: Assault weapons ban will not stop mass killings

Tucker: Calls for gun control are a kind of class warfare

Shapiro: Security in schools needs to be radically escalated

Banning guns won’t stop violence: Crime Prevention Research

John Lott: Evidence proves owning a gun is the best way to protect your family

John Lott: The War on Guns

Students Stage Walkout to White House, Capitol

#MarchForOurLives in DC

Student speaks in front of the U.S. Capitol on #NationalWalkoutDay

Students across the country walk out to protest gun violence

#SchoolShootings Coverage: Blame #Trump and #Guns But Never #PsychMeds Per #BigPharma Instructions

Megyn Kelly On National School Walkout: ‘What A Thing To See Students Rise Up’ | Megyn Kelly TODAY

Government Interference

Yaron Answers: Capitalizing On Government Intervention

Story 2: Stephen Hawking Dead At 76 — Videos

See the source image

Stephen Hawking dead at 76

Theoretical Physicist Stephen Hawking Dead at 76

Stephen Hawking: The 60 Minutes interview

Stephen Hawking on Donald Trump’s US: “I Fear I May Not Be Welcome” | Good Morning Britain

Stephen Hawking on the remarkable life that turned him into a celebrity | ITV News

How Stephen Hawking Lived So Long With ALS

A look at Stephen Hawking’s life – Daily Mail

Stephen Hawking on God

God Does Not Exist – Stephen Hawking

Stephen Hawking Interview: Last Week Tonight with John Oliver (HBO)

Celebrating the work, mind and humor of Stephen Hawking

Stephen Hawking’s triumph of mind over matter

Stephen Hawking student reacts to his death

Ten things to know about Stephen Hawking

Stephen Hawking’s Last Speech

America Mourns Stephen Hawking’s Death But Has No Earthly Idea What He Did, Said or Wrote

ALS Signs and Symptoms

What is A.L.S. or Lou Gehrig’s Disease ?

ALS Symptoms + Progression (of 50+ patients)

 

Stephen Hawking’s final warning to humanity: Legendary physicist believed we must leave Earth in the next 200 years or face EXTINCTION

Humans must leave Earth in the next 200 years if we want to survive.

That was the stark warning issued by Professor Stephen Hawking in the months before his death today at the age of 76.

The legendary physicists believed that life on Earth could be wiped out by a disaster such as an asteroid strike, AI or an alien invasion.

He also warned over-population, human aggression and climate change could cause humanity to self-destruct.

He believed, if our species had any hope of survival, future generations would need to forge a new life in space.

Scroll down for video

Humans must leave Earth within 200 years if we want to survive. That was the stark warning issued by Professor Stephen Hawking in the months before he death today at the age of 76 

Climate change

One of Hawking’s main fears for the planet was global warming.

‘Our physical resources are being drained, at an alarming rate. We have given our planet the disastrous gift of climate change,’ Hawking warned in July.

‘Rising temperatures, reduction of the polar ice caps, deforestation, and decimation of animal species. We can be an ignorant, unthinking lot.’

Hawking said that Earth will one day look like the 460°C (860°F) planet Venus if we don’t cut greenhouse gas emissions.

Hawking said that Earth (stock image) will one day look like the 460°C (860°F) planet Venus if we don't cut greenhouse gas emissions

‘Next time you meet a climate change denier, tell them to take a trip to Venus. I will pay the fare,’ Hawking quipped.

The physicist also believed President Donald Trump’s decision to withdraw from the Paris Climate Agreement has doomed our planet.

He warned Trump’s decision would caused avoidable damage to our ‘beautiful planet’ for generations to come.

‘We are close to the tipping point where global warming becomes irreversible,’ the celebrated scientist told BBC last year.

Asteroid strikes

If global warming doesn’t wipe us out, Hawking believed Earth would be destroyed by an asteroid strike.

‘This is not science fiction. It is guaranteed by the laws of physics and probability,’ he said.

‘To stay risks being annihilated.

‘Spreading out into space will completely change the future of humanity. It may also determine whether we have any future at all.’

Hawking was working with Russian billionaire Yuri Milner’s Breakthrough Starshot project to send a fleet of tiny ‘nanocraft’ carrying light sails on a four light-year journey to Alpha Centauri, the nearest star system to Earth.

‘If we succeed we will send a probe to Alpha Centauri within the lifetime of some of you alive today,’ he said.

Astronomers estimate that there is a reasonable chance of an Earth-like planet existing in the ‘habitable zones’ of Alpha Centauri’s three-star system.

If global warming doesn't wipe us out, Hawking believed Earth would be destroyed by an asteroid strike (stock image)

‘It is clear we are entering a new space age. We are standing at the threshold of a new era’, said Hawking.

‘Human colonisation and other planets is no longer science fiction, it can be science fact.’

Hawking believed that In the long run the human race should not have all its eggs in one basket, or on one planet.

‘I just hope we can avoid dropping the basket until then’, he said.

 

AI could replace humans

Hawking claimed that AI will soon reach a level where it will be a ‘new form of life that will outperform humans.’

He even went so far as to say that AI may replace humans altogether, although he didn’t specify a timeline for his predictions.

The chilling comments during a recent interview with Wired.

He said: ‘The genie is out of the bottle. I fear that AI may replace humans altogether.

Hawking even went so far as to say that AI may replace humans altogether, although he didn't specify a timeline for his predictions (stock image)

The world pays tribute to the late Stephen Hawking on Twitter
‘If people design computer viruses, someone will design AI that improves and replicates itself.

‘This will be a new form of life that outperforms humans.’

He also he said the AI apocalypse was impending and ‘some form of government’ would be needed to control the technology.

During the interview, Hawking also urged more people to take an interest in science, claiming that there would be ‘serious consequences’ if this didn’t happen.

Stephen Hawking’s pearls of wisdom

– On the reason why the universe exists: ‘If we find the answer to that, it would be the ultimate triumph of human reason – for then we would know the mind of God’ – A Brief History Of Time, published 1988.

– On being diagnosed with motor neurone disease: ‘My expectations were reduced to zero when I was 21. Everything since then has been a bonus’ – Interview in The New York Times, December 2004.

– On black holes: ‘Einstein was wrong when he said, ‘God does not play dice’. Consideration of black holes suggests, not only that God does play dice, but that he sometimes confuses us by throwing them where they can’t be seen’ – The Nature Of Space And Time, published 1996.

– On God: ‘It is not necessary to invoke God to light the blue touch paper and set the universe going’ – The Grand Design, published 2010.

– On commercial success: ‘I want my books sold on airport bookstalls’ – Interview in The New York Times, December 2004.

– On fame: ‘The downside of my celebrity is that I cannot go anywhere in the world without being recognised. It is not enough for me to wear dark sunglasses and a wig. The wheelchair gives me away’ – Interview on Israeli TV, December 2006.

– On an imperfect world: ‘Without imperfection, you or I would not exist’ – In Into The Universe With Stephen Hawking, The Discovery Channel, 2010.

– On euthanasia: ‘The victim should have the right to end his life, if he wants. But I think it would be a great mistake. However bad life may seem, there is always something you can do, and succeed at. While there’s life, there is hope’ – Quoted in People’s Daily Online, June 2006.

– On intellectual showboating: ‘People who boast about their IQ are losers’ – Interview in The New York Times, December 2004.

– On the possibility of contact between humans and aliens: ‘I think it would be a disaster. The extraterrestrials would probably be far in advance of us. The history of advanced races meeting more primitive people on this planet is not very happy, and they were the same species. I think we should keep our heads low’ – In Naked Science: Alien Contact, The National Geographic Channel, 2004.

– On the importance of having a sense of humour: ‘Life would be tragic if it weren’t funny’ – Interview in The New York Times, December 2004.

– On death: ‘I have lived with the prospect of an early death for the last 49 years. I’m not afraid of death, but I’m in no hurry to die. I have so much I want to do first’ – Interview in The Guardian, May 2011.’

Human aggression

Hawking has previously warned aggression is humanity’s biggest failing and could ‘destroy it all’.

The remark was made back in 2015 in response to a question about what human shortcomings he would change.

Talking to an audience in the Science Museum, the renowned scientist said ‘The human failing I would most like to correct is aggression’.

‘It may have had survival advantage in caveman days, to get more food, territory or a partner with whom to reproduce, but now it threatens to destroy us all’, writes the Independent.

He said he feared evolution has ‘inbuilt’ it into the human genome, commenting that there was no sign of conflict lessening.

What’s more, he said the development of militarised technology and weapons of mass destruction could make this instinct even more dangerous.

He said empathy was the best of human emotions and meant we could be brought together in a loving state.

Aliens

Hawking also warned that if we ever did find aliens they would probably wipe us out.

‘As I grow older I am more convinced than ever that we are not alone,’ he said in a video posted online called Stephen Hawking’s Favourite Places.

The clip showed him visiting different locations across the cosmos, writes the Independent.

One of the places he visits is Gliese 832c, a planet that people speculate could be home to alien life.

‘One day we might receive a signal from a planet like Gliese 832c, but we should be wary of answering back.

‘Meeting an advanced civilization could be like Native Americans encountering Columbus. That didn’t turn out so well’, he said.

Hawking became increasing convinced there was other life out there as he got older and he led a new project called the Breakthrough Listen project to find out.

He said that any alien civilisation would be ‘vastly more powerful and may not see us as any more valuable than we see bacteria.’

Overpopulation

The renowned scientist also warned that a man-made catastrophe could spell the end for our species.

The renowned physicist believed that life on Earth is at an ever-increasing risk of being wiped out by a disaster, such as asteroid strikes, epidemics, over-population (stock image) and climate change

The renowned physicist believed that life on Earth is at an ever-increasing risk of being wiped out by a disaster, such as asteroid strikes, epidemics, over-population (stock image) and climate change

‘For me, the really concerning aspect of this is that now, more than at any time in our history, our species needs to work together,’ Hawking said in a Guardian opinion piece in 2016.

‘We face awesome environmental challenges: climate change, food production, overpopulation, the decimation of other species, epidemic disease, acidification of the oceans.

‘Together, they are a reminder that we are at the most dangerous moment in the development of humanity’, he said.

In November 2016, Hawking was more conservative in his estimates.

Jane and Stephen in the mis-1960s, shortly after his diagnosis with motor neurone disease and being given two years to live

Jane and Stephen in the mis-1960s, shortly after his diagnosis with motor neurone disease and being given two years to live

He warned that humans could not survive another 1,000 years on ‘fragile’ Earth.

At a talk in Cambridge, Hawking gave a one-hour whirlwind history of man’s understanding of the origin of the universe from primordial creation myths to the most cutting edge predictions made by ‘M-theory’.

He said: ‘Perhaps one day we will be able to use gravitational waves to look back into the heart of the Big Bang.

‘Most recent advances in cosmology have been achieved from space where there are uninterrupted views of our Universe but we must also continue to go into space for the future of humanity.

Astrophysicist Hawking floats on a zero-gravity jet in April 2007. The modified jet carrying Hawking, physicians and nurses, and dozens of others first flew up to 24,000 feet over the Atlantic Ocean off Florida

Astrophysicist Hawking floats on a zero-gravity jet in April 2007. The modified jet carrying Hawking, physicians and nurses, and dozens of others first flew up to 24,000 feet over the Atlantic Ocean off Florida

‘I don’t think we will survive another 1,000 years without escaping our fragile planet.’

Hawking, who has said he wanted to go into space on Virgin boss Richard Branson’s Ride Virgin Atlantic spaceship, continued: ‘I therefore want to encourage public interest in space, and I have been getting my training in early.’

Hawking added: ‘It has been a glorious time to be alive and doing research in theoretical physics.

‘Our picture of the universe has changed a great deal in the last 50 years and I am happy if I have made a small contribution.

‘The fact that we humans who are ourselves mere collections of fundamental particles of nature have been able to come so close to understanding the laws that are governing us and our universe is a great achievement.’

Hawking has previously described his views on the future of space travel, in the afterword of the book, ‘How to Make a Spaceship.’

He said: ‘I believe that life on Earth is at an ever-increasing risk of being wiped out by a disaster, such as a sudden nuclear war, a genetically engineered virus, or other dangers,’ he said.

‘I think the human race has no future if it doesn’t go to space.’

Making a poignant plea to his young audience of students from the University of Oxford, where he himself did his undergraduate degree, he said: ‘Remember to look up to the stars and not down at your feet.

‘Try to make sense of what you see and wonder about what makes the universe exist.

‘Be curious and however life may seem there’s always something you can do and succeed at – it matters that you don’t just give up.’

‘Medical miracle’ Stephen Hawking defied the odds for 55 years

Stephen Hawking was one of the world’s most acclaimed cosmologists, a medical miracle, and probably the galaxy’s most unlikely superstar celebrity.

After being diagnosed with a rare form of motor neurone disease in 1964 at the age of 22, he was given just a few years to live.

Yet against all odds Professor Hawking celebrated his 70th birthday nearly half a century later as one of the most brilliant and famous scientists of the modern age.

Despite being wheelchair-bound, almost completely paralysed and unable to speak except through his trademark voice synthesiser, he wrote a plethora of scientific papers that earned him comparisons with Albert Einstein and Sir Isaac Newton.

At the same time he embraced popular culture with enthusiasm and humour, appearing in TV cartoon The Simpsons, starring in Star Trek and providing the voice-over for a British Telecom commercial that was later sampled on rock band Pink Floyd’s The Division Bell album.

His rise to fame and relationship with his first wife, Jane, was dramatised in a 2014 film, The Theory Of Everything, in which Eddie Redmayne put in an Oscar-winning performance as the physicist battling with a devastating illness.

He was best known for his work on black holes, the mysterious infinitely dense regions of compressed matter where the normal laws of physics break down, which dominated the whole of his academic life.

Hawking is pictured with his  children Robert, Lucy & Tim and his first wife Jane 

Hawking is pictured with his  children Robert, Lucy & Tim and his first wife Jane

Prof Hawking’s crowning achievement was his prediction in the 1970s that black holes can emit energy, despite the classical view that nothing – not even light – can escape their gravity.

Hawking Radiation, based on mathematical concepts arising from quantum mechanics, the branch of science that deals with the weird world of sub-atomic particles, eventually causes black holes to ‘evaporate’ and vanish, according to the theory.

Had the existence of Hawking Radiation been proved by astronomers or physicists, it would almost certainly have earned Prof Hawking a Nobel Prize. As it turned out, the greatest scientific accolade eluded him until the time of this death.

Born in Oxford on January 8 1942 – 300 years after the death of astronomer Galileo Galilei – Prof Hawking grew up in St Albans.

He had a difficult time at the local public school and was persecuted as a ‘swot’ who was more interested in jazz, classical music and debating than sport and pop.

Although not top of the class, he was good at maths and ‘chaotically enthusiastic in chemistry’.

As an undergraduate at Oxford, the young Hawking was so good at physics that he got through with little effort.

He later calculated that his work there ‘amounted to an average of just an hour a day’ and commented: ‘I’m not proud of this lack of work, I’m just describing my attitude at the time, which I shared with most of my fellow students.

‘You were supposed to be brilliant without effort, or to accept your limitations and get a fourth-class degree.’

Hawking got a first and went to Cambridge to begin work on his PhD, but already he was beginning to experience early symptoms of his illness.

During his last year at Oxford he became clumsy, and twice fell over for no apparent reason. Shortly after his 21st birthday he went for tests, and at 22 he was diagnosed with motor neurone disease.

The news came as an enormous shock that for a time plunged the budding academic into deep despair. But he was rescued by an old friend, Jane Wilde, who went on to become his first wife, giving him a family with three children.

After a painful period coming to terms with his condition, Prof Hawking threw himself into his work.

At one Royal Society meeting, the still-unknown Hawking interrupted a lecture by renowned astrophysicist Sir Fred Hoyle, then at the pinnacle of his career, to inform him that he had made a mistake.

An irritated Sir Fred asked how Hawking presumed to know that his calculations were wrong. Hawking replied: ‘Because I’ve worked them out in my head.’

Eddie Redmayne won a Best Actor Oscar for his portrayal of Hawking in 2014 

Eddie Redmayne won a Best Actor Oscar for his portrayal of Hawking in 2014

In the 1980s, Prof Hawking and Professor Jim Hartle, from the University of California at Santa Barbara, proposed a model of the universe which had no boundaries in space or time.

The concept was described in his best-selling popular science book A Brief History Of Time, published in 1988, which sold 25 million copies worldwide.

As well as razor sharp intellect, Prof Hawking also possessed an almost child-like sense of fun, which helped to endear him to members of the public.

He booked a seat on Sir Richard Branson’s Virgin Galactic sub-orbital space plane and rehearsed for the trip by floating inside a steep-diving Nasa aircraft – dubbed the ‘vomit comet’ – used to simulate weightlessness.

On one wall of his office at Cambridge University was a clock depicting Homer Simpson, whose theory of a ‘doughnut-shaped universe’ he threatened to steal in an episode of the cartoon show. He is said to have glared at the clock whenever a visitor was late.

From 1979 to 2009 he was Lucasian Professor of Mathematics at the university – a post once held by Sir Isaac Newton. He went on to become director of research in the university’s Department of Applied Mathematics and Theoretical Physics.

Upheaval in his personal life also hit the headlines, and in February 1990 he left Jane, his wife of 25 years, to set up home with one of his nurses, Elaine Mason. The couple married in September 1995 but divorced in 2006.

Throughout his career Prof Hawking was showered with honorary degrees, medals, awards and prizes, and in 1982 he was made a CBE.

But he also ruffled a few feathers within the scientific establishment with far-fetched statements about the existence of extraterrestrials, time travel, and the creation of humans through genetic engineering.

He has also predicted the end of humanity, due to global warming, a new killer virus, or the impact of a large comet.

In 2015 he teamed up with Russian billionaire Yuri Milner who has launched a series of projects aimed at finding evidence of alien life.

Hawking and his new bride Elaine Mason pose for pictures after the blessing of their wedding at St. Barnabus Church September 16, 1995

Hawking and his new bride Elaine Mason pose for pictures after the blessing of their wedding at St. Barnabus Church September 16, 1995

The decade-long Breakthrough Listen initiative aims to step up the Search for Extraterrestrial Intelligence (Seti) by listening out for alien signals with more sensitivity than ever before.

The even bolder Starshot Initiative, announced in 2016, envisages sending tiny light-propelled robot space craft on a 20-year voyage to the Alpha Centauri star system.

Meanwhile Prof Hawking’s ‘serious’ work continued, focusing on the thorny question of what happens to all the information that disappears into a black hole. One of the fundamental tenets of physics is that information data can never be completely erased from the universe.

A paper co-authored by Prof Hawking and published online in Physical Review Letters in June 2016 suggests that even after a black hole has evaporated, the information it consumed during its life remains in a fuzzy ‘halo’ – but not necessarily in the proper order.

Prof Hawking outlined his theories about black holes in a series of Reith Lectures broadcast on BBC Radio 4 in January and February 2016.

Read more: http://www.dailymail.co.uk/sciencetech/article-5498731/Stephen-Hawkings-final-warning-humanity.html#ixzz59lrOeYUJ

Read Full Post | Make a Comment ( None so far )

Johnan B. Peterson — 12 Rules For Life: An Antidote to Chaos — Videos

Posted on March 10, 2018. Filed under: Articles, Blogroll, Books, Business, College, Communications, Computers, Computers, Corruption, Diet, Diet, Documentary, Economics, Education, Elections, Employment, Energy, Environment, Essays, Exercise, Faith, Family, Freedom, Friends, Health, Heroes, Homes, Investments, Law, liberty, Life, Links, Literacy, Mastery, media, People, Philosophy, Photos, Political Correctness, Programming, Psychology, Quotations, Radio, Rants, Raves, Raymond Thomas Pronk, Sleep, Spying, Strategy, Stress Reduction, Success, Talk Radio, Taxation, Taxes, Technology, Television, Vacations, Video, War, Water, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , |

See the source imageSee the source imageSee the source image

See the source image

See the source imageSee the source imageSee the source image

Absolutely

Jordan Peterson LIVE: 12 Rules for Life – An Antidote to Chaos

The Perilous State of the University: Jonathan Haidt & Jordan B Peterson

Jordan Peterson’s Life Advice Will Change Your Future (MUST WATCH)

2017/06/15: 12 principles for a 21st century conservatism

Jordan Peterson: Why Globalism Fails and Nationalism is Relatable

White privilege isn’t real – Jordan Peterson

Jordan Peterson – This evil Social Justice mindset Threatens All

The Fundamental Racist idea – Jordan Peterson

Jordan Peterson If You Were In Nazi Germany You Would Be A Nazi

How Hitler was Even More Evil Than You Think – Prof. Jordan Peterson

Why Hitler Bathed Even More Than You Think – Prof. Jordan Peterson

How Ordinary Men Became Nazi Killers – Prof. Jordan Peterson

A Brief Guide To Life – Jordan Peterson | Depression & Success (LIFE CHANGING)

Jordan Peterson – How To Stop Being Lazy & Progress In Life

Jordan Peterson – How To Stop Procrastinating

Jordan Peterson – Don’t Be The Nice Guy

Jordan Peterson: These kinds of men attract women

Jordan Peterson: Eye Contact and Attraction

Jordan Peterson On How Women Rate Men

Jordan Peterson: Men who know this are ahead of the competition

Jordan Peterson – Be Attractive to Many Women But Only Choose One

Jordan Peterson: Traits of Alpha Males

Jordan Peterson: Alpha males & everyone below them

Jordan Peterson: Why I Married My Wife

How Jordan Peterson And His Wife Make Their Marriage Work

How Jordan Peterson Sorted Himself Out at Age 25

Jordan Peterson: ‘My Biggest Regret’

Jordan Peterson gets emotional talking about his daughter and the Final Rule

jordan b peterson crying about individualism

Jordan Peterson On Importance Of Reading

Why You Need to Read Dostoyevsky – Prof. Jordan Peterson

Lectures: Exploring the Psychology of Creativity

What Every Creative Person NEEDS to Know – Prof. Jordan Peterson

Jordan Peterson: Advice for Hyper-Intellectual People

A Critique of Jordan B. Peterson

ALEXANDER BLUM

Far from being a darling of the alt-right or secretly promoting fiendish racist ideology, the largest contradiction in Jordan B. Peterson’s sprawling intellectual enterprise is simply the notion that capitalist classical liberalism is the only game we can successfully play on Earth, even as it contradicts the depths of Christian symbols.

Now, this is not intended to be a hit-piece on Dr. Peterson. I have listened to him since the fall of 2016, and he has radically shaped the way I view the world. He is one of the only people on the North American continent I would consider to be a true intellectual. But in the dregs of hero worship, it is too tempting to simply nod along with all that he says. Why wouldn’t I? He is far older, far wiser. But he is also in the archetypal position of ‘dead father’. He represents the golden sphere of the knowledge of both the ancient past and an intellectual development amid the dynamics of the Cold War. In order to effectively embody the spirit of the son, who resurrects the archaic tradition and redeems the blindness of his father, I must pry where there are cracks and make known the fact that no human being is infallible. In fact, if we believe that any human being has secured the total truth on any subject, then every successive generation is an unnecessary appendage insofar as they seek to develop that subject. The son who is incapable of surpassing the father signals the death of humankind, the end of evolution. As such, I must now bring rhetorical wounds against a man who is simultaneously master, bulwark and gatekeeper.

I attended a New York City talk delivered by Dr. Peterson, where much of his worldview crystallized. He explained that the Soviet Union and the West were engaged in a spiritual war over which type of ‘game’ is tenable to play. He concluded that the system of Western capitalism, built upon Enlightenment and mythological foundations (we will return to the mythological) was objectively superior to the Marxist rejection of hierarchy and obsession with central planning. Human nature, so it goes, aligns with the liberal capitalist mode of production.

But Dr. Peterson has made one profound oversight. It is precisely this: capitalism and classical liberalism have destroyed myth. The technological revolution, and the transformation of communal, local bonds of people with shared values into rent-seekers, wage-searchers and otherwise atomized, separate individuals united only by the search for profit, has destroyed the original foundations of human wellbeing. Economics has completely seized and determined culture. Peterson’s notion that economic success equates to playing a good game, or otherwise participating in the good, ultimately leads to a world defined by Bezos, Zuckerberg, and Trump.

The dominance hierarchy is a point of massive spiritual contention. How can the dominance hierarchies of the West be competent when at the very point of Peterson’s peak fame, they are occupied by Trump, a sophist, a marketer, a chronic liar with no internal life, no self-reflection, who will hand over all his wealth to unremarkable, unspecial, mediocre children? The Trump children earned nothing but by virtue of birth, and yet they are in possession of the keys to the world in ways ordinary lowborn people will never experience. How is this not a fundamental, fatal corruption of hierarchy, existing at the pinnacle of the world’s power? Peterson avoids speaking about Trump for this reason: it would force him to admit that liberal capitalism dissolves, finally, into a kind of madness. Decrying left-right polarization, Peterson upholds a center: that center is capitalist realism. The theorist Mark Fisher wrote a whole book about ‘Capitalist Realism’, the notion that social contract capitalism is the final system of economic-political life, and that’s simply that. Except Fisher rejected it, because capitalism destroys community, tradition and culture. It monetizes all these things and produces economically workshopped monoculture. Is it truly heroic to live in a circle for all of existence, the economization of perpetual Star Wars films serving as the only permanent narrative link between us? That is what Nietzsche’s ‘time is a flat circle’ meant – and it is a kind of hell. A world defined by those who purchased it two generations ago is no treading ground for heroes. Of that, I am certain.

Jordan Peterson lives doing what he loves. He makes a fortune off of Patreon and his new book. There is nothing wrong with that – he played the right game. He lived a life of the mind and was paid for it. The upcoming generation will not know what that feels like. University tenure is a non-starter. Being paid to write means working full-time in retail or food service, and not just throughout one’s 20s. Perhaps for one’s entire life. Monetizing a life of the mind is extremely rare. At Peterson’s lecture, I was surrounded by intensely bright, thoughtful young people, mostly young men. But how many of them will get to live a satisfying life of the mind? How many will instead work in offices, and ultimately aspire toward a more fulfilling life than the conditions of an impersonal network of capital that we are supposed to believe is in any way mythically inspired? I suspect that a new generation of Cains will arise out of the low-wage workers who thought they were promised something better.

When we reach the Biblical stories, we reach deeper problems. Equating Earthly success to playing the right game and achieving the good is, in essence, no better than Oprah’s prosperity gospel. People succeed off of bad ideas all the time. Worse, there are bad ideas we don’t even understand are bad, and are structurally incapable of facing. Here’s one: Professor Peterson gave the example of a person buying land, building a factory, and employing others as a total net good. But what if the factory creates irresolvable climate change over the course of 250+ years and sabotages future generations? What if the factory multiplies and creates a monoculture, stifling all new voices and claiming the globe, as Amazon and Google seek to do? When James Damore was fired by Google, Dr. Peterson was rightfully upset. But this is the consequence of prioritizing economics above culture and spirit – economic entities can slaughter free expression. That is entirely left out of a capitalist’s worldview. In fact, by merely writing controversial material, one can be rightfully denied a job by property owners. Fans of Peterson know as well as I do the deep taboos that linger in science. The subject of IQ alone will ruin lives – if intelligence is the predicate of a good life, and only a minority of us will have high IQs, what is to become of the bulk of us? Well, we will merely be followers, members of a herd. That, again, is no hero’s journey.

I always feel put-off by audiences. I felt frankly alienated, when Dr. Peterson said that rule-breaking, criminal children, if not addressed by the ages of 3 or 4, will be rule-breakers for their entire lives and ultimately end up in jail. Peterson’s words didn’t disgust me, but rather, the audience’s reaction did – it was laughter. We are talking about the doom and mass incarceration of millions of lives. We are talking about fate inscribed in biology – and the audience finds pause to laugh it off as just ‘unruly children are funny’? Perhaps they’re not taking this seriously. Perhaps the depths of this problem aren’t fully understood.

Peterson simultaneously argues for self-improvement in the game of atomized profit-seeking, but also that one’s genes largely determine intelligence and the qualities of success, i.e., disagreeableness, conscientiousness, and so on. Monetizing one’s creativity is largely an expression of personality – intelligence plus conscientiousness, with disagreeableness tossed in to ensure you keep coming out on top of negotiations. If you are born without that cocktail, you must work against your own brain where others have a smooth ride. The same is ultimately true in relation to identity. You can tell black people to pull up their bootstraps all you want – but ultimately, if you don’t understand that black people today bear the culture and last names of their former slave owners, and according to certain insane IQ studies, have a lower IQ on average than whites (a claim that debunks meritocracy and individualism in one swoop), you must prepare for the consequences. You must prepare for moral rebellion. What would you do in their situation? Every anxiety compounded by identity-wounds? It would be a hell that young white men do not face. And imagine being transgender and dealing with the world! Peterson is right to say that you must face the world, no matter what – but also wrong to defend the free market and suggest that pulling up your bootstraps is the only mode of life in which responsibility may properly manifest in individuals. The conservative desire for a totally brutal, independent society for ordinary citizens, while enabling state subsidies and legal tax evasion schemes (Apple pays no taxes) for the wealthy, is an infuriating double standard upheld by centrist capitalism.

In a Quora question from years ago, the Professor once argued against universal health care, saying that it is wrong to ‘force’ the hands of doctors, the same line of argument used by Ben Shapiro. I will never understand this in any sense. If you are paid, you have to do work, whether it’s a private or public hospital. Either way, declining work means getting fired. There is no real distinction in ‘forced’ labor here. Of what use are our myths if we share no common community worth funding, for those who would otherwise be bankrupted by their bills? If you say churches or local organizations should provide these services, then see to it that megachurches provide anything at all from their coffers. I guarantee you these ‘Christians’ will cling to their purse strings.

On the topic of transgender people, I split in certain ways with Peterson. As I understand it, he is only opposed to the legal requirement to adhere to proper pronouns, which I understand. I reject state authority as well. But what is the transgender individual, at a deeper level? At its core, it is an attempt to break free from the constraints of biology and achieve ‘one’ where previously there were two. This is a good thing. I see much hope in the transgender movement. And it is mythologically driven.

For all that Peterson speaks of the Bible, so far, he leaves out one vital figure, perhaps the most vital figure: Sophia. In Carl Jung’s Answer to Job, Jung calls Sophia the logos itself. He names Sophia the mediator between humankind and God. Who is Sophia? Wisdom. She is the feminine wisdom exiled from the world, because in Gnostic Christian mythology, she created the world without consent from God, and in doing so, created a false God called the Demiurge, and the serpent and the fall. The redemption of the world is the return of Sophia from exile.

In his epic work of Christian mysticism, Valentin Tomberg wrote that the complete Holy Trinity is not father-son-holy spirit. In fact, it is the Holy Trinity plus mother, daughter and holy soul. The Holy Trinity, according to the greatest master of Catholic mysticism I have ever read, is actually composed of six parts, not three, and it is feminine and masculine in nature. It is intersex, or both sexes, it is fundamentally androgynous. There is so much we do not yet understand about human identity – why must traditionalists cut off all possibility for transformation out of fear alone?

To combine the feminine and the masculine is the goal of all this gender trouble, to make ‘one’ where there is now division. In the Answer to Job, Jung refers to Yahweh, or God himself, as “unconscious”, a monster, a beast of nature. It is only Sophia who is able to create self-reflection through the mediation between Yahweh and Job. it is the feminine out of which the logos is born. If modern feminism is corrupt in spite of this fact, it is because culture itself is corrupt. If the transgender movement is incomplete, it is because it is too political and not enough immersed in the archaic foundations for transforming gender, the mythical synthesis of male and female. But we also have ourselves to blame for removing Sophia entirely from our retellings of the Biblical story – Sophia is the feminine Christ. Without her, there is only cruel and delusional Yahweh, the primal God who shaped the world but who is not fit to run it alone.

But in the Q&A after the talk, Peterson explicitly defined the relationship between male and female as that of Christ and Mary. In other words, Mary raises Christ. The purpose of women is not to become heroes, but to raise them. That is impossible for a truly ambitious woman. If I were born a woman, obsessed with these mystical and philosophical questions, I would resent that statement so deeply I may never recover. Peterson’s philosophy is centered, in this way, upon a male subject. In order to redeem the father, the next generation of mythical thinkers must reorient the woman out of this secondary position. Perhaps that entails changing the very biology of childbirth – with artificial wombs, who knows what will follow. The tranhumanist idea must return Sophia to the world, not be finished at the half-answer of Mary. Valentin Tomberg, interestingly enough, spoke of the Mary-Sophia as the ultimate form of the woman. Both raiser of heroes and the hero herself. That is completeness and perfection. Not this half-answer of women in one corner, men in another, men striving, women bearing children. The reason for the fall and the progress of history is to return to Eden with higher values and more complete myths, not merely to repeat the past. Of that I am certain.

Lastly, the paradoxes of Genesis are not fully appreciated by Peterson’s focus on Western capitalism, property, and contractual profit-seeking life. Ultimately, success in this world is success of the serpent. That much is clear. Satan, and the serpent, are the Gods of this world. And God obeys the serpent! God listens to evil, and bullies Job. God allows evil to run rampant. And this world, crafted in the image of the serpent, is not the place to lay down and hand over one’s lifeblood. Financial success in this nature, this fallen nature, genetic, cyclical birth-death-birth-death nature, is only temporal. Manipulating the mechanisms of fallen nature to secure a wife and get a job are not the full extent of the hero’s journey. The true extent of the hero’s journey is in solving the problem of the fall. It is the return of Christ crucified to heaven. Now, the Marxists have tried to solve this problem, to create paradise and equality on Earth, and they have failed. But I am still committed to the attempt through means other than Marxism.

Finally, Christ himself is the ultimate paradox. I mean, let’s be serious about this. Pontius Pilate and the Romans who crucified Christ were victorious on the dominance hierarchy. Christ was defeated, destroyed. So why, then, is he the maximal expression of the hero in Christian myth? He was crucified by those who did secure wives and careers, and who passed down judgement, and succeed over others. And yet, the man who was destroyed, and not his destroyers, is the ultimate hero. It is because worldly success is not true success. There is a difference. There is absolutely a difference.

My ultimate concern with Peterson’s capitalism is that the modern world has become a place ill-suited for heroes, designed to make us dumb, dull and conformist, and he acknowledges this – he sees the difficulty of the situation, but it is the young, careerless and unmarried who will truly have to figure out a solution. In truth, we will be the ones who face it. The young, those who grew up immersed in the virtual, and the chaotic fragmentation of the decaying liberal order under Donald Trump. That is our inheritance – not the Cold War, not cultural Marxism. Those are both side-shows that make us feel good about our own cultural signaling, while resolving virtually nothing. At the Q&A, two people who asked questions were indicative of madness. One of them opened the question session by asking why Jews have been trying to destroy Russia for two-hundred years. Peterson, wisely, said “I can’t do it”. Touching that question is touching a fine sprinkled dust born of unkempt hair, the aesthetic of the alt-right, But another questioner was taken seriously, though he bothered me immensely. All I could think when he spoke was “Joseph McCarthy”. This kid asked Peterson: “How can we tell the difference between the Marxists trying to destroy Western civilization and the useful idiots?” Some in the crowd cheered. I saw the true nature of that question – authoritarianism. Let’s not be deluded by present culture wars – the right is just as authoritarian as the left, and more successful at implementing its ideas. The original dissident intellectual was the Western leftist. The pendulum will always swing back and forth, and the only way to reject it is to reject the mindset of these damn inquisitors. Yes, I’ve got problems with Western civilization. I live because there are problems to be solved. They are major problems. If the structure is good enough so that nothing major must be changed, then I was born after history ended, and will simply work my way to a cyclical grave. No. I’d rather make a world fit for heroes.

What is a hero? Someone who redeems the blind sight of the past and renews myth by speaking the truth. Well, the truth is that the world of fetishizing Earthly games as a path to goodness and truth is the world that leads to a monoculture dictated by Google, Amazon and Facebook. Individuals unrestrained by mythical truth, modern capitalists, have transformed their ideas into leviathans more massive and powerful than any idea can functionally be. If Jordan Peterson opposes communism, he must also oppose the corporate communism of a world split between a handful of companies that determine the communications, ideas and structure of the world. And that corporate communism is the consequence of believing that classical liberal capitalism is the only way we can possibly live. One entrepreneur, with one idea, one hero – Mark Zuckerberg? No. Something went wrong. He is no Hercules. The myth has degenerated into marketing. It must be made into something more.

 

 

Jordan Peterson

From Wikipedia, the free encyclopedia
Jordan Peterson
Peterson Lecture (33522701146).png

Peterson at the University of Toronto, 2017
Born Jordan Bernt Peterson
June 12, 1962 (age 55)
EdmontonAlberta, Canada
Residence TorontoOntario, Canada
Citizenship Canadian
Education Political science (B.A., 1982)
Psychology (B.A., 1984)
Clinical psychology (Ph.D., 1991)
Alma mater
Spouse(s) Tammy Roberts (m. 1989)
Children 2
Website jordanbpeterson.com
Scientific career
Fields Psychology
Institutions
Thesis Potential psychological markers for the predisposition to alcoholism (1991)
Doctoral advisor Robert O. Pihl

Jordan Bernt Peterson (born June 12, 1962) is a Canadian clinical psychologistcultural critic, and professor of psychology at the University of Toronto. His main areas of study are in abnormalsocial, and personality psychology,[1] with a particular interest in the psychology of religious and ideological belief,[2] and the assessment and improvement of personality and performance.[3]

Peterson studied at the University of Alberta and McGill University. He remained at McGill as a post-doctoral fellow from 1991 to 1993 before moving to Harvard University, where he was an assistant and an associate professor in the psychology department. In 1998, he moved to the University of Toronto as a full professor.

His first book Maps of Meaning: The Architecture of Belief was published in 1999, a work which examined several academic fields to describe the structure of systems of beliefs and myths, their role in the regulation of emotion, creation of meaning, and motivation for genocide.[4][5][6] His second book, 12 Rules for Life: An Antidote to Chaos, was released in January 2018.[7][8][9]

In 2016, Peterson released a series of videos on his YouTube channel in which he criticized political correctness and the Canadian government’s Bill C-16. He subsequently received significant media coverage.[7][8][9]

Childhood

Peterson was born on June 12, 1962, and grew up in FairviewAlberta, a small town northwest of his birthplace Edmonton, in Canada. He was the eldest of three children born to Beverley, a librarian at the Fairview campus of Grande Prairie Regional College, and Walter Peterson, a schoolteacher.[10] His middle name is Bernt (/bɛərnt/ BAIRNT), after his Norwegian great-grandfather.[11][12]

When he was 13, he was introduced to the writings of George OrwellAldous HuxleyAleksandr Solzhenitsyn, and Ayn Rand by his school librarian Sandy Notley – mother of Rachel Notley, leader of the Alberta New Democratic Party and 17th Premier of Alberta.[13] He also worked for the New Democratic Party (NDP) throughout his teenage years, but grew disenchanted with the party due to what he saw as a preponderance of “the intellectual, tweed-wearing middle-class socialist” who “didn’t like the poor; they just hated the rich”.[10] He left the NDP at age 18.[14]

Education

After graduating from Fairview High School in 1979, Peterson entered the Grande Prairie Regional College to study political science and English literature.[2] He later transferred to the University of Alberta, where he completed his B.A. in 1982.[14] Afterwards, he took a year off to visit Europe. There he developed an interest in the psychological origins of the Cold War, particularly 20th century European totalitarianism,[2][15] and was plagued by apocalyptic nightmares about the escalation of the nuclear arms race. As a result, he became concerned about mankind’s capacity for evil and destruction, and delved into the works of Carl JungFriedrich NietzscheAleksandr Solzhenitsyn,[10] and Fyodor Dostoyevsky.[15] He then returned to the University of Alberta and received a B.A. in psychologyin 1984.[16] In 1985, he moved to Montreal to attend McGill University. He earned his Ph.D. in clinical psychology under the supervision of Robert O. Pihl in 1991, and remained as a post-doctoral fellow at McGill’s Douglas Hospital until June 1993, working with Pihl and Maurice Dongier.[2][17]

Career

From July 1993 to June 1998,[1] Peterson lived in Arlington, Massachusetts, while teaching and conducting research at Harvard University as an assistant and an associate professor in the psychology department. During his time at Harvard, he studied aggressionarising from drug and alcohol abuse and supervised a number of unconventional thesis proposals.[14] Two former Ph.D. students, Shelley Carson, a psychologist and teacher from Harvard, and author Gregg Hurwitz recalled that Peterson’s lectures were already highly admired by the students.[8] In July 1998, he returned to Canada and took up a post as a full professor at the University of Toronto.[1][16]

Peterson’s areas of study and research are in the fields of psychopharmacologyabnormalneuroclinicalpersonalitysocialindustrial and organizational,[1] religiousideological,[2] political, and creativity psychology.[3] Peterson has authored or co-authored more than a hundred academic papers.[18] Peterson has over 20 years of clinical practice, seeing 20 people a week, but in 2017, he decided to put the practice on hold because of new projects.[7]

In 2004, a 13-part TV series based on Peterson’s book Maps of Meaning: The Architecture of Belief aired on TVOntario.[10][16][19] He has also appeared on that network on shows such as Big Ideas, and as a frequent guest and essayist on The Agenda with Steve Paikin since 2008.[20][21]

Works

Books

Maps of Meaning: The Architecture of Belief

Something we cannot see protects us from something we do not understand. The thing we cannot see is culture, in its intrapsychic or internal manifestation. The thing we do not understand is the chaos that gave rise to culture. If the structure of culture is disrupted, unwittingly, chaos returns. We will do anything – anything – to defend ourselves against that return.

— Jordan Peterson, 1998 (Descensus ad Inferos)[22]

In 1999, Routledge published Maps of Meaning: The Architecture of Belief. The book, which took Peterson 13 years to complete, describes a comprehensive theory about how people construct meaningbeliefs and make narratives using ideas from various fields including mythologyreligionliteraturephilosophy and psychology in accordance to the modern scientific understanding of how the brain functions.[14][22][23]

According to Peterson, his main goal was to examine why both individuals and groups participate in social conflict, explore the reasoning and motivation individuals take to support their belief systems (i.e. ideological identification[14]) that eventually results in killing and pathological atrocities like the Gulag, the Auschwitz concentration camp and the Rwandan genocide.[14][22][23] He considers that an “analysis of the world’s religious ideas might allow us to describe our essential morality and eventually develop a universal system of morality”.[23]

12 Rules for Life: An Antidote to Chaos

In January 2018, Penguin Random House published Peterson’s second book, 12 Rules for Life: An Antidote to Chaos. The work contains abstract ethical principles about life, in a more accessible style than Maps of Meaning.[7][8][9] To promote the book, Peterson went on a world tour.[24][25][26] As part of the tour, Peterson was interviewed by Cathy Newman on Channel 4 News. In a short time the interview received considerable attention and over seven million views on YouTube.[27][28][29] The book was ranked the number one bestselling book on Amazon in the United States and Canada and number four in the United Kingdom.[30][31] It also topped bestselling lists in Canada, US and the United Kingdom.[32][33]

YouTube channel and podcasts

In 2013, Peterson began recording his lectures (“Personality and Its Transformations”, “Maps of Meaning: The Architecture of Belief”[34]) and uploading them to YouTube. His YouTube channel has gathered more than 800,000 subscribers and his videos have received more than 35 million views as of January 2018.[35] In January 2017, he hired a production team to film his psychology lectures at the University of Toronto. He used funds received via the crowd-sourced funding website Patreon after he became embroiled in the Bill C-16 controversy in September 2016. His funding through Patreon has increased from $1,000 per month in August 2016 to $14,000 by January 2017 to more than $50,000 by July 2017.[13][35][36]

Peterson has appeared on The Joe Rogan ExperienceThe Gavin McInnes ShowSteven Crowder‘s Louder with CrowderDave Rubin‘s The Rubin ReportStefan Molyneux‘s Freedomain Radioh3h3Productions‘s H3 PodcastSam Harris‘s Waking Up podcast, Gad Saad‘s The Saad Truth series and other online shows.[37] In December 2016, Peterson started his own podcast, The Jordan B. Peterson Podcast, which has 39 episodes as of February 20, 2018, including academic guests such as Camille PagliaMartin Daly, and James W. Pennebaker,[38] while on his channel he has also interviewed Stephen HicksRichard J. Haier, and Jonathan Haidt among others. Peterson supported engineer James Damore in his action against Google.[9]

In May 2017, Peterson began The Psychological Significance of the Biblical stories,[39] a series of live theatre lectures, also published as podcasts, in which he analyzes archetypal narratives in Genesis as patterns of behavior vital for personal, social and cultural stability.[9][40]

Self Authoring Suite

Peterson and his colleagues Robert O. Pihl, Daniel Higgins, and Michaela Schippers[41] produced a writing therapy program with series of online writing exercises, titled the Self Authoring Suite.[42] It includes the Past Authoring Program, a guided autobiography; two Present Authoring Programs, which allow the participant to analyze their personality faults and virtues in terms of the Big Five personality model; and the Future Authoring Program, which guides participants through the process of planning their desired futures. The latter program was used with McGill University undergraduates on academic probation to improve their grades, as well since 2011 at Rotterdam School of Management, Erasmus University.[43][44] The Self Authoring Programs were developed partially from research by James W. Pennebaker at the University of Texas at Austin and Gary Latham at the Rotman School of Management of the University of Toronto. Pennebaker demonstrated that writing about traumatic or uncertain events and situations improved mental and physical health, while Latham demonstrated that personal planning exercises help make people more productive.[44] According to Peterson, more than 10,000 students have used the program as of January 2017, with drop-out rates decreasing by 25% and GPAs rising by 20%.[10]

Critiques of political correctness

Peterson’s critiques of political correctness range over issues such as postmodernismpostmodern feminismwhite privilegecultural appropriation, and environmentalism.[37][45][46] Writing in the National Post, Chris Selley said Peterson’s opponents had “underestimated the fury being inspired by modern preoccupations like white privilege and cultural appropriation, and by the marginalization, shouting down or outright cancellation of other viewpoints in polite society’s institutions”,[47] while in The SpectatorTim Lottstated Peterson became “an outspoken critic of mainstream academia”.[15] Peterson’s social media presence has magnified the impact of these views; Simona Chiose of The Globe and Mail noted: “few University of Toronto professors in the humanities and social sciences have enjoyed the global name recognition Prof. Peterson has won”.[48]

According to his study – conducted with one of his students, Christine Brophy – of the relationship between political belief and personality, political correctness exists in two types: PC-Egalitarianism and PC-Authoritarianism, which is a manifestation of “offense sensitivity”.[49] The first type is represented by a group of classical liberals, while the latter by the group known as “social justice warriors[10] who “weaponize compassion“.[2] The study also found an overlap between PC-authoritarians and right-wing authoritarians.[49]

Peterson considers that the universities should be held as among the most responsible for the wave of political correctness which appeared in North America and Europe.[48] He watched the rise of political correctness on campuses since the early 1990s,[50] and considers that the humanities have become corrupt, less reliant on science, and instead of “intelligent conversation, we are having an ideological conversation”. From his own experience as a university professor, he states that the students who are coming to his classes are uneducated and unaware about the mass exterminations and crimes by Stalinism and Maoism, which were not given the same attention as fascism and Nazism. He also says that “instead of being ennobled or inculcated into the proper culture, the last vestiges of structure are stripped from [the students] by post-modernism and neo-Marxism, which defines everything in terms of relativism and power“.[15][51][52]

Of postmodernism and identity politics

And so since the 1970s, under the guise of postmodernism, we’ve seen the rapid expansion of identity politics throughout the universities, it’s come to dominate all of the humanities – which are dead as far as I can tell – and a huge proportion of the social sciences … We’ve been publicly funding extremely radical, postmodern leftist thinkers who are hellbent on demolishing the fundamental substructure of Western civilization. And that’s no paranoid delusion. That’s their self-admitted goal … Jacques Derrida … most trenchantly formulated the anti-Western philosophy that is being pursued so assiduously by the radical left.

— Peterson, 2017[51]

Peterson believes that postmodern philosophers and sociologists since the 1960s,[45] while typically claiming to reject Marxism and Communism, because they were discredited as economic ideologies as well by the exposure of crimes in the Soviet Union, have actually built upon and extended their core tenets. He states that it is difficult to understand contemporary society without considering the influence of postmodernism which initially spread from France to the United States through the English department at Yale University. He argues that they “started to play a sleight of hand, and instead of pitting the proletariat, the working class, against the bourgeois, they started to pit the oppressed against the oppressor. That opened up the avenue to identifying any number of groups as oppressed and oppressor and to continue the same narrative under a different name … The people who hold this doctrine – this radical, postmodern, communitarian doctrine that makes racial identity or sexual identity or gender identity or some kind of group identity paramount – they’ve got control over most low-to-mid level bureaucratic structures, and many governments as well”.[51][18]

He emphasizes that the state should halt funding to faculties and courses he describes as neo-Marxist, and advises students to avoid disciplines like women’s studiesethnic studies and racial studies, as well other fields of study he believes are “corrupted” by the ideology such as sociologyanthropology and English literature.[53][54] He states that these fields, under the pretense of academic inquiry, propagate unscientific methods, fraudulent peer-review processes for academic journals, publications that garner zero citations,[55] cult-like behaviour,[53] safe-spaces,[56] and radical left-wing political activism for students.[45] Peterson has proposed launching a website which uses AI to identify and showcase the amount of ideologization in specific courses. He announced in November 2017 that he had temporarily postponed the project as “it might add excessively to current polarization”.[57][58]

Peterson has criticized the use of the term “white privilege“, stating that, “being called out on their white privilege, identified with a particular racial group and then made to suffer the consequences of the existence of that racial group and its hypothetical crimes, and that sort of thing has to come to a stop. … [It’s] racist in its extreme”.[45] In response to the 2017 protest in Charlottesville, Virginia, he criticized the far right‘s use of identity politics, and said that “the Caucasians shouldn’t revert to being white. It’s a bad idea, it’s a dangerous idea, and it’s coming fast, and I don’t like to see that!” He stated that the notion of group identity is “seriously pathological … reprehensible … genocidal” and “it will bring down our civilization if we pursue it”.[59] He has also been prominent in the debate about cultural appropriation, stating it promotes self-censorship in society and journalism.[60]

Of Bill C-16

On September 27, 2016, Peterson released the first installment of a three-part lecture video series, entitled “Professor against political correctness: Part I: Fear and the Law”.[13][61] In the video, he stated he would not use the preferred gender pronouns of students and faculty as part of compelled speech, and announced his objection to the Canadian government‘s Bill C-16, which proposed to add “gender identity or expression” as a prohibited ground of discrimination under the Canadian Human Rights Act, and to similarly expand the definitions of promoting genocide and publicly inciting hatred in the Criminal Code.[61][62]

He stated that his objection to the bill was based on potential free speech implications if the Criminal Code is amended, as he claimed he could then be prosecuted under provincial human rights laws if he refuses to call a transsexual student or faculty member by the individual’s preferred pronoun.[63] Furthermore, he argued that the new amendments paired with section 46.3 of the Ontario Human Rights Code would make it possible for employers and organizations to be subject to punishment under the code if any employee or associate says anything that can be construed “directly or indirectly” as offensive, “whether intentionally or unintentionally”.[64] Other academics challenged Peterson’s interpretation of C-16,[63] while some scholars such as Robert P. George supported Peterson’s initiative.[13]

The series of videos drew criticism from transgender activists, faculty and labour unions, and critics accused Peterson of “helping to foster a climate for hate to thrive”.[13] Protests erupted on campus, some including violence, and the controversy attracted international media attention.[65][66][67] When asked in September 2016 if he would comply with the request of a student to use a preferred pronoun, Peterson said “it would depend on how they asked me … If I could detect that there was a chip on their shoulder, or that they were [asking me] with political motives, then I would probably say no … If I could have a conversation like the one we’re having now, I could probably meet them on an equal level”.[67] Two months later, the National Post published an op-ed by Peterson in which he elaborated on his opposition to the bill and explained why he publicly made a stand against it:

I will never use words I hate, like the trendy and artificially constructed words “zhe” and “zher.” These words are at the vanguard of a post-modern, radical leftist ideology that I detest, and which is, in my professional opinion, frighteningly similar to the Marxist doctrines that killed at least 100 million people in the 20th century.

I have been studying authoritarianism on the right and the left for 35 years. I wrote a book, Maps of Meaning: The Architecture of Belief, on the topic, which explores how ideologies hijack language and belief. As a result of my studies, I have come to believe that Marxism is a murderous ideology. I believe its practitioners in modern universities should be ashamed of themselves for continuing to promote such vicious, untenable and anti-human ideas, and for indoctrinating their students with these beliefs. I am therefore not going to mouth Marxist words. That would make me a puppet of the radical left, and that is not going to happen. Period.[68]

In response to the controversy, academic administrators at the University of Toronto sent Peterson two letters of warning, one noting that free speech had to be made in accordance with human rights legislation and the other adding that his refusal to use the preferred personal pronouns of students and faculty upon request could constitute discrimination. Peterson speculated that these warning letters were leading up to formal disciplinary action against him, but in December the university assured him that he would retain his professorship, and in January 2017 he returned to teach his psychology class at the University of Toronto.[13]

In February 2017, Maxime Bernier, candidate for leader of the Conservative Party of Canada, stated that he shifted his position on Bill C-16 after meeting with Peterson and discussing it.[69] Peterson’s analysis of the bill was also frequently cited by senators who were opposed to its passage.[70]

In April 2017, Peterson was denied a Social Sciences and Humanities Research Council grant for the first time in his career, which he interpreted as retaliation for his statements regarding Bill C-16.[71] A media relations adviser for SSHRC said “[c]ommittees assess only the information contained in the application”.[72] In response, The Rebel Media launched an Indiegogo campaign on Peterson’s behalf.[73] The campaign raised $195,000 by its end on May 6, equivalent to over two years of research funding.[74]

In May 2017, Peterson spoke against Bill C-16 at a Senate committee on legal and constitutional affairs hearing. He was one of 24 witnesses who were invited to speak on the bill.[70]

In August 2017, an announced event at Ryerson University titled “The Stifling of Free Speech on University Campuses”, organized by former social worker Sarina Singh with panelists Peterson, Gad Saad, Oren Amitay, and Faith Goldy was shut down because of pressure on the university administration from the group “No Fascists in Our City”.[75] However, another version of the panel (without Goldy) was held on November 11 at Canada Christian College with an audience of 1,500.[76][77]

In November 2017 a teaching assistant (TA) at Wilfrid Laurier University (WLU) was censured by her professors and WLU’s Manager of Gendered Violence Prevention and Support for showing a segment of The Agenda, which featured Peterson debating Bill C-16, during a classroom discussion.[78][79][80] The reasons given for the censure included the clip creating a “toxic climate” and being itself in violation of Bill C-16.[81] The case was criticized by several newspaper editorial boards[82][83][84] and national newspaper columnists[85][86][87][88] as an example of the suppression of free speech on university campuses. WLU announced a third-party investigation.[89] After the release of the audio recording of the meeting in which the TA was censured,[90] WLU President Deborah MacLatchy and the TA’s supervising professor Nathan Rambukkana published letters of formal apology.[91][92][93] According to the investigation no students had complained about the lesson, there was no informal concern related to Laurier policy, and according to MacLatchy the meeting “never should have happened at all”.[94][95]

Personal life

Peterson married Tammy Roberts in 1989.[13] They have one daughter and one son.[10][13] He became a grandfather in August 2017.[96]

Politically, Peterson has described himself as a classic British liberal.[97][15] He is a philosophical pragmatist.[40] In a 2017 interview, Peterson identified as a Christian,[98] but in 2018 he did not.[99] He emphasized his conceptualization of Christianity is probably not what it is generally understood, stating that the ethical responsibility of a Christian is to imitate Christ, for him meaning “something like you need to take responsibility for the evil in the world as if you were responsible for it … to understand that you determine the direction of the world, whether it’s toward heaven or hell”.[99] When asked if he believes in God, Peterson responded: “I think the proper response to that is No, but I’m afraid He might exist”.[7] Writing for The SpectatorTim Lott said Peterson draws inspiration from Jung’s philosophy of religion, and holds views similar to the Christian existentialism of Søren Kierkegaard and Paul Tillich. Lott also said Peterson has respect for Taoism, as it views nature as a struggle between order and chaos, and posits that life would be meaningless without this duality.[15]

Bibliography

Books

Journal articles

Top 15 most cited academic papers from Google Scholar and ResearchGate:

References

https://en.wikipedia.org/wiki/Jordan_Peterson

Read Full Post | Make a Comment ( None so far )

Story 1: Protests in Islamic Republic of Iran — Death to Dictator — Videos

Posted on December 29, 2017. Filed under: Agriculture, American History, Articles, Blogroll, Communications, Corruption, Crisis, Cult, Economics, Employment, Energy, European History, Faith, Family, Farming, Fiscal Policy, Food, Foreign Policy, Freedom, Friends, government spending, Health, history, Islam, Islam, Law, liberty, Life, Links, Literacy, Middle East, Natural Gas, Newspapers, Oil, People, Philosophy, Photos, Press, Programming, Psychology, Radio, Rants, Raves, Raymond Thomas Pronk, Religion, Religious, Religious, Resources, Shite, Speech, Strategy, Success, Taxation, Taxes, Television, Wisdom, Work, Writing | Tags: , , , |

See the source image

IRAN – 28 Dec. 2017: Thousand protest chanting “Death to Dictator”

Thousand Chant “Death to Dictator” “Death to Rouhani” in Iranian Cities

Price protests turn political in Iran as rallies spread

DUBAI (Reuters) – Demonstrators chanted anti-government slogans in several cities across Iran on Friday, Iranian news agencies and social media reports said, as price protests turned into the largest wave of demonstrations since nationwide pro-reform unrest in 2009.

Police dispersed anti-government demonstrators in the western city of Kermanshah as protests spread to Tehran and several other cities a day after rallies in the northeast, the semi-official news agency Fars said.

The outbreak of unrest reflects growing discontent over rising prices and alleged corruption, as well as concern about the Islamic Republic’s costly involvement in regional conflicts such as those in Syria and Iraq.

An official said a few protesters had been arrested in Tehran, and footage posted on social media showed a heavy police presence in the capital and some other cities.

Washington criticized the arrests. ”The United States strongly condemns the arrest of peaceful protesters. We urge all nations to publicly support the Iranian people and their demands for basic rights and an end to corruption.

About 300 demonstrators gathered in Kermanshah after what Fars said was a “call by the anti-revolution”. They shouted: “Political prisoners should be freed” and “Freedom or death”, and some public property was destroyed. Fars did not name any opposition groups.

The protests in Kermanshah, the main city in a region where an earthquake killed over 600 people in November, took place a day after hundreds rallied in Iran’s second largest city Mashhad to protest at high prices and shout anti-government slogans.

Videos posted on social media showed demonstrators yelling, “The people are begging, the clerics act like God”.

Fars said there were protests in the cities of Sari and Rasht in the north, Qazvin west of Tehran and Qom south of the capital, and also in Hamadan in western Iran. It said many marchers who wanted to raise economic demands left the rallies after demonstrators shouted political slogans.

PRO-GOVERNMENT RALLIES PLANNED

State television said annual nationwide rallies and events were scheduled for Saturday to commemorate pro-government demonstrations held in 2009 to counter protests by reformists.

https://www.youtube.com/results?sp=EgIIAw%253D%253D&search_query=iran+rebellion+protests+fox+news

Iran Developing: Large Protests in Mashhad and Other Cities Over Inflation

0
1380
Share on Facebook
Tweet on Twitter

 

Screenshot of protesters in Mashhad, Iran, December 28, 2017

Video is circulating of large protests in several Iranian cities on Thursday over rising prices.

Demonstrations are reported in Iran’s second city Mashhad, Neyshabur, and Kashmar, all in the northeast in Khorasan Province, and Yazd in the center. Slogans include “Death to [President] Rouhani”, “Death to the dictator”, “You took Islam as a staircase to power but left the people”, and “Don’t be scared, we are all together.”

There were also calls for Iran’s officials to focus on domestic issues and pull back from interventions, with chants such as “No Gaza, No Lebanon” — a refrain of lines after the disputed 2009 Presidential election — and “Forget about Syria, think about us”.

The rallies began earlier this week in Isfahan after officials warned of worsening unemployment, with more than 27,000 people fired from their jobs because firms went bankrupt over the past nine months.

Demonstrators in Mashhad gathered in a central square and then moved towards the shrine of Imam Reza, one of the holiest sites in Shia Islam:

The Governor of Khorasan Province, Mohammad Rahim Norouzian, said the gathering was illegal but “the police force was very tolerant”. However, video showed tear gas being used to disperse demonstrators:

In Neyshabur, “Leave Syria, think of us”:

Footage has also been posted of the Yazd rally, with protesters shouting, “What a mistake I made to vote for Rouhani!”.

A cartoon showing the Supreme Leader closing his ears to the demands for action, as he thinks of Syria, Lebanon, and Palestine:

KHAMENEI PROTEST CARTOON 12-17

A compilation of the demonstrations in Neyshabur, Yazd, Shahrud, Kashmar and Mashhad:

Protesters arrested in Iran after rally against price hikes

DUBAI, United Arab Emirates (AP) – Iranians angry over rising food prices and inflation protested in the country’s second-largest city and other areas Thursday, putting new pressure on President Hassan Rouhani as his signature nuclear deal with world powers remains in peril.

The protests in Mashhad saw police make an unspecified number of arrests, local authorities said, though the country’s powerful Revolutionary Guard and its affiliates did not intervene as they have in other unauthorized demonstrations since Iran’s disputed 2009 election.

It wasn’t immediately clear how many people took part in Thursday’s protests, though social media posts suggest several thousand likely demonstrated at rallies across at least three other cities.

Iran’s state-run IRNA news agency quoted the governor of the northeastern city of Mashhad, Mohammad Rahim Norouzian, as saying there was an illegal “No to high prices” gathering in the city.

“Police gave them the necessary notifications and treated them with great tolerance,” he said.

Norouzian said police arrested a number of people who intended to destroy public property, without elaborating.

The prices of several staples, including eggs, have risen by up to 40 percent in recent days, with farmers blaming the hikes on higher prices for imported feed. Poultry is an important part of the diet of many of Iran’s 80 million people, and previous price increases have caused political problems for its leaders in the years since the 1979 Islamic revolution.

So has inflation, which Iran’s Central Bank says has returned to 10 percent. Youth unemployment remains high.

Tempers rose further after Rouhani submitted his 2018 budget to parliament, which raises departure taxes for those flying out of the country.

Tehran-based analyst Saeed Leilaz told The Associated Press that Rouhani’s political rivals may have played a role in organizing the protests, saying “the hands of political groups could be seen in today’s gathering in Mashhad.”

But he said the administration still faces a major challenge.

“There are more than 3 million jobless in Iran, and more than 35 percent of Iranians are under the poverty line. These are Rouhani’s problems, and could kill any government. I won’t be shocked if inflation hits 12 percent.”

All this comes as the U.S. Congress weighs President Donald Trump’s refusal to re-certify the nuclear deal. Many Iranians now say they agree with Supreme Leader Ayatollah Ali Khamenei’s repeated warnings the U.S. can’t be trusted.

Khamenei also has kept up his criticism of how Rouhani’s administration has handled the economy, which includes the supreme leader’s opposition to allowing foreign firms to fully enter Iran. The Revolutionary Guard, a hard-line paramilitary organization, has vast economic interests in the country.

The Guard did not mobilize its Basij volunteer forces to counter any of the protests Thursday. However, some protests saw criticism of Iran’s support for Syrian President Bashar Assad in his country’s civil war, in which the Guard has played a major role.

___

Associated Press writer Amir Vahdat in Tehran, Iran, contributed to this report.

Read more: http://www.dailymail.co.uk/wires/ap/article-5218105/Protesters-arrested-Iran-rally-against-price-hikes.html#ixzz52hIxftUq
Follow us: @MailOnline on Twitter | DailyMail on Facebook

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show — Week in Review — September 1-9, 2017 — Videos

Posted on September 10, 2017. Filed under: American History, Blogroll, Books, Business, Climate, College, Communications, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Cult, Culture, Demographics, Education, Elections, Employment, Entertainment, Essays, Faith, Family, Fraud, Heroes, history, Homes, Law, liberty, Life, Links, Literacy, Love, Mastery, media, Money, Movies, Newspapers, Non-Fiction, Nuclear Proliferation, People, Philosophy, Photos, Plays, Police, Politics, Presidential Candidates, Press, Programming, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Television, Television, Video, War, Water, Wealth, Weapons of Mass Destruction, Weather, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 960, September 8, 2017

Pronk Pops Show 959, September 7, 2017

Pronk Pops Show 958, September 6, 2017

Pronk Pops Show 957, September 5, 2017

Pronk Pops Show 956, August 31, 2017

Pronk Pops Show 955, August 30, 2017

Pronk Pops Show 954, August 29, 2017

Pronk Pops Show 953, August 28, 2017

Pronk Pops Show 952, August 25, 2017

Pronk Pops Show 951, August 24, 2017

Pronk Pops Show 950, August 23, 2017

Pronk Pops Show 949, August 22, 2017

Pronk Pops Show 948, August 21, 2017

Pronk Pops Show 947, August 16, 2017

Pronk Pops Show 946, August 15, 2017

Pronk Pops Show 945, August 14, 2017

Pronk Pops Show 944, August 10, 2017

Pronk Pops Show 943, August 9, 2017

Pronk Pops Show 942, August 8, 2017

Pronk Pops Show 941, August 7, 2017

Pronk Pops Show 940, August 3, 2017

Pronk Pops Show 939,  August 2, 2017

Pronk Pops Show 938, August 1, 2017

Pronk Pops Show 937, July 31, 2017

Pronk Pops Show 936, July 27, 2017

Pronk Pops Show 935, July 26, 2017

Pronk Pops Show 934, July 25, 2017

Pronk Pops Show 934, July 25, 2017

Pronk Pops Show 933, July 24, 2017

Pronk Pops Show 932, July 20, 2017

Pronk Pops Show 931, July 19, 2017

Pronk Pops Show 930, July 18, 2017

Pronk Pops Show 929, July 17, 2017

Pronk Pops Show 928, July 13, 2017

Pronk Pops Show 927, July 12, 2017

Pronk Pops Show 926, July 11, 2017

Pronk Pops Show 925, July 10, 2017

Pronk Pops Show 924, July 6, 2017

Pronk Pops Show 923, July 5, 2017

Pronk Pops Show 922, July 3, 2017

Pronk Pops Show 921, June 29, 2017

Pronk Pops Show 920, June 28, 2017

Pronk Pops Show 919, June 27, 2017

Pronk Pops Show 918, June 26, 2017

Pronk Pops Show 917, June 22, 2017

Pronk Pops Show 916, June 21, 2017

Pronk Pops Show 915, June 20, 2017

Pronk Pops Show 914, June 19, 2017

Pronk Pops Show 913, June 16, 2017

Pronk Pops Show 912, June 15, 2017

Pronk Pops Show 911, June 14, 2017

Pronk Pops Show 910, June 13, 2017

Pronk Pops Show 909, June 12, 2017

Pronk Pops Show 908, June 9, 2017

Pronk Pops Show 907, June 8, 2017

Pronk Pops Show 906, June 7, 2017

Pronk Pops Show 905, June 6, 2017

Pronk Pops Show 904, June 5, 2017

Pronk Pops Show 903, June 1, 2017

Image result for trump's true colors liberal democrat

Image result for hurricane irma Sunday 10 september 2017 5 pm EDTImage result for hurricane irma hits florida 30 minutes ago Image result for hurricane irma latest track

 

The Pronk Pops Show 960

September 8, 2017

The Breaking and Developing Story 1: Category 4 Hurricane Irma Over 500 Miles Wide Bigger Than Texas with 150 MPH Sustained Winds Slows Down Turns Toward West and Tracks Directly Over All of South Florida — Evacuate Now — Hurricane Irma Will Hit Landfall Sunday Morning With Storm Surge  Up To 12 Feet and Rain Fall 10-18 Inches — Over Florida For 24 Hours — All Day Sunday —  Mass Mandatory Evacuation For South Florida — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/09/the-pronk-pops-show-960-september-8-2017-the-breaking-and-developing-story-1-category-4-hurricane-irma-over-500-miles-wide-bigger-than-texas-with-150-mph-sustained-winds-slows-down-turns-toward-we/

September 09, 2017 01:21 PM PDT

The Pronk Pops Show 959

September 7, 2017

The Breaking and Developing Story 1: Mandatory Evacuation Ordered For South Florida — Floridians Flee Monster “Nuclear” Hurricane Irma With Wind Speeds Exceeding 185 MPH That Could Hit Either Coast and Miami/Dade County By Saturday — High Rise Buildings With Glass Windows Near Construction Cranes A Major Concern — Gas Shortage A Serious Major Problem For Those Evacuating — Get Out If You Can Now! — When Will Irma Turn North? — Videos —

Story 2: Perspective Please — Over 1200 Killed by Flood in South Asia (India, Bangladesh, Nepal and Pakistan) vs. Over 60 in Texas By Raining Weather Not Climate Change — Worst Flooding in Decades — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/08/the-pronk-pops-show-959-september-7-2017-the-breaking-and-developing-story-1-mandatory-evacuation-ordered-for-south-florida-floridians-flee-monster-nuclear-hurricane-irma-with-wind-speeds/

September 08, 2017 02:28 PM PDT

The Pronk Pops Show 958

September 6, 2017

Story 1: President Trump Strikes His True Colors Cuts Deal With Democrats — Just Another Big Government Spending Manhattan Liberal Democrat — American “Big Apple” Pie — The Day The Music Died — Videos —

Story 2: The Day The Republican Party and/or President Trump Gives Citizenship To Illegal Alien Dreamers will Be The Day Republican Party Commits Political Suicide and Gives Birth to the American Independence Party — Trump The Flip Flopper –The Night They Drove Old Dixie Down — Helpless — I Shall Be Released — Forever Young — Videos

For additional videos and information:

https://pronkpops.wordpress.com/2017/09/07/the-pronk-pops-show-958-september-6-2017-story-1-president-trump-strikes-his-true-colors-cuts-deal-with-democrats-just-another-big-government-spending-manhattan-liberal-democrat-american-big/

September 07, 2017 01:46 PM PDT

The Pronk Pops Show 957

September 5, 2017

Story 1: Attorney General Sessions Announced The Rescinding of  Deferred Action for Childhood Arrivals (DACA) But Gives Congress Six Months To Enact Law — Deport and Remove All 30-60 Million Estimated Illegal Aliens In The United States — Enforce U.S. Immigration Laws — No Citizenship For Illegal Aliens — Videos —

Story 2: Kim’s Bada Boom — Hydrogen Bomb Test — China Enabled North Korea’s Nuclear and Missile Weapon Programs — China Should Dismantle North Korea’s Nuclear and Missile Programs —  Otherwise on 1 January 2019 U.S. Government Should Impose A Total U.S. Embargo On All Chinese Imports To U.S. and Ban All Exports From U.S. To China Until North Korea’s Nuclear Weapons and Missile Weapon Programs Are Completely Dismantled — Videos —

Story 3: Preparing For Hurricane Irma — Category 5 Destroyer and Killer Hurricane With Sustained Winds Over 180 Miles Per Hour and  Wind Gusts Exceeding 200 Miles Per Hour — Will It Hit Florida? — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/06/the-pronk-pops-show-957-september-5-2017-story-1-attorney-general-sessions-announced-the-rescinding-of-deferred-action-for-childhood-arrivals-daca-but-gives-congress-six-months-to-enact-la/

September 03, 2017 02:54 PM PDT

The Pronk Pop Show 956

August 31, 2017

Part 2 of 2, Story 1: President Trump’s Tax Speech — Very Light On Specifics — Let Congress Fill in The Details — Formula For Failure — Tax Rate Cuts Are Not Fundamental Tax Reform — A Broad Based Consumption Tax Such as The FairTax or Fair Tax Less Not Even Mentioned — What Good Is Dreaming It If You don’t actually do it! — Videos —

For additional information and videos:

https://pronkpops.wordpress.com/2017/09/01/the-pronk-pops-show-956-august-31-2017-part-2-of-2-story-1-president-trumps-tax-speech-very-light-on-specifics-let-congress-fill-in-the-details-formula-for-failure-tax-rate-cuts-are/

September 03, 2017 11:59 AM PDT

The Pronk Pops Show 955

August 30, 2017

Part 1 of 2, Story 1: President Trump’s Tax Speech — Very Light On Specifics — Let Congress Fill in The Details — Formula For Failure — Tax Rate Cuts Are Not Fundamental Tax Reform — A Broad Based Consumption Tax Such as The FairTax or Fair Tax Less Not Even Mentioned — What Good Is Dreaming It If You don’t actually do it! — Videos —

Story 2: Revised Second Estimate of Real GDP Growth in Second Quarter of 2017 Is 3 Percent — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/08/31/the-pronk-pops-show-755-story-1-president-trumps-tax-speech-very-light-on-specifics-let-congress-fill-in-the-details-formula-for-failure-tax-rate-cuts-are-not-fundamental-tax-reform/

 

 

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 955-960

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show — Week In Review — July 28-August 4, 2017 — Videos

Posted on August 5, 2017. Filed under: American History, Banking, Blogroll, Bunker Busters, Business, Central Intelligence Agency (CIA), College, Computers, Congress, Constitution, Corruption, Crime, Crisis, Culture, Defense Intelligence Agency (DIA), Diet, Documentary, Drones, Drug Cartels, Economics, Education, Elections, Employment, Energy, Entertainment, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Food, Foreign Policy, Fraud, Freedom, Friends, government, government spending, Health, Health Care, history, Illegal, Immigration, Inflation, Internal Revenue Service (IRS), Investments, IRS, Islam, Journalism, Language, Law, Legal, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, Milk, Missiles, Monetary Policy, Money, Music, National Security Agency (NSA), Natural Gas, Newspapers, Nuclear, Nuclear Power, Nuclear Proliferation, Obamacare, Oil, People, Philosophy, Photos, Pistols, Police, Political Correctness, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Religion, Rifles, Security, Spying, Strategy, Success, Talk Radio, Tax Policy, Taxation, Taxes, Technology, Television, Terrorism, The Pronk Pops Show, Trade Policiy, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Work, Writing | Tags: , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 940, August 3, 2017

Pronk Pops Show 939,  August 2, 2017

Pronk Pops Show 938, August 1, 2017

Pronk Pops Show 937, July 31, 2017

Pronk Pops Show 936, July 27, 2017

Pronk Pops Show 935, July 26, 2017

Pronk Pops Show 934, July 25, 2017

Pronk Pops Show 934, July 25, 2017

Pronk Pops Show 933, July 24, 2017

Pronk Pops Show 932, July 20, 2017

Pronk Pops Show 931, July 19, 2017

Pronk Pops Show 930, July 18, 2017

Pronk Pops Show 929, July 17, 2017

Pronk Pops Show 928, July 13, 2017

Pronk Pops Show 927, July 12, 2017

Pronk Pops Show 926, July 11, 2017

Pronk Pops Show 925, July 10, 2017

Pronk Pops Show 924, July 6, 2017

Pronk Pops Show 923, July 5, 2017

Pronk Pops Show 922, July 3, 2017

Pronk Pops Show 921, June 29, 2017

Pronk Pops Show 920, June 28, 2017

Pronk Pops Show 919, June 27, 2017

Pronk Pops Show 918, June 26, 2017

Pronk Pops Show 917, June 22, 2017

Pronk Pops Show 916, June 21, 2017

Pronk Pops Show 915, June 20, 2017

Pronk Pops Show 914, June 19, 2017

Pronk Pops Show 913, June 16, 2017

Pronk Pops Show 912, June 15, 2017

Pronk Pops Show 911, June 14, 2017

Pronk Pops Show 910, June 13, 2017

Pronk Pops Show 909, June 12, 2017

Pronk Pops Show 908, June 9, 2017

Pronk Pops Show 907, June 8, 2017

Pronk Pops Show 906, June 7, 2017

Pronk Pops Show 905, June 6, 2017

Pronk Pops Show 904, June 5, 2017

Pronk Pops Show 903, June 1, 2017

Pronk Pops Show 902, May 31, 2017

Pronk Pops Show 901, May 30, 2017

Pronk Pops Show 900, May 25, 2017

Pronk Pops Show 899, May 24, 2017

Pronk Pops Show 898, May 23, 2017

Pronk Pops Show 897, May 22, 2017

Pronk Pops Show 896, May 18, 2017

Pronk Pops Show 895, May 17, 2017

Pronk Pops Show 894, May 16, 2017

Pronk Pops Show 893, May 15, 2017

Pronk Pops Show 892, May 12, 2017

Pronk Pops Show 891, May 11, 2017

Pronk Pops Show 890, May 10, 2017

Pronk Pops Show 889, May 9, 2017

Pronk Pops Show 888, May 8, 2017

Pronk Pops Show 887, May 5, 2017

Pronk Pops Show 886, May 4, 2017

Pronk Pops Show 885, May 3, 2017

Pronk Pops Show 884, May 1, 2017

Image result for Reforming American Immigration for a Strong Economy (RAISE) Act. charts on numbers 

 

Image result for cartoons illegal alien invasion of united states

The Pronk Pops Show 940

August 3, 2017

Breaking News — Story 1: Special Counsel Robert Mueller III Impanels Grand Jury for Russian Investigation and Alleged Russia/Trump Collusion Conspiracy Theory — Videos —

Story 2: Proposed Reforming American Immigration for Strong Employment (RAISE) Act will Expose Hypocrisy of Democrats and Republicans In Promoting Open Borders with 30-60 Million Illegal Invasion of United States Over The Last 30 Years and Rising Legal Immigration Instead of Protecting The American Worker and Middle Class — The Betrayal Of American People By The Political Elitist Establishment — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/08/03/the-pronk-pops-show-940-august-3-2017-breaking-news-story-1-special-counsel-robert-mueller-iii-impanels-grand-jury-for-russian-investigation-and-alleged-russiatrump-collusion-conspiracy-theory/

August 04, 2017 04:57 PM PDT

The Pronk Pops Show 939

August 2, 2017

Story 1: President Trump For National Unity Furiously Signs Flawed Russia, Iran, and North Korea Sanctions Bill — Videos —

Story 2: Trump Announces New Immigration Policy — Reforming American Immigration for Strong Employment (RAISE) Act — Videos

For additional information and videos;

https://pronkpops.wordpress.com/2017/08/02/the-pronk-pops-show-939-august-2-2017-breaking-news-story-1-president-trump-for-national-unity-furiously-signs-flawed-russia-iran-and-north-korea-sanctions-bill-videos-story-2-trump-a/

August 03, 2017 12:00 PM PDT

The Pronk Pops Show 938

August 1, 2017

Story 1: Vice-President On The Trump Doctrine In Speech Delivered From Estonia, Latvia, and Lithuania — Videos —

Story 2: President Trump Will Sign Sanctions Bill For Russia, North Korea, and Islamic Republic of Iran — Videos — Story 3: Washington War Fever with Neocon Republicans and Progressive Democrats United Against Russia — Masking Incompetency — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/08/01/the-pronk-pops-show-938-august-1-2017-story-1-vice-president-on-the-trump-doctrine-in-speech-delivered-from-estonia-latvia-and-lithuania-videos-story-2-president-trump-will-sign-sanction/

 

The Pronk Pops Show 938

August 2, 2017

Story 1: Vice-President On The Trump Doctrine In Speech Delivered From Estonia, Latvia, and Lithuania — Videos —

Story 2: President Trump Will Sign Sanctions Bill For Russia, North Korea, and Islamic Republic of Iran — Videos —

Story 3: Washington War Fever with Neocon Republicans and Progressive Democrats United Against Russia — Masking Incompetency — Videos

For additional information and videos:

https://wordpress.com/post/pronkpops.wordpress.com/26453

July 29, 2017 12:49 PM PDT

The Pronk Pops Show 936

July 27, 2017

Story 1surprisedbama Spy Scandal: Obama Administration Officials Including National Security Adviser Rice, CIA Director Brennan and United Nations Ambassador Power Spied On American People and Trump Campaign By Massive Unmasking Using Intelligence Community For Political Purposes — An Abuse of Power and Felonies Under U.S. Law — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/28/the-pronk-pops-show-936-story-1obama-spy-scandal-obama-administration-officials-including-national-security-adviser-rice-cia-director-brennan-and-united-nations-ambassador-power-spied-on-american/

July 28, 2017 07:12 PM PDT

The Pronk Pops Show 935

July 26, 2017

Story 1: Trump Targets Transgender Troops — No More Gender Reassignment Surgeries In Military and Veterans Hospital — Cuts Spending By Millions Per Year — What is Next? — No More Free Viagra — Tranny Boys/Girls No More — Videos —

Story 2: Senate Fails To Pass Senator Rand Paul’s Total Repeal Amendment — Tea Party Revival Calling For Primary Challenge Against Rollover Republican Senators Shelley Moore Capito of West Virginia, Susan Collins of Maine, Dick Heller of Nevada, John McCain of Arizona, Rob Portman of Ohio, Lamar Alexander of Tennessee and Lisa Murkowski of Alaska — All Republicans in Name Only — Really Big Government Democrats — Videos —

Story 3: Trump Rally in Ohio — Neither A Rally Nor A Movement Is Not A Political Party That Votes in Congress — New Viable and Winning American Independence Party Is What Is Needed –Videos

For additional information and videos:

https://wordpress.com/post/pronkpops.wordpress.com/26375

July 27, 2017 02:28 PM PDT

The Pronk Pops Show 934

July 26, 2017

Story 1: Pence Breaks Tie — Senate Will Debate How To Proceed With Obamacare Repeal and Replace — Videos —

Story 2: Congress Overwhelming Passes New Sanctions on Russia, Iran and North Korea — Long Overdue — Videos —

Story 3: Trump Again Critical Of Attorney General Sessions Apparently For Not Prosecuting Leakers and Going After Clinton Foundation Crimes — What about Obama Administration’s Spying On Trump — An Abuse of Power Using Intelligence Community for Political Purposes — Will Trump Dump Sessions? If He Does Trump Will Start To Lose His Supporters in Talk Radio and Voter Base — Direct Deputy Attorney Rod Rosenstein To Fire Mueller — If He Won’t Fire Him — Fire Both Mueller and Rosenstein —  Punish Your Enemies and Reward Your Friends President Trump! — “In Your Guts You Know He is Nuts” —  Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/25/the-pronk-pops-show-934-july-24-2017-breaking-breaking-story-1-pence-breaks-tie-senate-will-debate-how-to-proceed-with-obamacare-repeal-and-replace-videos-story-2-congress-overwhel/

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 938-940

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show — Week in Review — July 13-20, 2017 — Videos

Posted on July 22, 2017. Filed under: American History, Articles, Blogroll, Business, Congress, conservatives, Constitution, Corruption, Crime, Defense Intelligence Agency (DIA), Economics, Education, Elections, Employment, Family, Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government spending, Health, Health Care, history, Illegal, Immigration, Investments, Journalism, Language, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, Money, Obamacare, People, Philosophy, Photos, Politics, Press, Programming, Radio, Rants, Raves, Regulations, Resources, Reviews, Strategy, Talk Radio, Tax Policy, Taxation, Taxes, Technology, Wealth, Welfare, Work | Tags: , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 932,  July 20, 2017

Pronk Pops Show 931,  July 19, 2017

Pronk Pops Show 930,  July 18, 2017

Pronk Pops Show 929,  July 17, 2017

Pronk Pops Show 928,  July 13, 2017

Pronk Pops Show 927,  July 12, 2017

Pronk Pops Show 926,  July 11, 2017

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for branco cartoons trump obamacare july 13-20, 2017

Image result for branco cartoons trump obamacare july 13-20, 2017

itunes pic

The Pronk Pops Show 932

July 20, 2017

Story 1: O.J. Simpson Granted Parole When Eligible — The Juice Will Soon Be Loose — Videos —

Story 2: President Trump’s First Six Months — Videos —

Story 3: President Trump Will Keep Attorney General Sessions For Now — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/20/the-pronk-pops-show-932-story-1-o-j-simpson-granted-parole-when-eligible-the-juice-will-soon-be-loose-videos-story-2-president-trumps-first-six-months-videos-story-3-president-tr/

July 22, 2017 10:49 AM PDT
itunes pic

The Pronk Pops Show 931

July 19, 2017

Story 1: “Obamacare Failed” Says President Trump — Wants Obamacare Completely  Repealed and Replaced Sooner or Later — Obama Lied To American People — Does President Trump Understand The Relationship Between Pre-existing Conditions, Guaranteed Issue, Community Rating and Adverse Selection — Many Doubt Trump Really Understands The Relationship That Is The Real Reason Obamacare Was Designed To Fail From The Beginning So It Could Be Replaced By Single Payer Government Health Care — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/20/the-pronk-pops-show-931-july-19-2017-story-1-obamacare-failed-says-president-trump-wants-obamacare-completely-repealed-and-replaced-sooner-or-later-obama-lied-to-american-people/

July 19, 2017 07:34 PM PDT
itunes pic

The Pronk Pops Show 930

July 18, 2017

Story 1: Will Trump Challenge The Washington Establishment To Achieve His Promises? You Betcha. Will He Win? Long Shot –A Movement Is Not A Viable Political Party That Can Beat The Democratic Party and Republican Party and Their Allies In The Big Government Bureaucracies, Big Lie Media and The Owner Donor Class — Votes Count — Independence Party???– Videos —

Story 2: Replace Republicans With D and F Conservative Review Grades and Scores Root and Branch With Real Conservatives, Classical Liberals and Libertarians Until New Political Party Is Formed and Becomes A Viable Party — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/19/the-pronk-pops-show-970-july-18-2017-story-1-will-trump-challenge-the-washington-establishment-to-achieve-his-promises-yes-will-he-win-long-shot-a-movement-is-not-a-viable-political-party-tha/

July 19, 2017 01:38 PM PDT
itunes pic

The Pronk Pops Show 929

July 17, 2017

Story 1: Downsizing The Federal Government or Draining The Swap: Trump Should Permanently Close 8 Departments Not Appoint People To Run Them — Cut All Other Department Budgets by 20% — Video —

Story 2: Federal Spending Breaks $4 Trillion for Fiscal Year 2017 —

Story 3: The American People and President Trump Vs. Political Elitist Establishment of The Big Government Democratic and Republican Parties — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/18/the-pronk-pops-show-929-july-17-2017-story-1-downsizing-the-federal-government-or-draining-the-swap-trump-should-permanently-close-8-departments-not-appoint-people-to-run-them-cut-all-other-de/

July 17, 2017 08:21 PM PDT
itunes pic

The Pronk Pops Show 928

July 13, 2017

Story 1: Senate Revised Republican Repeal and Replacement Bill A Betrayal of Voters Who Gave Republicans Control of Senate and House — Does Not Repeal All Obamacare Mandates, Regulations and Taxes but Does Bailout Insurance Industry and States Who Extended Medicaid Benefits — Trump Should Veto This Betrayal By Republican Establishment of Republican Voters — Videos —

Story 2: Estimated insolvency date of Social Security’s Trust fund is 2034 — and Medicare’s Hospital Trust Fund is 2029 —  Social Security and Medicare Benefits Will Be Cut or Taxes Raised or Combination of Benefit Cuts and Tax Increases — Videos —

Story 3: Trump’s Broken Promises and Kept Promises — Good Intentions are Not Enough — Only Results Count — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/15/the-pronk-pops-show-928-july-13-2017-story-1-senate-revised-republican-repeal-and-replacement-bill-a-betray-of-voters-who-gave-republicans-control-of-senate-and-house-does-not-repeal-all-obamac/

July 14, 2017 05:00 PM PDT
itunes pic

The Pronk Pops Show 927

July 12, 2017

Story 1: Putin’s Sting — How Russian Intelligence Service (FSB) Played The Washington Political Elitist Establishment (Democrats and Republicans) And Big Lie Media And How They Fell Hook, Line and Sinker for Russian Intelligence Disinformation Campaign — Russian Trump Dossier — The Dangers of Opposition Research, Confirmation Bias, True Believers, Useful Idiots, Blind Ambition and Two Party Tyranny — The Sting Redux — Videos —

Story 2: Republican Sellout The Republican Voter Base By Not Repealing Obamacare Completely — Leaves Many Obamacare Regulations, Subsidies, and Taxes In Place –Republican Replacement of Obamacare  Is A Big Bailout Bill of Insurance Industry — The Stupid Republican Party About To Commit Political Suicide — Rest In Peace — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/13/the-pronk-pops-show-927-july-12-2017-story-1-putins-sting-how-russian-intelligence-played-the-washington-political-elitist-establishment-democrats-and-republicans-and-big-lie-media-and-the/

July 12, 2017 08:04 PM PDT
itunes pic

The Pronk Pops Show 926

July 11, 2017

Story 1: Much Ado About Nothing — What Dirt Did The Russians Have On Hillary Clinton? — Donald Trump Jr. Wanted To Know — Smells Like A Russian Setup and/or Democrat Dirty Trick — Who Leaked The Emails To New York Times? — American People Ignoring Paranoid Progressive Propaganda of Big Lie Media — Still Waiting For Any Evidence of Trump/Russian/Putin Collusion — Clinton Collusion Conspiracy Crashing — Desperate Delusional Democrat Deniers of Reality — Videos —

Story 2: When Will Attorney General Sessions Appoint A Special Counsel To Investigate Intelligence Community Leaks and Hillary Clinton Mishandling of Classified Documents and Related Pay for Play Public Corruption of Clinton Foundation? — Was Democratic Hired Opposition Research firm Fusion GPS and Christopher Steel Formerly of British Intelligent MI-6 Agent A Cutout For The Russian Disinformation Campaign Included in The Donald Trump — Russia Dossier? — Videos

For additional information and videos:

https://pronkpops.wordpress.com/2017/07/12/the-pronk-pops-show-926-july-11-2017-story-1-much-ado-about-nothing-what-dirt-did-the-russians-have-on-hillary-clinton-donald-trump-jr-wanted-to-know-smells-like-a-russian-setup-andor/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 926-932

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

Read Full Post | Make a Comment ( None so far )

National Security Agency Is Spying On All American Who Use The Internet and Telephone System and They Collect and Store All Your Communications — Includes Trump and Associates — No Warrant Required If President Obama Designates You A Target — Congress Is Enabling The Turnkey Two Party Tyranny — Warrentless Searches — Congress Does Nothing To Stop It! — Videos

Posted on March 17, 2017. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Data, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, European History, External Hard Drives, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Friends, government spending, Heroes, history, Illegal, Immigration, Internal Revenue Service (IRS), IRS, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Sociology, Space, Spying, Strategy, Supreme Court, Systems, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for NSA utah data center

Image result for NSA utah data centerImage result for NSA utah data centerImage result for National security agencyImage result for National security agency

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Published on Jul 8, 2013

The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

If you think you can handle the truth, well here it is folks

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show] 

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

Polygraphin

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting[edit]

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]

Computing[edit]

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[168]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[171] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[175] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[176] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[177] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[175]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[174]

Following the signing in 1946–1956[178] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[179] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[180] New Zealand.[181]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[192]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[193] Today it is a legacy system, and several NSA stations are closing.[175]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[194] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[195]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[206]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[219]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[224] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[225] based on documentation provided by former AT&T technician Mark Klein.[226]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235] Rasmussen Reports found that 59% of Americans disapprove,[236] Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]

July 2015 – WikiLeaks: Espionage against German federal ministries[edit]

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]

Suspected responsibility for hacking operations by the Equation Group[edit]

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31

Software backdoors

Linux kerne

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[263]However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[264]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
Microsoft Windows
Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]

Role in scientific research and development[

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[278]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[279][280]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[281]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[280]
  • KY-57 VINSON tactical radio voice encryptor[281]
  • KG-84 Dedicated Data Encryption/Decryption[281]
  • STU-III secure telephone unit,[281] phased out by the STE[282]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]

Legality

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs

In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

https://en.wikipedia.org/wiki/National_Security_Agency

Read Full Post | Make a Comment ( None so far )

George Orwell — Videos

Posted on March 7, 2017. Filed under: Blogroll, Books, Central Intelligence Agency (CIA), College, Computers, Education, Federal Bureau of Investigation (FBI), Fiction, Food, Freedom, government spending, Law, liberty, Life, Links, Literacy, Love, media, Movies, Newspapers, Philosophy, Photos, Police, Political Correctness, Politics, Press, Programming, Psychology, Quotations, Radio, Rants, Raves, Religious, Security, Speech, Technology, Terrorism, Video, Wealth, Welfare, Wisdom, Work, World War II, Writing | Tags: , , , , , , , , , , , , , , , , |

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotes

Image result for george orwellImage result for george orwell

Image result for george orwell 1984

Top 20 George Orwell Quotes (Author of 1984)

George Orwell 1984 Telescreen Exercise

Nineteen Eighty-Four (1984) – Last Scene

A Final Warning from George Orwell

George Orwell: A Life in Pictures Full Documentary (High Quality)

The Real George Orwell (1/6)

The Real George Orwell (2/6)

The Real George Orwell (3/6)

The Real George Orwell (4/6)

The Real George Orwell (5/6)

The Real George Orwell (6/6)

ANIMAL FARM – full movie

1984 George Orwell – Full Movie – Hollywood best Greatest blockbuster movie Film

Watch Nineteen Eighty Four Watch Movies Online Free

George Orwell’s 1984 ( MOVIE ) WAR is PEACE Freedom is Slavery Ignorance is Strength

1984 – George Orwell – FULL MOVIE – (TheLibertarianChannel)

Mind Control – George Orwell BBC 101 documentary

Orwell Rolls In His Grave – The One Thing The Media Doesn’t Like To Talk About

1984 – Abby Martin Explains George Orwell’s 1984

LITERATURE – George Orwell

1984 by George Orwell FULL Audiobook

Politics and the English Language, by George Orwell

Keep the Aspidistra Flying Audiobook – George Orwell

Homage to Catalonia Audiobook – George Orwell

George Orwell – The Road to Wigan Pier

George Orwell – Down and Out in Paris and London

George Orwell

From Wikipedia, the free encyclopedia
George Orwell
A photo showing the head and shoulders of a middle-aged man with black hair and a slim moustache.

Orwell’s press card portrait, 1943
Born Eric Arthur Blair
25 June 1903
Motihari, Bengal Presidency, British India
(now East Champaran, Bihar, India)
Died 21 January 1950 (aged 46)
University College Hospital, London, England, United Kingdom
Resting place Sutton Courtenay, Oxfordshire, England, United Kingdom
Pen name George Orwell
Occupation Novelist, essayist, journalist, critic
Alma mater Eton College
Genre Dystopia, roman à clef, satire
Subject Anti-fascism, anti-Stalinism, democratic socialism, literary criticism, news, polemic
Notable works Animal Farm
Nineteen Eighty-Four
Years active 1928–1950
Spouse Eileen O’Shaughnessy
(m. 1935; her death 1945)
Sonia Brownell
(m. 1949; his death 1950)

Signature Eric Blair ("George Orwell")

Eric Arthur Blair (25 June 1903 – 21 January 1950),[1] better known by the pen name George Orwell, was an English novelist, essayist, journalist, and critic. His work is marked by lucid prose, awareness of social injustice, opposition to totalitarianism, and outspoken support of democratic socialism.[2][3]

Orwell wrote literary criticism, poetry, fiction, and polemical journalism. He is best known for the allegorical novella Animal Farm (1945) and the dystopian novel Nineteen Eighty-Four (1949). His non-fiction works, including The Road to Wigan Pier (1937), documenting his experience of working class life in the north of England, and Homage to Catalonia (1938), an account of his experiences in the Spanish Civil War, are widely acclaimed, as are his essays on politics, literature, language, and culture. In 2008, The Times ranked him second on a list of “The 50 greatest British writers since 1945”.[4]

Orwell’s work continues to influence popular and political culture, and the term Orwellian – descriptive of totalitarian or authoritarian social practices – has entered the language together with many of his neologisms, including cold war, Big Brother, Thought Police, Room 101, memory hole, newspeak, doublethink, and thoughtcrime.[5]

Contents

 [show] 

Life

Early years

Blair family home at Shiplake, Oxfordshire

Eric Arthur Blair was born on 25 June 1903, in Motihari, Bengal Presidency (present-day Bihar), in British India.[6] His great-grandfather Charles Blair was a wealthy country gentleman in Dorset who married Lady Mary Fane, daughter of the Earl of Westmorland, and had income as an absentee landlord of plantations in Jamaica.[7] His grandfather, Thomas Richard Arthur Blair, was a clergyman.[8] Although the gentility passed down the generations, the prosperity did not; Eric Blair described his family as “lower-upper-middle class“.[9] His father, Richard Walmesley Blair, worked in the Opium Department of the Indian Civil Service.[10] His mother, Ida Mabel Blair (née Limouzin), grew up in Moulmein, Burma, where her French father was involved in speculative ventures.[7] Eric had two sisters: Marjorie, five years older, and Avril, five years younger. When Eric was one year old, his mother took him and his sister to England.[11][n 1] His birthplace and ancestral house in Motihari has been declared a protected monument of historical importance.[12]

In 1904, Ida Blair settled with her children at Henley-on-Thames in Oxfordshire. Eric was brought up in the company of his mother and sisters, and apart from a brief visit in mid-1907,[13] they did not see the husband and father Richard Blair until 1912.[8] His mother’s diary from 1905 describes a lively round of social activity and artistic interests.

Before the First World War, the family moved to Shiplake, Oxfordshire where Eric became friendly with the Buddicom family, especially their daughter Jacintha. When they first met, he was standing on his head in a field. On being asked why, he said, “You are noticed more if you stand on your head than if you are right way up.”[14] Jacintha and Eric read and wrote poetry, and dreamed of becoming famous writers. He said that he might write a book in the style of H. G. Wells‘s A Modern Utopia. During this period, he also enjoyed shooting, fishing and birdwatching with Jacintha’s brother and sister.[14]

Playing fields at St. Cyprian’s. Blair’s time at the school inspired his essay “Such, Such Were the Joys“.

At the age of five, Eric was sent as a day-boy to a convent school in Henley-on-Thames, which Marjorie also attended. It was a Roman Catholic convent run by French Ursuline nuns, who had been exiled from France after religious education was banned in 1903.[15] His mother wanted him to have a public school education, but his family could not afford the fees, and he needed to earn a scholarship. Ida Blair’s brother Charles Limouzin recommended St Cyprian’s School, Eastbourne, East Sussex.[8] Limouzin, who was a proficient golfer, knew of the school and its headmaster through the Royal Eastbourne Golf Club, where he won several competitions in 1903 and 1904.[16] The headmaster undertook to help Blair to win a scholarship, and made a private financial arrangement that allowed Blair’s parents to pay only half the normal fees. In September 1911 Eric arrived at St Cyprian’s. He boarded at the school for the next five years, returning home only for school holidays. He knew nothing of the reduced fees, although he “soon recognised that he was from a poorer home”.[17] Blair hated the school[18] and many years later wrote an essay “Such, Such Were the Joys“, published posthumously, based on his time there. At St. Cyprian’s, Blair first met Cyril Connolly, who became a writer. Many years later, as the editor of Horizon, Connolly published several of Orwell’s essays.

While at St Cyprian’s, Blair wrote two poems that were published in the Henley and South Oxfordshire Standard.[19][20] He came second to Connolly in the Harrow History Prize, had his work praised by the school’s external examiner, and earned scholarships to Wellington and Eton. But inclusion on the Eton scholarship roll did not guarantee a place, and none was immediately available for Blair. He chose to stay at St Cyprian’s until December 1916, in case a place at Eton became available.[8]

In January, Blair took up the place at Wellington, where he spent the Spring term. In May 1917 a place became available as a King’s Scholar at Eton. He remained at Eton until December 1921, when he left midway between his 18th and 19th birthday. Wellington was “beastly”, Orwell told his childhood friend Jacintha Buddicom, but he said he was “interested and happy” at Eton.[21] His principal tutor was A. S. F. Gow, Fellow of Trinity College, Cambridge, who also gave him advice later in his career.[8] Blair was briefly taught French by Aldous Huxley. Stephen Runciman, who was at Eton with Blair, noted that he and his contemporaries appreciated Huxley’s linguistic flair.[22] Cyril Connolly followed Blair to Eton, but because they were in separate years, they did not associate with each other.[23]

Blair’s academic performance reports suggest that he neglected his academic studies,[22] but during his time at Eton he worked with Roger Mynors to produce a College magazine, The Election Times, joined in the production of other publications – College Days and Bubble and Squeak – and participated in the Eton Wall Game. His parents could not afford to send him to a university without another scholarship, and they concluded from his poor results that he would not be able to win one. Runciman noted that he had a romantic idea about the East,[22] and the family decided that Blair should join the Imperial Police, the precursor of the Indian Police Service. For this he had to pass an entrance examination. His father had retired to Southwold, Suffolk, by this time; Blair was enrolled at a crammer there called Craighurst, and brushed up on his Classics, English, and History. He passed the entrance exam, coming seventh out of the 26 candidates who exceeded the pass mark.[8][24]

Policing in Burma

Blair pictured in a passport photo during his Burma years

Blair’s maternal grandmother lived at Moulmein, so he chose a posting in Burma. In October 1922 he sailed on board SS Herefordshire via the Suez Canal and Ceylon to join the Indian Imperial Police in Burma. A month later, he arrived at Rangoon and travelled to the police training school in Mandalay. After a short posting at Maymyo, Burma’s principal hill station, he was posted to the frontier outpost of Myaungmya in the Irrawaddy Delta at the beginning of 1924.

Working as an imperial policeman gave him considerable responsibility while most of his contemporaries were still at university in England. When he was posted farther east in the Delta to Twante as a sub-divisional officer, he was responsible for the security of some 200,000 people. At the end of 1924, he was promoted to Assistant District Superintendent and posted to Syriam, closer to Rangoon. Syriam had the refinery of the Burmah Oil Company, “the surrounding land a barren waste, all vegetation killed off by the fumes of sulphur dioxide pouring out day and night from the stacks of the refinery.” But the town was near Rangoon, a cosmopolitan seaport, and Blair went into the city as often as he could, “to browse in a bookshop; to eat well-cooked food; to get away from the boring routine of police life”.[25] In September 1925 he went to Insein, the home of Insein Prison, the second largest jail in Burma. In Insein, he had “long talks on every conceivable subject” with Elisa Maria Langford-Rae (who later married Kazi Lhendup Dorjee). She noted his “sense of utter fairness in minutest details”.[26]

British Club in Katha (in Orwell’s time, it occupied only the ground floor)

In April 1926 he moved to Moulmein, where his maternal grandmother lived. At the end of that year, he was assigned to Katha in Upper Burma, where he contracted dengue fever in 1927. Entitled to a leave in England that year, he was allowed to return in July due to his illness. While on leave in England and on holiday with his family in Cornwall in September 1927, he reappraised his life. Deciding against returning to Burma, he resigned from the Indian Imperial Police to become a writer. He drew on his experiences in the Burma police for the novel Burmese Days (1934) and the essays “A Hanging” (1931) and “Shooting an Elephant” (1936).

In Burma, Blair acquired a reputation as an outsider. He spent much of his time alone, reading or pursuing non-pukka activities, such as attending the churches of the Karen ethnic group. A colleague, Roger Beadon, recalled (in a 1969 recording for the BBC) that Blair was fast to learn the language and that before he left Burma, “was able to speak fluently with Burmese priests in ‘very high-flown Burmese.'”[27] Blair made changes to his appearance in Burma that remained for the rest of his life. “While in Burma, he acquired a moustache similar to those worn by officers of the British regiments stationed there. [He] also acquired some tattoos; on each knuckle he had a small untidy blue circle. Many Burmese living in rural areas still sport tattoos like this – they are believed to protect against bullets and snake bites.”[28] Later, he wrote that he felt guilty about his role in the work of empire and he “began to look more closely at his own country and saw that England also had its oppressed …”

London and Paris

Blair’s 1927 lodgings in Portobello Road, London

In England, he settled back in the family home at Southwold, renewing acquaintance with local friends and attending an Old Etonian dinner. He visited his old tutor Gow at Cambridge for advice on becoming a writer.[29] In 1927 he moved to London.[30] Ruth Pitter, a family acquaintance, helped him find lodgings, and by the end of 1927 he had moved into rooms in Portobello Road;[31] a blue plaque commemorates his residence there.[32] Pitter’s involvement in the move “would have lent it a reassuring respectability in Mrs Blair’s eyes.” Pitter had a sympathetic interest in Blair’s writing, pointed out weaknesses in his poetry, and advised him to write about what he knew. In fact he decided to write of “certain aspects of the present that he set out to know” and “ventured into the East End of London – the first of the occasional sorties he would make to discover for himself the world of poverty and the down-and-outers who inhabit it. He had found a subject. These sorties, explorations, expeditions, tours or immersions were made intermittently over a period of five years.”[33]

In imitation of Jack London, whose writing he admired (particularly The People of the Abyss), Blair started to explore the poorer parts of London. On his first outing he set out to Limehouse Causeway, spending his first night in a common lodging house, possibly George Levy’s ‘kip’. For a while he “went native” in his own country, dressing like a tramp, adopting the name P. S. Burton and making no concessions to middle-class mores and expectations; he recorded his experiences of the low life for use in “The Spike“, his first published essay in English, and in the second half of his first book, Down and Out in Paris and London (1933).

Rue du Pot de Fer, on the Left Bank, in the 5th arrondissement, where Blair lived in Paris

In early 1928 he moved to Paris. He lived in the rue du Pot de Fer, a working class district in the 5th Arrondissement.[8] His aunt Nellie Limouzin also lived in Paris and gave him social and, when necessary, financial support. He began to write novels, including an early version of Burmese Days, but nothing else survives from that period.[8] He was more successful as a journalist and published articles in Monde, a political/literary journal edited by Henri Barbusse (his first article as a professional writer, “La Censure en Angleterre”, appeared in that journal on 6 October 1928); G. K.’s Weekly, where his first article to appear in England, “A Farthing Newspaper”, was printed on 29 December 1928;[34] and Le Progrès Civique (founded by the left-wing coalition Le Cartel des Gauches). Three pieces appeared in successive weeks in Le Progrès Civique: discussing unemployment, a day in the life of a tramp, and the beggars of London, respectively. “In one or another of its destructive forms, poverty was to become his obsessive subject – at the heart of almost everything he wrote until Homage to Catalonia.”[35]

He fell seriously ill in February 1929 and was taken to the Hôpital Cochin in the 14th arrondissement, a free hospital where medical students were trained. His experiences there were the basis of his essay “How the Poor Die“, published in 1946. He chose not to identify the hospital, and indeed was deliberately misleading about its location. Shortly afterwards, he had all his money stolen from his lodging house. Whether through necessity or to collect material, he undertook menial jobs like dishwashing in a fashionable hotel on the rue de Rivoli, which he later described in Down and Out in Paris and London. In August 1929, he sent a copy of “The Spike” to John Middleton Murry‘s New Adelphi magazine in London. The magazine was edited by Max Plowman and Sir Richard Rees, and Plowman accepted the work for publication.

Southwold

Southwold – North Parade

In December 1929, after nearly two years in Paris, Blair returned to England and went directly to his parents’ house in Southwold, which remained his base for the next five years. The family was well established in the town and his sister Avril was running a tea-house there. He became acquainted with many local people, including Brenda Salkeld, the clergyman’s daughter who worked as a gym-teacher at St Felix Girls’ School, Southwold. Although Salkeld rejected his offer of marriage, she remained a friend and regular correspondent for many years. He also renewed friendships with older friends, such as Dennis Collings, whose girlfriend Eleanor Jacques was also to play a part in his life.[8]

In early 1930 he stayed briefly in Bramley, Leeds, with his sister Marjorie and her husband Humphrey Dakin, who was as unappreciative of Blair as when they knew each other as children. Blair was writing reviews for Adelphi and acting as a private tutor to a disabled child at Southwold. He then became tutor to three young brothers, one of whom, Richard Peters, later became a distinguished academic.[36] “His history in these years is marked by dualities and contrasts. There is Blair leading a respectable, outwardly eventless life at his parents’ house in Southwold, writing; then in contrast, there is Blair as Burton (the name he used in his down-and-out episodes) in search of experience in the kips and spikes, in the East End, on the road, and in the hop fields of Kent.”[37] He went painting and bathing on the beach, and there he met Mabel and Francis Fierz, who later influenced his career. Over the next year he visited them in London, often meeting their friend Max Plowman. He also often stayed at the homes of Ruth Pitter and Richard Rees, where he could “change” for his sporadic tramping expeditions. One of his jobs was domestic work at a lodgings for half a crown (two shillings and sixpence, or one-eighth of a pound) a day.[38]

Blair now contributed regularly to Adelphi, with “A Hanging” appearing in August 1931. From August to September 1931 his explorations of poverty continued, and, like the protagonist of A Clergyman’s Daughter, he followed the East End tradition of working in the Kent hop fields. He kept a diary about his experiences there. Afterwards, he lodged in the Tooley Street kip, but could not stand it for long, and with financial help from his parents moved to Windsor Street, where he stayed until Christmas. “Hop Picking”, by Eric Blair, appeared in the October 1931 issue of New Statesman, whose editorial staff included his old friend Cyril Connolly. Mabel Fierz put him in contact with Leonard Moore, who became his