Reviews

Neal Stephenson and J. Frederick George — Interface

Posted on February 25, 2015. Filed under: Blogroll, Books, College, Communications, Computers, Documentary, Economics, Education, Employment, Family, Federal Government, Fiction, Freedom, Friends, history, Investments, Law, liberty, Life, Links, media, Money, People, Photos, Politics, Raves, Resources, Reviews, Systems, Talk Radio, Video, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , |

stephensonInterface-Neal-Stephenson-Paperback15-lge neal-stephenson

Neal Stephenson on Optimism

Neal Stephenson Discusses Why His Novels Haven’t Been Made Into Movies

Neal Stephenson – “We Are All Geeks Now.”

Neal Stephenson on Anathem: The genesis of the novel and its main ideas

Neal Stephenson Creates a New Language for ANATHEM

Authors@Google: Neal Stephenson

Authors Neal Stephenson visits Google’s Headquarters in Mountain View, Ca, to discuss his book “Anathem”. This event took place September 12, 2008, as part of the Authors@google series. For more info, please visit http://www.nealstephenson.com/

Anathem, the latest invention by the New York Times bestselling author of Cryptonomicon and The Baroque Cycle, is a magnificent creation: a work of great scope, intelligence, and imagination that ushers readers into a recognizable—yet strangely inverted—world.

Fraa Erasmas is a young avout living in the Concent of Saunt Edhar, a sanctuary for mathematicians, scientists, and philosophers, protected from the corrupting influences of the outside “saecular” world by ancient stone, honored traditions, and complex rituals. Over the centuries, cities and governments have risen and fallen beyond the concent’s walls. Three times during history’s darkest epochs violence born of superstition and ignorance has invaded and devastated the cloistered mathic community. Yet the avout have always managed to adapt in the wake of catastrophe, becoming out of necessity even more austere and less dependent on technology and material things. And Erasmas has no fear of the outside—the Extramuros—for the last of the terrible times was long, long ago.

Neal Stephenson is the author of seven previous novels. He lives in Seattle, Washington.

Neal Stephenson interview – Reamde

Solve for X: Neal Stephenson on getting big stuff done

Neal Stephenson: 2011 National Book Festival

2012 10 18 LTA Bookclub Neal StephensonHQ

Black Hat USA 2012 – An Interview with Neal Stephenson

Neal Stephenson, Author – Turing Festival 2013 Keynote

ASTC 2013 Keynote – A Conversation with Neal Stephenson

Neal Stephenson is Awesome

 

Neal Stephenson

From Wikipedia, the free encyclopedia
Neal Stephenson
Neal Stephenson 2008 crop.jpg
Stephenson at Science Foo Camp 2008

BornNeal Town Stephenson
October 31, 1959 (age 55)
Fort Meade, Maryland, United StatesPen nameStephen Bury
(with J. Frederick George)OccupationNovelist, short story writer, essayistNationalityAmericanPeriod1984–presentGenreSpeculative fiction, historical fiction, essaysLiterary movementcyberpunk, postcyberpunk,maximalismWebsitenealstephenson.com

Neal Town Stephenson (born October 31, 1959) is an American writer and game designer known for his works of speculative fiction.

His novels have been variously categorized as science fiction, historical fiction, cyberpunk, and “postcyberpunk“. Other labels, such as “baroque“, often appear.

Stephenson explores subjects such as mathematics, cryptography, philosophy, currency, and the history of science. He also writes non-fiction articles about technology in publications such as Wired.

He has worked part-time as an advisor for Blue Origin, a company (funded by Jeff Bezos) developing a manned sub-orbital launch system, and is also a cofounder ofSubutai Corporation, whose first offering is the interactive fiction project The Mongoliad. He has also written novels with his uncle, George Jewsbury (“J. Frederick George”), under the collective pseudonym Stephen Bury.

Life

Born on October 31, 1959 in Fort Meade, Maryland,[1] Stephenson came from a family of engineers and scientists; his father is a professor of electrical engineering while his paternal grandfather was a physics professor. His mother worked in a biochemistry laboratory, and her father was a biochemistry professor. Stephenson’s family moved to Champaign-Urbana, Illinois, in 1960 and then in 1966 to Ames, Iowa. He graduated from Ames High School in 1977.[2]

Stephenson studied at Boston University,[2] first specializing in physics, then switching to geography after he found that it would allow him to spend more time on the university mainframe.[3] He graduated in 1981 with a B.A. in geography and a minor in physics.[2] Since 1984, Stephenson has lived mostly in the Pacific Northwest and currently resides in Seattle with his family.[2]

Career

Discussing Anathem at MIT in 2008

Stephenson’s first novel, The Big U, published in 1984, was a satirical take on life at American Megaversity, a vast, bland and alienating research university beset by chaotic riots.[4][5] His next novel, Zodiac (1988), was a thriller following the exploits of a radical environmentalist protagonist in his struggle against corporate polluters.[4] Neither novel attracted much critical attention on first publication, but showcased concerns that Stephenson would further develop in his later work.[4] The Big U went out of print until 2001, when Stephenson allowed it to be republished after realizing that this book that he considered inferior to his others was being sold at inflated prices for used copies because of its scarcity and collectors’ value.[citation needed]

Stephenson’s breakthrough came in 1992 with Snow Crash,[5] a comic [6] novel in the late cyberpunk or post-cyberpunk tradition fusing memetics, computer viruses, and other high-tech themes with Sumerian mythology, along with a sociological extrapolation of laissez-faire capitalism and collectivism. Snow Crash can be considered to be the first expression of Stephenson’s mature style. Stephenson at this time would later be described by Mike Godwin as “a slight, unassuming grad-student type whose soft-spoken demeanor gave no obvious indication that he had written the manic apotheosis of cyberpunk science fiction.”[7] In 1994, Stephenson joined with his uncle, J. Frederick George, to publish a political thriller, Interface, under the pen name “Stephen Bury”;[8] they followed this in 1996 with The Cobweb.

Stephenson’s next solo novel, published in 1995, was The Diamond Age: or A Young Lady’s Illustrated Primer, which introduced many of today’s real world technological discoveries. Seen back then as futuristic, Stephenson’s novel has broad range universal self-learning nanotechnology, dynabooks, extensive modern technologies, robotics, cybernetics and cyber cities. Weapons implanted in characters’ skulls, near limitless replicators for everything from mattresses to foods, smartpaper, air and blood-sanitizing nanobots, set in a grim future world of limited resources populated by hard edged survivalists, an amalgamation hero is accidentally conceptualized by a few powerful and wealthy creatives, programmers and hackers.

This was followed by Cryptonomicon in 1999, a novel concerned with concepts ranging from computing and Alan Turing‘s research into codebreaking and cryptography during the Second World War at Bletchley Park, to a modern attempt to set up a data haven. It has subsequently been reissued in three separate volumes in some countries, including in French and Spanish translations. In 2013, Cryptonomicon won thePrometheus Hall of Fame Award.

The Baroque Cycle, Stephenson’s next novel, is a series of long historical novels set in the 17th and 18th centuries, and is in some respects a prequel to Cryptonomicon. It was originally published in three volumes of two or three books each – Quicksilver (2003), The Confusion (2004) and The System of the World (2004) – but was subsequently republished as eight separate books: Quicksilver, King of the Vagabonds, Odalisque,Bonanza, Juncto, Solomon’s Gold, Currency, and System of the World. (The titles and exact breakdown varies in different markets.) The System of the World won the Prometheus Award in 2005.

Following this, Stephenson published a novel titled Anathem (2008), a very long and detailed work, perhaps best described as speculative fiction. It is set in an Earthlike world (perhaps in an alternative reality), deals with metaphysics, and refers heavily to Ancient Greek philosophy, while at the same time being a complex commentary on the insubstantiality of today’s society.

In May 2010, the Subutai Corporation, of which Stephenson was named chairman, announced the production of an experimental multimedia fiction project called The Mongoliad, which centered around a narrative written by Stephenson and other speculative fiction authors.[9][10]

REAMDE, a novel, was released on September 20, 2011.[11] The title is a play on the common filename README. This thriller, set in the present, centers around a group of MMORPG developers caught in the middle of Chinese cyber-criminals, Islamic terrorists, and Russian mafia.[12]

On August 7, 2012, Stephenson released a collection of essays and other previously published fiction entitled Some Remarks : Essays and Other Writing.[13] This collection also includes a new essay and a short story created specifically for this volume.

In 2012 Stephenson launched a Kickstarter campaign for CLANG, a realistic swordfighting fantasy game. The game uses motion control to provide an immersive experience. The game will contain a distinctive world and plotline. The campaign’s funding goal of $500,000 was reached by the target date of July 9, 2012 on Kickstarter, but funding options remained open and were still taking contributions to the project on their official site.[14] The project ran out of money in September 2013.[15] This, and the circumstances around it, has angered some backers.[16] There has even been talk, among the backers, of a potential class action lawsuit.[17] The project to develop the game ended in September 2014 without the game being completed. Stephenson took part of the responsibility for the project’s failure, stating that “I probably focused too much on historical accuracy and not enough on making it sufficiently fun to attract additional investment”.[18]

In late 2013, Stephenson claimed to be working on a multi-volume work, historical novels that would “have a lot to do with scientific and technological themes and how those interact with the characters and civilisation during a particular span of history”. He expected the first two volumes to be released in mid-to-late 2014.[19] However, at about the same time, he shifted his attention to a science fiction novel, Seveneves, which was completed about a year later and will be published in May of 2015.[20]

In 2014, Stephenson was hired as Chief Futurist[21] by the Florida-based company Magic Leap. Magic Leap claims to be developing a revolutionary form of augmented reality, not too different from technologies Stephenson previously has described in his science fiction books.

Non-fiction

The science fiction approach doesn’t mean it’s always about the future;
it’s an awareness that this is different.

– Neal Stephenson, September 1999[22]

Stephenson has also written non-fiction. In The Beginning Was The Command Line, an essay on operating systems including the histories of and relationships between DOS, Windows, Linux, and BeOS from both cultural and technical viewpoints and focusing especially on the development of the Graphical User Interface, was published in book form in 2000.[5] Various other essays have been published in magazines such as Wired.

With the 2003 publication of Quicksilver, Applied Minds debuted The Metaweb, an online wiki annotating the ideas and historical period explored in the novel. The project was influenced by the online encyclopaedia Wikipedia, and its content included annotations from Stephenson himself.[23]

Style

In his earlier novels Stephenson deals heavily in pop culture-laden metaphors and imagery and in quick, hip dialogue, as well as in extended narrative monologues. The tone of his books is generally more irreverent and less serious than that of previous cyberpunk novels, notably those of William Gibson.

Stephenson at the Starship Century Symposium at UCSD in 2013

Stephenson’s books tend to have elaborate, inventive plots drawing on numerous technological and sociological ideas at the same time. This distinguishes him from other mainstream science fiction authors who tend to focus on a few technological or social changes in isolation from others. The discursive nature of his writing, together with significant plot and character complexity and an abundance of detail suggests a baroque writing style, which Stephenson brought fully to bear in the three-volume Baroque Cycle.[24] His book The Diamond Age follows a simpler plot but features “neo-Victorian” characters and employs Victorian-era literary conceits. In keeping with the baroque style, Stephenson’s books have become longer as he has gained recognition. For example, the paperback editions of Cryptonomicon are over eleven hundred pages long[25]with the novel containing various digressions, including a lengthy erotic story about antique furniture and stockings.

Works

Stephenson at the National Book Festivalin 2004

Novels

Short fiction

Other fiction projects

  • Project Hieroglyph, founded in 2011, administered by Arizona State University’s Center for Science and the Imagination since 2012. Hieroglyph: Stories and Visions for a Better Future, ed. Ed Finn and Kathryn Cramer, which includes contributions by Stephenson, was published by William Morrow in September, 2014.

Non-fiction

References

  1. Jump up^ Fisher, Lawrence M. (April 17, 1994). “SOUND BYTES; Orwell – Class of 1994″. The New York Times (The New York Times Company). Retrieved December 13, 2010.
  2. ^ Jump up to:a b c d Stephenson, Neal. “Biography”. Neal Stephenson’s Site (MobileMe). Archived from the original on June 28, 2012. Retrieved August 7, 2010.
  3. Jump up^ “Neal Stephenson – Biography”. ElectricInca.com. Retrieved August 7, 2010. He began his higher education as a physics major, then switched to geography when it appeared that this would enable him to scam more free time on his university’s mainframe computer.
  4. ^ Jump up to:a b c Booker, M Keith; Thomas, Anne-Marie, eds. (2009). “Neal Stephenson (1959–)”. The Science Fiction Handbook. Chichester, UK ; Malden, MA: Wiley-Blackwell. p. 173. ISBN 1-4051-6205-8. OCLC 263498124.
  5. ^ Jump up to:a b c Grassian, Daniel (2003). “From modernists to Gen Xers”. Hybrid fictions: American fiction and Generation X. Jefferson: McFarland & Co. pp. 29–30. ISBN 978-0-7864-1632-5. OCLC 52565833.
  6. Jump up^ Westfahl, Gary (2005). The Greenwood Encyclopedia of Science Fiction and Fantasy: Themes, Works, and Wonders, Vol. 3. Greenwood Publishing. p. 1235. ISBN 0-313-32953-2. Retrieved 2009-12-05.
  7. Jump up^ Godwin, Mike (February 2005). “Neal Stephenson’s Past, Present, and Future”. Reason (Reason Foundation). Retrieved December 13, 2010.
  8. Jump up^ “Neal Stephenson: Cryptomancer”. Locus Online. August 1, 1999. Retrieved August 7, 2010. …a thriller written in collaboration with his uncle, George Jewsbury, under pseudonym Stephen Bury
  9. Jump up^ Eaton, Kit (May 26, 2010). “The Mongoliad App: Neal Stephenson’s Novel of the Future?”. Fast Company. Retrieved July 4, 2010.
  10. Jump up^ “Subutai Corporation – Team”. subutai.mn (Subutai Corporation). Retrieved August 7, 2010. Neal Stephenson, Chairman
  11. Jump up^ Anders, Charlie Jane (July 14, 2009). “Neal Stephenson Gets Half A Million Dollars, But Did He Have To Switch Genres To Get It?”. io9. Gawker Media. Retrieved August 7, 2010.
  12. Jump up^ “reamdeDescription”.
  13. Jump up^ Upcoming4.me. “New Neal Stephenson book Some Remarks announced!”. Upcoming4.me. RetrievedJune 26, 2012.
  14. Jump up^ Twitter / subutaicorp: @LordBronco We’re still taking. Twitter.com. Retrieved on 2014-01-14.
  15. Jump up^ Famous Kickstarter Turns Into Complete Disaster. Kotaku.com. Retrieved on 2014-01-14.
  16. Jump up^ THUD: Development Of Neal Stephenson’s CLANG Halted. Rock, Paper, Shotgun. Retrieved on 2014-01-14.
  17. Jump up^ Neal Stephenson Says His Dream Of Making A Video Game Isn’t Dead | Kotaku Australia. Kotaku.com.au. Retrieved on 2014-01-14.
  18. Jump up^ Stephenson, Neal (19 September 2014). “Final Update”. CLANG by Subutai Corporation. Kickstarter. Retrieved 18 October 2014.
  19. Jump up^ Kelion, Leo. (2013-09-17) BBC News – Neal Stephenson on tall towers and NSA cyber-spies. Bbc.co.uk. Retrieved on 2014-01-14.
  20. Jump up^ http://nealstephenson.com/seveneaves.html
  21. Jump up^ http://www.magicleap.com/press/press_release5.pdf
  22. Jump up^ Catherine, Asaro (September 1999). “A Conversation With Neal Stephenson”. SF Site. RetrievedOctober 6, 2010.
  23. Jump up^ McClellan, Jim (November 4, 2004). “Neal Stephenson – the interview”. The Guardian (Guardian Media Group). Retrieved December 13, 2010.
  24. Jump up^ Giuffo, John (October 1, 2004). “Book Capsule Review: The System of the World”. Entertainment Weekly. Time Warner. Retrieved September 22, 2008.
  25. Jump up^ ex: Stephenson, Neal (1999). Cryptonomicon. Avon Books. pp. 1152 p. ISBN 978-0-06-051280-4.
  26. ^ Jump up to:a b c d e f g h Kelly, Mark R. “The Locus Index to SF Awards: Index of Literary Nominees”. Locusmag.com(Locus Publications). Retrieved January 18, 2011.
  27. Jump up^ William Morrow. Harpercollinscatalogs.com. Retrieved on 2014-01-14.
  28. Jump up^ [1]. Nealstephenson.com. Retrieved on 2015-02-10.

External links

http://en.wikipedia.org/wiki/Neal_Stephenson

 

Interface (novel)

From Wikipedia, the free encyclopedia
Interface
First edition cover

First edition cover
credited to Stephen Bury
Author Neal Stephenson and George Jewsbury
Cover artist Bruce Jensen
Country United States
Language English
Genre Thriller, Novel
Publisher Bantam
Publication date
1 April 1994
Media type Print (Paperback)
ISBN ISBN 0-553-37230-0 (first edition, paperback)
OCLC 28148075
813/.54 20
LC Class PS3552.U788 I58 1994

Interface is a 1994 novel by Neal Stephenson and George Jewsbury. It was originally sold with the author pseudonym of Stephen Bury, then reissued as being by Bury and J. Frederick George ,[1] and most recently as being by Stephenson and George.

Interface is a near-future thriller, set in 1996, in which a shadowy coalition bent on controlling the world economy attempts to manipulate a candidate for president of the United States through the use of a computer bio-chip implanted in his brain.

In 2007, it was described by writer Cory Doctorow as an “underappreciated masterpiece”.[2]

Plot summary

The novel opens with the governor of Illinois, William Cozzano, suffering a stroke, and in a separate subplot, a trailer park inhabitant, unemployed African-American, Eleanor Richmond, discovering her husband dead after having committed suicide in their repossessed former home.

As events progress, an underground business coalition, the Network, is arranging for Cozzano to have a biochip implanted and for him to run for President of the United States. The Network is made up of a number of large fictional companies, with parallels in real business entities.

Eleanor Richmond, after publicly attacking a local cable TV Public-access television talk show personality who was running for Senate, has since found herself working in the offices of a Republican Colorado senator, and after an event where she accused the citizens of Colorado of being welfare queens, finds herself in the public eye as one of the candidates for Cozzano’s running mate.

The Network’s ability to perceive public opinion, skewed on the night of the vice presidential debate by a twist of fate, makes them select Richmond as vice presidential candidate, and a canny act of public relations work rescues Cozzano’s campaign, getting him elected as President.

However, Cozzano gets shot at his inauguration by a psychotic former factory worker who has somehow figured out the Network’s plans almost entirely, killing him almost instantly. Richmond ends up as the first black and first female President of the United States.

Characters in “Interface”

  • Eleanor Richmond – unemployed African-American woman, protagonist
  • William Cozzano – governor of Illinois
  • Mary Catherine Cozzano – daughter of governor, neurologist
  • Cy Ogle – campaign manager
  • Dr. Radhakrishnan – neurosurgeon

References

  1. Jump up^ Stephenson, Neal; George, J. Frederick (2005) [1994]. Interface. Bantam Spectra. ISBN 9780553383430.
  2. Jump up^ Interface: Neal Stephenson’s underappreciated masterpiece

http://en.wikipedia.org/wiki/Interface_(novel)

 

Read Full Post | Make a Comment ( None so far )

John Twelve Hawks — The Traveler (Fourth Realm Trilogy) — Who is John Twelve Hawks? — Videos

Posted on February 6, 2015. Filed under: American History, Blogroll, Books, Communications, Computers, Constitution, Corruption, Crime, Federal Government, Foreign Policy, Freedom, government spending, history, Law, liberty, Literacy, media, Non-Fiction, People, Philosophy, Photos, Rants, Raves, Reviews, Terrorism, Video, Wealth, Welfare, Wisdom | Tags: , , , , , , , , , , |

Is this John Twelve Hawks?
john twelve Hawks

Michael Cunningham?michael cunninghamtravel novel

trilogy traveller

The Golden City

Realms

Who is John Twelve Hawks?

I AM JOHN TWELVE HAWKS: NYC

The traveler By John Twelve Hawks

SPARK by John Twelve Hawks (REVIEW)

Excerpt from audiobook version, narrated by Scott Brick. This book has been optioned for film by Dreamworks. “Spark” refers to the inner self or identity of a man who lost his sense of being alive after a motorcycle accident, in a future in which robots are taking over jobs and corporations spy on everyone and act as the mafia. Jacob is hired as a hit man for a company wanting to eliminate problems using him as an emotionless zombie-like tool. (He refers to his body as a “shell.”) An excellent dystopian first-person struggle toward regaining humanity in an age we are fast approaching. Scott Brick read  three books of the Fourth Realm Trilogy. I loved his
work then and asked that he read the SPARK audiobook.
John Hawks told me this about narrator Scott Brick: “This was a fairly difficult assignment because it’s a first person novel narrated by a professional killer who thinks that he’s dead. But Scott did a brilliant job…using his voice to convey Underwood’s personality and the unique way that he looks at the world. He conveys the strangeness of Underwood, but also makes it accessible for the listener. I think he’s wonderful!”

An interview with John Twelve Hawks

A Conversation with John Twelve Hawks, author of The Traveler

The Traveler evokes a variety of films and books–everything from George Orwell to the Matrix. Where did you take your inspiration from?
George Orwell is a favorite writer of mine and I liked the first Matrix, but the creation of the novel goes much deeper than that. When I sat down to write The Traveler I didn’t think about being published. I simply wanted to understand the world around me. Sometimes the best way to find the truth is to create a fiction.

Can you describe the differences between the three main character types in the book: Travelers, Harlequins, Tabula?
Travelers are a small group of people who have the ability to send their spirit to other worlds. The Harlequins are an ancient order of warriors who defend The Travelers. The Tabula is an organization that believes that mankind is a tabula rasa — a blank slate that can be scrawled with their ideas. They are determined to destroy The Travelers. These three groups are fictional but their struggle takes place within a very realistic environment.

Is John Twelve Hawks your real name?
I wasn’t given the name John Twelve Hawks at birth. It’s an adopted name — just like the names the Harlequins chose at a certain time of their lives. This name has great personal significance for me, but it’s not relevant to understanding the book.

One of your characters, Gabriel, lives “off the Grid,” avoiding detection by what you call the “Vast Machine.” Can you explain what you mean by this and why you yourself have chosen to live this way as well?
For me, living off the Grid means existing in a way that can’t be tracked by the government or large corporations. The Vast Machine is the very powerful — and very real — computerized information system that monitors all aspects of our lives.

I live off the Grid by choice, but my decision includes one factor that is relevant to the publication of The Traveler. I want people to focus on the book itself and not on its author. The typical “personal slant” of most media arts coverage trivializes the power of ideas — and there are a great many provocative ideas in this novel. Everyone who reads The Traveler is going to be entertained by an exciting story. A smaller group is going to be inspired to see our computerized world in a new way.

How do you correspond with your publisher and how do you plan to correspond with readers?
I have never met my editor or any of the staff at Doubleday. I talk to them using a satellite phone or we communicate through the internet. I haven’t really thought about how I’m going to answer reader questions but it will probably be through a non-traceable website.

Your message in the book about the end of privacy in our society is frightening. How much of what you portray is true and how much is pure invention?
It’s all true — based on years of research. Email messages are scanned by a program called Carnivore and programs linked to surveillance cameras use algorithms to identify you instantly. Some of the facts in The Traveler — such as the description of the new “computational immunology” program developed by the Royal Mail in Britain — have never been described in any book.

What, if any, suggestions do you have for people who are concerned about identity theft, the Patriot Act, phone and internet surveillance and other invasions of everyday privacy? Some of your characters agitate against the Vast Machine. Would you advise this?
This first step is to be aware of what is going on. Most of us have given up our privacy without even knowing it. At some point, we need to express our opinions to our elected officials. The growing power of the Vast Machine is actually not an issue that is tied to a particular political party. A traditional conservative like former Georgia Congressman Robert Barr is on the same side of the privacy issue as the ACLU. The most important thing is that we not succumb to the baseless fear that is used to justify our loss of personal liberty. People objected when the government proposed something called the Total Information Awareness system: a computerized program that would track virtually all of our electronic transactions. When the name of the program was changed to the Terrorist Information Awareness system — just one new word — all the criticism vanished.

The settings in the book are captured in vivid detail–the Charles Bridge in Prague, the California desert, the back alleys of East London. Was travel a big part of your research?
My agent once asked me how long it took me to write The Traveler and I answered: “All my life.” I didn’t do any particular research for the locations in the novel. I simply drew on the memories of different places where I’ve visited, lived or worked. Virtually all the locations in the book are real. For example, there is a system of abandoned missile silos in Arizona and Jeremy Bentham’s dead body is on public display at University College London.

The scenes of violence in the book also seem very real — not Hollywood fantasies.
I studied martial arts for several years and have fought both in tournaments and on the street. Maya and the other Harlequins have been trained since childhood to fight, but they’re not super human; they can be hurt or killed. Readers have told me that they’ve found the scenes of violence in The Traveler to be incredibly exciting because they’re not sure what’s going to happen. This duplicates my own experience creating the book. Every time I began to write a scene that involved fighting I had no idea if my characters were going to survive.

Family seems to be both a blessing and a curse in the novel. As Maya says: “Damned by the flesh. Saved by the blood.” Care to elaborate?
It was only after I finished the first draft of The Traveler that I realized how many of the characters are haunted by their fathers. Maya loved her father, Thorn, but he also destroyed her childhood. Gabriel and Michael Corrigan thought that their father was killed by the Tabula, but now there are signs that his ghost is alive. A crucial secondary character named Lawrence Takawa changes his entire life in honor of a father he has never met.

At one point in the novel, your protagonist Maya explains that there is a secret history of the world, a history of “warriors defending pilgrims or other spiritual seekers.” Do you believe this? What do you think is the role of faith in modern society?

There has been a continual battle throughout history between institutions that try to control our lives and those visionaries who emphasize the value of the human spirit. Right now, there’s a determined attempt to reduce all human behavior to biochemistry. If Joan of Arc was alive today she’d be put on Prozac. Faith can give us a larger perspective on our own lives as well as the world that surrounds us.

You seem to combine Eastern religion, mysticism and new age spirituality in your discussion of Gabriel’s education. The novel also suggests that Jesus, Mohammed, Buddha, even an obscure Rabbi from Poland may have all been Travelers–which begs the question: What (if any) is your religious affiliation?

When I was in my twenties, I was an atheist and proud of it. Now I believe in God and pray every day but I’m not a member of any organized religion. Travelers are guided by teachers called Pathfinders and I’ve dedicated the trilogy to my own personal Pathfinders. I’ve had several and they’ve included a Catholic priest, a Presbyterian minister, a scholar who was an orthodox Jew, and a Buddhist monk. I’m not going to minimize the differences between religions but they all have one thing in common: they teach the power of compassion and encourage that quality in our own hearts.

This is the first book in a trilogy. Any hints for readers about what they can expect from Books Two and Three?
In Book Two, a tough Irish Harlequin named Mother Blessing will enter the story; she’s already forcing her way into my dreams. Expect some surprises involving Maya, Gabriel, and the Tabula mercenary, Nathan Boone. I’m not manipulating these characters to fit a plot. They seem to have their own ideas about what they want to do.

Unless otherwise stated, this interview was conducted at the time the book was first published, and is reproduced with permission of the publisher. This interview may not be reproduced or reprinted without permission in writing from the copyright holder.

https://www.bookbrowse.com/author_interviews/full/index.cfm/author_number/1159/john-twelve-hawks

 

The Traveler (novel)

The Traveler
The-traveler.jpg
Cover of the Doubleday paperback edition

AuthorJohn Twelve HawksCountryUnited StatesLanguageEnglishSeriesThe Fourth RealmGenreScience fiction novelPublisherDoubleday

Publication date

2005Media typePrint (Hardback &Paperback)Pages449 ppISBNISBN 0-593-05430-XOCLC58828401Followed byThe Dark River

The Traveler (The Traveller in the UK) is a 2005 New York Times bestselling novel[1] by John Twelve Hawks. The Dark River, book two of The Fourth Realm Trilogy, was published in July 2007. The final part in the trilogy, The Golden City, was released September 8, 2009. The trilogy has been translated into 25 languages and has sold more than 1.5 million books.[2]

Traveler

The book is set in the near future and lays out a world where the real power lies not with people or governments, but in the hands of a secret organisation who call themselves “the Brethren” but who their enemies refer to as “the Tabula”. The Tabula are a centuries old secret society who believe in the importance of control and stability, making them in essence advocates of a kind of extreme Utilitarianism. Influenced by the ideas of the philosopher Jeremy Bentham the Tabula wish to enforce a Virtual Panopticon: a society where all individuals become so accustomed to being watched and monitored that they act at all times as if they were being observed and are as such completely controllable.

This Virtual Panopticon is made possible through the use of surveillance cameras, centralized databases, RFID-like tags for each citizen, and assorted spy gear (heat sensors, infrared cameras, X-rays, etc…). The Tabula are a relatively small group, operate largely in secret, but they have great power across the planet, in part by manipulating politicians and other powerful individuals/organisation, and in part because of their great wealth and advanced technology, which is in some cases far beyond the technology available to other groups and even governments.

The underlying premise for the realms in which this book is set greatly resembles the cosmology of Tibetan Buddhism (and other eastern cosmologies). Most notably, the second realm is explicitly labelled the realm of the Hungry Ghosts, but each realm in the enumerated hierarchy is associated with a given human shortcoming, much like in Hinduism and Buddhism. The world we inhabit is the fourth realm, and different Travellers can visit one or more of the other realms.

Although the basic plot is not new, the author provides a setting for discussion of larger issues, such as free will, the rapid increase in public surveillance and information gathering, the culture of fear, etc. While the motivations of the Tabula are explored in the book, this is kept at a rather superficial and crude level. Individual members are generally portrayed as either power hungry, psychopathic or deeply prejudiced, and the Tabula are set up as villains set to enslave humanity rather than misguided humanitarians.

The author has written a post-script at the end of the book in which he talks about his reasons for writing the novel and discusses, among other things, the development in western countries regarding surveillance (such as CCTV), data-mining, RFID and GPS, the Information Awareness Office, etc. He claims that all of the technology referred to in the book is either already being used or in the advanced stage of development.

Travelers, Pathfinders and Harlequins

The Travelers are individuals with a special gift, often but not always inherited, which allows them to detach from their bodies and journey through elemental barriers (water, fire etc.) to other realms. They do this by detaching their “light” (internal energy seemingly analogous to the soul but found by the Tabula to be empirically measurable) from their body. Travelers’ experiences and gifts (they can view the world around them with greater speed and clarity than normal people) can lend them great charisma, wisdom and vision. Many Travelers become religious prophets, or opponents of the Tabula, and the random element they add to societies makes them enemies of the Tabula who have hunted them almost to extinction.

The idea that all people possess the “light” within and can travel through other states of consciousness or “realms” is also a basic tenet of Gnosticism.

The Pathfinders are individuals capable of teaching potential Travelers how to break the light free from their body. Pathfinders can be priests and holy men, agnostics or atheists – different Pathfinders will use different teaching methods and have different beliefs, but all can help Travelers to realize their gifts. Pathfinders are also hunted by the Tabula.

The Author

Main article: John Twelve Hawks

The only information one can get on John Twelve Hawks is that he is living “off the grid“. This means that he is invisible to the network of surveillance and authority. He has no fixed home, no bank account or internet connection, and John Twelve Hawks is not his real name.

Plot summary

In the shadows of modern society an epic battle is fought. One woman is standing between those who try to control mankind and those who will risk their lives for the freedom of us all. On one side the Brethren, using high-end surveillance technology for control, supported by officials and politicians. On the other side the Travelers, the gifted ones, who are able to leave our realm and cross over into other realities. Because of their knowledge they are a great threat to the Brethren. The Travelers are supported by the Harlequins, a group only trained to defend the Travelers and to save them from the Brethren. Harlequins are trained since birth by their parents and other Harlequins. They are able to use all kinds of weapons, but their favored arm is a unique Harlequin sword they carry with them all the time.

Maya, a pretty young woman, is trying to live the life of a normal citizen. Her background, on the other hand, is anything but normal. She is the daughter of a famous German Harlequin named Thorn, who had been badly injured in an ambush by the Brethren. On a mission she killed two men of the Yakuza, the Japanese mafia. As a consequence Maya had tried to hide and leave her Harlequin past behind until one day her handicapped father calls for her. When visiting him in Prague, she finds him slaughtered by his enemies.

Fulfilling her father’s last wish, Maya takes a flight to the States supporting Shepherd, the last American Harlequin. She is determined to help him defend the last two Travelers alive. However, Shepherd has become a member of the Brethren. Working for the other side now, he tries to kill Maya. With the help of a young woman named Vikki she is lucky to get away. Vikki is a member of the I. T. Jones Church, a church of followers of the Traveler Isaac T. Jones, who was killed by the Brethren in 1889 with Lion of the temple (known as Zachary Goldman) a harlequin. Together they are able to find an ally, Hollis, a Capoeira trainer from Los Angeles and a former member of the Isaac T. Jones Community. The three of them are able to find the last living Travelers, Michael and Gabriel Corrigan. Before they are able to give them protection, Michael is captured by the Brethren. Instead of killing him immediately they try to convince him to help them. The Brethren recently started a new Program. They were in contact with a technologically advanced civilization dwelling in another realm. Aiming to travel through the realities, they need the help of a guide, someone who is able to travel without technology – like a Traveler.

For achieving help, they offer the Brethren high technology, weapons and plans for a quantum computer. The Brethren want to use a real Traveler that can find this other civilization and guide it to the Earth. By offering Michael power, money and everything else he wants, the Brethren convince him to work for them. With a new drug called 3B3, Michael is able to leave his realm without any usual way a Pathfinder would offer. A Pathfinder is a person that helps a Traveler to cross over. He or she is a teacher, but never a Traveler himself.

While Michael gains his first experiences with other realms, Maya tries to find a Pathfinder for Gabriel. She herself knows little of other realms and the process of crossing over. At all time they must be careful and live “off the grid”, because the Brethren use all their power to get hold of them.

Hollis stays in Los Angeles to place a false track. Within little time the Brethren show up at his house and try to kill him with a new weapon called “Splicer,” some kind of genetically engineered animal designed to search and destroy. But, Hollis defeats them.

In the meantime Maya and Gabriel find a Pathfinder in the desert in Arizona: an old woman researching king snakes in an abandoned missile silo. While teaching Gabriel how to cross over, she tells him everything she knows about the Travelers and the six realms. There is the first realm of a town like hell, the second realm of a city full of “hungry ghosts”, the third is inhabited by animals ignorant of all others, the fourth realm is our own reality, where the sin is desire, the fifth realm is the reality of the “half gods”, where the sin is jealousy, and the sixth realm of the “gods” themselves, where the sin is pride. The “gods” and “half-gods” of the fifth and sixth realm are not meant like God as the creator of all life, but like the Tibetans describe them: human beings from parallel worlds.

The realms are separated each by four barriers: one barrier of fire, one of water, one of earth and one of air. A Traveler that is capable of passing these four barriers is then able to enter one of the five other realms. If his body on earth dies, his soul, called the light, is condemned to stay forever in the realm it visits at that time. Crossing over into other realities, a Traveler can only carry special objects, called talismans, with him. Such an object is the sword Gabriel’s father gave him. Equipped with this sword, he meets his brother in the realm of the hungry ghosts.

His brother tries to convince him to join the Brethren. Gabriel resists the temptation, but he tells his brother where he left his body. As a consequence Gabriel is imprisoned by the Brethren within hours and brought to the research centre where Michael is kept.

Maya realizes that an immediate counterstrike is necessary. After an exciting battle in the Brethren’s research facility, they free Gabriel but have to realize that they can not convince Michael to leave the Brethren. Maya and her allies are able to find refuge in a house on a beach in Cape Cod – but only to recover. At this point the first book of the fourth realm has a cliffhanger ending.

Literary significance and reception

David Pitt in his review for Booklist said that John Twelve Hawks is “a gifted storyteller, makes this surreal and vaguely supernatural good-versus-evil story entirely believable.” About the novel he says that the “pace is fast, the characters intriguing and memorable, the evil dark and palpable, and the genre-bending between fantasy and thriller seamless”.[3] The New York Times reviewer Janet Maslin began her review with the statement: “It takes outlandish nerve and whopping messianic double talk to inaugurate a new science fiction project on the scale of The Traveler.” She then concluded “Amazingly, this novel sustains a new voice even when its roots show. And the list of obvious influences is long indeed. There are traces of Star Wars, The Matrix, Kill Bill and Minority Report. There are echoes of Stephen King, Michael Crichton, Joseph Campbell, Jeremy Bentham, various samurai stories and (could it not have been thus?) The Da Vinci Code.”[4]

Published: June 27, 2005

Film adaptation

On March 23, 2012, Deadline Hollywood announced that Warner Bros. acquired film rights to the Fourth Realm Trilogy.[5]

The Traveler Music Album

In October 2014, British DJ and Bedrock Records producer, John Digweed and his partner Nick Muir released an album inspired by The Traveler.

John Twelve Hawks made the initial contact, sending Digweed his novel with a note saying it had been written while listening to Digweed’s Transitions radio show. After reading The Traveler Digweed immediately emailed Hawks to say how much he’d loved the novel. Eighteen months later Digweed found an email from Hawks in his junk folder and they finally arranged to collaborate. Initial attempts to record Hawks’ narration via Skype failed, forcing Hawks to make a rare personal appearance in the studio. Digweed and Muir met with John Twelve Hawks in the UK and recorded his voice as he read passages from the novel. JTH’s voice was changed electronically and weaved into the 13 tracks.[6]

Reaction to the album was positive. Music critic, Rich Curtis called it “a very engaging and superbly crafted meeting of artistic minds.” [7]

References

  1. Jump up^ “New York Times Bestseller Hardback Fiction List”. July 17, 2005.
  2. Jump up^ “Warner Bros. Acquires ‘Fourth Realm’ Trilogy”. March 23, 2012.
  3. Jump up^ “The Traveler (Book)”. Booklist 101 (17): 1540. 2005-05-01. ISSN 0006-7385.
  4. Jump up^ “It Takes a Superhuman Effort to Escape Human Control”. June 6, 2005.
  5. Jump up^ “Warner Bros. Acquires ‘Fourth Realm’ Trilogy”. March 23, 2012.
  6. Jump up^ “DJ John Digweed Collaborates With Paranoid Author John Twelve Hawks”. October 1, 2014.
  7. Jump up^ “WORLD EXCLUSIVE ALBUM REVIEW: JOHN DIGWEED, NICK MUIR, JOHN TWELVE HAWKS – THE TRAVELER (BEDROCK)”. September 30, 2014.

External links

John Twelve Hawks

John Twelve Hawks (pseudonym) is the author of the 2005 dystopian novel The Traveler and its sequels, The Dark River and The Golden City, collectively comprising the Fourth Realm Trilogy. The trilogy has been translated into 25 languages and has sold more than 1.5 million books.[1] The trilogy was followed five years later by a fourth book, Spark (novel by John Twelve Hawks), and a non-fiction eBook, Against Authority. “John Twelve Hawks” is a pseudonym and his real identity is unknown.[2]

Reason and origin of his name

In “Against Authority” Twelve Hawks describes writing The Traveler. His decision to use a different name was triggered by a combination of personal and political reasons:

“For the first drafts of the book, I kept my birth name off the title page. The old me wasn’t writing this book. Something was different. Something had changed. I had always admired George Orwell, and had read his collected essays and letters countless times. When Eric Blair became Orwell, he was set free, liberated from his Eton education and colonial policeman past. And there was another factor about the title page that troubled me. I was telling my readers that this new system of information technology was going to destroy our privacy, and that they should resist this change. It seemed hypocritical to go on a book tour or appear on a talk show blabbing about my life when our private lives were under attack.” [3]

During an online conversation he had with his fans on the We Speak for Freedom website he explained the origin of his name:[4]

The real story is this …I was walking through a forest and encountered a hawk nesting area. Twelve hawks circled around my head for about ten minutes …so close that the tip of their wings brushed the side of my head. That was why I picked the name. REAL hawks. Not symbolic ones.

Information

In the sources listed and in his interviews, he has stated that he was born in the United States. He is a Buddhist who had meditated for most of his life. In the Spiegelinterview he states he is not a Native American.

In the Spiegel interview he talks about visiting East Germany before the fall of the Berlin Wall. In the USA Today article, his response to a question about religion began with, “When I was in my twenties…” and when an editor asked him whether the “realm of hell” could be compared to current conditions in Iraq, Hawks replied “it’s more like Beirut in the ’70s“. In the Spiegel interview and in the Daily Telegraph article, Hawks states that he drives a 15-year-old car and that he does not own a television.[5]

The SFF World interview indicates that Twelve Hawks once lived in a commune and learned about literature by stealing books from a restricted university library and then returning the books the next day. In the same interview, he states he wrote The Traveler after passing through some sort of personal crisis. In the interview in SFF World Twelve Hawks claims that he has “no plans to go public” regarding his identity.[6]

According to Twelve Hawks’ agent, “He lives in New York, Los Angeles and London”, and The Traveler sets its story in all three of these locations.[7] In a 2008 interview on Joseph Mallozzi‘s weblog, he answered a series of questions about this life:[8]

QUESTION: Is there a reason for the pen name? One you’d be willing to share, I suppose. As in, is it because you’re actually a secret CIA agent and/or Russian spy, or merely because you don’t ever want your mother knowing what you’ve written?

JTH: My mother and the rest of my family don’t know that I have written the novels. Those people I know who aren’t close friends see me as a failure by the American standards of success. Being a “failure” in such a way has been a continual lesson. It’s helped me realize that we make quick judgments of others based on little real information. We assume so much – but don’t know the secrets held within the heart.

Against Authority

On August 20, 2014, John Twelve Hawks released a free non-fiction book called Against Authority: Freedom and the Rise of the Surveillance States.[9] The book is dedicated to the novelist, Thomas Pynchon. An excerpt from Against Authority was published on Salon.[10]

Against Authority begins with a personal description of the neurological experiments performed on Hawks when he was a child and states that all of us have the ability to reject the “right” of those in power to control our lives. JTH describes how the reaction of governments to the September 11 attacks led to the Patriot Act in the United States and the proliferation of Closed-circuit television cameras in London. He references his 2006 essay How We Live Now [11] that was his first published reaction to these systematic attacks on privacy.

The book explains how the Total Information Awareness program developed by John Poindexter at the U.S. Defense Advanced Research Projects Agency (DARPA) led to the expansion of the National Security Agency and the revelations of Edward Snowden. Hawks criticizes the assumption of “mass surveillance” strategies against terrorism and shows how “trickle down surveillance” has spread to small towns and developing countries.

JTH believes that surveillance technology has given those in power a crucial tool for social control. He describes how the culture of surveillance is used to track citizens for commercial reasons and gives examples of how people are now routinely watched at work. In the conclusion, He advocates a strategy of “parallel lives” that allows people to exist in the digital world while protecting their private actions and thoughts.

Spark

Spark was published in October 2014 in the United States and Great Britain.[12]

The book is narrated by Jacob Underwood, a man who suffers from Cotard delusion, a real-life neurological condition in which the afflicted person thinks that he or she is dead. Underwood is hired by a New York investment bank to work as an assassin, eliminating threats to the bank’s clients. “Underwood’s strength as a hired killer is the emotionless, robotic nature that allows him to operate with logical, ruthless precision.” [13] But, when the bank asks him to track down Emily Buchanan, a minor employee who has absconded with financial secrets, Underwood gradually becomes more human and feels moments of empathy. Hawks describes adystopia where people are beginning to be replaced by robots. Underwood’s journey is an exploration into what human values will survive in a world of machines.

Reviews of Spark were generally positive. The Publishers Weekly review mentioned JTH’s writing style: “Twelve Hawks’s prose, cold and clinical at times, yet punctuated with moments of great sensitivity, matches the tone and mood of his setting perfectly.” In a starred review in Booklist, reviewer David Pitt wrote: “It’s been several years since the Fourth Realm trilogy ended, and some readers might have wondered if the author had only one story to tell. But guess what? As good as the Fourth Realm books were, this one may be even more appealing: less fantastic, more grounded in a contemporary real world, with a narrator who is deeply scarred and endlessly fascinating.” [14]

In October, 2013 Deadline Hollywood reported that the film rights to Spark were sold to Dreamworks.[15]

Bibliography

  1. The Traveler (2005)
  2. The Dark River (2007)
  3. The Golden City (2009)
  4. Spark (2014)
  5. Against Authority (2014)

References

  1. Jump up^ “Warner Bros Acquires ‘Fourth Realm’ Trilogy”. March 23, 2012.
  2. Jump up^ “Those remaining literary recluses in full”. The Guardian (London). 1 February 2010.
  3. Jump up^ John Twelve Hawks (2014-08-20). “Against Authority”. johntwelvehawks.com. Retrieved 2014-08-20.
  4. Jump up^ John Twelve Hawks (2009-05-24). “Live chat with John Twelve Hawks”. wespeakforfreedom.com. Retrieved 2009-05-25.
  5. Jump up^ David Thomas (2007-04-01). “Like Dan Brown, but better”. The Daily Telegraph (London). Retrieved 2007-04-01.
  6. Jump up^ Rob Bedford (2005-12-04). “Interview With John Twelve Hawks”. SFFWORLD.COM. Retrieved 2006-08-12.
  7. Jump up^ Carol Memmot (2005-06-27). “Cryptic ‘Traveler’ has book world buzzing”. USA Today. Retrieved 2006-08-12.
  8. Jump up^ Joseph Mallozzi (2008-10-30). “Interview With John Twelve Hawks”. josephmallozzi.wordpress.com. Retrieved 2008-10-30.
  9. Jump up^ John Twelve Hawks (2014-08-20). “Against Authority”. johntwelvehawks.com. Retrieved 2014-08-20.
  10. Jump up^ John Twelve Hawks (2014-09-14). “New Surveillance States Have Placed Us In An Invisible prison”. salon.com. Retrieved 2014-09-14.
  11. Jump up^ John Twelve Hawks (2006-02-01). “How We Live Now”. California State University, Northridge University.
  12. Jump up^ “‘Spark,’ the Latest Dystopian Novel From John Twelve Hawks”. http://www.nytimes.com. 2014-10-06. Retrieved 2014-10-06.
  13. Jump up^ “Spark”. http://www.publishersweekly.com. 2014-08-04. Retrieved 2014-08-04.
  14. Jump up^ David Pitt (2014-09-01). “Review of SPARK”. http://www.booklistonline.com. Retrieved 2014-09-01.
  15. Jump up^ Mike Fleming Jr. (2013-10-14). “DreamWorks Buys John Twelve Hawks Sci-Fi Thriller ‘Spark’”. http://www.deadline.com/hollywood/. Retrieved 2013-10-14.

External links

http://en.wikipedia.org/wiki/John_Twelve_Hawks

 

Who is John Twelve Hawks?

Back in August I wrote a piece about John Twelve Hawks’s so-called thriller The Traveller (aka The Traveler in the US). I thought the book was a dud, but noted, as one would have to, that it was being given a tremendous amount of hype by the publishers, in both the UK and the USA.

I think it was always fairly obvious that John Twelve Hawks was a pseudonym, and I made a brief reference to the kind of person, or persons, who might be involved. But I can’t say that I gave very much serious thought to who the author might really be, largely because I felt that the book was so feeble. And, of course, I was irritated by the fact that, yet again, a publisher was putting enormous weight behind something that really didn’t deserve it.

However, it turns out that that there are in this world a number of people who are giving some fairly detailed consideration to the identity of The Traveller‘s author. And one of them, Janet Rice, has come up with the suggestion that the real author is Michael Cunningham. Yes, that very same Michael Cunningham who won the Pulitzer Prize with The Hours and has recently published Specimen Days, another book which I felt wasn’t worth anyone’s trouble.

Janet Rice first posted her piece of deduction as a comment on my review of The Traveller, and I certainly recommend that you take a look at her detailed reasoning.

I have to say that this linking of Cunningham with the Twelve Hawks identity question is the smartest piece of lateral thinking that I have come across in a long time. Janet has clearly read both The Traveller andSpecimen Days with far greater care than I have, and has come up with several features which the books have in common.

Having written her piece as a comment on my blog, Janet has posted her further thoughts on this issue on the discussion page of Night Shade Books, where you will find several other speculations about the mystery man’s identity.

Janet, please note, is not insisting that she is right; she is simply putting forward the Twelve Hawks = Cunningham idea as a hypothesis, and inviting others to test it out. For my own part, I have to say that I find the idea tolerably convincing.

First of all, both books are, in my opinion, of much the same standard: i.e. just about publishable but no great shakes. Secondly, the existence of a previously ‘successful’ author behind the pseudonym would certainly explain why the publisher was willing to invest so heavily in the book; although, having said that, one also has to say that publishers seem quite ready to invest substantial sums in unknown quantities on every other day of the week.

Perhaps somewhere out there is a computer whizzkid who could do some textual analysis and see how the prose style of Cunningham and Twelve Hawks actually compares. Always bearing in mind, of course, that such analysis was not wonderfully successful in identifying the real author of the Belle de Jour blog/book. And also bearing in mind that an author can deliberately adopt different styles and tones of voice for different books.

Janet also adds some speculation as to why Cunningham — if he is the one — should bother to write a commercial thriller; her own hope is that he was trying to find a way to get his ideas through to a wider audience than he could achieve via his literary work.

Well — ahem — forgive my cynicism, but one should never underestimate the power of the dollar. In publishing, the money is never as much as the hype suggests, whether you’re Cunningham, Twelve Hawks, or anyone else. And in my view it might well be the case that some erstwhile literary chap has got tired of scuffling for a living and has tried to cash in.

I have absolutely no objection, in principle, to a writer going flat out for the money, but perhaps whoever is responsible for The Traveller now understands that writing a successful commercial novel is rather harder to do in practice than the literary elite of this world think it is.

Read Full Post | Make a Comment ( None so far )

Kenneth R. Timmerman — Shakedown: Exposing The Real Jesse Jackson

Posted on January 26, 2015. Filed under: American History, Blogroll, Books, Business, College, Communications, Corruption, Documentary, Economics, Education, Ethic Cleansing, Faith, Family, Foreign Policy, Freedom, Friends, Genocide, government, government spending, Heroes, history, Islam, Islam, Language, Law, liberty, Life, Links, media, Non-Fiction, People, Philosophy, Photos, Politics, Press, Rants, Raves, Religion, Reviews, Security, Shite, Sunni | Tags: , , , , , , , , , |

Ken-Timmermanshakedown

ktimmerman

Kenneth Timmerman on persecution of Iraqi Christians

Kenneth Timmerman executive director of Foundation for Democracy in Iran at the National Press Club

 

Kenneth R. Timmerman

Kenneth R. Timmerman (born November 4, 1953) is a political writer and conservative activist who was the 2012 Republican nominee for U.S. Representative for the newly redrawn Maryland’s 8th congressional district, facing the incumbent Chris Van Hollen, aDemocrat.[1] Timmerman lost to Van Hollen in a landslide, 33% to 63%. In 2000, Timmerman was a candidate for the Republican nomination for U.S. Senator from Maryland. Timmerman is executive director of the Foundation for Democracy in Iran, an organization that works to support democratic movements in Iran. He authored Shakedown: Exposing the Real Jesse Jackson. Timmerman has also written on the spread of weapons of mass destruction in the Middle East. He is currently an Expert at Wikistrat.[2] He was the running mate for Republican Charles Lollar in the 2014 Maryland gubernatorial election.[3][4] The Lollar/Timmerman ticket finished third in the Republican primary.

Early life and career

Born in New York in 1953, Timmerman obtained a BA from Goddard College in 1973 and an M.A. from Brown University in 1976. He moved to France, where he pursued a career as a novelist, publishing a novel called Wren Hunt in 1976 and a novella called The Iskra Scrolls in 1980.

Middle East and defense correspondent

In the early 1980s, Timmerman became a Middle East correspondent for The Atlanta Journal-Constitution and developed an expertise in the Middle East and the arms trade. In 1982, he was taken prisoner for 24 days by Fatah guerrillas in Lebanon. He was the first journalist on the scene when Islamic militants bombed the US Embassy in 1983.

From 1985 to 1987, Timmerman was a correspondent for Defense and Armament Newsweek and Military Technology, covering the Iran–Iraq War and the arms industry in the Middle East. He won the Joe Petrosino Prize for Investigative Reporting in 1987 for an investigation of an Iranian arms procurement group.

From 1987 to 1993, Timmerman published the Middle East Defense News and was international correspondent for Defense Electronics. He also wrote monographs for the Simon Wiesenthal Center on efforts by Iraq, Syria and Libya to acquire weapons of mass destruction.

Author and activist

In 1991, Timmerman published The Death Lobby: How the West Armed Iraq after the Gulf War. Timmerman advised the United Nations Special Commission for the Disarmament of Iraq on the location of weapons plants.

In 1993, Timmerman returned to the US where he worked as a member of the staff of the U.S. House Committee on International Relations. In 1995, he founded the Foundation for Democracy in Iran with Peter Rodman, Joshua Muravchick and Iranian opposition expatriates to attempt to topple the Iranian government. He founded the Middle East Data Project to advise governments and private companies. In 1998, he made suggestions to the Rumsfeld Commission supporting the deployment of a national missile defencesystem.

In 1998, he wrote a piece on Osama Bin Laden and his training camps in Afghanistan just before Al-Qaeda attacked two US embassies in Africa. He also wrote features for the American Spectator criticizing the export of high-technology equipment to China, which was published as a book in 2000. In 2000 Timmerman sought the nomination of the Maryland GOP to run against Democratic incumbent Paul Sarbanes. Timmerman won less than ten percent in the party primary; Paul Rappaport won the Republican nomination but lost to Sarbanes, who won with 63% of the vote.

Timmerman wrote Shakedown: Exposing the Real Jesse Jackson as a change of pace from his focus on international issues in 2002. The argument claimed that Jackson alleging connections with criminals and claiming that Rev. Jackson practised extortion of businesses. It proved to be highly successful making the top ten bestseller list with 200,000 copies printed.[5] It also reached the top of the Amazon bestseller list.[6]

In 2003, Timmerman published Preachers of Hate: Islam and the War Against America. The French Betrayal of America was published in 2004. Timmerman returned to his field of greatest expertise with the publication of Countdown to Crisis: the Coming Nuclear Showdown with Iran in 2005.

On February 7, 2006 Sweden’s former deputy prime minister and Liberal party leader Per Ahlmark asserted that he had nominated Timmerman for a Nobel Peace Prize along with UN Ambassador John Bolton for “their repeated warnings and documentation ofIran‘s secret nuclear buildup and revealing Iran’s repeated lying and false reports to the International Atomic Energy Agency.”[7] The Nobel Foundation won’t confirm nominations, however, until 50 years have passed.[8]

Bibliography

  • The Wren Hunt Bran’s Head Books 1976, 1982 ISBN 0-905220-32-3
  • The Iskra Scrolls novella Handshake Press Paris 1980
  • Fanning the Flames: Guns, Greed, and Geopolitics in the Gulf War syndicated by New York Times Syndication Sales, 1987, published in book form as “Öl ins Feuer Internationale Waffengeschäfte im Golfkrieg” Orell Füssli Verlag Zürich and Wiesbaden 1988ISBN 3-280-01840-4
  • La Grande Fauche: Le vol de la haute technologie (Gorbachev’s Technology Wars: How the U.S.S.R Arms Itself in the West) Editions Plon Paris 1989
  • The Poison Gas Connection: The Chemical Weapons Programs of Iraq and Libya Simon Wiesenthal Center Los Angeles 1990
  • The Death Lobby: How the West Armed Iraq Houghton Mifflin Boston 1991 ISBN 0-395-59305-0
  • The BNL Blunder: How the U.S. Policy Allowed a Bank in Atlanta to Finance Saddam Hussein’s War Machine Simon Wiesenthal Center Los Angeles 1991
  • Weapons of Mass Destruction: the Cases of Iran, Syria and Libya Simon Wiesenthal Center Los Angeles 1992
  • Selling Out America: The American Spectator Investigations Xlibris Philadelphia Pennsylvania 2000 ISBN 0-7388-2858-0
  • Shakedown: Exposing the Real Jesse Jackson Regenery Washington DC 2002 ISBN 0-89526-165-0
  • Preachers of Hate: Islam and the War on America Crown Forum 2003 ISBN 1-4000-4901-6
  • The French Betrayal of America Crown Forum 2004 ISBN 1-4000-5366-8
  • Countdown to Crisis: The Coming Nuclear Showdown with Iran Crown Forum 2005 ISBN 1-4000-5368-4
  • Shadow Warriors: The Untold Story of Traitors, Saboteurs, and the Party of Surrender Crown Forum 2007

Notes

  1. Jump up^ “Conservative Timmerman tries to capitalize on shift in 8th Congressional District”. MarylandReporter.com. October 8, 2012. Retrieved October 21, 2012.
  2. Jump up^ “Wikistrat profile on Kenneth Timmerman”. Wikistrat. Retrieved January 17, 2012.
  3. Jump up^ Wagner, John (February 24, 2014). “Md. GOP gubernatorial hopeful Lollar chooses Kenneth Timmerman as running mate”. The Washington Post. Retrieved February 25, 2014.
  4. Jump up^ Wheller, Tim (February 24, 2014). “GOP gubernatorial hopeful Lollar names running mate”. The Baltimore Sun. Retrieved February 25, 2014.
  5. Jump up^ “Regnery’s Latest Score (Behind the Bestsellers)”. Publishers Weekly 249 (12): 18. March 25, 2002.
  6. Jump up^ Dreher, Rod (April 22, 2002). “He is Somebody (Exposing the Real Jesse Jackson book review)”. National Review 54 (7): 41.
  7. Jump up^ “All eyes on Nobel Peace Prize possibles”. BBC News. October 12, 2006. Retrieved February 25, 2014.
  8. Jump up^ “Statutes of the Nobel Foundation”. Nobel Media. Retrieved February 25, 2014. Such permission may not, however, be granted until at least 50 years have elapsed after the date on which the decision in question was made.

References

http://en.wikipedia.org/wiki/Kenneth_R._Timmerman

Read Full Post | Make a Comment ( None so far )

Robert Harris — An Officer and A Spy — Videos

Posted on January 21, 2015. Filed under: Blogroll, Books, Communications, Corruption, Crime, Crisis, Culture, European History, Foreign Policy, Freedom, Friends, government, history, Law, liberty, Life, Links, Literature, media, Money, Non-Fiction, People, Philosophy, Photos, Politics, Press, Raves, Reviews, Strategy, Talk Radio, Video, War, Wisdom, Writing | Tags: , , , , , , , , , , , , |

Robert_Harrisan_officer_and_a_spydegradation_alfred_dreyfusAn Officer and a SpyRobert Harris in his study

Robert Harris on his new thriller An Officer and a Spy

Robert Harris on An Officer and a Spy

An Officer and a Spy: Robert Harris with Hilary Spurling

Joan Mackenzie Reviews An Officer and a Spy by Robert Harris

Interview de Robert Harris, à propos de l’Affaire Dreyfus et du roman D.

Richard Dreyfuss in “Prisoner of Honor” 1991 Movie Trailer

Dreyfus degraded

Alfred Dreyfus Documentary │ Full video │

The Dreyfus Affair (In Our Time, 8/10/09)

Devil’s Island : Colonies of the Condemned

FULL INTERVIEW: Robert Harris

The Fear Index – Robert Harris

Robert Harris on Fatherland – the Guardian

The Ghost Writer Full Movie

The Ghost Writer is a 2010 French-German-British political thriller film directed by Roman Polanski. The film is an adaptation of the Robert Harris novel, The Ghost, with the screenplay written by Polanski and Harris.

Robert Harris: FATHERLAND

 

 

 

Read Full Post | Make a Comment ( None so far )

Daniel Yergin — The Quest: The Global Race for Energy, Security and Power and The Prize: The Epic Quest for Oil, Money, Power — Videos

Posted on December 26, 2014. Filed under: Agriculture, American History, Banking, Blogroll, Books, British History, Business, College, Communications, Crisis, Documentary, Economics, Education, Employment, Energy, European History, Faith, Family, Farming, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, government, government spending, history, Inflation, Investments, Islam, Language, Law, liberty, Life, media, Microeconomics, Monetary Policy, Money, Money, Natural Gas, Natural Gas, Non-Fiction, Nuclear Power, Oil, Oil, People, Philosophy, Photos, Politics, Press, Psychology, Rants, Raves, Resources, Reviews, Talk Radio, Tax Policy, Taxes, Technology, Transportation, Unemployment, Video, War, Wealth, Weapons, Weather, Welfare, Wisdom | Tags: , , , , , , , , , , , , , , |

Daniel Yergin on America’s New Energy Reality

Pulitzer Prize winner Daniel Yergin on the next energy revolution

The Evolution of the Canadian Oilsands – An Interview with Daniel Yergin

The Quest: Energy, Security, and the Remaking of the Modern World

An Energy Briefing with Daniel Yergin: Understanding Energy Solutions

Daniel Yergin | Charlie Rose

Daniel Yergin: The Global Quest for Energy

BookTV: After Words: Daniel Yergin, “The Quest”

Fireside Chat with Dan Yergin

World Business: P2P Interview Dan Yergin 28/11/08

 

 

Conversations with History: Energy Security and the Remaking of the Modern World with Daniel Yergin

The Prize (Part 1 of 8) – “Our Plan”

The Prize (Part 2 of 8) – “Empires of Oil”

The Prize (Part 3 of 8) – “Black Giant”

The Prize (Part 4 of 8) – “War and Oil”

The Prize (Part 5 of 8) – “Crude Diplomacy”

The Prize (Part 6 of 8) – “Power to the Producers”

The Prize (Part 7 of 8) – “The Tinderbox”

The Prize (Part 8 of 8) – “New Order of Oil”

 

Read Full Post | Make a Comment ( None so far )

The Lunatic Left Agitators and Activists and The Failure of Government Schools, Housing and Welfare State On Display In Ferguson, Atlanta, Baltimore, Boston, Chicago, Dallas, Houston, Los Angeles, New York, Oakland, Philadelphia, Seattle, St. Louis, Washington, D.C. — Dumbed Down — Hands Up — Don’t Shoot — Just Loot — Progressive Parade Plays With Traffic On U.S. Highways — Race Riot Route — Videos

Posted on November 29, 2014. Filed under: American History, Babies, Blogroll, College, Communications, Constitution, Corruption, Crime, Culture, Demographics, Diasters, Education, Faith, Family, Farming, Federal Government, Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Homicide, Illegal, Immigration, Law, liberty, Life, media, People, Philosophy, Photos, Politics, Programming, Psychology, Rants, Raves, Regulations, Religion, Reviews, Strategy, Technology, Unemployment, Vacations, Video, War, Wealth | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 379: November 26, 2014

Pronk Pops Show 378: November 25, 2014

Pronk Pops Show 377: November 24, 2014

Pronk Pops Show 376: November 21, 2014

Pronk Pops Show 375: November 20, 2014

Pronk Pops Show 374: November 19, 2014

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014

Story 1:  The Lunatic Left Agitators and Activists and The Failure of Government Schools, Housing and Welfare State On Display In Ferguson,  Atlanta, Baltimore, Boston, Chicago, Dallas, Houston, Los Angeles,  New York, Oakland,  Philadelphia, Seattle, St. Louis, Washington, D.C. — Dumbed Down — Hands Up — Don’t Shoot — Just Loot — Progressive Parade Plays With Traffic On U.S. Highways — Race Riot Route — Videos

cartoon_lootgun control for dummiesturkey

ferguson-looting-6

_2lootersAPTOPIX_FergusonA man walks past a burning building during rioting after a grand jury returned no indictment in the shooting of Michael Brown in Ferguson, MissouriFergusoncars-burn-at-a-dealership-tuesday-nov-25-2014-in-dellwood-mo1wptv-ferguson-unrest-after-no-indictment_3APTOPIX FergusonFerguson_Miss

ferguson-looting-2

ferugson_businessGTY_ferguson_damage_burned_lburned_out_businessferg9NUMBER-ONE-KILLER-2013-FB

 

Giuliani Responds to Officer Wilson’s Interview

Darren Wilson Interview With George Stephanopoulos – FULL VIDEO

“This Country Values Property Over People”: Ferguson Activist Speaks Out as Protests Spread

Riot as the Language of the Unheard: Ferguson Protests Set to Continue In Fight For Racial Justice

Documents Released in the Ferguson Case

Ferguson decision sparks nationwide protests

Ferguson Missouri Riots & Protest – Michael Brown Shooting News

Crowds around nation protest after Ferguson Missouri decision shooting death of Michael Brown

Ferguson Verdict Sparks Protests In California, New York And Beyond

Boston Protests Ferguson Ruling

Progress Illinois: Chicagoans Protest At City Hall Following Ferguson Decision

Chicago Protests 11/25/2014

Ferguson MO Protest Downtown Dallas

USA: Clashes erupt in NYC following Ferguson Grand Jury verdict

NYC SHUTS DOWN FDR drive due to Ferguson protests

Driver Plows into Ferguson Protest Crowd in Minneapolis

Video captures car plowing through Ferguson protest in Minnesota

Protest in Support of Ferguson, Union Square Park NYC

FERGUSON : Protest: Demonstration In NYC. St Louis Missouri after Mike Brown Darren Wilson Verdict

Ferguson Riots, USA | Ferguson Erupts; Turning US Cities Into WARZONES

Michael Brown’s Stepdad Shouting ‘Burn This Bitch Down’ (VIDEO)

Alex Jones Show – Commercial Free Video: Tuesday (11-25-14) Ferguson

Black Genocide – Maafa 21 Full Length

“NUMBER ONE KILLER” by The Radiance Foundation

Just Tell Us The Truth…

 

Protesters Turn Out in U.S. Cities Following Ferguson Decision

Rallies Largely Peaceful, Though Some Vandalism Occurred in at Least One City

By

THOMAS MACMILLAN,
ALEJANDRO LAZO and
CAMERON MCWHIRTER

Protests broke out in a number of U.S. cities following the decision on Monday by a grand jury not to indict a Ferguson, Mo., police officer in the shooting death of a black teenager.

Marches and rallies had been planned in many of the nation’s largest cities, from New York to Chicago to Houston, regardless of the jury’s finding.

In New York, hundreds of demonstrators gathered in Union Square in Manhattan. When the grand jury decision was announced, word quickly spread through the crowd. In a few minutes, most were holding one fist up in the air as they observed a moment of silence that lasted nearly five minutes.

The only audible sound was the shutter of press cameras. Some demonstrators were in tears.

WSJ’s Ben Kesling reports from the scene in Ferguson, Mo., after a grand jury declined to indict Officer Darren Wilson in the shooting of Michael Brown Photo: Getty Images

Then, with the cooperation of New York Police Department officers, the protesters began a spontaneous march, moving north along Sixth Avenue, blocking traffic. Protesters occupied several blocks as they marched toward Times Square.

“I feel like I don’t have an outlet for my anger,” said Monica Thompson, 29 years old, a social worker who lives in Harlem. “There’s not been an indictment. There’s an acceptance that black and brown lives don’t matter.”

A police helicopter hovered overhead as protesters marched and a large police presence accompanied the protest. No arrests were reported as of 10:30 p.m.

A sense of anger pulsed through the crowd. “They don’t know what they just started,” said Precious Etsekhume, 22, referring to the government and police. “They are going to regret every bad decision they made.”

At a New York news conference, the Rev. Al Sharpton , who has worked to bring attention to the case since Ferguson officer Darren Wilson shot unarmed teenager Michael Brown, called for a federal investigation into the shooting, saying he had no confidence in local prosecutors.

Mr. Sharpton said the grand jury’s decision was expected but was “still an absolute blow to those of us that wanted to see a fair and open trial.”

Mr. Sharpton appeared with the family of Eric Garner, a New York City man whose death was caused by an apparent police chokehold, according to the city’s medical examiner. Mr. Garner’s family didn’t speak.

In Oakland, Calif. police and protesters clashed violently after groups of protesters blocked a major Bay Area freeway for hours, set piles of trash ablaze on city streets and looted retail shops in the city’s downtown area.

WSJ’s Ben Kesling reports from Ferguson, Mo., on the growing protests after a grand jury declined to indict Officer Darren Wilson for the shooting of Michael Brown. Photo: AP

After marching relatively peacefully for more than an hour, the crowd gathered near City Hall grew to stretch more than two city blocks, and became increasingly unruly, vandalizing buildings and smashing windows of a Chase Bank branch as they marched through downtown and then through the city’s increasingly gentrifying Lake Merritt neighborhood.

About 500 protesters ran up a freeway on ramp near a Trader Joe’s grocery store, the Oakland Police Department said, bringing traffic to a halt for hours on Interstate 580. Several arrests were made, Oakland police said, and the freeway was eventually reopened.

But clashes continued both near the freeway and in the city’s downtown, where the protests had originated. By midnight, protesters had ignited large fires on a street in downtown Oakland and looters could be seen breaking into several stores.

Inside a Metro PCS store, one woman tossed packages through a smashed glass door to gathered crowds. Down the street, young men hurled beer bottles at people passing bye.

Close to the city’s police headquarters, protesters confronted officers in full riot gear and gas masks, linking arms and advancing toward the police shortly after midnight. The police, in turn, advanced toward the protesters and some in the crowd threw water bottles and other objects at the officers.

“This is an unlawful assembly,” a policeman announced via a speaker system. “You may be arrested and subject to removal by force if necessary.”

A man in the crowd wearing a sweatshirt and carrying a bullhorn answered back with his own announcement.

“The Oakland Police Department is now under citizen’s arrest,” he said. “By the power invested in the people of California, the Oakland Police Department is now under arrest. We are arresting you for violating our civil rights.”

Clashes continued into the early morning as police steadily moved up the street arresting and confronting protesters.

D’Andre Teeter, 70, from Berkeley, said before the grand jury’s decision was announced that anything less than an indictment for murder would be an “outrage.”

”We are out here to say this has to stop, and we think the whole country must come to a halt regardless of the outcome of the grand jury’s decision,” he said.

Across the bay in San Francisco, a crowd of a few dozen people gathered in the Mission District to await the grand jury decision. Carrying signs reading “Justice 4 Mike Brown,” they booed and chanted, “The people say guilty! The people say guilty!” when the news came that Officer Wilson wouldn’t be indicted.

In downtown Atlanta, a handful of civil-rights activists gathered outside the Richard B. Russell Federal Building to address the media after the verdict was announced. Markel Hutchins, an African American minister, choked back tears at one point when describing how frustrated he was by the decision.

“If you don’t look like Michael Brown, or have a son or grandson or cousin that looks like Michael Brown, you will never understand why we feel the way we feel tonight,” he said.

With unseasonably chilly temperatures that swept into the area Monday night, most of downtown Atlanta was desolate and no major disturbances were reported. Civil-rights leaders said they planned a peaceful protest Tuesday evening.

In Philadelphia, the city’s police department was monitoring the situation and watching social media, said a spokesman for Mayor Michael Nutter. The mayor earlier told reporters he recognizes the public’s right to demonstrate but urged people to do so nonviolently.

According to the Associated Press, several hundred protesters marched through downtown Philadelphia, yelling, “No justice, no peace, no racist police!” A similar protest of about 50 people in Pittsburgh was short-lived, with activists saying they plan to regroup Tuesday at the federal courthouse, the AP reported.

Law-enforcement officials in Los Angeles said they had prepared for potential unrest in the nation’s second-largest city, but a small protest march that started in Leimert Park in south L.A. blocked traffic along its route but otherwise remained peaceful.

As they marched on foot and on bicycles, the few dozen protesters carried signs, blew whistles and shouted: “If you’re sick of the murdering police, outta your house and into the street.” At one point, a few protesters briefly made their way onto a section of the I-10 freeway before police moved them back.

Cue Jnmarie, a 50-year-old pastor, said he met with police twice to prepare for the response to the grand jury’s decision. He said he is pushing for public policy changes, and doesn’t support violence. He said community organizers and religious leaders there aimed to do more than “blow off steam” about Michael Brown’s death.

”This is not just happening now,” he said. “It has been happening, and it’s part of the culture.”

Mr. Jnmarie described himself as a victim of racial profiling in Los Angeles and said the community is angry. “Police protect and serve everyone except people of color,” he said.

”We do everything in our power to facilitate lawful, peaceful demonstrations as long as they don’t become violent or destructive,” said Andy Neiman, spokesman for the Los Angeles Police Department.

In Seattle, where a protest march also was reported to be nonviolent, the police department said it hadn’t made any major preparations for protests. The department prefers to take a “rather toned-down approach to that sort of thing,” said Patrick Michaud, a Seattle police detective with the force’s public affairs unit.

In Baltimore, two groups said they would wait until Tuesday afternoon to march through downtown, regardless of the grand jury’s decision. “We want the time to have the largest gathering possible,” said Sharon Black, local representative of one of the groups, the Peoples Power Assembly. “It’s difficult to get a large, large group out in the middle of the night. We want our message to be heard.”

http://online.wsj.com/articles/u-s-cities-prepare-for-reaction-to-ferguson-grand-jury-decision-1416874256

 

Ferguson and Other Cities React to Grand Jury Decision Not to Indict Darren Wilson

Journalists with The New York Times in Ferguson, Mo., are following a grand jury’s decision not to indict Darren Wilson, a white police officer, in the shooting death of Michael Brown, an unarmed black teenager. On Monday night, the scene in downtown Ferguson grew increasingly unruly as the night wore on with the police using tear gas to disperse crowds who were throwing rocks and shattering store windows. Some businesses were looted, the police said. Protests also broke out in other cities, including New York, Los Angeles, Oakland and Seattle.

Follow Tuesday’s live updates and other ongoing coverage here.

Transcript of the Grand Jury Proceedings

An Overview of What Happened in Ferguson

Timeline: Tracking the Events Following the Shooting

Photo
A photograph of Ferguson Police Officer Darren Wilson presented as evidence to the grand jury.

A photograph of Ferguson Police Officer Darren Wilson presented as evidence to the grand jury.Credit via St. Louis County Prosecutor’s Office

Among the many things found in Darren Wilson’s grand jury testimony are several references to the way he felt intimidated by Michael Brown. Though Officer Wilson is himself a large man – nearly 6’4″, around 210 pounds, according to his own testimony — he repeatedly described Mr. Brown as aggressive, big, and threatening, often in vivid language. Here are a few excerpts from his description of the altercation at the window of his patrol car:

“I tried to hold his right arm and use my left hand to get out to have some kind of control and not be trapped in my car any more. And when I grabbed him, the only way I can describe it is I felt like a five-year-old holding onto Hulk Hogan.”

“I felt that another one of those punches in my face could knock me out or worse. I mean it was, he’s obviously bigger than I was and stronger and the, I’ve already taken two to the face and I didn’t think I would, the third one could be fatal if he hit me right.”

“After seeing the blood on my hand, I looked at him and was, this is my car door, he was here and he kind of stepped back and went like this. And then after he did that, he looked up at me and had the most intense aggressive face. The only way I can describe it, it looks like a demon, that’s how angry he looked. He comes back towards me again with his hands up.”

A police officer from the nearby suburb of University City was shot overnight, but it was unclear if it was related to the grand jury’s decision in the Ferguson case, the St. Louis County police said early Tuesday.
The officer was shot in the arm was expected to be “okay,” the police said in a Twitter post. The police were searching for a suspect.

The officer was shot at the intersection of Canton Avenue and Lamb Avenue in University City, a police spokesman said.

12:42 A.M.Protesters Block Interstate 44 in St. Louis
Photo
Protesters shut down Interstate 44 at Grand Avenue in both directions in St. Louis on Monday.

Protesters shut down Interstate 44 at Grand Avenue in both directions in St. Louis on Monday.Credit J.B. Forbes/St. Louis Post-Dispatch, via Associated Press

12:33 A.M.Sounds of Gunfire and Alarms on Ferguson Streets
Photo
Fire roared through a Little Caesar's restaurant on Monday night in Ferguson, Mo.

Fire roared through a Little Caesar’s restaurant on Monday night in Ferguson, Mo.CreditTannen Maury/European Pressphoto Agency

There were numerous stretches of Ferguson late Monday night where all was calm, all was well. Stores with “I Love Ferguson” signs in the windows. The red bows and holiday lights wrapped around the light poles downtown still perfectly intact.

But there were pockets that felt like a city under siege.

A Little Caesars Pizza shop was in flames. There were shattered windows at El Palenque Mexican restaurant, and at a UMB Bank branch. Thick smoke poured from the busted front entrance of a Walgreens pharmacy. Men stepped in but quickly stepped out, complaining that it was too hard to see anything because of the smoke. The sound of gunfire occasionally rang out in the distance, and the acidic smell and aftertaste of tear gas filled the air. One man exited the store and jokingly asked if anyone wanted cigarettes.

At the intersection of North Florissant Road and Hereford Avenue – “Ferguson, a city since 1894,” reads the sign at the corner – firefighters worked on putting out the Little Caesars blaze, but there were no police or fire officials at Walgreens. The fire inside continued to burn. Spectators drove up to the store, as did news crews. All the while, the pharmacy’s high-pitched security bell echoed, the soundtrack of the evening’s drama.

“Not often you get to see anarchy, huh?” one man taking pictures outside Walgreens said.

MANNY FERNANDEZ

12:09 A.M.Protesters Block Highway in Oakland
Photo
Protesters in Oakland blocked a highway on Monday night in response to the grand jury's decision in Ferguson, Mo.

Protesters in Oakland blocked a highway on Monday night in response to the grand jury’s decision in Ferguson, Mo.Credit Jim Wilson/The New York Times

In Oakland, Calif., protesters blocked a portion of Interstate 580, forcing cars to stop. One man said he had been sitting in his car for about 45 minutes. “I knew there would be protests, but I didn’t think it would get this hectic with shutting down the freeway and all the cops,” said the man, Alex Perez, 28, of Oakland. He was trying to get home, but said he was sympathetic to what the protesters were trying to do. “It was unwarranted for a kid to get shot.”

MOMO CHANG

12:30 A.M.Protesting Coast to Coast
Photo
Demonstrators outside the White House on Monday.

Demonstrators outside the White House on Monday.Credit Jabin Botsford/The New York Times

Photo
A gathering in downtown Seattle.

A gathering in downtown Seattle.Credit Evan McGlinn for The New York Times

12:29 A.M.Flight restrictions at Lambert-St. Louis International

Inbound flights to Lambert-St. Louis International Airport were not being permitted to land late Monday as a safety precaution, officials said. The Federal Aviation Administration issued a temporary flight restriction, or TFR, affecting inbound flights, the airport said in a post on Twitter.

EMMA FITZSIMMONS

12:13 A.M.Michael Brown’s Mother Reacts

Credit

11:54 P.M.Protesters March in South Los Angeles
Photo
Demonstrators reacted on Monday night in Los Angeles  to the grand jury's decision not to indict Office Darren Wilson in the  fatal shooting of Michael Brown.

Demonstrators reacted on Monday night in Los Angeles  to the grand jury’s decision not to indict Office Darren Wilson in the  fatal shooting of Michael Brown.Credit Ringo Chiu/Agence France-Presse — Getty Images

Late on Monday night, a crowd of about 200 people had blocked traffic on Crenshaw Boulevard, a main thoroughfare through South Los Angeles. The crowd swelled to over 250 as it marched north, then turned east on Martin Luther King Jr. Boulevard, a central strip that cuts through South Los Angeles toward downtown Los Angeles.

Beating drums, the crowd chanted: “Turn up, turn down, we do this for Mike Brown.”

The crowd was young, mostly in their 20s and 30s. Police squad cars and officers stood by at a few intersections. Some protesters carried their cellphones, recording officers or photographing the scene. Helicopters hovered overhead.

John K. Givens, 45, a Los Angeles resident who works at a freight trading company, marched with the crowd, wearing a gray Dodgers cap and a navy blue vest jacket. “I was emotionally bothered by the decision,” Mr. Givens said of the grand jury in the Ferguson, Mo., case.

Mr. Givens said that as a black male, violent interactions were to be expected. His younger brother, Mr. Givens said, had been beaten by a Los Angeles police officer. “It’s nothing new,” he said. “This is the one that got the most media attention.”

http://news.blogs.nytimes.com/2014/11/24/live-updates-from-ferguson-on-the-grand-jury-decision-in-michael-brown-shooting/?_r=0

 

A town ravaged by anger: Before and after pictures show extent of damage to buildings in Ferguson

  • Pictures compares buildings in Ferguson before and after Monday
  • The grand jury decision in Derren Wilson case led to riots in city
  • Buildings were looted and set on fire as protests turned violent
  • Jury ruled Wilson will not be charged over killing Michael Brown 

Although Michael Brown’s family, President Barack Obama, and authorities called for peaceful protests, the Ferguson was soon out of control.

The riots saw a return to the looting, fires and property damages which took place on a smaller scale in August, immediately after the shooting of Brown.

Scroll down for video 

Damage done: Two buildings still smoulder after the riots that ravaged Ferguson, Missouri overnight

Damage done: Two buildings still smoulder after the riots that ravaged Ferguson, Missouri overnight

Before: A satellite image taken by Google in September 2012 show the buildings intact

Before: A satellite image taken by Google in September 2012 show the buildings intact

As the sun rose on Tuesday, the cityscape of Ferguson looked worlds away from satellite and Google Street View snaps taken just months earlier.

Pictures from yesterday in comparison with images from before, tracked down byThe Wall Street Journal, show the damage done.

Last night, tens of thousands of people in more than 170 cities across America – including Atlanta, Boston, Philadelphia, and Los Angeles, among others – were demonstrating against the long-awaited verdict.

However, despite the St. Louis grand jury decision, federal investigations into the shooting of Michael Brown continue the US Attorney General said on Monday.

The Justice Department will continue to pursue two investigations, one into potential civil rights violations by Officer Wilson when he shot dead unarmed Brown in August this year, and one into the practices of the Ferguson Police force.

Beauty lost: A beauty supply store has been left in ruins after Monday night's riots

Beauty lost: A beauty supply store has been left in ruins after Monday night’s riots

True beauty: A Google Street View snap from 2010 shows the shop in its original state

True beauty: A Google Street View snap from 2010 shows the shop in its original state

Burned out: A building in Ferguson only has its four walls left after being destroyed by fire

Burned out: A building in Ferguson only has its four walls left after being destroyed by fire

Better times: The building, which appears to be a shop, is pictured on Google earlier this year

Better times: The building, which appears to be a shop, is pictured on Google earlier this year

The fire at the local Little Ceasars restaurant left the big orange sign in a melted lump on the ground

The fire at the local Little Ceasars restaurant left the big orange sign in a melted lump on the ground

Neighborhood joint: There is no sign of its former glory, captured by Google in August 2012

Neighborhood joint: There is no sign of its former glory, captured by Google in August 2012

Distraught: The manager of the Little Caesar’s said he understood the protesters were angry but added: ‘Speaking your mind – that’s America. You are supposed to be able to protest peacefully and make your point. But this…’

More destruction: The arson frenzy also hit South Florissant Street, about a mile away. This branch of Little Casear's was burned out

More destruction: The arson frenzy also hit South Florissant Street, about a mile away. This branch of Little Casear’s was burned out

Et tu: The neighboring antique shop to the Little Caesar's was also destroyed in the orgy of violence which hit Ferguson

Long way back: A woman stops to take a picture using her phone of the damage done

Long way back: A woman stops to take a picture using her phone of the damage done

Still intact: The local Clean World Laundromat was still standing on Monday morning

Still intact: The local Clean World Laundromat was still standing on Monday morning

Residents on the streets told MailOnline that the wreckage to Ferguson was so bad that it looked like ‘Ferganistan’.

Another said that it ‘looked like Iraq’.

Almost every building along South Florissant Street, where the Ferguson police station is located, had been ransacked or vandalised.

Tony Koenig and his brother Ray, 38 and 40, had taken the day off from working as school groundskeepers to help rebuild a Mexican restaurant run by a friend.

Tony said: ‘I have lived in Ferguson for 38 years and I have never seen anything like this. They just want street justice and they don’t care about how they get it.

‘This young generation. I cannot understand why they do what they do. The parents are to blame. When me and my brother grew up both our parents worked and we were raised knowing how to show respect, and that doesn’t happen these days.

‘We’ve had a hard enough time paying our mortgages after the economy went down. We don’t need this’.

Their friend Drew Canaday, who was also helping them, lives in the street next to South Florissant and said that it was ‘like a war’ the night before.

Destruction: :A rioter uses a stick to break a window at the Hunan Chop Suey Chinese Restaurant along West Florissant Ave last night

Destruction: :A rioter uses a stick to break a window at the Hunan Chop Suey Chinese Restaurant along West Florissant Ave last night

Nothing left: This was all that was left of the Hunan Chop Suey Chinese restaurant this morning after the fire wrecked it 

Nothing left: This was all that was left of the Hunan Chop Suey Chinese restaurant this morning after the fire wrecked it

Picture: 'I don't condone this but I can understand it. I have been racially profiled myself,' said Jason Westbrook of Ferguson as he took video of the burning of the Title Max Loans business on West Florissant

As they were: The Hunan Chop Suey and TitleMax loans were both intact before last night's orgy of violence

As they were: The Hunan Chop Suey and TitleMax loans were both intact before last night's orgy of violence

As they were: The Hunan Chop Suey and TitleMax loans were both intact before last night’s orgy of violence

Burning: Cars parked outside one row of shops on West Florissant were targeted in the destruction spree

Burning: Cars parked outside one row of shops on West Florissant were targeted in the destruction spree

Burned out: Cars parked outside one row of shops on West Florissant were targeted in the destruction spree 

Inspection: The scale of destruction became clear today after a night which saw fires raised across the St Louis suburb of Ferguson

Attacked: McDonald's on West Florissant was smashed up although not set on fire. It had previously avoided damage

Attacked: McDonald's on West Florissant was smashed up although not set on fire. It had previously avoided damage

Attacked: McDonald’s on West Florissant was smashed up although not set on fire. It had previously (right) avoided damage

Devastated: A gas station was among the targets of the violence. Today property manager Terri Willits witnessed the destruction

Crime scene: Much of West Florissant was under police guard today and described by officers as an active crime scene

Crime scene: Much of West Florissant was under police guard today and described by officers as an active crime scene

Crime scene: Much of West Florissant was under police guard today and described by officers as an active crime scene

‘Especially something this big. It takes dialogue and not everyone will be happy but that’s compromise.

‘These people don’t want to wait. That what today’s society has come to, not just here in Ferguson – this is America, this is the world.’

Further up South Florissant a Little Caesar’s pizza restaurant had been burned to the ground, as had the antiques store next to it.

The manager of the restaurant, who declined to give his name for fear of reprisals, said that 12 people had now been put out of work and did not know if the owners would rebuild.

The manager said that the store was destroyed by a tornado three years earlier and they did build it back but it cost ‘a lot of money’.

He said: ‘Most of the people here have families and they are very worried about what will come next for them.

‘I’m proud to work here and started as the dishwasher and worked my way up. I had a motorcycle accident and had my foot amputated and they were good enough to give me a job,

The manger, a widower with two children in their 20s, said that he was in principle on the side of the protesters but that this was ‘too far’.

He said: ‘I believe in their right to protest and what they’re doing is a just case.

‘Speaking your mind – that’s America. You are supposed to be able to protest peacefully and make your point. But this…’

Read more: http://www.dailymail.co.uk/news/article-2850383/A-town-ravaged-anger-pictures-extent-damage-buildings-Ferguson.html#ixzz3KCPcRKOm

Ferguson: In Defense of Rioting

Darlena Cunha

Darlena Cunha is a Florida-based contributor to The Washington Post and TIME among dozens of other publications.

The violent protests in Ferguson, Mo., are part of the American experience. Peaceful protesting is a luxury only available to those safely in mainstream culture

When a police officer shoots a young, unarmed black man in the streets, then does not face indictment, anger in the community is inevitable. It’s what we do with that anger that counts. In such a case, is rioting so wrong?

Riots are a necessary part of the evolution of society. Unfortunately, we do not live in a universal utopia where people have the basic human rights they deserve simply for existing, and until we get there, the legitimate frustration, sorrow and pain of the marginalized voices will boil over, spilling out into our streets. As “normal” citizens watch the events of Fergusonunfurl on their television screens and Twitter feeds, there is a lot of head shaking, finger pointing, and privileged explanation going on. We wish to seclude the incident and the people involved. To separate it from our history as a nation, to dehumanize the change agents because of their bad and sometimes violent decisions—because if we can separate the underlying racial tensions that clearly exist in our country from the looting and rioting of select individuals, we can continue to ignore the problem.

While the most famous rant against the riots thus far comes from Hercules actor Kevin Sorbo, where he calls the rioters “animals” and “losers,” there are thousands of people echoing these sentiments. Sorbo correctly ascertains that the rioting has little to do with the shooting of an unarmed black man in the street, but he blames it on the typical privileged American’s stereotype of a less fortunate sect of human being—that the looting is a result of frustration built up over years of “blaming everyone else, The Man, for their failures.”

Because when you have succeeded, it ceases to be a possibility, in our capitalist society, that anyone else helped you. And if no one helped you succeed, then no one is holding anyone else back from succeeding. Except they did help you, and they are holding people back. So that blaming someone else for your failures in the United States may very well be an astute observation of reality, particularly as it comes to white privilege versus black privilege. And, yes, they are different, and they are tied to race, and that doesn’t make me a racist, it makes me a realist. If anything, I am racist because I am white. Until I have had to walk in a person of color’s skin, I will never understand, I will always take things for granted, and I will be inherently privileged. But by ignoring the very real issues this country still faces in terms of race to promote an as-of-yet imaginary colorblind society, we contribute to the problem at hand, which is centuries of abuses lobbied against other humans on no basis but that of their skin color.

Sorbo is not alone. A webpage devoted to Tea Party politics has hundreds of comments disparaging the rioters, bemoaning the state of our country and very much blaming skin color as the culprit of this debauched way of dealing with the state of our society.

“To hear the libs, one would think that burning and looting are a justifiable way to judge negative events that effect (sic) the black,” one person wrote. “I intentionally used black because of a fact that you do not hear of these events when another skin color is in play. It is about time that the blacks start cleaning their own backyards before they start on ours.”

However, even the Tea Party gets its name from a riot, The Boston Tea Party. For those who need a quick history brush-up, in 1773 American protesters dumped an entire shipment of tea into the Boston Harbor to protest The Tea Act, which colonists maintained violated their rights. In response to this costly protest and civil unrest, the British government enforced The Coercive Acts, ending local government in Massachusetts, which in turn led to the American Revolution and created our great country.

Samuel Adams wrote of the incident, claiming it “was not the act of a lawless mob, but was instead a principled protest and the only remaining option the people had to defend their constitutional rights” according to John K. Alexander, author ofSamuel Adams: America’s Revolutionary Politician.

That protest back in 1773 was meant to effect political and societal change, and while the destruction of property in that case may not have ended in loss of human life, the revolutionthat took place afterward certainly did. What separates a heralded victory in history from an attempt at societal change, a cry for help from the country’s trampled, today? The fact that we won.

In terms of riots being more common in black communities, that is true only when the riots are politically aimed.

The obvious example here is the L.A. Riots of 1992, after the Rodney King beating and verdict. I would put forth that peaceful protesting is a luxury of those already in mainstream culture, those who can be assured their voices will be heard without violence, those who can afford to wait for the change they want.

“I risk sounding racist but if this was a white kid there would be no riot,” another person wrote on the Tea Party page. “History shows us that blacks in this country are more apt to riot than any other population. They are stirred up by racist black people and set out to cause problems. End of story.”

Blacks in this country are more apt to riot because they are one of the populations here who still need to. In the case of the 1992 riots, 30 years of black people trying to talk about their struggles of racial profiling and muted, but still vastly unfair, treatment, came to a boil. Sometimes, enough is simply too much. And after that catalyst event, the landscape of southern California changed, and nationally, police forces took note.

And the racism they are fighting, the racism we are all fighting, is still alive and well throughout our nation. The modern racism may not culminate in separate water fountains and separate seating in the backs of buses, but its insidious nature is perhaps even more dangerous to the individuals who have to live under the shroud of stereotypical lies society foists upon them.

Instead of tearing down other human beings who are acting upon decades of pent-up anger at a system decidedly against them, a system that has told them they are less than human for years, we ought to be reaching out to help them regain the humanity they lost, not when a few set fire to the buildings in Ferguson, but when they were born the wrong color in the post-racial America.

http://time.com/author/darlena-cunha-2/

 

Dozens in Boston face charges for Ferguson protest

By Martin Finucane and Peter Schworm

Dozens of people are facing charges after crowds took to the streets of Boston Tuesday night to protest a grand jury’s decision not to charge a Ferguson, Mo., police officer in the fatal shooting of a black teenager who was unarmed.

Boston police arrested 47 people on charges that include disorderly conduct and disturbing the peace, said police spokesman Officer James Kenneally.
Still, there were no major incidents or injuries reported in the mostly peaceful demonstrations.

“All in all, I think everybody handled themselves pretty well last night,” said Police Commissioner William Evans. “We wanted people to be able to express their frustration but, at the same time, we did want everybody to be safe.”

Demonstrations also took place in other cities around the country, including in New York, Seattle, and Washington, D.C., as the decision not to indict Officer Darren Wilson in the death of Michael Brown sparked a heated national debate about law enforcement’s relationship with minority communities.

View Graphic
Map: Ferguson protests in US
Though most of the gatherings were peaceful the day after the announcement, many cities saw marchers disrupting traffic and getting into confrontations with police.
Photos: Protesters march
Anthony Braga: Why Boston’s protests were mostly peaceful
Sense of resigned anger in Boston

The Boston marchers faced arraignment Wednesday in Roxbury District Court and Boston Municipal Court. About half those arrested were Boston residents. Most were college students, Kenneally said.

Many were arrested at Melnea Cass Boulevard and Massachusetts Avenue, where there was a sit-in, he said.

Evans said at a news conference that police had gone with a “real soft approach.”

He said he felt the protest went well “because of our whole style,” which includes “great community relations” and a constant dialogue with the community.

He said police recognized a number of the protesters from Occupy Boston, which occupied an area in downtown Boston in 2011.

Police expect protests to continue as long as Ferguson itself is “hot,” but he said, “I’d like to continue dialogue so Boston can be a model of how protests should go.”

At Roxbury District Court, one protester being arraigned painted a less sunny view of how police behaved.

“I was struck in the face by police. They put me in a headlock and dragged me out of the protest group and they hit me in the face, they threw me on the ground. … They handled it pretty poorly,” said David Meredith, a Salem State junior from Revere. Meredith had a black eye, which he said police had inflicted on him.

“I wasn’t shocked. I was appalled, but I wasn’t shocked. The police were being very confrontational. They seemed very angry the entire time,” he said, noting that he saw an officer choking another man, who was holding a camera.
Both Boston police and State Police interacted with demonstrators. It wasn’t clear what agency the officers who confronted Meredith came from.

David Procopio, a State Police spokesman, said that “because of superb cooperation and coordination between State and Boston police, we were able to prevent protesters from entering the Southeast Expressway and the Mass. Turnpike.”

He added that monitoring social media “provided critical intelligence about protesters’ plans to try to disrupt traffic on state highways.”

One state trooper was bitten on the wrist by a protester, Procopio said. He was treated by Boston EMS on the scene.

An estimated 1,400 protesters marched from Dudley Square to the South Bay House of Correction, then onto the Massachusetts Avenue Connector near Interstate 93 before being blocked by police, the Globe reported Wednesday morning

The protesters spread across Boston, through Back Bay and the Financial District, meeting police again in Dewey Square — the former site of the Occupy encampment — outside South Station late Tuesday night, the Globe reported.

State troopers also assisted with other largely peaceful protests in Worcester, Northampton, and Springfield Tuesday night, Procopio said. No tactical and riot-control units were used, though they were on standby.

Procopio said State Police would maintain an increased presence at potential demonstration sites in Boston over the next several days.

http://www.bostonglobe.com/metro/2014/11/26/arraigned-today-after-crowds-protest-ferguson-grand-jury-decision/nHoyjKL83C6uZyJPevrAGK/story.html

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 376-379

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Skim Milk — Bananas — Videos

Posted on November 23, 2014. Filed under: Agriculture, American History, Biology, Blogroll, Chemistry, Communications, Diet, Food, Freedom, Friends, government, government spending, Health Care, history, Medical, Milk, People, Philosophy, Raves, Reviews, Science, Talk Radio, Wisdom, Writing | Tags: , , , , , , , , |

Is Milk Good For You?

The benefits of skim milk

Which is Healthier: Whole Milk or Skim Milk?

5 Reasons to stop drinking MILK

The BEST fat-burner food is BANANAS!

Monsanto & Cancer Milk: FOX NEWS KILLS STORY & FIRES Reporters

Milk The Deadly Poison

Today’s Modern Food: It’s not what you think – Part 1 of 2

Today’s Modern Food: It’s not what you think – Part 2 of 2

10 Foods NOT to eat

 

 

 

Read Full Post | Make a Comment ( None so far )

Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos

Posted on November 18, 2014. Filed under: American History, Blogroll, Books, Business, Central Intelligence Agency (CIA), Computers, Constitution, Corruption, Crime, Crisis, Diasters, Documentary, Education, Employment, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Films, Foreign Policy, Fraud, Freedom, Friends, government, government spending, history, Homicide, Illegal, Immigration, Language, Law, liberty, Life, Links, Literacy, media, National Security Agency (NSA_, People, Philosophy, Photos, Politics, Press, Radio, Raves, Regulations, Reviews, Security, Strategy, Unemployment, War, Wealth, Weapons, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014

Story 1: Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos

Stuff They Don’t Want You to Know – Dirty Tricks: Agent Provocateur

Preparing for violence in Missouri

Ferguson Nervously Awaits Grand Jury Decision

How police Agent Provocateur frame people

Provocateur Caught Throwing Bricks At Ferguson Police

John Sayles on New FBI Rules & Role of Agent Provocateurs in Disrupting Social Movements

FBI Warns of Ferguson Violence from ‘Extremists’ After Grand Jury Decision

Ferguson braces for grand jury decision

Biracial couple: We’re staying in Ferguson

Snipers Take Aim and Push Infowars Reporters

Combat Vet Ferguson Missouri Has Turned Into Fallujah Iraq

Infowars Shatters Multiple Mainstream Media Lies in Ferguson, MO

Infowars Recounts Ferguson Police State

Missouri Deploys National Guard

Occupy LA – Police Provocateurs Confirmed

Occupy LA has become victim to police provocateur (under cover cops causing violence) much like other cities around the world. What to look for:

The same boots,
black masks
black backpacks,
specific type of black bandana.

Police Provocateurs are not smart, and they are easy to spot. Do not let your 1st amendment rights be trampled by corrupt police.

LAPD Infiltrators and Agent Provocateurs Targeted Left and Panthers – Johnston on RAI – (2/4)

The Deep State and the Power of Billionaires – David Cay Johnston on Reality Asserts Itself (3/4)

Ferguson on the edge: RT America special on eve of grand jury ruling

Michael Brown Protests Turns Into RIOT…LOOTINGS…VIOLENCE(RIOT Police Called In)

Ferguson, Missouri LOOTERS Target FOOT LOCKER…FAMILY DOLLAR …RIMS… BURNS Down QUICKTRIP!!

Violence erupts in Ferguson

COINTELPRO 101 – The Sabotage Of Legitimate Dissent

Activists Who Stole FBI Documents in 1971 Revealing COINTELPRO Speak Out

Betty Medsger “The Burglary”

TREASON 101 FBI Cointelpro

COINTELPRO: The FBI’s War on Black America

BUSTED! Proof Missouri Riots Were Obama’s Attempt To Implement A Martial Law Police State!

FBI Agent Provocateur Suggested Terror Attack at Mosque

FBI – Don’t post that or I’ll be “livid”

Return of the Ferguson War Zone? Missouri Enacts State of Emergency Ahead of Mike Brown Grand Jury

 Missouri Gov. Jay Nixon has declared a state of emergency in advance of the grand jury’s pending decision in the Michael Brown shooting case. On Monday, Nixon issued an executive order to activate the state’s National Guard in response to what he called “the possibility of expanded unrest.” Nixon cited the protests in Ferguson and the St. Louis area since Brown, an unarmed black teenager, was killed by police officer Darren Wilson on August 9. The grand jury has been meeting for nearly three months, and protests are expected to escalate if they choose not to indict. But while state officials say they fear violence, protesters say they fear a return to the militarized crackdown that turned their community into a war zone. As the grand jury nears a decision and all sides prepare for the unknown under a state of emergency, we are joined by two guests: Jeff Smith, a New School professor and former Missouri state senator whose new book is “Ferguson: In Black and White,” and Montague Simmons, chair of the St. Louis-based Organization for Black Struggle and a key organizer in the movement that has emerged since Brown’s killing.

Under Obama, U.S. personal freedom ranking slips below France

U.S. Secrets: Classified Intelligence, CIA,FBI,NSA,Secret Service, Edward Snowden

 

The No Indictment.org Ferguson protest group released its list of potential targets following the decision by the St. Louis County Courthouse on the Mike Brown case.

The published map shows expected landmarks like the Ferguson City Hall and the County Courthouse.

But it also marks things that have NOTHING to do with the Michael Brown situation, like Anheuser Busch and Boeing.
ferguson targets

Most telling thing is the mark for Emerson Electric. Emerson has been in Ferguson for at least 50 years, long before Ferguson became a minority municipality. Yet not only do they mark Emerson they make note of the CEO’s salary. Maybe they’re mutating into an extortion group straight out of the playbook of Jesse Jackson’s Rainbow Push Coalition?

Below is the published list of potential St. Louis area targets.
Potential Action Locations

  • Robert McCulloch’s office
  • St. Louis County Justice Center
  • Stephanie Karr’s office
  • Olin Corporation Headquarters
  • Judge Maura McShane’s courtroom
  • St. Louis County Police Department
  • Governor Nixon’s Office (Wainwright Building)
  • Clayton School District Office
  • Department of Justice
  • Dean Plocher’s office
  • Ronald Brockmeyer’s office
  • Dan Boyle’s office
  • Thomas Flach’s office
  • Regal III Market
  • Canfield Green Apartments
  • Ferguson Police Department & Jail
  • West Florissant Quick Trip
  • Missouri Botanical Gradens
  • Powell Symphony Hall
  • Monsanto Headquarters
  • Peabody Energy Headquarters
  • Anheuser-Busch Headquarters
  • Emerson Electric Headquarters
  • Steve Stenger’s lawfirm
  • St. Louis Art Museum
  • Gateway Arch
  • Peabody Opera House
  • Ritz Carlton
  • Lambert International Airport
  • Mayor Slay
  • Boeing
  • St. Louis City Police Department
  • St. Louis Galleria
  • Plaza Frontenac
  • Six Stars Market
  • Colonel Jon Belmar
  • Senator Roy Blunt
  • Senator Claire McCaskill
  • St. Louis City Justice Center
  • St. Ann Police Department & Jail
  • Clayton City Hall
  • GCI Security, Inc.
  • St. Louis County Council
  • Clayton Police Department & Jail
  • Ferguson City Hall
  • Lacy Clay’s Office
  • Donors
  • Husch Blackwell LLP
  • Martin Insurance Group LLC
  • Stone, Leyton & Gershman
  • University Square Company
  • Stone & Alter Real Estate
  • Carey & Danis LLC
  • The Law Firm of Thomas C Antoniou LLC
  • Hammond & Shinners Law Firm
  • Collinsville Acquisitions Inc
  • Thompson Coburn
  • Commercial Bank
  • Sanctuaries
  • Greater St. Mark Family Church
  • Veterans for Peace Office
  • St. John’s Episcopal Church
  • Hospitals
  • St. Louis University Hospital
  • SSM Cardinal Glennon Children’s Medical Center
  • SSM St. Mary’s Health Center
  • Barnes Jewish Hospital
  • St. Alexius Hospital
  • Kindred Hospital
  • Southwest Medical Center

The Ferguson Mike Brown protesters are not ruling out violence or looting.

“Rioting and looting are the tools of those without a voice. The rioting and looting, while I didn’t participate in it, was necessary. Without it we would not be standing here today.”

 

http://www.thegatewaypundit.com/2014/11/justice-for-mike-brown-group-releases-list-of-targets-including-anheuser-busch-boeing-emerson-electric-airport/

 

No Indictment Planning

#Ferguson

 

In preparation for a no-indictment decision, here is the important information to know.

 

On August 9, 2014, Mike Brown was killed by Officer Darren Wilson. For nearly 100 days, we have protested to demand an indictment. We are hopeful that Darren Wilson will be indicted for murder, but the recent signs do not seem that this outcome is likely.

 

We will update this page daily with key information regarding post indictment decision announcement planning. And this isn’t meant to replace twitter or the newsletter, but to be a central space for information that can be updated in real-time.

 

If you’d like to donate, please click here.

 

If you have not already done so, please read the last Protestor and Ally Open Letter entitled, “An American Horror Story,” by clicking here.

 

We are on the right side of justice. Stand with us.

 

// Netta (@nettaaaaaaaa) and DeRay (@deray)

 

P.S. To suggest additions to the site, please e-mail us at netta@thisisthemovement.org or deray@thisisthemovement.org.

Possible Protest Spaces

Here is a map of possible protest spaces. Remember, we actively advocate and profess the importance of peaceful protest. We do not support, condone, or encourage violence.

 

Safe Spaces

These are spaces to escape police violence, get updated on protest plans and all are located near protest zones.

 

Shaw: St. John’s Episcopal Church, 3664 Arsenal, 63166

 

Ferguson: Greater St. Mark’s Church, 9950 Glen Owen Drive, 63136

 

Clayton: Veterans for Peace Office, 216 S. Meramec Ave., 63105

 

 

Day of Non-Indictment Decision Announcement

On the day of the non-indictment announcement, protestors are gathering at the #Ferguson PD Lot and at VonDerrit’s memorial site in Shaw.

 

Day AFTER Non-Indictment Decision Announcement

On the day AFTER the non-indictment announcement, protestors are gathering in Clayton. More information is forthcoming.

 

Grand Jury Announcement Text Alert

Click here to sign up to receive a text alert when the Grand Jury makes its decision regarding the killing of Michael Brown Jr. (Here’s the direct link: http://bit.ly/GJText)

 

Rules of Engagement

Protestors publicly proposed Rules of Engagement for police in the event of a non-indictment. Here is the link to the rules: http://media.wix.com/ugd/9c5255_9d5572481c7840fbad088ef6d8ae82d4.pdf

 

Law-Related Volunteers

Lawyers, Legal Workers, and Law Students – The Ferguson Legal Defense Fund, a coalition of St. Louis lawyers and firms, has issued an emergency call to action to find volunteers to assist with legal representation, jail supports and visits, legal research, legal observation, and legal observation and training. Click here to learn more and to volunteer.

 

Nationwide Actions Planned

Click here to learn more about the actions planned across the country in the event of a non-indictment. Actions are currently planned in 50+ cities across America.

 

Protest Preparation

For a primer and re-cap of the direct action trainings, click here to access the core materials. More information will be posted in the coming days.

 

Support With Safe House Supplies

All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.

Food
Apples, Oranges, Pretzels, Chips, Crackers, Peanut Butter, Jelly, Carrots, Granola Bars, Cookies, Chips & Salsa, Nuts, Bread, Jerky, Cheese, Hummus
Drinks
Water, Coffee, Tea, Juice, Gatorade
Cleaning/Eating
Toilet Paper, Paper Towels, Disinfectant Wipes, Hand Soap, Disposable Plates, Cups, Napkins, Utensils, Trash Bags
Electronics
Surge Protectors, Flashlights (w/ batteries), Cell Phone Chargers
Wearables
Blankets, Hand Warmers
Communication
Flip Chart Markers, Pens, Pads of Paper

 

 

Safe Spaces and Sanctuaries

We will publish the list of Safe Spaces and Sanctuaries later this week.

 

Hospitals and urgent care: Name, address, approximate time by car from Canfield Green Apts, phone number, hours.

  • St Louis University Hospital: 3635 Vista Ave, STL. 25 min. 314-577-8000.
  • Concentra Urgent Care: 463 Lynn Haven, Hazelwood. 13 Min. 314-731-0448. M-F 8-5
  • Concentra Urgent Care — North Broadway. 8340 N Broadway, STL. 15 min. 314-385-9563. M-F 8-5.
  • St Luke’s Urgent Care: 8857 Ladue Rd, STL. 18 min. 314-576-8189. M-Su 8-8.

 

 

Protestor Action Kit:

  1. Jail support number written on your body with permanent marker
  2. Change of warm clothes
  3. Plastic gallon bags
  4. Snacks/Water
  5. Portable phone charger
  6. Paper map
  7. Medications
  8. Gloves, hat, scarf, hand warmers
  9. Shatter proof goggles
  10. Quick reference sheet with names (first, last) and date of birth for each member of your team/cohort and any important phone numbers and addresses
  11. Medical supplies: gauze, tape, L.A.W. (liquid antacid and water – Maalox and water), mask, cold pack

 

Support With Protest Supplies

All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.

Signage
White Bed Sheets (for banners), Banners, Spray Paint
Gas Masks
2 liter plastic bottles, box cutters, duct tape, rubber foam, shoestrings, elastic bands, glue
Wooden Shields
Rubber hoses, ¾” and ½” Phillps screws, 11/32” plywood sheathing cut into 32X34” sections, electric drills or Phillips screwdrives
Other

http://noindictment.org/

FBI Warns Ferguson Decision ‘Will Likely’ Lead to Violence By Extremists Protesters

Jeff Roberson/AP Photo
PHOTO: A protester kicks a smoke grenade that had been deployed by police back in the direction of police, Aug. 13, 2014, in Ferguson, Mo.

The bulletin cites a series of recent messages threatening law enforcement, including a message posted online last week by a black separatist group that offered “a $5,000 bounty for the location” of Ferguson police officer Darren Wilson, who fired the shots that killed Brown on Aug. 9.

In interviews with ABC News, police officials said their departments have identified a number of agitators who routinely appear at mass demonstrations.

“How many of those sympathizers are actually sympathizers?” Rick Hite, the chief of the Indianapolis Metropolitan police department, wondered. Many of them see the protests as a way to “chime in with their own personal agenda,” he said.

In its new intelligence bulletin, obtained by ABC News, the FBI says “exploitation” of mass demonstrations “could occur both in the Ferguson area and nationwide.”

“All it takes is one.”

Overall, though, law enforcement officials contacted by ABC News – stretching from Los Angeles to the Atlanta area – remained confident that any protests in their cities would not be tainted by violence.

“We are not expecting any issues in our city,” said Billy Grogan, the chief of police in Dunwoody, Ga., outside Atlanta. “However, we are preparing just in case. I believe most departments are watching the situation closely and are prepared to respond if needed.”

A law enforcement official in Pennsylvania agreed, saying that while authorities there are not enacting any significant new measures they are “monitoring” developments out of Ferguson.

PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.

Scott Olson/Getty Images
PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.

In addition, police officials emphasized that efforts to address a big decision like the one pending in Ferguson actually begin well before that decision.

In Indianapolis, police have held two town-hall meetings in the past two months to discuss the Ferguson issue with concerned residents, and meetings like that help build a “bank of trust,” Hite said.

But it’s sometimes hard to build such trust between a community and the law enforcement officers working its streets.

With several recent cases involving allegations of excessive force by police officers, many in African-American communities can’t help but wonder why seemingly routine encounters escalate so dramatically.

PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.

Jeff Roberson/AP Photo
PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.

In a recent interview with ABC News, Philadelphia Police Chief Charles Ramsey said people in “communities of color” often “don’t view us as people who really have the right to enforce laws or tell them what to do,” and sometimes it’s because of “the way they’ve seen us conduct ourselves in the past.”

“Not all cops, but all it takes is one,” Ramsey said. “As human beings, we tend to remember the one bad incident, not the 10 good ones that we may have experienced.”

On the other side of the spectrum, there are some uncomfortable facts that may be influencing how some police respond to African-Americans they encounter on routine patrols.

In particular, African-Americans are disproportionally represented in crime. According to the FBI, 4,379 blacks were arrested for murder last year, while 3,799 whites were arrested for murder – even though census numbers show there are six times more whites than blacks in the United States.

But as Ramsey said, crime statistics are no excuse for police bias.

“Protest. But protest peacefully. Have your voices be heard.”

And now a grand jury in Ferguson and federal prosecutors are separately looking into whether that type of bias led to Brown’s death.

It’s unclear whether the facts of the case will lead to any prosecution. Indeed, it seems few pieces of evidence are without dispute.

The day after the encounter that resulted in Brown’s death, St. Louis County Police Chief Jon Belmar told reporters that Brown “physically assaulted” Wilson inside his police car and that “there was a struggle over the officer’s weapon.” At least one shot was fired inside the car, but the fatal shot was fired when both Wilson and Brown were outside the car, according to Belmar. At least one witness said Brown was shot “with his arms up in the air,” while the police claim Wilson fired because Brown was advancing towards him.

PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.

Jeff Roberson/AP Photo
PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.

Pressed in September to acknowledge that the Justice Department’s own civil rights investigation may not result in charges, outgoing Attorney General Eric Holder would only say that “at the end of the day, it’s most important that we get it right.”

As for what’s ahead in Ferguson and communities across the country, Ramsey offered this piece of advice: “Protest. But protest peacefully. Have your voices be heard.”

http://abcnews.go.com/Politics/fbi-warns-ferguson-decision-lead-violence-extremist-protesters/story?id=26980624

The Wonderful American World of Informers and Agents Provocateurs


A New York City police officer near the New York Stock Exchange, Wednesday, July 11, 2012, in New York. (AP Photo/Frank Franklin II)

This article originally appeared at TomDispatch.com. To stay on top of important articles like these, sign up to receive the latest updates from TomDispatch.com.

Only Martians, by now, are unaware of the phone and online data scooped up by the National Security Agency (though if it turns out that they are aware, the NSA has surely picked up their signals and crunched their metadata). American high-tech surveillance is not, however, the only kind around. There’s also the lower tech, up-close-and-personal kind that involves informers and sometimes government-instigated violence.

Just how much of this is going on and in how coordinated a way no one out here in the spied-upon world knows. The lower-tech stuff gets reported, if at all, only one singular, isolated event at a time—look over here, look over there, now you see it, now you don’t. What is known about such surveillance as well as the suborning of illegal acts by government agencies, including the FBI, in the name of counterterrorism has not been put together by major news organizations in a way that would give us an overview of the phenomenon. (TheACLU has done by far the best job of compiling reports on this sort of spying on Americans.)

Some intriguing bits about informers and agents provocateurs briefly made it into the public spotlight whenOccupy Wall Street was riding high. But as always, dots need connecting. Here is a preliminary attempt to sort out some patterns behind what could be the next big story about government surveillance and provocation in America.

Two Stories From Occupy Wall Street

The first is about surveillance. The second is about provocation.

On September 17, 2011, Plan A for the New York activists who came to be known as Occupy Wall Street was to march to the territory outside the bank headquarters of JPMorgan Chase. Once there, they discovered that the block was entirely fenced in. Many activists came to believe that the police had learned their initial destination from e-mail circulating beforehand. Whereupon they headed for nearby Zuccotti Park and a movement was born.

The evening before May Day 2012, a rump Occupy groupmarched out of San Francisco’s Dolores Park and into the Mission District, a neighborhood where not so many 1 percenters live, work or shop. There, they proceeded to trash “mom and pop shops, local boutiques and businesses, and cars,” according to Scott Rossi, a medic and eyewitness, who summed his feelings up this way afterward: “We were hijacked.” The people “leading the march tonight,” he added, were

clean cut, athletic, commanding, gravitas not borne of charisma but of testosterone and intimidation. They were decked out in outfits typically attributed to those in the “black bloc” spectrum of tactics, yet their clothes were too new, and something was just off about them. They were very combative and nearly physically violent with the livestreamers on site, and got ignorant with me, a medic, when I intervened.… I didn’t recognize any of these people. Their eyes were too angry, their mouths were too severe. They felt “military” if that makes sense. Something just wasn’t right about them on too many levels.

He was quick to add, “I’m not one of those tin foil hat conspiracy theorists. I don’t subscribe to those theories that Queen Elizabeth’s Reptilian slave driver masters run the Fed. I’ve read up on agents provocateurs and plants and that sort of thing and I have to say that, without a doubt, I believe 100 percent that the people that started tonight’s events in the Mission were exactly that.”

Taken aback, Occupy San Francisco condemned the sideshow: “We consider these acts of vandalism and violence a brutal assault on our community and the 99%.”

Where does such vandalism and violence come from? We don’t know. There are actual activists who believe that they are doing good this way; and there are government infiltrators; and then there are double agents who don’t know who they work for, ultimately, but like smashing things or blowing them up. By definition, masked trashers of windows in Oakland or elsewhere are anonymous. In anonymity, they—and the burners of flags and setters of bombs—magnify their power. They hijack the media spotlight. In this way, tiny groups—incendiary, sincere, fraudulent, whoever they are—seize levers that can move the entire world.

The Sting of the Clueless Bee

Who casts the first stone? Who smashes the first window? Who teaches bombers to build and plant actual or spurious bombs? The history of the secret police planting agents provocateurs in popular movements goes back at least to nineteenth-century France and twentieth-century Russia. In 1905, for example, the priest who led the St. Petersburg’s revolution was some sort of double agent, as was the man who organized the assassination of the czar’s uncle, the grand duke. As it happens, the United States has its own surprisingly full history of such planted agents at work turning small groups or movements in directions that, for better or far more often worse, they weren’t planning on going. One well-documented case is that of “Tommy the Traveler,” a Students for a Democratic Society (SDS) organizer who after years of trying to arouse violent action convinced two 19-year-old students to firebomb an ROTC headquarters at Hobart College in upstate New York. The writer John Schultz reported onlikely provocateurs in Chicago during the Democratic National Convention of 1968. How much of this sort of thing went on? Who knows? Many relevant documents molded in unopened archives, or have been heavily redacted or destroyed.

As the Boston marathon bombing illustrates, there are homegrown terrorists capable of producing the weapons they need and killing Americans without the slightest help from the US government. But historically, it’s surprising how relatively often the gendarme is also a ringleader. Just how often is hard to know, since information on the subject is fiendishly hard to pry loose from the secret world.

Through 2011, 508 defendants in the United States were prosecuted in what the Department of Justice calls “terrorism-related cases.” According to Mother Jones’s Trevor Aaronson, the FBI ran sting operations that “resulted in prosecutions against 158 defendants”—about one-third of the total. “Of that total, forty-nine defendants participated in plots led by an agent provocateur—an FBI operative instigating terrorist action. With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings.”

In Cleveland, on May Day of 2012, in the words of a Rolling Stone exposé, the FBI “turned five stoner misfits into the world’s most hapless terrorist cell.” To do this, the FBI put a deeply indebted, convicted bank robber and bad-check passer on its payroll, and hooked him up with an arms dealer, also paid by the bureau. The FBI undercover man then hustled five wacked-out wannabe anarchists into procuring what they thought was enough C4 plastic explosive to build bombs they thought would blow up a bridge. The bombs were, of course, dummies. The five were arrested and await trial.

What do such cases mean? What is the FBI up to? Trevor Aaronson offers this appraisal:

The FBI’s goal is to create a hostile environment for terrorist recruiters and operators—by raising the risk of even the smallest step toward violent action. It’s a form of deterrence.… Advocates insist it has been effective, noting that there hasn’t been a successful large-scale attack against the United States since 9/11. But what can’t be answered—as many former and current FBI agents acknowledge—is how many of the bureau’s targets would have taken the step over the line at all, were it not for an informant.

Perhaps Aaronson is a bit too generous. The FBI may, at times, be anything but thoughtful in its provocations. It may, in fact, be flatly dopey. COINTELPRO records released since the 1960s under the Freedom of Information Act (FOIA) show that it took FBI Director J. Edgar Hoover until 1968 to discover that there was such a thing as a New Left that might be of interest. Between 1960 and 1968, as the New Left was becoming a formidable force in its own right, the bureau’s top officials seem to have thought that groups like Students for a Democratic Society were simply covers for the Communist Party, which was like mistaking the fleas for the dog. We have been assured that the FBI of today has learned something since the days of J. Edgar Hoover. But of ignorance and stupidity there is no end.

Trivial and Nontrivial Pursuits

Entrapment and instigation to commit crimes are in themselves genuine dangers to American liberties, even when the liberties are those of the reckless and wild. But there is another danger to such pursuits: the attention the authorities pay to nonexistent threats (or the creation of such threats) is attention not paid to actual threats.

Anyone concerned about the security of Americans should cast a suspicious eye on the allocation or simply squandering of resources on wild goose chases. Consider some particulars which have recently come to light. Under the Freedom of Information Act, thePartnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups—during the very time that they were missing actual warnings about actual terrorist actions.

From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places. In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’ ”

Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center, one of seventy-seven coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily. As the investigative journalist Michael Isikoff recently reported, it was not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’ ”

It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber. That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either. The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of… Code Pink and Veterans for Peace.

Public Agencies and the “Private Sector”

So we know that Boston’s master coordinators—its Committee on Public Safety, you might say—were worried about constitutionally protected activity, including its consequences for “commercial and financial sector assets.” Unsurprisingly, the feds worked closely with Wall Street even before the settling of Zuccotti Park. More surprisingly, in Alaska, Alabama, Florida, Mississippi, Tennessee and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations—and vice versa.

Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.” Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.” Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:

• “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”

• “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to…[twenty-two] campus police officials.… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”

• An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on November 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services reported to DSAC on the relationship between OWS and organized labor.”

• DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” It advised corporate employees to dress conservatively, avoid political discussions and “avoid all large gatherings related to civil issues. Even seemingly peaceful rallies can spur violent activity or be met with resistance by security forces.”

• The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.

• In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.” Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’ ”

Sometimes, “intelligence” moves in the opposite direction—from private corporations to public agencies. Among the collectors of such “intelligence” are entities that, like the various intelligence and law enforcement outfits, do not make distinctions between terrorists and nonviolent protesters. Consider TransCanada, the corporation that plans to build the 1,179-mile Keystone-XL tar sands pipeline across the US and in the process realize its “vision to become the leading energy infrastructure company in North America.“ The anti-pipeline group Bold Nebraska filed a successful Freedom of Information Act request with the Nebraska State Patrol and so was able to put TransCanada’s briefing slideshow up online.

So it can be documented in living color that the company lectured federal agents and local police to look into the use of “anti-terrorism statutes” against peaceful anti-Keystone activists. TransCanada showed slides that cited as sinister the “attendance” of Bold Nebraska members at public events, noting “Suspicious Vehicles/Photography.” TransCanada alerted the authorities that Nebraska protesters were guilty of “aggressive/abusive behavior,” citing a local anti-pipeline group that, they said, committed a “slap on the shoulder” at the Merrick County Board Meeting (possessor of said shoulder unspecified). They fingered nonviolent activists by name and photo, paying them the tribute of calling them “’Professionals’ & Organized.” Native News Network pointed out that “although TransCanada’s presentation to authorities contains information about property destruction, sabotage, and booby traps, police in Texas and Oklahoma have never alleged, accused, or charged Tar Sands Blockade activists of any such behaviors.”

Centers for Fusion, Diffusion and Confusion

After September 11, 2001, government agencies at all levels, suddenly eager to break down information barriers and connect the sort of dots that had gone massively unconnected before the Al Qaeda attacks, used Department of Homeland Security funds to start “fusion centers.” These are supposed to coordinate anti-terrorist intelligence gathering and analysis. They are also supposed to “fuse” intelligence reports from federal, state and local authorities, as well as private companies that conduct intelligence operations. According to the ACLU, at least seventy-seven fusion centers currently receive federal funds.

Much is not known about these centers, including just who runs them, by what rules and which public and private entities are among the fused. There is nothing public about most of them. However, some things are known about a few. Several fusion center reports that have gone public illustrate a remarkably slapdash approach to what constitutes “terrorist danger” and just what kinds of data are considered relevant for law enforcement. In 2010, the American Civil Liberties Union of Tennessee learned, for instance, that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents. The letter encourages schools to be supportive of all religious beliefs during the holiday season.” (The map is no longer online.)

So far, the prize for pure fused wordiness goes to a 215-page manual issued in 2009 by theVirginia Fusion Center (VFC), filled with Keystone Kop–style passages among pages that in their intrusive sweep are anything but funny. The VFC warned, for instance, that “the Garbage Liberation Front (GLF) is an ecological direct action group that demonstrates the joining of anarchism and environmental movements.” Among GLF’s dangerous activities well worth the watching, the VFC included “dumpster diving, squatting, and train hopping.”

In a similarly jaw-dropping manner, the manual claimed—the italics are mine—that “Katuah Earth First (KEF), based in Asheville, North Carolina, sends activists throughout the region to train and engage in criminal activity. KEF has trained local environmentalists in non-violent tactics, including blocking roads and leading demonstrations, at action camps in Virginia.While KEF has been primarily involved in protests and university outreach, members have also engaged in vandalism.” Vandalism! Send out an APB!

The VFC also warned that, “although the anarchist threat to Virginia is assessed as low, these individuals view the government as unnecessary, which could lead to threats or attacks against government figures or establishments.” It singled out the following 2008 incidents as worth notice:

• At the Martinsville Speedway, “A temporary employee called in a bomb threat during a Sprint Cup race…because he was tired of picking up trash and wanted to go home.”

• In Missouri, “a mobile security team observed an individual photographing an unspecified oil refinery.… The person abruptly left the scene before he could be questioned.”

• Somewhere in Virginia, “seven passengers aboard a white pontoon boat dressed in traditional Middle Eastern garments immediately sped away after being sighted in the recreational area, which is in close proximity to” a power plant.

What idiot or idiots wrote this script?

Given a disturbing lack of evidence of terrorist actions undertaken or in prospect, the authors even warned:

It is likely that potential incidents of interest are occurring, but that such incidents are either not recognized by initial responders or simply not reported. The lack of detailed information for Virginia instances of monitored trends should not be construed to represent a lack of occurrence.

Lest it be thought that Virginia stands alone and shivering on the summit of bureaucratic stupidity, consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the antiwar movement, a former US Congresswoman, the US Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’ ”

And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies. According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’ ” The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’ ”

Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”

One of these investigations concerned Greenpeace protests planned for ExxonMobil shareholder meetings. (Note: I was on Greenpeace’s board of directors during three of those years.) The inquiry was kept open “for over three years, long past the shareholder meetings that the subjects were supposedly planning to disrupt.” The FBI put the names of Greenpeace members on its federal watch list. Around the same time, an ExxonMobil-funded lobby got the IRS to audit Greenpeace.

This counterintelligence archipelago of malfeasance and stupidity is sometimes fused with ass-covering fabrication. In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department inspector general’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects. The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.

The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor. He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.

The sequel was not quite so droll. The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.

Moreover, at least one fusion center has involved military intelligence in civilian law enforcement. In 2009, a military operative from Fort Lewis, Washington, worked undercovercollecting information on peace groups in the Northwest. In fact, he helped run the Port Militarization Resistance group’s Listserv. Once uncovered, he told activists there were others doing similar work in the Army. How much the military spies on American citizens is unknown and, at the moment at least, unknowable.

Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos—I have some in my own heavily redacted files obtained through an FOIA request—were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case. During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to “Military Surveillance of Civilian Politics, 1967–70,” an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews. They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”

Years later, I met one of these agents, now retired, in San Francisco. He knew more about what I was doing in the late 1960s than my mother did.

Squaring Circles

In 2009, President Obama told the graduating class at the Naval Academy that, “as Americans, we reject the false choice between our security and our ideals.” Security and ideals: officially we want both. But how do you square circles, especially in a world in which “security” has often enough become a stand-in for whatever intelligence operatives decide to do?

Please support our journalism. Get a digital subscription for just $9.50!

The ACLU’s Tennessee office sums the situation up nicely: “While the ostensible purpose of fusion centers, to improve sharing of anti-terrorism intelligence among different levels and arms of government, is legitimate and important, using the centers to monitor protected First Amendment activity clearly crosses the line.” Nationally, the ACLU rightly worries about who is in charge of fusion centers and by what rules they operate, about what becomes of privacy when private corporations are inserted into the intelligence process, about what the military is doing meddling in civilian law enforcement, about data-mining operations that Federal guidelines encourage, and about the secrecy walls behind which the fusion centers operate.

Even when fusion centers do their best to square that circle in their own guidelines, like the ones obtained by the ACLU from Massachusetts’s Commonwealth Fusion Center (CFC), the knots in which they tie themselves are all over the page. Imagine, then, what happens when you let informers or agents provocateurs loose in actual undercover situations.

“Undercovers,” writes the Massachusetts CFC, “may not seek to gain access to private meetings and should not actively participate in meetings.… At the preliminary inquiry stage, sources and informants should not be used to cultivate relationships with persons and groups that are the subject of the preliminary inquiry.” So far so good. Then, it adds, “Investigators may, however, interview, obtain, and accept information known to sources and informants.” By eavesdropping, say? Collecting trash? Hacking? All without warrants? Without probable cause?

“Undercovers and informants,” the guidelines continue, “are strictly prohibited from engaging in any conduct the sole purpose of which is to disrupt the lawful exercise of political activity, from disrupting the lawful operations of an organization, from sowing seeds of distrust between members of an organization involved in lawful activity, or from instigating unlawful acts or engaging in unlawful or unauthorized investigative activities.” Now, go back and note that little, easy-to-miss word “sole.” Who knows just what grim circles that tiny word squares?

The Massachusetts CFC at least addresses the issue of entrapment: “Undercovers should not become so involved in a group that they are participating in directing the operations of a group, either by accepting a formal position in the hierarchy or by informally establishing the group’s policy and priorities. This does not mean an undercover cannot support a group’s policies and priorities; rather an undercover should not become a driving force behind a group’s unlawful activities.” Did Cleveland’s fusion center have such guidelines? Did they follow them? Do other state fusion centers? We don’t know.

Whatever the fog of surveillance, when it comes to informers, agents provocateurs, and similar matters, four things are clear enough:

• Terrorist plots arise, in the United States as elsewhere, with the intent of committing murder and mayhem. Since 2001, in the US, these have been almost exclusively the work of freelance Islamist ideologues like the Tsarnaev brothers of Boston. None have been connected in any meaningful way with any legitimate organization or movement.

• Government surveillance may in some cases have been helpful in scotching such plots, but there is no evidence that it has been essential.

• Even based on the limited information available to us, since September 11, 2001, the net of surveillance has been thrown wide indeed. Tabs have been kept on members of quite a range of suspect populations, including American Muslims, anarchists, and environmentalists, among others—in situation after situation where there was no probable cause to suspect preparations for a crime.

• At least on occasion—we have no way of knowing how often—agents provocateurs on government payrolls have spurred violence.

How much official unintelligence is at work? How many demonstrations are being poked and prodded by undercover agents? How many acts of violence are being suborned? It would be foolish to say we know. At least equally foolish would be to trust the authorities to keep to honest-to-goodness police work when they are so mightily tempted to take the low road into straight-out, unwarranted espionage and instigation.

http://www.thenation.com/article/175005/wonderful-american-world-informers-and-agents-provocateurs#

 

COINTELPRO

COINTELPRO (an acronym for COunter INTELligence PROgram) was a series of covert, and at times illegal,[1][2] projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveying, infiltrating, discrediting, and disrupting domestic political organizations.[3] National Security Agency operation Project MINARET targeted the personal communications of leading Americans who criticized the Vietnam War, including Senators (e.g., Frank Church and Howard Baker), civil rights leaders, journalists, and athletes.[4][5]

The official COINTELPRO label took place between 1956 and 1971.[6][7] The FBI’s stated motivation was “protecting national security, preventing violence, and maintaining the existing social and political order.”[8]

FBI records show that 85% of COINTELPRO resources targeted groups and individuals that the FBI deemed “subversive”,[9]including communist and socialist organizations; organizations and individuals associated with the Civil Rights Movement, including Rev. Dr. Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, theNational Association for the Advancement of Colored People, and the Congress of Racial Equality and other civil rights organizations; black nationalist groups; the Young Lords; the Rainbow Coalition; the American Indian Movement; a broad range of organizations labeled “New Left“, including Students for a Democratic Society and the Weathermen; almost all groupsprotesting the Vietnam War, as well as individual student demonstrators with no group affiliation; the National Lawyers Guild; organizations and individuals associated with the women’s rights movement; nationalist groups such as those seeking independence for Puerto Rico, United Ireland, and Cuban exile movements including Orlando Bosch‘s Cuban Power and theCuban Nationalist Movement; and additional notable Americans (for example, Albert Einstein, who was a socialist and a member of several civil rights groups, came under FBI surveillance during the years just before COINTELPRO’s official inauguration).[10] The remaining 15% of COINTELPRO resources were expended to marginalize and subvert white supremist hate groups, including the Ku Klux Klan and the National States’ Rights Party.[11]

FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and their leaders.[12][13] Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.[14] Attorney General Robert F. Kennedy personally authorized some of these programs.[15] Kennedy would later learn that he also had been a target of FBI surveillance.[citation needed]

History

The FBI engaged in the political repression of “communism” almost from the time of the agency’s inception in 1908, at a time of widespread social disruption due to anarchists and labor movements. Beginning in the 1930s, antecedents to COINTELPRO operated during the Franklin D. Roosevelt and Harry S. Trumanadministrations. Centralized operations under COINTELPRO officially began in August 1956 with a program designed to “increase factionalism, cause disruption and win defections” inside the Communist Party U.S.A. (CPUSA). Tactics included anonymous phone calls, IRS audits, and the creation of documents that would divide American communists internally.[16] An October 1956 memo from Hoover reclassified the FBI’s ongoing surveillance of black leaders, including it within COINTELPRO, with the justification that the movement was infiltrated by communists.[17] In 1956, Hoover sent an open letter denouncing Dr. T.R.M. Howard, a civil rights leader, surgeon, and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders of George W. Lee, Emmett Till, and other blacks in the South.[18] When the Southern Christian Leadership Conference (SCLC) was founded in 1957, the FBI began to monitor and target the group almost immediately, focusing particularly on Bayard Rustin, Stanley Levison, and, eventually, Rev. Martin Luther King, Jr.[19]

After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote:

In the light of King’s powerful demagogic speech. … We must mark him now, if we have not done so before, as the most dangerous Negro of the future in this nation from the standpoint of communism, the Negro, and national security.[20]

Soon after, the FBI was systematically bugging King’s home and his hotel rooms.[21]

In the mid-1960s, King began publicly criticizing the Bureau for giving insufficient attention to the use of terrorism by white supremacists. Hoover responded by publicly calling King the most “notorious liar” in the United States.[22] In his 1991 memoir, Washington Post journalist Carl Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to commit suicide.[23] Historian Taylor Branch documents an anonymous November 21, 1964 “suicide package” sent by the FBI that contained audio recordings of King’s sexual indiscretions combined with a letter telling him “There is only one way out for you. You better take it before your filthy, abnormal, fraudulent self is bared to the nation.”[24]

During the same period the program also targeted Malcolm X. While an FBI spokesman has denied that the FBI was “directly” involved in Malcolm’s murder, it is documented that the Bureau fostered the violent schism between Malcolm and the Nation of Islam that led to the black leader’s death. The FBI heavily infiltrated Malcolm’s Organization of Afro-American Unity in the final month’s of his life. The Pulitzer Prize-winning biography of Malcolm X by Manning Marable asserts that most of the men who plotted Malcolm’s assassination were never apprehended and that the full extent of the FBI’s involvement in his death cannot be known.[25] [26]

Amidst the urban unrest of July–August 1967, the FBI began “COINTELPRO–BLACK HATE”, which focused on King and the SCLC as well as the Student Nonviolent Coordinating Committee (SNCC), the Revolutionary Action Movement (RAM), the Deacons for Defense and Justice, Congress of Racial Equality (CORE), and theNation of Islam.[27] BLACK HATE established the Ghetto Informant Program and instructed 23 FBI offices to “disrupt, misdirect, discredit, or otherwise neutralize the activities of black nationalist hate type organizations”.[28]

A March 1968 memo stated the programs goal was to “prevent the coalition of militant black nationalist groups” ; to “Prevent the RISE OF A ‘MESSIAH’ who could unify…the militant black nationalist movement” ; “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence [against authorities].” ; to “Prevent militant black nationalist groups and leaders from gaining RESPECTABILITY, by discrediting them to…both the responsible community and to liberals who have vestiges of sympathy…”; and to “prevent the long-range GROWTH of militant black organizations, especially among youth.” Dr. King was said to have potential to be the “messiah” figure, should he abandon nonviolence and integrationism;[29] Stokely Carmichael was noted to have “the necessary charisma to be a real threat in this way.” [30]

This program coincided with a broader federal effort to prepare military responses for urban riots, and began increased collaboration between the FBI, Central Intelligence Agency, National Security Agency, and the Department of Defense. The CIA launched its own domestic espionage project in 1967 called Operation CHAOS. [31] A particular target was the Poor People’s Campaign, a national effort organized by King and the SCLC to occupy Washington, D.C. The FBI monitored and disrupted the campaign on a national level, while using targeted smear tactics locally to undermine support for the march.[32]

COINTELPRO–NEW LEFT was created in April 1968, in the wake of Martin Luther King, Jr.‘s assassination in Memphis and mass student protests at Columbia University.[33]

Overall, COINTELPRO encompassed disruption and sabotage of the Socialist Workers Party (1961), the Ku Klux Klan (1964), the Nation of Islam, the Black Panther Party (1967), and the entire New Left social/political movement, which included antiwar, community, and religious groups (1968). A later investigation by the Senate’sChurch Committee (see below) stated that “COINTELPRO began in 1956, in part because of frustration with Supreme Court rulings limiting the Government’s power to proceed overtly against dissident groups …”[34] Official congressional committees and several court cases[35] have concluded that COINTELPRO operations against communist and socialist groups exceeded statutory limits on FBI activity and violated constitutional guarantees of freedom of speech and association.[1]

Program exposed

The building broken into by the Citizen’s Commission to Investigate the FBI, at One Veterans Square, Media, Pennsylvania

The program was successfully kept secret until 1971, when the Citizens’ Commission to Investigate the FBI burglarized an FBI field office in Media, Pennsylvania, took several dossiers, and exposed the program by passing this material to news agencies. Many news organizations initially refused to publish the information. Within the year, Director J. Edgar Hooverdeclared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled on a case-by-case basis.[36][37]

Additional documents were revealed in the course of separate lawsuits filed against the FBI by NBC correspondent Carl Stern, the Socialist Workers Party, and a number of other groups. In 1976 the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the United States Senate, commonly referred to as the “Church Committee” for its chairman, Senator Frank Church of Idaho, launched a major investigation of the FBI and COINTELPRO. Journalists and historians speculate that the government has not released many dossier and documents related to the program. Many released documents have been partly, or entirely, redacted.

Since the conclusion of centralized COINTELPRO operations in 1971, FBI counterintelligence operations have been handled on a “case-by-case basis”; however allegations of improper political repression continue.[38][39]

The Final Report of the Select Committee castigated conduct of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:

The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law.[1] Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that … the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.[34]

The Church Committee documented a history of the FBI exercising political repression as far back as World War I, through the 1920s, when agents were charged with rounding up “anarchists, communists, socialists, reformists and revolutionaries” for deportation. The domestic operations were increased against political and anti-war groups from 1936 through 1976.

Intended effects

The intended effect of the FBI’s COINTELPRO was to “expose, disrupt, misdirect, or otherwise neutralize” groups that the FBI officials believed were “subversive”[40] by instructing FBI field operatives to:[41]

  1. create a negative public image for target groups (e.g. by surveilling activists, and releasing negative personal information to the public)
  2. break down internal organization
  3. create dissension between groups
  4. restrict access to public resources
  5. restrict the ability to organize protests
  6. restrict the ability of individuals to participate in group activities

Range of targets

The main target was the Communist Party.[42]

According to the Church Committee:

While the declared purposes of these programs were to protect the “national security” or prevent violence, Bureau witnesses admit that many of the targets were nonviolent and most had no connections with a foreign power. Indeed, nonviolent organizations and individuals were targeted because the Bureau believed they represented a “potential” for violence—and nonviolent citizens who were against the war in Vietnam were targeted because they gave “aid and comfort” to violent demonstrators by lending respectability to their cause.

The imprecision of the targeting is demonstrated by the inability of the Bureau to define the subjects of the programs. The Black Nationalist program, according to its supervisor, included “a great number of organizations that you might not today characterize as black nationalist but which were in fact primarily black.” Thus, the nonviolent Southern Christian Leadership Conference was labeled as a Black Nationalist-“Hate Group.”

Furthermore, the actual targets were chosen from a far broader group than the titles of the programs would imply. The CPUSA program targeted not only Communist Party members but also sponsors of the National Committee to Abolish the House Un-American Activities Committee and civil rights leaders allegedly under Communist influence or deemed to be not sufficiently “anti-Communist”. The Socialist Workers Party program included non-SWP sponsors of anti-war demonstrations which were cosponsored by the SWP or the Young Socialist Alliance, its youth group. The Black Nationalist program targeted a range of organizations from the Panthers to SNCC to the peaceful Southern Christian Leadership Conference, and included every Black Student Union and many other black student groups. New Left targets ranged from the SDS to the InterUniversity Committee for Debate on Foreign Policy, from Antioch College (“vanguard of the New Left”) to the New Mexico Free University and other “alternate” schools, and from underground newspapers to students’ protesting university censorship of a student publication by carrying signs with four-letter words on them.

Examples of surveillance, spanning all presidents from FDR to Nixon, both legal and illegal, contained in the Church Committee report:[43]

  • President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his “national defense” policy and supporting Col. Charles Lindbergh.
  • President Truman received inside information on a former Roosevelt aide’s efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists.
  • President Eisenhower received reports on purely political and social contacts with foreign officials by Bernard Baruch, Eleanor Roosevelt, and Supreme Court Justice William O. Douglas.
  • The Kennedy administration had the FBI wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm. US Attorney General Robert F. Kennedy received the fruits of an FBI wire tap on Martin Luther King, Jr. and an electronic listening device targeting a congressman, both of which yielded information of a political nature.
  • President Johnson asked the FBI to conduct “name checks” of his critics and members of the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the 1964 Democratic Conventionfrom FBI electronic surveillance.
  • President Nixon authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a Supreme Court Justice.

The COINTELPRO documents show numerous cases of the FBI’s intentions to prevent and disrupt protests against the Vietnam War. Many techniques were used to accomplish this task. “These included promoting splits among antiwar forces, encouraging red-baiting of socialists, and pushing violent confrontations as an alternative to massive, peaceful demonstrations.” One 1966 COINTELPRO operation tried to redirect the Socialist Workers Party from their pledge of support for the antiwar movement.[44]

The FBI claims that it no longer undertakes COINTELPRO or COINTELPRO-like operations. However, critics have claimed that agency programs in the spirit of COINTELPRO targeted groups such as the Committee in Solidarity with the People of El Salvador,[45] the American Indian Movement,[6][46] Earth First!,[47] the White Separatist Movement,[48] and the Anti-Globalization Movement.[citation needed]

Methods

Body of Fred Hampton, national spokesman for the Black Panther Party, who was killed by members of the Chicago Police Department, as part of a COINTELPRO operation.[49][50][7][51]

According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:

  1. Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.
  2. Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketingto create suspicion about targeted activists, sometimes with lethal consequences.[52]
  3. Legal harassment: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.[49]
  4. Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break-ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations.[49][50][7][53] The object was to frighten or eliminate dissidents and disrupt their movements.

The FBI specifically developed tactics intended to heighten tension and hostility between various factions in the black militancy movement, for example between the Black Panthers, the US Organization, and the Blackstone Rangers. This resulted in numerous deaths, among which were San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.[49]

The FBI also conspired with the police departments of many U.S. cities (San Diego, Los Angeles, San Francisco, Oakland, Philadelphia, Chicago) to encourage repeated raids on Black Panther homes—often with little or no evidence of violations of federal, state, or local laws—which resulted directly in the police killing many members of the Black Panther Party, most notably Chicago Black Panther Party Chairman Fred Hampton on December 4, 1969.[49][50][7][54]

In order to eliminate black militant leaders whom they considered dangerous, the FBI is believed to have worked with local police departments to target specific individuals,[55] accuse them of crimes they did not commit, suppress exculpatory evidence and falsely incarcerate them.[citation needed] Elmer “Geronimo” Pratt, a Black Panther Party leader, was incarcerated for 27 years before a California Superior Court vacated his murder conviction, ultimately freeing him. Appearing before the court, an FBI agent testified that he believed Pratt had been framed, because both the FBI and the Los Angeles Police Department knew he had not been in the area at the time the murder occurred.[56][57]

Some sources claim that the FBI conducted more than 200 “black bag jobs“,[58][59] which were warrantless surreptitious entries, against the targeted groups and their members.[60]

J. Edgar Hoover

In 1969 the FBI special agent in San Francisco wrote Hoover that his investigation of the Black Panther Party (BPP) had concluded that in his city, at least, the Panthers were primarily engaged in feeding breakfast to children. Hoover fired back a memo implying the agent’s career goals would be directly affected by his supplying evidence to support Hoover’s view that the BPP was “a violence-prone organization seeking to overthrow the Government by revolutionary means”.[61]

Hoover supported using false claims to attack his political enemies. In one memo he wrote: “Purpose of counterintelligence action is to disrupt the BPP and it is immaterial whether facts exist to substantiate the charge.”[62]

In one particularly controversial 1965 incident, white civil rights worker Viola Liuzzo was murdered by Ku Klux Klansmen, who gave chase and fired shots into her car after noticing that her passenger was a young black man; one of the Klansmen was Gary Thomas Rowe, an acknowledged FBI informant.[63][64] The FBI spread rumors that Liuzzo was a member of theCommunist Party and had abandoned her children to have sexual relationships with African Americans involved in the Civil Rights Movement.[65][66] FBI records show that J. Edgar Hoover personally communicated these insinuations to President Johnson.[67][68] FBI informant Rowe has also been implicated in some of the most violent crimes of the 1960s civil rights era, including attacks on the Freedom Riders and the 1963 Birmingham, Alabama 16th Street Baptist Church bombing.[63]According to Noam Chomsky, in another instance in San Diego, the FBI financed, armed, and controlled an extreme right-wing group of former Minutemen, transforming it into a group called the Secret Army Organization that targeted groups, activists, and leaders involved in the Anti-War Movement, using both intimidation and violent acts.[69][70][71]

Hoover ordered preemptive action “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence.”[12]

Illegal surveillance

The final report of the Church Committee concluded:

Too many people have been spied upon by too many Government agencies and too much information has been illegally collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret and bias informants, but also using other intrusive techniques such as wiretaps, microphone “bugs”, surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous—and even of groups suspected of associating with potentially dangerous organizations—have continued for decades, despite the fact that those groups did not engage in unlawful activity.

Groups and individuals have been assaulted, repressed, harassed and disrupted because of their political views,social believes and their lifestyles. Investigations have been based upon vague standards whose breadth made excessive collection inevitable. Unsavory, harmful and vicious tactics have been employed—including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths. Intelligence agencies have served the political and personal objectives of presidents and other high officials. While the agencies often committed excesses in response to pressure from high officials in the Executive branch and Congress, they also occasionally initiated improper activities and then concealed them from officials whom they had a duty to inform.

Governmental officials—including those whose principal duty is to enforce the law—have violated or ignored the law over long periods of time and have advocated and defended their right to break the law.

The Constitutional system of checks and balances has not adequately controlled intelligence activities. Until recently the Executive branch has neither delineated the scope of permissible activities nor established procedures for supervising intelligence agencies. Congress has failed to exercise sufficient oversight, seldom questioning the use to which its appropriations were being put. Most domestic intelligence issues have not reached the courts, and in those cases when they have reached the courts, the judiciary has been reluctant to grapple with them.[72][73]

Post-COINTELPRO operations

While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI actions indicate that post-COINTELPRO reforms did not succeed in ending COINTELPRO tactics.[74][75][76] Documents released under the FOIA show that the FBI tracked the late David Halberstam—a Pulitzer Prize-winning journalist and author—for more than two decades.[77][78] In 1978, then-acting FBI Director William H. Webster indicated that, by 1976, most of the program’s resources has been rerouted.[79][better source needed]

“Counterterrorism” guidelines implemented during the Reagan administration have been described as allowing a return to COINTELPRO tactics.[80][pages needed] Some radical groups accuse factional opponents of being FBI informants or assume the FBI is infiltrating the movement.[81]

According to a report by the Inspector General (IG) of the U.S. Department of Justice, the FBI improperly opened investigations of American activist groups, even though they were planning nothing more than peaceful protests and civil disobedience. The review by the inspector general was launched in response to complaints by civil liberties groups and members of Congress. The FBI improperly monitored groups including the Thomas Merton Center, a Pittsburgh-based peace group; People for the Ethical Treatment of Animals (PETA); and Greenpeace USA, an environmental activism organization. Also, activists affiliated with Greenpeace were improperly put on a terrorist watch list, although they were planning no violence or illegal activities.

The IG report found these “troubling” FBI practices between 2001 and 2006. In some cases, the FBI conducted investigations of people affiliated with activist groups for “factually weak” reasons. Also, the FBI extended investigations of some of the groups “without adequate basis” and improperly kept information about activist groups in its files. The IG report also found that FBI Director Robert Mueller III provided inaccurate congressional testimony about one of the investigations, but this inaccuracy may have been due to his relying on what FBI officials told him.[82]

Several authors have accused the FBI of continuing to deploy COINTELPRO-like tactics against radical groups after the official COINTELPRO operations were ended. Several authors have suggested the American Indian Movement (AIM) has been a target of such disturbing operations.

Authors such as Ward Churchill, Rex Weyler, and Peter Matthiessen allege that the federal government intended to acquire uranium deposits on the Lakota tribe’s reservation land, and that this motivated a larger government conspiracy against AIM activists on the Pine Ridge reservation.[6][46][83][84][85] Others believe COINTELPRO continues and similar actions are being taken against activist groups.[85][86][87] Caroline Woidat says that, with respect to Native Americans, COINTELPRO should be understood within a historical context in which “Native Americans have been viewed and have viewed the world themselves through the lens of conspiracy theory.”[88] Other authors note that while some conspiracy theories related to COINTELPRO are unfounded, the issue of ongoing government surveillance and repression is real.[39][89]

See also

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 369-373

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Meet The Democratic Candidate For President in 2016: California Governor Jerry Brown — Balancing Budgets and Building A Presidential Campaign Chest — Achilles Heel California Created a Sanctuary State For Illegal Aliens — Save Water — Save Money — Save Illegals? — Progressive But Fiscally Responsible — Videos

Posted on November 17, 2014. Filed under: American History, Blogroll, Business, Climate, College, Communications, Constitution, Culture, Economics, Education, Employment, Energy, Enivornment, Faith, Family, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Food, Freedom, Friends, government, government spending, Health Care, history, Illegal, Immigration, Inflation, IRS, Law, Legal, liberty, Life, Links, media, Music, Obamacare, People, Philosophy, Photos, Politics, Press, Psychology, Radio, Rants, Raves, Regulations, Resources, Reviews, Talk Radio, Tax Policy, Taxes, Unemployment, Video, War, Water, Wealth, Weather, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014

Story 1: Meet The Democratic Candidate For President in 2016: California Governor Jerry Brown — Balancing Budgets and Building A Presidential Campaign Chest — Achilles Heel California Created a Sanctuary State For Illegal Aliens — Save Water — Save Money — Save Illegals? — Progressive But Fiscally Responsible — Videos jerry_brown
jerry brown

jerry-brownjerry brown 2

Jerry Brown for President?

KQED Newsroom Segment: Jerry Brown Exclusive Interview, May 2, 2014

Brown wins historic fourth term as California’s governor

How Jerry Brown is undermining American immigration law

Gov. Jerry Brown talks about Central American immigrants

Gov. Brown to sign illegal immigrant license bill into law

Driver’s licenses for illegal immigrants – CA

California Governor Jerry Brown Signs Bill Giving Undocumented Immigrants Right To Obtain Driver’s Licenses

Jerry Brown – Limits To Government

Jerry Brown, 1975. An innovative free thinker before party politics ground him into a garden-variety statist.

CA Gov. Jerry Brown interview- media in politics (Merv Griffin Show 1981)

California Governor Jerry Brown talks with Merv about the role of the media in modern American politics. Not much has changed in 30 years, it seems. Merv Griffin had over 5000 guests appear on his show from 1963-1986. Footage from the Merv Griffin Show is available for licensing to all forms of media through Reelin’ In The Years Productions. http://www.reelinintheyears.com.

Jerry Brown 1992

Jerry Brown Announcement Video

Brown-Whitman Debate: Illegal Immigration

Governor Brown Halts Budget Negotiations

Governor Brown Update on the Budget 06.12.11

Budget Veto

Address to the People of California: Governor Brown Discusses 2012-2013 State Budget

California Gov. Jerry Brown on Balancing the State Budget

Mexican president in California to talk trade, border issues

JERRY BROWN FOR PRESIDENT? MEETS WITH DONORS THIS WEEK

California Governor Jerry Brown, who was re-elected in a landslide earlier this month to what he says is his last term in office, will ask political donors on Monday to keep contributing, the Los Angeles Times reports. Brown defeated his opponent, Neel Kashkari, while retaining $20 million or more in his reelection account as of mid-October. However, Brown–who says he will not run for President–is still asking for cash.

The Sacramento reception asks for donations of $5,000 for a “private reception and sit down conversation” with Brown at Mulvaney’s B&L. Capitol Advocacy, a top lobbying firm, plans to attend; the firm will reportedly bring some of its major clients, including PepsiCo, Corrections Corporation of America, T-Mobile USA Inc., WellCare Health Plans, Pacific Compensation Insurance Co., and Diageo.

The Times, which secured a copy of the invitation, reports that Brown has spent little of his reelection funds since mid-October; he had told the Times that he was thinking of using any funds left over from his campaign to support ballot measures in his new term.

The Washington Post reported in October that Brown’s campaign said it had spent over $3.3 million on ads for Propositions 1 and 2. At that point he had not run a single television ad for his campaign.

Some journalists, notably Chuck Todd of NBC News, have speculated that Brown would likely run for president. Recently, HBO’s Bill Maher said that Brown ought to do so, and condemned what he said was age discrimination. (Brown would be 78 years old in 2016.)

Neither spokesmen for Brown nor his chief fundraiser, Angie Tate, had any comment when contacted by the Times.

 

 

The Obstacles to a Jerry Brown Run in 2016

When a governor in one of the country’s largest states is reelected by landslide margins, questions about that governor’s presidential prospects arise even before the polls close. But California’s Jerry Brown, who on Tuesday was given an unprecedented fourth termby Golden State voters, will almost certainly not be a candidate for the White House in 2016. The reasons have less to do with actuarial tables than with the nature of the national Democratic primary electorate.

The most noticeable obstacle to a Brown candidacy is his age. Although he was the youngest governor in California’s history when he was first elected in 1974, at age 36, Mr. Brown is now the state’s oldest governor ever. In November 2016, he will be 78, meaning that he would conclude his first term in the Oval Office at 82. The governor is in very good health, and this advanced age would not disqualify him from the presidency, but it does appear to have made him less ambitious about national office he was in 1976 and 1980, when he campaigned for the presidency. He has already said that he intends to use the many unspent millions of dollars he raised during this year’s gubernatorial campaign to fund future state ballot initiatives. Not only can most of that money not be transferred into a presidential campaign fund, but trying to run for president while also seeking to pass ballot initiatives in California would be enormously challenging–certainly given the time required to succeed at either task.

But the bigger obstacle for Mr. Brown is that his brand of centrism has no logical place in a 2016 primary field. If a challenge to Hillary Rodham Clinton is going to emerge, it will almost certainly be a populist voice from the Democratic base. Mr. Brown’s insistence on budget cuts that frustrated his party’s legislators, his unwillingness to ban fracking, and his continued interest in revamping California’s environmental regulations make him an unlikely flag-carrier for progressive primary voters. The key to Mr. Brown’s large victory Tuesday was fashioning an agenda of sufficient appeal to the state’s business community to deprive his Republican challenger of substantive financial backing.

A benefit of not running for president, of course, is that it allows the governor to focus his full attention on his day job. That might not be the stuff of national headlines, but, at this point in his long career, that might be good enough for Jerry Brown.

http://blogs.wsj.com/washwire/2014/11/05/why-jerry-brown-is-unlikely-to-run-in-2016/

Gov. Jerry Brown says 2016 Democratic nomination is Hillary Clinton’s ‘if she wants’

When Bill Clinton arrived at the 1992 Democratic National Convention as the party’s all-but-certain presidential nominee, his persistent and pesky primary opponent, former California governor Jerry Brown, refused to endorse him.Two decades later, Brown is again governor of the nation’s most-populous state. Yet in a sign that he has patched things up with the first family of Democratic politics, Brown is ready to support Hillary Rodham Clinton if she seeks the presidency in 2016.“I really believe that Hillary Clinton has the presence, the experience and the support of the vast majority of Democrats in a way that I have not seen in my lifetime,” Brown said in a wide-ranging interview with The Washington Post. “She has this if she wants.”http://www.washingtonpost.com/politics/gov-jerry-brown-says-2016-democratic-nomination-is-hillary-clintons-if-she-wants/2014/05/28/de3d0e0c-e5cc-11e3-8f90-73e071f3d637_story.html

More And More People Are Not Running For President In 2016

Posted: 01/16/2014 6:25 pm EST Updated: 01/25/2014 4:01 pm EST
JERRY BROWN NOT RUNNING 2016

It is 2014 at the moment, but since there isn’t any kind of massive unemployment problem and it’s totally safe for pregnant women to drink the water, water, everywhere, the media are filling the hole in their lives with only the hottest speculation about the 2016 presidential election.

For example, this week Time magazine istackling the phenomenon that is Hillary Clinton’s shadow campaign for president, noting that the mere threat of her candidacy is keeping other Democrats out of the race. This is less a “news story” than it is a fun and bouncy ball that is being passed from news organization to news organization. Time all but announced the unoriginality of the idea with its cover, which was created by going to a clip art archive and doing a global search for “women” and “clichés.” As with the story’s trope itself, it’s best examined in the gray light of the afterglow of an afterthought.

Against the 2016 onslaught, and our own contributions to it, let us now praise the real heroes of this period of premature frenzy — those men and women who have seen the light of presidential speculation beaming in their direction and have forthrightly declared, “You can include me out.” This week’s award for Valor In The Face Of People Wondering If You’ll Run For President goes to California Gov. Jerry Brown (D), who is not running for president:

Speaking at a Tuesday news conference in Riverside, Calif., Brown scuttled speculation about his presidential prospects when a reporter asked if he planned to throw his hat in the ring for a fourth time.

“No, that’s not in the cards. Unfortunately,” Brown said, according to the Los Angeles Times. “Actually, California is a lot more governable.”

Supporters of Brown — who ran for the Democratic nomination in 1976, 1980 and 1992 — had hoped the popular governor would enter the 2016 race. Brown stoked speculation by not explicitly ruling out the possibility, although in May the 75-year-old noted that “time is kind of running out on that.”

You are forgiven if you weren’t aware that “Jerry Brown 2016″ was even a thing about which people were even talking. It was an idea that had a share of anonymous supporters, but only just enough news coverage to warrant an inclusion onWikipedia’s list of potential 2016 candidates.

That page, by the way, is one of the most hilarious reflections of American politics on the Internet, because it turns out it doesn’t take much to be included. Missouri Gov. Jay Nixon (D) ended up there because a St. Louis Post-Dispatch story speculating on whether Nixon’s future included a turn in the national spotlight led to a Politico story speculating on whether Nixon might not get his turn in the national spotlight because of Hillary Clinton, which led to another St. Louis Post-Dispatch story about the aforementioned Politico story, which led to a Washington Post story … speculating on whether Nixon’s future included a turn in the national spotlight, again.

Meanwhile, outside of Missouri, you have probably never heard of Jay Nixon. But you’re probably aware that Jerry Brown, between his first and latest stint as the Golden State’s governor, ran for president a bunch of times. And so, unsurprisingly, there was always someone on hand to stoke the fires of retro chic. In July 2013, the Washington Examiner’s Paul Bedard reported that some of Brown’s “allies” were “starting to talk up a possible 2016 presidential bid,” while another group of Brown’s associates were saying that Brown was going to be “78 [years old] by Election Day 2016,” that he “ran for statewide office only to end [California’s] budget crisis,” and that he was thus “nearly done with politics.”

A month later, Bernie Quigley, writing for The Hill, attempted to coax a Brown candidacy into being with the awesome force of the purplest prose he could muster:

California rises again with Brown, and it should come as no surprise. California brings the final destiny of our American journey, the final edge of expectation, the end and then the beginning again, the place and time of our American turning. Steve Jobs put it succinctly at the end: “The spaceship has landed.”

I asked an astute Californian about Brown’s prospects for national office. He said he will be too old in 2016. But Brown, Zen man of contemporary politics, is in a sense timeless.

Yeah … so that was a lot to absorb. The salient point is that Brown, obviously, doesn’t have the same opinion of his own timelessness. (Perhaps he finally decided to not run when he failed to regenerate into Peter Capaldi?)

Brown joins a happy confederacy of other men and women who have indicated that everyone can stop wondering if they are going to run for president, including New Jersey Sen. Cory Booker (D), San Antonio Mayor Julian Castro (D), New Mexico Gov. Susana Martinez (R), Massachusetts Gov. Deval Patrick (D) and Massachusetts Sen. Elizabeth Warren (D).

Also, Tim Pawlenty is not going to run for president. (I did some digging and found out that this Pawlenty fellow was a former Republican governor of Minnesota who ran for president once before. Who knew? I guess I totally spaced.)

http://www.huffingtonpost.com/2014/01/16/jerry-brown-not-running-2016_n_4612584.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 369-372

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Mike Maden — Drone — Videos

Posted on August 2, 2014. Filed under: American History, Blogroll, Books, College, Communications, Crime, Crisis, Doumentary, Drones, Drug Cartels, Education, Energy, Entertainment, Fiction, Films, Foreign Policy, Freedom, government spending, history, Homicide, Illegal, Immigration, Islam, Language, Law, liberty, Life, Links, media, Movies, Natural Gas, Natural Gas, Oil, Oil, People, Philosophy, Photos, Politics, Resources, Reviews, Security, Transportation, Video, War, Weapons, Welfare | Tags: , , , , , , , , , , , , , |

 

drone_

Mike Maden

mike maden

Obama defends US drone attacks

Peter Singer: Drone Warfare

The Morality of Drone Warfare

DRONE WARS, PART ONE: THE DRONE LANDSCAPE

DRONE WARS, PART TWO: THE DRONE ECONOMY

DRONE WARS, PART THREE: THE DRONE MORALITY

Drone Boom Why Drones Aren’t Just for Dropping Bombs Anymore

Drone Laws Restrict Civilian UAV’s but allow Government

Rise of the Drones(full documentary)HD

RISE OF THE DRONES – NOVA (full documentary)

The Costs of Drone Warfare – Documentary

Richard Clarke – U.S. Drone Program Under Obama “Got Out of Hand”

EVERYONE needs to see this! Drone Strikes

Top 10 Drones in the world

ex CEO Colin Guinn is ALIVE, Files legal Injunction against DJI Innovations

 

Read Full Post | Make a Comment ( None so far )

Peter Brimelow — Alien Nation: Common Sense About America’s Immigration Disaster — Videos

Posted on July 21, 2014. Filed under: American History, Blogroll, Books, British History, Business, Catholic Church, Communications, Computers, Demographics, Diasters, Economics, Employment, Family, Federal Government, Foreign Policy, Freedom, Friends, government spending, history, Illegal, Immigration, IRS, Islam, Language, Law, Legal, liberty, Life, Links, Literacy, media, Medicine, Natural Gas, Non-Fiction, Oil, People, Philosophy, Photos, Politics, Press, Psychology, Public Sector, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Shite, Strategy, Sunni, Talk Radio, Taxes, Technology, Terrorism, Unemployment, Unions, Video, War, Water, Wealth, Weather, Welfare, Wisdom | Tags: , , , , , , , |

aliennation

peter_brimelow

VDARE.com

What Price Mass Immigration – Peter Brimelow Introduction

 

Peter Brimelow of VDare on How Republican Party Has to be More White

Alien Nation: America’s Immigration Disaster

Mr. Brimelow discussed his book Alien Nation: Common Sense About America’s Immigration Disaster, published by Random House. The book focuses on U.S. immigration policy and cycles of control on immigration. Mr. Brimelow argues that legislation passed in 1965 has resulted in negative trends in immigration to the United States, including an influx of immigrants from a very few countries that he says are engulfing America. The author says that the latest immigration wave consists of immigrants who are less educated, less skilled, and less likely to share American ideals, which he argues is a detriment to American culture.

Peter Brimelow Reflects on Immigration in America, Post-Alien Nation

Michael Coren Interviews Peter Brimelow

Peter Brimelow, Immigration Road to Hell

Peter Brimelow speaks CPAC 2012

Inequality and Immigration (1 of 3)

Inequality and Immigration (2 of 3)

Inequality & Immigration (3 of 3)

Peter Brimelow On Western Culture At The Thomas Jefferson Club

The Libertarian Case Against Open Immigration | Peter Brimelow

Related Articles and Videos

George J. Borjas: Costs of Immigration – Economics Roundtable

 

Read Full Post | Make a Comment ( None so far )

Freak Out On Google Glass Name Tag App — Videos

Posted on February 5, 2014. Filed under: American History, Blogroll, Communications, Computers, Economics, history, Investments, Language, Law, liberty, Life, Links, People, Philosophy, Photos, Politics, Rants, Raves, Resources, Reviews, Science, Strategy, Talk Radio, Technology, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 205: February 5, 2014 

Pronk Pops Show 204: February 4, 2014 

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 202-204

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Story 1: Freak Out On Google Glass Name Tag App —  Videos

name_tag

glass-face-recognition

google-glass-facial-recognition.si_

NameTag – Google Glass Facial Recognition Beta App Demo

World’s First Real-Time Google Glass Facial Recognition App Demo – November 26 2013

NameTag – Facial Recognition App for Google Glass #CES2014

Googlicious : Google Glass gets a new look

Google Glass How-to: Getting Started

How it Feels [through Google Glass]

Google Glass Review

Google Glass eyes-on review

Panel Robert Scoble and Andrew Keen on Google Glass and privacy issues at TNW Conference Europe 2013

Amazing Google Glasses Demonstration at Google I/O 2012

Facebook Using Face Recognition Software

Facebook’s New Facial-Recognition Technology

Facial Recognition Systems Going Mainstream

Chic – Le Freak

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Have you heard about the new dance craze?
Listen to us, I’m sure you’ll be amazed
Big fun to be had by everyone
It’s up to you, it surely can be done

Young and old are doing it, I’m told
Just one try and you too will be sold
It’s called Le Freak! They’re doing it night and day
Allow us, we’ll show you the way

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

All that pressure got you down
Has your head spinning all around
Feel the rhythm, check the rhyme
Come on along and have a real good time

Like the days of stomping at the Savoy
Now we freak, oh what a joy!
Just come on down to 54
Find a spot out on the floor

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Now freak!
I said freak!
Now freak!

All that pressure got you down
Has your head spinning all around
Feel the rhythm, check the ride
Come on along and have a real good time

Like the days of stomping at the Savoy
Now we freak, oh what a joy!
Just come on down 54
Find a spot out on the floor

Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!
Ahh, freak out!
Le Freak, c’est Chic
Freak out!

Just When You Thought Google Glass Couldn’t Get Creepier: New App Allows Strangers to ID You Just by Looking at You

ave you ever seen someone wearing Google Glass out at the bar? Like a real person at a real bar actually wearing Google Glass? If so, you know how absolutely ridiculous they look. Which may be the only factor we have that will stop this:

A new app will allow total strangers to ID you and pull up all your information, just by looking at you and scanning your face with their Google Glass. The app is called NameTag and it sounds CREEPY.

The “real-time facial recognition” software “can detect a face using the Google Glass camera, send it wirelessly to a server, compare it to millions of records, and in seconds return a match complete with a name, additional photos and social media profiles.”

NEWS: Google Glass Users Can Now Wink to Take Photos, Which Is Horrible

The information listed could include your name, occupation, any social media profiles you have set up and whether or not you have a criminal record (“CRIMINAL HISTORY FOUND” pops up in bright red letters according to the demo).

And NameTag may have already added you to their database.

Two million entries have already been uploaded to FacialNetwork.com. Once the app officially goes live, you can sign up for NameTag and opt-out, instead of the alternative: Having to opt-in to allow them to show your information.

How is that OK?

WATCH: RadioShack’s Awesome Super Bowl Commercial Recruits the Best ’80s Stars

“It’s not about invading anyone’s privacy,” one NameTag’s creators claimed (viaIndependent). “It’s about connecting people that want to be connected. We will even allow users to have one profile that is seen during business hours and another that is seen in social situations. NameTag can make the big, anonymous world we live in as friendly as a small town.”

It may not be about invading anyone’s privacy, but that sounds like what it does. And forcing people to opt-out if they want to maintain their privacy is wrong (we would go so far as to say it should be illegal). But the purported benefits of the app are almost even worse:

They continue, “It’s much easier to meet interesting new people when we can simply look at someone, see their Facebook, review their LinkedIn page or maybe even see their dating site profile. Often we were interacting with people blindly or not interacting at all. NameTag on Google Glass can change all that.”

Gross.

It’s enough to make you root for that app that lets you film Google Glass porn. If you had to pick one. Luckily, Google has banned facial-recognition software from the Glass—for now.

http://www.eonline.com/news/507361/just-when-you-thought-google-glass-couldn-t-get-creepier-new-app-allows-strangers-to-id-you-just-by-looking-at-you

Bay Area Researcher Developing Facial Recognition Glasses To Help Stop Crime

y now, you have probably heard about the Google Glass wearable computer. Soon, a Mountain View startup will begin selling 3-D eyewear with technology so sophisticated, it could help crime fighters stop crime before it happens.

It’s not a new concept. The 2002 Hollywood film “Minority Report” gave us a look into the future when actor Tom Cruise catches and arrests a criminal before he commits the crime.

y now, you have probably heard about the Google Glass wearable computer. Soon, a Mountain View startup will begin selling 3-D eyewear with technology so sophisticated, it could help crime fighters stop crime before it happens.

It’s not a new concept. The 2002 Hollywood film “Minority Report” gave us a look into the future when actor Tom Cruise catches and arrests a criminal before he commits the crime.

Allen Yang is a University of California at Berkeley researcher and founder of Atheer, the startup developing the glasses.

The 3-D glasses are a wearable computer where users are wirelessly immersed in their own computer through virtual images.

“…And it’s streaming live from the internet to your glasses,” said Theo Goguely, senior product manager at Atheer.

The glasses will ultimately be used by business for work or for regular users for entertainment.

One could put on their glasses and instantly see a 3-D screen with a daytime calendar with a list of things to do. The smart glasses can assist users looking at their kitchen cupboard and they will help visualize nutritional needs.

One of its goals is for use by law enforcement. For example, police wearing the glasses could scan a crowd and possibly locate a suspect or a lost child.

This technology could have helped police find the suspects in the Boston Marathon bombing sooner. Although police had images of the suspects, it took investigators days to identify them. Current facial recognition programs were limited in identifying the low resolution images of the suspects from surveillance cameras.

But Yang said Atheer has developed a better mousetrap. Even if 60 percent of the image is corrupted, Yang said his company’s technology can convert it to an identifiable image.

Yang said the program will be available within two or three years and could help police identify known suspects before they commit another crime.

“In the optimal scenario, they can actually get an alert when they’re patrolling on the streets and they can prevent something from happening before even the event happens,” said Yang.

In addition, the program can be used on surveillance cameras on bridges, roads or buildings to help find missing or kidnapped people.

The 3-D glasses will available next month. The cost: $350 for a model that connects to smart phones and $850 for the standalone version.

All of the programs are still in the early stages of development.

http://sanfrancisco.cbslocal.com/2014/02/04/bay-area-researcher-developing-facial-recognition-glasses-to-help-stop-crime/

Read Full Post | Make a Comment ( None so far )

Senator Session Warns Republicans — Immigration Bill is Bad Politics, Bad Policy and Bad Economics — Videos

Posted on January 30, 2014. Filed under: American History, Blogroll, Business, Climate, College, Communications, Constitution, Crime, Culture, Demographics, Diasters, Economics, Education, Employment, Energy, Federal Government, Federal Government Budget, Food, government, government spending, Health Care, history, Illegal, Immigration, Investments, IRS, Language, Legal, liberty, Life, Links, media, Obamacare, People, Philosophy, Photos, Politics, Press, Private Sector, Psychology, Public Sector, Rants, Raves, Regulations, Resources, Reviews, Security, Tax Policy, Taxes, Technology, Terrorism, Unemployment, Unions, Video, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 201: January 201, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

 Senator Session Warns Republicans — Immigration Bill is Bad Politics, Bad Policy and Bad Economics — Videos

Sen Sessions: Immigration Increases Income Inequality – The Real Story W Gretchen Carlson

Jeff Sessions Elite Group With Special Agendas Behind Legislation That Impacts All America

Jeff Session Mocks Gang Of Eight and Special Interest Forces Immigration Debate

Jeff Sessions: ‘Elite Group With Special Agendas’ Behind Legislation That Impacts All Amer

The entire memo is here and worth a read:

Sessions Warns House GOP: Immigration Bill Is Bad Politics, Bad Policy

Offers a better way forward.

By DANIEL HALPER

Yesterday afternoon, before President Obama’s State of the Union Address, Senator Jeff Sessions’ staff hand-delivered to each Republican member of the House an important memo on the so-called immigration reform bill being debated on Capital Hill. The 3-page document, written by Sessions, argues that pushing the current immigration legislation forward is bad politics, bad policy, and that there’s a better way for Republicans.

Jeff Sessions

Sessions believes House Republicans are at risk of falling into President Obama’s trap. “[A]ccording to news reports, House Republican leaders are instead turning 2014 into a headlong rush towards Gang-of-Eight style ‘immigration reform,'” writes Sessions. “They are reportedly drafting an immigration plan that is uncomfortably similar to a ‘piecemeal’ repackaging of the disastrous Senate plan—and even privately negotiating a final package with Democrat activists before consulting with their own members.”

It’s bad politics, Sessions writes. “In the rush to pass an immigration bill, there has been a near absence of any serious thought about the conditions facing American workers. The last 40 years has been a period of record immigration to the U.S., with the last 10 years seeing more new arrivals than any prior 10- year period in history. This trend has coincided with wage stagnation, enormous growth in welfare programs, and a shrinking workforce participation rate. A sensible, conservative approach would focus on lifting those living here today, both immigrant and native-born, out of poverty and into the middle class—before doubling or tripling the level of immigration into the U.S.

A sensible immigration policy would also listen to the opinion of the American people. Not the opinions of the paid-for consultants trotted out with their agenda-driven polls to GOP member meetings—but the actual, honest opinion of the people who sent us here. There is a reason why none of the corporate-funded ads for amnesty breathe a word about doubling immigration levels. According to Rasmussen Reports, working and middle class Americans strongly oppose large expansions of our already generous immigration system. Those earning under $30,000 prefer a reduction to an increase by an overwhelming 3-1 margin.

And bad policy, the senator from Alabama details. “Coordinating with a small group of the nation’s most powerful special interests, last year President Obama and Senate Democrats forced through an immigration bill which can only be described as a hammer blow to the American middle class. Not only would it grant work permits to millions of illegal immigrants at a time of record joblessness, it would also double the annual flow of new immigrant workers and provide green cards to more than 30 million permanent residents over the next decade. These new workers, mostly lesser-skilled, will compete for jobs in every sector, industry, and occupation in the U.S. economy.”

He adds, “House Republicans, in crafting immigration principles, should reply to the President’s immigration campaign with a simple message: our focus is to help unemployed Americans get back to work—not to grant amnesty or to answer the whims of immigration activists and CEOs. In turn, that message could be joined with a detailed and unifying policy agenda for accomplishing that moral and social objective.”

As for Sessions’ “Better Agenda,” he lays it out very precisely:

The GOP’s 2014 agenda should not be to assist the President in passing his immigration plan. Rather, it should be a consuming focus on restoring hope and opportunity to millions of discouraged workers. The GOP’s 2014 agenda should be a national effort—announced proudly and boldly—to reduce the welfare rolls and get America back to work, including:

  •  More American energy that creates good-paying jobs right here in the U.S.
  •  A more competitive tax and regulatory code that allows U.S. businesses and workers tocompete on a level global playing field
  •  A trade policy that increases U.S. exports and expands domestic manufacturing
  •  An immigration policy that serves the interests of the American people
  •  Converting the welfare office into a job training center
  •  Making government leaner and more accountable to U.S. taxpayers
  •  Restoring economic confidence by continuing our effort to balance the federal budget

An all-out immigration push is inimical to these goals.

Rep. Ryan: GOP Looking at Legal Status, Chance for Citizenship

Rep. Paul Ryan (R., Wis.), a leading GOP advocate for tackling immigration, confirmed Wednesday that Republicans are looking to give illegal immigrants legal status right away, with the chance for a green card—and citizenship—down the line.

Officials familiar with the planning had said as much before. But Mr. Ryan is the first member of the GOP leadership to lay out the Republican vision publicly.

At issue is how to handle more than 11 million people already in the U.S. illegally. Most House Republicans oppose the Senate approach, whereby all qualified illegal immigrants would first win legal status, then have the chance to apply for legal permanent residence (also known as a green card), and then for citizenship. House Republicans call that a “special path to citizenship” that is unavailable to those who followed the law.

House Republicans have been talking since last summer about a different approach, and Mr. Ryan laid it out on Wednesday in an interview with MSNBC’s “The Daily Rundown.”

First, illegal immigrants would be offered a “probationary” status, allowing them to work while the government tightened border security and interior enforcement. Officials have explained that this would allow people to work legally while they wait for permanent legal status. (Officials have explained that this group could revert to illegal status if enforcement benchmarks are not met.)

Mr. Ryan said it would make sure that the Obama administration went ahead with the enforcement provisions. “We want to make sure that we write a law that he can’t avoid,” Mr. Ryan said.

After that, they would be eligible for a “regular work permit,” he said.

“If those things are met, you satisfy the terms of your probation, you’re not on welfare, you pay a fine, you learn English and civics, and the border’s been secured and interior enforcement independently verified, then you can get a regular work permit,” he said.

At that point, this group could apply for green cards using the same system available to any newcomer.

“That’s the kind of process we envision,” he said. “Which is not a special pathway to citizenship and it’s not going to automatically in any way give an undocumented immigrant citizenship.”

Some Democrats and immigration advocates have signaled that they could accept this approach, depending on the details. It’s unclear whether enough Republicans would feel the same. The idea will get its first full airing on Thursday afternoon, when House Republicans are scheduled to discuss immigration at their retreat in Cambridge, Md.

http://blogs.wsj.com/washwire/2014/01/29/rep-ryan-gop-looking-at-legal-status-chance-for-citizenship/

Read Full Post | Make a Comment ( None so far )

President Obama’s State of the Union 2014 Address — The Young and The Jobless Betrayed By Obama — Videos

Posted on January 29, 2014. Filed under: Agriculture, American History, Babies, Blogroll, Business, College, Communications, Constitution, Crime, Culture, Demographics, Diasters, Economics, Education, Employment, Energy, Farming, Federal Government, Federal Government Budget, Fiscal Policy, Food, Foreign Policy, Fraud, government, government spending, Health Care, history, History of Economic Thought, Illegal, Immigration, Inflation, Investments, IRS, Language, Law, Legal, liberty, Life, Links, Literacy, Macroeconomics, media, Narcissism, Obamacare, People, Philosophy, Photos, Politics, Press, Private Sector, Psychology, Public Sector, Quotations, Rants, Raves, Regulations, Religion, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Taxes, Technology, Terrorism, Unemployment, Unions, Video, War, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014 

Pronk Pops Show 198: January 27, 2014 

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 194-200

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

unemployment_minimum_wage

illegal_immigration

2011-0318-origins

USA-Immigration-by-Decadeimmigration_against_population

Story 1: President Obama’s State of the Union 2014 Address — The Young and The Jobless Betrayed By Obama — Videos

Watch the State of the Union – 2014

State of the Union 2014 Address: President Obama’s Full Speech – New York Times

Obama Urges Immigration Reform | State of the Union 2014

STATE OF THE UNION ADDRESS – OBAMA wants to REBUILD the PEOPLES TRUST

State of the Union 2014 Address: Obama on Raising the Minimum Wage – New York Times

Frank Luntz State of the Union Focus Group on The Kelly File – Jan. 28, 2014

Rand Paul Sotu Reaction. Rand Paul State Of The Union Reaction

Sen. Ted Cruz Reaction to the State of the Union Address

FULL SPEECH: Tea Party Response to 2014 State of the Union – Senator Mike Lee

Gohmert’s Reaction to The 2014 State of the Union

Watch the Republican Response to the 2014 State of the Union

Maximum Rage Over The Minimum Wage

Glenn Beck: Obama Became America’s First Dictator During State of the Union 2014

Read Full Post | Make a Comment ( None so far )

U.S. Senate Select Committee on Intelligence Report — TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI, LIBYA, SEPTEMBER 11-12, 2012 January 1, 2014 — General Carter Ham’s Testimony — Benghazi Was A Terrorist Attack — YouTube Video Story Was A Lie – The White House Is The Liars Lair — Videos

Posted on January 15, 2014. Filed under: American History, Banking, Blogroll, College, Communications, Constitution, Crime, Culture, Diasters, Economics, Education, Employment, Energy, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, Fraud, Genocide, government, government spending, history, Law, liberty, Life, Links, media, Monetary Policy, Money, Natural Gas, Oil, People, Philosophy, Photos, Politics, Press, Rants, Raves, Regulations, Reviews, Talk Radio, Technology, Terrorism, Video, War, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , |

general_carter_hamm

The head of the U.S. Africa Command, General Carter Ham, told the House Committee on Armed Services in June 2013, according to recently declassified testimony, that Benghazi was immediately considered an attack.

liar-obama-obamacare

Document

Senate Benghazi report

A Sen­ate in­tel­li­gence com­mit­tee re­port re­leased Wed­nes­day places the blame on State De­part­ment and in­tel­li­gence agen­cies for the 2012 ter­ror­ist at­tack in Benghazi.

Senator Intelligence Committee releases Benghazi attack report The Latest News

[youube=http://www.youtube.com/watch?v=jF5VSfqyuCw]

Benghazi Attack New Senate CMTE Report Criticizes Obama Admin’s Response To Benghazi

Jay Carney Scolds Fox’s Ed Henry For ‘Coloring Outside the Lines’ On Benghazi: ‘Come On, Ed’

The Benghazi Transcripts Don’t Lie

General Carter Ham Quickly became clear, Benghazi a terrorist attack not a demonstration

The Truth About The Murders In Benghazi Attack NYT Under Pressure

Benghazi Scandal Told To Keep Quiet NDA Given To Benghazi Survivors At Memorial

Glenn Beck Why Obama Hid the Truth of Benghazi

Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood

SYRIA Geraldo Rivera: My Sources Say The US Running Libya Arms To Syrian Rebels

SYRIA CNBC: Benghazi Is Not About Libya But An Operation To Put Arms & Men In Syria

SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria

Benghazi Scandal – Susan Rice Defends Benghazi Interviews; Has No Regrets – The Real Story

Fox O’Reilly: Obama Appointing Susan Rice Not Insult to Republicans but Defiance to All Americans

Labrador: Susan Rice Response to Benghazi Attack “Shameful”

Susan Rice Caught Lying About Benghazi – Rep. Trey Gowdy Whistleblower Questioning

R Mc Govern: Beyond Benghazi questioning Susan Rice

LIBYA No US Consulate In Benghazi But CIA Operation, Hired Militia Linked To Extremist

White House Knew at 6:07 PM EST That Ansar Al-Sharia Was Behind the Benghazi Attack

Obama Linked to Benghazi Attack

Obama blames the video in his UN speech

Pres. Obama Speech on 9/11/2012 Terrorist Attacks in Libya

Susan Rice on contending with crisis

Susan Rice Interview on Meet the Press – 9/16/12

Susan Rice ‘This Week’ Interview: U.S. Ambassador to UN Discusses Muslim Protest (09/2012)

Benghazi attack: New report shows the real scandal isn’t what Obama called it

By Ryan Teague Beckwith,

The fight over Benghazi isn’t going away, but the reason for the fight may be changing.

In the days after the deadly attack on a U.S. mission in Libya, the political fight centered on whether President Obama had called it terrorism and whether it was a planned or spontaneous attack.

A new bipartisan Senate report released Wednesday, however, focuses more on the failure of the State Department and U.S. intelligence agencies for not preventing the attack.

The report shows several major problems:

• The State Department did not increase security at its sites despite warnings of possible violence.

• The CIA did not share information about the existence of its outpost with the U.S. military.

• The CIA and the State Department were not working out of the same location.

• Libyans charged with protecting the compound did not do their job.

The report doesn’t touch on the more political aspects of the 2012 attack, which led to the death of U.S. Ambassador Chris Stevens and two others. But six Republican senators added a separate note to the report criticizing the Obama administration for delaying the report and for not being transparent.

“Information has been withheld from the Committee because of the ‘ongoing criminal investigation’ into the attacks, in an apparent effort to shield certain government agencies from congressional oversight or potential embarrassment,” they wrote.

But the fact that their criticisms come up as an addendum to the report instead of in the report itself shows the controversy about what happened at Benghazi is shifting in D.C.

http://www.dailynews.com/general-news/20140115/benghazi-attack-new-report-shows-the-real-scandal-isnt-what-obama-called-it

Pentagon labeled Benghazi a terrorist attack as Obama administration wavered: newly declassified testimony

Gen. Carter Ham’s newly declassified testimony before the House suggests the prospect of an out-of-control demonstration was not raised by Defense officials and that they immediately considered the incident an attack.

By Leslie Larson

The Obama administration was wary to label the 2012 attack on the U.S. Consulate in Benghazi as an act of terrorism but declassified testimony from a top Pentagon official indicates there was little ambiguity among Defense Department players that terrorism was the likely motive.

Former U.S. Ambassador to the U.N. Susan Rice represented the Obama administration in discussing the incident in the aftermath of the attack, suggesting the death of Ambassador Chris Stephens and three Americans came as the result of a protest over an incendiary viral video blasting the prophet Mohammad and was not a preplanned act of terrorism.

Rice appeared on CBS’ “Face the Nation,” CNN’s “State of the Union,” NBC’s “Meet The Press,” “Fox News Sunday” and ABC’s “This Week” on Sep. 16, 2012, to speak on behalf of the President and she repeated the belief that the incident was a “spontaneous” mob uprising and not “a preplanned, premeditated attack.”

“This is not an expression of hostility in the broadest sense toward the United States or to U.S. policy,” she stated.

Republicans pounced on Rice’s analysis, claiming she was placating extremists and not adequately representing the national security threat to the American people.

Now testimony by Gen. Carter Ham, head of AFRICOM at the time of attack, before the House Committee on Armed Services in June 2013 suggests that Defense officials did not raise the prospect of an out-of-control demonstration and immediately deemed the incident an attack.

Ham, whose partially redacted transcript was declassified by the House on Monday, said at the 2013 hearing that he was alerted to the incident 15 minutes after it erupted at 9:42 p.m. Libya Time (3:42 p.m. EST) on Sep. 11, 2012.

“When we saw a rocket-propelled grenade attack, what appeared to be pretty well aimed small arms fire — again, this is all coming second and third hand through unclassified, you know, commercial cellphones for the most part initially. To me, it started to become clear pretty quickly that this was certainly a terrorist attack and not just not something sporadic,” he stated.

Ham served as head of the United States Africa Command, which manages U.S. military operations in Africa. He served in that capacity from March 2011 to April 2013.

He describes how as soon as AFRICOM learned of the attack, the command control repositioned a drone to the consulate to gather intelligence on the ground movements. The unmanned, unarmed surveillance aircraft was ordered to be diverted to the Benghazi site at 9:59 p.m. Libya Time, 17 minutes after the attack.

According to the timeline, at 10:32 p.m. Libya Time, Ham briefed then Defense Secretary Leon Panetta and Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, before they traveled to the White House for a pre-scheduled meeting with Obama, during which they briefed Obama on the situation.

During Ham’s briefing with Panetta and Dempsey, before they left for the White House, he said there was a “peripheral” discussion as to the cause but added, “We knew at that initial meeting, we knew that a U.S. facility had been attacked and was under attack.”

“I am not aware of (a demonstration), sir. It became pretty apparent to me, and I think to most at Africa Command pretty shortly after this attack began, that this was an attack,” he told Rep. Howard P. (Buck) McKeon (R-CA), chairman of the House Armed Services Committee.

“We knew at that point that we had two individuals, Ambassador Stevens and Mr. Smith (a Foreign Service information officer), unaccounted for. And so the focus of our effort at that point was gaining understanding of what the situation was. And then we started very quickly to think about, you know, the possibility of a U.S. ambassador being held hostage in a foreign land and what does that mean,” Ham said during his House testimony.

The testimony includes a reference to an Ops Alert announcing the attack that was received in the White House Situation Room at 10:05 p.m. Libya time, but Ham was not privy to what details the alert included.

Panetta’s testimony before the Senate Armed Services Committee in February similarly stated the early belief that the episode was an attack.

“There was no question in my mind that this was a terrorist attack,” Panetta said of his early assessment of the situation on the ground in Benghazi.

Ham’s version of events could discredit the accounts from some Obama officials who were hesitant to state the security threat posed by the attack.

In particular, Rice has been accused of misleading the American public with her statements that the incident was a protest run amok rather than terrorism.

In May 2013, then Secretary of State Hillary Clinton was also implicated in an ABC News report that claimed a State Department official urged the CIA and White House to avoid describing the event as an act of terrorism in public statements.

susan_rice

Susan Rice went on TV talk shows days after the Benghazi attack to speak on behalf of the President. She repeated the belief that the incident was a ‘spontaneous’ mob uprising and not ‘a preplanned, premeditated attack.’

RELATED: STASI: CBS PUTS LARA LOGAN ON LEAVE BUT FIRED RATHER FOR LESS

Leaked emails show that then State Department spokeswoman Victoria Nuland suggested that a CIA memo on Benghazi not include any reference of links to al-Qaeda and the intelligence warnings in the months preceding the attack.

Nuland wrote in protest to the CIA description, saying it “could be abused by members (of Congress) to beat up on the State Department for not paying attention to warnings,” in an email to the White House and the CIA, according to ABC.

The intelligence memo was the basis for Rice’s public statements in September 2012.

The PR spin to describe the attack as spontaneous rather than pre-planned was seen as a move to protect the State Department from being blamed for not adequately providing security and anticipating the attack.

RELATED: CBS ORDERS LOGAN, PRODUCER TO TAKE LEAVE

White House Press Secretary Jay Carney denied any wrongdoing in Rice’s description of the episode, telling the press in May that Rice didn’t have “hard, concrete evidence” to suggest terrorism.

“It was simply a reflection of we did not, and the intelligence community did not, and others within the administration did not, jump to conclusions about who was responsible before we had an investigation to find out the facts,” he said of Rice’s highly criticized assessment of the situation.

Her behavior in the aftermath of the tragedy displeased Congress and is largely to blame for her failure to be appointed Secretary of State after Clinton’s retirement in Obama’s second term.

Instead, Rice was appointed to the role of National Security adviser.

Clinton has defended Rice and said the root motive for the attack was not an important detail to focus on.

“We had four dead Americans. Was it because of a protest or because of guys out for a walk one night and decided to go kill some Americans? At this point what difference does it make, Senator?” Clinton said at a tense Senate hearing in January 2013.

Clinton, a likely contender in the 2016 White House bid, remains defensive as the “Benghazi stain” continues to haunt her legacy.

Read Full Post | Make a Comment ( None so far )

National Security Agency Invades Computers Using Radio Pathway — Crossing The Line Into Criminal Activity — Videos

Posted on January 14, 2014. Filed under: American History, Blogroll, Communications, Computers, Computers, Constitution, Data Storage, Economics, External Hard Drives, External Hard Drives, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Investments, IRS, Language, Law, liberty, Life, Links, media, Mobile Phones, People, Philosophy, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Regulations, Resources, Reviews, Security, Strategy, Systems, Talk Radio, Taxes, Technology, Television, Terrorism, Unemployment, Video, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , |

prism3

NSA could ‘Spy on offline Computers’ | NSA Infiltrates Personal Computers Worldwide

NY Times: NSA Maps Radio Pathway Into Computers — Even If They Are Offline

Report: NSA Intercepts Computer Deliveries

New York Times – Give Edward Snowden Clemency

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

January 14 2014 Breaking News Barack Obama Gun control & NSA worldwide people control last days news

Enemy of the State

N.S.A. Devises Radio Pathway Into Computers

By and JAN. 14, 2014

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.

Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

No Domestic Use Seen

There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s.

“N.S.A.’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements,” Vanee Vines, an agency spokeswoman, said in a statement. “We do not use foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line.”

Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.’s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.

President Obama is scheduled to announce on Friday what recommendations he is accepting from an advisory panel on changing N.S.A. practices. The panel agreed with Silicon Valley executives that some of the techniques developed by the agency to find flaws in computer systems undermine global confidence in a range of American-made information products like laptop computers and cloud services.

Embracing Silicon Valley’s critique of the N.S.A., the panel has recommended banning, except in extreme cases, the N.S.A. practice of exploiting flaws in common software to aid in American surveillance and cyberattacks. It also called for an end to government efforts to weaken publicly available encryption systems, and said the government should never develop secret ways into computer systems to exploit them, which sometimes include software implants.

Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”

“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”

From the earliest days of the Internet, the N.S.A. had little trouble monitoring traffic because a vast majority of messages and searches were moved through servers on American soil. As the Internet expanded, so did the N.S.A.’s efforts to understand its geography. A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.

A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.

That map suggests how the United States was able to speed ahead with implanting malicious software on the computers around the world that it most wanted to monitor — or disable before they could be used to launch a cyberattack.

A Focus on Defense

In interviews, officials and experts said that a vast majority of such implants are intended only for surveillance and serve as an early warning system for cyberattacks directed at the United States.

“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.

“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”

If tracking subs was a Cold War cat-and-mouse game with the Soviets, tracking malware is a pursuit played most aggressively with the Chinese.

The United States has targeted Unit 61398, the Shanghai-based Chinese Army unit believed to be responsible for many of the biggest cyberattacks on the United States, in an effort to see attacks being prepared. With Australia’s help, one N.S.A. document suggests, the United States has also focused on another specific Chinese Army unit.

Documents obtained by Mr. Snowden indicate that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers. When the Chinese place surveillance software on American computer systems — and they have, on systems like those at the Pentagon and at The Times — the United States usually regards it as a potentially hostile act, a possible prelude to an attack. Mr. Obama laid out America’s complaints about those practices to President Xi Jinping of China in a long session at a summit meeting in California last June.

At that session, Mr. Obama tried to differentiate between conducting surveillance for national security — which the United States argues is legitimate — and conducting it to steal intellectual property.

http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?hp&_r=0

Read Full Post | Make a Comment ( None so far )

Record Low Temperatures in United States As Mother Nature Changes Weather and Climate To Global Cooling — The Coming Ice Age — Need Nuclear Power To Keep Warm and Cool — Videos

Posted on January 6, 2014. Filed under: American History, Biology, Blogroll, Books, Business, Chemistry, Climate, Communications, Computers, Culture, Economics, Foreign Policy, government, government spending, history, Language, Law, liberty, Life, Links, media, Non-Fiction, People, Philosophy, Photos, Physics, Politics, Rants, Raves, Regulations, Resources, Reviews, Science, Security, Technology, Video, Water, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

Pronk Pops Show 159: October 31, 2013

Pronk Pops Show 158: October 30, 2013

Pronk Pops Show 157: October 28, 2013

Pronk Pops Show 156: October 25, 2013

Pronk Pops Show 155: October 24, 2013

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 184-187

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Story 1: Record Low Temperatures in United States As Mother Nature Changes Weather and Climate To Global Cooling — The Coming Ice Age — Need Nuclear Power To Keep Warm and Cool — Videos

TIME_Covers

global_cooling

Time-Global-Cooling

global-cooling_time-magazine

060403_DomCNNL3R1

global_warming

war_global_warming

global_warming_time

global_warming_Time_Cover

time_gw_covers_large

polar_bears

gw-time-magazine-ice-age-global-warming

Bloomberg-Cover1

North America set for record low temperatures as cold snap stretches

Arctic freeze hits US Midwest with record low temperatures

What is an Ice Age?

Climate Change in 12 Minutes – The Skeptic’s Case

The Next Ice Age and The Gulf Stream – Future Focus

In Search Of… The Coming Ice Age (1978) [Global Cooling]

Global Cooling: The Coming Ice Age

Dr Matthew J Penn suggests global cooling – new Little Ice Age

Global Cooling || UN Climate Report Reveals Rate Of Global Warming About Half Average Rate – Dobbs

Global Warming or a New Ice Age: Documentary Film

Related Posts On Pronk Palisades

Roy W. Spencer: Why The Global Warming Agenda Is Wrong–Video

Cap and Trade

Glenn Beck Exposes The Crime of The Century By The Progressive Radical Socialist Democratic Party–The Global Warming Investment Fraud, Political Scam and Science Scandal–Extorting and Robbing The American People–Racketeer Influenced and Corrupt Organizations (RICO) Case!

Jeffrey Miron–Obamaomics–Videos

William A. Sprigg, PhD., an IPCC climate scientist, On “Climategate”–Videos

Richard Lindzen, Roy Spencer, and Fred Singer On The Climate and Global Warming Alarmists and Junk Science Computer Models –Videos

Global Warming Is Caused By Man: The Arrogance of Man–The Wrath Of Mother Nature–

Al Gore Global Warming Hot Head Says The Artic Ice Cap Will Disappear In 5-10-15 Years–Volcanoe Gate–Eruptions Melt Ice and Increase Carbon Dioxide!–Videos

Climategate–A Political Scam, Investment Fraud, and Science Scandal of The Century Exposed–The Progressive Radical Socialist’s Big Lie And Con That Man Is The Cause Of Global Warming Was In Fact Nothing More Than Politicians, Investment Bankers, and Government Scientists Creating Climate Crisis!–

Glenn Beck, John Bolton, and Lord Christopher Monckton On Copenhagen 2009 Treaty, Climate Change and World Government–Videos

Lord Christopher Monckton–Climate Change–Treaty–Videos

“We Can Reverse Climate Change”–President Barack Obama–Liar or Fool–Or Both–You Be The Judge!

Time To Sound The Alarm: Call Your Representative and Senators–Cap and Trade Bill to be Voted in U.S. House on Friday–Kill The Cap and Trade Energy Tax Today! UPDATED

Green Government Gestapo Goons: Global Warming Police Force Invades Your Home And Living in Your Home May Be A Crime!

White House Memo: Carbon Dioxide Is Not A Pollutant and A Cap And Trade Program (Carbon Dioxide Tax) Serious Economic Impact –The Smoking Gun Video!

Save Your Job and Life–Abolish The Environmental Protection Agency!

President Obama–Killer of The American Dream and Market Capitalism–Stop The Radical Socialists Before They Kill You!

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY DEBATE–Videos

Facing Fundamental Facts

Let Them Eat Cake Act: American Elites Killing and Starving The American People

Clinton’s Cap and Trade Tax on The American People for Consuming Electricity and Driving Cars, SUVs and Trucks!

The Heidelberg Appeal: Beware of False Gods and Prophets

Saving The World: The Importance of Getting The Priorities Right

Global Warming/Climate Change

Roy Spencer–The Great Global Warming Blunder: How Mother Nature Fooled the World’s Top Climate Scientists –Videos

CO2 is Life: Global Warming Panel Discussion–Videos

William A. Sprigg, PhD., an IPCC climate scientist, On “Climategate”–Videos

Professor Fred Singer–On Climate Change–Videos

Richard Lindzen, Roy Spencer, and Fred Singer On The Climate and Global Warming Alarmists and Junk Science Computer Models –Videos

Al Gore Global Warming Hot Head Says The Artic Ice Cap Will Disappear In 5-10-15 Years–Volcanoe Gate–Eruptions Melt Ice and Increase Carbon Dioxide!–Videos

Climategate–The Political Scam, Investment Fraud, and Science Scandal of The Century Exposed–The Progressive Radical Socialist’s Big Lie And Con That Man Is The Cause Of Global Warming Was In Fact Nothing More Than Politicians, Investment Bankers, and Government Scientists Creating Climate Crisis!–

Glenn Beck, John Bolton, and Lord Christopher Monckton On Copenhagen 2009 Treaty, Climate Change and World Government–Videos

Lord Christopher Monckton–Climate Change–Treaty–Videos

“We Can Reverse Climate Change”–President Barack Obama–Liar or Fool–Or Both–You Be The Judge!

John Holdren–Science Czar–Videos

John Holdren: Global Warming: What Do We Know and Should Do–Videos

The Obama Depression Has Arrived: 15,000,000 to 25,000,000 Unemployed Americans–Stimulus Package and Bailouts A Failure–400,000 Leave Labor Force In July!

Facing Fundamental Facts

Gore Grilled & Gingrich Gouged–American People Oppose Massive Carbon Cap and Trade Tax Increase–Videos

National Center for Policy Analysis–A Global Warming Primer

Global Warming is The Greatest Hoax, Scam and Disinformation Campaign in History

Global Warming Videos

Global Warming Books

Global Warming Sites

The Heidelberg Appeal: Beware of False Gods and Prophets

Read Full Post | Make a Comment ( None so far )

The Men Who Killed Kennedy — Fact and Fiction — Kennedy Must Be Killed — Videos

Posted on January 6, 2014. Filed under: American History, Blogroll, Books, Business, College, Communications, Crime, Culture, Diasters, Economics, Education, Employment, Federal Government, Federal Government Budget, Fiction, Fiscal Policy, government, government spending, history, Homicide, IRS, Law, liberty, Life, Links, media, Non-Fiction, People, Philosophy, Politics, Press, Psychology, Rants, Raves, Regulations, Resources, Reviews, Talk Radio, Taxes, Technology, Terrorism, Video, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , |

jfkTHE MEN WHO KILLED KENNEDY

kennedy_must_be_killed

Kennedy Must Be Killed

As a young CIA officer, Patrick McCarthy witnesses first-hand JFK’s political immaturity and personal recklessness. When Kennedy is elected in 1960, Patrick fears that Kennedy is unprepared to lead the nation in the height of the Cold War. After the near catastrophic events of the Cuban Missile Crisis, The Patriots, a shadowy group of powerful men, decide to take action before Kennedy’s next political blunder destroys the country. Patrick’s devotion to protecting his country ensnares him in the conspiracy to assassinate the president. After the assassination, Patrick assists in orchestrating the Warren Commission cover-up. He realizes too late that he has been duped by those he trusted. Years later, the House Select Committee on Assassinations reopens the investigation and subpoenas Patrick to testify. Patrick grapples with the decision to reveal the truth-a truth which will re-write American history and destroy the reputations and fortunes of some of America’s most powerful men.

KENNEDY MUST BE KILLED chronicles the life of Patrick McCarthy from the time he arrives in postwar Washington D.C. as an idealistic, patriotic young man to that fateful day on the grassy knoll when he destroys the heart of the nation. It is a story about one man’s love for his country, love for his wife and family, and an act of betrayal that causes him to lose everything that he holds dear.

The Men Who Killed Kennedy: Part 1 The Coup d’Etat

The Men Who Killed Kennedy is a video documentary series by Nigel Turner that originally aired in 1988 in England with two one-hour segments about the John F. Kennedy assassination. The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. Three one-hour segments were added in 1991. A sixth segment was added in 1995. Finally, three additional hourly segments were added by the History Channel in November 2003. The ninth segment, titled “The Guilty Men”, directly implicated Lyndon B. Johnson. Within days, Johnson’s widow, Lady Bird Johnson, more of his surviving associates, ex-President Jimmy Carter, and the lone, living Warren Commission commissioner and ex-President Gerald R. Ford immediately complained to the History Channel. They subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. “The Guilty Men” segment was completely withdrawn by the History Channel. Also during the series, French prisoner Christian David named Lucien Sarti as one of three French criminals hired to carry out the assassination of Kennedy, when he was interviewed by author Anthony Summers. This claim is one of the most strongly investigated theories presented on the show.

The Men Who Killed Kennedy: Part 2 The Forces of Darkness

The Men Who Killed Kennedy: Part 3 The Cover-Up

The Men Who Killed Kennedy: Part 4 The Patsy

The Men Who Killed Kennedy, Part 5

The Men Who Killed Kennedy, Part 6

The Men Who Killed Kennedy – Part 7 – The Smoking Guns

The Men Who Killed Kennedy – Part 8 – The Love Affair

The Men Who Killed Kennedy – Part 9 – The Guilty Men

The Men Who Killed Kennedy is a video documentary series by Nigel Turner that originally aired in 1988 in England with two one-hour segments about the John F. Kennedy assassination. The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. Three one-hour segments were added in 1991. A sixth segment was added in 1995. Finally, three additional hourly segments were added by the History Channel in November 2003. The ninth segment, titled “The Guilty Men”, directly implicated Lyndon B. Johnson. Within days, Johnson’s widow, Lady Bird Johnson, more of his surviving associates, ex-President Jimmy Carter, and the lone, living Warren Commission commissioner and ex-President Gerald R. Ford immediately complained to the History Channel. They subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. “The Guilty Men” segment was completely withdrawn by the History Channel. Also during the series, French prisoner Christian David named Lucien Sarti as one of three French criminals hired to carry out the assassination of Kennedy, when he was interviewed by author Anthony Summers. This claim is one of the most strongly investigated theories presented on the show.

  • The Men Who Killed Kennedy

The Men Who Killed Kennedy is a United Kingdom ITV video documentary series by Nigel Turner about the John F. Kennedy assassination. Originally broadcast in 1988 in two parts (with a subsequent studio discussion), it was rebroadcast in 1991 re-edited to three parts with additional material, and a fourth episode added in 1995. The addition of three further episodes in 2003 caused great controversy, particularly in the final episode implicating Lyndon Johnson, and the withdrawal of these additional episodes.

Broadcast history and critical response

1988 to 2003

The Men Who Killed Kennedy began with two 50-minute segments originally aired on 25 October 1988 in the United Kingdom, entitled simply Part One and Part Two. The programmes were produced by Central Television for the ITV network, and was followed three weeks later with a studio discussion on the issues titled The Story Continues, chaired by broadcaster Peter Sissons.

The original broadcast was controversial in Britain. The episodes identified three men as the assassins of Kennedy as three men, deceased drug trafficker Lucien Sarti and two living men. All three were later revealed to have strong alibis: Sarti was undergoing medical treatment in France, another was in prison at the time, and the third had been in the French Navy. One of the two living men threatened to sue, and Central Television’s own subsequent investigation into the allegations revealed they were “total nonsense”. Turner justified his failure to interview one of the accused on the grounds that the individual was “too dangerous”. Turner was censured by the British Parliament. An unsuccessful attempt was made to revoke the franchise of Central Television under British laws against broadcasting inaccuracies, but the Independent Broadcasting Authority did force Central Television to produce a third episode dedicated to the false allegations, aired November 16, 1988, which was later referred to as a “studio crucifixion” of Turner and his inaccuracies. This was the first time the IBA had taken such an action.[2]

The United States corporation, Arts & Entertainment Company, purchased the rights to the original two segments. In 1989, the series was nominated for a Flaherty Documentary Award. In November 1991, the series was re-edited with additional material and divided into three 50-minute programmes, which were also shown by ITV on consecutive nights. An additional episode appeared in 1995. The series typically aired in November every year and from time to time during the year.

2003 onwards

In November 2003, three additional segments (“The Final Chapter”) were added by the History Channel, entitled, respectively, “The Smoking Guns”, “The Love Affair” and “The Guilty Men”.

“The Love Affair” focussed on the claims of Judyth Vary Baker to have been Lee Harvey Oswald‘s lover in 1963, and to have worked with Oswald and others to develop a cancer-causing biological weapon as part of a CIA plan to assassinate Fidel Castro.[3][4]

The third of these additional segments – “The Guilty Men” – was based substantially on the book Blood, Money & Power: How L.B.J. Killed J.F.K by Barr McClellan.[5] The book and the episode directly implicates former U. S. President Lyndon B. Johnson (LBJ) and its airing in 2003 created an outcry among Johnson’s surviving associates, including Johnson’s widow, Lady Bird Johnson, journalistBill MoyersJack Valenti (longtime president of the Motion Picture Association of America), Jimmy Carter, and the last-living (at the time of the outcry) Warren Commission member Gerald R. Ford. These Johnson supporters lodged complaints of libel with the History Channel, and subsequently threatened legal action against Arts & Entertainment Company, owner of the History Channel. The History Channel responded by assembling a panel of three historians, Robert DallekStanley Kutler, and Thomas Sugrue. On a program aired April 7, 2004, titles “The Guilty Man: A Historical Review,” the panel agreed that the documentary was not credible and should not have aired. The History Channel issued a statement saying, in part, “The History Channel recognizes that ‘The Guilty Men’ failed to offer viewers context and perspective, and fell short of the high standards that the network sets for itself. The History Channel apologizes to its viewers and to Mrs. Johnson and her family for airing the show.” The channel said it would not show the episode again. Author Barr McClellan, on whose work the episode was largely based, complained that he had tried to cooperate with the reviewing historians to discuss his evidence with them, and had been ignored.[5][6]

Malcolm Liggett, a retired economics professor, sued A&E regarding the episode “The Smoking Guns,” which claimed Liggett was involved in a conspiracy to kill Kennedy. Liggett and A&E reached a settlement, which required that a letter by Liggett be read on the show History Center.[7]

David Browne of Entertainment Weekly described the documentary as “well-researched, but still farfetched”.[8] Addressing “The Guilty Men” episode, Dorothy Rabinowitz of The Wall Street Journal called it a “primitive piece of conspiracy-mongering” and wrote that “…the documentary’s ever deepening mess of charges and motives is never less than clear about its main point — that Lyndon Johnson personally arranged the murder not only of the president, but also seven other people, including his own sister.”[9]

In a letter to the chief executives of the three parent companies of A & E Networks, — Victor F. Ganzi of the Hearst CorporationMichael D. Eisner of Disney, and Robert C. Wrightof NBC — former United States President Gerald Ford described the allegations as “the most damaging accusations ever made against a former vice president and president in American history.”[10]

Episode list

The first two episodes were followed by “The Story Continues” (16 November 1988), a critical studio discussion about them. The final episode was followed by a critical review, “The Guilty Men: A Historical Review.” (7 April 2004).

  1. “The Coup D’Etat” (25 October 1988)
  2. “The Forces Of Darkness” (25 October 1988)
  3. “The Cover-Up” (20 November 1991)
  4. “The Patsy” (21 November 1991)
  5. “The Witnesses” (21 November 1991)
  6. “The Truth Shall Set You Free” (1995)
  7. “The Smoking Guns” (2003)
  8. “The Love Affair” (2003)
  9. “The Guilty Men” (2003)

References

  1. Jump up^ WorldCatThe men who killed Kennedy : the definitive account of American history’s most controversial mystery
  2. Jump up^ Holland, Max“The British JFK Producer Who Brought Shame on the History Channel”. Kennedy Assassination Home Page. Retrieved 6 December 2013.
  3. Jump up^ John C. McAdamsShould We Believe Judyth Baker?, Marquette University
  4. Jump up^ Judyth Vary Baker, “Judyth Baker Responds to Critics”, archived at John C. McAdams‘ website at http://mcadams.posc.mu.edu/sboard.htm
  5. Jump up to:a b Reuters, 12 April 2004, “History Channel Pulls JFK Conspiracy Show”
  6. Jump up^ Bruce Weber, “History Channel Apologizes“, New York Times, April 7, 2004
  7. Jump up^ Grace Murphy, “History Channel, Vero man reach settlement in JFK allegations”, Fort Pierce Tribune, March 19, 2005
  8. Jump up^ Browne, David (November 20, 1992). “The Men Who Killed Kennedy (1992)”EW.com. Entertainment Weekly. Retrieved January 28, 2013.
  9. Jump up^ Rabinowitz, Dorothy (February 19, 2004). “Character Assassination”The Wall Street Journal. Retrieved February 4, 2013.
  10. Jump up^ Weber, Bruce (February 5, 2004). “Moyers and Others Want History Channel Inquiry Over Film That Accuses Johnson”The New York Times (New York). Retrieved March 7, 2013.

http://en.wikipedia.org/wiki/The_Men_Who_Killed_Kennedy

Read Full Post | Make a Comment ( None so far )

Senator Rand Paul Filing Class-Action Lawsuit Against National Security Agency — Videos

Posted on January 4, 2014. Filed under: American History, Blogroll, College, Communications, Computers, Computers, Constitution, Crime, Economics, Education, Employment, External Hard Drives, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government spending, Health Care, history, Inflation, Investments, IRS, Language, Law, liberty, Life, Links, Literacy, Philosophy, Politics, Rants, Raves, Resources, Reviews, Talk Radio, Tax Policy, Taxes, Technology, Terrorism, Video, Wealth, Wisdom, Writing | Tags: , , , , , , |

Sen. Rand Paul Filing Class-Action Lawsuit Against NSA

Rand Paul – Class-Action Lawsuit Against Obama

 

Related Posts On Pronk Palisades

National Security Agency (NSA)  — Thin Thread — Trailblazer — The Program — Stellar Wind: PRISM — NUCLEON — Mainstay — Marina — EVILOLIVE — FASCIA —  XKeyscore — Co-Traveller — Photos — Slides — Videos

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Vide

Read Full Post | Make a Comment ( None so far )

National Security Agency (NSA) — Thin Thread — Trailblazer — The Program — Stellar Wind: PRISM — NUCLEON — Mainstay — Marina — EVILOLIVE — FASCIA — XKeyscore — Co-Traveller — Photos — Slides — Videos

Posted on January 4, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Computers, Constitution, Crime, Economics, Education, Employment, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, Inflation, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Photos, Politics, Psychology, Raves, Regulations, Resources, Reviews, Security, Strategy, Talk Radio, Tax Policy, Technology, Television, Terrorism, Unemployment, Video, War, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , |

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Published on Dec 30, 2013

Through a PRISM, Darkly
Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.

Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

Glenn Becks “SURVEILLANCE STATE”

Inside the NSA

Ed Snowden, NSA, and Fairy Tales

AT&T Spying On Internet Traffic

For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”

NSA Whistle-Blower Tells All – Op-Docs: The Program

The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Benny – The Government is Profiling You (The NSA is Spying on You)

‘After 9/11 NSA had secret deal with White House’

The story of Whistleblower Thomas Drake

Whistleblowers, Part Two: Thomas Drake

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Meet Edward Snowden: NSA PRISM Whistleblower

The Truth About Edward Snowden

N.S.A. Spying: Why Does It Matter?

Inside The NSA~Americas Cyber Secrets

NSA Whistleblower Exposes Obama’s Dragnet

AT&T whistleblower against immunity for Bush spy program-1/2

AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program

The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.

AT&T whistleblower against immunity for Bush spy program-2/2

Enemy Of The State 1998 (1080p) (Full movie)

Background Articles and Videos

Stellar Wind

Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]

The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]

In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

PRISM

PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.

A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]

According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]

History

Slide showing that much of the world’s communications flow through the US

Details of information collected via PRISM

PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]

PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]

The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]

Response from companies

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]

Initial Public Statements

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]

Slide listing companies and the date that PRISM collection began

  • Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
  • Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
  • Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
  • Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
  • Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
  • Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]

In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13] The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]

“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]

Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]

The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]

While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]

Post-PRISM Transparency Reports

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000″ user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]

Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]

Response from United States government

Executive branch

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]

Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]

On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]

The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]

The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]

In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]

Legislative branch

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

  • June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

  • June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
  • June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
  • June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

  • June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]

Representative John Boehner (R-OH), Speaker of the House of Representatives

  • June 11 “He’s a traitor”[50] (referring to Edward Snowden)

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

  • June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

  • June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
  • June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]

Senator Mark Udall (D-CO)

  • June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we