Welfare

Byron York — The Vast Left Wing Conspiracy: The Untold Story of How Democratic Operatives, Eccentric Billionaires, Liberal Activists, and Assorted Celebrities Tried to Bring Down a President – and Why They’ll Try Even Harder Next Time — Videos

Posted on July 1, 2017. Filed under: American History, Blogroll, Books, Communications, Congress, Constitution, Corruption, Education, Elections, Faith, Family, Freedom, government spending, history, Illegal, Immigration, Journalism, Law, Legal, liberty, Life, Links, media, Newspapers, Non-Fiction, People, Philosophy, Photos, Radio, Raves, Raymond Thomas Pronk, Speech, Television, Video, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , |

Image result for book cover The Vast Left Wing Conspiracy: The Untold Story of How Democratic Operatives, Eccentric Billionaires, Liberal Activists, and Assorted Celebrities Tried to Bring Down a President - and Why They'll Try Even Harder Next Time

Image result for Byran York

Image result for Byran York

 Political fallout from Jeff Sessions’ Senate testimony

Byron York: Leaks a big distraction to Trump’s agenda

BYRON YORK on Markos Moulistas Zuniga & Democracy Alliance

Glenn Beck talks to Byron York of the Washington Examiner about the AmeriCorp firing

Vast Left Wing conspiracy against Rush Limbaugh?

Byron York explains why the GOP is screwed on taxes—and says that they know it

Byron York Explains The Issues Conservatives Must Address In 2016

Hillary’s Vast Left-Wing Conspiracies

CPAC 2016 Panel: Darker Money: How Leftist Billionaires Have Built a Vast Left-Wing Conspiracy

Glenn Beck Exposes Vast Left Wing Conspiracy Aug 4, 2009

George Carlin on the Left Wing

Byron York

From Wikipedia, the free encyclopedia
Byron York
Byron York by Gage Skidmore.jpg

York in 2017
Born c. 1955
Residence Washington, D.C.
Nationality American
Education University of Alabama
University of Chicago
Occupation Commentator, punditcolumnistauthor
Notable credit(s) White House correspondentfor National Reviewmagazine; columnist for The Hill; frequent guest on BloggingHeads.tv; author of The Vast Leftwing Conspiracy; formerly worked for CNN
Parent(s) Thomas Earl York
Helen Hamilton York

Byron York (born c. 1955) is an American conservative columnist for the Washington ExaminerFox News contributor, and author who lives in Washington, D.C.

Career

York is the chief political correspondent for The Washington Examiner, a publication he joined in early 2009 following his work as White Housecorrespondent for National Review magazine and a columnist for The Hill. He is also a syndicated columnist.

He has also written for The AtlanticThe Wall Street JournalThe Weekly Standard, and New York Post, among other publications. A frequent guest on television and radio, he has appeared on such programs as Meet the PressThe NewsHour with Jim LehrerThe O’Reilly FactorMeet the PressSpecial ReportThe Laura Ingraham Show, and Hardball with Chris Matthews, and has contributed occasional commentaries to National Public Radio.

Before working for National Review, York was a news producer at CNN Headline News and an investigative reporter for The American Spectator. In 2001 York explored the misfortunes of his former employer in an essay written for The Atlantic, “The Life and Death of The American Spectator”.[1]

For a brief period in 2005 he was a contributing blogger at The Huffington Post. He has taken part in discussions with other media personalities at BloggingHeads.tv.

Education

York holds a bachelor’s degree from the University of Alabama at TuscaloosaAlabama, and a master’s from the University of Chicago.

Family

He is the son of Thomas Earl York, a longtime television personality from Birmingham, Alabama, and the former Helen Hamilton (born 1929).

Bibliography

  • The Vast Left Wing Conspiracy: The Untold Story of How Democratic Operatives, Eccentric Billionaires, Liberal Activists, and Assorted Celebrities Tried to Bring Down a President—and Why They’ll Try Even Harder Next Time (NY, Crown Forum, 2005) ISBN 1-4000-8238-2

References

  1. Jump up^ York, Byron (November 1, 2001). “The Life and Death of The American Spectator”The Atlantic288 (4). pp. 91–106. Retrieved 2006-08-24.

External links

https://en.wikipedia.org/wiki/Byron_York

Read Full Post | Make a Comment ( None so far )

Southern Rock Star Gregg Allman Dies at Age 69 — Rest in Peace — Videos

Posted on May 27, 2017. Filed under: Art, Articles, Blogroll, Entertainment, liberty, Life, media, Money, Music, Music, People, Philosophy, Photos, Raves, Video, Welfare, Work, Writing | Tags: , , , , , , , , |

Gregg Allman, icon of Southern Rock, dead at 69

Gregg Allman Dies At 69

CBS This Morning: Gregg Allman Today

Gregg Allman – Tuesday’s Gone (Lynyrd Skynyrd – One More For The Fans)

Gregg Allman – “Tuesday’s Gone” – Skynyrd Tribute Concert @ Fox Theatre, Atlanta 11.12.2014

Gregg Allman – I’m No Angel

Gregg Allman LIVE – “I’m No Angel” | Back to Macon, GA

Gregg Allman 01/21/2012 “These Days”

Gregg Allman (and Redd Foxx) on Late Night, November 18, 1987

The Allman Brothers Band – After The Crash

The Big Interview Sneak Peek: Gregg Allman

GREGG ALLMAN DEAD AT 69 — The Last Time We Saw Him in 2014 | TMZ

“Midnight Rider” with Vince Gill, Gregg Allman and Zac Brown

The Allman Brothers Band – Midnight Rider – 9/10/1973 – Grand Opera House (Official)

Allman Brothers Band – Blue Sky

Gregg Allman performing soulful version of Come And Go Blues

Gregg Allman – Come And Go Blues – 12/11/1981 – unknown (Official)

The Allman Brothers Band – Ramblin’ Man – 7/12/1986 – Starwood Amphitheatre (Official)

The Allman Brothers Band – Ramblin’ Man – 12/16/1981 – Capitol Theatre (Official)

The Allman Brothers Band – Whipping Post – 9/23/1970 – Fillmore East (Official)

The Allman Brothers Band – Full Concert – 09/23/70 – Fillmore East (OFFICIAL)

The Allman Brothers Band – Full Concert – 01/16/82 – University Of Florida Bandshell (OFFICIAL)

The Allman Brothers Band – Jessica (EPIC Version!!!); Wanee Festival 2014-04-11

The Allman Brothers Band – Melissa – 7/29/1981 – NBC Studios (Official)

“Melissa” featuring Jackson Browne and Gregg Allman

The Allman Brothers Band – Soulshine live

The Allman Brothers Band – Soulshine – 8/14/1994 – Woodstock 94 (Official)

Gregg Allman – Queen of Hearts – 07/03/13

The Gregg Allman Band 1982 – Queen of Hearts – Saenger Theatre New Orleans

Allman Brothers Band – A Decade of Hits 1969-1979

The Allman Brothers Band enters the Rock and Roll Hall of Fame

Gregg Allman on Regis & Kathie Lee, 1991

Gregg Allman Reminisces On His Allman Brothers Days – CONAN on TBS

Howard Stern interviews Gregg Allman (05/22/12)

Gregg Allman interview – PART 1 of 14 – Dickey Betts – Saenger Theater New Orleans 1982

Gregg Allman interview PART 2 of 14 – Saenger Theater New Orleans 1982

Gregg Allman interview PART 3 of 14 – Saenger Theater New Orleans 1982

Gregg Allman interview PART 4 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 5 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 6 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 7 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 8 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 9 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 10 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 11 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 12 of 14 – Cher – Saenger Theater New Orleans 1982

Gregg Allman interview PART 13 of 14- Saenger Theater New Orleans 1982

Gregg Allman interview PART 14 of 14- Saenger Theater New Orleans 1982

Gregg Allman, Southern Rock Pioneer, Dies at 69

Gregg Allman Tour Bus Crash

REX/SHUTTERSTOCK

MAY 27, 2017 | 12:34PM PT

Gregg Allman, whose hard-jamming, bluesy sextet the Allman Brothers Band was the pioneering unit in the Southern rock explosion of the ‘70s, died Saturday due to currently unknown causes. He was 69.

As recently as April 24, reports surfaced claiming Allman was in hospice. His manager previously denied those reports to Variety, which Allman then substantiated in a Facebook post. However, he had suffered a number of ailments in recent years — including an irregular heartbeat, a respiratory infection, a hernia and a liver transplant — and cancelled many scheduled tour dates in recent months due to undisclosed health reasons.

For his work with the Allman Brothers, the legendary band he cofounded with his late brother Duane, and as a solo artist, Allman is one of the leading lights of Southern Rock. While the group’s greatest work was done before and shortly after Duane’s death in 1971, they stayed together, off and on, over 45 years and remain a singular influence on Southern rock and jam-band musicians. They were a top-drawing touring outfit until October 2014, when the group finally closed the book on their career with a series of dates at their longtime favorite venue, New York’s Beacon Theatre.

Allman’s solo career always played second to that of the band, but he enjoyed solo success with 1973’s “Laid Back” and 1987’s “I’m No Angel,” both of which were certified gold. In 2011 he released an unexpectedly strong album entitled “Low Country Blues” that was produced by T Bone Burnett (Alison Krauss/Robert Plant, Los Lobos, Elvis Costello, “O Brother Where Art Thou?”), who, along with instrumentalists like pianist Dr. John and guitarist Doyle Bramhall II, brought Allman back to his gutsy roots with stellar results.

With his older sibling, guitarist Duane Allman, the singer-keyboardist-guitarist-songwriter led one of the most popular concert attractions of the rock ballroom era; the group’s 1971 set “At Fillmore East,” recorded at Bill Graham’s New York hall, was a commercial breakthrough that showed off the band’s prodigious songcraft and instrumental strengths.

After Duane Allman’s death in a motorcycle accident weeks after the live album’s release, his younger brother led the band through four more stormy decades of playing and recording. The Allman Brothers Band’s latter-day history proved tumultuous, with other fatalities, disbandings, regroupings and very public battles with drugs and alcohol on the part of its surviving namesake.

Though Gregg Allman’s highly publicized addictions, his tabloid-ready marriage to pop vocalist Cher, and his equally public disputes with co-founding guitarist Dickey Betts came under harsh and sometimes mocking scrutiny over the years, Allman prevailed as the linchpin of an act that maintained popularity over four decades and opened the commercial door for such other Southern acts as Lynyrd Skynyrd and the Marshall Tucker Band.

As a member of the Allman Brothers Band, Allman was inducted into the Rock and Roll Hall of Fame in 1995 and was honored with a Grammy Lifetime Achievement Award in 2012.

He was born Gregory LeNoir Allman on Dec. 8, 1947, in Nashville; brother Duane was born 13 months earlier in the same hospital. In 1949, his father was shot to death by a man he offered a ride to in a bar. As their mother was studying accounting to support the family, the brothers were sent to a Tennessee military school at an early age.

The Allmans became attracted to music after seeing a 1960 concert by R&B singer Jackie Wilson in Daytona Beach, FL, where the family had moved the year before. Using money from a paper route (augmented by his mother), Gregg bought a guitar, and taught Duane his first chords. Both played guitar in the bands they founded after returning to the military academy in their teens.

Their pro bands the Escorts and the Allman Joys, which favored R&B, blues and rock covers, found work on the Florida club circuit in the mid-‘60s; Gregg began playing keyboards in the latter unit. The Allman Joys were playing without success in St. Louis when Bill McEuen, manager of the Nitty Gritty Dirt Band, met them and offered to set them up in Los Angeles.

Renamed Hour Glass, the L.A.-based group cut two unsuccessful pop-oriented albums for Liberty Records in 1967-68. Duane chafed at the direction being forced on the combo and fled for Alabama, where he became a prominent session guitarist at FAME Studios in Muscle Shoals, AL. Gregg remained in L.A. to fulfill obligations to Liberty, but was summoned to Jacksonville, FL, in 1969 by his brother, who envisioned a new blues-based band with two guitarist and two drummers, featuring members of another local combo, the 31st of February.

Calling themselves the Allman Brothers Band, the new unit – the Allmans, guitarist Betts, bassist Berry Oakley and drummers Butch Trucks and Jai Johanny “Jaimoe” Johanson – was signed by Otis Redding’s former manager Phil Walden for management and as an act on his Macon, GA-based label Capricorn Records. The group moved to Macon, which became its base for the duration.

Neither of the ABB’s first two albums was an enormous success: Its self-titled bow peaked at No. 188 in 1969, while sophomore set “Idlewild South” topped out at No. 38 in 1970. But they established Gregg Allman as a vocal, instrumental and songwriting power: His compositions included such future staples of the band’s live set as “Not My Cross to Bear,” “Dreams,” “Whipping Post” and “Midnight Rider.”

Though problems with hard drug abuse were already surfacing in the band, the Allmans became a huge concert attraction in the South; the enthusiastic sponsorship of promoter Graham led to high-profile gigs at New York’s Filllmore East (where the band attained a rabid following) and San Francisco’s Fillmore.

The Allmans made their commercial mark with “At Fillmore East”: The expansive, Tom Dowd-produced two-record set, recorded during two nights at the venue, shot to No.13 ultimately sold more than 1 million copies and became one of the defining concert recordings of its day. However, Duane Allman’s tragic death at 24 on a Macon street on Oct. 29, 1971, cast a shadow over its success.

The band completed a follow-up two-LP set, “Eat a Peach,” as a quintet, with live numbers featuring Duane filling out the contents. The 1972 package rose to No. 4 nationally and went platinum, but disaster again struck: In a mishap eerily similar to Duane Allman’s fatal crash, hard-drinking bassist Oakley died after driving his bike into the side of a truck that November.

Shaken by the deaths of his brother and Oakley and increasingly incapacitated by heroin, cocaine and alcohol, Gregg Allman ceded much of the band’s songwriting and front man duties to Betts; as he noted in “My Cross to Bear,” his 2012 memoir, “Up until then, we’d never really had a front man; Dickey took it upon himself to create that role.”

The ABB released its only No. 1 album, “Brothers and Sisters,” in 1973; the record was powered to the top by the Betts-penned No. 2 single “Ramblin’ Man,” the group’s only top-10 45.

Allman retreated from the group to cut his solo debut “Laid Back” in 1973; rising to No. 13, it would be his most popular work away from the band for nearly 40 years, and it spawned his only top-20 solo single, a down-tempo remake of “Midnight Rider.”

On the heels of the lugubrious but popular “Win, Lose or Draw” (No. 5, 1975), the group set out on its biggest, and costliest, tour to date. The ABB flew to its dates on a lavishly appointed private jet previously used by the Rolling Stones and Led Zeppelin; in his book, Allman recalls, “The first time we walked onto the plane, ‘Welcome Allman Brothers’ was spelled out in cocaine on the bar.”

The ABB returned from the 41-date tour with a mere $100,000 in hand, owing to over-the-top spending. This financial catastrophe was compounded by the indictment of the group’s security man (and Allman’s drug bag man) Scooter Herring on cocaine distribution charges; Allman testified against Herring before a grand jury and at his trial, which netted a 75-year prison sentence.

Addicted to heroin and embroiled in inter-band conflict with Betts, Allman began spending more time in Los Angeles with Cher, whom he had wed in June 1975. The incongruous couple was followed avidly by gossip columnists. In the wake of an unsuccessful 1977 solo album, “Playin’ Up a Storm” (No. 42), Allman and Cher released their only duo album, “Two the Hard Way”; embarrassingly credited to “Allman and Woman,” the set failed to chart, and its accompanying tour witnessed scuffles between hostile camps of fans in the audiences. Allman and Cher divorced in 1978.

Membership in the ABB rotated repeatedly for the remainder of the group’s career, which saw ever-diminishing contributions from writer Allman. He authored just one song for the group’s final Capricorn album, “Enlightened Rogues” (No. 27, 1979); the financially unstable imprint crashed within a year of its release. Allman was also a minor contributor to a pair of slick, poorly received albums for Arista Records in 1980-81.

During the band’s protracted hiatus of the ‘80s, Allman issued a pair of solo sets; the more popular of the two, 1987’s “I’m No Angel” (No. 30, 1987), spawned the titular radio hit.

Encouraged by airplay on the burgeoning “classic rock” radio format, the ABB reconvened for a 1989 tour. In 1990, the group recorded “Seven Turns” (No. 53) with “Fillmore East” producer Tom Dowd; the group also began multi-night residencies at New York’s Beacon Theatre, which became an annual tradition. They issued four commercially unrewarding albums – two studio sets and two concert releases – between 1991 and 1995.

Following a drunken appearance at the Rock and Roll Hall of Fame induction ceremony in New York in January 1995, onetime junkie Allman, after 11 stints in rehab, finally stopped drinking on his own, under the 24-hour watch of two nurses.

Following the exit of longtime guitarist Warren Haynes and bassist Allen Woody and the recruitment of Butch Trucks’ young nephew Derek Trucks on guitar, the ABB cut the live “Peakin’ at the Beacon” in 2000. Tension within the band had reached the breaking point, and, following a severely worded fax to Betts from the other members and subsequent legal arbitration, the Allman Brothers Band’s other founding guitarist made his exit.

The front line of Allman, Haynes and Derek Trucks and the group’s founding drummers were heard on the Allman Brothers Band’s studio collection “Hittin’ the Note” (No. 37, 2003) and the live “One Way Out” (No. 190, 2004). After 45 years in business, the band was formally dissolved after an October 2014 show at the Beacon.

Allman’s old habits caught up with him in the ‘00s. Diagnosed with hepatitis C – a disease common to intravenous drug users – in 2007, he learned that he was suffering from liver cancer in 2008. He underwent successful liver transplant surgery at the Mayo Clinic in 2010.

Before his surgery, Allman entered the studio to record his first solo album in 13 years. “Low Country Blues,” a striking and powerful recital of old blues songs, augmented by one Allman-Haynes original and produced by T Bone Burnett (Alison Krauss/Robert Plant, Los Lobos, Elvis Costello, “O Brother Where Art Thou?”), garnered the best reviews of his career, collected a Grammy Award nomination and became his highest-charting solo release, reaching No. 5 in early 2011.

However, health problems and catastrophe continued to dog him. He cut short a 2011 European tour because of respiratory issues, which ultimately mandated lung surgery. He faced a drug relapse spurred by painkillers, and did a stint in rehab. In 2014, a film based on his 2012 memoir, “Midnight Rider,” ceased production after a camera assistant on director Randall Miller’s feature was killed by a freight train on the first day of shooting.

Married and divorced six times, Allman is survived by three sons and two daughters, all by different mothers. Four of the children are professional musicians.

http://variety.com/2017/music/people-news/gregg-allman-dies-dead-69-southern-rock-1202446640/

Gregg Allman

From Wikipedia, the free encyclopedia
Gregg Allman
Gregg Allman (5880514910).jpg

Allman performing in 2011
Born Gregory LeNoir Allman
December 8, 1947
Nashville, Tennessee, U.S.
Died May 27, 2017 (aged 69)
Savannah, Georgia, U.S.
Cause of death Complications from liver cancer
Occupation
  • Singer-songwriter
  • musician
Years active 1960–2017
Spouse(s) Shelley Jefts (m. 1971; div. 1972)
Janice Mulkey (m. 1973; div. 1974)
Cher (m. 1975; div. 1979)
Julie Bindas (m. 1979; div. 1984)
Danielle Galliano (m. 1989; div. 1994)
Stacey Fountain (m. 2001; div. 2008)
Children 5; including Devon and Elijah Blue
Musical career
Genres
Instruments
  • Vocals
  • keyboards
  • guitar
Labels
Associated acts
Website greggallman.com

Gregory LeNoir “Gregg” Allman (December 8, 1947 – May 27, 2017) was an American musician, singer and songwriter.

He is best known for performing in the Allman Brothers Band. He was born and spent much of his childhood in Nashville, Tennessee, before relocating to Daytona Beach, Florida. He and his brother, Duane Allman, developed an interest in music in their teens, and began performing in the Allman Joys in the mid-1960s. In 1967, they relocated to Los Angeles and were renamed the Hour Glass, releasing two albums for Liberty Records. In 1969, he and Duane regrouped to form the Allman Brothers Band, which settled in Macon, Georgia.

The Allman Brothers Band began to reach mainstream success by the early 1970s, with their live album At Fillmore East representing a commercial and artistic breakthrough. Shortly thereafter, Duane was killed in a motorcycle crash in 1971. The following year, the band’s bassist, Berry Oakley was also killed in a motorcycle accident very close to the location of Duane’s wreck. Their 1973 album Brothers and Sisters became their biggest hit, and Allman pursued a solo career afterward, releasing his debut album, Laid Back the same year. Internal turmoil took over the group, leading to a 1975 breakup. Allman was married to pop star Cher for the rest of the decade, while he continued his solo career with the Gregg Allman Band. After a brief Allman Brothers reunion and a decade of little activity, he reached an unexpected peak with the hit single “I’m No Angel” in 1987. After two more solo albums, the Allman Brothers reformed for a third and final time in 1989, and continued performing until 2014. He released his most recent solo album, Low Country Blues, in 2011, and his next, Southern Blood, is set to be released in 2017.

For his work in music, Allman was referred to as a Southern rock pioneer[1] and received numerous awards, including several Grammys; he was inducted into the Rock and Roll Hall of Fame and the Georgia Music Hall of Fame. His distinctive voice placed him in 70th place in the Rolling Stone list of the “100 Greatest Singers of All Time”.[2] Allman released an autobiography, My Cross to Bear, in 2012.

Early life

Allman and his brother Duane attended Castle Heights Military Academy in Lebanon, Tennessee in their childhood.

Allman was born Gregory LeNoir Allman at St. Thomas Hospital on December 8, 1947 in Nashville, Tennessee, to Willis Turner Allman and Geraldine Robbins Allman.[3] The couple had met during World War II in Raleigh, North Carolina, when Allman was on leave from the U.S. Army, and were later married. They moved to Vanleer, Tennessee, in 1945.[citation needed] Their first child, Duane Allman, was born in Nashville in 1946.

In 1949, Willis Allman, having been recently promoted to captain, offered a hitchhiker a ride home and was subsequently shot and killed.[4]Geraldine moved to Nashville with her two sons, and she never remarried.[5] Lacking money to support her children, she enrolled in college to become a Certified Public Accountant (CPA)—state laws at the time, according to her son, required students to live on-campus.[6] As a result, Gregg and his older brother were sent to Castle Heights Military Academy in nearby Lebanon.[3] A young Gregg interpreted these actions as evidence of his mother’s dislike for him, though he later came to understand the reality: “She was actually sacrificing everything she possibly could—she was working around the clock, getting by just by a hair, so as to not send us to an orphanage, which would have been a living hell.”[7]

While his brother adapted to his surroundings with a defiant attitude, Allman felt largely depressed at the school. With little to do, he studied often and developed an interest in medicine—had he not gone into music, he hoped to become a dentist.[8] He was rarely hazed at Castle Heights as his brother protected him, but often suffered beatings from instructors when he received poor grades.[9] The brothers returned to Nashville upon their mother’s graduation. Growing up, he continually fought with Duane, though he knew that he loved him and that it was typical of brothers. Duane was a mischievous older child, who constantly played pranks on his younger sibling.[10] The family moved to Daytona Beach, Florida, in 1959.[6] Gregg tended to look forward to his summer breaks, where he spent time with his uncles in Nashville, who he came to view in a fatherly regard.[11] Allman would later recall two separate events in his life that led to his interest in music. In 1960, the two brothers attended a concert in Nashville with Jackie Wilson headlining alongside Otis Redding, B.B. King, and Patti LaBelle.[8] Allman was also exposed to music through Jimmy Banes, a mentally challenged neighbor of his grandmother in Nashville. Banes introduced Allman to the guitar and the two began spending time on his porch each day as he played music.[12]

Gregg worked as a paperboy to afford a Silvertone guitar, which he purchased at a Sears when he saved up enough funds.[6] He and his brother often fought to play the instrument, though there was “no question that music brought” the two together.[13] In Daytona, they joined a YMCA group called the Y Teens, their first experience performing music with others.[14] He and Duane returned to Castle Heights in their teen years, where they formed a band, the Misfits.[15] Despite this, he still felt “lonesome and out of place,” and quit the academy.[16] He returned to Daytona Beach and pursued music further, and the duo formed another band, the Shufflers, in 1963.[14] He attended high school at Seabreeze High School, where he graduated in 1965.[17]However, he grew undisciplined in his studies as his interests diverged: “Between the women and the music, school wasn’t a priority anymore.”[18]

Music career

Early bands (1960–1968)

“We would rehearse every day in the club, go have lunch, rehearse some more, go home and take a shower, then go to the gig. Sometimes we would rehearse after we got home from the gig too, just get out the acoustics and play. The next day, we’d go have breakfast, go rehearse, and do it all over again. We rehearsed constantly.”

—Allman on his musical evolution[19]

The two Allman brothers began meeting various musicians in the Daytona Beach area. They met a man named Floyd Miles, and they began to jam with his band, the Houserockers. “I would just sit there and study Floyd […] I studied how he phrased his songs, how he got the words out, and how the other guys sang along with him,” he would later recall.[20] They later formed their first “real” band, the Escorts, which performed a mix of top 40 and rhythm and blues music at clubs around town.[21] Duane, who took the lead vocal role on early demos, encouraged his younger brother to sing instead.[22] He and Duane often spent all of their money on records as educational material, as they attempted to learn songs from them. The group performed constantly as music became their entire focus; Allman missed his high school graduation because he was performing that evening.[23] In his autobiography, Allman recalls listening to Nashville R&B station WLAC at night and discovering artists such as Muddy Waters, which later became central to his musical evolution.[19] He narrowly missed being drafted into the Vietnam War by intentionally shooting himself in the foot.[24]

The Escorts evolved into the Allman Joys, the brothers’ first successful band. After a successful summer run locally, they hit the road in fall 1965 for a series of performances throughout the Southeast; their first show outside of Daytona was at the Stork Club in Mobile, Alabama—where they were booked for 22 weeks straight.[25] Afterwards, they were booked at the Sahara Club in nearby Pensacola, Florida, for several weeks.[26] Allman later regarded Pensacola as “a real turning point in my life,” as it was where he learned how to capture audiences and about stage presence.[27] He also received his first Vox keyboard there, and learned how to play it over the ensuing tour.[28] By the following summer, they were able to book time at a studio in Nashville, where they recorded several songs, aided by a plethora of drugs. These recordings were later released as Early Allman in 1973, to Allman’s dismay.[29] He soon grew tired of performing covers and began writing original compositions.[30] They settled in St. Louis for a time, where in the spring of 1967 they began performing alongside Johnny Sandlin and Paul Hornsby, among others, under various names. They considered disbanding, but Bill McEuen, manager of the Nitty Gritty Dirt Band, convinced the band to relocate to Los Angeles, outright giving them the funds to do so.[31]

He arranged a recording contract with Liberty Records in June 1967,[32] and they began to record an album under the new name the Hour Glass, suggested by their producer, Dallas Smith. Recording was a difficult experience; “the music had no life to it—it was poppy, preprogrammed shit,” Allman felt.[33] Though they considered themselves sellouts, they needed money to live.[33] At concerts, they declined to play anything off their debut album, released that October, instead opting to play the blues.[34] Such gigs were sparse, however, as Liberty only allowed one performance per month.[35] After some personnel changes, they recorded their second album, Power of Love, released in March 1968. It contained more original songs by Allman, though they still felt constricted by its process. They embarked on a small tour, and recorded some new demos at FAME Studios in Muscle Shoals, Alabama.[36] Liberty disliked the recordings, and the band broke up when Duane explicitly told off executives. They threatened to freeze the band, so they would be unable to record for any other label for seven years.[37]Allman stayed behind to appease the label, giving them the rights to a solo album. The rest of the band mocked Allman, viewing him as too scared to leave and return to the South.[37]

Meanwhile, Duane Allman had returned to Florida where he met Butch Trucks, a drummer in the band the 31st of February. In October 1968, the 31st of February, aided by Gregg and Duane Allman, recorded several songs.[38] Allman returned to Los Angeles to fulfill his deal with Liberty, writing more original songs on the Hammond organ at the studio.[39] Duane began doing session work at Fame in Muscle Shoals during this time, where he began putting together a new band. He phoned his brother with the proposition of joining the new band—which would have two guitarists and two drummers. With his deal at Liberty fulfilled, he drove to Jacksonville, Florida, in March 1969 to jam with the new band. Allman at first thought two drummers would be a tortuous experience, but found himself pleasantly surprised by the successful jam.[40] He called the birth of the group “one of the finer days in my life […] I was starting to feel like I belonged to something again.”[41]

The Allman Brothers Band and mainstream success

Formation and touring (1969–1971)

The Allman Brothers Band moved to Macon, Georgia,[42] and forged a strong brotherhood, spending countless hours rehearsing, consuming psychedelic drugs, and hanging out in Rose Hill Cemetery, where they would write songs—”I’d be lying if I said I didn’t have my way with a lady or two down there,” said Allman.[43][44] The group remade old blues numbers like “Trouble No More” and “One Way Out“, in addition to improvised jams such as “Mountain Jam“.[45] Gregg, who had struggled to write in the past, became the band’s sole songwriter, composing songs such as “Whipping Post” and “Black-Hearted Woman.”[46] The group’s self-titled debut album was released in November 1969 through Atco and Capricorn Records,[47] but received a poor commercial response, selling less than 35,000 copies upon initial release.[48] The band played continuously in 1970, performing over 300 dates on the road,[49][50] which contributed to a larger following.[51] Oakley’s wife rented a large Victorian home in Macon and the band moved into what they dubbed “the Big House” in March 1970.[52] Their second record, Idlewild South (named after a farmhouse on a lake outside of Macon they rented),[53] was issued by Atco and Capricorn Records in September 1970, less than a year after their debut.[53]

Elder brother Duane Allman, who was killed in a motorcycle crash in 1971

Their fortunes began to change over the course of 1971, where the band’s average earnings doubled.[54] “We realized that the audience was a big part of what we did, which couldn’t be duplicated in a studio. A lightbulb finally went off; we needed to make a live album,” said Allman.[55] At Fillmore East, recorded at the Fillmore East in New York, was released in July 1971 by Capricorn.[56] While previous albums by the band had taken months to hit the charts (often near the bottom of the top 200), the record started to climb the charts after a matter of days.[57] At Fillmore East peaked at number thirteen on Billboard‘s Top Pop Albums chart, and was certified gold by the Recording Industry Association of America that October, becoming their commercial and artistic breakthrough.[57] Although suddenly very wealthy and successful, much of the band and its entourage now struggled with addiction to numerous drugs; they all agreed to quit heroin, but cocaine remained a problem.[58] His last conversation with his brother was an argument over the substance, in which Gregg lied. In his autobiography, Allman wrote: “I have thought of that lie every day of my life […] told him that lie, and he told me that he was sorry and that he loved me.”[59]

Shortly after At Fillmore East was certified gold in domestic sales, Duane was killed in a motorcycle accident in Macon.[60] At his funeral the next day, Gregg performed “Melissa”, which was his brother’s favorite song.[61] After the service, he confided in his bandmates that they should continue. He left for Jamaica to get away from Macon, and was in grief for the following few weeks.[62] “I tried to play and I tried to sing, but I didn’t do too much writing. In the days and weeks that followed, […] I wondered if I’d ever find the passion, the energy, the love of making music,” he remembered.[62] As the band took some time apart to process their loss, At Fillmore East became a major success in the U.S. “What we had been trying to do for all those years finally happened, and he was gone.”[63] Allman later expanded upon his brother’s passing in his autobiography:

“When I got over being angry, I prayed to him to forgive me, and I realized that my brother had a blast. […] Not that I got over it—I still ain’t gotten over it. I don’t know what getting over it means, really. I don’t stand around crying anymore, but I think about him every day of my life. […] Maybe a lot of learning how to grieve was that I had to grow up a little bit and realize that death is part of life. Now I can talk to my brother in the morning, and he answers me at night. I’ve opened myself to his death and accepted it, and I think that’s the grieving process at work.”[64]

Mainstream success and fame (1972–1976)

Allman performing with the Allman Brothers in 1975

After Duane’s death, the band held a meeting on their future; it was clear all wanted to continue, and after a short period, the band returned to the road.[65] They completed their third studio album, Eat a Peach, that winter, which raised each member’s spirits: “The music brought life back to us all, and it was simultaneously realized by every one of us. We found strength, vitality, newness, reason, and belonging as we worked on finishing Eat a Peach“, said Allman.[66] Eat a Peach was released the following February, and it became the band’s second hit album, shipping gold and peaking at number four on Billboard‘s Top 200 Pop Albums chart.[67] “We’d been through hell, but somehow we were rolling bigger than ever,” Allman recalled.[68] Betts had to convince the band members to tour, since all other members were reluctant.[69] The Allman Brothers Band played 90 shows in 1972 in support of the record. “We were playing for him and that was the way to be closest to him,” said Trucks.[69] The band purchased 432 acres of land in Juliette, Georgia for $160,000 and nicknamed it “the Farm”; it soon became a group hangout.[70] Oakley, however, was visibly suffering from the death of his friend,[71] and he too was killed in a motorcycle crash in November 1972.[72] “Upset as I was, I kind of breathed a sigh of relief, because Berry’s pain was finally over,” Allman said.[68]

The band unanimously decided to carry on, and enlisted Lamar Williams on bass and Chuck Leavell on piano. The band began recording Brothers and Sisters, their follow-up album, and Betts became the group’s de facto leader during the recording process.[73] Meanwhile, after some internal disagreements, Allman began recording a solo album, which he titled Laid Back. The sessions for both albums often overlapped and its creation caused tension within the rest of the band.[74] Both albums were released in the autumn of 1973, with Brothers and Sisters cemented the Allman Brothers’ place among the biggest rock bands of the 1970s. “Everything that we’d done before—the touring, the recording—culminated in that one album,” Allman recalled.[75]Ramblin’ Man“, Betts’ country-infused number, received interest from radio stations immediately, and it rose to number two on the Billboard Hot 100.[67] The Allman Brothers Band returned to touring, playing larger venues, receiving more profit and dealing with less friendship, miscommunication and spiraling drug problems.[67][76] This culminated in a backstage brawl when the band played with the Grateful Dead at Washington‘s RFK Stadium in June 1973, which resulted in the firing of three of the band’s longtime roadies.[77] The band played arenas and stadiums almost solely as their drug use escalated. In 1974, the band was regularly making $100,000 per show, and was renting the Starship, a customized Boeing 720B used by Led Zeppelin and the Rolling Stones.[78] “When [we] got that goddamn plane, it was the beginning of the end,” said Allman.[79]

In between tours, Allman embarked on another tour to promote Laid Back. He brought along the musicians who helped record the album as his band, and hired a full string orchestra to accompany the group.[74] A live album of material from the tour was released as The Gregg Allman Tour later that year, to help recoup costs for the tour.[80] It went up against Betts’ first solo record, Highway Call, prompting some to dub their relationship a rivalry. Their relationships became increasingly frustrated, amplified by heavy drug and alcohol abuse.[81] In January 1975, Allman began a relationship with pop star Cher—which made him more “famous for being famous than for his music,” according to biographer Alan Paul.[82] The sessions that produced 1975’s Win, Lose or Draw, the last album by the original Allman Brothers Band, were disjointed and inconsistent. Allman was spending more time in Los Angeles with Cher.[83] Their time off from one another the previous fall “only exaggerated the problems between our personalities. With each day there was more and more space between us; the Brotherhood was fraying, and there wasn’t a damn thing any of us could do to stop it.”[84]

Upon its release, it was considered subpar and sold less than its predecessor; the band later remarked that they were “embarrassed” about the album.[85] From August 1975 to May 1976, the Allman Brothers Band played 41 shows to some of the biggest crowds of their career.[86] Gradually, the members of the band grew apart during these tours, with sound checks and rehearsals “[becoming] a thing of the past.”[86] Allman later pointed to a benefit for presidential candidate Jimmy Carter as the only real “high point” in an otherwise “rough, rough tour.” The shows were considered lackluster and the members were excessive in their drug use.[87][88] The “breaking point” came when Allman testified in the trial of security man Scooter Herring.[67]Bandmates considered him a “snitch,” and he received death threats, leading to law-enforcement protection.[89] Herring was convicted on five counts of conspiracy to distribute cocaine and received a 75-year prison sentence, which were later overturned as he received a lesser sentence.[89] For his part, Allman always maintained that Herring had told him to take the deal and he would take the fall for it, but nevertheless, the band refused to communicate with him.[89] As a result, the band finally broke up; Leavell, Williams, and Jaimoe continued playing together in Sea Level, Betts formed Great Southern, and Allman founded the Gregg Allman Band.[90]

Mid-career and struggles

Marriages, breakups, and music (1977–1981)

Allman married Cher in June 1975, and the two lived in Hollywood during their years together as tabloid favorites.[4] Their marriage produced one son, Elijah Blue Allman, who was born in July 1976.[91] He recorded his second solo album, Playin’ Up a Storm, with the Gregg Allman Band, and it was released in May 1977. He also worked on an collaborative album with Cher titled Two the Hard Way, which, upon its release, was a massive failure.[73] The couple went to Europe to tour in support of both albums,[92] though the crowd reception was mixed.[93] With a combination of Allman Brothers fans and Cher fans, fights often broke out in venues, which led Cher to cancel the tour.[94] Turmoil began to overwhelm their relationship, and the two divorced in 1978.[95] Allman returned to Daytona Beach to stay with his mother, spending the majority of his time partying, chasing women, and touring with the Nighthawks, a blues band.[96]In a 2011 interview with WBUR’s On Point, Allman told host Tom Ashbrook that he was also uncomfortable with his wife’s celebrity lifestyle.

The Allman Brothers Band reunited in 1978, hiring two new members: guitarist Dan Toler and bassist David Goldflies.[90] Betts had approached Allman during his time in Daytona regarding a reunion.[97] Allman remembered that each member had their own reasons for rejoining, though he surmised it was a combination of displeasure with how things ended, missing each other, and a need for money.[98] The band’s reunion album, Enlightened Rogues, was released in February 1979 and was a mild commercial success.[99][100] Betts’ lawyer, Steve Massarsky, began managing the group,[100] and led the band to sign with Arista, who pushed the band to “modernize” their sound.[101] Their first Arista effort, Reach for the Sky (1980), was produced by Nashville songwriters Mike Lawler and Johnny Cobb.[101] Drugs remained a problem with the band, particularly among Betts and Allman.[102] The band again grew apart, replacing Jaimoe with Toler’s brother Frankie.[103] “One of the real blights on the history of the Allman Brothers Band was that Jaimoe, this gentle man, was fired from this organization,” said Allman later.[104]Not long after, “the band changed managers, hiring the promoter John Scher after Massarsky eased himself out, reportedly saying, ‘It’s a million-dollar headache and a quarter-million-dollar job.'”[105]

For their second and final album with Arista, Brothers of the Road, they collaborated with a “name producer” (John Ryan, of Styx and the Doobie Brothers), who pushed the band even harder to change their sound.[106]Straight from the Heart” was the album’s single, which became a minor hit but heralded the group’s last appearance on the top 40 charts.[107] The band, considering their post-reunion albums “embarrassing,” subsequently broke up in 1982 after clashing with Clive Davis, who rejected every producer the band suggested for a possible third album, including Tom Dowd and Johnny Sandlin.[108] “We broke up in ’82 because we decided we better just back out or we would ruin what was left of the band’s image,” said Betts.[108] The band’s final performance came on Saturday Night Live in January 1982, where they performed “Southbound” and “Leavin’.”[109] “It was like a whole different band made those records […] In truth, though, I was just too drunk most of the time to care one way or the other,” Allman would recall.[110]

Downtime, a surprise hit, and another reformation (1982–1990)

“No two ways about it, the ’80s were rough. […] It was seven years of going, “What is it that I do?” Being self-employed your whole life, that becomes a certain rock, a reinforcement. When that’s gone, not only are you bored stiff, but you just want to cry—”What do I do? I know I used to serve a purpose.”[111]

—Allman reflecting on his career in the 1980s

Allman spent much of the 1980s adrift and living in Sarasota, Florida with friends Marcia and Chuck Boyd.[112] His alcohol abuse was at one of its worst points, with Allman consuming “a minimum of a fifth of vodka a day.”[113] He felt the local police pursued him heavily, due to his tendency to get inebriated and “go jam anywhere.”[114] He was arrested and charged with a DUI; as a result, he spent five days in jail and was charged $1,000.[111] While he did not consider himself “washed up,” he noted in his autobiography that “there’s that fear of everybody forgetting about you.”[111] Southern rock faded from popular culture and electronic music formed much of the pop music of the decade. “There was hardly anybody playing live music, and those who did were doing it for not much money, in front of some die-hard old hippies in real small clubs,” he later recalled.[115] Nevertheless, he reformed the Gregg Allman Band and toured nationwide.[116] He often went to Telstar Studios to rehearse and write new songs. At one point, he attempted to reconnect with his children, though, according to him, “it just wasn’t a good situation.”[117]

By 1986, he felt tired of having little funds, and teamed up with former bandmate Betts for several performances together. It led to two Allman Brothers reunion performances that summer. Eventually, tension would arise and they would spend time apart again.[118] After recording several demos in Los Angeles, Allman was offered a recording contract by Epic Records.[119] He recorded his third solo release, I’m No Angel, at Criteria in Miami. Released in 1987, the title track became a surprise hit on radio. Allman released another solo album the following year, Just Before the Bullets Fly, though it did not sell as well as its predecessor. His alcohol abuse continued in the late 1980s, as he moved to Los Angeles and lived at the Riot House.[120] He married Danielle Galliano in a midlife crisis wherein he felt he would one day be too “old and ugly” to get married.[120] The marriage began with Allman overdosing at the Riot House—”so our marriage started off with a bang,” he said.[121] He dabbled in acting for the first time, taking a small part in the film Rush Week (1989),[122] and he sang the opening track to the film Black Rain (1989).[120]

The Allman Brothers Band celebrated its twentieth anniversary in 1989, and the band reunited for a summer tour, with Jaimoe once again on drums.[123] In addition, they featured guitarist Warren Haynes and pianist Johnny Neel, both from the Dickey Betts Band, and bassist Allen Woody, who was hired after open auditions held at Trucks’s Florida studio.[123] The classic rock radio format had given the band’s catalog songs new relevance, as did a multi-CD retrospective box set, Dreams.[124] Epic, who had worked with Allman on his solo career, signed the band. Danny Goldberg became the band’s manager; he had previously worked with acts such as Led Zeppelin and Bonnie Raitt.[125] The group were initially reluctant to tour, but found they performed solidly; in addition, former roadies such as “Red Dog” returned.[126] The band returned to the studio with longtime producer Tom Dowd for 1990’s Seven Turns, which was considered a return to form.[67][127]Good Clean Fun” and “Seven Turns” each became big hits on the Mainstream Rock Tracks chart. The addition of Haynes and Woody had “reenergized” the ensemble.[128] Neel left the group in 1990, and the band added percussionist Marc Quiñones, formerly of Spyro Gyra, the following year.[129]

Reforming the band and breaking addictions (1991–2000)

The band began touring heavily,[130] which helped build a new fan base: “We had to build a fan base all over again, but as word of mouth spread about how good the music was, more and more people took notice. It felt great, man, and that really helped the music,” Allman recalled.[131] Their next studio effort, Shades of Two Worlds (1992), produced the crowd favorite “Nobody Knows”.[132] Allman took his second and final acting role in Rush (1991), a crime drama. Allman greatly enjoyed the experience: “It was a different facet of the entertainment industry, and I wanted to see how those people worked together.”[133] The band grew contentious over a 1993 tour, in which Betts was arrested when he shoved two police officers.[130]Despite the growing tension, Haynes remained a member and Betts returned.[134] Their third post-reunion record, Where It All Begins (1994), was recorded entirely live.[134] The band continued to tour with greater frequency, attracting younger generations with their headlining of the H.O.R.D.E. Festival.[107][135] Allman’s daughter, Island, came to live with him in Los Angeles, and despite early struggles, they eventually grew very close.[136] “Island is the love of my life, she really is,” he would later write.[97]

For much of the 1990s, Allman lived in Marin County, California, spending his free time with close friends and riding his motorcycle.[137] The band was inducted into the Rock and Roll Hall of Fame in January 1995; Allman was severely inebriated and could not make it through his acceptance speech.[138] Seeing the ceremony broadcast on television later, Allman was mortified, providing a catalyst for his final, successful attempt to quit alcohol and substance abuse. He hired two in-home nurses that switched twelve-hour shifts to help him through the process.[139]He was immensely happy to finally quit alcohol, writing later in his autobiography: “Did I get any positive anything out of all that? And you’ve got to admit to yourself, no, I didn’t. You can see what happened and that by the grace of God, you finally quit before it killed you.”[139] Allman recorded a fifth solo album, Searching for Simplicity, which was quietly released on 550 Music.[73]Despite positive developments in his personal life, things began declining among the band members. During their 1996 run at the Beacon, turmoil came to a breaking point between Allman and Betts, nearly causing a cancellation of a show and causing another band breakup.[140] Haynes and Woody left to focus on Gov’t Mule, feeling as though a break was imminent with the Allman Brothers Band.[141][142]

The group recruited Oteil Burbridge of the Aquarium Rescue Unit to replace Woody on bass, and Jack Pearson on guitar.[143] Concerns arose over the increasing loudness of Allman Brothers shows, which were largely centered on Betts.[142] Pearson, struggling with tinnitus, left as a result following the 1999 Beacon run.[144] Trucks phoned his nephew, Derek Trucks, to join the band for their thirtieth anniversary tour.[145] The Beacon run in 2000, captured on Peakin’ at the Beacon, was ironically considered among the band’s worst performances; an eight-show spring tour led to even more strained relations in the group.[146] “It had ceased to be a band—everything had to be based around what Dickey was playing,” said Allman.[147] Anger boiled over within the group towards Betts, which led to all original members sending him a letter, informing him of their intentions to tour without him for the summer.[148] All involved contend that the break was temporary, but Betts responded by hiring a lawyer and suing the group, which led to a permanent divorce.[147] That August, Woody was found dead in a hotel room in New York,[149] which hit Allman particularly hard.[150] In 2001, Haynes rejoined the band for their Beacon run,[149] setting the stage for over a decade of stability within the group.

Later years

Touring and health problems (2000–2014)

Allman during the Allman Brothers Band’s annual residency at the Beacon Theater in New York in 2009

Allman moved to Savannah, Georgia, in 2000, purchasing five acres on the Belfast River.[151] The last incarnation of the Allman Brothers Band was well-regarded among fans and the general public, and remained stable and productive.[67][107] The band released their final studio recording, Hittin’ the Note (2003), to critical acclaim.[107] Allman co-wrote many songs on the record with Haynes, and he regarded it as his favorite album by the group since their earliest days. The band continued to tour throughout the 2000s, remaining a top touring act, regularly attracting more than 20,000 fans.[67]The decade closed with a successful run at the Beacon Theater, in celebration of the band’s fortieth anniversary.[152] “That [2009 run] was the most fun I’ve ever had in that building,” said Allman, and it was universally regarded within the band as a career highlight.[153][154][107] The run featured numerous special guests, including Eric Clapton, whom all in the band regarded as the most “special” guest, due to his association with Duane.[155]

He was diagnosed with hepatitis C in 2007—which he attributed to a dirty tattoo needle.[156] By the next year, they had discovered three tumors within his liver, and he was recommended to the Mayo Clinic in Jacksonville by a Savannah doctor for a liver transplant.[157] He went on a waiting list and after five months, he underwent a successful liver transplant in 2010.[158] He was reluctant to pursue a new solo album after the death of longtime producer Tom Dowd in 2002, but eventually recorded with producer T-Bone Burnett on his seventh release, Low Country Blues.[159] He was initially reluctant to Burnett’s suggestion to not bring his normal band, but he eventually became very positive about the recording, later calling it “a true highlight of my career.”[160] It went unreleased during his health problems, and during that time, it became something of a confidence booster: “When things got real bad, real painful, I would just think about this record and it was kind of a life support system.”[159] Upon its release in January 2011, it represented Allman’s highest ever chart peak in the United States, debuting at number five.[161]

He promoted the album heavily in Europe, until he had to cancel the rest of the trip due to an upper respiratory condition.[162] This infection led to a lung surgery later that year.[151] He went to rehab in 2012 for addiction following his medical treatments.[163] That year, Allman released his memoir, My Cross to Bear, which was thirty years in the making.[164] It eventually got optioned to be turned into a feature film—titled Midnight Rider—that was eventually canceled after a train accident on set caused the death of a member of the crew. In 2014, a tribute concert was held celebrating Allman’s career; it was later released as All My Friends: Celebrating The Songs & Voice Of Gregg Allman.[165] The same year, the Allman Brothers Band performed their final concerts, as Haynes and Derek Trucks desired to depart the group.[166][167]

Recent events (2015–2017)

After the dissolution of the Allman Brothers, Allman kept busy performing music with his band, releasing the live album Gregg Allman Live: Back to Macon, GA in 2015.[168] His health problems remained; he had atrial fibrillation. As a result, he attempted to grow healthier, switching to a gluten-free vegan diet.[165] He attempted to keep a light schedule at the advice of doctors, who warned that too many performances might amplify his conditions. Allman’s mother, Geraldine, died in July 2015 at the age of 98.[168] On April 6, 2016, Allman’s tour bus carrying his crew and horns crashed into a hillside in Jackson County, West Virginia. Allman was not among those injured.[169] One month later, he received an honorary doctorate from Mercer University in Macon, presented by former President Jimmy Carter.[170]

Allman recorded his last album, Southern Blood, with producer Don Was at FAME Studios in Muscle Shoals, Alabama. The album was recorded with his then-current backing band.[171] It is set for a January 2017 release.[172]

Personal life

Allman’s brother Duane died in a motorcycle accident in Macon, Georgia, in October 1971. “Duane was the father of the band,” Gregg Allman later told Guitar Player magazine. “Somehow he had this real magic about him that would lock us all in, and we’d take off.”

While enjoying great commercial success, Allman was in a downward spiral in his personal life. He became a heroin addict and was arrested on drug charges in 1976. To avoid jail, Allman agreed to testify against Scooter Herring, his road manager. Herring was later found guilty on narcotics distribution charges and sentenced to 75 years in prison.[173] Allman’s testimony was seen as a betrayal by his bandmates, who swore that they would never work with him again.

In 2007, Allman was diagnosed with hepatitis C. The condition “was laying dormant for awhile and just kind of crept up on me. I was worn out. I had to sleep 10 or 11 hours a day to two or three [hours],” he explained to Billboard. He had a liver transplant in 2010.[174] In April 2017, he denied reports that he had entered hospice care, but was resting at home on doctor’s orders.[175]

Marriages, relationships and children

Allman’s partners included Shelley Kay Winters, Janice Blair, Cher, Julie Bindas, Ganielle J P Galiana and Stacey Fountain. In 2012 he announced an engagement on the Piers Morgan show to Shannon Williams.[176]

Allman had five children – son Devon Allman, 44, lead singer of Honeytribe, from his marriage to Shelley Kay Winters, Elijah Blue Allman, 40, lead singer of Deadsy, from his marriage to Cher, Delilah Island Allman, 35, from his marriage to Julie Bindas, Michael Sean Allman, 50, from a relationship with former waitress Mary Lynn Green, and Layla Brooklyn Allman, 23, from a relationship with radio journalist Shelby Blackburn.[176]

Death

Following a series of health problems,[177] Allman died at his home in Savannah, Georgia, on May 27, 2017 due to complications of liver cancer. He was 69.[178][179][180][181]

Discography

Studio
Live

See also

References

Read Full Post | Make a Comment ( None so far )

Boehner on Trump — A Complete Disaster — Takes One To Know One — A Real Big Spender — Boehner The Cry Baby — Two Party Tyranny Continues — Videos

Posted on May 26, 2017. Filed under: American History, Articles, Blogroll, College, Communications, Congress, Culture, Economics, Education, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, government, government spending, history, Law, liberty, Life, media, People, Philosophy, Photos, Political Correctness, Rants, Raves, Raymond Thomas Pronk, Reviews, Security, Strategy, Tax Policy, Video, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , |

Image result for cartoons boehner and conservativesImage result for john boehner with drink and cigaretteImage result for john boehner with drink and cigarette

Image result for john boehner with drink and cigarette

Image result for john boehner with drink and cigarette

Image result for john boehner with drink and cigaretteImage result for John Boehner Crying

Big Spender

Janis Joplin – Cry Baby

John Boehner: DESTROYS Trump Complete Desaster

What did John Boehner’s Wife Try to take into Trump’s Inauguration?

John Boehner tried to keep Donald Trump from shutting down the government report

John Boehner on Trump’s Election“Hallelujah.” “Thank God I’m Not in the Middle of this”

John Boehner backs Donald Trump

Boehner: SCOTUS is why I’m voting for Trump

House Speaker John Boehner resigns

John Boehner: Donald Trump Is ‘Barely A Republican’ | Andrea Mitchell | MSNBC

Conservatives rejoice after Boehner resigns as speaker

Obama: John Boehner is a good man

Rush Limbaugh: “Did you know that Paul Ryan interned for John Boehner?”

Ted Cruz on John Boehner: “I’m Going to Tell You Why He Resigned’

John Boehner Resigns And Republicans Couldn’t Be Happier

Dickerson on one-on-one interview with House Speaker Boehner

Mark Levin slams John Boehner on the Sean Hannity TV Show 1 – 7 – 2015

Rush Limbaugh tells the truth about GOP, December 2014

John Boehner unloads on Trump: A ‘complete disaster’

By Mike DeBonis May 26 at 12:42 PM

Former House speaker John A. Boehner continued a streak of remarkable post-office candor during a Wednesday appearance at a Houston energy conference, telling a luncheon audience that President Trump’s term has — foreign policy aside — been a “complete disaster.”

“Everything else he’s done has been a complete disaster,” Boehner (R-Ohio) said, according to a report in Rigzone, an online energy publication. “He’s still learning how to be president.”

Boehner, who resigned from Congress in October 2015, had praised Trump — a friend and golfing companion from his political years — during the presidential campaign. On Wednesday, he praised Trump’s efforts at getting serious about combating the Islamic State terror group, Rigzone reported, but ended his positive comments there.

Among other remarks, Boehner said Trump should not be allowed to tweet, the publication said.

Dave Schnittger, an aide to Boehner, said Friday the remarks made at the KPMG Global Energy Conference were “reported accurately” by Rigzone.

Boehner has made other public comments critical of his party since leaving office. During the presidential campaign in April 2016, he called then-GOP candidate Ted Cruz “Lucifer in the flesh.” And in February, he made a prescient prediction that a GOP replacement for the Affordable Care Act was “not going to happen” and that “Republicans never, ever agree on health care” — a view he maintained on Wednesday, according to the Rigzone report.

Boehner offered other blunt opinions Wednesday, Rigzone reported. He gave an increasingly pessimistic view that congressional Republicans would pass tax reform, saying “now my odds are 60/40” and that tax reform is “a bunch of happy talk.” And he echoed an emerging piece of D.C. conventional wisdom by calling the border adjustment tax plan favored by Paul D. Ryan (R-Wis.), Boehner’s successor as House speaker, “deader than a doornail.”

And on the various pending investigations into alleged Russian influence on the election and on Trump’s campaign, Boehner said, “they need to get to the bottom of this” but called impeachment a folly pushed by “crazy left-wing Democratic colleagues of mine.”

“Talk of impeachment is the best way to rile up Trump supporters,” he said, according to Rigzone. “Remember, impeachment is not a legal process; it’s a political process.”

Boehner, as he has said in the past, repeated Wednesday that he does not miss his old job: “I wake up every day, drink my morning coffee and say, ‘Hallelujah, hallelujah, hallelujah,’” he said, according to Rigzone.

https://www.washingtonpost.com/news/powerpost/wp/2017/05/26/john-boehner-unloads-on-trump-a-complete-disaster/?utm_term=.970e0d1d935c

Read Full Post | Make a Comment ( None so far )

President Trump Arrives In Saudi Arabia — Videos

Posted on May 20, 2017. Filed under: American History, Articles, Blogroll, Central Intelligence Agency (CIA), Communications, Education, Federal Bureau of Investigation (FBI), Freedom, Friends, government spending, history, Islam, Islam, Language, Law, liberty, Life, Links, Literacy, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Newspapers, People, Philosophy, Photos, Police, Radio, Raves, Raymond Thomas Pronk, Religion, Religious, Religious, Security, Speech, Spying, Strategy, Success, Sunni, Talk Radio, Television, Terrorism, Video, Wahhabism, War, Wealth, Weapons, Weather, Welfare, Wisdom, Writing | Tags: , , , , , , |

Image result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabia

President Trump Lands in Saudi Arabia And Meets King Salman (FULL)

TRUMP ARRIVES TO ROYALTY IN SAUDI ARABIA

Trump arrives in Riyadh, Saudi Arabia, for his first foreign trip as president

President Donald Trump Welcome Ceremony in Saudi Arabia at Al Yamamh Palace #2

President Trump Welcome Reception Ceremony in Saudi Arabia with King Salman

President Trump and Melania in Saudi Arabia Meet King Salman

President Trump & King Salman Dancing During Ceremony in Saudi Arabia (FULL)

President Trump Welcome Reception Ceremony in Saudi Arabia with King Salman

President Trump and Cabinet At meeting in Saudi Arabia

What a difference an election can make for the respect American leaders have for our country.

There were two very different outcomes when two American presidents greeted the king of Saudi Arabia.

All eyes were on President Trump today as he arrived in the country for his first foreign trip.

Video shows the president stepping off the plane and greeting King Salman:

Trump stood up straight as Salman appeared to bow slightly.

Trump’s posture stands in stark difference to President Obama’s in the early days of his presidency.

Cameras captured Obama bowing to King Abdullah, contorting nearly to a 90-degree angle in what many called a moment of American weakness:

Trump’s behavior was refreshingly noticeable, as several Twitter users contrasted the two reactions.

View image on Twitter

LOOK CAREFULLY at these two photos. The one on the RIGHT is a lesson in American exceptionalism: @FLOTUS no hijab, @POTUS no kowtow. 🇺🇸❤️-VJ

“Look carefully at these two photos,” recording artist Vinnie James wrote. “The one on the RIGHT is a lesson in American exceptionalism: @FLOTUS no hijab, @POTUS no kowtow.”

http://www.theamericanmirror.com/great-unlike-obama-trump-doesnt-bow-saudi-king/

Read Full Post | Make a Comment ( None so far )

Dr. Barry Sears — The Anti-Inflammation Zone — Inflammation Will Kill You — Videos

Posted on May 20, 2017. Filed under: Biology, Blogroll, Books, Chemistry, Communications, Diet, Documentary, Exercise, Family, Health, Health Care, media, Medical, Medicine, Non-Fiction, People, Philosophy, Photos, Raves, Science, Sleep, Stress Reduction, Video, Welfare, Wisdom, Work, Writing | Tags: , , , |

Image result for books diet anti-inflamatory zone

Image result for dr. barry sears

Image result for dr. barry sears anti-infammation zone

Image result for dr. barry sears anti-infammation zone

Image result for dr. barry sears anti-infammation zone

Image result for dr. barry sears

Image result for dr. barry sears anti-infammation zone

Dr. Barry Sears – Silent Inflammation

A Day in the Anti-Inflammation Zone

The Zone Diet and Inflammation

Dr. Barry Sears – The Zone Diet and Weight Loss

Dr. Barry Sears – Getting Started on the Zone Diet

Dr. Barry Sears – The Wellness Pyramid

Dr. Barry Sears – Fish Oil

Dr. Barry Sears – What is the Zone?

2016 Fat Summit, featuring Dr. Barry Sears with Dr. Mark Hyman

The Truth about Fat Loss Summit, with Dr. Sears & Jonny Bowden

How many calories do I need?

Is Detoxing OK?

Is coffee healthy?

Benefits of Vinegar

The debate over cholesterol levels

Taking Aspirin with Fish Oil

Omega-3’s and Athletes: Zone Diet by the Numbers

How high dose fish oil works

Different types of fish oil

Difference between Fish oil and Krill oil

ADD and Omega RX Fish Oil

When is the Best Time to Take Fish Oil?

Fats and the Brain

Polyphenols and how they work

Potassium levels in the Zone diet

The Benefits of Niacin

Sleep deprivation and Alzheimers disease

Is the Japanese diet better than the Paleo diet?

Okinawan Longevity and Health

Is Diet Soda Bad For You?

When is the best time of the day to exercise?

Palm oil and Coconut oil

Olive Oil vs Butter on Bread

What makes good Olive Oil?

How do Polyphenols react with the blood?

Why do diet drinks make people fat?

How much fish oil should I take? Benefits of fish oil

Reversing arterial plaque

What else should I be taking?

Dose Deception: Why Taking 1 or 2 Omega-3 Capsules Is Not Enough to Produce Results

How Much Fish Oil Per Day To Be Given For Good Health

Food and Hormonal Response: Treating Food As a Drug

How To Eat In The Zone: Following The Zone Diet

Athletes In The Zone: “Does It Work?”

Amazing Stories: Zone Diet and Health

What Should Athletes Eat During Training?

How Should an Athlete Eat?

How Should Athletes Re-Fuel During Competition?

Is A High Carbohydrate Diet Good for Athletes?

Omega-3’s and Athletes: Zone Diet by the Numbers

Do Increased Insulin Level Decrease Athletic Performance?

Read Full Post | Make a Comment ( None so far )

Huge Hacker Holdup — Cyber extortion Attack — NSA Ransom War — Running Sacred — Crying — It’s Over — Videos

Posted on May 13, 2017. Filed under: American History, Blogroll, Communications, Computers, Corruption, Crime, Data, Data Storage, Defense Intelligence Agency (DIA), Documentary, Education, European History, Federal Bureau of Investigation (FBI), Federal Government, government spending, history, Law, liberty, Life, Links, media, Money, National Security Agency (NSA), National Security Agency (NSA_, Newspapers, People, Philosophy, Photos, Police, Radio, Rants, Raves, Raymond Thomas Pronk, Security, Television, Video, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , , , , , |

Image result for ransome ware attackImage result for bitcoinImage result for ransome ware attack list of countries and companies

Image result for ransome ware attack list of countries and companies

Image result for ransome ware attack list of countries and companies

Image result for ransome ware attack list of countries and companies

Image result for ransome ware attack list of countries and companies

Image result for cartoons ransom ware attack

Image result for cartoons ransom ware attack

Image result for cartoons ransom ware attack

Image result for 12 May 2017 ransome ware attack list of countries and companies

Cyber Attack: Ransomware causing chaos globally – BBC News

Ransomware virus ‘WannaCry’ plagues 100k computers across 99 countries

Ransomware attack takes down LA hospital for hours

WannaCry Ransomware Hits Hospitals

WannaCry Ransomware Used In Global Attacks!

WATCH: Ransomware cyberattack targets Windows users around the world

BREAKING***100 Countries Massive Global Ransomware Attack Used NSA Hacking Tool

What is ransomware and how can I protect myself?

How Ransomware Locks Your PC & Holds Your Data Hostage

Massive Ransomware Outbreak Thanks to NSA – WannaCry Worm Spreading Fast

Ransomware As Fast As Possible

The Truth About Ransomware – Webinar

What is Ransomware, How it Works and What You Can Do to Stay Protected

NSA Whistleblower Bill Binney on Tucker Carlson 03.24.2017

NSA Whistleblower William Binney: The Future of FREEDOM

ROY ORBISON – CRYING – LIVE 1988

Roy Orbison – “Running Scared” from Black and White Night

Roy Orbison – Crying (Monument Concert 1965)

Roy Orbison – It’s Over (Monument Concert 1965)

Roy Orbison – “It’s Over” from Black and White Night

Dozens of countries hit by huge cyberextortion attack

NEW YORK (AP) — Dozens of countries were hit with a huge cyberextortion attack Friday that locked up computers and held users’ files for ransom at a multitude of hospitals, companies and government agencies.

It was believed to the biggest attack of its kind ever recorded.

The malicious software behind the onslaught appeared to exploit a vulnerability in Microsoft Windows that was supposedly identified by the National Security Agency for its own intelligence-gathering purposes and was later leaked to the internet.

Britain’s national health service fell victim, its hospitals forced to close wards and emergency rooms and turn away patients. Russia appeared to be the hardest hit, according to security experts, with the country’s Interior Ministry confirming it was struck.

All told, several cybersecurity firms said they had identified the malicious software, which so far has been responsible for tens of thousands of attacks, in more than 60 countries. That includes the United States, although its effects there didn’t appear to be widespread, at least initially.

The attack infected computers with what is known as “ransomware” — software that locks up the user’s data and flashes a message demanding payment to release it. In the U.S., FedEx reported that its Windows computers were “experiencing interference” from malware, but wouldn’t say if it had been hit by ransomware.

Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, called the attack “the biggest ransomware outbreak in history.”

Security experts said the attack appeared to be caused by a self-replicating piece of software that enters companies and organizations when employees click on email attachments, then spreads quickly internally from computer to computer when employees share documents and other files.

Its ransom demands start at $300 and increase after two hours to $400, $500 and then $600, said Kurt Baumgartner, a security researcher at Kaspersky Lab. Affected users can restore their files from backups, if they have them, or pay the ransom; otherwise they risk losing their data entirely.

Chris Wysopal of the software security firm Veracode said criminal organizations were probably behind the attack, given how quickly the malware spread.

“For so many organizations in the same day to be hit, this is unprecedented,” he said.

The security holes it exploits were disclosed several weeks ago by TheShadowBrokers, a mysterious group that has published what it says are hacking tools used by the NSA as part of its intelligence-gathering.

Shortly after that disclosure, Microsoft announced that it had already issued software “patches” for those holes. But many companies and individuals haven’t installed the fixes yet or are using older versions of Windows that Microsoft no longer supports and didn’t fix.

By Kaspersky Lab’s count, the malware struck at least 74 countries. In addition to Russia, the biggest targets appeared to be Ukraine and India, nations where it is common to find older, unpatched versions of Windows in use, according to the security firm.

Hospitals across Britain found themselves without access to their computers or phone systems. Many canceled all routine procedures and asked patients not to come to the hospital unless it was an emergency. Doctors’ practices and pharmacies reported similar problems.

Patrick Ward, a 47-year-old sales director, said his heart operation, scheduled for Friday, was canceled at St. Bartholomew’s Hospital in London.

Tom Griffiths, who was at the hospital for chemotherapy, said several cancer patients had to be sent home because their records or bloodwork couldn’t be accessed.

“Both staff and patients were frankly pretty appalled that somebody, whoever they are, for commercial gain or otherwise, would attack a health care organization,” he said. “It’s stressful enough for someone going through recovery or treatment for cancer.”

British Prime Minister Theresa May said there was no evidence patient data had been compromised and added that the attack had not specifically targeted the National Health Service.

“It’s an international attack and a number of countries and organizations have been affected,” she said.

Spain, meanwhile, took steps to protect critical infrastructure in response to the attack. Authorities said they were communicating with more than 100 energy, transportation, telecommunications and financial services providers about the attack.

Spain’s Telefonica, a global broadband and telecommunications company, was among the companies hit.

Ransomware attacks are on the rise around the world. In 2016, Hollywood Presbyterian Medical Center in California said it had paid a $17,000 ransom to regain control of its computers from hackers.

Krishna Chinthapalli, a doctor at Britain’s National Hospital for Neurology & Neurosurgery who wrote a paper on cybersecurity for the British Medical Journal, warned that British hospitals’ old operating systems and confidential patient information made them an ideal target for blackmailers.

He said many NHS hospitals in Britain use Windows XP software, introduced in 2001, and as government funding for the health service has been squeezed, “IT budgets are often one of the first ones to be reduced.”

“Looking at the trends, it was going to happen,” he said. “I did not expect an attack on this scale. That was a shock.

https://apnews.com/e8402f2faf934f7ab5419d4961d3dafe/Global-extortion-cyberattack-hits-dozens-of-nations

Global ‘WannaCry’ ransomware cyberattack seeks cash for data

LONDON (AP) — A global “ransomware” cyberattack, unprecedented in scale, had technicians scrambling to restore Britain’s crippled hospital network Saturday and secure the computers that run factories, banks, government agencies and transport systems in many other nations.

The worldwide effort to extort cash from computer users spread so widely that Microsoft quickly changed its policy, making security fixes available for free for the older Windows systems still used by millions of individuals and smaller businesses.

A malware tracking map showed “WannaCry” infections popping up around the world. Britain canceled or delayed treatments for thousands of patients, even people with cancer. Train systems were hit in Germany and Russia, and phone companies in Madrid and Moscow. Renault’s futuristic assembly line in Slovenia, where rows of robots weld car bodies together, was stopped cold.

In Brazil, the social security system had to disconnect its computers and cancel public access. The state-owned oil company Petrobras and Brazil’s Foreign Ministry also disconnected computers as a precautionary measure, and court systems went down, too.

Britain’s home secretary said one in five of 248 National Health Service groups had been hit. Home Secretary Amber Rudd said all but six of the NHS trusts back to normal Saturday.

The U.K.’s National Cyber Security Center was “working round the clock” to restore vital health services, while urging people to update security software fixes, run anti-virus software and back up their data elsewhere.

Who perpetrated this wave of attacks remains unknown. Two security firms — Kaspersky Lab and Avast — said they identified the malicious software in more than 70 countries. Both said Russia was hit hardest.

These hackers “have caused enormous amounts of disruption— probably the biggest ransomware cyberattack in history,” said Graham Cluley, a veteran of the anti-virus industry in Oxford, England.

And all this may be just a taste of what’s coming, another cyber security expert warned.

Computer users worldwide — and everyone else who depends on them — should assume that the next big “ransomware” attack has already been launched, and just hasn’t manifested itself yet, Ori Eisen, who founded the Trusona cybersecurity firm in Scottsdale, Arizona, told The Associated Press.

The attack held hospitals and other entities hostage by freezing computers, encrypting data and demanding money through online bitcoin payments. But it appears to be “low-level” stuff, Eisen said Saturday, given the amount of ransom demanded — $300 at first, rising to $600 before it destroys files hours later.

He said the same thing could be done to crucial infrastructure, like nuclear power plants, dams or railway systems.

“This is child’s play, what happened. This is not the serious stuff yet. What if the same thing happened to 10 nuclear power plants, and they would shut down all the electricity to the grid? What if the same exact thing happened to a water dam or to a bridge?” he asked.

“Today, it happened to 10,000 computers,” Eisen said. “There’s no barrier to do it tomorrow to 100 million computers.”

This is already believed to be the biggest online extortion attack ever recorded, disrupting services in nations as diverse as the U.S., Ukraine, Brazil, Spain and India. Europol, the European Union’s police agency, said the onslaught was at “an unprecedented level and will require a complex international investigation to identify the culprits.”

In Russia, government agencies insisted that all attacks had been resolved. Russian Interior Ministry, which runs the national police, said the problem had been “localized” with no information compromised. Russia’s health ministry said its attacks were “effectively repelled.”

The ransomware exploits a vulnerability in Microsoft Windows that was purportedly identified by the U.S. National Security Agency for its own intelligence-gathering purposes. Hackers said they stole the tools from the NSA and dumped them on the internet.

It could have been much worse if not for a young cybersecurity researcher who helped to halt its spread by accidentally activating a so-called “kill switch” in the malicious software.

The 22-year-old Britain-based researcher, identified online only as MalwareTech, explained Saturday that he spotted a hidden web address in the “WannaCrypt” code and made it official by registering its domain name. That inexpensive move redirected the attacks to MalwareTech’s server, which operates as a “sinkhole” to keep malware from escaping.

“Because WannaCrypt used a single hardcoded domain, my registration of it caused all infections globally to believe they were inside a sandbox … thus we initially unintentionally prevented the spread,” the researcher said, humbly and anonymously, in his blog post.

His move may have saved governments and companies millions of dollars and slowed the outbreak before U.S.-based computers were more widely infected.

Indeed, while FedEx Corp. reported that its Windows computers were “experiencing interference” from malware — it wouldn’t say if it had been hit by the ransomware — other impacts in the U.S. were not readily apparent on Saturday.

That said, the threat hasn’t disappeared, the MalwareTech researcher said.

“One thing that is very important to note is our sinkholing only stops this sample and there is nothing stopping them removing the domain check and trying again, so it’s incredibly important that any unpatched systems are patched as quickly as possible,” he warned.

The kill switch also couldn’t help those already infected. Short of paying, options for these individuals and companies are usually limited to recovering data files from a backup, if available, or living without them.

Security experts said it appeared to be caused by a self-replicating piece of software that enters companies when employees click on email attachments, then spreads quickly as employees share documents.

The security holes it exploits were disclosed weeks ago by TheShadowBrokers, a mysterious hacking group. Microsoft swiftly released software “patches” to fix those holes, but many users still haven’t installed updates or still use older versions of Windows.

Microsoft had made fixes for older systems, such as 2001′s Windows XP, available only to mostly larger organizations, including Britain’s National Health Service, that paid extra for extended technical support. In light of Friday’s attacks, Microsoft announced that it’s making the fixes free to all.

Cluley said “There’s clearly some culpability on the part of the U.S. intelligence services. Because they could have done something ages ago to get this problem fixed, and they didn’t do it.”

“It’s very, very difficult these days, with encryption, to spy on people,” Cluley added. “But I don’t think that those concerns should hide the fact that ALL of us need to be protected … We’re living an online life, and we all deserve security there.”

https://apnews.com/770946e7df454d2e9acda3bdbd3ed425/Unprecedented-global-‘ransomware’-attack-seeks-cash-for-data

Ransomware

From Wikipedia, the free encyclopedia

Ransomware is a type of malicious software designed to block access to a computer system or data until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them.[1] The ransomware may also encrypt the computer’s Master File Table (MFT)[2][3] or the entire hard drive.[4] Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files[5] since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.

While initially popular in Russia, the use of ransomware scams has grown internationally;[6][7][8] in June 2013, security software vendor McAfee released data showing that it had collected over 250,000 unique samples of ransomware in the first quarter of 2013, more than double the number it had obtained in the first quarter of 2012.[9] Wide-ranging attacks involving encryption-based ransomware began to increase through Trojans such as CryptoLocker, which had procured an estimated US$3 million before it was taken down by authorities,[10] and CryptoWall, which was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over $18m by June 2015.[11]

Operation

Typically, modern ransomware uses encryption to deny users’ access to their files. The software encrypts the victim’s files using a symmetric cipher with a randomly generated key, and then deletes the key, leaving only a version of it made inaccessible to the victim using public key cryptography. Only the attacker can then decrypt the symmetric key needed to restore the files.[12]

The symmetric key is randomly generated and will not assist other victims. At no point is the attacker’s private key exposed to victims and the victim need only send a very small ciphertext (the encrypted symmetric-cipher key) to the attacker.

Ransomware attacks are typically carried out using a Trojan, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program then runs a payload, which locks the system in some fashion, or claims to lock the system but does not (e.g., a scareware program). Payloads may display a fake warning purportedly by an entity such as a law enforcement agency, falsely claiming that the system has been used for illegal activities, contains content such as pornography and “pirated” media.[13][14][15]

Some payloads consist simply of an application designed to lock or restrict the system until payment is made, typically by setting the Windows Shell to itself,[16] or even modifying the master boot record and/or partition table to prevent the operating system from booting until it is repaired.[17] The most sophisticated payloads encrypt files, with many using strong encryption to encrypt the victim’s files in such a way that only the malware author has the needed decryption key.[12][18][19]

Payment is virtually always the goal, and the victim is coerced into paying for the ransomware to be removed—which may or may not actually occur—either by supplying a program that can decrypt the files, or by sending an unlock code that undoes the payload’s changes. A key element in making ransomware work for the attacker is a convenient payment system that is hard to trace. A range of such payment methods have been used, including wire transfers, premium-rate text messages,[20] pre-paid voucher services such as Paysafecard,[6][21][22] and the digital currency Bitcoin.[23][24][25] A 2016 census commissioned by Citrix revealed that larger business are holding bitcoin as contingency plans.[26]

History

Encrypting ransomware

The first known malware extortion attack, the “AIDS Trojan” written by Joseph Popp in 1989, had a design failure so severe it was not necessary to pay the extortionist at all. Its payload hid the files on the hard drive and encrypted only their names, and displayed a message claiming that the user’s license to use a certain piece of software had expired. The user was asked to pay US$189 to “PC Cyborg Corporation” in order to obtain a repair tool even though the decryption key could be extracted from the code of the Trojan. The Trojan was also known as “PC Cyborg”. Popp was declared mentally unfit to stand trial for his actions, but he promised to donate the profits from the malware to fund AIDS research.[27]

The notion of using public key cryptography for ransom attacks was introduced in 1996 by Adam L. Young and Moti Yung. Young and Yung critiqued the failed AIDS Information Trojan that relied on symmetric cryptography alone, the fatal flaw being that the decryption key could be extracted from the Trojan, and implemented an experimental proof-of-concept cryptovirus on a Macintosh SE/30 that used RSA and the Tiny Encryption Algorithm (TEA) to hybrid encrypt the victim’s data. Since public key crypto is used, the cryptovirus only contains the encryption key. The attacker keeps the corresponding private decryption key private. Young and Yung’s original experimental cryptovirus had the victim send the asymmetric ciphertext to the attacker who deciphers it and returns the symmetric decryption key it contains to the victim for a fee. Long before electronic money existed Young and Yung proposed that electronic money could be extorted through encryption as well, stating that “the virus writer can effectively hold all of the money ransom until half of it is given to him. Even if the e-money was previously encrypted by the user, it is of no use to the user if it gets encrypted by a cryptovirus”.[12] They referred to these attacks as being “cryptoviral extortion”, an overt attack that is part of a larger class of attacks in a field called cryptovirology, which encompasses both overt and covert attacks.[12]

Examples of extortionate ransomware became prominent in May 2005.[28] By mid-2006, Trojans such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive began utilizing more sophisticated RSA encryption schemes, with ever-increasing key-sizes. Gpcode.AG, which was detected in June 2006, was encrypted with a 660-bit RSA public key.[29] In June 2008, a variant known as Gpcode.AK was detected. Using a 1024-bit RSA key, it was believed large enough to be computationally infeasible to break without a concerted distributed effort.[30][31][32][33]

Encrypting ransomware returned to prominence in late 2013 with the propagation of CryptoLocker—using the Bitcoin digital currency platform to collect ransom money. In December 2013, ZDNet estimated based on Bitcoin transaction information that between 15 October and 18 December, the operators of CryptoLocker had procured about US$27 million from infected users.[34] The CryptoLocker technique was widely copied in the months following, including CryptoLocker 2.0 (though not to be related to CryptoLocker), CryptoDefense (which initially contained a major design flaw that stored the private key on the infected system in a user-retrievable location, due to its use of Windows’ built-in encryption APIs),[24][35][36][37] and the August 2014 discovery of a Trojan specifically targeting network-attached storage devices produced by Synology.[38] In January 2015, it was reported that ransomware-styled attacks have occurred against individual websites via hacking, and through ransomware designed to target Linux-based web servers.[39][40][41]

Some ransomware strains have used proxies tied to Tor hidden services to connect to their command and control servers, increasing the difficulty of tracing the exact location of the criminals.[42][43] Furthermore, dark web vendors have increasingly started to offer the technology as a service.[43][44][45]

Symantec has classified ransomware to be the most dangerous cyber threat.[46]

Non-encrypting ransomware

In August 2010, Russian authorities arrested nine individuals connected to a ransomware Trojan known as WinLock. Unlike the previous Gpcode Trojan, WinLock did not use encryption. Instead, WinLock trivially restricted access to the system by displaying pornographic images, and asked users to send a premium-rate SMS (costing around US$10) to receive a code that could be used to unlock their machines. The scam hit numerous users across Russia and neighboring countries—reportedly earning the group over US$16 million.[15][47]

In 2011, a ransomware Trojan surfaced that imitated the Windows Product Activation notice, and informed users that a system’s Windows installation had to be re-activated due to “[being a] victim of fraud”. An online activation option was offered (like the actual Windows activation process), but was unavailable, requiring the user to call one of six international numbers to input a 6-digit code. While the malware claimed that this call would be free, it was routed through a rogue operator in a country with high international phone rates, who placed the call on hold, causing the user to incur large international long distance charges.[13]

In February 2013, a ransomware Trojan based on the Stamp.EK exploit kit surfaced; the malware was distributed via sites hosted on the project hosting services SourceForge and GitHub that claimed to offer “fake nude pics” of celebrities.[48] In July 2013, an OS X-specific ransomware Trojan surfaced, which displays a web page that accuses the user of downloading pornography. Unlike its Windows-based counterparts, it does not block the entire computer, but simply exploits the behavior of the web browser itself to frustrate attempts to close the page through normal means.[49]

In July 2013, a 21-year-old man from Virginia, whose computer coincidentally did contain pornographic photographs of underaged girls with whom he had conducted sexualized communications, turned himself in to police after receiving and being deceived by ransomware purporting to be an FBI message accusing him of possessing child pornography. An investigation discovered the incriminating files, and the man was charged with child sexual abuse and possession of child pornography.[50]

Leakware (also called Doxware)

The converse of ransomware is a cryptovirology attack that threatens to publish stolen information from the victim’s computer system rather than deny the victim access to it.[51] In a leakware attack, malware exfiltrates sensitive host data either to the attacker or alternatively, to remote instances of the malware, and the attacker threatens to publish the victim’s data unless a ransom is paid. The attack was presented at West Point in 2003 and was summarized in the book Malicious Cryptography as follows, “The attack differs from the extortion attack in the following way. In the extortion attack, the victim is denied access to its own valuable information and has to pay to get it back, where in the attack that is presented here the victim retains access to the information but its disclosure is at the discretion of the computer virus”.[52] The attack is rooted in game theory and was originally dubbed “non-zero sum games and survivable malware”. The attack can yield monetary gain in cases where the malware acquires access to information that may damage the victim user or organization, e.g., reputational damage that could result from publishing proof that the attack itself was a success.

Mobile ransomware

With the increased popularity of ransomware on PC platforms, ransomware targeting mobile operating systems have also proliferated. Typically, mobile ransomware payloads are blockers, as there is little incentive to encrypt data since it can be easily restored via online synchronization.[53] Mobile ransomware typically targets the Android platform, as it allows applications to be installed from third-party sources.[53][54] The payload is typically distributed as an APK file installed by an unsuspecting user; it may attempt to display a blocking message over top of all other applications,[54] while another used a form of clickjacking to cause the user to give it “device administrator” privileges to achieve deeper access to the system.[55]

Different tactics have been used on iOS devices, such as exploiting iCloud accounts and using the Find My iPhone system to lock access to the device.[56] On iOS 10.3, Apple patched a bug in the handling of JavaScript pop-up windows in Safari that had been exploited by ransomware websites.[57]

Notable examples

Reveton

A Reveton payload, fraudulently claiming that the user must pay a fine to the Metropolitan Police Service

In 2012, a major ransomware Trojan known as Reveton began to spread. Based on the Citadel Trojan (which itself, is based on the Zeus Trojan), its payload displays a warning purportedly from a law enforcement agency claiming that the computer has been used for illegal activities, such as downloading unlicensed software or child pornography. Due to this behaviour, it is commonly referred to as the “Police Trojan”.[58][59][60] The warning informs the user that to unlock their system, they would have to pay a fine using a voucher from an anonymous prepaid cash service such as Ukash or Paysafecard. To increase the illusion that the computer is being tracked by law enforcement, the screen also displays the computer’s IP address, while some versions display footage from a victim’s webcam to give the illusion that the user is being recorded.[6][61]

Reveton initially began spreading in various European countries in early 2012.[6] Variants were localized with templates branded with the logos of different law enforcement organizations based on the user’s country; for example, variants used in the United Kingdom contained the branding of organizations such as the Metropolitan Police Service and the Police National E-Crime Unit. Another version contained the logo of the royalty collection society PRS for Music, which specifically accused the user of illegally downloading music.[62] In a statement warning the public about the malware, the Metropolitan Police clarified that they would never lock a computer in such a way as part of an investigation.[6][14]

In May 2012, Trend Micro threat researchers discovered templates for variations for the United States and Canada, suggesting that its authors may have been planning to target users in North America.[63] By August 2012, a new variant of Reveton began to spread in the United States, claiming to require the payment of a $200 fine to the FBI using a MoneyPak card.[7][8][61]In February 2013, a Russian citizen was arrested in Dubai by Spanish authorities for his connection to a crime ring that had been using Reveton; ten other individuals were arrested on money laundering charges.[64] In August 2014, Avast Software reported that it had found new variants of Reveton that also distribute password stealing malware as part of its payload.[65]

CryptoLocker

Encrypting ransomware reappeared in September 2013 with a Trojan known as CryptoLocker, which generated a 2048-bit RSA key pair and uploaded in turn to a command-and-control server, and used to encrypt files using a whitelist of specific file extensions. The malware threatened to delete the private key if a payment of Bitcoin or a pre-paid cash voucher was not made within 3 days of the infection. Due to the extremely large key size it uses, analysts and those affected by the Trojan considered CryptoLocker extremely difficult to repair.[23][66][67][68]Even after the deadline passed, the private key could still be obtained using an online tool, but the price would increase to 10 BTC—which cost approximately US$2300 as of November 2013.[69][70]

CryptoLocker was isolated by the seizure of the Gameover ZeuS botnet as part of Operation Tovar, as officially announced by the U.S. Department of Justice on 2 June 2014. The Department of Justice also publicly issued an indictment against the Russian hacker Evgeniy Bogachev for his alleged involvement in the botnet.[71][72] It was estimated that at least US$3 million was extorted with the malware before the shutdown.[10]

CryptoLocker.F and TorrentLocker

In September 2014, a wave of ransomware Trojans surfaced that first targeted users in Australia, under the names CryptoWall and CryptoLocker (which is, as with CryptoLocker 2.0, unrelated to the original CryptoLocker). The Trojans spread via fraudulent e-mails claiming to be failed parcel delivery notices from Australia Post; to evade detection by automatic e-mail scanners that follow all links on a page to scan for malware, this variant was designed to require users to visit a web page and enter a CAPTCHA code before the payload is actually downloaded, preventing such automated processes from being able to scan the payload. Symantec determined that these new variants, which it identified as CryptoLocker.F, were again, unrelated to the original CryptoLocker due to differences in their operation.[73][74] A notable victim of the Trojans was the Australian Broadcasting Corporation; live programming on its television news channel ABC News 24 was disrupted for half an hour and shifted to Melbourne studios due to a CryptoWall infection on computers at its Sydney studio.[75][76][77]

Another Trojan in this wave, TorrentLocker, initially contained a design flaw comparable to CryptoDefense; it used the same keystream for every infected computer, making the encryption trivial to overcome. However, this flaw was later fixed.[35] By late-November 2014, it was estimated that over 9,000 users had been infected by TorrentLocker in Australia alone, trailing only Turkey with 11,700 infections.[78]

CryptoWall

Another major ransomware Trojan targeting Windows, CryptoWall, first appeared in 2014. One strain of CryptoWall was distributed as part of a malvertising campaign on the Zedo ad network in late-September 2014 that targeted several major websites; the ads redirected to rogue websites that used browser plugin exploits to download the payload. A Barracuda Networks researcher also noted that the payload was signed with a digital signature in an effort to appear trustworthy to security software.[79] CryptoWall 3.0 used a payload written in JavaScript as part of an email attachment, which downloads executables disguised as JPG images. To further evade detection, the malware creates new instances of explorer.exe and svchost.exe to communicate with its servers. When encrypting files, the malware also deletes volume shadow copies, and installs spyware that steals passwords and Bitcoin wallets.[80]

The FBI reported in June 2015 that nearly 1,000 victims had contacted the bureau’s Internet Crime Complaint Center to report CryptoWall infections, and estimated losses of at least $18 million.[11]

The most recent version, CryptoWall 4.0, enhanced its code to avoid antivirus detection, and encrypts not only the data in files but also the file names.[81]

Fusob

Fusob is one of the major mobile ransomware families. Between April 2015 and March 2016, about 56 percent of accounted mobile ransomwares was Fusob.[82]

Like a typical mobile ransomware, it employs scare tactics to extort people to pay a ransom.[83] The program pretends to be an accusatory authority, demanding the victim to pay a fine from $100 to $200 USD or otherwise face a fictitious charge. Rather surprisingly, Fusob suggests using iTunes gift cards for payment. Also, a timer clicking down on the screen adds to the users’ anxiety as well.

In order to infect devices, Fusob masquerades as a pornographic video player. Thus, victims, thinking it is harmless, unwittingly download Fusob.[84]

When Fusob is installed, it first checks the language used in the device. If it uses Russian or certain Eastern European languages, Fusob does nothing. Otherwise, it proceeds on to lock the device and demand ransom. Among victims, about 40% of them are in Germany with the United Kingdom and the United States following with 14.5% and 11.4% respectively.

Fusob has lots in common with Small, which is another major family of mobile ransomware. They represented over 93% of mobile ransomwares between 2015 and 2016.

WannaCry

In May 2017, the WannaCry ransomware attack spread though the Internet, using an exploit vector that Microsoft had issued a “Critical” patch for (MS17-010) two months before on March 14, 2017. The ransomware attack infected over 75,000 users in over 99 countries, using 20 different languages to demand money from users. The attack affected Telefónica and several other large companies in Spain, as well as parts of the British National Health Service (NHS),[85] FedEx, Deutsche Bahn, as well as the Russian Interior Ministry and Russian telecom MegaFon.[86]

Mitigation

As with other forms of malware, security software might not detect a ransomware payload, or, especially in the case of encrypting payloads, only after encryption is under way or complete, particularly if a new version unknown to the protective software is distributed.[87] If an attack is suspected or detected in its early stages, it takes some time for encryption to take place; immediate removal of the malware (a relatively simple process) before it has completed would stop further damage to data, without salvaging any already lost.[88][89]

Alternately, new categories of security software, specifically deception technology, can detect ransomware without using a signature-based approach. Deception technology utilizes fake SMB shares which surround real IT assets. These fake SMB data shares deceive ransomware, tie the ransomware up encrypting these false SMB data shares, alert and notify cyber security teams which can then shut down the attack and return the organization to normal operations. There are multiple vendors[90] that support this capability with multiple announcements in 2016.[91]

Security experts have suggested precautionary measures for dealing with ransomware. Using software or other security policies to block known payloads from launching will help to prevent infection, but will not protect against all attacks. Keeping “offline” backups of data stored in locations inaccessible to the infected computer, such as external storage drives, prevents them from being accessed by the ransomware, thus accelerating data restoration.[23][92]

There are a number of tools intended specifically to decrypt files locked by ransomware, although successful recovery may not be possible.[2][93] If the same encryption key is used for all files, decryption tools use files for which there are both uncorrupted backups (plaintext in the jargon of cryptanalysis) and encrypted copies; recovery of the key, if it is possible, may take several days.[94]

See also

References

WannaCry ransomware attack

From Wikipedia, the free encyclopedia
WannaCry ransomware attack
Wana Decrypt0r screenshot.png

Screenshot of the ransom note left on an infected system
Date 12 May 2017 (ongoing)
Location Worldwide
Also known as WannaCrypt, WanaCrypt0r
Type Cyber-attack
Theme Ransomware encrypting hard disk with $300 demand
Cause EternalBlue exploit
Participants Unknown
Outcome More than 230,000 computers infected[1]

WannaCry, also known by the names WannaCrypt,[2] WanaCrypt0r 2.0,[3] Wanna Decryptor[4] and other similar names, is a ransomware program targeting Microsoft Windows. In May 2017, a large cyber-attack using it was launched, infecting over 230,000 computers in 99 countries, demanding ransom payments in bitcoin in 28 languages. The attack has been described by Europol as unprecedented in scale.[5]

The attack affected Telefónica and several other large companies in Spain, as well as parts of Britain’s National Health Service (NHS),[6] FedEx and Deutsche Bahn.[7][8][9] Other targets in at least 99 countries were also reported to have been attacked around the same time.[10][11]

WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency[12][13] to attack computers running Microsoft Windows operating systems.[3][14] Although a patch to remove the underlying vulnerability had been issued on 14 March 2017,[15] delays in applying security updates left some users and organisations vulnerable.[16] Microsoft has taken the unusual step of releasing updates for the unsupported Windows XP and Windows Server 2003 and patches for Windows 8 operating systems.[2][17]

A kill switch has been found in the code, which prevents new infections. This has been activated by researchers and should slow or stop the spread. However, different versions of the attack may be released and all vulnerable systems still have an urgent need to be patched.

Background

The purported infection vector, EternalBlue, was released by the hacker group The Shadow Brokers on 14 April 2017,[18][19] along with other tools apparently leaked from Equation Group, which is believed to be part of the United States National Security Agency.[20][21]

EternalBlue exploits vulnerability MS17-010[15] in Microsoft‘s implementation of the Server Message Block (SMB) protocol. Microsoft had released a “Critical” advisory, along with an update patch to plug the vulnerability a month before, on 14 March 2017.[15] This patch only fixed Windows Vista and later operating systems but not the older Windows XP.

Countries initially affected[22]

On 12 May 2017, WannaCry began affecting computers worldwide.[23] After gaining access to the computers, via local area network (LAN), an email attachment, or drive-by download, the ransomware encrypts the computer’s hard disk drive,[24][25] then attempts to exploit the SMB vulnerability to spread to random computers on the Internet,[26] and “laterally” between computers on the same LAN.[27] As with other modern ransomware, the payload displays a message informing the user that files have been encrypted, and demands a payment of $300 in bitcoin within three days.

The Windows vulnerability is not a zero-day flaw, but one for which Microsoft had made available a security patch on 14 March 2017,[15] nearly two months before the attack. The patch was to the Server Message Block (SMB) protocol used by Windows.[28] Organizations that lacked this security patch were affected for this reason, although there is so far no evidence that any were specifically targeted by the ransomware developers.[28] Any organization still running the older Windows XP[29] were at particularly high risk because until 13 May,[2] no security patches had been released since April 2014.[30] Following the attack, Microsoft released a security patch for Windows XP.[2]

According to Wired, affected systems will also have had the DOUBLEPULSAR backdoor installed; this will also need to be removed when systems are cleaned up.[31]

Impact

The ransomware campaign was unprecedented in scale according to Europol.[5] The attack affected many NHS hospitals in the UK.[32] On 12 May, some NHS services had to turn away non-critical emergencies, and some ambulances were diverted.[7][33] In 2016, thousands of computers in 42 separate NHS trusts in England were reported to be still running Windows XP.[29]Nissan Motor Manufacturing UK in Tyne and Wear, one of Europe‘s most productive car manufacturing plants, halted production after the ransomware infected some of their systems. Renault also stopped production at several sites in an attempt to stop the spread of the ransomware.[34][35]

List of affected organizations

Response

Several hours after the initial release of the ransomware on 12 May 2017, a “kill switch” hardcoded into the malware was discovered. This allowed the spread of the initial infection to be halted by registering a domain name.[52] However, the kill switch appears to be a coding mistake on the part of the criminals, and variants without the kill switch are expected to be created.[53][54]

Reactions

Upon learning about the impact on the NHS, Edward Snowden said that if the NSA “had privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, [the attack] may not have happened”.[55]

British Prime Minister Theresa May said of the ransomware, “This is not targeted at the NHS. It is an international attack. A number of countries and organizations have been affected.”[56]

Microsoft has created security patches for its now-unsupported versions of Windows, including Windows XP, Windows 8 and Windows Server 2003.[57]

See also

___

Read Full Post | Make a Comment ( None so far )

David Stockman — Right On The Money, Economy, Trump and The Warfare and Welfare State — You Have Been Warned — Videos

Posted on April 30, 2017. Filed under: American History, Banking, Blogroll, Books, British History, Business, Communications, Congress, conservatives, Constitution, Corruption, Crisis, Cult, Culture, Economics, Education, Elections, Employment, European History, Federal Government Budget, Fiscal Policy, Foreign Policy, Freedom, government spending, history, History of Economic Thought, Illegal, Immigration, Inflation, Investments, Islam, Law, liberty, Life, Links, Macroeconomics, media, Microeconomics, Middle East, Monetary Policy, Money, Money, Non-Fiction, People, Philosophy, Photos, Politics, Rants, Raves, Raymond Thomas Pronk, Speech, Strategy, Talk Radio, Tax Policy, Taxation, Taxes, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , |

Image result for david stockman books

Image result for david stockman books

Image result for david stockman books
Image result for david stockman booksImage result for david stockman booksImage result for david stockman booksImage result for david stockman books

Image result for cartoons about david stockman

World’s Greatest Memory and Trump’s La la Land | David Stockman’s Warning

Published on Apr 29, 2017

You can also check out the following:

David Stockman’s Warning
Jim Sinclair
James Turk
Web bot
Silver News
Gold
Bix Weir
RoadToRoota
Road To Roota
Kyle Bass
Realist News
Greg Mannarino
Rob Kirby
Reluctant Preppers
The Next Newss
Info Wars
Maneco64
Mike Maloney
Gold Silver
Eric Sprott
Jim Rickards
David Morgan
Peter Schiff
Max Keiser
Robert Kiyosaki
SilverDoctors
Finance and Liberty
Nomi Prins
Jim Willie
Clif High
Martin Armstrong
Ron Paul
Pastor Williams
Bill Holter
Bo Polny
Jim Sinclair
James Turk
Clif High

Stockman on Trump’s Tax Plan: ‘Borrowing Money Is Not the Way to Prosperity’

David Stockman: National debt is ticking time bomb

David Stockman: Trump doesn’t know anything about tax policy

David Stockman: We’re wasting money on defense

David Stockman on Trump’s wall: I think it’s a stupid idea

David Stockman: Economy is on the edge of ruin

David Stockman: We’ll have a fiscal bloodbath, not fiscal stimulus

David Stockman Trumps Efforts To Drain The Swamp

David Stockman – Trump Will Create A Debt Crisis Like Never Before – 28 Feb 17 | Gazunda

David Stockman – Global Deflation As A Result Of Massive Over-investment – 9 Feb 16 | Gazunda

David Stockman Speaks on Shakeup Expected At The White House. #TheWhiteHouse

David Stockman: We are at peak debt headed for a recession

David Stockman on Trump’s infrastructure spending

RTD News: “A 20 Trillion Ticking Time Bomb…” – David Stockman

David Stockman: We have a massive bubble in the market

David Stockman -Trump Can’t Stop Market Crash Predicts Reagan’s Budget Director

Stockman: U.S. election is Brexit on steroids

[74] David Stockman | One Big Fat Ugly Bubble

David Stockman: Lester Holt was in the tank for Hillary Clinton

Stockman: Janet Yellen is a clueless economist

David Stockman: What the Fed and the Feds Have Done to Us, and How to Reverse It

David Stockman-We Are Nearing the End

[youtube-https://www.youtube.com/watch?v=5exbO-Ros2Q]

David Stockman: Why a Trump Presidency Is Very Possible

What Trump Should Do – With David Stockman

David Stockman Bubbles, Economic Collapse Coming 1

Robert Kiyosaki David Stockman discuss the biggest financial crisis in US history present,future

David Stockman: The US Is Fiscally, Morally, Intellectually Bankrupt

RTD News: “There Will Be No Rescue Out Of Washington This Time” – David Stockman

David Stockman – Conversations with Casey

How Crony Capitalism Corrupts the Free Market | David Stockman

The Forgotten Cause of Sound Money | David Stockman

Stockman: Market Will Not Be Pretty Under Trump

[Ed. Note: To see exactly what this former Reagan insider has to say about Trump and specifically what he believes must be done to drain the swamp, David Stockman is sending out a copy of his book Trumped! A Nation on the Brink of Ruin… And How to Bring It Back out to any American willing to listen. To learn how to get your free copy CLICK HERE.]

As bonds break a three day win streak and the U.S market hitting new record highs with a trifecta of records, CNBC was roaring about what to expect going forward. The Daily Reckoning contributor David Stockman joined Courtney Reagan to discuss what to expect going forward.

After the CNBC host positioned the critiques offered by David Stockman of the Trump administration she asked whether that would continue given the state of the market. Stockman did not mix words beginning the conversation with, “What’s going on today is complete insanity. The market is apparently pricing in a huge Trump stimulus package, when if you just look at the real world out there the only thing that is going to happen is a fiscal bloodbath and a White House train wreck like never before in U.S history.

How much more evidence do these so called traders need? Trump is lost in Twitter-land and he is out of control. He is turning out to be a complete jackass in the Oval Office. Co-President Bannon is off the deep end on terrorism, travel bans, Mexican walls, immigrant bashing and protectionism.”

David Stockman is a former Reagan Administration official who was the Office of Management and Budget Director. He also served as a two-term Congressman from the great state of Michigan. His latest book, Trumped! A Nation on the Brink of Ruin… And How to Bring It Back is out now. It offers his insight and exclusive analysis on exactly what the newly elected president must do in order to succeed in the White House. To get your own FREE copy, CLICK HERE to learn how.

“[They are] having nothing to do with the economic agenda and Trump has got an empty economic bench. He’s got no Secretary of the Treasury, no Office of Management and Budget, no Council of Economic Advisor Chairman. By this time, when I was there with the Reagan Administration, the plan was ready to go and he was going to Congress within a couple of days into February. We have a debt ceiling freight train coming down the road which will hit March 15 and then the cash will start running out and the system will be on edge. All of the continuing resolutions expire in April.”

“They are going to spend the year trying to repeal and replace Obamacare and it will be a fiasco. Nothing is going to happen this year. I don’t even think they can pass the budget resolution. There is going to be no tax action this year. If there is any bill next year it is going to be deficit neutral. Which means it is not going to add $15 to earnings like these crazy people expect.”

“Why would you be trading in this market, with this kind of chaos emerging everywhere at twenty six times trailing earnings? That’s where we are. It is completely crazy and it is only a question of how many more days or weeks that this kind of fantasy land can last.”

David Stockman Market In Text 2

Courtney Reagan then pressed back asking, “At what point do you give in and admit that [Trump] is atypical but maybe he could get things done? I mean, look at all of the CEO’s that Trump has met with.” The former Reagan insider remarked that, “CEO’s come and go with every president. They came in with Reagan, they tell a president what they want to hear. These guys are just selling the song and dance about how many jobs they’re going to create in the next five years. They have no clue.”

“If we have a recession in the next five years, which surely we will, because recessions have not been outlawed and we haven’t had one for ten years. None of this stuff is going to happen. This is meaningless. What is meaningful is that Trump is out of control. This tweeting and getting off track on all of this terrorism stuff. This is a sign that there is going to be no governing coalition and that all of this fiscal stimulus expected by Wall Street is a complete fantasy. It can’t happen.”

Rickards’ Reaction: A Model For Predicting Financial Collapse

Jim Rickards’ reveals the only model you need to safe guard your wealth from the next financial crisis. In this 5-part exclusive framework a former Wall Street and intelligence community insider breaks down his analysis into a model to warm of impending financial collapse. The model is designed to offer the easiest and fastest way to apply hard facts, science and good sound analysis. Sign up for the Daily Reckoning e-letter today and receive your FREE report.

We will NOT share your email address

When CNBC then turned over the camera to a day trader who asked about the positive sentiment that exists within the market regarding Trump and his plan to deregulate Stockman stayed true to message. “Trump is just putting out press releases and the guise of Executive Orders. All of this stuff is going to get litigated, it goes through a rulemaking process, that takes years. So the relief on regulation will be important, but it way down the road and it won’t be that impactful.”

“The second thing, is we’re at 92 months in this expansion already. It is running out of gas. You can’t expect it to run forever. That is seemingly what is priced in by the market.”

“The third thing is, we have a giant debt and deficit problem. The debt ceiling is coming back into play it will be 20 trillion when it freezes in on March 15th. I’ll tell you this, people aren’t paying attention to the fact that Trump will never get a debt ceiling increase through the Congress without a government shutdown. When that happens it is, “bar the doors” because nobody is expecting it. We need to look at the facts, not the hopes.”

As the CNBC affirmed, it is not clear that the market is just going to drop tomorrow and history will repeat itself, Stockman repositioned. “The market it clearly factoring in a big Trump stimulus and I think anybody down there would admit if it doesn’t happen, if we get zero tax cuts, if we get a fiscal bloodbath in the Washington I am describing – the market is not going to stay where it is today at these absurd multiples of earnings.”

“This is all based on the idea that there is going to be a surge of economic growth and that profits are going to come back from about $89 a share by basis, where they were during the last twelve months, to a potential $110 or $130. My argument is there is not going to be any economic rebound. There is not going to be any profit surge. Therefore the market will be repricing dramatically downward once it is clear.”

Another CNBC analysis asked why – with the positive trends in jobless claims, manufacturing increasing, interest rates at near record lows – would the market not close out the year near record levels? “The market is assuming that profits are going to rebound. That we are not going to have any market dislocation and that nobody is going to be pushing back on Trump. It is hard to understand how people watching the day-to-day action down there could believe that.”

“Everybody is pushing back on Trump, he can’t even get his cabinet approved. He’s going to be bogged down in a Supreme Court fight, he’s going to be bogged down in a fight over a ridiculous travel ban. The idea that there is not going to be pushback is naive. What there is going to be is a train wreck. It is already clear that the people in the White House have no idea what they’re doing and it is only a matter of time before this honeymoon goodwill evaporates and the politicians get down to doing what they do best. Which is to undermine and obstruct anything that might be positive.”

When finally asked whether there is anything positive that would make him turn bullish in the near future he responded affirmably, “No, because Trump is inheriting thirty years of a disaster created by his predecessors. We have to take this $20 trillion of debt seriously. There is $10 trillion more built in under current policy, and that is without a dime of Trump tax cuts, infrastructure or stimulus. There is going to be a tremendous fiscal crisis in the years ahead which will prevent any of the kind of action that the “stimulus junkies” are looking for.

To catch the full interview with David Stockman on CNBC click here. If you would like to claim your own free copy of David Stockman’s bestseller Trumped! Click here to learn how.

Thanks for reading,

Craig Wilson, @craig_wilson7
for the Daily Reckoning

https://dailyreckoning.com/stockman-market-under-trump/

David Stockman

From Wikipedia, the free encyclopedia
David Stockman
David Stockman by Gage Skidmore.jpg
Director of the Office of Management and Budget
In office
January 21, 1981 – August 1, 1985
President Ronald Reagan
Preceded by Jim McIntyre
Succeeded by Jim Miller
Member of the U.S. House of Representatives
from Michigan‘s 4th district
In office
January 3, 1977 – January 21, 1981
Preceded by Edward Hutchinson
Succeeded by Mark Siljander
Personal details
Born David Alan Stockman
November 10, 1946 (age 70)
Fort Hood, Texas, U.S.
Political party Republican
Spouse(s) Jennifer Blei (1983–present)[1]
Education Michigan State University (BA)
Harvard University
Website Official website

David Alan Stockman (born November 10, 1946) is a former businessman and U.S. politician who served as a Republican U.S. Representative from the state of Michigan (1977–1981) and as the Director of the Office of Management and Budget (1981–1985) under President Ronald Reagan.

Early life and education

Stockman was born in Fort Hood, Texas, the son of Allen Stockman, a fruit farmer, and Carol (née Bartz).[2] He is of German descent, and his family’s surname was originally “Stockmann”.[3] He was raised in a conservative family, and his maternal grandfather, William Bartz, was a Republican county treasurer for 30 years.[4][5] Stockman was educated at public schools in Stevensville, Michigan. He graduated from Lakeshore High School in 1964[6] and received a B.A. in History from Michigan State University in 1968. He was a graduate student at Harvard University, 1968–1970 studying theology

Political career

Stockman’s Congressional portrait

He served as special assistant to United States Representative and 1980 U.S. presidential candidate John Anderson of Illinois, 1970–1972, and was executive director, United States House of Representatives Republican Conference, 1972–1975.

Congress

Stockman was elected to the United States House of Representatives for the 95th Congress and was reelected in two subsequent elections, serving from January 3, 1977, until his resignation January 21, 1981, to accept appointment as Director of the Office of Management and Budget for U.S. President Ronald Reagan.

Office of Management and Budget

Stockman was one of the most controversial OMB directors ever appointed, also known as the “Father of Reaganomics.” He resigned in August 1985. Committed to the doctrine of supply-side economics, he assisted in the passing of the “Reagan Budget” (the Gramm-Latta Budget), which Stockman hoped would curtail the “welfare state“. He thus gained a reputation as a tough negotiator with House Speaker Tip O’Neill‘s Democratic-controlled House of Representatives and Majority Leader Howard Baker‘s Republican-controlled Senate. During this period, Stockman became well known to the public during the contentious political wrangling concerning the role of the federal government in American society.

Stockman’s influence within the Reagan Administration was weakened after the Atlantic Monthly magazine published the infamous 18,246 word article, “The Education of David Stockman”,[7] in its December 1981 issue, based on lengthy interviews Stockman gave to reporter William Greider.

Stockman was quoted as referring to Reagan’s tax act in these terms: “I mean, Kemp-Roth [Reagan’s 1981 tax cut] was always a Trojan horse to bring down the top rate…. It’s kind of hard to sell ‘trickle down.’ So the supply-side formula was the only way to get a tax policy that was really ‘trickle down.’ Supply-side is ‘trickle-down’ theory.”[7] Of the budget process during his first year on the job, Stockman was quoted as saying, “None of us really understands what’s going on with all these numbers,” which was used as the subtitle of the article.[7]

After “being taken to the woodshed by the president” because of his candor with Greider, Stockman became concerned with the projected trend of increasingly large federal deficits and the rapidly expanding national debt. On 1 August 1985, he resigned from OMB and later wrote a memoir of his experience in the Reagan Administration titled The Triumph of Politics: Why the Reagan Revolution Failed in which he specifically criticized the failure of congressional Republicans to endorse a reduction of government spending to offset large tax decreases to avoid the creation of large deficits and an increasing national debt.

Fiscal legacy

President Jimmy Carter’s last fiscal year budget ended with a $79.0 billion budget deficit (and a national debt of $907,701,000,000 [8] as of September 30, 1980), ending during the period of David Stockman’s and Ronald Reagan’s first year in office, on October 1, 1981.[9] The gross federal national debt had just increased to $1.0 trillion during October 1981 ($998 billion on 30 September 1981, up from $907.7 billion during the last full fiscal year of the Carter administration[8]).

By 30 September 1985, four and a half years into the Reagan administration and shortly after Stockman’s resignation from the OMB during August 1985, the gross federal debt was $1.8 trillion.[8] Stockman’s OMB work within the administration during 1981 until August 1985 was dedicated to negotiating with the Senate and House about the next fiscal year’s budget, executed later during the autumn of 1985, which resulted in the national debt becoming $2.1 trillion at fiscal year end 30 September 1986.[8] Reaganomics had just begun.

In 1981, Stockman received the Samuel S. Beard Award for Greatest Public Service by an Individual 35 Years or Under, an award given out annually by Jefferson Awards.[10]

Business career

After leaving government, Stockman joined the Wall St. investment bank Salomon Brothers and later became a partner of the New York–based private equity company, the Blackstone Group.[11]:125–127 His record was mixed at Blackstone, with some very good investments, such as American Axle, but also failures, including Haynes International and Republic Technologies.[11]:144–147 During 1999, after Blackstone CEO Stephen A. Schwarzman curtailed Stockman’s role in managing the investments he had developed,[11]:146 Stockman resigned from Blackstone to start his own private equity fund company, Heartland Industrial Partners, L.P., based in Greenwich, Connecticut.[12]

On the strength of his investment record at Blackstone, Stockman and his partners raised $1.3 billion of equity from institutional and other investors. With Stockman’s guidance, Heartland used a contrarian investment strategy, buying controlling interests in companies operating in sectors of the U.S. economy that were attracting the least amount of new equity: auto parts and textiles. With the help of about $9 billion in Wall Street debt financing, Heartland completed more than 20 transactions in less than 2 years to create four portfolio companies: Springs Industries, Metaldyne, Collins & Aikman, and TriMas. Several major investments performed very poorly, however. Collins & Aikman filed for bankruptcy during 2005 and when Heartland sold Metaldyne to Asahi Tec Corp. during 2006, Heartland lost most of the $340 million of equity it had invested in the business.[13]

Collins & Aikman Corp.

During August 2003, Stockman became CEO of Collins & Aikman Corporation, a Detroit-based manufacturer of automotive interior components. He was ousted from that job days before Collins & Aikman filed for bankruptcy under Chapter 11 on May 17, 2005.

Criminal and civil charges

On March 26, 2007, federal prosecutors in Manhattan indicted Stockman in “a scheme… to defraud [Collins & Aikman]’s investors, banks and creditors by manipulating C&A’s reported revenues and earnings.” The United States Securities and Exchange Commission also brought civil charges against Stockman related to actions that he performed while CEO of Collins & Aikman.[14] Stockman suffered a personal financial loss, over $13 million, along with losses suffered by as many as 15,000 Collins & Aikman employees worldwide.

Stockman said in a statement posted on his law firm’s website that the company’s end was the consequence of an industry decline, not due to fraud.[15] On January 9, 2009, the US Attorney’s Office announced that it did not intend to prosecute Stockman for this case.[16]

Web site

In March 2014 Stockman launched a web based daily periodical, David Stockman’s Contra Corner featuring both his own articles and those from leading contrarian thinkers on geopolitics, economics, and finance.

Personal life

Stockman lives in the Upper East Side of Manhattan in New York City.[12] He is married to Jennifer Blei Stockman and is the father of two children, Rachel and Victoria. Jennifer Blei Stockman is a chairwoman emerita of the Republican Majority for Choice,[17] and President of the Solomon R. Guggenheim Foundation Board of Trustees.[18] In 2013, Stockman signed an amicus brief to the Supreme Court in favor of same-sex marriage.[19]

Quotes

  • “[Social Security] has to be means-tested. And Medicare needs to be means-tested […] Let the Bush tax cuts expire. Let the capital gains go back to the same rate as ordinary income.”[20]
  • “The Republican Party has totally abdicated its job in our democracy, which is to act as the guardian of fiscal discipline and responsibility. They’re on an anti-tax jihad — one that benefits the prosperous classes.”[21]
  • “I invest in anything that Bernanke can’t destroy, including gold, canned beans, bottled water and flashlight batteries.”[22]
  • “Ninety-two percent of the wealth is owned by five percent of the people.” (Bloomberg TV 2013)
  • “[T]he Republican Party was hijacked by modern imperialists during the Reagan era. As a consequence, the conservative party cannot perform its natural function as watchdog of the public purse because it is constantly seeking legislative action to provision a vast war machine of invasion and occupation.” [23]

Bibliography

  • The Reagan Economic Plan, 1981
  • The Triumph of Politics: Why the Reagan Revolution Failed, Harper & Row, 1986, ISBN 9780060155605
  • The Great Deformation: The Corruption of Capitalism in America, PublicAffairs, 2013, ISBN 9781586489120
  • Trumped!: A Nation on the Brink of Ruin, and How to Bring it Back, 2016

References

  1. Jump up^ “LOSING THE BATTLES AND WINNING THE WAR”. Lexington Herald-Leader. April 7, 1985.
  2. Jump up^ Hunter, Marjorie (December 12, 1980). “Office of Management and Budget David Alan Stockman; Strong Support From Kemp Chosen by House Republicans Views on Economy”. The New York Times.
  3. Jump up^ “News65”. 19 June 1998.
  4. Jump up^ “The Tuscaloosa News – Google News Archive Search”.
  5. Jump up^ “The Montreal Gazette – Google News Archive Search”.
  6. Jump up^ Heibutzki, Ralph (2012-06-04). “Stockman Surprise Speaker at Lakeshore’s Graduation”. The Herald-Palladium. Retrieved 2012-06-04.
  7. ^ Jump up to:a b c William Greider (December 1981). “The Education of David Stockman”. The Atlantic Online.
  8. ^ Jump up to:a b c d Treasury Department’s Historical Debt Outstanding – Annual 1950 – 1999
  9. Jump up^ Office of Management and Budget Historical Tablessee Table 1.1 (Excel Spreadsheet)
  10. Jump up^ “Jefferson Awards”. Jefferson Awards.
  11. ^ Jump up to:a b c David Carey & John E. Morris (2001). King of Capital: The Remarkable Rise, Fall and Rise Again of Steve Schwarzman and Blackstone. Crown.
  12. ^ Jump up to:a b “Collins & Aikman seeks to emerge from bankruptcy,” Bloomberg News article by Jeff Bennett, published in the newspaper The Advocate of Stamford and (identical version, perhaps with changes by the local editor in the common business section for both newspapers) in the Greenwich Time on September 5, 2006, page A7, The Advocate
  13. Jump up^ David Carey and Lou Whiteman, “PE firms find buyer for Metaldyne,” The Deal, Sept. 1, 2006.
  14. Jump up^ Levin, Doris (29 March 2007). “Stockman Outsmarts Self in Detroit”. Bloomberg. Retrieved 19 September 2014.
  15. Jump up^ “Ex-Collins Chief David Stockman Charged With Fraud (Update10)”. Bloomberg. March 26, 2007. Retrieved 2010-08-02.
  16. Jump up^ “Fraud charges dropped against ex-Reagan aide David Stockman”. Chicago Tribune. 10 January 2009. Retrieved 19 September 2014.
  17. Jump up^ About Us Republican Majority for Choice
  18. Jump up^ Trustees, Solomon R. Guggenheim Foundation
  19. Jump up^ [1]
  20. Jump up^ “Why David Stockman Isn’t buying it”. CBS News. March 2, 2012.
  21. Jump up^ Dickinson, Tim (Nov 9, 2011). “How the GOP Became the Party of the Rich”. Rolling Stone. Retrieved 2011-11-10.
  22. Jump up^ David Stockman: I Invest In Anything Bernanke Can’t Destroy, John Carney, CNBC, October 6, 2010
  23. Jump up^ Stockman, David (2013). The Great Deformation — the corruption of capitalism in America. PublicAffairs. p. 688. ISBN 978-1586489120.

External links

United States House of Representatives
Preceded by
Edward Hutchinson
Member of the U.S. House of Representatives
from Michigan’s 4th congressional district

1977–1981
Succeeded by
Mark Siljander
Political offices
Preceded by
Jim McIntyre
Director of the Office of Management and Budget
1981–1985
Succeeded by
Jim Miller
Read Full Post | Make a Comment ( None so far )

Totalitarians of Lying Lunatic Left Attempt to Suppress Speech of Conservatives, Libertarians, and Classical Liberals — Something New — Go On Offense And Attack The Collectivist Totalitarians — Battle For Berkeley — Berkeley Protesters Take the Pepsi Challenge — Why the Right Won — Chief of Police Orders Police Officers To Stand Down — Security Is The New Shut-Up — Shame On UC Berkeley — Videos

Posted on April 22, 2017. Filed under: American History, Blogroll, College, Communications, conservatives, Constitution, Corruption, Crime, Culture, Education, Freedom, history, Language, Law, liberty, Life, media, People, Philosophy, Photos, Police, Political Correctness, Politics, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Speech, Strategy, Success, Television, Video, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , |

 

Image result for berkely april 15, 2017Image result for berkely april 15, 2017Image result for berkely april 15, 2017Image result for berkely april 15, 2017Image result for cartoons berkely april 15, 2017Image result for berkely april 15, 2017Image result for cartoons berkely april 15, 2017Image result for berkely april 15, 2017Image result for cartoons berkely april 15, 2017Image result for berkely april 15, 2017

Berkeley Pro Free Speech Protesters Chase Out AntiFA

The Battle of Berkeley in 81 seconds

Berkeley Protesters Take the Pepsi Challenge

Antifa and UC Berkeley: LIVE with Tim Pool

CALLING OUT THE BERKELEY VIOLENCE

UNDERCOVER AS ANTIFA WITH JOEY SALADS

LEFT VS RIGHT DOUBLE STANDARDS IN MEDIA

UC Berkley Must Be Disciplined For Furthering Leftist Violence Against Conservatives

Battle of Berkeley: Why the Right Won

Published on Apr 17, 2017

Berkeley erupted into political violence on April 15th, 2017, with leftwing radicals attacking the Freedom Rally hosted by Trump supporters. The Antifa thugs were roundly defeated by the Freedom Rally attendees, but where did this violence start? I discuss the events that lead up to this day and uncover the progression of leftwing violence that’s destroying a city that once celebrated free speech.

Lauren Southern And The Madness Behind The Battle Of Berkeley

THE BEAUTIFUL LAUREN SOUTHERN; ProudBoys and Some Ugly Antifa

Battle of Berkeley 3 FULL DAY[ANTIFA Vs FREE SPEECH PROTESTERS]Patriots Day Rally Ft. Based Stickman

Trump Supporters chase Antifa down the street at FREE SPEECH Rally in Berkeley

Battle of Berkeley 3 as Antifa circled the park

2017 The Battle for Berkeley LARP!

Patriot’s Day Riot in the Streets

Mark Steyn Security is the new shutup to conservatives

Why UC Berkeley shouldn’t have canceled Ann Coulter’s speech

UC Berkeley Cancels Coulter Appearance Over Security Concerns

Conservative Commentator Ann Coulter To Speak At UC Berkeley

Did Mark Levin Get Berkeley To Reverse Decision To Cancel Speech By Ann Coulter?

Ben Shapiro Interviews Based Stickman on Berkeley Riots & Ann Coulter being BANNED

Ben Shapiro interviews Ann Coulter; Adios America; 7/13/2015; C-Span

UC Berkeley Presses Campus Republicans To Cancel Another Conservative Speaker

WARNING:TRUMP SUPPORTERS ATTACKED AT BERKELEY BY ANTI TRUMP PROTESTERS

Free Speech Battle For Berkeley, California! | Lauren Southern and Stefan Molyneux

Berkeley Mayor Connected to Antifa

Tucker Carlson Has UC Berkeley Protest Leader Yvette Felarca Explain Fascism

Lauren Southern Coverage of Antifa vs Trump Supporters Battle

Berkeley April 15,Based stick man Antifa smashing

ANTIFA VS America Compilation

Antifa Reddit Admits They Lost Berkeley Battle with Trump Supporters

Berkeley April 15,BAMN leader Yvette Felarca assaults patriots

Berkeley Leftists Riot Against Milo (Mini Documentary: Arrest Yvette Felarca Part 2)

Handicap Senior Citizen U.S Military Vet Stands Up & Cucks Antifa

Is It Wrong To Bash Antifa Leftist Scum?

Berkeley Police Refuse To Stop the Riots – When Told People are Being Beaten, Officer Says “…and?”

Hannity, Alt Left Pile On, Mayhem in Berkeley, Pres Obama’s Failures

Does Free Speech Offend You?

Ann Coulter: Attorney General Jeff Sessions Needs to Investigate UC Berkeley For Cancelling Speech

Ann Coulter rejects Berkeley’s proposal to reschedule speech

Berkeley reschedules Coulter speech after backlash

Ann Coulter Discusses Berkeley w/ Prager

Ben Shapiro on Free Speech, College Campuses, and The Regressive Left

Ben Shapiro – Practical Tactics For Fighting The Left

Thomas Sowell — Dismantling America

TAKE IT TO THE LIMITS: Milton Friedman on Libertarianism

One World Government & Collectivism – G. Edward Griffin

The Quigley Formula – G. Edward Griffin lecture

The Mainstream Media Are Enemies of Freedom, Agents of Tyranny and Must Be Overthrown

Super rich are in a conspiracy to rule the world – G. Edward Griffin – 2007

Antifa and Conservatives Throw Down At ‘Battle Of Berkeley’…

battle of berkeley
In the course of history, there have been many great battles. Thermopylae. Gettysburg. Tupac and Biggie. The forces of good and douchebag have long utilized beating the crap out of each other to resolve their grievances. Well, last weekend, yet another battle was had. Conservative and leftist blood alike was shed at what shall henceforth be referred to as the Battle of Berkeley

For the third time this year, Trump supporters and Antifa clashed on the streets of Berkeley, California. The two forces met Saturday during the pro-Trump Patriot Day rally.

Berkeley Police have arrested at least 15 people this morning and afternoon, after antifascists met Trump supporters at a pro-Trump rally. Police attempted to maintain order with poles and fence mesh, but the barriers did not stop the two sides from violently engaging.

Trump supporters had organized a Patriot Day rally, starring Lauren Southern, a former reporter for conservative Canadian outlet The Rebel Media and Kyle Chapman, a man who achieved internet stardom as “Based Stickman” after assaulting a member of Antifa with a stick at the March 4 scuffle in Berkeley, among others.

Berkeley police have confiscated banned items such as knives, flagpoles, and sticks used as weapons.

https://www.louderwithcrowder.com/antifa-conservatives-battle-of-berkeley/

Berkeley Mayor Is Member of Antifa Facebook Group that Organized Riots

Berkeley Mayor Jesse Arreguin is a member of the anti-fascist Facebook group, By Any Means Necessary, which orchestrated the riots that occurred ahead of a scheduled lecture by Milo Yiannopoulos.

Berkley Mayor Jesse Arreguin was revealed to be a member of the anti-fascist group, By Any Means Necessary (BAMN), on Facebook. BAMN orchestrated the violence that shut down a scheduled lecture at UC Berkeley featuring Milo Yiannopoulos in early 2017. Arreguin is allegedly also friends with BAMN leader, Yvette Felarca, on Facebook.

They were also involved in the violent clashes earlier this month.

Felarca defended the violence that occurred ahead of Yiannopoulos’ scheduled event in a local television interview following the riots.

BAMN was investigated for engaging in terrorist activities in 2005 by the FBI. In 2009, the Department of Defense classified the group’s activities as “low-level terrorism.” In June 2016, BAMN led a violent counter-protest outside a white nationalist rally that resulted in ten people being hospitalized with stab wounds.

Often described as a “militant left-wing” activist group, BAMN frequently engages in violent forms of protests. A Berkeley newspaper noted in 2001 that the group was a front for an “an obscure Detroit-based Trotskyist political party called the Revolutionary Workers League.”

Breitbart News has reached out to Mayor Arreguin for comment.

Tom Ciccotta is a libertarian who writes about economics and higher education for Breitbart News. You can follow him on Twitter @tciccotta or email him at tciccotta@breitbart.com

http://www.breitbart.com/tech/2017/04/21/berkeley-mayor-is-member-of-antifa-facebook-group-that-organized-riots/

Antifa wants combat training and firearms after losing the ‘Battle for Berkeley’

Brandon Morse

Antifa wants combat training and firearms after losing the ‘Battle for Berkeley’

Antifa members have begun discussions about arming themselves with better training and firearms after they were routed by Trump supporters during the “Battle of Berkeley” in California.

Last week supporters of President Donald Trump clashed with members of the leftist group known as Antifa (short for anti-fascist) in Berkeley California. The meeting of the two groups soon erupted in violence, with Antifa using mace, M80’s, and various other weapons to attack Trump supporters.

According to Rebel Media’s Lauren Southern, Trump supporters were told by police not to bring any weapons, as police would protect them. Upon Anitfa’s arrival, the police retreated, leaving the Trump supporters to utilize whatever weapons they could get their hands on. Regardless, the Trump supporters routed Antifa after one of their members threw a smoke bomb, not realizing the wind was blowing in Antifa’s direction.

This loss prompted Antifa members to begin discussion about how they could better prepare themselves for future skirmishes against Trump supporters.

In the subreddit r/anarchism, one Anitfa member acknowledged the loss, and suggested that members find a way to become “better organized and better trained.” Another member agreed, saying that too many of their “comrades” went into battle “no combat training,” and suggested they start “seminars or something of that sort.”

This conversation continued, with suggestions for better equipment such as helmets and padding over the typical hoodie and facemask being worn. Another person on this r/anarchism thread suggested they rally behind a leader who can organize and direct actions. The conversation soon turned to weapons, however, and one member in particular suggested they bring firearms.

Not getting disarmed is a big part of the problem, yes, but we need more than flags and bats. We need to take notes from the John Brown Gun Club and get firearms and training. I know getting firearms in states and cities we have a presence in is usually a hassle, but even handguns would help. It would certainly put a psychological element in while holding fash back. Who do you think a fascist is more afraid of? People with only flags and bats, or people with flags, bats, and guns?”

screen-shot-2017-04-20-at-6-00-14-pm

screen-shot-2017-04-20-at-5-58-43-pm

Antifa is known for their willingness to use violence and intimidation to silence political, and ideological opponents. An Antifa chapter at Clemson University, known as “Upstate Antifa” have made an effort to justify the violence and destruction committed against what they loosely base as “Nazis” and “fascists.”

Recently, Antifa members inadvertently turned on one of their own after his mask was forcibly removed, spraying him with pepper spray, and hitting him with a skateboard as they retreated from pro-Trump marchers.

Another instance of violence occurred while Trump supporters and Antifa were engaging in trash talk. One of Antifa’s members used a bike lock to strike a Trump supporter in the head without warning, causing him to bleed a good deal from his scalp.

http://www.theblaze.com/news/2017/04/21/antifa-wants-combat-training-and-firearms-after-losing-the-battle-for-berkely/

Conservative group threatens UC Berkeley over Ann Coulter appearance

Paige St. JohnContact Reporter

A conservative group on Friday threatened to take legal action against UC Berkeley if student sponsors are not allowed to pick the date and location for an appearance by commentator Ann Coulter.

Coulter had been scheduled to speak on the demonstration-weary campus on April 27, but Berkeley officials refused permission, citing safety concerns. Amid public criticism, the administration on Thursday agreed to set the event for May 2, at midday, in a science hall away from the central campus.

“The university’s actions violate fundamental principles of free speech, equal protection and due process guaranteed by the United States Constitution,” a letter from lawyers representing the conservative outreach group Young America’s Foundation warned.

It called Berkeley’s offer “transparently insincere” — noting that the new date falls during “dead week,” a time when most students are studying for final exams.

“UC Berkeley may not censor speech its administrators plainly disfavor, simply because a potential mob shares the administrators’ distaste,” the letter said.

In response, Berkeley answered that it does not have a “protectable” venue available on April 27 and raised concern about Coulter’s “disregard” for what police believe is required to keep her appearance safe.

“The Constitution permits the university to take such steps to protect public safety while facilitating expressive activities, and that is exactly what we are doing,” officials said in a prepared statement.

Coulter, who had been invited to speak about immigration, used her Twitter account Thursday to declare she would speak at Berkeley on April 27, “as I was invited to do and have a contract to do.”

Although the student groups hosting her appearance are the Berkeley College Republicans and BridgeCal, the contracted sponsor for the event is Young America’s Foundation.

Berkeley spokesman Dan Mogulof said administrators learned of Coulter’s planned arrival only after that contract was signed, preventing an assessment of how to avoid a replay of the violence that disrupted a scheduled Milo Yiannopoulos appearance at Berkeley on Feb. 1.

Large crowds swarmed the campus where the right-wing provocateur was to appear, and masked demonstrators in black garb tore down police barricades, smashed windows and set off explosives.

Since then, the university town has witnessed two demonstrations held by alt-right organizations that led to violent clashes.

“We were disappointed we couldn’t make an event work,” Mogulof said. “We believe it is important to expose our students to a diverse array of perspectives. … [They] can’t be educated in an echo chamber.”

http://www.latimes.com/local/california/la-me-berkeley-coulter-20170421-story.html

Read Full Post | Make a Comment ( None so far )

Tyler Cowen — The Complacent Class: The Self-Defeating Quest for the American Dream — Marginal Revolution University — Videos

Posted on April 2, 2017. Filed under: American History, Blogroll, Books, College Courses Online Videos, Economics, Family, government spending, history, media, Non-Fiction, People, Philosophy, Photos, Politics, Resources, Strategy, Success, Unemployment, Video, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , |

Image result for tyler cowen The Complacent Class: The Self-Defeating Quest for the American DreamImage result for tyler cowenMRUniversity | An Online Education PlatformMarginal Revolution University

http://www.mruniversity.com/

The Complacent Class (Episode 1/5)

The New Era of Segregation (Episode 2/5)

American Stasis (Episode 3/5)

The Missing Men (Episode 4/5)

Up Next:

 The Great Reset (Episode 5/5)

What might happen if our stagnating economy faces a crisis?

Tyler Cowen, “The Complacent Class”

The American Dream and the Complacent Class

Tyler Cowen, “The Complacent Class”

Tyler Cowen: The Great Stagnation

Peter Thiel (full) | Conversations with Tyler

Be suspicious of stories | Tyler Cowen | TEDxMidAtlantic

TEDxEast – Tyler Cowen – The Great Stagnation

This video series accompanies Tyler Cowen’s new book The Complacent Class: The Self-Defeating Quest for the American Dream. The book is available in print and digital formats from Amazon, Barnes & Noble, and other book retailers.

Image result for tyler cowenImage result for tyler cowen

Image result for stagnating economy usa

American Culture and Innovation

The pioneer spirit has defined American culture for hundreds of years. We’ve been willing to cross great distances, take big risks, and adapt to change in ways that have produced a dynamic economy. From Ben Franklin to Steve Jobs, innovation has been firmly rooted in American DNA and has positively changed the world.

What if that’s no longer true?

Over the next few weeks, join economist Tyler Cowen on an exploration of how we’re working harder than ever to avoid change and letting algorithms keep us a little too comfortable.

Want to stay in the loop as we release new episodes? Sign-up for updates in your inbox.

What’s Marginal Revolution University?

We believe economics has the power to change the way you see the world.

Many of us can recall that first teacher that changed the way we saw the world. We’re aiming to recreate that experience everyday for millions worldwide, for free.

Marginal Revolution University is a nonprofit, online education platform for learning economics. Founded in 2012 by George Mason University professors Tyler Cowen and Alex Tabarrok, we have a small team operating both in Arlington, VA and remotely around the globe. Through engaging, high production quality videos on a variety of economics topics, we support teachers, students, and lifelong learners. Our goal is to help learners better understand the economic way of thinking. Several complete courses are available for free at MRUniversity.com that can be used alone or as a supplement to a traditional course.

We offer a full course on Principles of Microeconomics and are currently releasing Principles of Macroeconomics.

All of our materials are free to use in and out of the classroom.

Questions? Comments? Drop us a note at support@mruniversity.com.

Up Next:

5. The Great Reset

What might happen if our stagnating economy faces a crisis?

Looking for more like this? Check out some of our other popular videos:

“Tyler Cowen’s blog, Marginal Revolution, is the first thing I read every morning. And his brilliant new book, The Complacent Class, has been on my nightstand after I devoured it in one sitting. I am at round-the-clock Cowen saturation right now.” – Malcolm Gladwell

Tyler Cowen on…

1. The Complacent Class

The Complacent Class by Tyler Cowen
Econ Duel: Will Machines Take Our Jobs?
Econ Duel: Will Machines Take Our Jobs?

This video series accompanies Tyler Cowen’s new book The Complacent Class: The Self-Defeating Quest for the American Dream. The book is available in print and digital formats from Amazon, Barnes & Noble, and other book retailers.

2. The New Era of Segregation

3. American Stasis

Tyler Cowen

From Wikipedia, the free encyclopedia
Tyler Cowen
Tyler Cowen 1.jpg
Born January 21, 1962 (age 55)
Bergen County, New Jersey, USA
Nationality American
Field Cultural economics
School or
tradition
Neoclassical economics
Influences Chicago School
Thomas Schelling
Carl Menger

Tyler Cowen (/ˈk.ən/; born January 21, 1962) is an American economist, philosopher, and writer, who is a professor at George Mason University, where he holds the Holbert C. Harris Chair of economics. He hosts a popular economics blog, Marginal Revolution, together with his co-author, Alex Tabarrok. Cowen and Tabarrok have also started the website Marginal Revolution University, a venture in online education.

Cowen writes the “Economic Scene” column for the New York Times, and since July 2016 has been a regular opinion columnist at Bloomberg View.[1] He also writes for such publications as The New Republic, the Wall Street Journal, Forbes, Newsweek, and the Wilson Quarterly. He serves as general director of George Mason’s Mercatus Center, a university research center that focuses on the market economy.

In February 2011, Cowen received a nomination as one of the most influential economists in the last decade in a survey by The Economist.[2] He was ranked #72 among the “Top 100 Global Thinkers” in 2011 by Foreign Policy Magazine “for finding markets in everything.”[3]

Education and personal life

Cowen was born in Bergen County,[4] New Jersey. At 15, he became the youngest ever New Jersey state chess champion.[5][6]

He graduated from George Mason University with a bachelor of science degree in economics in 1983 and received his PhD in economics from Harvard University in 1987 with his thesis titled Essays in the theory of welfare economics. At Harvard, he was mentored by game theorist Thomas Schelling, the 2005 recipient of the Nobel Prize in Economics. He is married to Natasha Cowen, a lawyer.

Writings

Culture

The Los Angeles Times has described Cowen as “a man who can talk about Haitian voodoo flags, Iranian cinema, Hong Kong cuisine, Abstract Expressionism, Zairian music and Mexican folk art with seemingly equal facility.”[7] One of Cowen’s primary research interests is the economics of culture. He has written books on fame (What Price Fame?), art (In Praise of Commercial Culture), and cultural trade (Creative Destruction: How Globalization is Changing the World’s Cultures). In Markets and Cultural Voices, he relays how globalization is changing the world of three Mexican amate painters. Cowen argues that free markets change culture for the better, allowing them to evolve into something more people want. Other books include Public Goods and Market Failures, The Theory of Market Failure, Explorations in the New Monetary Economics, Risk and Business Cycles, Economic Welfare, and New Theories of Market Failure.

Recent books

Cowen followed the controversial success of his The Great Stagnation with An Economist Gets Lunch: New Rules for Everyday Foodies, “taking on food with equally provocative ideas.”[8]

The Great Stagnation: How America Ate All The Low-Hanging Fruit of Modern History, Got Sick, and Will (Eventually) Feel Better is a short, 15,000-word, take on the United States’ recent economic trajectory released in January 2011. Create Your Own Economy: The Path to Prosperity in a Disordered World was released in July 2009 (and rereleased in 2010, with the new title The Age of the Infovore: Succeeding in the Information Economy) and received favorable reviews from critics including Matthew Yglesias and Tim Harford.

In 2013, he published Average is Over, on the future of modern economies.

HIs most recent book, The Complacent Class: The Self-Defeating Quest for the American Dream (St. Martins Press, February 2017) discusses how the change that has moved America forward has stopped. According to Malcolm Gladwell, “His brilliant new book…has been on my nightstand after I devoured it in one sitting. I am at round-the-clock Cowen saturation right now.”

New York Times columns

Cowen’s New York Times columns cover a wide range of issues, such as the 2008 financial crisis: “Too Few Regulations? No, Just Ineffective Ones”.

Dining guide

His dining guide for the DC area, “Tyler Cowen’s Ethnic Dining Guide,” was reprinted in the Food section of the Washington Post.

Political philosophy

Cowen has written papers in political philosophy and ethics: for example, he co-wrote a paper with the philosopher Derek Parfit, arguing against the social discount rate.[9] A recent paper has argued that the epistemic problem fails to refute consequentialist forms of argument.[10] Cowen has been described as a “libertarian bargainer,” a moderate libertarian[clarification needed] who can influence practical policy making.[11] In a 2007 article entitled “The Paradox of Libertarianism,” Cowen argued that libertarians “should embrace a world with growing wealth, growing positive liberty, and yes, growing government. We don’t have to favor the growth in government per se, but we do need to recognize that sometimes it is a package deal.”

Cowen endorsed bailouts in a March 2, 2009 column in the New York Times.[12]

In 2012, David Brooks called Cowen one of the most influential bloggers on the right, writing that he is among those who “start from broadly libertarian premises but do not apply them in a doctrinaire way.”[13]

In an August 2014 blog post, Cowen wrote, “Just to summarize, I generally favor much more immigration but not open borders, I am a liberal on most but not all social issues, and I am market-oriented on economic issues. On most current foreign policy issues I am genuinely agnostic as to what exactly we should do but skeptical that we are doing the right thing at the moment. I don’t like voting for either party or for third parties.”[14]

Attack

On March 26, 2014, Cowen was attacked while teaching “Law and Literature” in his classroom by Jonathan Pendleton, who tried to perform a “citizen’s arrest” of the professor and then pepper sprayed him.[15][16][17] A bystander intervened and Pendelton was detained and arrested shortly after by police. Cowen and his students reportedly suffered no lasting injuries. Pendelton reportedly believed that Cowen had “controlled his mind at a distance” and sexually harassed him.[17]

Publications

Books

Select journal articles

Select articles

References

  1. Jump up^ https://www.bloomberg.com/view/contributors/AS6n2t3d_iA/tyler-cowen
  2. Jump up^ “Economics’ most influential people”. Economist.com. February 1, 2011. Retrieved 2012-06-30.
  3. Jump up^ “The FP Top 100 Global Thinkers (#72 Tyler Cowan:For finding markets in everything)”. Foreign Policy. December 2011. Retrieved March 21, 2012.
  4. Jump up^ “Correction: Tyler Cowen”. Financial Times. London: Pearson. 29 December 2012. Retrieved 1 February 2014.
  5. Jump up^ “Interview with the Former “Youngest New Jersey Chess Champion,” Tyler Cowen”. Kenilworthchessclub.org. 2006-09-08. Retrieved 2012-06-30.
  6. Jump up^ New Jersey State Champions 1946 – Present New Jersey State Chess Federation, Official Site
  7. Jump up^ The joy of thinking globally, February 7, 2003, Daniel Akst, Los Angeles Times
  8. Jump up^ Cowen, Tyler (2012-04-12). “Penny Pleasance in The New York Journal of Books”. Nyjournalofbooks.com. Retrieved 2012-06-30.
  9. Jump up^ ‘Against the social discount rate’, Derek Parfit and Tyler Cowen, in Peter Laslett & James S. Fishkin (eds.) Justice between age groups and generations, Yale University Press: New Haven, 1992, pp. 144–161.
  10. Jump up^ The Epistemic Problem Does Not Refute Consequentialism, Tyler Cowen, Utilitas (2006), 18: 383–399
  11. Jump up^ Klein, Daniel B.Mere Libertarianism: Blending Hayek and Rothbard“. Reason Papers. Vol. 27: Fall 2004.
  12. Jump up^ Cowen, Tyler (March 1, 2009). “Message to Regulators: Bank Fix Needed Quickly”. New York Times.
  13. Jump up^ Brooks, David (2012-11-19). “The Conservative Future”. New York Times. Retrieved 28 November 2012.
  14. Jump up^ Cowen, Tyler (4 August 2014). “Matt Yglesias on Tyler Cowen”. Marginal Revolution. Retrieved 24 March 2017.
  15. Jump up^ Greenwood, Arin (2014-03-27). “Tyler Cowen Pepper Sprayed While Teaching Law School Class On Vigilantism”. Huffington Post.
  16. Jump up^ McNeal, Greg (2014-03-27). “Law Professor Pepper Sprayed During Class By Man Demanding A ‘Citizen’s Arrest'”. Forbes.
  17. ^ Jump up to:a b Weiner, Rachel (April 29, 2014). “Tyler Cowen’s attacker thought the professor was controlling his mind, Cowen testifies”. The Washington Post. Retrieved April 29, 2014.

External links

https://en.wikipedia.org/wiki/Tyler_Cowen

 

Read Full Post | Make a Comment ( None so far )

Greg Iles –Natchez Burning, The Bone Tree and Mississippi Blood — Videos

Posted on March 26, 2017. Filed under: Blogroll, Books, Communications, Culture, Education, Entertainment, Fiction, Language, Law, liberty, Life, Links, Literature, media, Music, People, Philosophy, Photos, Police, Rants, Raves, Video, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , |

Image result for greg ilels the bone tree

Image result for greg ilels natchez burning
Image result for greg ilelsImage result for greg ilelsImage result for greg ilelsImage result for greg ilelsImage result for greg ilels

Image result for greg ilels

A Conversation with Greg Iles about Mississippi Blood

Author Greg Iles: “Mississippi Blood”

Broken Bones | Greg Iles | A

Word on Words | NPT

Greg Iles Pulls from History for His Natchez Thriller Trilogy

Greg Iles: A Writer’s Conversation

Greg Iles Introduces Natchez Burning

The Death Factory by Greg Iles | Book Review

Natchez Burning Fans!

Book Looks – “Natchez Burning”

Greg Iles Interview Part 1 of 6

Greg Iles Interview Part 2 of 6

Greg Iles Interview Part 3 of 6

Greg Iles Interview Part 4 of 6

Greg Iles Interview Part 5 of 6

Rock Bottom Remainders – Midnight Hour

The Original Rock Bottom Remainders

Rock Bottom Remainders on The Late Late Show

Greg Iles sings “Steamroller”

dirty water, part 1 – rock bottom remainders

Rock Bottom Remainders at ALA 2012

wild thing – rock bottom remainders

Steve Martin, a banjo and RBR

Amy Tan and Airport Security

Bruce Springsteen

Roger and Ridley

Greg Iles

From Wikipedia, the free encyclopedia
Greg Iles
Born 1960 (age 56–57)
Stuttgart, Germany
Nationality American
Occupation Writer

Greg Iles (born 1960) is a novelist who lives in Mississippi. He has published 15 novels and one novella, spanning a variety of genres.

Biography

Early life

Iles was born in 1960 in Stuttgart, Germany, where his physician father ran the U.S. Embassy Medical Clinic. He was raised in Natchez, Mississippi, the setting of many of his novels.[1] After attending Trinity Episcopal Day School, he graduated from the University of Mississippi in 1983.

Career

Iles spent several years as a guitarist, singer, and songwriter in the band Frankly Scarlet.[2] He quit the band after he was married and began working on his first novel, Spandau Phoenix, a thriller about Nazi war criminal Rudolf Hess. Spandau Phoenix was published in 1993.

In 2002, Iles wrote the script 24 Hours from his novel of the same name. Rewritten by director Don Roos, it was renamed Trapped. Iles then rewrote the script during the shoot, at the request of the producers and actors.[3]

In 2011, Iles was seriously injured in a traffic accident on U.S. Route 61 near Natchez.[4] He sustained life-threatening injuries, including a ruptured aorta.[5] He was put into an induced coma for eight days, and lost his right leg below the knee. During his three-year recovery, he wrote three volumes of a trilogy set in Natchez, Mississippi, and featuring former prosecutor Penn Cage.[6][7]

Iles is a member of the literary musical group The Rock Bottom Remainders, which includes or has included authors Dave Barry, Ridley Pearson, Stephen King, Scott Turow, Amy Tan, Mitch Albom, Roy Blount, Jr., Matt Groening, and James McBride.[8] In July 2013, he co-authored Hard Listening (2013) with the group.[9] The ebook combines essays, fiction, musings, email exchanges and conversations, photographs, audio and video clips, and interactive quizzes to give readers a view into the private lives of the authors/musicians.

Works

Fiction

Nonfiction

  • Hard Listening (2013), with Rock Bottom Remainders

References

External links

Silver Dollar Group

From Wikipedia, the free encyclopedia

The Silver Dollar Group was an offshoot of the Ku Klux Klan white nationalist militant group, composed of leaderless resistance cells that took up violent actions to support Klan goals. The group was largely found in Mississippi and Louisiana, and was named for their practice of identifying themselves by carrying a silver dollar. The group is believed to have had only some twenty members.[1] The group formed in 1964 at the Shamrock Motor Hotel in Vidalia, Louisiana, amidst dissatisfaction at the lack of forceful action by Klan groups in the region.

The group killed an African American man, Frank Morris, by arson in Ferriday, Louisiana for alleged flirting with white women, and is suspected in two car bombings of NAACP leaders in Natchez, Mississippi, George Metcalfe and Wharlest Jackson.[2] Morris had a shoe repair shop in Ferriday, and died after his shoe repair shop was burned.

2007 prosecution

In 2007, Group member James Ford Seale was charged and convicted for the May 1964 kidnapping of Henry Hezekiah Dee and Charles Eddie Moore, two African-American young men in Meadville, Mississippi.[3]

References

  1. Jump up^ Quarles, C.L. (1999). The Ku Klux Klan and Related American Racialist and Antisemitic Organizations: A History and Analysis. McFarland. p. 124. ISBN 9780786406470. Retrieved January 6, 2016.
  2. Jump up^ Newton, M. (2005). The FBI and the KKK: A Critical History. p. 151. ISBN 9781476605104. Retrieved January 6, 2016.
  3. Jump up^ “Americas | US man in 1964 race attack charge”. BBC News. January 25, 2007. Retrieved February 13, 2011.

 

Read Full Post | Make a Comment ( None so far )

National Security Agency Is Spying On All American Who Use The Internet and Telephone System and They Collect and Store All Your Communications — Includes Trump and Associates — No Warrant Required If President Obama Designates You A Target — Congress Is Enabling The Turnkey Two Party Tyranny — Warrentless Searches — Congress Does Nothing To Stop It! — Videos

Posted on March 17, 2017. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Data, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, European History, External Hard Drives, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Friends, government spending, Heroes, history, Illegal, Immigration, Internal Revenue Service (IRS), IRS, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Sociology, Space, Spying, Strategy, Supreme Court, Systems, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for NSA utah data center

Image result for NSA utah data centerImage result for NSA utah data centerImage result for National security agencyImage result for National security agency

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Published on Jul 8, 2013

The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

If you think you can handle the truth, well here it is folks

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show] 

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

Polygraphin

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.