National Security Agency Spies on Congress and Israel — Nothing New Here Move Along — NSA Spies On Everybody All The Time And Collects All Your Communcations And Aggregates It When You Become A Target! — Turnkey Totalitarian Secret Security Surveillance State Is Turned On You — The Fourth Amendment Has Been Destroyed — Encrypt Everything — Video

Posted on December 30, 2015. Filed under: American History, Articles, Blogroll, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Congress, Constitution, Corruption, Crime, Culture, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Economics, Education, Employment, European History, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, Friends, government spending, history, Investments, Life, Links, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Politics, Presidential Candidates, Press, Radio, Rants, Raves, Security, Speech, Systems, Talk Radio, Terrorism, Video, War, Wealth, Welfare, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , |

 

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

 Rand Paul Disgusted at NSA Spying on Congress and Israel | Fox News

Report: NSA captured conversations of Congress members with Israeli leaders

Report Says NSA Captured Conversations Of Congress Members With Israeli Leaders

Report: NSA Wiretapped Conversations Between Israeli PM And Members Of Congress

What NSA Eavesdropping On Israel Reveals About Relations

Wall Street Journal: NSA spied on Israeli leaders

WSJ: NSA Spied Not Only On Israel But Congress During Nuke Talks – America’s Newsroom

NSA spied on Israel amid Iran talks, caught some US lawmakers’ US talks

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

NSA Surveillance and What To Do About It

ShmooCon 2014: The NSA: Capabilities and Countermeasures

Bruce Schneier: “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World”

JACOB APPELBAUM EXPOSES NSA TOOLS HACKING YOUR COMPUTER-BACK DOORS & MALWARE

Jacob Appelbaum Interview – Discusses Edward Snowden, The NSA, TOR, WikiLeaks

William Binney – NSA Hiding Extent of Surveillance From FISA Courts & Congress

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Binney – The Government is Profiling You (The NSA is Spying on You)

William Binney: NSA had 9/11 foreknowledge

NSA Spying on All Americans Part 1

NSA Spying on All Americans Part 2

How the NSA Spies on Americans (Jim Harper)

The NSA: Future Crime Unit (Jim Harper)

NSA Whistleblower William Binney the 3 words that will put you on the NSA List

NSA whistleblower William Binney Keynote at HOPE Number Nine

NSA Whistleblower William Binney: The Future of FREEDOM

Alex Jones interviews William Binney December 22nd 2015

The Alex Jones Show (3rd HOUR-VIDEO Commercial Free) Wednesday December 30 2015: Seymour Hersh

Operation “Toto” Pulling Back The Curtain: Full NSA Interview

FULL Senate Debate On NSA Spying On ALL Americans

Spying on the Homefront-PBS Frontline

State of Surveillance: Police, Privacy and Technology

The USA Freedom Act | True News

Next Future Terrifying Technology Will Blow Your Mind

Enemy of the State Movie Will Smith (1998)

Encryption as Fast As Possible

Why the NSA is breaking our encryption — and why we should care | Matthew Green | TEDxMidAtlantic

U.S. Spy Net on Israel Snares Congress

NSA’s targeting of Israeli leaders swept up the content of private conversations with U.S. lawmakers

Prime Minister Benjamin Netanyahu joined President Barack Obama last month for a meeting in the Oval Office of the White House.

President Barack Obama announced two years ago he would curtail eavesdropping on friendly heads of state after the world learned the reach of long-secret U.S. surveillance programs.

But behind the scenes, the White House decided to keep certain allies under close watch, current and former U.S. officials said. Topping the list was Israeli Prime MinisterBenjamin Netanyahu.

The U.S., pursuing a nuclear arms agreement with Iran at the time, captured communications between Mr. Netanyahu and his aides that inflamed mistrust between the two countries and planted a political minefield at home when Mr. Netanyahu later took his campaign against the deal to Capitol Hill.

The National Security Agency’s targeting of Israeli leaders and officials also swept up the contents of some of their private conversations with U.S. lawmakers and American-Jewish groups. That raised fears—an “Oh-s— moment,” one senior U.S. official said—that the executive branch would be accused of spying on Congress.

The White House kept certain allies including Israeli Prime Minister Benjamin Netanyahu under surveillance after President Obama announced the U.S. would curtail surveillance on friendly heads of state. WSJ’s Adam Entous has details on Lunch Break. Photo: Getty

White House officials believed the intercepted information could be valuable to counter Mr. Netanyahu’s campaign. They also recognized that asking for it was politically risky. So, wary of a paper trail stemming from a request, the White House let the NSA decide what to share and what to withhold, officials said. “We didn’t say, ‘Do it,’ ” a senior U.S. official said. “We didn’t say, ‘Don’t do it.’ ”

WSJ’s Adam Entous explains how the U.S. determined which world leaders to spy on after announcing it would curtail surveillance. Photo: Getty

Stepped-up NSA eavesdropping revealed to the White House how Mr. Netanyahu and his advisers had leaked details of the U.S.-Iran negotiations—learned through Israeli spying operations—to undermine the talks; coordinated talking points with Jewish-American groups against the deal; and asked undecided lawmakers what it would take to win their votes, according to current and former officials familiar with the intercepts.

Before former NSA contractor Edward Snowden exposed much of the agency’s spying operations in 2013, there was little worry in the administration about the monitoring of friendly heads of state because it was such a closely held secret. After the revelations and a White House review, Mr. Obama announced in a January 2014 speech he would curb such eavesdropping.

In closed-door debate, the Obama administration weighed which allied leaders belonged on a so-called protected list, shielding them from NSA snooping. French President François Hollande, German Chancellor Angela Merkel and other North Atlantic Treaty Organization leaders made the list, but the administration permitted the NSA to target the leaders’ top advisers, current and former U.S. officials said. Other allies were excluded from the protected list, including Recep Tayyip Erdogan, president of NATO ally Turkey, which allowed the NSA to spy on their communications at the discretion of top officials.

Privately, Mr. Obama maintained the monitoring of Mr. Netanyahu on the grounds that it served a “compelling national security purpose,” according to current and former U.S. officials. Mr. Obama mentioned the exception in his speech but kept secret the leaders it would apply to.

Israeli, German and French government officials declined to comment on NSA activities. Turkish officials didn’t respond to requests Tuesday for comment. The Office of the Director of National Intelligence and the NSA declined to comment on communications provided to the White House.

The White House stopped directly monitoring the private communications of German Chancellor Angela Merkel but authorized the National Security Agency to eavesdrop on her top advisers. PHOTO: ODD ANDERSEN/AGENCE FRANCE-

This account, stretching over two terms of the Obama administration, is based on interviews with more than two dozen current and former U.S. intelligence and administration officials and reveals for the first time the extent of American spying on the Israeli prime minister.

Taking office

After Mr. Obama’s 2008 presidential election, U.S. intelligence officials gave his national-security team a one-page questionnaire on priorities. Included on the form was a box directing intelligence agencies to focus on “leadership intentions,” a category that relies on electronic spying to monitor world leaders.

The NSA was so proficient at monitoring heads of state that it was common for the agency to deliver a visiting leader’s talking points to the president in advance. “Who’s going to look at that box and say, ‘No, I don’t want to know what world leaders are saying,’ ” a former Obama administration official said.

In early intelligence briefings, Mr. Obama and his top advisers were told what U.S. spy agencies thought of world leaders, including Mr. Netanyahu, who at the time headed the opposition Likud party.

Michael Hayden, who led the NSA and the Central Intelligence Agency during the George W. Bush administration, described the intelligence relationship between the U.S. and Israel as “the most combustible mixture of intimacy and caution that we have.”

The NSA helped Israel expand its electronic spy apparatus—known as signals intelligence—in the late 1970s. The arrangement gave Israel access to the communications of its regional enemies, information shared with the U.S. Israel’s spy chiefs later suspected the NSA was tapping into their systems.

When Mr. Obama took office, the NSA and its Israeli counterpart, Unit 8200, worked together against shared threats, including a campaign to sabotage centrifuges for Iran’s nuclear program. At the same time, the U.S. and Israeli intelligence agencies targeted one another, stoking tensions.

“Intelligence professionals have a saying: There are no friendly intelligence services,” said Mike Rogers, former Republican chairman of the House Intelligence Committee.

Early in the Obama presidency, for example, Unit 8200 gave the NSA a hacking tool the NSA later discovered also told Israel how the Americans used it. It wasn’t the only time the NSA caught Unit 8200 poking around restricted U.S. networks. Israel would say intrusions were accidental, one former U.S. official said, and the NSA would respond, “Don’t worry. We make mistakes, too.”

In 2011 and 2012, the aims of Messrs. Netanyahu and Obama diverged over Iran. Mr. Netanyahu prepared for a possible strike against an Iranian nuclear facility, as Mr. Obama pursued secret talks with Tehran without telling Israel.

Convinced Mr. Netanyahu would attack Iran without warning the White House, U.S. spy agencies ramped up their surveillance, with the assent of Democratic and Republican lawmakers serving on congressional intelligence committees.

By 2013, U.S. intelligence agencies determined Mr. Netanyahu wasn’t going to strike Iran. But they had another reason to keep watch. The White House wanted to know if Israel had learned of the secret negotiations. U.S. officials feared Iran would bolt the talks and pursue an atomic bomb if news leaked.

The NSA had, in some cases, spent decades placing electronic implants in networks around the world to collect phone calls, text messages and emails. Removing them or turning them off in the wake of the Snowden revelations would make it difficult, if not impossible, to re-establish access in the future, U.S. intelligence officials warned the White House.

Instead of removing the implants, Mr. Obama decided to shut off the NSA’s monitoring of phone numbers and email addresses of certain allied leaders—a move that could be reversed by the president or his successor.

There was little debate over Israel. “Going dark on Bibi? Of course we wouldn’t do that,” a senior U.S. official said, using Mr. Netanyahu’s nickname.

One tool was a cyber implant in Israeli networks that gave the NSA access to communications within the Israeli prime minister’s office.

Given the appetite for information about Mr. Netanyahu’s intentions during the U.S.-Iran negotiations, the NSA tried to send updates to U.S. policy makers quickly, often in less than six hours after a notable communication was intercepted, a former official said.

NSA intercepts convinced the White House last year that Israel was spying on negotiations under way in Europe. Israeli officials later denied targeting U.S. negotiators, saying they had won access to U.S. positions by spying only on the Iranians.

By late 2014, White House officials knew Mr. Netanyahu wanted to block the emerging nuclear deal but didn’t know how.

On Jan. 8, John Boehner, then the Republican House Speaker, and incoming Republican Senate Majority Leader Mitch McConnell agreed on a plan. They would invite Mr. Netanyahu to deliver a speech to a joint session of Congress. A day later, Mr. Boehner called Ron Dermer, the Israeli ambassador, to get Mr. Netanyahu’s agreement.

Despite NSA surveillance, Obama administration officials said they were caught off guard when Mr. Boehner announced the invitation on Jan. 21.

Soon after, Israel’s lobbying campaign against the deal went into full swing on Capitol Hill, and it didn’t take long for administration and intelligence officials to realize the NSA was sweeping up the content of conversations with lawmakers.

The message to the NSA from the White House amounted to: “You decide” what to deliver, a former intelligence official said.

NSA rules governing intercepted communications “to, from or about” Americans date back to the Cold War and require obscuring the identities of U.S. individuals and U.S. corporations. An American is identified only as a “U.S. person” in intelligence reports; a U.S. corporation is identified only as a “U.S. organization.” Senior U.S. officials can ask for names if needed to understand the intelligence information.

The Obama administration included French President François Hollande on a so-called protected list, shielding him from NSA snooping. PHOTO: PHILIPPE WOJAZER/REUTERS

The rules were tightened in the early 1990s to require that intelligence agencies inform congressional committees when a lawmaker’s name was revealed to the executive branch in summaries of intercepted communications.

A 2011 NSA directive said direct communications between foreign intelligence targets and members of Congress should be destroyed when they are intercepted. But the NSA director can issue a waiver if he determines the communications contain “significant foreign intelligence.”

The NSA has leeway to collect and disseminate intercepted communications involving U.S. lawmakers if, for example, foreign ambassadors send messages to their foreign ministries that recount their private meetings or phone calls with members of Congress, current and former officials said.

“Either way, we got the same information,” a former official said, citing detailed reports prepared by the Israelis after exchanges with lawmakers.

During Israel’s lobbying campaign in the months before the deal cleared Congress in September, the NSA removed the names of lawmakers from intelligence reports and weeded out personal information. The agency kept out “trash talk,” officials said, such as personal attacks on the executive branch.

Administration and intelligence officials said the White House didn’t ask the NSA to identify any lawmakers during this period.

“From what I can tell, we haven’t had a problem with how incidental collection has been handled concerning lawmakers,” said Rep. Adam Schiff, a California Democrat and the ranking member of the House Permanent Select Committee on Intelligence. He declined to comment on any specific communications between lawmakers and Israel.

The NSA reports allowed administration officials to peer inside Israeli efforts to turn Congress against the deal. Mr. Dermer was described as coaching unnamed U.S. organizations—which officials could tell from the context were Jewish-American groups—on lines of argument to use with lawmakers, and Israeli officials were reported pressing lawmakers to oppose the deal.

“These allegations are total nonsense,” said a spokesman for the Embassy of Israel in Washington.

A U.S. intelligence official familiar with the intercepts said Israel’s pitch to undecided lawmakers often included such questions as: “How can we get your vote? What’s it going to take?”

NSA intelligence reports helped the White House figure out which Israeli government officials had leaked information from confidential U.S. briefings. When confronted by the U.S., Israel denied passing on the briefing materials.

The agency’s goal was “to give us an accurate illustrative picture of what [the Israelis] were doing,” a senior U.S. official said.

Just before Mr. Netanyahu’s address to Congress in March, the NSA swept up Israeli messages that raised alarms at the White House: Mr. Netanyahu’s office wanted details from Israeli intelligence officials about the latest U.S. positions in the Iran talks, U.S. officials said.

A day before the speech, Secretary of State John Kerry made an unusual disclosure. Speaking to reporters in Switzerland, Mr. Kerry said he was concerned Mr. Netanyahu would divulge “selective details of the ongoing negotiations.”

The State Department said Mr. Kerry was responding to Israeli media reports that Mr. Netanyahu wanted to use his speech to make sure U.S. lawmakers knew the terms of the Iran deal.

Intelligence officials said the media reports allowed the U.S. to put Mr. Netanyahu on notice without revealing they already knew his thinking. The prime minister mentioned no secrets during his speech to Congress.

In the final months of the campaign, NSA intercepts yielded few surprises. Officials said the information reaffirmed what they heard directly from lawmakers and Israeli officials opposed to Mr. Netanyahu’s campaign—that the prime minister was focused on building opposition among Democratic lawmakers.

The NSA intercepts, however, revealed one surprise. Mr. Netanyahu and some of his allies voiced confidence they could win enough votes.

https://www.youtube.com/watch?v=kVRFm5Er6OI

Encryption

From Wikipedia, the free encyclopedia
“Encrypt” redirects here. For the film, see Encrypt (film).
This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography.

In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.[1] Encryption does not of itself prevent interception, but denies the message content to the interceptor.[2]:374 In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.[2] For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Types of encryption

Symmetric key encryption

In symmetric-key schemes,[3] the encryption and decryption keys are the same. Communicating parties must have the same key before they can achieve secure communication.

Public key encryption

Illustration of how encryption is used within servers Public key encryption.

In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.[4] Public-key encryption was first described in a secret document in 1973;[5] before then all encryption schemes were symmetric-key (also called private-key).[2]:478

A publicly available public key encryption application called Pretty Good Privacy (PGP) was written in 1991 by Phil Zimmermann, and distributed free of charge with source code; it was purchased by Symantec in 2010 and is regularly updated.[6]

Uses of encryption

Encryption has long been used by military and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage.[7] Encryption can be used to protect data “at rest”, such as information stored on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers’ personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems, which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection), is another somewhat different example of using encryption on data at rest.[8]

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years.[9] Data should also be encrypted when transmitted across networks in order to protect against eavesdropping of network traffic by unauthorized users.[10]

Message verification

Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of amessage authentication code (MAC) or a digital signature. Standards for cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single error in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g., traffic analysis, TEMPEST, or Trojan horse.[11]

Digital signature and encryption must be applied to the ciphertext when it is created (typically on the same device used to compose the message) to avoid tampering; otherwise any node between the sender and the encryption agent could potentially tamper with it. Encrypting at the time of creation is only secure if the encryption device itself has not been tampered with.

See also

References

  1. Jump up^ “What is Encryption? | EFF Surveillance Self-Defense Project.” What is Encryption? | EFF Surveillance Self-Defense Project. Surveillance Self-Defense Project, n.d. Web. 03 Nov. 2014. <https://ssd.eff.org/en/module/what-encryption>.
  2. ^ Jump up to:a b c Goldreich, Oded. Foundations of Cryptography: Volume 2, Basic Applications. Vol. 2. Cambridge university press, 2004.
  3. Jump up^ Symmetric-key encryption software
  4. Jump up^ Bellare, Mihir. “Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.” Springer Berlin Heidelberg, 2000. Page 1.
  5. Jump up^ “Public-Key Encryption – how GCHQ got there first!”. gchq.gov.uk. Archived from the original on May 19, 2010.
  6. Jump up^ “Symantec buys encryption specialist PGP for $300M”. Computerworld. 2010-04-29. Retrieved 2010-04-29.
  7. Jump up^ Robert Richardson, 2008 CSI Computer Crime and Security Survey at 19.i.cmpnet.com
  8. Jump up^ https://www.eff.org/issues/drm
  9. Jump up^ Fiber Optic Networks Vulnerable to Attack, Information Security Magazine, November 15, 2006, Sandra Kay Miller
  10. Jump up^ https://security.berkeley.edu/content/data-encryption-transit-guideline
  11. Jump up^ http://usa.kaspersky.com/internet-security-center/threats/trojans#.VV3oaWDTvfY

Further reading

https://en.wikipedia.org/wiki/Encryption

Read Full Post | Make a Comment ( None so far )

Enter Contest For Talk Radio Handle or Nickname for President Barack Obama

Posted on February 16, 2009. Filed under: Blogroll, Communications, People, Politics, Talk Radio | Tags: , , , , , , , , , , |

Presidential Code Names

 

Obama – The Renegade – CODENAME – What Are The Chances?

Talk radio hosts have a number of nicknames or handles for President Barack Obama.

My own entry for a handle for President Obama is  P3  which is an abbreviation for Puppet President Pinocchio.

Please enter you own entry in the comments box below.

To get your creative juices flowing, here are Presidential nicknames of past Presidents of the United States:

United States Presidents

*****  ************************  NAME**********  ***Party******  *Inaugurated*  *TermEnded*  Nickname*********************************************
  1   George   Washington   Federalist   04/30/1789   03/03/1797   Father of His Country
  2   John   Adams   Federalist   03/04/1797   03/03/1801   Atlas of Independence
  3   Thomas   Jefferson   Dem/Rep   03/04/1801   03/03/1809   Man of the People ; Sage of Monticello
  4   James   Madison   Dem/Rep   03/04/1809   03/03/1817   Father of Constitution
  5   James   Monroe   Dem/Rep   03/04/1817   03/03/1825   The Last Cocked Hat ; Era-of-Good-Feelings President
  6   John Quincy   Adams   Dem-Rep   03/04/1825   03/03/1829   Old Man Eloquent
  7   Andrew   Jackson   Democratic   03/04/1829   03/03/1837   Old Hickory
  8   Martin   Van Buren   Democratic   03/04/1837   03/03/1841   Little Magician ; Red Fox of Kinderhook
  9   William Henry   Harrison   Whig   03/04/1841   04/04/1841   Old Tippecanoe ; Old Tip
  10   John   Tyler   Whig   04/06/1841   03/03/1845   Accidental President ; His Accidency
  11   James Knox   Polk   Democratic   03/04/1845   03/03/1849   Young Hickory
  12   Zachary   Taylor   Whig   03/05/1849   07/09/1850   Old Rough and Ready
  13   Millard   Fillmore   Whig   07/09/1850   03/03/1853   American Louis Philippe
  14   Franklin   Pierce   Democratic   03/04/1853   03/03/1857   Young Hickory of the Granite Hills
  15   James   Buchanan   Democratic   03/04/1857   03/03/1861   Old Buck
  16   Abraham   Lincoln   Republican   03/04/1861   04/15/1865   Honest Abe ; Illinois Rail-Splitter
  17   Andrew   Johnson   Democratic   04/15/1865   03/03/1869   None
  18   Ulysses Simpson   Grant   Republican   03/04/1869   03/03/1877   Hero of Appomattox
  19   Rutherford Birchard   Hayes   Republican   03/04/1877   03/03/1881   Dark-Horse President
  20   James Abram   Garfield   Republican   03/04/1881   09/19/1881   None
  21   Chester Alan   Arthur   Republican   09/19/1881   03/03/1885   The Gentleman Boss ; Elegant Arthur
  22   Grover   Cleveland   Democratic   03/04/1885   03/03/1889   None
  23   Benjamin   Harrison   Republican   03/04/1889   03/03/1893   Kid Gloves Harrison ; Little Ben
  24   Grover   Cleveland   Democratic   03/04/1893   03/03/1897   None
  25   William   McKinley   Republican   03/04/1897   09/14/1901   Idol of Ohio
  26   Theodore   Roosevelt   Republican   09/14/1901   03/03/1909   TR ; Trust-Buster ; Teddy
  27   William Howard   Taft   Republican   03/04/1909   03/03/1913   None
  28   Woodrow   Wilson   Democratic   03/04/1913   03/03/1921   Schoolmaster in Politics
  29   Warren Gamaliel   Harding   Republican   03/04/1921   08/02/1923   None
  30   Calvin   Coolidge   Republican   08/03/1923   03/03/1929   Silent Cal
  31   Herbert Clark   Hoover   Republican   03/04/1929   03/03/1933   None
  32   Franklin Delano   Roosevelt   Democratic   03/04/1933   04/12/1945   FDR
  33   Harry S   Truman   Democratic   04/12/1945   01/20/1953   Give ‘Em Hell Harry
  34   Dwight David   Eisenhower   Republican   01/20/1953   01/20/1961   Ike
  35   John Fitzgerald   Kennedy   Democratic   01/20/1961   11/22/1963   JFK
  36   Lyndon Baines   Johnson   Democratic   11/22/1963   01/20/1969   LBJ
  37   Richard Milhous   Nixon   Republican   01/20/1969   08/09/1974   Tricky Dick
  38   Gerald Rudolph   Ford   Republican   08/09/1974   01/20/1977   Jerry
  39   James Earl   Carter, Jr.   Democratic   01/20/1977   01/20/1981   Jimmy
  40   Ronald Wilson   Reagan   Republican   01/20/1981   01/20/1989   The Gipper ; The Great Communicator
  41   George Herbert Walker   Bush   Republican   01/20/1989   01/20/1993   Poppy
  42   William Jefferson   Clinton   Democratic   01/20/1993   01/20/2001   Bill
  43   George Walker   Bush   Republican   01/20/2001   01/20/2009  
  44   Barack Hussein   Obama   Democratic   01/20/2009    

 http://www.1728.com/page5.htm

 

The Secret Service also has code names for the President:

Secret Service code name

“The United States Secret Service uses code names for U.S. presidents, first ladies, and other prominent persons and locations.[1] The use of such names was originally for security purposes and dates to a time when sensitive electronic communications were not routinely encrypted; today, the names simply serve for purposes of brevity, clarity, and tradition.[2][3] The Secret Service does not choose these names, however. The White House Communications Agency assigns these names.[4] WHCA was originally created as the White House Signal Detachment under Franklin Roosevelt.

The WHCA, an agency of the White House Military Office, is headquartered at Anacostia Navy Yard and consists of six staff elements and seven organizational units. WHCA also has supporting detachments in Washington, D.C. and various locations throughout the United States of America.

According to established protocol, ‘good’ codewords are unambiguous words that can be easily pronounced and readily understood by those who transmit and receive voice messages by radio or telephone regardless of their native language. Traditionally, all family members’ code names start with the same letter.[5]

The code names change over time for security purposes, but are often publicly known. For security, codenames are generally picked from a list of such ‘good’ words, but avoiding the use of common words which could likely be intended to mean its normal definition. …”

Presidents of the United States and their families

  • Harry S. Truman – General[4]
  • Dwight Eisenhower – Scorecard[1] or Providence[6]
    • Mamie Eisenhower – Springtime[6]
  • John F. Kennedy – Lancer[6]
    • Jacqueline Kennedy – Lace[6][7]
    • Caroline Kennedy – Lyric[6]
    • John F. Kennedy, Jr. – Lark[8]
    • Rose Kennedy – Coppertone[9]
  • Lyndon Johnson – Volunteer[6]
    • Lady Bird Johnson – Victoria[6]
    • Lynda Bird Johnson – Velvet[6]
    • Luci Baines Johnson – Venus[6]
  • Richard Nixon – Searchlight[6]
    • Pat Nixon – Starlight[6]
  • Gerald Ford – Pass Key[6]
    • Betty Ford – Pinafore[6]
    • Susan Ford – Panda[6]
    • Michael Ford – Professor[6]
    • Jack Ford – Packman[6]
  • Jimmy Carter – Deacon[6]
    • Rosalynn Carter – Dancer[6]
    • Amy Carter – Dynamo[6]
    • Chip Carter – Diamond[9]
    • Jack Carter – Derby[9]
    • Jeff Carter – Deckhand[9]
  • Ronald Reagan – Rawhide[6][10]
    • Nancy Reagan – Rainbow[6]
    • Maureen Reagan – Rhyme, Rosebud[11]
    • Michael Reagan – Riddler[11]
    • Patti Davis – Ribbon[6]
    • Ron Reagan – Reliant[6]
    • Doria Reagan – Radiant[6]
  • George H. W. Bush – Timberwolf[6]
    • Barbara Bush – Snowbank[12] or Tranquility[6]
    • Marvin Bush – Tuner[9]
    • Neil Bush – Trapline[9]
    • Jeb Bush – Tripper[9]
  • Bill Clinton – Eagle[6]
    • Hillary Rodham Clinton – Evergreen[6]
    • Chelsea Clinton – Energy[6]
  • George W. Bush – Tumbler[13] or Trailblazer[10][6]
    • Laura Bush – Tempo[6][10]
    • Barbara Bush – Turquoise[14]
    • Jenna Bush – Twinkle[9]
  • Barack Obama – Renegade[15][10]
    • Michelle Obama – Renaissance[16][10]
    • Malia Obama – Radiance[4][10]
    • Sasha Obama – Rosebud[4][10]

http://en.wikipedia.org/wiki/Secret_Service_codename

I am really LOL under Obama’s–Renegade–I was hoping they would select Radical–close but no cigar!

 

Background Articles and Videos

Presidential Code Names

secret service

Barack Obama’s new Secret Service code name: Renegade

FROM ASSOCIATED PRESS  

“…President-elect Barack Obama — aka Renegade — had a say in choosing the code name that his protectors use when they’re whispering into those microphones in their sleeves. He was given his choice of several names starting with R.

And in keeping with the tradition of having all family members’ code names start with the same letter, future first lady Michelle Obama is Renaissance, and daughters Sasha and Malia are known as Rosebud and Radiance, respectively.

As for President George W. Bush and wife, Laura, whatever else their new lives hold for them, they can take their alternate identities as Trailblazer and Tempo with them. They’re still entitled to Secret Service protection.

Lists of possible code names for those who receive Secret Service protection are drawn up by the White House Communications Agency, a branch of the military that serves the White House and Secret Service. …”

http://www.suntimes.com/news/politics/obama/1278009,secret-service-barack-obama111308.article

 

 Obama Family Secret Service Code Names Plus What School Will Sasha and Malia Attend?

Joe Biden’s Secret Service code name; Plus: What Obama’s should have been

By Michelle Malkin

“…It’s “Celtic.”

“Hokum,” “Malarkey,” and “Home Depot” were already taken, I guess.

Go ahead and offer your own suggestions: Name that loon!

***

The Obamas all got “R” names:

Barack – Renegade
Michelle – Renaissance
Malia and Sasha – Radiance and Rosebud

Barack’s real code name, of course, is “Redistributor.” …”

http://michellemalkin.com/2008/11/11/joe-bidens-secret-service-code-name/

 

Star Wars – Episode IV – Trailer (original 1977)

 

Star Wars Ep. V- Final Scene & End Credits

 

Related Posts On Pronk Palisades

Barack Obama America’s Puppet President Pinocchio –The Transparent Lies–Ears and Nose Are Growing?

 

 

Read Full Post | Make a Comment ( 1 so far )

Liked it here?
Why not try sites on the blogroll...