Religion

National Security Agency Is Spying On All American Who Use The Internet and Telephone System and They Collect and Store All Your Communications — Includes Trump and Associates — No Warrant Required If President Obama Designates You A Target — Congress Is Enabling The Turnkey Two Party Tyranny — Warrentless Searches — Congress Does Nothing To Stop It! — Videos

Posted on March 17, 2017. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Data, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, European History, External Hard Drives, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Friends, government spending, Heroes, history, Illegal, Immigration, Internal Revenue Service (IRS), IRS, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Sociology, Space, Spying, Strategy, Supreme Court, Systems, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for NSA utah data center

Image result for NSA utah data centerImage result for NSA utah data centerImage result for National security agencyImage result for National security agency

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Published on Jul 8, 2013

The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

If you think you can handle the truth, well here it is folks

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show] 

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

Polygraphin

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting[edit]

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]

Computing[edit]

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[168]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[171] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[175] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[176] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[177] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[175]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[174]

Following the signing in 1946–1956[178] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[179] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[180] New Zealand.[181]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[192]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[193] Today it is a legacy system, and several NSA stations are closing.[175]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[194] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[195]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[206]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[219]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[224] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[225] based on documentation provided by former AT&T technician Mark Klein.[226]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235] Rasmussen Reports found that 59% of Americans disapprove,[236] Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]

July 2015 – WikiLeaks: Espionage against German federal ministries[edit]

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]

Suspected responsibility for hacking operations by the Equation Group[edit]

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31

Software backdoors

Linux kerne

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[263]However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[264]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
Microsoft Windows
Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]

Role in scientific research and development[

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[278]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[279][280]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[281]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[280]
  • KY-57 VINSON tactical radio voice encryptor[281]
  • KG-84 Dedicated Data Encryption/Decryption[281]
  • STU-III secure telephone unit,[281] phased out by the STE[282]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]

Legality

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs

In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

https://en.wikipedia.org/wiki/National_Security_Agency

Read Full Post | Make a Comment ( None so far )

Patrick J. Buchhanan — The Great Betrayal: How American Sovereignty and Social Justice Are Being Sacrificed to the Gods of The Global Economy — Videos

Posted on February 21, 2017. Filed under: American History, Blogroll, Books, Catholic Church, Communications, Culture, Employment, Family, Federal Government, Foreign Policy, government, government spending, history, media, Non-Fiction, Patrick J. Buchanan, People, Philosophy, Photos, Politics, Psychology, Rants, Raves, Raymond Thomas Pronk, Religion, Trade, Trade Policiy, Unemployment, War, Wealth, Weapons, Welfare, Wisdom, Writing | Tags: , , , , |

Image result for pat buchanan the betrayal

Image result for pat buchanan the betrayal

Before Trump, there was Pat Buchanan

Pat Buchanan: The establishment is in a panic over Trump

Pat Buchanan on Whites in America (2010 / 2013 / 2016)

Pat Buchanan in 1992: “Make America first again”

Pat Buchanan “Cultural War” speech

BookTV: In Depth: Pat Buchanan

BookTV: After Words: Patrick Buchanan, “Suicide of a Superpower: Will America Survive to 2025?”

Pat Buchanan Talks “The Greatest Comeback”

Pat Buchanan “The Greatest Comeback”

Suicide of a Superpower: Pat Buchanan on the Death of Western Civilization

Published on Apr 25, 2012

Peter Robinson sits with author, journalist and former presidential candidate, Patrick J Buchanan. From declining birth rates, to shifting values, to the decline of Christianity, Buchanan thinks Western civilization is falling apart. Buchanan is worried that the American melting pot has stopped assimilating immigrants the way it once did. Is America dying? Are you a racist if you think America is breaking apart? Find out.

Pat Buchanan: Biography, Apartheid, Culture War, Foreign Policy, Free Trade, Interview (1988)

Read Full Post | Make a Comment ( None so far )

Chris Heffelfinger — Radical Islam in America: Salafism’s Journey from Arabia to the West — Videos

Posted on February 7, 2017. Filed under: American History, Blogroll, Books, Catholic Church, Communications, Computers, Congress, Constitution, Corruption, Crime, Documentary, Employment, Federal Bureau of Investigation (FBI), Foreign Policy, Freedom, government spending, history, Illegal, Immigration, Islam, Islam, Language, Law, Legal, liberty, Life, Middle East, National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Rants, Raves, Religion, Religious, Shite, Speech, Sunni, Talk Radio, Taxation, Taxes, Video, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , |

Image result for book cover radical islam in america

The True Origins of Isis Ideology (Wahhabism/Salafism)

The birth of Wahhabism and the house of Saud

What is a Wahhabi and What is Wahhabism?

Wahhabism Explained

Wahhabism: The School of Ibn Taymiyyah – The Root of Terrorism?

Who Are The Salafis and Wahhabies Yusuf Estes Islam

100% Video Proof of Radical Muslim Terrorist Training Camps in America – Bill O’Reilly

Seymour Hersh’s Latest Bombshell: U.S. Military Undermined Obama on Syria with Tacit Help to Assad

Published on Dec 22, 2015

A new report by the Pulitzer-winning veteran journalist Seymour Hersh says the Joints Chiefs of Staff has indirectly supported Bashar al-Assad in an effort to help him defeat jihadist groups. Hersh reports the Joint Chiefs sent intelligence via Russia, Germany and Israel on the understanding it would be transmitted to help Assad push back Jabhat al-Nusra and the Islamic State. Hersh also claims the military even undermined a U.S. effort to arm Syrian rebels in a bid to prove it was serious about helping Assad fight their common enemies. Hersh says the Joints Chiefs’ maneuvering was rooted in several concerns, including the U.S. arming of unvetted Syrian rebels with jihadist ties, a belief the administration was overly focused on confronting Assad’s ally in Moscow, and anger the White House was unwilling to challenge Turkey and Saudi Arabia over their support of extremist groups in Syria. Hersh joins us to detail his claims and respond to his critics.

British Empire Created Radical Islam

Published on Mar 29, 2016

The Salafist and jihadist ideology behind terror attacks in Brussels, Paris and San Bernardino is a product of Wahhabism, an offshoot of Sunni Islam and the official religion of Saudi Arabia.

Prior to the 9/11 attacks Wahhabism had at best a marginal footprint in the United States. “80 percent of the 1,200 mosques operating in the US were constructed after 2001, more often than not with Saudi financing,” notes World Affairs. “As a result, Wahhabi influence over Islamic institutions in the US was considerable by 2003, according to testimony before the US Senate. Hundreds of publications, published by the Saudi government and its affiliates, and filled with intolerance toward Christians, Jews, and other Americans, had been disseminated across the country by 2006.”

The Saudis have spent billions to propagate the intolerant and hateful ideology of Wahhabism. “Between 1975 and 1987, the Saudis admit to having spent $48 billion or $4 billion per year on ‘overseas development aid,’ a figure which by the end of 2002 grew to over $70 billion (281 billion Saudi rials). These sums are reported to be Saudi state aid and almost certainly do not include private donations which are also distributed by state-controlled charities. Such staggering amounts contrast starkly with the $5 million in terrorist accounts the Saudis claim to have frozen since 9/11,” writes Alex Alexiev.

The US government has encouraged the spread of radical Wahhabism by coddling the Saudi Arabian government and insisting America shares a “special relationship” with the kingdom. The blind eye turned toward Saudi Arabia and its deplorable record in human rights was demonstrated when it was elected to the UN Human Rights Council (in fairness, the vote is primarily the fault of the UK—the British government also shares a “special relationship” with the medieval kings of Saudi Arabia and has allowed the virus of Wahhabism to spread in Britain, hence the term “Londonistan”).
http://www.infowars.com/ted-cruz-igno…

How Did Radical Islam Get Spread Throughout the World?

The Third Jihad – Radical Islam’s Vision for America – (A Clarion Project Film)

Muslims Establishing No-Go Zones in America • 1/14/15 •

Police protected USA Islam Sharia Law Cities Christians arrested End Times News Update

Who Are The Salafis and Wahhabies Yusuf Estes Islam

Radical Islam: The Most Dangerous Ideology

Why Do People Become Islamic Extremists?

Ben Shapiro: The Myth of the Tiny Radical Muslim Minority

David Horowitz – Unholy Alliance: Radical Islam and the American Left

Robert Spencer: The Theological Aspects of Islam That Lead to Jihad

My Jihad blah, blah, blah. what`s yours?

The Leftist / Islamic Alliance

David Horowitz – Progressive Racism

Sharia Law in TEXAS | State votes to secure American Law

Shariah Law? Not in Texas, says Irving Mayor

‘Hannity’ Investigation: Do Muslims Believe Sharia Law Supersedes the U.S. Constitution?

Read Full Post | Make a Comment ( None so far )

Robert Baer –Sleeping with the Devil: How Washington Sold Our Soul for Saudi Crude — Videos

Posted on January 10, 2017. Filed under: American History, Blogroll, Books, Business, Central Intelligence Agency (CIA), Communications, Corruption, history, Islam, Law, liberty, Life, Links, Love, media, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Politics, Rants, Raves, Raymond Thomas Pronk, Religion, Resources, Security, Shite, Spying, Strategy, Sunni, Talk Radio, Television, Terrorism, Video, War, Wealth, Weapons, Welfare, Wisdom, Work | Tags: , , , , , , , , , , |

Image result for Robert Baer sleeping with the devil

Image result for Robert Baer sleeping with the devil

Conversations With History – Robert Baer

28 Pages, “silly media”, ex-CIA Baer

Bob Baer: A fascinating and candid look into the life of a former CIA Agent.

Politics Book Review: Sleeping with the Devil: How Washington Sold Our Soul for Saudi Crude by Ro…

Read Full Post | Make a Comment ( None so far )

Charlotte Iserbyt –Deliberate Dumming Down of Education — Little Learning for Lifetime Labor — Common Core and Agenda 21 — Videos

Posted on November 12, 2016. Filed under: American History, Blogroll, Books, College, Congress, Constitution, Corruption, Crime, Documentary, Economics, Education, Elections, Employment, Faith, Family, Federal Government, Fiscal Policy, Fraud, Freedom, Friends, government, government spending, history, Illegal, Immigration, Legal, liberty, Life, Links, Literacy, media, Money, Newspapers, Non-Fiction, People, Philosophy, Photos, Police, Political Correctness, Politics, Radio, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Strategy, Talk Radio, Tax Policy, Taxation, Taxes, Technology, Television, Unemployment, Vacations, Video, War, Welfare, Wisdom, Work, Writing | Tags: , , , , , |

Image result for cartoons UN agenda 21

Image result for UN agenda 21

Image result for UN agenda 21and education

Image result for UN agenda 21

Image result for UN agenda 21and educationImage result for cartoons agenda 21

Image result for cartoons UN agenda 21

Image result for cartoons UN agenda 21Image result for UN agenda 21

Image result for cartoons UN agenda 21

The Deliberate Dumbing Down of America

The Reason Education Sucks

Agenda 21, The Plan To Kill You – David Icke

Alex Jones interviews David Icke – 2016 (UNCENCORED)

David Icke “Trump V Clinton Is Just A Circus Designed To Hide The Reality Of The System!”

Glenn Beck : Agenda 21 is not a fiction, it’s implemented right now in US and all over the World !

The Deliberate Dumbing Down of America and Common Core

The Deliberate Dumbing Down of America

Story-Killers: How the Common Core Destroys Minds and Souls by Terrence O. Moore

The Glenn Beck Program: Common Core and Education

Common Core: UN Agenda 21, Communitarianism & The Public Education Plan to Destroy America

Charlotte Iserbyt – Deliberate Dumbing Down of the World

Charlotte Iserbyt – Charter School Trojan Horse

Charlotte Iserbyt – The Secret History of Western Education (Full Documentary)

Dumbing Down University

Life in America Under Agenda 21 with whistleblower Charlotte Iserbyt [Full]

The History of Dumbed-Down Education in America – from Mann to Dewey to Obama and Beyond

The Great Dumbing Down of Humanity and the Depopulation Agenda…

Obama puts Agenda 21 into Action

NWO in schools – Destruction of the family -Agenda 21 (OBE/Caps/Common Core education)

NEW WORLD ORDER Top 8 Conspiracies (NWO 2016) TopTruths

10 Conspiracy Theories You Probably Believe

10 Conspiracy Theories That Turned Out To Be True

Read Full Post | Make a Comment ( None so far )

Mark Helprin — Memoirs From The Antproof Case — Winter’s Tale — Videos

Posted on July 28, 2016. Filed under: American History, Articles, Blogroll, Book, Books, Culture, Entertainment, Fiction, Heroes, history, Law, liberty, Life, Links, Literacy, Literature, media, Money, Movies, Music, People, Philosophy, Photos, Police, Politics, Press, Psychology, Rants, Raves, Raymond Thomas Pronk, Religion, Reviews, Spying, Strategy, Technology, Terrorism, Video, Water, Wealth | Tags: , , , , , , , |

quote winter talememoirs from antproof casewinters tale 2winters talemark-helprin-1-sizedmark-helprin-author-photo-credit-lisa-kennedymark-helprin

This is a photo of Mark Helprin, a novelist, children's book author and editorial writer for the Wall Street Journal. Handout photo. ..OUTSIDE TRIBUNE CO.- NO MAGS, NO SALES, NO INTERNET, NO TV, CHICAGO OUT, NO DIGITAL MANIPULATION...

quote-the-human-race-is-intoxicated-with-narrow-victories-for-life-is-a-string-of-them-like-pearls-that-mark-helprin-82765

The Human Parade: Mark Helprin

Mark Helprin – Five Questions About Iran

Mark Helprin: In Sunlight and In Shadow

Mark Helprin: 2013 National Book Festival

Mark Helprin – A Soldier of the Great War – Part 1

Mark Helprin – A Soldier of the Great War – Part 2

159th Hillsdale College Commencement – Mark Helprin

Read Full Post | Make a Comment ( None so far )

First The CIA Director Now The State Department Contradict Obama’s Islamic State, Syria and Iraq Policies — The Hillary Clinton Support Network Of Lying Lunatic Leftists Throws Obama Under The Bus — Work Place Violence — Hate Crime — Terrorist Act — Radical Islam — Radical Islamic Terrorist — Radical Islamic Terrorist Jihadists — Face Reality and Stopping Lying Obama — Radical Islamists Are A Majority of The World’s 1,600+ Million Muslims And Want Sharia Law — Ban All Radical Islamists From United States Permanently — Videos

Posted on July 2, 2016. Filed under: American History, Ammunition, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), College, Communications, Computers, Congress, Constitution, Corruption, Crime, Crisis, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Diasters, Documentary, Drones, Drug Cartels, Economics, Education, Elections, Employment, European History, External Hard Drives, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, Friends, government, history, Homicide, Illegal, Immigration, Islam, Islam, Language, Law, Legal, liberty, Life, Links, media, Middle East, Missiles, National Security Agency (NSA), National Security Agency (NSA_, Newspapers, Nuclear Proliferation, People, Philosophy, Photos, Pistols, Police, Political Correctness, Politics, Presidential Candidates, Press, Radio, Radio, Raves, Raymond Thomas Pronk, Regulations, Religion, Religious, Religious, Resources, Rifles, Security, Shite, Speech, Spying, Strategy, Sunni, Talk Radio, Television, Trade, Unemployment, Union, Unions, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 701: June 17, 2016

Pronk Pops Show 700: June 16, 2016

Pronk Pops Show 699: June 15, 2016

Pronk Pops Show 698: June 14, 2016

Pronk Pops Show 697: June 13, 2016

Pronk Pops Show 696: June 10, 2016

Pronk Pops Show 695: June 9, 2016

Pronk Pops Show 694: June 8, 2016

Pronk Pops Show 693: June 6, 2016

Pronk Pops Show 692: June 3, 2016

Pronk Pops Show 691: June 2, 2016

Pronk Pops Show 690: June 1, 2016

Pronk Pops Show 689: May 31, 2016

Pronk Pops Show 688: May 27, 2016

Pronk Pops Show 687: May 26, 2016

Pronk Pops Show 686: May 25, 2016

Pronk Pops Show 685: May 24, 2016

Pronk Pops Show 684: May 23, 2016

Pronk Pops Show 683: May 20, 2016

Pronk Pops Show 682: May 19, 2016

Pronk Pops Show 681: May 17, 2016

Pronk Pops Show 680: May 16, 2016

Pronk Pops Show 679: May 13, 2016

Pronk Pops Show 678: May 12, 2016

Pronk Pops Show 677: May 11, 2016

Pronk Pops Show 676: May 10, 2016

Pronk Pops Show 675: May 9, 2016

Pronk Pops Show 674: May 6, 2016

Pronk Pops Show 673: May 5, 2016

Pronk Pops Show 672: May 4, 2016

Pronk Pops Show 671: May 3, 2016

Pronk Pops Show 670: May 2, 2016

Pronk Pops Show 669: April 29, 2016

Pronk Pops Show 668: April 28, 2016

Pronk Pops Show 667: April 27, 2016

Pronk Pops Show 666: April 26, 2016

Pronk Pops Show 665: April 25, 2016

Pronk Pops Show 664: April 24, 2016

Pronk Pops Show 663: April 21, 2016

Pronk Pops Show 662: April 20, 2016

Pronk Pops Show 661: April 19, 2016

Pronk Pops Show 660: April 18, 2016

Pronk Pops Show 659: April 15, 2016

Pronk Pops Show 658: April 14, 2016

Pronk Pops Show 657: April 13, 2016

Pronk Pops Show 656: April 12, 2016

Pronk Pops Show 655: April 11, 2016

Pronk Pops Show 654: April 8, 2016

Pronk Pops Show 653: April 7, 2016

Pronk Pops Show 652: April 6, 2016

Pronk Pops Show 651: April 4, 2016

Pronk Pops Show 650: April 1, 2016

Pronk Pops Show 649: March 31, 2016

Pronk Pops Show 648: March 30, 2016

Pronk Pops Show 647: March 29, 2016

Pronk Pops Show 646: March 28, 2016

Pronk Pops Show 645: March 24, 2016

Pronk Pops Show 644: March 23, 2016

Pronk Pops Show 643: March 22, 2016

Pronk Pops Show 642: March 21, 2016

Pronk Pops Show 641: March 11, 2016

Pronk Pops Show 640: March 10, 2016

Pronk Pops Show 639: March 9, 2016

Pronk Pops Show 638: March 8, 2016

Pronk Pops Show 637: March 7, 2016

Pronk Pops Show 636: March 4, 2016

Pronk Pops Show 635: March 3, 2016

Pronk Pops Show 634: March 2, 2016

Pronk Pops Show 633: March 1, 2016

Story 1: First The CIA Director Now The State Department Contradict Obama’s Islamic State, Syria and Iraq Policies — The Hillary Clinton Support Network Of Lying Lunatic Leftists Throws Obama Under The Bus — Work Place Violence — Hate Crime — Terrorist Act — Radical Islam — Radical Islamic Terrorist — Radical Islamic Terrorist Jihadists — Face Reality and Stopping Lying Obama — Radical Islamists Are A Majority of The World’s 1,600+ Million Muslims And Want Sharia Law — Ban All Radical Islamists From United States Permanently — Videos

Radical Islam: The Most Dangerous Ideology

What ISIS Wants

The rise of ISIS, explained in 6 minutes

The Basics of Islam 8: Robert Spencer on The Meaning of the Word “Jihad”

Robert Spencer Moment: Trump Was Right.

Robert Spencer on Hannity on the Orlando jihad massacre

The Basics of Islam 1: Robert Spencer on “Islamophobia”

What Does Jihad Really Mean? | For the Record

CIA Director Grave Warning: ISLAMIC STATE Dangerous As Ever

Gorka: CIA director no longer spreading Obama’s narrative

CIA CHIEF CONTRADICTS PRESIDENT OBAMA ON ISIS

Robert Spencer speaks on the Syrian refugee crisis and the Islamic idea of hijrah

State Department diplomats slam Obama’s Syria policy

Diplomats slam Obama’s Syria policy

Dozens of State Department officials just revolted against Obama’s Syria policy

How will Trump react to the diplomats’ memo on Syrian war?

Syria’s war: Who is fighting and why

The war in Syria explained in five minutes | Guardian Animations

State Department dissent memo critical of Obama policy on Syria and Assad

State Department Demands Policy Shift In Syria | MSNBC

DHS Whistleblower Phil Haney exposes Obama administration during Press Conference

DHS Whistleblower Exposes Government’s Submission To Jihad (FULL Press Conference)

Government Insider BLOWS WHISTLE on Obama’s ‘Countering Violent Extremism’ Policy

State Dept Under Fire For Including Syria In Top Foreign Policy Moments – America’s Newsroom

Ben Shapiro: The Myth of the Tiny Radical Muslim Minority

Obama gives speech in Orlando

Obama goes on tirade against Trump over ‘dangerous’ Muslim ban, ‘radical Islam’

Obama on ‘Radical Islam’

Speech by President Barack Obama After Counter-ISIL Meeting

President Obama On Orlando Shooting

Top Ex-CIA Agent Has ‘Chilling Warning’ About Obama’s Plans for Islamic State!

CIA Director on Islamic State

CIA Director John Brennan on ISIS and Global Threats at CSIS

CIA Chief Warns Islamic State Isn’t Finished Yet

CIA’S Brennan: Islamic State’s Momentum Blunted in Syria, Iraq

Shariamerica: Islam, Obama, and the Establishment Clause

Full Event: Donald Trump Rally in Dallas, TX (6-16-16)

 

An ’embarrassing’ break: Dozens of State Department officials just revolted against Obama’s Syria policy

 

At least 51 “mid-to-high-level State Department officials” have signed a dissent channel cable breaking with President Barack Obama’s policy on Syria and calling for US airstrikes on the regime of Syrian President Bashar Assad.

The cable was provided to several news outlets on Thursday, including The New York Timesand The Wall Street Journal.

“Failure to stem Assad’s flagrant abuses will only bolster the ideological appeal of groups such as Daesh, even as they endure tactical setbacks on the battlefield,” the cable reads, according to The Journal.

Daesh is an alternate name for ISIS, aka the Islamic State or ISIL.

“We are aware of a dissent channel cable written by a group of State Department employees regarding the situation in Syria,” State Department spokesman John Kirby told The Wall Street Journal.

“We are reviewing the cable now, which came up very recently, and I am not going to comment on the contents,” he said.

The officials who signed the document “range from a Syria desk officer in the Bureau of Near Eastern Affairs to a former deputy to the American ambassador in Damascus,” and have all been involved in formulating or carrying out the administration’s Syria policy.

That policy has largely emphasized defeating the Islamic State over bolstering Syria’s anti-Assad rebel groups.

According to the American Foreign Service Association, the dissent channel is “a serious policy channel reserved only for consideration of responsible dissenting and alternative views on substantive foreign policy issues that cannot be communicated in a full and timely manner through regular operating channels and procedures.”

It is available to all “regular or re-employed annuitant employees” of the State Department and the US Agency for International Development.

The number of officials – at least 50 – who have signed the internal document calling for military action against Assad is unusual, a former State Department official who worked on Middle East policy told The Journal.

“It’s embarrassing for the administration to have so many rank-and-file members break on Syria,” they said.

Fighters of the Syria Democratic Forces (SDF) sit in a look out position in the western rural area of Manbij, in Aleppo Governorate, Syria, June 13, 2016. REUTERS/Rodi SaidFighters of the Syrian Democratic Forces sit in a lookout position in the western rural area of Manbij. Thomson Reuters

The cable calls for the Obama administration to place more emphasis on defeating Assad – whose brutality is seen by many experts as the driver of Syria’s jihadist problem – by arming and regaining the trust of Syria’s moderate opposition.

That, in turn, will “turn the tide of the conflict against the regime [to] increase the chances for peace by sending a clear signal to the regime and its backers that there will be no military solution to the conflict,” the cable reportedly says.

The CIA-backed factions of the Free Syrian Army – the majority of which are Arab and battling forces loyal to Assad – have at times clashed with Pentagon-trained fighters associated with the Syrian Democratic Forces, who are predominantly Kurdish and focused on defeating the Islamic State.

Their divergent military objectives and ethnicities have bred mistrust and fighting that is ultimately counterproductive to the cause of the revolution.

Several high-ranking government officials, moreover – including Robert S. Ford, a former ambassador to Syria, and Obama’s former defense secretary, Chuck Hagel – have left their positions over Obama’s failure to act decisively against Assad, whose brutality continues to fuel a bloody revolution that has left over 400,000 people dead and millions displaced.

“Many people working on Syria for the State Department have long urged a tougher policy with the Assad government as a means of facilitating arrival at a negotiated political deal to set up a new Syrian government,” Ford told The New York Times on Thursday.

Free Syrian Army IdlibProtesters carry Free Syrian Army flags and chant slogans during an antigovernment protest in the town of Marat Numan in Idlib Province, Syria, on March 4. REUTERS/Khalil Ashawi

“The moral rationale for taking steps to end the deaths and suffering in Syria, after five years of brutal war, is evident and unquestionable,” the cable said. ” The status quo in Syria will continue to present increasingly dire, if not disastrous, humanitarian, diplomatic and terrorism-related challenges.”

Assad crossed Obama’s now infamous “red line” for airstrikes in 2013, when he used chemical weapons to kill more than 1,000 people in the eastern Damascus suburb of Ghouta. Obama backed away from that red line when Assad agreed to a Russia-brokered deal to destroy his chemical-weapons stockpile.

Some experts say, however, that the entire stockpile has not been destroyed as promised.

The administration insists that it has maintained throughout the nearly five-year civil war that Assad “must go.” But that stance has been muddled as the administration continues to soften its position on Assad’s future.

“The US’ Syria policy has always been in the head of one man, and one man only: Barack Obama. No one else has ever really had a say in what happens in Syria,” Tony Badran, a Middle East expert and researcher at the Foundation for Defense of Democracies, told Business Insiderin a previous interview.

“Obama has owned it since day one – and from day one, he never intended to remove Assad,” he said.

The cable addresses Russia’s bombing campaign in Syria as well, asserting that Moscow and Assad have not taken past ceasefires and “consequential negotiations” seriously.

Russia entered the war in late September 2015 on behalf of Assad under the guise of fighting ISIS. Russian warplanes have primarily targeted non-jihadist, anti-Assad rebel groups, however, many of which are backed by the US, Turkey, and Saudi Arabia.

Government warplanes bombarded the besieged Syrian town of Darayya with barrel bombs last weekend, shortly after food aid was delivered to the town for the first time in nearly four years.

http://www.businessinsider.com/state-department-officials-call-for-airstrikes-on-assad-2016-6

Chart: Obama Admin. On Pace to Issue One Million Green Cards to Migrants from Majority-Muslim Countries

The Obama Administration is on pace to issue more than a million green cards to migrants from majority-Muslim countries, according to an analysis of Department of Homeland Security data.

A chart released by the Senate Subcommittee on Immigration and the National Interest Friday details the surge in immigration to the U.S. from majority-Muslim countries since President Barack Obama took office in 2009.

Specifically, in the first six fiscal years of Obama’s presidency (FY2009 – FY2014), his administration issued 832,014 green cards to migrants majority-Muslim countries, the most of which were issued to migrants from Pakistan (102,000), Iraq (102,000), Bangladesh (90,000), Iran (85,000), Egypt (56,000), and Somalia (37,000).

The total 832,014 new permanent residents do not include migrants on temporary, nonimmigrant visas — which allow foreign nationals to come to the U.S. temporarily for work, study, tourism and the like. As the subcommittee notes, the number also does not include those migrants who overstayed the terms of their visas.

Obama Admin On Track To Issue 1M GCs (1)

Regardless, as the subcommittee explained in its analysis, the U.S. is playing host to immigrants from majority Muslim countries at an increasing pace.

Between FY 2013 and FY 2014, the number of green cards issued to migrants from Muslim-majority countries increased dramatically – from 117,423 in FY 2013, to 148,810 in FY 2014, a nearly 27 percent increase. Throughout the Obama Administration’s tenure, the United States has issued green cards to an average of 138,669 migrants from Muslim-majority countries per year, meaning that it is nearly certain the United States will have issued green cards to at least 1.1 million migrants from Muslim-majority countries on the President’s watch. It has also been reported that migration from Muslim-majority countries represents the fastest growing class of migrants.

Green cards, or Lawful Permanent Residency, puts immigrants on the path to citizenship and allows for lifetime residency, federal benefits, and work authorization. Included in the totals are refugees, who are required to apply for a green card after one year of residency in the U.S. Unlike other types of immigrants, refugees are immediately eligible for welfare benefits including Temporary Assistance to Needy Families (TANF), food stamps, and Medicaid.

A report from the Office of Refugee Resettlement (ORR) indicated that in FY 2013, 91.4 percent of Middle Eastern refugees (accepted to the U.S. between 2008-2013) received food stamps, 73.1 percent were on Medicaid or Refugee Medical Assistance and 68.3 percent were on cash welfare.

Green Card Totals, FY09-FY14:

Pakistan (102K), Iraq (102K), Bangladesh (90K), Iran (85K), Egypt (56K), Somalia (37K), Uzbekistan (30K), Turkey (26K), Morocco (25K), Jordan (25K), Albania (24K), Afghanistan (21K), Lebanon (20K), Yemen (20K), Syria (18K), Indonesia (17K), Sudan (15K), Sierra Leone (12K), Guinea (9K), Senegal (8K), Saudi Arabia (9K), Algeria (8K), Kazakhstan (8K), Kuwait (6K), Gambia (6K), United Arab Emirates (5K), Azerbaijan (4K), Mali (4K), Burkina Faso (3K), Kyrgyzstan (3K), Kosovo (3K), Mauritania (3K), Tunisia (2K), Tajikistan (2K), Libya (2K), Turkmenistan (1K), Qatar (1K), Chad (1K)

http://www.breitbart.com/big-government/2016/06/17/obama-admin-pace-issue-one-million-green-cards-migrants-majority-muslim-countries/

51% of U.S. Muslims want Sharia; 60% of young Muslims more loyal to Islam than to U.S.

Really, what did you expect? A considerable portion of U.S. domestic and foreign policy is based on the assumption that Islam in the U.S. will be different: that Muslims here believe differently from those elsewhere, and do not accept the doctrines of violence against and subjugation of unbelievers that have characterized Islam throughout its history. But on what is that assumption based? Nothing but wishful thinking. And future generations of non-Muslims will pay the price.

Muslims_Pray_Capitol

“Meanwhile, An Islamic Fifth Column Builds Inside America,” by Paul Sperry, IBD, October 1, 2015 (thanks to Pamela Geller)

In berating GOP presidential hopeful Ben Carson for suggesting a loyalty test for Muslims seeking high office, CNN host Jake Tapper maintained that he doesn’t know a single observant Muslim-American who wants to Islamize America.

“I just don’t know any Muslim-Americans — and I know plenty — who feel that way, even if they are observant Muslims,” he scowled.

Tapper doesn’t get out much. If he did, chances are he’d run into some of the 51% of Muslims living in the U.S. who just this June told Polling Co. they preferred having “the choice of being governed according to Shariah,” or Islamic law. Or the 60% of Muslim-Americans under 30 who told Pew Research they’re more loyal to Islam than America.

Maybe they’re all heretics, so let’s see what the enlightened Muslims think.

If Tapper did a little independent research he’d quickly find that America’s most respected Islamic leaders and scholars also want theocracy, not democracy, and even advocate trading the Constitution for the Quran.

These aren’t fringe players. These are the top officials representing the Muslim establishment in America today.

Hopefully none of them ever runs for president, because here’s what he’d have to say about the U.S. system of government:

• Muzammil Siddiqi, chairman of both the Fiqh Council of North America, which dispenses Islamic rulings, and the North American Islamic Trust, which owns most of the mosques in the U.S.: “As Muslims, we should participate in the system to safeguard our interests and try to bring gradual change, (but) we must not forget that Allah’s rules have to be established in all lands, and all our efforts should lead to that direction.”

• Omar Ahmad, co-founder of the Council on American-Islamic Relations, the top Muslim lobby group in Washington: “Islam isn’t in America to be equal to any other faith, but to become dominant. The Quran should be the highest authority in America, and Islam the only accepted religion on Earth.”

• CAIR spokesman Ibrahim Hooper: “I wouldn’t want to create the impression that I wouldn’t like the government of the United States to be Islamic sometime in the future.”

• Imam Siraj Wahhaj, director of the Muslim Alliance in North America: “In time, this so-called democracy will crumble, and there will be nothing. And the only thing that will remain will be Islam.”

• Imam Zaid Shakir, co-founder of Zaytuna College in Berkeley, Calif.: “If we put a nationwide infrastructure in place and marshaled our resources, we’d take over this country in a very short time. . . . What a great victory it will be for Islam to have this country in the fold and ranks of the Muslims.”…

https://www.jihadwatch.org/2015/10/51-of-u-s-muslims-want-sharia-60-of-young-muslims-more-loyal-to-islam-than-to-u-s

John O. Brennan

From Wikipedia, the free encyclopedia
John O. Brennan
John Brennan CIA official portrait.jpg
Director of the Central Intelligence Agency
Assumed office
March 8, 2013
President Barack Obama
Deputy David Cohen
Preceded by Michael Morell(Acting)
5th United States Homeland Security Advisor
In office
January 20, 2009 – March 8, 2013
President Barack Obama
Preceded by Ken Wainstein
Succeeded by Lisa Monaco
Director of the National Counterterrorism Center
Acting
In office
August 27, 2004 – August 1, 2005
President George W. Bush
Preceded by Position established
Succeeded by John Redd
Personal details
Born John Owen Brennan
September 22, 1955 (age 60)
Jersey City, New Jersey, U.S.
Spouse(s) Kathy Pokluda
Alma mater Fordham University
University of Texas, Austin

John Owen Brennan (born September 22, 1955)[1][2] is an American government official who is the Director of the Central Intelligence Agency. He has served as chief counterterrorism advisor to U.S. President Barack Obama; his title was Deputy National Security Advisor for Homeland Security and Counterterrorism, and Assistant to the President.[1][3][4] His responsibilities included overseeing plans to protect the country from terrorism and respond to natural disasters, and he met with the President daily.[5][6]Previously, he advised President Obama on foreign policy and intelligence issues during the 2008 presidential campaign and transition.[7] Brennan withdrew his name from consideration for Director of the Central Intelligence Agency (CIA) in the first Obama administration over concerns about his support for transferring terror suspects to countries where they may be tortured while serving under President George W. Bush.[3][5] Instead, Brennan was appointed Deputy National Security Advisor, a position which did not require Senate confirmation.[3][5][8]

Brennan’s 25 years with the CIA included work as a Near East and South Asia analyst, as station chief in Saudi Arabia, and as director of the National Counterterrorism Center.[3][5][9]After leaving government service in 2005, Brennan became CEO of The Analysis Corporation, a security consulting business, and served as chairman of the Intelligence and National Security Alliance, an association of intelligence professionals.[10]

President Barack Obama nominated Brennan as his next director of the CIA on January 7, 2013.[11][12][13] The ACLU called for the Senate not to proceed with the appointment until it confirms that “all of his conduct was within the law” at the CIA and White House.[14] John Brennan was approved by the Senate Intelligence Committee on March 5, 2013 to succeedDavid Petraeus as the Director of the CIA by a vote of 12 to 3.[15]

His term as CIA Director coincided with revelations that the U.S. government conducted massive levels of global surveillance, that the CIA had hacked into the computers of U.S. Senate employees, and the release of the U.S. Senate Intelligence Committee report on CIA torture.

Early life and education

Brennan, the son of Irish immigrants from Roscommon, was raised in North Bergen, New Jersey.[9] He attended the Immaculate Heart of Mary Elementary School, and graduated from Saint Joseph of the Palisades High School in West New York, New Jersey before enrolling at Fordham University in New York City.[5]

While riding a bus to class at Fordham, he saw an ad in The New York Times that said the CIA was recruiting, and he felt a CIA career would be a good match for his “wanderlust” and his desire to do public service.[5] He received a B.A. in political science from Fordham in 1977.[3] His studies included a junior year abroad learning Arabic and taking Middle Eastern studies courses at the American University in Cairo.[3][5] He also received a Master of Arts in government with a concentration in Middle Eastern studies from the University of Texas at Austin in 1980.[5] He speaks Arabic fluently.[9]

Brennan is married to Kathy Pokluda Brennan, with whom he has had one son and two daughters.[2][3][16]

Career highlights

Brennan with Kathleen Sebeliusand Rahm Emanuel, White House, April 2009

Brennan began his CIA career as an analyst, presumably in the Washington D.C. area, and spent 25 years with the agency.[1][5][17] At one point in his career, he was a daily intelligence briefer for President Bill Clinton.[5] In 1996 he was CIA station chief in Riyadh, Saudi Arabia when the Khobar Towers bombing killed 19 U.S. servicemen.[5] In 1999 he was appointed chief of staff to George Tenet, then-Director of the CIA.[3][5] Brennan became deputy executive director of the CIA in March 2001.[3] He was director of the newly created Terrorist Threat Integration Center from 2003 to 2004, an office that sifted through and compiled information for President Bush’s daily top secret intelligence briefings and employed the services of analysts from a dozen U.S. agencies and entities.[18] One of the controversies in his career involves the distribution of intelligence to the Bush White House that helped lead to an “Orange Terror Alert“, over Christmas 2003. The intelligence, which purported to list terror targets, was highly controversial within the CIA and was later discredited. An Obama administration official does not dispute that Brennan distributed the intelligence during the Bush era but said Brennan passed it along because that was his job.[19] His last post within the Intelligence Community was as director of the National Counterterrorism Center in 2004 and 2005, which incorporated information on terrorist activities across U.S. agencies.[3][20]

Brennan then left government service for a few years, becoming Chairman of the Intelligence and National Security Alliance (INSA) and the CEO of The Analysis Corporation (TAC). He continued to lead TAC after its acquisition by Global Strategies Group in 2007 and its growth as the Global Intelligence Solutions division of Global’s North American technology business GTEC, before returning to government service with the Obama administration as Homeland Security Advisor on January 20, 2009.[10]

On January 7, 2013, Brennan was nominated by President Barack Obama to be director of the Central Intelligence Agency.[21]

Counterterrorism advisor to President Obama

In late 2008 Brennan was the reported choice for Director of the CIA in the incoming Obama administration. Brennan withdrew his name from consideration because of opposition to his CIA service under President George W. Bush and past public statements he had made in support of enhanced interrogation and the transfer of terrorism suspects to countries where they might be tortured (extraordinary rendition).[3][5][22] President Obama then appointed him to be his chief counterterrorism advisor, a position that did not require Senate confirmation.[3][5][8]

Brennan and President Barack Obama at a meeting of the Homeland Security Council, May 2009

In August 2009, Brennan criticized some Bush-administration anti-terror policies, saying that waterboarding had threatened national security by increasing the recruitment of terrorists and decreasing the willingness of other nations to cooperate with the U.S.[23] He also described the Obama administration’s focus as being on “extremists” and not “jihadists“. He said that using the second term, which means one who is struggling for a holy goal, gives “these murderers the religious legitimacy they desperately seek” and suggests the US is at war with the religion of Islam.[23]

In an early December 2009 interview with the Bergen Record Brennan remarked, “the U.S. intelligence and law enforcement communities have to bat 1.000 every day. The terrorists are trying to be successful just once”.[5] At a press conferences days after the failed Christmas Day bomb attack on Northwest Airlines Flight 253 by Umar Farouk Abdulmutallab, Brennan said U.S. intelligence agencies did not miss any signs that could have prevented the attempt but later said he had let the President down by underestimating a small group of Yemeni terrorists and not connecting them to the attempted bomber.[1][24] Within two weeks after the incident, however, he produced a report highly critical of the performance of U.S. intelligence agencies, concluding that their focus on terrorist attempts aimed at U.S. soil was inadequate.[17] In February 2010, he claimed on Meet the Press that he was tired of Republican lawmakers using national security issues as political footballs, and making allegations where they did not know the facts.[25]

Drone program

In April 2012 Brennan was the first Obama administration official to publicly acknowledge CIA drone strikes in Pakistan, Yemen, Somalia, Libya, Afghanistan, and elsewhere. In his speech he argued for the legality, morality, and effectiveness of the program.[26][27][28] The ACLU and other organizations disagreed. In 2011/2012 he also helped reorganize the process, under the aegis of the Disposition Matrix database, by which people outside of war zones were put on the list of drone targets. According to an Associated Press story, the reorganization helped “concentrate power” over the process inside the White House administration.[29][30][31]

In June 2011, Brennan claimed that US counter-terrorism operations had not resulted in “a single collateral death” in the past year because of the “precision of the capabilities that we’ve been able to develop.”[32][33] Nine months later, Brennan claimed he had said “we had no information” about any civilian, noncombatant deaths during the timeframe in question.[33][34] The Bureau of Investigative Journalism disagreed with Brennan, citing their own research[35] that initially led them to believe that 45 to 56 civilians, including six children, had been killed by ten US drone strikes during the year-long period in question.[33] Additional research led the Bureau to raise their estimate to 76 deaths, including eight children and two women.[33] According to the Bureau, Brennan’s claims “do not appear to bear scrutiny.”[33]The Atlantic has been harsher in its criticism, saying that “Brennan has been willing to lie about those drone strikes to hide ugly realities.”[36]

According to the Bureau of Investigative Journalism, Brennan’s comments about collateral death are perhaps explained by a counting method that treats all military-aged males in a strike zone as combatants unless there is explicit information to prove them innocent.[33][37]

CIA Director (2013–present)

Nomination

Brennan being sworn in as CIA Director, March 8, 2013

United States PresidentBarack Obama twice nominated Brennan to serve as Director of the Central Intelligence Agency.[11][12]

Morris Davis, a former Chief Prosecutor for the Guantanamo Military Commissions compared Brennan to Canadian Omar Khadr, who was convicted of “committing murder in violation of the law of war”.[38] He suggested that Brennan’s role in targeting individuals for CIA missile strikes was no more authorized than the throwing of the grenade Khadr was accused of.

On February 27, 2013, the Senate Intelligence Committee postponed a vote, expected to be taken the next day on the confirmation of Brennan until the following week. On March 5, the Intelligence Committee approved the nomination 12–3. The Senate was set to vote on Brennan’s nomination on March 6, 2013. However, Kentucky Senator Rand Paul began a talking Senate filibuster of the vote, citing President Barack Obama and his administration’s use of combat drones, stating “No one politician should be allowed to judge the guilt, to charge an individual, to judge the guilt of an individual and to execute an individual. It goes against everything that we fundamentally believe in our country.”[39][40] Paul’s filibuster continued for 13 hours, after which Brennan was confirmed by a vote of 63–34.

Brennan was sworn into the office of CIA Director on March 8, 2013.[41]

See also

https://en.wikipedia.org/wiki/John_O._Brennan

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or DownloadShows 695-701

Listen To Pronk Pops Podcast or DownloadShows 685-694

Listen To Pronk Pops Podcast or DownloadShows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

 

Read Full Post | Make a Comment ( None so far )

Conor Cruise O’Brien — The Long Affair: Thomas Jefferson and the French Revolution, 1785–1800– Videos

Posted on May 31, 2016. Filed under: American History, Books, British History, Business, Catholic Church, College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Culture, Documentary, Education, European History, Faith, Family, Farming, Federal Government, Foreign Policy, Freedom, High School, history, Language, Law, liberty, Life, media, Non-Fiction, People, Philosophy, Photos, Political Correctness, Politics, Rants, Raves, Raymond Thomas Pronk, Religion, Terrorism, Trade, War, Welfare, Wisdom | Tags: , , |

 

 

Conor Cruise O'Brien.jpg

Thomas Jefferson and the French Revolution, 1785-1800: U.S. History (1996)

HBO John Adams – Alexander Hamilton takes Jefferson to school

John Adams – George Washington confronts the French

The Best George Washington Full Documentary

American Revolution : Biography of

George Washington | Full Documentary |

Thomas Jefferson by Ken Burns | PBS America

#03 Thomas Jefferson

American Experience Thomas Jefferson 1

American Experience Thomas Jefferson 2

Alexander Hamilton

ALEXANDER HAMILTON

Jefferson French Revolution

Jefferson in Paris (1995) Part 1/9

Jefferson in Paris (1995) Part 2/9

Jefferson in Paris (1995) Part 3/9

Jefferson in Paris (1995) Part 4/9

Jefferson in Paris (1995) Part 5/9

Jefferson in Paris (1995) Part 6/9

Jefferson in Paris (1995) Part 7/9

Jefferson in Paris (1995) Part 8/9

Jefferson in Paris (1995) Part 9/9

The French Revolution in Two Minutes

The French Revolution History Channel HD

The French Revolution (1789–1799)

The French Revolution – Part 1 – English subtitles (La Révolution française – Les Années Lumières)

The French Revolution – Part 2 – English subtitles (La Révolution française – Les Années Terribles)

Thomas Jefferson and the French Revolution

Christopher Hitchens on Thomas Jefferson: Enlightenment, Nation Building, and Slavery (2005)

Christopher Hitchens on Thomas Jefferson: Influence on the Revolution & Louisiana Purchase (2006)

Famous American Statesmen (including Washington, Franklin, Jefferson, Hamilton, etc.) Audiobook

Conor Cruise O’Brien

From Wikipedia, the free encyclopedia
For other people of the same name, see Conor O’Brien.
Conor Cruise O’Brien
Conor Cruise O'Brien.jpg

Cruise O’Brien pictured when he was a member of the UKUP
Senator
In office
27 October 1977 – 13 June 1979
Constituency University of Dublin
Minister for Posts and Telegraphs
In office
14 March 1973 – 5 July 1977
Teachta Dála
In office
18 June 1969 – 16 June 1977
Constituency Dublin North-East
MEP for Ireland
In office
1 January 1973 – March 1973
Personal details
Born 3 November 1917
Dublin, Ireland
Died 18 December 2008 (aged 91)
Nationality Irish
Political party Labour Party
Other political
affiliations
UK Unionist Party
Spouse(s) Christine Foster (m.1939–div.1959)
Máire Mhac an tSaoi (m.1962–2008)
Children Donal Cruise O’Brien (by Christine Foster)
Fedelma Cruise O’Brien (by Christine Foster)
Kate Cruise O’Brien (by Christine Foster)
Patrick Cruise O’Brien (adopted with Máire Mhac an tSaoi)
Margaret Cruise O’Brien(adopted with Máire Mhac an tSaoi)
Alma mater Trinity College Dublin
Occupation Journalist

Conor Cruise O’Brien (3 November 1917 – 18 December 2008)[1] often nicknamed “The Cruiser”,[2] was an Irish politician, writer, historian and academic. His opinion on the role of Britain in Ireland and in Northern Ireland changed during the 1970s in response to the outbreak of ‘the Troubles’ after 1968. He saw opposing nationalist and unionist traditions as irreconcilable and switched from a nationalist to a unionist view of Irish politics and history. O’Brien’s outlook was always radical and the positions he took were seldom orthodox. He summarised his position as, “I intend to administer an electric shock to the Irish psyche“.[3] Internationally, he opposed in person the African National Congress’s academic boycott of the apartheid regime in South Africa.[4] These views contrasted with those espoused during the 1950s and 1960s.

During his career as a civil servant O’Brien worked on the government’s anti-partition campaign. At the 1969 general election, he was elected to Ireland’s parliament as a Labour Party TD for Dublin North-East becoming a Minister from 1973–77.[5] He was also the Labour Party’s Northern Ireland spokesman during those years. He was later known primarily as an author and as a columnist for the Irish Independent.

Early life

Cruise O’Brien was born in Dublin to Francis (“Frank”) Cruise O’Brien and Kathleen Sheehy. Frank was a journalist with the Freeman’s Journaland Irish Independent newspapers, and had edited an essay written fifty years earlier by William Lecky, on the influence of the clergy on Irish politics.[6] Kathleen was an Irish language teacher. She was the daughter of David Sheehy, a member of the Irish Parliamentary Party and organiser of the Irish National Land League. She had two sisters, both of whom lost their husbands in 1916. Hanna‘s husband, the well knownpacifist and supporter of women’s suffrage Francis Sheehy-Skeffington, was executed by firing squad on the orders of Captain J.C Bowen Colthurst during the 1916 Easter Rising.[7] Soon afterwards Mary’s husband, Thomas Kettle, an officer of the Royal Dublin Fusiliers was killed during the Battle of the Somme. These three women, Hanna and his mother in particular, were a major influence on O’Brien’s upbringing alongside Hanna’s son, his cousin Owen Sheehy-Skeffington.[8]

O’Brien’s father (who died in 1927) wanted Conor educated non-denominationally, a wish that Kathleen honoured. O’Brien followed his cousin Owen into Sandford Park School that had a predominantly Protestant ethos,[9] despite objections from Catholic clergy.[10] O’Brien subsequently attended Trinity College Dublin which played the British national anthem until 1939, though O’Brien and Sheehy-Skeffington sat in protest on such occasions.[11] He was elected a scholar in Modern Languages at Trinity in 1937. O’Brien was editor of Trinity’s weekly, TCD: A College Miscellany. His first wife, Christine Foster, came from a Belfast Presbyterian family and was, like her father, a member of the Gaelic League. Her parents, Alexander (Alec) Roulston Foster and Mary Lynd, were Irish republicans and supporters of Irish reunification. Alec Foster was headmaster at the time of Belfast Royal Academy and was later a founding member of the Northern Ireland Civil Rights Association and also a strong supporter of the Irish Anti-Apartheid movement.[12] He was a former Ulster, Ireland and British & Irish Lions rugby player, having captained Ireland three times between 1912–1914. O’Brien and Christine Foster were married in a registry office in 1939. The couple had three children – Donal, Fedelma, and Kathleen (Kate), who died in 1998. The marriage ended in divorce after 20 years. In 1962, O’Brien married the Irish-language writer and poet Máire Mhac an tSaoi in a Roman Catholic church. O’Brien’s divorce, contrary to Roman Catholic teaching, was not an issue since that church did not recognise the validity of O’Brien’s 1939 civil wedding in the first place. O’Brien referred to this action, which in effect formally de-recognised the legitimacy of his former wife and children, as “hypocritical … and otherwise distasteful, but I took it, as preferable to the alternatives.”[13] Mac an tSaoi was five years his junior, and the daughter of Seán MacEntee, who was Tánaiste (Deputy Prime Minister) at the time. They subsequently adopted two Congolese children, a son (Patrick) and a daughter (Margaret).

O’Brien’s university education led to a career in the public service, most notably in the Department of External (now Foreign) Affairs. He achieved distinction as managing director of the state run Irish News Agency and later as part of the fledgling Irish delegation to the United Nations. O’Brien later claimed he was something of an anomalous iconoclast in post-1922 Irish politics, particularly in the context of Fianna Fáilgovernments under Éamon de Valera. He considered that those who did not conform to traditional Roman Catholic mores were generally ill-suited to the public service,[14] though that does not appear to have impeded his ascent through it that ended officially at ambassadorial level. He observed,

There was nothing unusual even then about not believing in Catholicism. What was unusual then was to acknowledge publicly that you did not believe in Catholicism…. It is interesting that this did absolutely no harm to my public career around the mid-century – a time when the authority of a triumphant Catholic Church appeared to be overwhelmingly strong, in the media and in public life. But I think many educated people – including many in the public service – already resented that authority and, while being discreet about this themselves, had some respect for a person who publicly rejected it altogether.[15]

In the Department of External Affairs during the 1949–52 inter-party government, O’Brien served under former IRA Chief of Staff republican, Seán MacBride, the 1974 Nobel PeaceLaureate, son of John MacBride and Maud Gonne. O’Brien was particularly vocal in opposition to partition during the 1940s and 1950s, as part of his official duties.

International postings

In 1961 O’Brien came to world prominence after secondment from Ireland’s UN delegation as a special representative to Dag Hammarskjöld, Secretary General of the United Nations in theKatanga region of the newly independent Congo (now the Democratic Republic of the Congo). As per his understanding of his mission, O’Brien initiated military action to prevent the mineral rich region from seceding by expelling French and other western backed mercenaries. Western powers had been attempting to provoke secession, in particular Britain and the adjoining white ruled Rhodesia.[16] A UN crisis ensued and O’Brien was forced to step down from his UN position and also simultaneously from the Irish diplomatic service in late 1961. Michael Ignatieff asserted that Hammarskjöld, who was killed in Katanga prior to O’Brien’s departure in a suspicious plane crash, had misjudged O’Brien’s abilities as U.N. representative. He further observed that O’Brien’s use of military force provided the Soviets and the US with ammunition in their campaign against the U.N. Secretary General and UN action opposed to the interests of the big powers.[17] O’Brien wrote immediately about his experiences in The Observer (London) and in the New York Times on 10, 17 December 1961, and later in To Katanga and Back(1962), considered a classic of both modern African history and of the inner workings of the United Nations. In 1962, in response to an invitation from the Chancellor of the University of Ghana, and the country’s leader, Dr. Kwame Nkrumah, O’Brien accepted a position as Vice-Chancellor of the University. However, his interpretation of academic freedom later differed from that of Dr. Nkrumah, and he subsequently resigned in 1965.[18] Following this he was the first Albert Schweitzer Professor of Humanities at New York University from 1965 to 1969. During the 1960s O’Brien opposed western, in particular US, imperialism and protested against US participation in the Vietnam War. in 1965 O’Brien declared himself “a liberal, incurably … profoundly attached to liberal concepts of freedom… of speech and of the press”[19]

O’Brien also supported the right of oppressed people to use violence. In a debate involving Noam Chomsky, Hannah Arendt, Susan Sontag and others in 1967, he asserted,

The question has also been raised here about the terror used by the National Liberation Front [in Vietnam], and by other revolutionary movements. I think there is a distinction between the use of terror by oppressed peoples against the oppressors and their servants, in comparison with the use of terror by their oppressors in the interests of further oppression. I think there is a qualitative distinction there which we have the right to make.[20]

Irish politics

O’Brien returned to Ireland and in the 1969 general election was elected to Dáil Éireann as a member of the opposition Labour Party, representing the Dublin North-East constituency,[21]together with three other TDs, including Charles Haughey, whose probity in financial matters he questioned.[22] He was appointed a member of the short-lived first delegation from theOireachtas to the European Parliament. Following the 1973 general election, O’Brien was appointed Minister for Posts and Telegraphs in the 1973–77 Labour Fine Gael coalition under Taoiseach Liam Cosgrave.

During this period, after the outbreak of armed conflict in Northern Ireland in 1969, O’Brien developed a deep hostility to militant Irish republicanism and to Irish nationalists generally in Northern Ireland, reversing views articulated at the outset of unrest.[23] He also reversed his opposition to broadcasting censorship imposed by the previous government, by extending and vigorously enforcing censorship of Radio Teilefís Éireann (RTÉ) under Section 31 of the Broadcasting Act. In 1976 he specifically banned spokespersons for Sinn Féin and the Provisional Irish Republican Army from RTÉ.[23] At the same time, he attempted unsuccessfully to get Britain’s BBC 1 television channel broadcast on Ireland’s proposed second television channel, instead of allowing RTÉ to run it.[24][25]

Two additional notable incidents affected O’Brien’s career as minister, besides support for broadcasting censorship.

In August 1976 Bernard Nossiter of the Washington Post interviewed O’Brien regarding the passage of an Emergency Powers Bill. During the course of the interview O’Brien revealed an intention to extend censorship beyond broadcasting. He wished to “cleanse the culture” of republicanism and would like the bill to be used against teachers who allegedly glorified Irish revolutionaries. He also wanted it used against newspaper editors who published pro-republican or anti-British readers’ letters.[26] O’Brien mentioned the Irish Press as a newspaper which in particular he hoped to use the legislation against and produced a file of Irish Press letters to the editor to which he took exception. Nossiter immediately informed Irish Press editor Tim Pat Coogan of O’Brien’s intentions. Coogan printed Nossiter’s report (as did the Irish TImes), republished the letters to which O’Brien objected, and ran a number of strong editorials attacking O’Brien and the proposed legislation. The interview caused huge controversy, resulting in modification of the measure appearing to target newspapers.[27]

O’Brien also supported Garda brutality in this 1973–77 period, though this was not revealed by O’Brien until 1998 in his Memoir.[28] In Memoir: My Life and Themes, O’Brien recalled a conversation with a detective who told him how the Gardaí had found out – from a suspect – the location of businessman Tiede Herrema, who had been kidnapped by group of maverick republicans in October 1975: “[T]he escort started asking him questions and when at first he refused to answer, they beat the shit out of him. Then he told them where Herrema was.” O’Brien explained, “I refrained from telling this story to [ministerial colleagues] Garret [FitzGerald] or Justin [Keating], because I thought it would worry them. It didn’t worry me.”[29] Elements of the Garda Síochána that engaged in beating false confessions out of suspects quickly became known as the “Heavy Gang”.[30][31]

O’Brien’s Dublin North-East constituency was abolished as part of a government inspired redrawing of boundaries. In the 1977 general election he stood in Dublin Clontarf and was one of three ministers defeated in a general rout of the outgoing administration.[32] He was, however, subsequently elected to Seanad Éireann in 1977 from the Trinity College Dublin constituency, though he resigned his seat in 1979 due to new commitments as editor-in-chief of the London Observer newspaper.

Editor in Chief at the Observer

Between 1978 and 1981 O’Brien was editor-in-chief of The Observer newspaper in Britain. In 1979 he controversially pulped an Observer magazine with an article by Mary Holland, The Observer’s Ireland correspondent. Holland, whose reporting won her a Journalist of the Year award, had been one of the first journalists to explain discrimination in Northern Ireland to a British audience. The article was a profile of Mary Nellis of Derry and dealt with her radicalisation as a result of the conflict. O’Brien objected and sent Holland a memo stating that the “killing strain” of Irish republicanism, “has a very high propensity to run in families and the mother is most often the carrier”.[11] The memo continued, “It is a very serious weakness of your coverage of Irish affairs that you are a very poor judge of Irish Catholics. That gifted and talkative community includes some of the most expert conmen and conwomen in the world and I believe you have been conned.[33] Holland was forced out of the newspaper by O’Brien. She later joined the Irish Times as a columnist. She also rejoined The Observer after O’Brien’s departure in 1981.[34]

Unionism

In 1985, O’Brien supported unionist objections to the inter governmental Anglo-Irish Agreement. In 1996 he joined Robert McCartney‘s United Kingdom Unionist Party (UKUP) and was elected to the Northern Ireland Forum. In 1997, a successful libel action was brought against him by relatives of Bloody Sunday victims for alleging in a Sunday Independent article in 1997 that the marchers were “Sinn Féin activists operating for the IRA”.[35] O’Brien opposed the 1998 Good Friday Agreement and opposed allowing Sinn Féin into government in Northern Ireland. He later resigned from the UKUP after his book Memoir: My Life and Themes called on Unionists to consider the benefits of a united Ireland to thwart Sinn Féin. In 2005 he rejoined the Labour Party. O’Brien defended his harsh attitudes and actions towards Irish republicans, saying “We do right to condemn all violence but we have a special duty to condemn the violence which is committed in our name”.[36]

Writings

Conor Cruise O’Brien’s many books include: States of Ireland (1972), where he first indicated his revised view of Irish nationalism, The Great Melody (1992), his unorthodox biography ofEdmund Burke, and his autobiography Memoir: My Life and Themes (1999). He also published a collection of essays, Passion and Cunning (1988), which includes a substantial piece on the literary work of William Butler Yeats and some challenging views on the subject of terrorism, and The Siege: The Saga of Israel and Zionism (1986), a history of Zionism and the State of Israel. His books, particularly those on Irish issues, tend to be personalised, for example States of Ireland, where he made the link between the political success of the republican Easter Rising and the consequent demise of his Home Rule family’s position in society. His private papers have been deposited in the University College Dublin Archives.

In 1963, O’Brien’s script for a Telefís Éireann programme on Charles Stewart Parnell won him a Jacob’s Award.[37]

He was a longtime columnist for the Irish Independent. His articles were distinguished by hostility to the ‘peace process’ in Northern Ireland, regular predictions of civil war involving the Republic of Ireland, and a pro-Unionist stance. O’Brien also abused the Irish tax exemption for works of literary merit by claiming this exemption for his newspaper column.

O’Brien held visiting professorships and lectureships throughout the world, particularly in the United States, and controversially in apartheid South Africa, openly breaking the academic boycott. A persistent critic of Charles Haughey, O’Brien coined the acronym GUBU (Grotesque, Unbelievable, Bizarre and Unprecedented), based on a statement by Charles Haughey, who was then Taoiseach, commenting on the discovery of a murder suspect, Malcolm MacArthur, in the apartment of the Fianna Fáil Attorney General Patrick Connolly.[38] Until 1994, O’Brien was a Pro-Chancellor of the University of Dublin.

Works

Máire and Conor Cruise O’Brien:

Read Full Post | Make a Comment ( None so far )

The Political Philosophy of The Presidential Candidates — From Far Left To Far Right — Bernie Sanders, Hillary Clinton, Jeb Bush, John Kasich, Marco Rubio, Donald Trump, Ben Carson, Ted Cruz — The Two Party Tyranny of Big Government Parties — Democratic Party and Republican Party — Plastic or Paper? Not Much Choice — Time To Evolve — Videos

Posted on March 6, 2016. Filed under: American History, Articles, Blogroll, Books, British History, Business, College, Congress, Constitution, Corruption, Crime, Crisis, Documentary, Economics, Education, Elections, Employment, European History, Faith, Family, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Fraud, Freedom, Friends, history, History of Economic Thought, Inflation, Internal Revenue Service (IRS), Investments, Law, liberty, Life, Links, Literacy, media, Monetary Policy, Newspapers, Non-Fiction, Philosophy, Photos, Police, Political Correctness, Politics, Presidential Candidates, Press, Rants, Raves, Regulations, Religion, Religious, Religious, Speech, Strategy, Talk Radio, Tax Policy, Taxation, Television, Terrorism, Unemployment, Video, War, Wealth, Welfare, Wisdom, Work | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 625: February 16, 2016

Pronk Pops Show 624: February 15, 2016

Pronk Pops Show 623: February 12, 2016

Pronk Pops Show 622: February 11, 2016

Pronk Pops Show 621: February 10, 2016

Pronk Pops Show 620: February 9, 2016

Pronk Pops Show 619: February 8, 2016

Pronk Pops Show 618: February 5, 2016

Pronk Pops Show 617: February 4, 2016

Pronk Pops Show 616: February 3, 2016

Pronk Pops Show 615: February 1, 2016

Pronk Pops Show 614: January 29, 2016

Pronk Pops Show 613: January 28, 2016

Pronk Pops Show 612: January 27, 2016

Pronk Pops Show 611: January 26, 2016

Pronk Pops Show 610: January 25, 2016

Pronk Pops Show 609: January 22, 2016

Pronk Pops Show 608: January 21, 2016

Pronk Pops Show 607: January 20, 2016

Pronk Pops Show 606: January 19, 2016

Pronk Pops Show 605: January 15, 2015

Pronk Pops Show 604: January 14, 2016

Pronk Pops Show 603: January 13, 2016

Pronk Pops Show 602: January 12, 2016

Pronk Pops Show 601: January 11, 2015

Pronk Pops Show 600: January 8, 2016

Pronk Pops Show 599: January 6, 2016

Pronk Pops Show 598: January 5, 2016

Pronk Pops Show 597: December 21, 2015

Pronk Pops Show 596: December 18, 2015

Pronk Pops Show 595: December 17, 2015

Pronk Pops Show 594: December 16, 2015

Pronk Pops Show 593: December 15, 2015

Pronk Pops Show 592: December 14, 2015 

Pronk Pops Show 591: December 11, 2015 

Pronk Pops Show 590: December 10, 2015 

Pronk Pops Show 589: December 9, 2015 

Pronk Pops Show 588: December 7, 2015 

Pronk Pops Show 587: December 4, 2015 

Pronk Pops Show 586: December 3, 2015 

Pronk Pops Show 585: December 2, 2015 

Pronk Pops Show 584: December 1, 2015 

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

Supreme Court Justice Anthony Scalia Dead At 79: Natural Causes or Foul Play?

Posted on March 6, 2016. Filed under: American History, Articles, Blogroll, Catholic Church, Communications, Congress, Constitution, Corruption, Federal Bureau of Investigation (FBI), Federal Government, Freedom, Friends, government, Heroes, history, Law, liberty, Life, Links, media, Newspapers, People, Philosophy, Photos, Police, Radio, Regulations, Religion, Religious, Religious, Security, Speech, Supreme Court, Television, Vacations, Video, Wealth, Wisdom, Work | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 624: February 15, 2016

Pronk Pops Show 623: February 12, 2016

Pronk Pops Show 622: February 11, 2016

Pronk Pops Show 621: February 10, 2016

Pronk Pops Show 620: February 9, 2016

Pronk Pops Show 619: February 8, 2016

Pronk Pops Show 618: February 5, 2016

Pronk Pops Show 617: February 4, 2016

Pronk Pops Show 616: February 3, 2016

Pronk Pops Show 615: February 1, 2016

Pronk Pops Show 614: January 29, 2016

Pronk Pops Show 613: January 28, 2016

Pronk Pops Show 612: January 27, 2016

Pronk Pops Show 611: January 26, 2016

Pronk Pops Show 610: January 25, 2016

Pronk Pops Show 609: January 22, 2016

Pronk Pops Show 608: January 21, 2016

Pronk Pops Show 607: January 20, 2016

Pronk Pops Show 606: January 19, 2016

Pronk Pops Show 605: January 15, 2015

Pronk Pops Show 604: January 14, 2016

Pronk Pops Show 603: January 13, 2016

Pronk Pops Show 602: January 12, 2016

Pronk Pops Show 601: January 11, 2015

Pronk Pops Show 600: January 8, 2016

Pronk Pops Show 599: January 6, 2016

Pronk Pops Show 598: January 5, 2016

Pronk Pops Show 597: December 21, 2015

Pronk Pops Show 596: December 18, 2015

Pronk Pops Show 595: December 17, 2015

Pronk Pops Show 594: December 16, 2015

Pronk Pops Show 593: December 15, 2015

Pronk Pops Show 592: December 14, 2015 

Pronk Pops Show 591: December 11, 2015 

Pronk Pops Show 590: December 10, 2015 

Pronk Pops Show 589: December 9, 2015 

Pronk Pops Show 588: December 7, 2015 

Pronk Pops Show 587: December 4, 2015 

Pronk Pops Show 586: December 3, 2015 

Pronk Pops Show 585: December 2, 2015 

Pronk Pops Show 584: December 1, 2015 

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

The Results Are In: Cruz and Clinton Win Most Delegates In A Very Close Race — Videos

Posted on February 13, 2016. Filed under: American History, Art, Articles, Blogroll, Business, Communications, Corruption, Culture, Economics, Elections, Employment, Entertainment, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, Friends, history, Illegal, Immigration, IRS, Law, Legal, liberty, Life, Links, media, Music, Music, Newspapers, People, Philosophy, Photos, Politics, Presidential Candidates, Radio, Radio, Rants, Raves, Regulations, Religion, Religious, Speech, Strategy, Talk Radio, Tax Policy, Taxation, Taxes, Television, Terrorism, Unemployment, Video, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 616: February 3, 2016

Pronk Pops Show 615: February 1, 2016

Pronk Pops Show 614: January 29, 2016

Pronk Pops Show 613: January 28, 2016

Pronk Pops Show 612: January 27, 2016

Pronk Pops Show 611: January 26, 2016

Pronk Pops Show 610: January 25, 2016

Pronk Pops Show 609: January 22, 2016

Pronk Pops Show 608: January 21, 2016

Pronk Pops Show 607: January 20, 2016

Pronk Pops Show 606: January 19, 2016

Pronk Pops Show 605: January 15, 2015

Pronk Pops Show 604: January 14, 2016

Pronk Pops Show 603: January 13, 2016

Pronk Pops Show 602: January 12, 2016

Pronk Pops Show 601: January 11, 2015

Pronk Pops Show 600: January 8, 2016

Pronk Pops Show 599: January 6, 2016

Pronk Pops Show 598: January 5, 2016

Pronk Pops Show 597: December 21, 2015

Pronk Pops Show 596: December 18, 2015

Pronk Pops Show 595: December 17, 2015

Pronk Pops Show 594: December 16, 2015

Pronk Pops Show 593: December 15, 2015

Pronk Pops Show 592: December 14, 2015 

Pronk Pops Show 591: December 11, 2015 

Pronk Pops Show 590: December 10, 2015 

Pronk Pops Show 589: December 9, 2015 

Pronk Pops Show 588: December 7, 2015 

Pronk Pops Show 587: December 4, 2015 

Pronk Pops Show 586: December 3, 2015 

Pronk Pops Show 585: December 2, 2015 

Pronk Pops Show 584: December 1, 2015 

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

Prager University — Videos

Posted on January 7, 2016. Filed under: American History, Articles, Babies, Blogroll, Books, Catholic Church, College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Culture, Documentary, Economics, Education, Elections, Employment, Energy, Faith, Family, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Fraud, Freedom, Friends, government, government spending, history, History of Economic Thought, Homicide, Illegal, Immigration, Investments, Law, Legal, liberty, Life, Links, Macroeconomics, media, Microeconomics, Monetary Policy, Money, Non-Fiction, People, Philosophy, Radio, Rants, Raves, Regulations, Religion, Religious, Religious, Resources, Reviews, Speech, Strategy, Talk Radio, Tax Policy, Taxation, Video, War, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , |

Prager University

Is Evil Rational?

The Most Important Question About Abortion

Don’t Judge Blacks Differently

Who Are the Racists: Conservatives or Liberals?

How Do We Make Society Better? Left vs. Right #5

What is Social Justice?

The War on Work

What Matters Most in Life?

What Did Your Parents Most Want You to Be?

How the Liberal University Hurts the Liberal Student

The Speech Every 2015 College Grad Needs to Hear

What Every Graduate Should Know

Read Full Post | Make a Comment ( None so far )

Kevin Phillips — American Theocracy: The Peril and Politics of Radical Religion, Oil and Borrowed Money in The 21st Century — Videos

Posted on December 26, 2015. Filed under: American History, Blogroll, Books, British History, Catholic Church, Communications, Constitution, Documentary, Education, Employment, Energy, European History, Foreign Policy, Freedom, Friends, government spending, history, Illegal, Immigration, Islam, Law, liberty, Life, Links, Literature, media, Middle East, Monetary Policy, Natural Gas, Natural Gas, Non-Fiction, Oil, Oil, Radio, Radio, Rants, Raves, Regulations, Religion, Resources, Strategy, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Unemployment, Video, War, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Kevin Phillips – American Theocracy: Radical Religion, Oil, and Debt

Revelle Forum: Kevin Phillips on Religion Oil and Debt

Kevin Phillips – Bad Money: Crisis of American Capitalism

Kevin Phillips – Bad Money: the Global Crisis of American Capitalism

Which Currency Will Replace the Dollar? Finance and the Crisis of Capitalism (2008)

Former GOP Strategist Kevin Phillips on Roots of American Revolution, Future of US Politics

Kevin Phillips Discusses the Role Played by Money, Debt, & Trade in the American Revolution

WALL STREET MELTDOWN Bill Moyers !!!! FULL 1 of 3

WALL STREET MELTDOWN Bill Moyers !!!! FULL 2 of 3

 

WALL STREET MELTDOWN Bill Moyers !!!! FULL 3 of 3

 

Kevin Phillips (political commentator)

From Wikipedia, the free encyclopedia
Kevin Phillips
Born Kevin Price Phillips
November 30, 1940 (age 75)
Residence Goshen, Connecticut
Alma mater Colgate University (B.A., 1961)
University of Edinburgh (M.A., Geography)
Harvard University (J.D., 1964)
Occupation Pundit, Author, Columnist

Kevin Price Phillips (born November 30, 1940) is an American writer and commentator on politics, economics, and history. Formerly aRepublican Party strategist before becoming an Independent, Phillips became disaffected with the party from the 1990s, and became a critic. He is a regular contributor to the Los Angeles Times, Harper’s Magazine, and National Public Radio, and was a political analyst on PBSNOW with Bill Moyers.

Phillips was a strategist on voting patterns for Richard Nixon‘s 1968 campaign, which was the basis for a book, The Emerging Republican Majority, which predicted a conservative realignment in national politics, and is widely regarded[citation needed] as one of the most influential recent works in political science. His predictions regarding shifting voting patterns in presidential elections proved accurate, though they did not extend “down ballot” to Congress until the Republican revolution of 1994. Phillips also was partly responsible for the design of the Republican “Southern strategy” of the 1970s and 1980s.

The author of fourteen books, he lives in Goshen, Connecticut.

Biography

Phillips was educated at the Bronx High School of Science, Colgate University, the University of Edinburgh and Harvard Law School. After his stint as a senior strategist for the Nixon presidential campaign, he served a year, starting in 1969, as Special Assistant to the U.S. Attorney General, but left after a year to become a columnist. In 1971, he became president of theAmerican Political Research Corporation and editor-publisher of the American Political Report (through 1998).

In 1982, the Wall Street Journal described him as “the leading conservative electoral analyst — the man who invented the term “Sun Belt” [a phrase also attributed to legendary Speaker of the United States House of Representatives Sam Rayburn, named the New Right, and prophesied ‘The Emerging Republican Majority’ in 1969.”

Later, he became a critic of Republicans from the south and west, the area he had identified as the “Heartland”, the future core of Republican votes. He had also identified the “Yankee Northeast” as the future Democratic stronghold, foreshadowing the current split between Red States and Blue States. More than 30 years before the 2004 election, Phillips foresaw such previously Democratic states as Texas and West Virginia swinging to the Republicans and Vermont and Maine becoming Democratic states.

Southern strategy

Phillips worked for Richard Nixon‘s presidential campaign in 1968, and wrote a book on what has come to be known as the “Southern strategy” of the Republican Party. The book was entitled The Emerging Republican Majority and argued that the southern states of the US would keep the Republicans winning Presidential Elections and more than offset the Northeast states, based on racial politics.[1] As he stated to the New York Times Magazine in 1970,

“All the talk about Republicans making inroads into the Negro vote is persiflage. Even ‘Jake the Snake’ [Senator Jacob Javits of New York] only gets 20 percent. From now on, Republicans are never going to get more than 10 to 20 percent of the Negro vote, and they don’t need any more than that… but Republicans would be shortsighted if they weakened the Voting Rights Act. The more Negroes who register as Democrats in the South, the sooner the Negrophobe whites will quit the Democrats and become Republicans. That’s where the votes are. Without that prodding from the blacks, the whites will backslide into their old comfortable arrangement with the local Democrats.”[1]

Books

American Theocracy (2006)

Allen Dwight Callahan[2] states the book’s theme is that the Republican Party (GOP), religious fundamentalism, petroleum, and borrowed money are an “Unholy Alliance.”[3] The last chapter, in a nod to his first major work, is titled “The Erring Republican Majority.” American Theocracy “presents a nightmarish vision of ideological extremism, catastrophic fiscal irresponsibility, rampant greed and dangerous shortsightedness.”

The New York Times wrote:

He identifies three broad and related trends — none of them new to the Bush years but all of them, he believes, exacerbated by this administration’s policies — that together threaten the future of the United States and the world. One is the role of oil in defining and, as Phillips sees it, distorting American foreign and domestic policy. The second is the ominous intrusion of radical Christianity into politics and government. And the third is the astonishing levels of debt — current and prospective — that both the government and the American people have been heedlessly accumulating. If there is a single, if implicit, theme running through the three linked essays that form this book, it is the failure of leaders to look beyond their own and the country’s immediate ambitions and desires so as to plan prudently for a darkening future.[4]

Phillips uses the term financialization to describe how the U.S. economy has been radically restructured from a focus on production, manufacturing and wages, to a focus on speculation, debt, and profits. Since the 1980s, Phillips argues in American Theocracy,

the underlying Washington strategy… was less to give ordinary Americans direct sums than to create a low-interest-rate boom in real estate, thereby raising the percentage of American home ownership, ballooning the prices of homes, and allowing householders to take out some of that increase through low-cost refinancing. This triple play created new wealth to take the place of that destroyed in the 2000-2002 stock-market crash and simultaneously raised consumer confidence.

Nothing similar had ever been engineered before. Instead of a recovery orchestrated by Congress and the White House and aimed at the middle- and bottom-income segments, this one was directed by an appointed central banker, a man whose principal responsibility was to the banking system. His relief, targeted on financial assets and real estate, was principally achieved by monetary stimulus. This in itself confirmed the massive realignment of preferences and priorities within the American system….

Likewise, huge and indisputable but almost never discussed, were the powerful political economics lurking behind the stimulus: the massive rate-cut-driven post-2000 bailout of the FIRE (finance, insurance, and real estate) sector, with its ever-climbing share of GDP and proximity to power. No longer would Washington concentrate stimulus on wages or public-works employment. The Fed’s policies, however shrewd, were not rooted in an abstraction of the national interest but in pursuit of its statutory mandate to protect the U.S. banking and payments system, now inseparable from the broadly defined financial-services sector.

Critical reception

American Theocracy was reviewed widely. The New York Times Book Review wrote “It is not without polemic, but unlike many of the more glib and strident political commentaries of recent years, it is extensively researched and frighteningly persuasive…”[5] The Chicago Sun-Times wrote “Overall, Phillips’ book is a thoughtful and somber jeremiad, written throughout with a graceful wryness… a capstone to his life’s work.”[6]

Bad Money (2008)

Kevin Phillips examines America’s great shift from manufacturing to financial services. He also discusses America’s petroleum policies and the tying of the dollar to the price of oil. Phillips suggests that the Euro and the Chinese Yuan/Renminbi are favorites to take the dollar’s place in countries hostile towards America, like Iran. He then tackles the lack of regulatory oversight employed in the housing market and how the housing boom was allowed to run free under Alan Greenspan. The book concludes with the proposal that America is employing bad capitalism and extends Gresham’s Law of currency to suggest that our good capitalism will be driven out by the bad.[7]

Bibliography

  • The Emerging Republican Majority (1969)
  • Mediacracy: American Parties and Politics in the Communications Age (1974) ISBN 0-385-04945-5
  • Electoral Reform and Voter Participation (with Paul H. Blackman, 1975)
  • Post-Conservative America: People, Politics, and Ideology in a Time of Crisis (1982) ISBN 0-394-52212-5
  • Staying on Top: The Business Case for a National Industrial Strategy (1984) ISBN 0-394-53744-0
  • The Politics of Rich and Poor: Wealth and Electorate in the Reagan Aftermath (1990) ISBN 0-394-55954-1
  • Boiling Point: Democrats, Republicans, and the Decline of Middle Class Prosperity (1993) ISBN 0-679-40461-9
  • Arrogant Capital: Washington, Wall Street and the Frustration of American Politics (1994) ISBN 0-316-70618-3
  • The Cousins’ Wars: Religion, Politics and the Triumph of Anglo-America (1998) ISBN 0-465-01369-4
  • William McKinley (2003) ISBN 0-805-06953-4
  • Wealth and Democracy: A Political History of the American Rich (2002) ISBN 0-767-90533-4
  • American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush (2004) ISBN 0-670-03264-6
  • American Theocracy: The Peril and Politics of Radical Religion, Oil, and Borrowed Money in the 21st Century (2006) ISBN 0-670-03486-X
  • Bad Money: Reckless Finance, Failed Politics, and the Global Crisis of American Capitalism (2008) ISBN 0-670-01907-0
  • 1775: A Good Year for Revolution (2012) ISBN 978-0-670-02512-1

References

  1. ^ Jump up to:a b Boyd, James (May 17, 1970). “Nixon’s Southern strategy ‘It’s All In the Charts'” (PDF). The New York Times.
  2. Jump up^ Rev. Dr. Allen Dwight Callahan’s page at Brown University Archived April 4, 2007 at the Wayback Machine
  3. Jump up^ Callahan, Allen Dwight, “Unholy Alliance” Religion & Ethics Newsweekly, No. 1008, October 25, 2006.[dead link]
  4. Jump up^ N.Y.Times review on 3/19/2006.
  5. Jump up^ Alan Brinkley, The New York Times Book Review, March 19, 2006
  6. Jump up^ William O’Rourke, The Chicago Sun-Times, March 12, 2006
  7. Jump up^ Bad Money, 2008

External links

https://en.wikipedia.org/wiki/Kevin_Phillips_(political_commentator)

Read Full Post | Make a Comment ( None so far )

Lying Lunatic Left and Radical Islam Attacks American People — Saul Alinsky’s Rules For Radicals and The Traitor and Terrorist Totalitarian Threats — Videos

Posted on December 15, 2015. Filed under: American History, Articles, Blogroll, British History, Business, Communications, Congress, Constitution, Corruption, Documentary, Energy, European History, Foreign Policy, Freedom, Friends, government spending, history, Illegal, Immigration, Islam, Law, Legal, liberty, Life, Links, Middle East, Natural Gas, Oil, People, Philosophy, Photos, Police, Politics, Presidential Candidates, Shite, Spying, Strategy, Sunni, Talk Radio, Taxation, Taxes, Terrorism, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 591: December 11, 2015 

Pronk Pops Show 590: December 10, 2015 

Pronk Pops Show 589: December 9, 2015 

Pronk Pops Show 588: December 7, 2015 

Pronk Pops Show 587: December 4, 2015 

Pronk Pops Show 586: December 3, 2015 

Pronk Pops Show 585: December 2, 2015 

Pronk Pops Show 584: December 1, 2015 

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

Mass Media Big Lie Campaign To Take Down Trump With Out of Context Propaganda! — Trump Never Said He Wants All Muslims In U.S. To Register– The So-Called “Journalist” Did! — Hit and Run Political Character Assassination Attempt By Hillary Clinton Journalist Supporter — Hunter Walker — Videos

Posted on November 21, 2015. Filed under: Airplanes, American History, Babies, Blogroll, Bomb, Books, British History, Business, Central Intelligence Agency (CIA), College, Communications, Congress, Constitution, Corruption, Crime, Crisis, Cult, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Diasters, Documentary, Drug Cartels, Economics, Education, Elections, Employment, Energy, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Federal Government Budget, Fiscal Policy, Food, Foreign Policy, Fraud, Freedom, Friends, Genocide, government, government spending, Homicide, Illegal, Immigration, Islam, Law, Legal, liberty, Life, Links, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Pistols, Police, Political Correctness, Politics, Presidential Candidates, Press, Radio, Rants, Raves, Religion, Religious, Rifles, Security, Speech, Spying, Strategy, Talk Radio, Tax Policy, Taxation, Technology, Terrorism, Torture, Transportation, Vacations, Video, War, Wealth, Weapons, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

Trump Triumphing with American People — Trump Democrats, Trump Republicans, Trump Independents — President Trump? — Too Soon To Call — Videos

Posted on November 21, 2015. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Congress, Constitution, Corruption, Crisis, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, Economics, Employment, Energy, European History, Faith, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Food, Foreign Policy, Freedom, Genocide, government, Health Care, history, Illegal, Immigration, Islam, Language, Law, Legal, liberty, Life, Links, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Natural Gas, Newspapers, Non-Fiction, Oil, Oil, People, Philosophy, Photos, Police, Political Correctness, Politics, Presidential Candidates, Radio, Radio, Raves, Regulations, Religious, Resources, Security, Shite, Speech, Spying, Sunni, Talk Radio, Taxation, Technology, Television, Terrorism, Torture, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 578: November 19, 2015

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

George Weigel — The Cube and the Cathedral: Europe, America, and Politics Without God — Videos

Posted on November 4, 2015. Filed under: American History, Blogroll, Book, Books, Catholic Church, Communications, Constitution, Documentary, Elections, Employment, European History, Faith, Family, Fiction, Foreign Policy, Freedom, government, history, Immigration, Islam, Language, Law, liberty, Life, Links, Literacy, media, People, Philosophy, Politics, Radio, Radio, Religion, Talk Radio, Television, Television, Terrorism, Video, War, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , |

the cube the cathedral
Cathedral-Notre-Dame-de-Parisgeorge weigel
  Grande_Arche_de_La_Défense_et_fontaine the cubethe cube 2NotreDameParisfrance_paris_notre_dameNotre Dame, Paris FranceInside Notre Dame Cathedral

LaDefense

“Democracy Without God?” by George Weigel

Christianity and Democracy, War and Peace, Pope John Paul II – Books (2008)

George Weigel (born 1951) is an American author and political and social activist. He currently serves as a Distinguished Senior Fellow of the Ethics and Public Policy Center. Weigel was the Founding President of the James Madison Foundation. He is the author of the best-selling biography of Pope John Paul II, Witness to Hope and Tranquillitas Ordinis: The Present Failure and Future Promise of American Catholic Thought on War and Peace.

Weigel was born and grew up in Baltimore, Maryland, where he attended St. Mary’s Seminary and University. He later received his masters degree from St. Michael’s College, University of Toronto. He has received 18 honorary doctorate degrees, as well as the papal cross Pro Ecclesia et Pontifice and the Gloria Artis Gold Medal from the Polish Ministry of Culture.

Weigel lived in Seattle, serving as Assistant Professor of Theology and Assistant Dean of Studies at the St. Thomas the Apostle Seminary School of Theology in Kenmore, and Scholar-in-Residence at the World Without War Council of Greater Seattle, before returning to Washington, D.C. as a fellow at the Woodrow Wilson International Center for Scholars.

Weigel served as the founding president of the James Madison Foundation (not to be confused with the James Madison Memorial Fellowship Foundation) from 1986 to 1989. In 1994, he was a signer of the document Evangelicals and Catholics Together.

He currently serves as Distinguished Senior Fellow and Chair of Catholic Studies at the Ethics and Public Policy Center in Washington, D.C..

Each summer, Weigel and several other Catholic intellectuals from the United States, Poland, and across Europe conduct the Tertio Millennio Seminar on the Free Society in Krakow, in which they and an assortment of students from the United States, Poland, and several other emerging democracies in Central and Eastern Europe discuss Christianity within the context of liberal democracy and capitalism, with the papal encyclical Centesimus Annus being the focal point.

Weigel and his wife Joan live in North Bethesda, Maryland. He has three children.

He is a member of the advisory council of the Victims of Communism Memorial Foundation.

Weigel writes and serves on the Institute board for the Institute for Religion and Public Life, which publishes First Things, an ecumenical publication that focuses on encouraging a religiously informed public philosophy for the ordering of society.

The main body of Weigel’s writings engage the issues of religion and culture.

Weigel advocates a U.S. foreign policy guided not by utopian notions about how nations should behave, but by moral reasoning. “From the Iliad to Tolstoy and beyond, that familiar trope, “the fog of war,” has been used to evoke the millennia–old experience of the radical uncertainty of combat. Some analysts, however, take the trope of “the fog of war” a philosophical step further and suggest that warfare takes place beyond the reach of moral reason, in a realm of interest and necessity where moral argument is a pious diversion at best and, at worst, a lethal distraction from the deadly serious business at hand.”

In some cases, he adds, moral reasoning may require that the United States support authoritarian regimes to fend off the greater evils of moral decay and threats to the security of the United States. For Weigel, America’s shortcomings do not excuse her from pursuing the greater moral good.

Weigel achieved much fame for writing Witness to Hope, a biography of the late Pope John Paul II, which was also made into a documentary film. In 2004 Weigel wrote an article in Commentary magazine, entitled “The Cathedral and the Cube”, in which he used the contrast between the modernist Grande Arche, and the Notre Dame de Paris cathedral, both located in Paris, France, to illustrate what he called a loss of “civilizational morale” in Western Europe, which he tied to the secular tyrannies of the 20th century, along with, more recently, plummeting birthrates and Europe’s refusal to recognize the Christian roots of its culture. Weigel questions whether Europe can give an account of itself while denying the very moral tradition through which its culture arose: “Christians who share this conviction (that it is the will of God that Christians be tolerant of those who have a different view of God’s will) — can give an account of their defense of the other’s freedom even if the other, skeptical and relativist, finds it hard to give an account of the freedom of the Christian.” This is a theme sounded clearly by Marcello Pera and Cardinal Joseph Ratzinger (from 2005 to 2013 Pope Benedict XVI), in their book Without Roots: the West, Relativism, Christianity, Islam, for which Weigel authored the foreword. In 2005, he expanded the article into a book, The Cube and the Cathedral: Europe, America, and Politics Without God.

Ten Things To Know About Pope Francis (George Weigel – Acton Institute)

Top 10 Immigrant Countries

The ten countries with greatest number of foreign born residents.
10. Spain 6.5 million immigrants (13.8% of pop)
9. Australia 6.5 million immigrants (27.7%)
8. Canada 7.3 million immigrants (20.7%)
7. France 7.4 million immigrants (11.6%)
6. United Kingdom 7.8 million immigrants (12.4%)
5. United Arab Emirates 7.8 million immigrants (83.7%)
4. Saudi Arabia 9.1 million immigrants (31.4%)
3. Germany 9.8 million immigrants (11.9%)
2. Russia 11 million immigrants (7.7%)
1. USA 45.7 million immigrants (14.3%)

The World in 2015: Global population and the changing shape of world demographics

Demographic Winter – the decline of the human family (Full Movie)

Future World Populations (2050)

Read Full Post | Make a Comment ( None so far )

House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos

Posted on November 1, 2015. Filed under: American History, Ammunition, Articles, Blogroll, Bomb, Books, British History, Business, Central Intelligence Agency (CIA), College, Communications, Computers, Computers, Congress, Constitution, Corruption, Crime, Crisis, Culture, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Diasters, Dirty Bomb, Documentary, Drones, Education, Elections, Employment, Energy, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Homicide, Illegal, Immigration, Investments, Islam, Islam, Language, Law, liberty, Life, Links, media, Middle East, Missiles, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Natural Gas, Newspapers, Non-Fiction, Nuclear, Oil, Oil, People, Philosophy, Photos, Pistols, Police, Political Correctness, Politics, Presidential Candidates, Press, Radio, Radio, Rants, Raves, Regulations, Religion, Religious, Resources, Rifles, Security, Shite, Speech, Spying, Strategy, Sunni, Talk Radio, Taxation, Television, Television, Torture, Video, War, Water, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 559: October 22, 2015 

Pronk Pops Show 558: October 21, 2015

Pronk Pops Show 557: October 20, 2015 

Pronk Pops Show 556: October 19, 2015

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Story 1: House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos

benghazi-four obama_hillary_liars_benghazi_treason

Background Information

Obama and Hillary Blame Youtube Video for Benghazi Terrorist Attack as Coffins Arrive

Our Fallen Heroes

Published on Sep 15, 2012

President Obama speaks about the tragic loss of four of our fellow Americans who were serving in our diplomatic post in Benghazi, Libya. These Americans represented the best of our country; without people like them, we could not sustain our freedoms or security, or provide the leadership that the entire world depends on. During this time of turmoil in many different countries, the President makes it clear that the United States has a profound respect for people of all faiths, but as Commander in Chief, he will never tolerate efforts to harm our fellow Americans and will ensure that those who attack our people find no escape from justice.

Obama and Press Secretary Carney Blame a Video for the Benghazi Attack

YouTube Video Maker Blamed for Benghazi Attacks Breaks Silence on CNN

White House Covers Up Benghazi Terrorist Attack

13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined.

ABC News’ Jon Karl hammers Jay Carney over New bombshell Benghazi emails

Benghazi Whistleblower Embarrassed by Obama Admin Placing Blame on a YouTube Video

Benghazi Gate – Rand Paul and Hillary Clinton – Question & Answer

Email Reveals Obama Advisor Urged Susan Rice to Blame Video for Benghazi

Exclusive: Docs Show Weapons Going From Benghazi To Syria – Benghazi Gate – Happening Now

Breaking: Hillary Clinton Knew About Libyan Arms Shipments to Syria in 2011

Secretary of State Hillary Clinton knew that the US was sending arms from Libya to Syria back in 2011. She denied this during public testimony (under oath) in early 2013 after the Benghazi terrorist attack.

Melvin Goodman on why CIA Director Brennan is dangerous

The show is going to be about the response to CIA director Brennan’s press conference two weeks ago and then an appearance at the Council on Foreign Relations last week, an on the record interview with Charlie Rose in New York about his plans to restructure the CIA to try to bring a more integrity to intelligence and make it less politicized. We are going to hear from today Melvin Goodman. Goodman is a senior fellow at the Center for International Policy and a professor of government at Johns Hopkins University. He is he is a former CIA analyst. Melvin Goodman is the author of Failure of Intelligence: the Decline and Fall of the CIA and the forthcoming book On the Path to Dissent: A Whistleblower at the CIA. Goodman is the national security columnist for Counterpunch, and he said of CIA director ‘s plan to restructure the CIA and I quote “Simply, it takes the CIA further from Truman’s concept and closer to the ability to politicize intelligence. Operations are part of the policy world and not the intelligence world. The Centers have made it too easy to provide the intelligence that the ‘masters’ desire, whether they are the masters on CIA’s 7th floor or the policy masters. Brennan’s world was the Center for Counterintelligence and Counterterrorism, and many of the intelligence errors and operational errors of the past 15 years have emanated from those centers. Organizationally, it makes no sense — what are the directorates of operations and analysis — they sound as if they are HR experts.”

CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels

Retired Lt. Gen. Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi

Clinton Donors Got Weapons Deals From Hillary

Even by the standards of arms deals between the United States and Saudi Arabia, this one was enormous. A consortium of American defense contractors led by Boeing would deliver $29 billion worth of advanced fighter jets to the United States’ oil-rich ally in the Middle East…E

Why is Benghazi still a big issue for Hillary Clinton? BBC News

General Petraeus Testifies Before Congress For The First Time Since Resigning As Director Of CIA

Select Committee on Benghazi Holds First Hearing

Former CIA Director and General David Petraeus (Ret.) testified at a hearing on U.S. policy toward the Middle East and combating ISIS* in the region. He talked about his support for military enclaves in Syria and for greater military action against Syrian President Bashar al-Assad and ISIS. He also gave his assessment of the Russian military build-up in Syria and of the Iran nuclear agreement.

At the beginning of his testimony, General Petraeus apologized for what what he called his “serious mistake” of sharing classified information with his biographer, with whom he also had an extramarital affair.

Select Committee on Benghazi Holds Second Hearing

Select Committee on Benghazi Holds Third Hearing

Rep. Gowdy: Either Petraeus Will Come Before Congressional Committee Or He Will Be Subpoenaed



Benghazi Select Committee (Hearing 4)

House Select Committee on Benghazi

Trey Gowdy Opening Statement Benghazi Committee Hearing. 10/22/2015

Rep. Trey Gowdy addresses Former Secretary of State Hillary Clinton during his opening statement at a hearing Thursday by the House Select Committee on Benghazi. trey gowdy elivers opening statement of benghazi committee hearing with hillary clinton. trey gowdy says ‘We are going to find the #Truth because there is no expiration of it.’ Chairman Trey Gowdy opens #Benghazi hearing: ‘Previous investigations were not thorough. Trey Gowdy to Clinton: Trey Gowdy addressed former Secretary of State Hillary Clinton personally at a high-stakes hearing on Thursday, telling the Democratic presidential candidate that the panel’s investigation is not about her. “Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you,” Gowdy said. “Let me assure you it is not. And let me assure you why it is not. This work is about something much more important than any single person. It is about four U.S. government workers, including our Ambassador, murdered by terrorists on foreign soil. It is about what happened before, during, and after the attacks that killed these four men.” He continued: “It is about what this country owes those who risk their lives to serve it. It is about the fundamental obligation of our government to tell the truth — always — to the American people. Not a single member of this Committee signed up for an investigation into you or your email system. We signed up because we wanted to honor the service and sacrifice of four people sent to a foreign land to represent us – who were killed – and do everything we can to prevent it from happening to others.” Gowdy also presented several key questions he would be asking in his opening statement: Why were there so many requests for more security personnel and equipment, and why were those requests denied in Washington? Why did the State Department compound in Benghazi not even come close to meeting proper security specifications? What policies were we pursuing in Libya that required a physical presence in spite of the escalating violence? Who in Washington was aware of the escalating violence in Libya? What special precautions, if any, were taken on the anniversary of 9-11? What happened in Washington after the first attack and what was the response to that attack? What did the military do or not do? What did our leaders in Washington do or not do and when? Why was the American public given such divergent accounts of what caused these attacks? And why is it so hard to get information from the very government these four men were representing and serving and sacrificing for?

Benghazi panel chair: Investigation not about Hillary Clinton

South Carolina Rep. Trey Gowdy, the chairman of the House Select Committee investigating Benghazi, tells Hillary Clinton in his opening statement that the probe is not singularly focused on the former secretary of state.

Benghazi hearing: Hillary Clinton’s entire statement

Hillary Clinton gave her opening statement to the House Select Committee investigating the 2012 attacks at the U.S. Embassy in Benghazi, Libya.

Benghazi Hearing Committee Chairman on Hillary Clinton’s Emails | The New York Times

Trey Gowdy questions Hillary Clinton (Part 1)

Trey Gowdy questions Hillary Clinton (Part 2)

Clinton to panel: 3 things we learned from Benghazi

Trey Gowdy GRILLS Hillary Clinton Benghazi Committee Hearing

Trey Gowdy GRILLS Hillary Clinton during the Benghazi Committee Hearing. trey gowdy went off on hillary clinton about blumenthal and more. watch the explosive exchange. Hillary Clinton coolly hit back at her Republican interrogators on the Benghazi committee during her long-awaited testimony on Thursday, rebuffing claims she was detached as the situation in Libya deteriorated and asserting she did not use email to conduct the “vast majority” of her work as secretary of state.

The Democratic front-runner told the House Selection Committee on Benghazi, which is 18 months into its probe of the 2012 attacks on the consulate in Libya, that the tragedy does not deserve partisan attacks, while insisting the U.S. needs to stay committed to diplomatic engagement.

“Despite all the previous investigations and all the talk about partisan agendas, I’m here to honor those we lost and to do what I can to aid those who serve us still,” Clinton said, speaking slowly and deliberately during her opening statement. “My challenge to you, members of this committee, is the same challenge I put to myself…. Let’s be worthy of the trust the American people bestow on us… they expect us to rise above partisanship. And I hopes it’s what we’ll strive for today and in the future.”

Republicans questioned Clinton about why numerous requests for additional security never made it Clinton’s attention. She said they went to the right place: to personnel who handled security. And when they pressed her on why she kept the compound open or did not give it additional, she retorted that she never received a recommendation to shut down the mission—even after two attacks on the compound.

The hearing kicked off on Thursday with the partisan sniping that has been the hallmark of the committee’s work, with House Benghazi Committee Chairman Trey Gowdy defended his investigation, assuring Clinton that his probe is not centered on her.
Hour_2_151022_hillary_clinton_2_gty_1160­.jpg

WATCH LIVE: Hillary Clinton testifies before Benghazi Committee

“Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you. Let me assure you it is not,” Gowdy said in his opening statement, adding that it was about the people who were killed.

He also blamed her in part for the fact that the inquiry has dragged on for a year and a half.

The State Department only realized it did not have Clinton’s emails after they requested documents, triggering a lengthy process by which the department had to ask her and her top aides who also sometimes used private email for work purposes to turn them over.

“You had an unusual email arrangement with yourself, which meant the State Department could not produce your emails to us,” Gowdy said. “When you left the State Department you kept those public records to yourself for almost two years….Those decisions were your decisions, not ours… It just took longer to get them and garnered more attention in the process.

Ranking Democrat Elijah Cummings (D-Md.) blasted the committee as a partisan witch-hunt out to get Clinton, saying Republicans formed the panel because they “did not like the answers they got” in previous probe—“so they set up this select committee with no rules, no deadlines and a unlimited budget.”

“They set the noose because you’re running for president,” Cummings said, raising his voice before calling for the panel to disband. “It is time for Republicans to end this …fishing expedition.”

It only took Cummings a few minutes to highlight a number of embarrassing moments for Gowdy in recent weeks, including comments by Majority Leader Kevin McCarthy (R-Calif.), Rep. Richard Hanna (R-N.Y) and a fired GOP Benghazi investigator who all suggested the panel was either out to hurt Clinton or increasingly focused on investigating her.

REP. Martha Roby vs Hillary Clinton at House Select Committee on Benghazi 10/22/15

Rep Jim Jordan Goes After Hillary ‘Where’d the False Narrative Start It Started With You’

REP Trey Gowdy vs Hillary Clinton Round 2 at House Select Committee on Benghazi 102215

Benghazi Select – Gowdy: this is an investigation, not a prosecution

Bickering among Benghazi panel as Clinton looks on silently

Fireworks erupt between Clinton, Republicans at Benghazi hearing



More Background Information

Weekly Address: Carrying on the Work of

America’s intelligence community, explained

THE RECRUIT – Spy School: Inside the CIA Training Program, 1 of 2

THE RECRUIT – Spy School: Inside the CIA Training Program, 2 of 2

Special Activities Division

Published on Aug 15, 2014

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service (NCS) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the government of the United States may deny all knowledge.

Inside America’s New Covert Wars: Navy SEALs, Delta Force, Blackwater, Security Contractors (2013)

The Daring Early Years of the CIA: Covert Ops from WW2 to Vietnam (1995)

How has the CIA been used as a secret Military force? William Blum • BRAVE NEW FILMS

The CIA began as a spy agency after World War Two, but soon the CIA was planning and executing covert operations across the globe without proper congressional oversight. From the removal of the democratically elected leaders of Iran and Guatemala to the attempted invasion of Cuba, to the removal of every secular government in the Middle East, the influence of the agency is insidious. But how can a democratic society tolerate such a secret and lethal institution that works against the very values America seeks to uphold around the world?

CIA Covert Operations in Africa: How Does the U.S. Government Make Decisions?

According to the Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation. It is normally financed by government revenues but in this age of super-empowered individuals and corporations they could become a common tool of power beyond traditional war and diplomacy.

Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action. The CIA’s authority to conduct covert action comes from the National Security Act of 1947. President Ronald Reagan issued Executive Order 12333 titled in 1984. This order defined covert action as “special activities”, both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e). The CIA must have a “Presidential Finding” issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act. These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives. As a result of this framework, the CIA “receives more oversight from the Congress than any other agency in the federal government”. The Special Activities Division (SAD) is a division of the CIA’s National Clandestine Service, responsible for Covert Action and “Special Activities”. These special activities include covert political influence and paramilitary operations. The division is overseen by the United States Secretary of State.

Special Activities Division – Special Operations Group | SAD SOG

Published on Jun 30, 2015

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action. The Special Activities Division reports directly to the Deputy Director of the National Clandestine Service.

Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the United States government may deny all knowledge.

SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU and ISA, as well as other United States special operations forces, such as USNSWC, MARSOC, Special Forces, SEALs and 24th STS.

SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.

REVEALED: If This Is True, Benghazi Is Even Worse Than We Ever Thought

Insiders Come Forward, Proof of Benghazi Stand Down Order, It was Obama

Obama Lies About Libya – Imperial Presidency

Media Silent About Obama’s Undeclared Wars

Did the Military Intervention in Libya Succeed? (Benjamin Friedman)

Drones are Obama’s weapon of choice for waging illegal and undeclared wars

Special Activities Division

From Wikipedia, the free encyclopedia

Seal of the Central Intelligence Agency

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency‘s (CIA) Directorate of Operations (DO) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.[1] The Special Activities Division reports directly to the Deputy Director for the Directorate of Operations.

Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection ofintelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated.[2] As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government.[3] If they are compromised during a mission, the United States government maydeny all knowledge.[4]

SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU, ISA, and 24th STS, as well as other United States special operations forces, such as USNSWC, MARSOC, Green Berets, SEALs, SWCC, Force Recon, Pararescuemen,Combat Controllers, and Army Rangers.

SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.[5]

Political Action Group (PAG) is responsible for covert activities related to political influence, psychological operations and economic warfare. The rapid development of technology has added cyberwarfare to their mission. Tactical units within SAD are also capable of carrying out covert political action while deployed in hostile and austere environments. A large covert operation usually has components that involve many, or all, of these categories, as well as paramilitary operations. Political and Influence covert operations are used to support U.S. foreign policy. Often overt support for one element of an insurgency would be counter-productive due to the impression it would have on the local population. In such cases, covert assistance allows the U.S. to assist without damaging these elements in the process. Many of the other activities (such as propaganda, economic and cyber) support the overall political effort. There have been issues in the past with attempts to influence the US media such as in Operation Mockingbird. However, these activities are now subject to the same oversight as all covert action operations.[6]

Overview

SAD provides the President of the United States with an option when overt military and/or diplomatic actions are not viable or politically feasible. SAD can be directly tasked by the President of the United States or the National Security Council at the President’s direction. This is unlike any other U.S. special mission force. However, SAD/SOG has far fewer members than most of the other special missions units, such as the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force) or Naval Special Warfare Development Group (DEVGRU).[7][8][9]

As the action arm of the DO, SAD/SOG conducts direct action missions such as raids, ambushes, sabotage, targeted killings[10][11][12] and unconventional warfare(e.g., training and leading guerrilla and military units of other countries in combat). SAD/SOG also conducts special reconnaissance, that can be either military orintelligence driven, but is carried out by Paramilitary Officers (also called Paramilitary Operatives) when in “non-permissive environments“. Paramilitary Operations Officers are also fully trained case officers (i.e., “spies”) and as such conduct clandestine human intelligence (HUMINT) operations throughout the world.[13]SAD/SOG officers are selected from the most elite U.S. military units.[9]

The political action group within SAD conducts the deniable psychological operations, also known as black propaganda, as well as “Covert Influence” to effect political change as an important part of any Administration’s foreign policy.[1] Covert intervention in a foreign election is the most significant form of political action. This could involve financial support for favored candidates, media guidance, technical support for public relations, get-out-the-vote or political organizing efforts, legal expertise, advertising campaigns, assistance with poll-watching, and other means of direct action. Policy decisions could be influenced by assets, such as subversion of officials of the country, to make decisions in their official capacity that are in the furtherance of U.S. policy aims. In addition, mechanisms for forming and developing opinions involve the covert use of propaganda.[14]

Propaganda includes leaflets, newspapers, magazines, books, radio, and television, all of which are geared to convey the U.S. message appropriate to the region. These techniques have expanded to cover the internet as well. They may employ officers to work as journalists, recruit agents of influence, operate media platforms, plant certain stories or information in places it is hoped it will come to public attention, or seek to deny and/or discredit information that is public knowledge. In all such propaganda efforts, “black” operations denote those in which the audience is to be kept ignorant of the source; “white” efforts are those in which the originator openly acknowledges himself; and “gray” operations are those in which the source is partly but not fully acknowledged.[14][15]

Some examples of political action programs were the prevention of the Italian Communist Party (PCI) from winning elections between 1948 and the late 1960s; overthrowing the governments of Iran in 1953, and Guatemala in 1954; arming rebels in Indonesia in 1957; and providing funds and support to the trade unionfederation Solidarity following the imposition of martial law in Poland after 1981.[16]

SAD’s existence became better known as a result of the “Global War on Terror“. Beginning in autumn of 2001, SAD/SOG paramilitary teams arrived in Afghanistanto hunt down al-Qaeda leaders, facilitate the entry of U.S. Army Special Forces and lead the United Islamic Front for the Salvation of Afghanistan against the rulingTaliban. SAD/SOG units also defeated Ansar al-Islam in Iraqi Kurdistan prior to the invasion of Iraq in 2003[17][18] and trained, equipped, organized and led theKurdish peshmerga forces to defeat the Iraqi army in northern Iraq.[13][17] Despite being the most covert unit in U.S. Special Operations, numerous books have been published on the exploits of CIA paramilitary officers, including Conboy and Morrison’s Feet to the Fire: CIA Covert Operations in Indonesia,[19] and Warner’sShooting at the Moon: The Story of America’s Clandestine War in Laos.[20] Most experts consider SAD/SOG the premiere force for unconventional warfare (UW), whether that warfare consists of either creating or combating an insurgency in a foreign country.[7][21][22]

SOCOM.jpg

There remains some conflict between the National Clandestine Service and the more clandestine parts of the United States Special Operations Command (USSOCOM),[23] such as the Joint Special Operations Command. This is usually confined to the civilian/political heads of the respective Department/Agency. The combination of SAD and USSOCOM units has resulted in some of the most notable successes of the wars in Iraq and Afghanistan, to include the locating and killing of Osama bin Laden.[22][24] SAD/SOG has several missions. One of these missions is the recruiting, training, and leading of indigenous forces in combat operations.[22] SAD/SOG and its successors have been used when it was considered desirable to have plausible deniability about U.S. support (this is called a covert operation or “covert action”).[13] Unlike other special missions units, SAD/SOG operatives combine special operations and clandestine intelligence capabilities in one individual.[9] These individuals can operate in any environment (sea, air or ground) with limited to no support.[7]

Covert action

Under U.S. law, the CIA is authorized to collect intelligence, conduct counterintelligence and to conduct covert action by the National Security Act of 1947.[1]President Ronald Reagan issued Executive Order 12333 titled “United States Intelligence Activities” in 1984. This order defined covert action as “special activities,” both political and military, that the U.S. government would deny, granting such operations exclusively to the CIA. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and mirrored in Title 50 of the United States Code Section 413(e).[1][22] The CIA must have a presidential findingissued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act.[25]These findings are then monitored by the oversight committees in both the U.S. Senate, called the Senate Select Committee on Intelligence (SSCI) and the U.S. House of Representatives, called the House Permanent Select Committee on Intelligence (HPSCI).[26]

The Pentagon commissioned a study to determine whether the CIA or the U.S. Department of Defense (DoD) should conduct covert action paramilitary operations. Their study determined that the CIA should maintain this capability and be the “sole government agency conducting covert action.” The DoD found that, even under U.S. law, it does not have the legal authority to conduct covert action, nor the operational agility to carry out these types of missions.[27] The operation in May 2011 that resulted in the death of Osama bin Laden was a covert action under the authority of the CIA.[24][28]

Selection and training

SAD/SOG has several hundred officers, mostly former members of special operations forces (SOF) and a majority from theJoint Special Operations Command (JSOC).[29] The CIA has also recruited individuals within the agency.[30] The CIA’s formal position for these individuals is “Paramilitary Operations Officers” and “Specialized Skills Officers.” Paramilitary Operations Officers attend the Clandestine Service Trainee (CST) program, which trains them as clandestine intelligence operatives (known as “Core Collectors” within the Agency). The primary strengths of SAD/SOG Paramilitary Officers are operational agility, adaptability, and deniability. They often operate in small teams, typically made up of six operators (with some operations being carried out by a single officer), all with extensive military special operations expertise and a set of specialized skills that does not exist in any other unit.[9] As fully trained intelligence case officers, Paramilitary Operations Officers possess all the clandestine skills to collect human intelligence—and most importantly—to recruit assets from among the indigenous troops receiving their training. These officers often operate in remote locations behind enemy lines to carry out direct action (including raids and sabotage), counter-intelligence, guerrilla/unconventional warfare, counter-terrorism, and hostage rescue missions, in addition to being able to conduct espionage via HUMINT assets.

There are four principal elements within SAD’s Special Operations Group: the Air Branch, the Maritime Branch, the Ground Branch, and the Armor and Special Programs Branch. The Armor and Special Programs Branch is charged with development, testing, and covert procurement of new personnel and vehicular armor and maintenance of stockpiles of ordnance and weapons systems used by SOG, almost all of which must be obtained from clandestine sources abroad, in order to provide SOG operatives and their foreign trainees with plausible deniability in accordance with U.S. Congressional directives.

Together, SAD/SOG contains a complete combined arms covert military. Paramilitary Operations Officers are the core of each branch and routinely move between the branches to gain expertise in all aspects of SOG.[30] As such, Paramilitary Operations Officers are trained to operate in a multitude of environments. Because these officers are taken from the most highly trained units in the U.S. military and then provided with extensive additional training to become CIA clandestine intelligence officers, many U.S. security experts assess them as the most elite of the U.S. special missions units.[31]

SAD, like most of the CIA, requires a bachelor’s degree to be considered for employment. Many have advanced degrees such as Master’s and law degrees.[32]Many candidates come from notable schools, many from Ivy League institutions and United States Service Academies, but the majority of recruits today come from middle-class backgrounds.[33] SAD officers are trained at Camp Peary, Virginia (also known as “The Farm”) and at privately owned training centers around the United States. They also train its personnel at “The Point” (Harvey Point), a facility outside of Hertford, North Carolina.[34][35] In addition to the eighteen months of training in the Clandestine Service Trainee (CST) Program[36] required to become a clandestine intelligence officer, Paramilitary Operations Officers are trained to a high level of proficiency in the use and tactical employment of an unusually wide degree of modern weaponry, explosive devices and firearms (foreign and domestic), hand to hand combat, high performance/tactical driving (on and off road), apprehension avoidance (including picking handcuffs and escaping from confinement), improvised explosive devices, cyberwarfare, covert channels, Military Free Fall parachuting, combat and commercial SCUBA and closed circuit diving, proficiency in foreign languages, surreptitious entry operations (picking or otherwise bypassing locks), vehicle hot-wiring, Survival, Evasion, Resistance and Escape(SERE), extreme survival and wilderness training, combat EMS medical training, tactical communications, and tracking.

History

World War II

While the World War II Office of Strategic Services (OSS) was technically a military agency under the Joint Chiefs of Staff, in practice it was fairly autonomous of military control and enjoyed direct access to President Franklin D. Roosevelt. Major General William Joseph Donovan was the head of the OSS. Donovan was a soldier and Medal of Honor recipient from World War I. He was also a lawyer and former classmate of FDR at Columbia Law School.[37] Like its successor, the CIA, OSS included both human intelligence functions and special operations paramilitary functions. Its Secret Intelligence division was responsible for espionage, while its Jedburgh teams, a joint U.S.-UK-French unit, were forerunners of groups that create guerrilla units, such as the U.S. Army Special Forces and the CIA. OSS’ Operational Groups were larger U.S. units that carried out direct action behind enemy lines. Even during World War II, the idea of intelligence and special operations units not under strict military control was controversial. OSS operated primarily in the European Theater of Operations (ETO) and to some extent in the China-Burma-India Theater, while General of the Army Douglas MacArthur was extremely reluctant to have any OSS personnel within his area of operations.

From 1943 to 1945, the OSS also played a major role in training Kuomintang troops in China and Burma, and recruited other indigenous irregular forces for sabotage as well as guides for Allied forces in Burma fighting the Japanese army. OSS also helped arm, train and supply resistance movements, including Mao Zedong‘s People’s Liberation Army in China and the Viet Minh in French Indochina, in areas occupied by the Axis powers. Other functions of the OSS included the use ofpropaganda, espionage, subversion, and post-war planning.

One of the OSS’ greatest accomplishments during World War II was its penetration of Nazi Germany by OSS operatives. The OSS was responsible for training German and Austrian commandos for missions inside Nazi Germany. Some of these agents included exiled communists and socialist party members, labor activists, anti-Nazi POWs, and German and Jewish refugees. At the height of its influence during World War II, the OSS employed almost 24,000 people.[38]

OSS Paramilitary Officers parachuted into many countries then behind enemy lines, including France, Norway, Greece and The Netherlands. In Crete, OSS paramilitary officers linked up with, equipped and fought alongside Greek resistance forces against the Axis occupation.

OSS was disbanded shortly after World War II, with its intelligence analysis functions moving temporarily into the U.S. Department of State. Espionage and counterintelligence went into military units, while paramilitary and related functions went into an assortment of ‘ad hoc’ groups, such as the Office of Policy Coordination. Between the original creation of the CIA by the National Security Act of 1947 and various mergers and reorganizations through 1952, the wartime OSS functions generally went into CIA. The mission of training and leading guerrillas generally stayed in the United States Army Special Forces, but those missions required to remain covert were folded into the paramilitary arm of the CIA. The direct descendant of the OSS’ Special Operations is the CIA’s Special Activities Division.

Tibet

After the Chinese invasion of Tibet in October 1950, the CIA inserted SAD paramilitary teams into Tibet to train and lead Tibetan resistance fighters against thePeople’s Liberation Army of China. These teams selected and then trained Tibetan soldiers in the Rocky Mountains of the United States;[39] training occurred atCamp Hale.[40][41] The SAD teams then advised and led these commandos against the Chinese, both from Nepal and India. In addition, SAD Paramilitary Officers were responsible for the Dalai Lama‘s clandestine escape to India, narrowly escaping capture and certain execution by the Chinese government.[39]

According to a book by retired CIA officer John Kenneth Knaus, entitled Orphans Of The Cold War: America And The Tibetan Struggle For Survival, Gyalo Thondup, the older brother of the 14th (and current) Dalai Lama, sent the CIA five Tibetan recruits. These recruits were then trained in paramilitary tactics on the island ofSaipan in the Northern Marianas.[42] Shortly thereafter, the five men were covertly returned to Tibet “to assess and organize the resistance” and selected another 300 Tibetans for training. U.S. assistance to the Tibetan resistance ceased after the 1972 Nixon visit to China, after which the United States and China normalized relations.[43]

Korea

The CIA sponsored a variety of activities during the Korean War. These activities included maritime operations behind North Korean lines. Yong Do Island, connected by a rugged isthmus to Pusan, served as the base for those operations. These operations were carried out by well-trained Korean guerrillas. The four principal U.S. advisers responsible for the training and operational planning of those special missions were Dutch Kramer, Tom Curtis, George Atcheson and Joe Pagnella. All of these Paramilitary Operations Officers operated through a CIA front organization called the Joint Advisory Commission, Korea (JACK), headquartered at Tongnae, a village near Pusan, on the peninsula’s southeast coast.[44] These paramilitary teams were responsible for numerous maritime raids and ambushes behind North Korean lines, as well as prisoner of warrescue operations. These were the first maritime unconventional warfare units that trained indigenous forces as surrogates. They also provided a model, along with the other CIA-sponsored ground based paramilitary Korean operations, for theMilitary Assistance Command, Vietnam-Studies and Observations Group (MACV-SOG) activities conducted by the U.S. military and the CIA/SAD in Vietnam.[7][44] In addition, CIA paramilitary ground-based teams worked directly for U.S. military commanders, specifically with the 8th Army, on the “White Tiger” initiative. This initiative included inserting South Korean commandos and CIA Paramilitary Operations Officers prior to the two major amphibious assaults on North Korea, including the landing at Inchon.[7]

Cuba (1961)

Main article: Bay of Pigs Invasion

Map showing the location of the Bay of Pigs

The Bay of Pigs Invasion (known as “La Batalla de Girón”, or “Playa Girón” in Cuba), was an unsuccessful attempt by a U.S.-trained force of Cuban exiles to invade southern Cuba and overthrow the Cuban government of Fidel Castro. The plan was launched in April 1961, less than three months after John F. Kennedy assumed the presidency of the United States. TheCuban Revolutionary Armed Forces, trained and equipped by Eastern Bloc nations, defeated the exile-combatants in three days.

The sea-borne invasion force landed on April 17, and fighting lasted until April 19, 1961. CIA Paramilitary Operations OfficersGrayston Lynch and William “Rip” Robertson led the first assault on the beaches, and supervised the amphibious landings.[45] Four American aircrew instructors from Alabama Air National Guard were killed while flying attack sorties.[45]Various sources estimate Cuban Army casualties (killed or injured) to be in the thousands (between 2,000 and 5,000).[46] This invasion followed the successful overthrow by the CIA of the Mosaddeq government in Iran in 1953[47] and Arbenz government in Guatemala in 1954,[48] but was a failure both militarily and politically.[49] Deteriorating Cuban-American relations were made worse by the 1962 Cuban Missile Crisis.

Bolivia

The National Liberation Army of Bolivia (ELN-Ejército de Liberación Nacional de Bolivia) was a communist guerrilla force that operated from the remote Ñancahuazú region against the pro-U.S. Bolivian government. They were joined by Che Guevara in the mid-1960s.[50][51] The ELN was well equipped and scored a number of early successes against the Bolivian army in the difficult terrain of the mountainous Camiri region