National Security Agency Is Spying On All American Who Use The Internet and Telephone System and They Collect and Store All Your Communications — Includes Trump and Associates — No Warrant Required If President Obama Designates You A Target — Congress Is Enabling The Turnkey Two Party Tyranny — Warrentless Searches — Congress Does Nothing To Stop It! — Videos

Posted on March 17, 2017. Filed under: American History, Articles, Blogroll, Books, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Computers, Congress, conservatives, Constitution, Corruption, Crime, Crisis, Data, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Demographics, Documentary, European History, External Hard Drives, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Friends, government spending, Heroes, history, Illegal, Immigration, Internal Revenue Service (IRS), IRS, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Middle East, National Security Agency (NSA), National Security Agency (NSA_, Non-Fiction, People, Philosophy, Photos, Police, Politics, Press, Programming, Psychology, Radio, Radio, Rants, Raves, Raymond Thomas Pronk, Regulations, Religion, Security, Sociology, Space, Spying, Strategy, Supreme Court, Systems, Talk Radio, Taxation, Taxes, Technology, Television, Terrorism, Video, Wahhabism, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , |

Image result for National security agencyImage result for NSA utah data center

Image result for NSA utah data centerImage result for NSA utah data centerImage result for National security agencyImage result for National security agency

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Published on Jul 8, 2013

The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.

During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.

All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature.[5] This action was challenged by a number of groups, including Congress, as unconstitutional.

The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic.[6] Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act.[7] The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF).[8] FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both.[9] In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11][12][13] The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication.[14] Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004.[15] In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.

FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying

If you think you can handle the truth, well here it is folks

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show] 

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25]This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35]such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56]It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

Polygraphin

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114]Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156]Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting[edit]

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163]In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165]but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]

Computing[edit]

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[168]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[171] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[175] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[176] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[177] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[175]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[174]

Following the signing in 1946–1956[178] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[179] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[180] New Zealand.[181]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[192]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[193] Today it is a legacy system, and several NSA stations are closing.[175]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[194] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[195]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[206]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[219]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[224] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[225] based on documentation provided by former AT&T technician Mark Klein.[226]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235] Rasmussen Reports found that 59% of Americans disapprove,[236] Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]

July 2015 – WikiLeaks: Espionage against German federal ministries[edit]

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]

Suspected responsibility for hacking operations by the Equation Group[edit]

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31

Software backdoors

Linux kerne

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[263]However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[264]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
Microsoft Windows
Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269]Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]

Role in scientific research and development[

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[278]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[279][280]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[281]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[280]
  • KY-57 VINSON tactical radio voice encryptor[281]
  • KG-84 Dedicated Data Encryption/Decryption[281]
  • STU-III secure telephone unit,[281] phased out by the STE[282]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]

Legality

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs

In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

https://en.wikipedia.org/wiki/National_Security_Agency

Read Full Post | Make a Comment ( None so far )

National Security Agency Spies on Congress and Israel — Nothing New Here Move Along — NSA Spies On Everybody All The Time And Collects All Your Communcations And Aggregates It When You Become A Target! — Turnkey Totalitarian Secret Security Surveillance State Is Turned On You — The Fourth Amendment Has Been Destroyed — Encrypt Everything — Video

Posted on December 30, 2015. Filed under: American History, Articles, Blogroll, British History, Business, Central Intelligence Agency (CIA), Communications, Computers, Congress, Constitution, Corruption, Crime, Culture, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Economics, Education, Employment, European History, External Hard Drives, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom, Friends, government spending, history, Investments, Life, Links, media, Middle East, Money, National Security Agency (NSA), National Security Agency (NSA_, Politics, Presidential Candidates, Press, Radio, Rants, Raves, Security, Speech, Systems, Talk Radio, Terrorism, Video, War, Wealth, Welfare, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , |

 

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

 Rand Paul Disgusted at NSA Spying on Congress and Israel | Fox News

Report: NSA captured conversations of Congress members with Israeli leaders

Report Says NSA Captured Conversations Of Congress Members With Israeli Leaders

Report: NSA Wiretapped Conversations Between Israeli PM And Members Of Congress

What NSA Eavesdropping On Israel Reveals About Relations

Wall Street Journal: NSA spied on Israeli leaders

WSJ: NSA Spied Not Only On Israel But Congress During Nuke Talks – America’s Newsroom

NSA spied on Israel amid Iran talks, caught some US lawmakers’ US talks

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

NSA Surveillance and What To Do About It

ShmooCon 2014: The NSA: Capabilities and Countermeasures

Bruce Schneier: “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World”

JACOB APPELBAUM EXPOSES NSA TOOLS HACKING YOUR COMPUTER-BACK DOORS & MALWARE

Jacob Appelbaum Interview – Discusses Edward Snowden, The NSA, TOR, WikiLeaks

William Binney – NSA Hiding Extent of Surveillance From FISA Courts & Congress

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Binney – The Government is Profiling You (The NSA is Spying on You)

William Binney: NSA had 9/11 foreknowledge

NSA Spying on All Americans Part 1

NSA Spying on All Americans Part 2

How the NSA Spies on Americans (Jim Harper)

The NSA: Future Crime Unit (Jim Harper)

NSA Whistleblower William Binney the 3 words that will put you on the NSA List

NSA whistleblower William Binney Keynote at HOPE Number Nine

NSA Whistleblower William Binney: The Future of FREEDOM

Alex Jones interviews William Binney December 22nd 2015

The Alex Jones Show (3rd HOUR-VIDEO Commercial Free) Wednesday December 30 2015: Seymour Hersh

Operation “Toto” Pulling Back The Curtain: Full NSA Interview

FULL Senate Debate On NSA Spying On ALL Americans

Spying on the Homefront-PBS Frontline

State of Surveillance: Police, Privacy and Technology

The USA Freedom Act | True News

Next Future Terrifying Technology Will Blow Your Mind

Enemy of the State Movie Will Smith (1998)

Encryption as Fast As Possible

Why the NSA is breaking our encryption — and why we should care | Matthew Green | TEDxMidAtlantic

U.S. Spy Net on Israel Snares Congress

NSA’s targeting of Israeli leaders swept up the content of private conversations with U.S. lawmakers

Prime Minister Benjamin Netanyahu joined President Barack Obama last month for a meeting in the Oval Office of the White House.

President Barack Obama announced two years ago he would curtail eavesdropping on friendly heads of state after the world learned the reach of long-secret U.S. surveillance programs.

But behind the scenes, the White House decided to keep certain allies under close watch, current and former U.S. officials said. Topping the list was Israeli Prime MinisterBenjamin Netanyahu.

The U.S., pursuing a nuclear arms agreement with Iran at the time, captured communications between Mr. Netanyahu and his aides that inflamed mistrust between the two countries and planted a political minefield at home when Mr. Netanyahu later took his campaign against the deal to Capitol Hill.

The National Security Agency’s targeting of Israeli leaders and officials also swept up the contents of some of their private conversations with U.S. lawmakers and American-Jewish groups. That raised fears—an “Oh-s— moment,” one senior U.S. official said—that the executive branch would be accused of spying on Congress.

The White House kept certain allies including Israeli Prime Minister Benjamin Netanyahu under surveillance after President Obama announced the U.S. would curtail surveillance on friendly heads of state. WSJ’s Adam Entous has details on Lunch Break. Photo: Getty

White House officials believed the intercepted information could be valuable to counter Mr. Netanyahu’s campaign. They also recognized that asking for it was politically risky. So, wary of a paper trail stemming from a request, the White House let the NSA decide what to share and what to withhold, officials said. “We didn’t say, ‘Do it,’ ” a senior U.S. official said. “We didn’t say, ‘Don’t do it.’ ”

WSJ’s Adam Entous explains how the U.S. determined which world leaders to spy on after announcing it would curtail surveillance. Photo: Getty

Stepped-up NSA eavesdropping revealed to the White House how Mr. Netanyahu and his advisers had leaked details of the U.S.-Iran negotiations—learned through Israeli spying operations—to undermine the talks; coordinated talking points with Jewish-American groups against the deal; and asked undecided lawmakers what it would take to win their votes, according to current and former officials familiar with the intercepts.

Before former NSA contractor Edward Snowden exposed much of the agency’s spying operations in 2013, there was little worry in the administration about the monitoring of friendly heads of state because it was such a closely held secret. After the revelations and a White House review, Mr. Obama announced in a January 2014 speech he would curb such eavesdropping.

In closed-door debate, the Obama administration weighed which allied leaders belonged on a so-called protected list, shielding them from NSA snooping. French President François Hollande, German Chancellor Angela Merkel and other North Atlantic Treaty Organization leaders made the list, but the administration permitted the NSA to target the leaders’ top advisers, current and former U.S. officials said. Other allies were excluded from the protected list, including Recep Tayyip Erdogan, president of NATO ally Turkey, which allowed the NSA to spy on their communications at the discretion of top officials.

Privately, Mr. Obama maintained the monitoring of Mr. Netanyahu on the grounds that it served a “compelling national security purpose,” according to current and former U.S. officials. Mr. Obama mentioned the exception in his speech but kept secret the leaders it would apply to.

Israeli, German and French government officials declined to comment on NSA activities. Turkish officials didn’t respond to requests Tuesday for comment. The Office of the Director of National Intelligence and the NSA declined to comment on communications provided to the White House.

The White House stopped directly monitoring the private communications of German Chancellor Angela Merkel but authorized the National Security Agency to eavesdrop on her top advisers. PHOTO: ODD ANDERSEN/AGENCE FRANCE-

This account, stretching over two terms of the Obama administration, is based on interviews with more than two dozen current and former U.S. intelligence and administration officials and reveals for the first time the extent of American spying on the Israeli prime minister.

Taking office

After Mr. Obama’s 2008 presidential election, U.S. intelligence officials gave his national-security team a one-page questionnaire on priorities. Included on the form was a box directing intelligence agencies to focus on “leadership intentions,” a category that relies on electronic spying to monitor world leaders.

The NSA was so proficient at monitoring heads of state that it was common for the agency to deliver a visiting leader’s talking points to the president in advance. “Who’s going to look at that box and say, ‘No, I don’t want to know what world leaders are saying,’ ” a former Obama administration official said.

In early intelligence briefings, Mr. Obama and his top advisers were told what U.S. spy agencies thought of world leaders, including Mr. Netanyahu, who at the time headed the opposition Likud party.

Michael Hayden, who led the NSA and the Central Intelligence Agency during the George W. Bush administration, described the intelligence relationship between the U.S. and Israel as “the most combustible mixture of intimacy and caution that we have.”

The NSA helped Israel expand its electronic spy apparatus—known as signals intelligence—in the late 1970s. The arrangement gave Israel access to the communications of its regional enemies, information shared with the U.S. Israel’s spy chiefs later suspected the NSA was tapping into their systems.

When Mr. Obama took office, the NSA and its Israeli counterpart, Unit 8200, worked together against shared threats, including a campaign to sabotage centrifuges for Iran’s nuclear program. At the same time, the U.S. and Israeli intelligence agencies targeted one another, stoking tensions.

“Intelligence professionals have a saying: There are no friendly intelligence services,” said Mike Rogers, former Republican chairman of the House Intelligence Committee.

Early in the Obama presidency, for example, Unit 8200 gave the NSA a hacking tool the NSA later discovered also told Israel how the Americans used it. It wasn’t the only time the NSA caught Unit 8200 poking around restricted U.S. networks. Israel would say intrusions were accidental, one former U.S. official said, and the NSA would respond, “Don’t worry. We make mistakes, too.”

In 2011 and 2012, the aims of Messrs. Netanyahu and Obama diverged over Iran. Mr. Netanyahu prepared for a possible strike against an Iranian nuclear facility, as Mr. Obama pursued secret talks with Tehran without telling Israel.

Convinced Mr. Netanyahu would attack Iran without warning the White House, U.S. spy agencies ramped up their surveillance, with the assent of Democratic and Republican lawmakers serving on congressional intelligence committees.

By 2013, U.S. intelligence agencies determined Mr. Netanyahu wasn’t going to strike Iran. But they had another reason to keep watch. The White House wanted to know if Israel had learned of the secret negotiations. U.S. officials feared Iran would bolt the talks and pursue an atomic bomb if news leaked.

The NSA had, in some cases, spent decades placing electronic implants in networks around the world to collect phone calls, text messages and emails. Removing them or turning them off in the wake of the Snowden revelations would make it difficult, if not impossible, to re-establish access in the future, U.S. intelligence officials warned the White House.

Instead of removing the implants, Mr. Obama decided to shut off the NSA’s monitoring of phone numbers and email addresses of certain allied leaders—a move that could be reversed by the president or his successor.

There was little debate over Israel. “Going dark on Bibi? Of course we wouldn’t do that,” a senior U.S. official said, using Mr. Netanyahu’s nickname.

One tool was a cyber implant in Israeli networks that gave the NSA access to communications within the Israeli prime minister’s office.

Given the appetite for information about Mr. Netanyahu’s intentions during the U.S.-Iran negotiations, the NSA tried to send updates to U.S. policy makers quickly, often in less than six hours after a notable communication was intercepted, a former official said.

NSA intercepts convinced the White House last year that Israel was spying on negotiations under way in Europe. Israeli officials later denied targeting U.S. negotiators, saying they had won access to U.S. positions by spying only on the Iranians.

By late 2014, White House officials knew Mr. Netanyahu wanted to block the emerging nuclear deal but didn’t know how.

On Jan. 8, John Boehner, then the Republican House Speaker, and incoming Republican Senate Majority Leader Mitch McConnell agreed on a plan. They would invite Mr. Netanyahu to deliver a speech to a joint session of Congress. A day later, Mr. Boehner called Ron Dermer, the Israeli ambassador, to get Mr. Netanyahu’s agreement.

Despite NSA surveillance, Obama administration officials said they were caught off guard when Mr. Boehner announced the invitation on Jan. 21.

Soon after, Israel’s lobbying campaign against the deal went into full swing on Capitol Hill, and it didn’t take long for administration and intelligence officials to realize the NSA was sweeping up the content of conversations with lawmakers.

The message to the NSA from the White House amounted to: “You decide” what to deliver, a former intelligence official said.

NSA rules governing intercepted communications “to, from or about” Americans date back to the Cold War and require obscuring the identities of U.S. individuals and U.S. corporations. An American is identified only as a “U.S. person” in intelligence reports; a U.S. corporation is identified only as a “U.S. organization.” Senior U.S. officials can ask for names if needed to understand the intelligence information.

The Obama administration included French President François Hollande on a so-called protected list, shielding him from NSA snooping. PHOTO: PHILIPPE WOJAZER/REUTERS

The rules were tightened in the early 1990s to require that intelligence agencies inform congressional committees when a lawmaker’s name was revealed to the executive branch in summaries of intercepted communications.

A 2011 NSA directive said direct communications between foreign intelligence targets and members of Congress should be destroyed when they are intercepted. But the NSA director can issue a waiver if he determines the communications contain “significant foreign intelligence.”

The NSA has leeway to collect and disseminate intercepted communications involving U.S. lawmakers if, for example, foreign ambassadors send messages to their foreign ministries that recount their private meetings or phone calls with members of Congress, current and former officials said.

“Either way, we got the same information,” a former official said, citing detailed reports prepared by the Israelis after exchanges with lawmakers.

During Israel’s lobbying campaign in the months before the deal cleared Congress in September, the NSA removed the names of lawmakers from intelligence reports and weeded out personal information. The agency kept out “trash talk,” officials said, such as personal attacks on the executive branch.

Administration and intelligence officials said the White House didn’t ask the NSA to identify any lawmakers during this period.

“From what I can tell, we haven’t had a problem with how incidental collection has been handled concerning lawmakers,” said Rep. Adam Schiff, a California Democrat and the ranking member of the House Permanent Select Committee on Intelligence. He declined to comment on any specific communications between lawmakers and Israel.

The NSA reports allowed administration officials to peer inside Israeli efforts to turn Congress against the deal. Mr. Dermer was described as coaching unnamed U.S. organizations—which officials could tell from the context were Jewish-American groups—on lines of argument to use with lawmakers, and Israeli officials were reported pressing lawmakers to oppose the deal.

“These allegations are total nonsense,” said a spokesman for the Embassy of Israel in Washington.

A U.S. intelligence official familiar with the intercepts said Israel’s pitch to undecided lawmakers often included such questions as: “How can we get your vote? What’s it going to take?”

NSA intelligence reports helped the White House figure out which Israeli government officials had leaked information from confidential U.S. briefings. When confronted by the U.S., Israel denied passing on the briefing materials.

The agency’s goal was “to give us an accurate illustrative picture of what [the Israelis] were doing,” a senior U.S. official said.

Just before Mr. Netanyahu’s address to Congress in March, the NSA swept up Israeli messages that raised alarms at the White House: Mr. Netanyahu’s office wanted details from Israeli intelligence officials about the latest U.S. positions in the Iran talks, U.S. officials said.

A day before the speech, Secretary of State John Kerry made an unusual disclosure. Speaking to reporters in Switzerland, Mr. Kerry said he was concerned Mr. Netanyahu would divulge “selective details of the ongoing negotiations.”

The State Department said Mr. Kerry was responding to Israeli media reports that Mr. Netanyahu wanted to use his speech to make sure U.S. lawmakers knew the terms of the Iran deal.

Intelligence officials said the media reports allowed the U.S. to put Mr. Netanyahu on notice without revealing they already knew his thinking. The prime minister mentioned no secrets during his speech to Congress.

In the final months of the campaign, NSA intercepts yielded few surprises. Officials said the information reaffirmed what they heard directly from lawmakers and Israeli officials opposed to Mr. Netanyahu’s campaign—that the prime minister was focused on building opposition among Democratic lawmakers.

The NSA intercepts, however, revealed one surprise. Mr. Netanyahu and some of his allies voiced confidence they could win enough votes.

https://www.youtube.com/watch?v=kVRFm5Er6OI

Encryption

From Wikipedia, the free encyclopedia
“Encrypt” redirects here. For the film, see Encrypt (film).
This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography.

In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.[1] Encryption does not of itself prevent interception, but denies the message content to the interceptor.[2]:374 In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.[2] For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Types of encryption

Symmetric key encryption

In symmetric-key schemes,[3] the encryption and decryption keys are the same. Communicating parties must have the same key before they can achieve secure communication.

Public key encryption

Illustration of how encryption is used within servers Public key encryption.

In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.[4] Public-key encryption was first described in a secret document in 1973;[5] before then all encryption schemes were symmetric-key (also called private-key).[2]:478

A publicly available public key encryption application called Pretty Good Privacy (PGP) was written in 1991 by Phil Zimmermann, and distributed free of charge with source code; it was purchased by Symantec in 2010 and is regularly updated.[6]

Uses of encryption

Encryption has long been used by military and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage.[7] Encryption can be used to protect data “at rest”, such as information stored on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers’ personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems, which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection), is another somewhat different example of using encryption on data at rest.[8]

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years.[9] Data should also be encrypted when transmitted across networks in order to protect against eavesdropping of network traffic by unauthorized users.[10]

Message verification

Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of amessage authentication code (MAC) or a digital signature. Standards for cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single error in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g., traffic analysis, TEMPEST, or Trojan horse.[11]

Digital signature and encryption must be applied to the ciphertext when it is created (typically on the same device used to compose the message) to avoid tampering; otherwise any node between the sender and the encryption agent could potentially tamper with it. Encrypting at the time of creation is only secure if the encryption device itself has not been tampered with.

See also

References

  1. Jump up^ “What is Encryption? | EFF Surveillance Self-Defense Project.” What is Encryption? | EFF Surveillance Self-Defense Project. Surveillance Self-Defense Project, n.d. Web. 03 Nov. 2014. <https://ssd.eff.org/en/module/what-encryption>.
  2. ^ Jump up to:a b c Goldreich, Oded. Foundations of Cryptography: Volume 2, Basic Applications. Vol. 2. Cambridge university press, 2004.
  3. Jump up^ Symmetric-key encryption software
  4. Jump up^ Bellare, Mihir. “Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.” Springer Berlin Heidelberg, 2000. Page 1.
  5. Jump up^ “Public-Key Encryption – how GCHQ got there first!”. gchq.gov.uk. Archived from the original on May 19, 2010.
  6. Jump up^ “Symantec buys encryption specialist PGP for $300M”. Computerworld. 2010-04-29. Retrieved 2010-04-29.
  7. Jump up^ Robert Richardson, 2008 CSI Computer Crime and Security Survey at 19.i.cmpnet.com
  8. Jump up^ https://www.eff.org/issues/drm
  9. Jump up^ Fiber Optic Networks Vulnerable to Attack, Information Security Magazine, November 15, 2006, Sandra Kay Miller
  10. Jump up^ https://security.berkeley.edu/content/data-encryption-transit-guideline
  11. Jump up^ http://usa.kaspersky.com/internet-security-center/threats/trojans#.VV3oaWDTvfY

Further reading

https://en.wikipedia.org/wiki/Encryption

Read Full Post | Make a Comment ( None so far )

House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos

Posted on November 1, 2015. Filed under: American History, Ammunition, Articles, Blogroll, Bomb, Books, British History, Business, Central Intelligence Agency (CIA), College, Communications, Computers, Computers, Congress, Constitution, Corruption, Crime, Crisis, Culture, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Diasters, Dirty Bomb, Documentary, Drones, Education, Elections, Employment, Energy, European History, Faith, Family, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Foreign Policy, Freedom, Friends, Genocide, government, government spending, history, Homicide, Illegal, Immigration, Investments, Islam, Islam, Language, Law, liberty, Life, Links, media, Middle East, Missiles, Money, National Security Agency (NSA), National Security Agency (NSA_, Natural Gas, Natural Gas, Newspapers, Non-Fiction, Nuclear, Oil, Oil, People, Philosophy, Photos, Pistols, Police, Political Correctness, Politics, Presidential Candidates, Press, Radio, Radio, Rants, Raves, Regulations, Religion, Religious, Resources, Rifles, Security, Shite, Speech, Spying, Strategy, Sunni, Talk Radio, Taxation, Television, Television, Torture, Video, War, Water, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 559: October 22, 2015 

Pronk Pops Show 558: October 21, 2015

Pronk Pops Show 557: October 20, 2015 

Pronk Pops Show 556: October 19, 2015

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Story 1: House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos

benghazi-four obama_hillary_liars_benghazi_treason

Background Information

Obama and Hillary Blame Youtube Video for Benghazi Terrorist Attack as Coffins Arrive

Our Fallen Heroes

Published on Sep 15, 2012

President Obama speaks about the tragic loss of four of our fellow Americans who were serving in our diplomatic post in Benghazi, Libya. These Americans represented the best of our country; without people like them, we could not sustain our freedoms or security, or provide the leadership that the entire world depends on. During this time of turmoil in many different countries, the President makes it clear that the United States has a profound respect for people of all faiths, but as Commander in Chief, he will never tolerate efforts to harm our fellow Americans and will ensure that those who attack our people find no escape from justice.

Obama and Press Secretary Carney Blame a Video for the Benghazi Attack

YouTube Video Maker Blamed for Benghazi Attacks Breaks Silence on CNN

White House Covers Up Benghazi Terrorist Attack

13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined.

ABC News’ Jon Karl hammers Jay Carney over New bombshell Benghazi emails

Benghazi Whistleblower Embarrassed by Obama Admin Placing Blame on a YouTube Video

Benghazi Gate – Rand Paul and Hillary Clinton – Question & Answer

Email Reveals Obama Advisor Urged Susan Rice to Blame Video for Benghazi

Exclusive: Docs Show Weapons Going From Benghazi To Syria – Benghazi Gate – Happening Now

Breaking: Hillary Clinton Knew About Libyan Arms Shipments to Syria in 2011

Secretary of State Hillary Clinton knew that the US was sending arms from Libya to Syria back in 2011. She denied this during public testimony (under oath) in early 2013 after the Benghazi terrorist attack.

Melvin Goodman on why CIA Director Brennan is dangerous

The show is going to be about the response to CIA director Brennan’s press conference two weeks ago and then an appearance at the Council on Foreign Relations last week, an on the record interview with Charlie Rose in New York about his plans to restructure the CIA to try to bring a more integrity to intelligence and make it less politicized. We are going to hear from today Melvin Goodman. Goodman is a senior fellow at the Center for International Policy and a professor of government at Johns Hopkins University. He is he is a former CIA analyst. Melvin Goodman is the author of Failure of Intelligence: the Decline and Fall of the CIA and the forthcoming book On the Path to Dissent: A Whistleblower at the CIA. Goodman is the national security columnist for Counterpunch, and he said of CIA director ‘s plan to restructure the CIA and I quote “Simply, it takes the CIA further from Truman’s concept and closer to the ability to politicize intelligence. Operations are part of the policy world and not the intelligence world. The Centers have made it too easy to provide the intelligence that the ‘masters’ desire, whether they are the masters on CIA’s 7th floor or the policy masters. Brennan’s world was the Center for Counterintelligence and Counterterrorism, and many of the intelligence errors and operational errors of the past 15 years have emanated from those centers. Organizationally, it makes no sense — what are the directorates of operations and analysis — they sound as if they are HR experts.”

CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels

Retired Lt. Gen. Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi

Clinton Donors Got Weapons Deals From Hillary

Even by the standards of arms deals between the United States and Saudi Arabia, this one was enormous. A consortium of American defense contractors led by Boeing would deliver $29 billion worth of advanced fighter jets to the United States’ oil-rich ally in the Middle East…E

Why is Benghazi still a big issue for Hillary Clinton? BBC News

General Petraeus Testifies Before Congress For The First Time Since Resigning As Director Of CIA

Select Committee on Benghazi Holds First Hearing

Former CIA Director and General David Petraeus (Ret.) testified at a hearing on U.S. policy toward the Middle East and combating ISIS* in the region. He talked about his support for military enclaves in Syria and for greater military action against Syrian President Bashar al-Assad and ISIS. He also gave his assessment of the Russian military build-up in Syria and of the Iran nuclear agreement.

At the beginning of his testimony, General Petraeus apologized for what what he called his “serious mistake” of sharing classified information with his biographer, with whom he also had an extramarital affair.

Select Committee on Benghazi Holds Second Hearing

Select Committee on Benghazi Holds Third Hearing

Rep. Gowdy: Either Petraeus Will Come Before Congressional Committee Or He Will Be Subpoenaed



Benghazi Select Committee (Hearing 4)

House Select Committee on Benghazi

Trey Gowdy Opening Statement Benghazi Committee Hearing. 10/22/2015

Rep. Trey Gowdy addresses Former Secretary of State Hillary Clinton during his opening statement at a hearing Thursday by the House Select Committee on Benghazi. trey gowdy elivers opening statement of benghazi committee hearing with hillary clinton. trey gowdy says ‘We are going to find the #Truth because there is no expiration of it.’ Chairman Trey Gowdy opens #Benghazi hearing: ‘Previous investigations were not thorough. Trey Gowdy to Clinton: Trey Gowdy addressed former Secretary of State Hillary Clinton personally at a high-stakes hearing on Thursday, telling the Democratic presidential candidate that the panel’s investigation is not about her. “Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you,” Gowdy said. “Let me assure you it is not. And let me assure you why it is not. This work is about something much more important than any single person. It is about four U.S. government workers, including our Ambassador, murdered by terrorists on foreign soil. It is about what happened before, during, and after the attacks that killed these four men.” He continued: “It is about what this country owes those who risk their lives to serve it. It is about the fundamental obligation of our government to tell the truth — always — to the American people. Not a single member of this Committee signed up for an investigation into you or your email system. We signed up because we wanted to honor the service and sacrifice of four people sent to a foreign land to represent us – who were killed – and do everything we can to prevent it from happening to others.” Gowdy also presented several key questions he would be asking in his opening statement: Why were there so many requests for more security personnel and equipment, and why were those requests denied in Washington? Why did the State Department compound in Benghazi not even come close to meeting proper security specifications? What policies were we pursuing in Libya that required a physical presence in spite of the escalating violence? Who in Washington was aware of the escalating violence in Libya? What special precautions, if any, were taken on the anniversary of 9-11? What happened in Washington after the first attack and what was the response to that attack? What did the military do or not do? What did our leaders in Washington do or not do and when? Why was the American public given such divergent accounts of what caused these attacks? And why is it so hard to get information from the very government these four men were representing and serving and sacrificing for?

Benghazi panel chair: Investigation not about Hillary Clinton

South Carolina Rep. Trey Gowdy, the chairman of the House Select Committee investigating Benghazi, tells Hillary Clinton in his opening statement that the probe is not singularly focused on the former secretary of state.

Benghazi hearing: Hillary Clinton’s entire statement

Hillary Clinton gave her opening statement to the House Select Committee investigating the 2012 attacks at the U.S. Embassy in Benghazi, Libya.

Benghazi Hearing Committee Chairman on Hillary Clinton’s Emails | The New York Times

Trey Gowdy questions Hillary Clinton (Part 1)

Trey Gowdy questions Hillary Clinton (Part 2)

Clinton to panel: 3 things we learned from Benghazi

Trey Gowdy GRILLS Hillary Clinton Benghazi Committee Hearing

Trey Gowdy GRILLS Hillary Clinton during the Benghazi Committee Hearing. trey gowdy went off on hillary clinton about blumenthal and more. watch the explosive exchange. Hillary Clinton coolly hit back at her Republican interrogators on the Benghazi committee during her long-awaited testimony on Thursday, rebuffing claims she was detached as the situation in Libya deteriorated and asserting she did not use email to conduct the “vast majority” of her work as secretary of state.

The Democratic front-runner told the House Selection Committee on Benghazi, which is 18 months into its probe of the 2012 attacks on the consulate in Libya, that the tragedy does not deserve partisan attacks, while insisting the U.S. needs to stay committed to diplomatic engagement.

“Despite all the previous investigations and all the talk about partisan agendas, I’m here to honor those we lost and to do what I can to aid those who serve us still,” Clinton said, speaking slowly and deliberately during her opening statement. “My challenge to you, members of this committee, is the same challenge I put to myself…. Let’s be worthy of the trust the American people bestow on us… they expect us to rise above partisanship. And I hopes it’s what we’ll strive for today and in the future.”

Republicans questioned Clinton about why numerous requests for additional security never made it Clinton’s attention. She said they went to the right place: to personnel who handled security. And when they pressed her on why she kept the compound open or did not give it additional, she retorted that she never received a recommendation to shut down the mission—even after two attacks on the compound.

The hearing kicked off on Thursday with the partisan sniping that has been the hallmark of the committee’s work, with House Benghazi Committee Chairman Trey Gowdy defended his investigation, assuring Clinton that his probe is not centered on her.
Hour_2_151022_hillary_clinton_2_gty_1160­.jpg

WATCH LIVE: Hillary Clinton testifies before Benghazi Committee

“Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you. Let me assure you it is not,” Gowdy said in his opening statement, adding that it was about the people who were killed.

He also blamed her in part for the fact that the inquiry has dragged on for a year and a half.

The State Department only realized it did not have Clinton’s emails after they requested documents, triggering a lengthy process by which the department had to ask her and her top aides who also sometimes used private email for work purposes to turn them over.

“You had an unusual email arrangement with yourself, which meant the State Department could not produce your emails to us,” Gowdy said. “When you left the State Department you kept those public records to yourself for almost two years….Those decisions were your decisions, not ours… It just took longer to get them and garnered more attention in the process.

Ranking Democrat Elijah Cummings (D-Md.) blasted the committee as a partisan witch-hunt out to get Clinton, saying Republicans formed the panel because they “did not like the answers they got” in previous probe—“so they set up this select committee with no rules, no deadlines and a unlimited budget.”

“They set the noose because you’re running for president,” Cummings said, raising his voice before calling for the panel to disband. “It is time for Republicans to end this …fishing expedition.”

It only took Cummings a few minutes to highlight a number of embarrassing moments for Gowdy in recent weeks, including comments by Majority Leader Kevin McCarthy (R-Calif.), Rep. Richard Hanna (R-N.Y) and a fired GOP Benghazi investigator who all suggested the panel was either out to hurt Clinton or increasingly focused on investigating her.

REP. Martha Roby vs Hillary Clinton at House Select Committee on Benghazi 10/22/15

Rep Jim Jordan Goes After Hillary ‘Where’d the False Narrative Start It Started With You’

REP Trey Gowdy vs Hillary Clinton Round 2 at House Select Committee on Benghazi 102215

Benghazi Select – Gowdy: this is an investigation, not a prosecution

Bickering among Benghazi panel as Clinton looks on silently

Fireworks erupt between Clinton, Republicans at Benghazi hearing



More Background Information

Weekly Address: Carrying on the Work of

America’s intelligence community, explained

THE RECRUIT – Spy School: Inside the CIA Training Program, 1 of 2

THE RECRUIT – Spy School: Inside the CIA Training Program, 2 of 2

Special Activities Division

Published on Aug 15, 2014

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service (NCS) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the government of the United States may deny all knowledge.

Inside America’s New Covert Wars: Navy SEALs, Delta Force, Blackwater, Security Contractors (2013)

The Daring Early Years of the CIA: Covert Ops from WW2 to Vietnam (1995)

How has the CIA been used as a secret Military force? William Blum • BRAVE NEW FILMS

The CIA began as a spy agency after World War Two, but soon the CIA was planning and executing covert operations across the globe without proper congressional oversight. From the removal of the democratically elected leaders of Iran and Guatemala to the attempted invasion of Cuba, to the removal of every secular government in the Middle East, the influence of the agency is insidious. But how can a democratic society tolerate such a secret and lethal institution that works against the very values America seeks to uphold around the world?

CIA Covert Operations in Africa: How Does the U.S. Government Make Decisions?

According to the Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation. It is normally financed by government revenues but in this age of super-empowered individuals and corporations they could become a common tool of power beyond traditional war and diplomacy.

Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action. The CIA’s authority to conduct covert action comes from the National Security Act of 1947. President Ronald Reagan issued Executive Order 12333 titled in 1984. This order defined covert action as “special activities”, both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e). The CIA must have a “Presidential Finding” issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act. These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives. As a result of this framework, the CIA “receives more oversight from the Congress than any other agency in the federal government”. The Special Activities Division (SAD) is a division of the CIA’s National Clandestine Service, responsible for Covert Action and “Special Activities”. These special activities include covert political influence and paramilitary operations. The division is overseen by the United States Secretary of State.

Special Activities Division – Special Operations Group | SAD SOG

Published on Jun 30, 2015

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action. The Special Activities Division reports directly to the Deputy Director of the National Clandestine Service.

Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the United States government may deny all knowledge.

SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU and ISA, as well as other United States special operations forces, such as USNSWC, MARSOC, Special Forces, SEALs and 24th STS.

SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.

REVEALED: If This Is True, Benghazi Is Even Worse Than We Ever Thought

Insiders Come Forward, Proof of Benghazi Stand Down Order, It was Obama

Obama Lies About Libya – Imperial Presidency

Media Silent About Obama’s Undeclared Wars

Did the Military Intervention in Libya Succeed? (Benjamin Friedman)

Drones are Obama’s weapon of choice for waging illegal and undeclared wars

Special Activities Division

From Wikipedia, the free encyclopedia

Seal of the Central Intelligence Agency

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency‘s (CIA) Directorate of Operations (DO) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.[1] The Special Activities Division reports directly to the Deputy Director for the Directorate of Operations.

Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection ofintelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated.[2] As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government.[3] If they are compromised during a mission, the United States government maydeny all knowledge.[4]

SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU, ISA, and 24th STS, as well as other United States special operations forces, such as USNSWC, MARSOC, Green Berets, SEALs, SWCC, Force Recon, Pararescuemen,Combat Controllers, and Army Rangers.

SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.[5]

Political Action Group (PAG) is responsible for covert activities related to political influence, psychological operations and economic warfare. The rapid development of technology has added cyberwarfare to their mission. Tactical units within SAD are also capable of carrying out covert political action while deployed in hostile and austere environments. A large covert operation usually has components that involve many, or all, of these categories, as well as paramilitary operations. Political and Influence covert operations are used to support U.S. foreign policy. Often overt support for one element of an insurgency would be counter-productive due to the impression it would have on the local population. In such cases, covert assistance allows the U.S. to assist without damaging these elements in the process. Many of the other activities (such as propaganda, economic and cyber) support the overall political effort. There have been issues in the past with attempts to influence the US media such as in Operation Mockingbird. However, these activities are now subject to the same oversight as all covert action operations.[6]

Overview

SAD provides the President of the United States with an option when overt military and/or diplomatic actions are not viable or politically feasible. SAD can be directly tasked by the President of the United States or the National Security Council at the President’s direction. This is unlike any other U.S. special mission force. However, SAD/SOG has far fewer members than most of the other special missions units, such as the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force) or Naval Special Warfare Development Group (DEVGRU).[7][8][9]

As the action arm of the DO, SAD/SOG conducts direct action missions such as raids, ambushes, sabotage, targeted killings[10][11][12] and unconventional warfare(e.g., training and leading guerrilla and military units of other countries in combat). SAD/SOG also conducts special reconnaissance, that can be either military orintelligence driven, but is carried out by Paramilitary Officers (also called Paramilitary Operatives) when in “non-permissive environments“. Paramilitary Operations Officers are also fully trained case officers (i.e., “spies”) and as such conduct clandestine human intelligence (HUMINT) operations throughout the world.[13]SAD/SOG officers are selected from the most elite U.S. military units.[9]

The political action group within SAD conducts the deniable psychological operations, also known as black propaganda, as well as “Covert Influence” to effect political change as an important part of any Administration’s foreign policy.[1] Covert intervention in a foreign election is the most significant form of political action. This could involve financial support for favored candidates, media guidance, technical support for public relations, get-out-the-vote or political organizing efforts, legal expertise, advertising campaigns, assistance with poll-watching, and other means of direct action. Policy decisions could be influenced by assets, such as subversion of officials of the country, to make decisions in their official capacity that are in the furtherance of U.S. policy aims. In addition, mechanisms for forming and developing opinions involve the covert use of propaganda.[14]

Propaganda includes leaflets, newspapers, magazines, books, radio, and television, all of which are geared to convey the U.S. message appropriate to the region. These techniques have expanded to cover the internet as well. They may employ officers to work as journalists, recruit agents of influence, operate media platforms, plant certain stories or information in places it is hoped it will come to public attention, or seek to deny and/or discredit information that is public knowledge. In all such propaganda efforts, “black” operations denote those in which the audience is to be kept ignorant of the source; “white” efforts are those in which the originator openly acknowledges himself; and “gray” operations are those in which the source is partly but not fully acknowledged.[14][15]

Some examples of political action programs were the prevention of the Italian Communist Party (PCI) from winning elections between 1948 and the late 1960s; overthrowing the governments of Iran in 1953, and Guatemala in 1954; arming rebels in Indonesia in 1957; and providing funds and support to the trade unionfederation Solidarity following the imposition of martial law in Poland after 1981.[16]

SAD’s existence became better known as a result of the “Global War on Terror“. Beginning in autumn of 2001, SAD/SOG paramilitary teams arrived in Afghanistanto hunt down al-Qaeda leaders, facilitate the entry of U.S. Army Special Forces and lead the United Islamic Front for the Salvation of Afghanistan against the rulingTaliban. SAD/SOG units also defeated Ansar al-Islam in Iraqi Kurdistan prior to the invasion of Iraq in 2003[17][18] and trained, equipped, organized and led theKurdish peshmerga forces to defeat the Iraqi army in northern Iraq.[13][17] Despite being the most covert unit in U.S. Special Operations, numerous books have been published on the exploits of CIA paramilitary officers, including Conboy and Morrison’s Feet to the Fire: CIA Covert Operations in Indonesia,[19] and Warner’sShooting at the Moon: The Story of America’s Clandestine War in Laos.[20] Most experts consider SAD/SOG the premiere force for unconventional warfare (UW), whether that warfare consists of either creating or combating an insurgency in a foreign country.[7][21][22]

SOCOM.jpg

There remains some conflict between the National Clandestine Service and the more clandestine parts of the United States Special Operations Command (USSOCOM),[23] such as the Joint Special Operations Command. This is usually confined to the civilian/political heads of the respective Department/Agency. The combination of SAD and USSOCOM units has resulted in some of the most notable successes of the wars in Iraq and Afghanistan, to include the locating and killing of Osama bin Laden.[22][24] SAD/SOG has several missions. One of these missions is the recruiting, training, and leading of indigenous forces in combat operations.[22] SAD/SOG and its successors have been used when it was considered desirable to have plausible deniability about U.S. support (this is called a covert operation or “covert action”).[13] Unlike other special missions units, SAD/SOG operatives combine special operations and clandestine intelligence capabilities in one individual.[9] These individuals can operate in any environment (sea, air or ground) with limited to no support.[7]

Covert action

Under U.S. law, the CIA is authorized to collect intelligence, conduct counterintelligence and to conduct covert action by the National Security Act of 1947.[1]President Ronald Reagan issued Executive Order 12333 titled “United States Intelligence Activities” in 1984. This order defined covert action as “special activities,” both political and military, that the U.S. government would deny, granting such operations exclusively to the CIA. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and mirrored in Title 50 of the United States Code Section 413(e).[1][22] The CIA must have a presidential findingissued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act.[25]These findings are then monitored by the oversight committees in both the U.S. Senate, called the Senate Select Committee on Intelligence (SSCI) and the U.S. House of Representatives, called the House Permanent Select Committee on Intelligence (HPSCI).[26]

The Pentagon commissioned a study to determine whether the CIA or the U.S. Department of Defense (DoD) should conduct covert action paramilitary operations. Their study determined that the CIA should maintain this capability and be the “sole government agency conducting covert action.” The DoD found that, even under U.S. law, it does not have the legal authority to conduct covert action, nor the operational agility to carry out these types of missions.[27] The operation in May 2011 that resulted in the death of Osama bin Laden was a covert action under the authority of the CIA.[24][28]

Selection and training

SAD/SOG has several hundred officers, mostly former members of special operations forces (SOF) and a majority from theJoint Special Operations Command (JSOC).[29] The CIA has also recruited individuals within the agency.[30] The CIA’s formal position for these individuals is “Paramilitary Operations Officers” and “Specialized Skills Officers.” Paramilitary Operations Officers attend the Clandestine Service Trainee (CST) program, which trains them as clandestine intelligence operatives (known as “Core Collectors” within the Agency). The primary strengths of SAD/SOG Paramilitary Officers are operational agility, adaptability, and deniability. They often operate in small teams, typically made up of six operators (with some operations being carried out by a single officer), all with extensive military special operations expertise and a set of specialized skills that does not exist in any other unit.[9] As fully trained intelligence case officers, Paramilitary Operations Officers possess all the clandestine skills to collect human intelligence—and most importantly—to recruit assets from among the indigenous troops receiving their training. These officers often operate in remote locations behind enemy lines to carry out direct action (including raids and sabotage), counter-intelligence, guerrilla/unconventional warfare, counter-terrorism, and hostage rescue missions, in addition to being able to conduct espionage via HUMINT assets.

There are four principal elements within SAD’s Special Operations Group: the Air Branch, the Maritime Branch, the Ground Branch, and the Armor and Special Programs Branch. The Armor and Special Programs Branch is charged with development, testing, and covert procurement of new personnel and vehicular armor and maintenance of stockpiles of ordnance and weapons systems used by SOG, almost all of which must be obtained from clandestine sources abroad, in order to provide SOG operatives and their foreign trainees with plausible deniability in accordance with U.S. Congressional directives.

Together, SAD/SOG contains a complete combined arms covert military. Paramilitary Operations Officers are the core of each branch and routinely move between the branches to gain expertise in all aspects of SOG.[30] As such, Paramilitary Operations Officers are trained to operate in a multitude of environments. Because these officers are taken from the most highly trained units in the U.S. military and then provided with extensive additional training to become CIA clandestine intelligence officers, many U.S. security experts assess them as the most elite of the U.S. special missions units.[31]

SAD, like most of the CIA, requires a bachelor’s degree to be considered for employment. Many have advanced degrees such as Master’s and law degrees.[32]Many candidates come from notable schools, many from Ivy League institutions and United States Service Academies, but the majority of recruits today come from middle-class backgrounds.[33] SAD officers are trained at Camp Peary, Virginia (also known as “The Farm”) and at privately owned training centers around the United States. They also train its personnel at “The Point” (Harvey Point), a facility outside of Hertford, North Carolina.[34][35] In addition to the eighteen months of training in the Clandestine Service Trainee (CST) Program[36] required to become a clandestine intelligence officer, Paramilitary Operations Officers are trained to a high level of proficiency in the use and tactical employment of an unusually wide degree of modern weaponry, explosive devices and firearms (foreign and domestic), hand to hand combat, high performance/tactical driving (on and off road), apprehension avoidance (including picking handcuffs and escaping from confinement), improvised explosive devices, cyberwarfare, covert channels, Military Free Fall parachuting, combat and commercial SCUBA and closed circuit diving, proficiency in foreign languages, surreptitious entry operations (picking or otherwise bypassing locks), vehicle hot-wiring, Survival, Evasion, Resistance and Escape(SERE), extreme survival and wilderness training, combat EMS medical training, tactical communications, and tracking.

History

World War II

While the World War II Office of Strategic Services (OSS) was technically a military agency under the Joint Chiefs of Staff, in practice it was fairly autonomous of military control and enjoyed direct access to President Franklin D. Roosevelt. Major General William Joseph Donovan was the head of the OSS. Donovan was a soldier and Medal of Honor recipient from World War I. He was also a lawyer and former classmate of FDR at Columbia Law School.[37] Like its successor, the CIA, OSS included both human intelligence functions and special operations paramilitary functions. Its Secret Intelligence division was responsible for espionage, while its Jedburgh teams, a joint U.S.-UK-French unit, were forerunners of groups that create guerrilla units, such as the U.S. Army Special Forces and the CIA. OSS’ Operational Groups were larger U.S. units that carried out direct action behind enemy lines. Even during World War II, the idea of intelligence and special operations units not under strict military control was controversial. OSS operated primarily in the European Theater of Operations (ETO) and to some extent in the China-Burma-India Theater, while General of the Army Douglas MacArthur was extremely reluctant to have any OSS personnel within his area of operations.

From 1943 to 1945, the OSS also played a major role in training Kuomintang troops in China and Burma, and recruited other indigenous irregular forces for sabotage as well as guides for Allied forces in Burma fighting the Japanese army. OSS also helped arm, train and supply resistance movements, including Mao Zedong‘s People’s Liberation Army in China and the Viet Minh in French Indochina, in areas occupied by the Axis powers. Other functions of the OSS included the use ofpropaganda, espionage, subversion, and post-war planning.

One of the OSS’ greatest accomplishments during World War II was its penetration of Nazi Germany by OSS operatives. The OSS was responsible for training German and Austrian commandos for missions inside Nazi Germany. Some of these agents included exiled communists and socialist party members, labor activists, anti-Nazi POWs, and German and Jewish refugees. At the height of its influence during World War II, the OSS employed almost 24,000 people.[38]

OSS Paramilitary Officers parachuted into many countries then behind enemy lines, including France, Norway, Greece and The Netherlands. In Crete, OSS paramilitary officers linked up with, equipped and fought alongside Greek resistance forces against the Axis occupation.

OSS was disbanded shortly after World War II, with its intelligence analysis functions moving temporarily into the U.S. Department of State. Espionage and counterintelligence went into military units, while paramilitary and related functions went into an assortment of ‘ad hoc’ groups, such as the Office of Policy Coordination. Between the original creation of the CIA by the National Security Act of 1947 and various mergers and reorganizations through 1952, the wartime OSS functions generally went into CIA. The mission of training and leading guerrillas generally stayed in the United States Army Special Forces, but those missions required to remain covert were folded into the paramilitary arm of the CIA. The direct descendant of the OSS’ Special Operations is the CIA’s Special Activities Division.

Tibet

After the Chinese invasion of Tibet in October 1950, the CIA inserted SAD paramilitary teams into Tibet to train and lead Tibetan resistance fighters against thePeople’s Liberation Army of China. These teams selected and then trained Tibetan soldiers in the Rocky Mountains of the United States;[39] training occurred atCamp Hale.[40][41] The SAD teams then advised and led these commandos against the Chinese, both from Nepal and India. In addition, SAD Paramilitary Officers were responsible for the Dalai Lama‘s clandestine escape to India, narrowly escaping capture and certain execution by the Chinese government.[39]

According to a book by retired CIA officer John Kenneth Knaus, entitled Orphans Of The Cold War: America And The Tibetan Struggle For Survival, Gyalo Thondup, the older brother of the 14th (and current) Dalai Lama, sent the CIA five Tibetan recruits. These recruits were then trained in paramilitary tactics on the island ofSaipan in the Northern Marianas.[42] Shortly thereafter, the five men were covertly returned to Tibet “to assess and organize the resistance” and selected another 300 Tibetans for training. U.S. assistance to the Tibetan resistance ceased after the 1972 Nixon visit to China, after which the United States and China normalized relations.[43]

Korea

The CIA sponsored a variety of activities during the Korean War. These activities included maritime operations behind North Korean lines. Yong Do Island, connected by a rugged isthmus to Pusan, served as the base for those operations. These operations were carried out by well-trained Korean guerrillas. The four principal U.S. advisers responsible for the training and operational planning of those special missions were Dutch Kramer, Tom Curtis, George Atcheson and Joe Pagnella. All of these Paramilitary Operations Officers operated through a CIA front organization called the Joint Advisory Commission, Korea (JACK), headquartered at Tongnae, a village near Pusan, on the peninsula’s southeast coast.[44] These paramilitary teams were responsible for numerous maritime raids and ambushes behind North Korean lines, as well as prisoner of warrescue operations. These were the first maritime unconventional warfare units that trained indigenous forces as surrogates. They also provided a model, along with the other CIA-sponsored ground based paramilitary Korean operations, for theMilitary Assistance Command, Vietnam-Studies and Observations Group (MACV-SOG) activities conducted by the U.S. military and the CIA/SAD in Vietnam.[7][44] In addition, CIA paramilitary ground-based teams worked directly for U.S. military commanders, specifically with the 8th Army, on the “White Tiger” initiative. This initiative included inserting South Korean commandos and CIA Paramilitary Operations Officers prior to the two major amphibious assaults on North Korea, including the landing at Inchon.[7]

Cuba (1961)

Main article: Bay of Pigs Invasion

Map showing the location of the Bay of Pigs

The Bay of Pigs Invasion (known as “La Batalla de Girón”, or “Playa Girón” in Cuba), was an unsuccessful attempt by a U.S.-trained force of Cuban exiles to invade southern Cuba and overthrow the Cuban government of Fidel Castro. The plan was launched in April 1961, less than three months after John F. Kennedy assumed the presidency of the United States. TheCuban Revolutionary Armed Forces, trained and equipped by Eastern Bloc nations, defeated the exile-combatants in three days.

The sea-borne invasion force landed on April 17, and fighting lasted until April 19, 1961. CIA Paramilitary Operations OfficersGrayston Lynch and William “Rip” Robertson led the first assault on the beaches, and supervised the amphibious landings.[45] Four American aircrew instructors from Alabama Air National Guard were killed while flying attack sorties.[45]Various sources estimate Cuban Army casualties (killed or injured) to be in the thousands (between 2,000 and 5,000).[46] This invasion followed the successful overthrow by the CIA of the Mosaddeq government in Iran in 1953[47] and Arbenz government in Guatemala in 1954,[48] but was a failure both militarily and politically.[49] Deteriorating Cuban-American relations were made worse by the 1962 Cuban Missile Crisis.

Bolivia

The National Liberation Army of Bolivia (ELN-Ejército de Liberación Nacional de Bolivia) was a communist guerrilla force that operated from the remote Ñancahuazú region against the pro-U.S. Bolivian government. They were joined by Che Guevara in the mid-1960s.[50][51] The ELN was well equipped and scored a number of early successes against the Bolivian army in the difficult terrain of the mountainous Camiri region.[52] In the late 1960s, the CIA deployed teams of SAD Paramilitary Operations Officers to Bolivia to train the Bolivian army in order to counter the ELN.[52] These SAD teams linked up with U.S. Army Special Forces and Bolivian Special Forces to track down and capture Guevara, who was a special prize because of his leading role in the Cuban Revolution.[52] On October 9, 1967, Guevara was executed by Bolivian soldiers on the orders of CIA paramilitary operative Félix Rodríguez shortly after being captured, according to CIA documents.[53]

Vietnam and Laos

South Vietnam, Military Regions, 1967

The original OSS mission in Vietnam under Major Archimedes Patti was to work with Ho Chi Minh in order to prepare his forces to assist the United States and their Allies in fighting the Japanese. After the end of World War II, the US agreed at Potsdam to turn Vietnam back to their previous French rulers and in 1950 the US began providing military aid to the French.[54]

CIA Paramilitary Operations Officers trained and led Hmong tribesmen in Laos and Vietnam, and their actions of these officers were not known for several years. Air America was the air component of the CIA’s paramilitary mission in Southeast Asia and was responsible for all combat, logistics and search and rescue operations in Laos and certain sections of Vietnam.[55] The ethnic minority forces numbered in the tens of thousands and they conducted direct actions mission, led by Paramilitary Operations Officers, against the communist Pathet Lao forces and their North Vietnamese allies.[7]

Elements of SAD were seen in the CIA’s Phoenix Program. One component of the Phoenix Program was involved in the capture and killing of suspected Viet Cong (National Liberation Front – NLF) members.[56] Between 1968 and 1972, the Phoenix Program captured 81,740 National Liberation Front of South Vietnam (NLF or Viet Cong) members, of whom 26,369 were killed. This was a large proportion of U.S. killings between 1969 and 1971. The program was also successful in destroying their infrastructure. By 1970, communist plans repeatedly emphasized attacking the government’s “pacification” program and specifically targeted Phoenix agents. The NLF also imposed quotas. In 1970, for example, communist officials near Da Nang in northern South Vietnam instructed their agents to “kill 400 persons” deemed to be government “tyrant[s]” and to “annihilate” anyone involved with the “pacification” program. Several North Vietnamese officials have made statements about the effectiveness of Phoenix.[57][58]

MAC-V SOG (Studies and Observations Group) (which was originally named the Special Operations Group, but was changed for cover purposes), was created and active during the Vietnam War. While CIA was just one part of MAC-V SOG, it did have operational control of some of the programs. Many of the military members of MAC-V SOG joined the CIA after their military service. The legacy of MAC-V SOG continues within SAD’s Special Operations Group.[59]

Maritime activities against the USSR

In 1973, SAD/SOG and the CIA’s Directorate of Science and Technology built and deployed the USNS Glomar Explorer (T-AG-193), a large deep-sea salvage ship, on a secret operation. This operation was called Project Azorian (erroneously called Project Jennifer by the press).[60] Her mission was to recover a sunken Sovietsubmarine, K-129, which had been lost in April 1968.[61][62] A mechanical failure caused two-thirds of the submarine to break off during recovery,[60] but SAD recovered two nuclear-tipped torpedoes, cryptographic machines and the bodies of six Soviet submariners.[63] An alternative theory claims that all of K-129 was recovered[64] and that the official account was an “elaborate cover-up”.[65]

Also in the 1970s, the U.S. Navy, the National Security Agency (NSA) and SAD/SOG [66] conducted Operation Ivy Bells and a series of other missions to place wire taps on Soviet underwater communications cables. These operations were covered in detail in the 1998 book Blind Man’s Bluff: The Untold Story of American Submarine Espionage.[67] In the 1985 edition of “Studies in Intelligence”, the CIA’s in-house journal that outsiders rarely get to see, the CIA describes the “staggering expense and improbable engineering feats” that culminated in the August 1974 mission.[68]

Nicaragua

In 1979, the U.S.-backed Anastasio Somoza Debayle dictatorship in Nicaragua fell to the socialist Sandinistas. Once in power, the Sandinistas disbanded theNicaraguan National Guard, who had committed many human rights abuses, and arrested and executed some of its members. Other former National Guard members helped to form the backbone of the Nicaraguan Counterrevolution or Contra. SAD/SOG paramilitary teams were deployed to train and lead these forces against the Sandinista government. These paramilitary activities were based in Honduras and Costa Rica. Direct military aid by the United States was eventually forbidden by the Boland Amendment of the Defense Appropriations Act of 1983. The Boland Amendment was extended in October 1984 to forbid action by not only the Defense Department, but also to include the Central Intelligence Agency.[69][70]

The Boland Amendment was a compromise because the U.S. Democratic Party did not have enough votes for a comprehensive ban on military aid. It covered only appropriated funds spent by intelligence agencies. Some of Reagan’s national security officials used non-appropriated money of the National Security Council (NSC) to circumvent the Amendment. NSC officials sought to arrange funding by third parties. These efforts resulted in the Iran-Contra Affair of 1987, which concerned Contra funding through the proceeds of arms sales to the Islamic Republic of Iran. No court ever made a determination whether Boland covered the NSC and on the grounds that it was a prohibition rather than a criminal statute, no one was indicted for violating it. Congress later resumed aid to the Contras, totaling over $300 million. The Contra war ended when the Sandinistas were voted out of power by a war-weary populace in 1990.[70][71] Sandinista leader Daniel Ortega was re-elected as President of Nicaragua in 2006 and took office again on January 10, 2007.

El Salvador

CIA personnel were also involved in the Salvadoran civil war.[72] Some allege that the techniques used to interrogate prisoners in El Salvador foreshadowed those later used in Iraq and Afghanistan.[73] In fact, when a similar counter-insurgency program was proposed in Iraq, it was referred to as “the Salvador Option”.[74]

Somalia

Location of Somalia

SAD sent in teams of Paramilitary Operations Officers into Somalia prior to the U.S. intervention in 1992. On December 23, 1992, Paramilitary Officer Larry Freedman became the first casualty of the conflict in Somalia. Freedman was a former ArmyDelta Force operator who had served in every conflict that the U.S. was involved in, both officially and unofficially, since Vietnam.[75] Freedman was killed while conducting special reconnaissance in advance of the entry of U.S. military forces. His mission was completely voluntary, as it required entry into a very hostile area without any support. Freedman was awarded the Intelligence Star on January 5, 1993 for his “extraordinary heroism”.[76]

SAD/SOG teams were key in working with JSOC and tracking high value targets (HVT), known as “Tier One Personalities”. Their efforts, working under extremely dangerous conditions with little to no support, led to several very successful joint JSOC/CIA operations.[77] In one specific operation, a CIA case officer, Michael Shanklin[78] and codenamed “Condor”, working with a CIA Technical Operations Officer from the Directorate of Science and Technology, managed to get a cane with a beacon in it to Osman Ato, a wealthy businessman, arms importer, and Mohammed Aideed, a money man whose name was right below Mohamed Farrah Aidid’s on the Tier One list.

Once Condor confirmed that Ato was in a vehicle, JSOC‘s Delta Force launched a capture operation.

a Little Bird helicopter dropped out of the sky and a sniper leaned out and fired three shots into the car’s engine block. The car ground to a halt as commandos roped down from hovering Blackhawks [sic], surrounded the car and handcuffed Ato. It was the first known helicopter takedown of suspects in a moving car. The next time Jones saw the magic cane, an hour later, Garrison had it in his hand. “I like this cane,” Jones remembers the general exclaiming, a big grin on his face. “Let’s use this again.” Finally, a tier one personality was in custody.[77]

President Bill Clinton withdrew U.S. forces on May 4, 1994.[79]

In June 2006, the Islamic Courts Union seized control of southern Somalia, including the country’s capital Mogadishu, prompting the Ethiopian government to send in troops to try to protect the transitional government. In December, the Islamic Courts warned Ethiopia they would declare war if Ethiopia did not remove all its troops from Somalia. Sheikh Sharif Ahmed, leader of the Islamic Courts, called for a jihad, or holy war, against Ethiopia and encouraged foreign Muslim fighters to come to Somalia. At that time, the United States accused the group of being controlled by al-Qaeda, but the Islamic Courts denied that charge.[80]

In 2009, PBS reported that al-Qaeda had been training terrorists in Somalia for years. Until December 2006, Somalia’s government had no power outside of the town of Baidoa, 150 miles (240 km) from the capital. The countryside and the capital were run by warlords and militia groups who could be paid to protect terrorist groups.[80]

CIA officers kept close tabs on the country and paid a group of Somali warlords to help hunt down members of al-Qaeda according to the New York Times.[citation needed] Meanwhile, Ayman al-Zawahiri, the deputy to al-Qaeda leader Osama bin Laden, issued a message calling for all Muslims to go to Somalia.[80]On January 9, 2007, a U.S. official said that ten militants were killed in one airstrike.[81]

On September 14, 2009, Saleh Ali Saleh Nabhan, a senior al-Qaeda leader in East Africa as well as a senior leader in Shabaab, al Qaeda’s surrogate in Somalia, was killed by elements of U.S. Special Operations. According to a witness, at least two AH-6 Little Bird attack helicopters strafed a two-car convoy. Navy SEALs then seized the body of Nabhan and took two other wounded fighters captive.[82][83] JSOC and the CIA had been trying to kill Nabhan for some time including back in January 2007, when an AC-130 Gunship was called in on one attempt. A U.S. intelligence source stated that CIA paramilitary teams are directly embedded with Ethiopian forces in Somalia, allowing for the tactical intelligence to launch these operations.[84] Nabhan was wanted for his involvement in the 1998 United States embassy bombings, as well as leading the cell behind the 2002 Mombasa attacks.[82][85]

From 2010 to 2013, the CIA set up the Somalia National Intelligence and Security Agency (NISA) by providing training, funding and diplomatic access. In the same time period, the EU and UN has spent millions of dollars for the military training of the Somali National Army (SNA). NISA is considered a professional Somali security force that can be relied upon to neutralize the terrorist threat.[86] This force responded to the complex al-Shabaab attack on the Banadir Regional Courthouse in Mogadishu which killed 25 civilians. NISA’s response however saved 100s and resulted in the death of all the al-Shabaab guerrillas involved.[87]

Significant events during this timeframe included the targeted drone strikes against British al-Qaida operative Bilal el-Berjawi [88] and Moroccan al-Qaida operative Abu Ibrahim.[89] It also included the rescue of U.S. citizen Jessica Buchanan by U.S. Navy SEALs.[90] All likely aided by intelligence collection efforts in Somalia.[91]

Afghanistan

Hamid Karzai with Special Forces and CIA Paramilitary in late 2001.

During the Soviet war in Afghanistan in the 1980s, Paramilitary Operations Officers were instrumental in equippingMujaheddin forces against the Soviet Army. Although the CIA in general, and a Texas congressman named Charlie Wilson in particular, have received most of the attention, the key architect of this strategy was Michael G. Vickers. Vickers was a young Paramilitary Operations Officer from SAD/SOG. The CIA’s efforts have been given credit for assisting in ending the Sovietinvolvement in Afghanistan and bringing Taliban to power.[92]

SAD paramilitary teams were active in Afghanistan in the 1990s in clandestine operations to locate and kill or capture Osama Bin Laden. These teams planned several operations, but did not receive the order to execute from President Bill Clintonbecause the available intelligence did not guarantee a successful outcome weighed against the extraordinary risk to the SAD/SOG teams that would execute the mission.[13] These efforts did however build many of the relationships that would prove essential in the 2001 U.S. Invasion of Afghanistan.[13]

On September 26, 2001, members of the Special Activities Division, led by Gary Schroen, were the first U.S. forces inserted into Afghanistan. The Northern Afghanistan Liaison Team entered the country nine days after the 9/11 attack[93][94] and linked up with the Northern Alliance as part of Task Force Dagger.[95]

They provided the Northern Alliance with resources including cash to buy weapons and prepared for the arrival of USSOCOM forces. The plan for the invasion of Afghanistan was developed by the CIA, the first time in United States history that such a large-scale military operation was planned by the CIA.[96] SAD, U.S. Army Special Forces, and the Northern Alliance combined to overthrow the Taliban in Afghanistan with minimal loss of U.S. lives. They did this without the use of conventional U.S. military ground forces.[13][97][98][99]

The Washington Post stated in an editorial by John Lehman in 2006:

What made the Afghan campaign a landmark in the U.S. Military’s history is that it was prosecuted by Special Operations forces from all the services, along with Navy and Air Force tactical power, operations by the Afghan Northern Alliance and the CIA were equally important and fully integrated. No large Army or Marine force was employed”.[100]

In a 2008 New York Times book review of Horse Soldiers, a book by Doug Stanton about the invasion of Afghanistan, Bruce Barcott wrote:

The valor exhibited by Afghan and American soldiers, fighting to free Afghanistan from a horribly cruel regime, will inspire even the most jaded reader. The stunning victory of the horse soldiers – 350 Special Forces soldiers, 100 C.I.A. officers and 15,000 Northern Alliance fighters routing a Taliban army 50,000 strong – deserves a hallowed place in American military history”.[101]

Small and highly agile paramilitary mobile teams spread out over the countryside to meet with locals and gather information about the Taliban and al-Qa’ida. During that time, one of the teams was approached in a village and asked by a young man for help in retrieving his teenage sister. He explained that a senior Taliban official had taken her as a wife and had sharply restricted the time she could spend with her family. The team gave the man a small hand-held tracking device to pass along to his sister, with instructions for her to activate it when the Taliban leader returned home. The team responded to her emergency signal, capturing the senior Taliban official and rescuing the sister. The siblings’ tearful reunion left the team at a loss for words—a rarity for the normally loud warriors of CIA’s Special Activities Division.[102]

Tora Bora

In December 2001, SAD/SOG and the Army’s Delta Force tracked down Osama bin Laden in the rugged mountains near the Khyber Pass in Afghanistan.[103]Former CIA station chief Gary Berntsen as well as a subsequent Senate investigation claimed that the combined American special operations task force was largely outnumbered by al-Qaeda forces and that they were denied additional US troops by higher command.[104] The task force also requested munitions to block the avenues of egress of bin Laden, but that request was also denied.[105] The team allegedly uncovered evidence in the subsequent site exploration that bin Laden’s ultimate aim was to obtain and detonate a nuclear device in a terrorist attack.[96] According to other press reports, SAD were ineffectual and “Bin Laden and bodyguards walked uncontested out of Tora Bora and disappeared into Pakistan’s unregulated tribal area.”[106]

Surge

In September 2009, the CIA planned on “deploying teams of spies, analysts and paramilitary operatives to Afghanistan, part of a broad intelligence ‘surge’ ordered by President Obama. This will make its station there among the largest in the agency’s history.”[107] This presence is expected to surpass the size of the stations in Iraq and Vietnam at the height of those wars.[107] The station is located at the U.S. Embassy in Kabul and is led “by a veteran with an extensive background in paramilitary operations”.[108] The majority of the CIA’s workforce is located among secret bases and military special operations posts throughout the country.[108][109]

Also in 2009, General Stanley McChrystal, the commander of NATO forces in Afghanistan, planned to request an increase in teams of CIA operatives, including their elite paramilitary officers, to join with U.S. military special operations forces. This combination worked well in Iraq and is largely credited with the success of that surge.[108][110] There have been basically three options described in the media: McChrystal’s increased counterinsurgency campaign; a counter-terror campaign using special operations raids and drone strikes; and withdrawal. The most successful combination in both the wars in Afghanistan and Iraq has been the linking up of SAD and military special forces to fight alongside highly trained indigenous units. One thing all of these options have in common is a requirement for greater CIA participation.[110]

The End Game

According to the current and former intelligence officials, General McChrystal also had his own preferred candidate for the Chief of Station (COS) job, a good friend and decorated CIA paramilitary officer.[111] The officer had extensive experience in war zones, including two previous tours in Afghanistan with one as the Chief of Station, as well as tours in the Balkans, Baghdad and Yemen. He is well known in CIA lore as “the man who saved Hamid Karzai‘s life when the CIA led the effort to oust the Taliban from power in 2001″. President Karzai is said to be greatly indebted to this officer and was pleased when the officer was named chief of station again. According to interviews with several senior officials, this officer “was uniformly well-liked and admired. A career paramilitary officer, he came to the CIA after several years in an elite Marine unit”.[111][112]

General McChrystal’s strategy included the lash up of special operations forces from the U.S. Military and from SAD/SOG to duplicate the initial success and the defeat of the Taliban in 2001[113] and the success of the “Surge” in Iraq in 2007.[114] This strategy proved highly successful and worked very well in Afghanistan with SAD/SOG and JSOC forces conducting raids nearly every night having “superb results” against the enemy.[115]

In 2001, the CIA’s SAD/SOG began creating what would come to be called Counter-terrorism Pursuit Teams (CTPT).[116][117] These units grew to include over 3,000 operatives by 2010 and have been involved in sustained heavy fighting against the enemy. It is considered the “best Afghan fighting force”.

Located at 7,800 feet (2,400 m) above sea level, Firebase Lilley in Shkin serves as a “nerve center for the covert war”.[117] This covert war includes being a hub for these CTPT operations with Firebase Lilley being just one in a constellation of CIA bases across Afghanistan.[117] These units have not only been highly effective in combat operations against the Taliban and al-Qaeda forces, but have also been used to engage with the tribes in areas with no other official government presence.[118]

This covert war also includes a large SOG/CTPT expansion into Pakistan to target senior al-Qaeda and Taliban leadership in the Federally Administered Tribal Area (FATA).[119] CTPT units are the main effort in both the “Counterterrorism plus” and the full “Counterinsurgency” options being discussed by the Obama administration in the December 2010 review.[120] SOG/CTPT are also key to any exit strategy for the U.S. government to leave Afghanistan, while still being able to deny al-Qaeda and other trans-national extremists groups a safehaven both in Afghanistan and in the FATA of Pakistan.[121]

In January 2013, a CIA drone strike killed Mullah Nazir a senior Taliban commander in the South Waziristan area of Pakistan believed responsible for carrying out the insurgent effort against the US military in Afghanistan. Nazir’s death degraded the Taliban.[122]

The U.S. has decided to lean heavily on CIA in general and SAD specifically in their efforts to withdraw from Afghanistan as it did in Iraq.[123] There are plans being considered to have several US Military special operations elements assigned to CIA after the withdrawal.[124]

Yemen

On November 5, 2002, a missile launched from a CIA-controlled Predator drone killed al-Qaeda members traveling in a remote area in Yemen. SAD/SOG paramilitary teams had been on the ground tracking their movements for months and called in this air strike.[125] One of those in the car was Ali Qaed Senyan al-Harthi, al-Qaeda’s chief operative in Yemen and a suspect in the October 2000 bombing of the destroyer USS Cole. Five other people, believed to be low-level al-Qaeda members, were also killed to include an American named Kamal Derwish.[126][127] Former Deputy U.S. Defense Secretary Paul Wolfowitz called it “a very successful tactical operation” and said “such strikes are useful not only in killing terrorists but in forcing al-Qaeda to change its tactics”.[126]

“It’s an important step that has been taken in that it has eliminated another level of experienced leadership from al-Qaeda,” said Vince Cannistraro, former head of counter-terrorism for the CIA and current ABC News consultant. “It will help weaken the organization and make it much less effective.”[128][129] Harithi was on the run, pursued by several security forces who were looking for him and Muhammad Hamdi al-Ahdal, another suspect in the USS Cole bombing case.[130]

In 2009, the Obama administration authorized continued lethal operations in Yemen by the CIA.[131] As a result, the SAD/SOG and JSOC have joined together to aggressively target al-Qaeda operatives in that country, both through leading Yemenese special forces and intelligence driven drone strikes.[131] A major target of these operations is Imam Anwar al-Aulaqi, an American citizen with ties to both Nidal Hassan, the alleged Fort Hood attacker, and Umar Farouk Abdulmutallab, the Christmas 2009 attempted bomber of Northwest Airline flight 253.[132] Imam al-Aulaki was killed on September 30, 2011 by an air attack carried out by the Joint Special Operations Command.[133]

Iraq

SAD paramilitary teams entered Iraq before the 2003 invasion. Once on the ground they prepared the battle space for the subsequent arrival of U.S. military forces. SAD teams then combined with U.S. Army special forces (on a team called the Northern Iraq Liaison Element or NILE).[17] This team organized the KurdishPeshmerga for the subsequent U.S. led invasion. This joint team combined in Operation Viking Hammer to defeat Ansar al-Islam, an Islamist group allied to al-Qaeda, which several battle-hardened fighters from Afghanistan had joined after the fall of the Taliban, in a battle for control over the northeast of Iraq – a battle that turned out being one of the “most intense battles of Special Forces since Vietnam”.[134] This battle was for an entire territory that was completely occupied by Ansar al-Islam and was executed prior to the invasion in February 2003. If this battle had not been as successful as it was, there would have been a considerable hostile force in the rear of the U.S./secular Kurdish force in the subsequent assault on the Iraqi army to the south. The U.S. side was represented by paramilitary operations officers from SAD/SOG and the army’s 10th Special Forces Group (10th SFG). 10th SFG soldiers were awarded three Silver Stars and six Bronze Stars with V for valor for this battle alone [135] and several paramilitary officers were awarded the Intelligence Star for valor in combat.[136] This battle was a significant direct attack and victory on a key U.S. opponent. It resulted in the deaths of a substantial number of militants and the uncovering of a crude laboratory that had traces of poisons and information on chemical weapons at Sargat.[17][137] The team found foreign identity cards, visas, and passports on the enemy bodies. They had come from a wide variety of Middle Eastern and north African countries including Yemen, Sudan, Saudi Arabia, Qatar, Oman, Tunisia, Morocco, and Iran.[135]Sargat was also the only facility that had traces of chemical weapons discovered in the Iraq war.[18][136][138]

The village of Biyara and Base of Ansar al-Islam 2001–2003

In a 2004 U.S. News & World Report article, “A firefight in the mountains”, the author states:

“Viking Hammer would go down in the annals of Special Forces history—a battle fought on foot, under sustained fire from an enemy lodged in the mountains, and with minimal artillery and air support.”[135]

SAD/SOG teams also conducted high risk special reconnaissance missions behind Iraqi lines to identify senior leadership targets. These missions led to the initial assassination attempts against Iraqi President Saddam Hussein and his key generals. Although the initial air strike against Hussein was unsuccessful in killing the dictator, it was successful in effectively ending his ability to command and control his forces. Other strikes against key generals were successful and significantly degraded the command’s ability to react to and maneuver against the U.S.-led invasion force.[17][139] SAD operations officers were also successful in convincing key Iraqi army officers to surrender their units once the fighting started and/or not to oppose the invasion force.[18]

NATO member Turkey refused to allow its territory to be used by the U.S. Army’s 4th Infantry Division for the invasion. As a result, the SAD/SOG, U.S. Army special forces joint teams, the Kurdish Peshmerga and the 173d Airborne Brigade were the entire northern force against the Iraqi army during the invasion. Their efforts kept the 13 divisions of the Iraqi Army in place to defend against the Kurds rather allowing them to contest the coalition force coming from the south.[134] This combined U.S. special operations and Kurdish force defeated the Iraqi Army.[17] Four members of the SAD/SOG team received CIA’s rare Intelligence Star for “extraordinary heroism”.[18]

The mission that captured Saddam Hussein was called “Operation Red Dawn“. It was planned and carried out by JSOC’s Delta Force and SAD/SOG teams (together called Task Force 121). The operation eventually included around 600 soldiers from the 1st Brigade of the 4th Infantry Division.[140][141] Special operations troops probably numbered around 40. Much of the publicity and credit for the capture went to the 4th Infantry Division soldiers, but CIA and JSOC were the driving force. “Task Force 121 were actually the ones who pulled Saddam out of the hole” said Robert Andrews, former deputy assistant Secretary of Defense for special operations and low-intensity conflict. “They can’t be denied a role anymore.”[140]

CIA paramilitary units continued to team up with the JSOC in Iraq and in 2007 the combination created a lethal force many credit with having a major impact in the success of “the Surge“. They did this by killing or capturing many of the key al-Qaeda leaders in Iraq.[142][143] In a CBS 60 Minutes interview, Pulitzer Prize-winning journalist Bob Woodward described a new special operations capability that allowed for this success. This capability was developed by the joint teams of CIA and JSOC.[144] Several senior U.S. officials stated that the “joint efforts of JSOC and CIA paramilitary units was the most significant contributor to the defeat of al-Qaeda in Iraq”.[142][145]

In May 2007, Marine Major Douglas A. Zembiec was serving in SAD Ground Branch in Iraq when he was killed by small arms fire while leading a raid.[146][147]Reports from fellow paramilitary officers stated that the flash radio report sent was “five wounded and one martyred”[148] Major Zembiec was killed while saving his soldiers, Iraqi soldiers. He was honored with an intelligence star for his valor in combat.[149]

On October 26, 2008, SAD/SOG and JSOC conducted an operation in Syria targeting the “foreign fighter logistics network” bringing al-Qaeda operatives into Iraq (See 2008 Abu Kamal raid).[150] A U.S. source told CBS News that “the leader of the foreign fighters, an al-Qaeda officer, was the target of Sunday’s cross-border raid.” He said the attack was successful, but did not say whether or not the al-Qaeda officer was killed.[151] Fox News later reported that Abu Ghadiya, “al-Qa’ida’s senior coordinator operating in Syria”, was killed in the attack.[152] The New York Times reported that during the raid U.S. forces killed several armed males who “posed a threat”.[153]

In September 2014 with the rise of the Islamic State, the U.S. government began aggressive military operations against them in both Iraq and Syria. SAD Ground Branch was placed in charge of the ground war.[154] This is a testament to SAD being the preeminent force for unconventional warfare and their long-standing relationship with the most effective fighting force in the region, the Kurdish Peshmerga.[155]

Pakistan

SAD/SOG has been very active “on the ground” inside Pakistan targeting al-Qaeda operatives for Unmanned Aerial Vehicle (UAV) Predator strikes and along with USSOCOM elements they have been training Pakistani Special Service Group Commandos.[156] Before leaving office, President George W. Bush authorized SAD’s successful killing of eight senior al-Qaeda operatives via targeted air strikes.[157] Among those killed were the mastermind of a 2006 plot to detonate explosives aboard planes flying across the Atlantic Rashid Rauf and the man thought to have planned the Islamabad Marriott Hotel bombing on September 20, 2008 that killed 53 people.[158][159] The CIA Director authorized the continuation of these operations and on January 23, SAD/SOG performed killings of 20 individuals in northwestern Pakistan that were terrorists. Some experts assess that the CIA Director – at that time Leon Panetta – has been more aggressive in conducting paramilitary operations in Pakistan than his predecessor.[160] A Pakistani security official stated that other strikes killed at least 10 insurgents, including five foreign nationals and possibly “a high-value target” such as a senior al-Qaeda or Taliban official.[161] On February 14, the CIA drone killed 27 taliban and al-Qaeda fighters in a missile strike in south Waziristan, a militant stronghold near the Afghan border where al-Qaeda leaders Osama bin Laden and Ayman al-Zawahri were believed to be hiding.[162]

According to the documentary film Drone, by Tonje Schei, since 2002 the U.S. Air Force 17th Reconnaissance Squadronhas been working for the CIA as “customer”, carrying out at least some of the armed missions in Pakistan.[163]

In a National Public Radio (NPR) report dated February 3, 2008, a senior official stated that al-Qaeda has been “decimated” by SAD/SOG’s air and ground operations. This senior U.S. counter-terrorism official goes on to say, “The enemy is really, really struggling. These attacks have produced the broadest, deepest and most rapid reduction in al-Qaida senior leadership that we’ve seen in several years.”[164] President Obama’s CIA Director Leon Panetta stated that SAD/SOG’s efforts in Pakistan have been “the most effective weapon” against senior al-Qaeda leadership.[165][166]

These covert attacks have increased significantly under President Obama, with as many at 50 al-Qaeda militants being killed in the month of May 2009 alone.[167][168][169] In June 2009, sixty Taliban fighters were killed while at a funeral to bury fighters that had been killed in previous CIA attacks.[170] On July 22, 2009, National Public Radio reported that U.S. officials believeSaad bin Laden, a son of Osama bin Laden, was killed by a CIA strike in Pakistan. Saad bin Laden spent years under house arrest in Iran before traveling last year to Pakistan, according to former National Intelligence Director Mike McConnell. It’s believed he was killed sometime in 2009. A senior U.S. counter-terrorism said U.S. intelligence agencies are “80 to 85 percent” certain that Saad bin Laden is dead.[171]

On August 6, 2009, the CIA announced that Baitullah Mehsud was killed by a SAD/SOG drone strike in Pakistan.[172] The New York Times said, “Although President Obama has distanced himself from many of the Bush administration’s counter-terrorism policies, he has embraced and even expanded the C.I.A.’s covert campaign in Pakistan using Predator and Reaper drones”.[172] The biggest loss may be to “Osama bin Laden’s al-Qa’ida”. For the past eight years, al-Qaeda had depended on Mehsud for protection after Mullah Mohammed Omar fled Afghanistan in late 2001. “Mehsud’s death means the tent sheltering Al Qaeda has collapsed,” an Afghan Taliban intelligence officer who had met Mehsud many times told Newsweek. “Without a doubt he was Al Qaeda’s No. 1 guy in Pakistan,” adds Mahmood Shah, a retired Pakistani Army brigadier and a former chief of the Federally Administered Tribal Area, or FATA, Mehsud’s base.[173]

Airstrikes from CIA drones struck targets in the Federally Administered Tribal Areas (FATA) of Pakistan on September 8, 2009. Reports stated that seven to ten militants were killed to include one top al-Qaida leaders. He was Mustafa al-Jaziri, an Algerian national described as an “important and effective” leader and senior military commander for al-Qaida. The success of these operations are believed to have caused senior Taliban leaders to significantly alter their operations and cancel key planning meetings.[174][175]

The CIA is also increasing its campaign using Predator missile strikes on al-Qaeda in Pakistan. The number of strikes in 2009 exceeded the 2008 total, according to data compiled by the Long War Journal, which tracks strikes in Pakistan.[108] In December 2009, the New York Times reported that President Obama ordered an expansion of the drone program with senior officials describing the program as “a resounding success, eliminating key terrorists and throwing their operations into disarray”.[176] The article also cites a Pakistani official who stated that about 80 missile attacks in less than two years have killed “more than 400” enemy fighters, a number lower than most estimates but in the same range. His account of collateral damage was strikingly lower than many unofficial counts: “We believe the number of civilian casualties is just over 20, and those were people who were either at the side of major terrorists or were at facilities used by terrorists.”[176]

On December 6, 2009, a senior al-Qaeda operative, Saleh al-Somali, was killed in a drone strike in Pakistan. He was responsible for their operations outside of the Afghanistan-Pakistan region and formed part of the senior leadership. Al-Somali was engaged in plotting terrorist acts around the world and “given his central role, this probably included plotting attacks against the United States and Europe”.[177][178] On December 31, 2009, senior Taliban leader and strong Haqqani ally Haji Omar Khan, brother of Arif Khan, was killed in the strike along with the son of local tribal leader Karim Khan.[179]

In January 2010, al-Qaeda in Pakistan announced that Lashkar al-Zil leader Abdullah Said al Libi was killed in a drone missile strike. Neither al-Qaeda nor the US has revealed the date of the attack that killed Libi.[180] On January 14, 2010, subsequent to the suicide attack at Camp Chapman, the CIA located and killed the senior Taliban leader in Pakistan, Hakimullah Mehsud. Mehsud had claimed responsibility in a video he made with the suicide bomber Humam Khalil Abu-Mulal al-Balawi.[181]

On February 5, 2010, the Pakistani Inter-Services Intelligence (ISI) and CIA’s SAD/SOG conducted a joint raid and apprehended Mullah Abdul Ghani Baradar. Baradar was the most significant Taliban figure to be detained since the beginning of the Afghan War more than eight years ago until that date. He ranked second to Mullah Muhammad Omar, the Taliban’s founder and was known to be a close associate of Osama bin Laden. Mullah Baradar was interrogated by CIA and ISI officers for several days before news of his capture was released.[182] This capture sent the message that the Taliban leadership is not safe in Afghanistan or Pakistan.[183] “The seizure of the Afghan Taliban’s top military leader in Pakistan represents a turning point in the U.S.-led war against the militants”, U.S. officials and analysts said.[184] Per Pakistani Interior Minister Rehman Malik, several raids in Karachi in early February netted dozens of suspected Afghan militants.[184] In other joint raids that occurred around the same time, Afghan officials said that the Taliban “shadow governorsP for two provinces in northern Afghanistan had also been detained. Mullah Abdul Salam, the Taliban’s leader in Kunduz, and Mullah Mir Mohammed of Baghlan were captured in Akora Khattack.[185]

On February 20, Muhammad Haqqani, son of Jalaluddin Haqqani, was one of four people killed in the drone strike in Pakistan’s tribal region in North Waziristan, according to two Pakistani intelligence sources.[186]

On May 31, 2010, the New York Times reported that Mustafa Abu al Yazid (AKA Saeed al Masri), a senior operational leader for Al Qaeda, was killed in an American missile strike in Pakistan’s tribal areas.[187]

From July to December 2010, predator strikes killed 535 suspected militants in the FATA to include Sheikh Fateh Al Misri, Al-Qaeda’s new third in command on September 25.[188] Al Misri was planning a major terrorist attack in Europe by recruiting British Muslims who would then go on a shooting rampage similar to what transpired in Mumbai in November 2008.[189]

Operation Neptune Spear

File:President Obama on Death of Osama bin Laden.ogv

President Barack Obama‘s address(Text)

On May 1, 2011, President Barack Obama announced that Osama bin Laden had been killed earlier that day in Abbottabad, Pakistan by “a small team of Americans” acting under his direct orders during a CIA operation under Director Leon Panetta.[24][28][190] The helicopter raid was executed from a CIA forward operating base in Afghanistan by the elements of the U.S. Naval Special Warfare Development Group (assigned to the CIA) and CIA paramilitary operatives.[191] [192][193]

The operation in the Bilal military cantonment area in the city of Abbottabad resulted in the acquisition of extensive intelligence on the future attack plans of al-Qaeda.[194][195][196] The body of bin Laden was flown to Afghanistan to be identified and then out to the USS Carl Vinson for a burial at sea.[197] DNA from bin Laden’s body, compared with DNA samples on record from his dead sister, confirmed his identity.

The operation was a result of years of intelligence work that included the Inter-Services Intelligence (ISI), the CIA, the DSS, and the Delta Force‘s, apprehension and interrogation of Khalid Sheik Mohammad (KSM),[198][199][200] the discovery of the real name of the courier disclosed by KSM, the tracking, via signal intelligence, of the courier to the Abbottobad compound by paramilitary operatives and the establishment of a CIA safe house that provided critical advance intelligence for the operation.[201][202][203][203]

The material discovered in the raid indicated that bin Laden was still in charge of his Al-Qaeda organization and was developing plans and issuing orders at the time of his death. There is considerable controversy over claims that elements of the Pakistani government, particularly the ISI, may have been concealing the presence of Osama bin Laden in Pakistan.[204][205][206] Bin Laden’s death has been labeled a “game changer” and a fatal blow to Al-Qaeda, by senior U.S. officials.[207]

Iran

In the early 1950s, the Central Intelligence Agency and Britain’s Secret Intelligence Service were ordered to overthrow the government of Iran, Prime MinisterMohammed Mosaddeq, and re-install deposed Shah Mohammad Reza Pahlavi.[208] This event was called Operation Ajax.[209][210] The senior CIA officer was Kermit Roosevelt, Jr., the grandson of American president Theodore Roosevelt. The operation utilized all of SAD’s components to include political action, covert influence and paramilitary operations. The paramilitary component included training anti-Communist guerrillas to fight the Tudeh Party if they seized power in the chaos of Operation Ajax.[211] Although a significant tactical/operational success, Operation Ajax is considered very controversial with many critics.[212]

In November 1979, a group of Islamist students and militants took over the American embassy in support of the Iranian Revolution.[213] Operation Eagle Claw was the unsuccessful United States military operation that attempted to rescue the 52 hostages from the U.S. Embassy in Tehran, Iran on April 24, 1980. Several SAD/SOG teams infiltrated into Tehran to support this operation.[214]

On March 9, 2007 alleged CIA Agent Robert Levinson was kidnapped from Iran’s Kish Island. On July 7, 2008, Pulitzer Prize winning investigative journalist and author Seymour Hersh wrote an article in the New Yorker stating that the Bush Administration had signed a Presidential Finding authorizing the CIA to begin cross border paramilitary operations from Iraq and Afghanistan into Iran. These operations would be against Quds Force, the commando arm of the Iranian Revolutionary Guard, public and private sector strategic targets, and “high-value targets” in the war on terror. Also enrolled to support CIA objectives were the Mujahideen-e-Khalq, known in the West as the M.E.K.,and the Baluchis insurgents. “The Finding was focused on undermining Iran’s nuclear ambitions and trying to undermine the government through regime change,” a person familiar with its contents said, and involved “working with opposition groups and passing money.”[215] Any significant effort against Iran by the Obama Administration would likely come directly from SAD.[216] and in July 2010, Director Panetta chose a former chief of SAD as the new NCS Director.[217]

Libya

After the Arab Spring movements overthrew the rulers of Tunisia and Egypt, its neighbours to the west and east respectively, Libya had a major revolt beginning in February 2011.[218][219] In response, the Obama administration sent in SAD paramilitary operatives to assess the situation and gather information on the opposition forces.[220][221] Experts speculated that these teams could be determining the capability of these forces to defeat the Muammar Gaddafi regime and whether Al-Qaeda had a presence in these rebel elements.

U.S. officials had made it clear that no U.S. troops would be “on the ground”, making the use of covert paramilitary operatives the only alternative.[222] During the early phases of the Libyan offensive of U.S. led air strikes, paramilitary operatives assisted in the recovery of a U.S. Air Force pilot who had crashed due to mechanical problems.[223] [224] There was speculation that President Obama issued a covert action finding in March 2011 that authorizes the CIA to carry out a clandestine effort to provide arms and support to the Libyan opposition.[225]

Syria

CIA paramilitary teams have been deployed to Syria to report on the uprising, to access the rebel groups, leadership and to potentially train, equip and lead one of those rebel groups against the Bashar al-Assad regime.[226] In early September 2013, President Obama told U.S. Senators that the CIA had trained the first 50-man insurgent element and that they had been inserted into Syria.[227] The deployment of this unit and the supplying of weapons may be the first tangible measure of support since the U.S. stated they would begin providing assistance to the opposition.[228][229]

In October 2013, SAD was tasked with overthrowing the Syrian government of Bashar al-Assad. This program was considered too limited to have the desired outcome.[230] However, with the rise of the Islamic State, SAD was given the overall command and control of the ground fight against them. This fight will cross the borders between Iraq and Syria.[154][231]

Worldwide mission

Khalid Sheikh Mohammed after his capture

The CIA has always had a Special Activities Division, which secretly carries out special operations mission. However, since September 11, 2001 the US government has relied much more on SAD/SOG because fighting terrorists does not usually involve fighting other armies. Rather, it involves secretly moving in and out of countries like Pakistan, Iran and Somaliawhere the American military is not legally allowed to operate.[232]

If there are missions in these countries that are denied to U.S. military special operations forces, SAD/SOG units are the primary national special missions units to execute those operations.[233]

In the War on Terror, SAD has the lead in the covert war being waged against al Qaeda.[11][234] SAD/SOG paramilitary teams have apprehended many of the senior leaders. These include: Abu Zubaydah,[235] the chief of operations for al-Qaeda;Ramzi bin al-Shibh,[236] the so-called the “20th hijacker”;[237] Khalid Sheikh Mohammed, the mastermind of the September 11, 2001 attacks on New York City and Washington, D.C.;[238] Abd al-Rahim al-Nashiri, alleged to be the mastermind of theUSS Cole bombing and leader of al Qaeda operations in the Persian Gulf prior to his capture in November 2002;[239] Abu Faraj al-Libi, al Qaeda’s “field general” believed to have taken the role of No. 3 in al Qaeda following the capture of Khalid Sheikh Mohammed in Pakistan;[240] andMullah Abdul Ghani Baradar, the number two taliban commander and the highest level taliban commander apprehended in the Afghan War.[241] Prior to the beginning of the “War on Terror”, SAD/SOG located and captured many notable militants and international criminals, including Abimael Guzman and Carlos the Jackal. These were just three of the over 50 caught by SAD/SOG just between 1983 and 1995.[242]

In 2002, the George W. Bush Administration prepared a list of “terrorist leaders” the CIA is authorized to kill in a targeted killing, if capture is impractical and civilian casualties can be kept to an acceptable number. The list includes key al Qaeda leaders like Osama bin Laden (deceased) and his chief deputy, Ayman al-Zawahiri, as well as other principal figures from al Qaeda and affiliated groups. This list is called the “high value target list”.[243] The U.S. president is not legally required to approve each name added to the list, nor is the CIA required to obtain presidential approval for specific attacks, although the president is kept well informed about operations.[243]

SAD/SOG teams have been dispatched to the country of Georgia, where dozens of al Qaeda fugitives from Afghanistan are believed to have taken refuge withChechen separatists and thousands of refugees in the Pankisi Gorge. Their efforts have already resulted in 15 Arab militants linked to al Qaeda being captured.[125]

The SAD/SOG teams have also been active in the Philippines, where 1,200 U.S. military advisers helped to train local soldiers in “counter-terrorist operations” against Abu Sayyaf, a radical Islamist group suspected of ties with al Qaeda. Little is known about this U.S. covert action program, but some analysts believe that “the CIA’s paramilitary wing, the Special Activities Division (SAD), has been allowed to pursue terrorist suspects in the Philippines on the basis that its actions will never be acknowledged”.[125]

On July 14, 2009, several newspapers reported that DCIA Leon Panetta was briefed on a CIA program that had not been briefed to the oversight committees in Congress. Panetta cancelled the initiative and reported its existence to Congress and the President. The program consisted of teams of SAD paramilitary officers organized to execute targeted killing operations against al Qaeda operatives around the world in any country. According to the Los Angeles Times, DCIA Panetta “has not ruled out reviving the program”.[11] There is some question as to whether former Vice President Dick Cheney instructed the CIA not to inform Congress.[244]Per senior intelligence officers, this program was an attempt to avoid the civilian casualties that can occur during predator drone strikes using Hellfire missiles.[245][246]

According to many experts, the Obama administration has relied on the CIA and their paramilitary capabilities, even more than they have on U.S. military forces, to maintain the fight against terrorists in the Afghanistan and Pakistan region, as well as places like Yemen, Somalia and North Africa.[247][248] Ronald Kessler states in his book The CIA at War: Inside the Secret War Against Terror, that although paramilitary operations are a strain on resources, they’re winning the war against terrorism.[247][249]

SAD/SOG paramilitary officers executed the clandestine evacuation of U.S. citizens and diplomatic personnel in Somalia, Iraq (during the Persian Gulf War) andLiberia during periods of hostility, as well as the insertion of Paramilitary Operations Officers prior to the entry of U.S. military forces in every conflict since World War II.[250] SAD officers have operated covertly since 1947 in places such as North Korea, Vietnam, Laos, Cambodia, Lebanon, Iran, Syria, Libya, Iraq, El Salvador,Guatemala, Colombia, Mexico, Nicaragua, Honduras, Chile, Bosnia and Herzegovina, Serbia, Somalia, Kosovo, Afghanistan and Pakistan.[251]

Innovations in special operations

The Fulton system in use

The Fulton surface-to-air recovery system (STARS) is a system developed in the early 1950s by CIA paramilitary officers for retrieving persons on the ground from a MC-130E Combat Talon I aircraft. It uses a harness and a self-inflating balloon that carries an attached lift line. An MC-130E engages the line with its V-shaped yoke and the individual is reeled on board.[252]Project COLDFEET was a very successful mission in 1962 in which two military officers parachuted into a remote abandoned Soviet site in the Arctic. The two were subsequently extracted by the Fulton sky hook. The team gathered evidence of advanced research on acoustical systems to detect under-ice US submarines and efforts to develop Arctic anti-submarine warfare techniques.[253]

Sergeant Major (SgtMaj) Billy Waugh was a Special Forces soldier attached to CIA in the 1960s. During his time at MACV-SOG in Vietnam, he developed and conducted the first combat High Altitude-Low Opening (HALO) jump, “In October 1970, my team made a practice Combat Infiltration into the NVA owned War Zone D, in South Vietnam, for reassembly training, etc. This was the first one in a combat zone.”[254] HALO is a method of delivering personnel, equipment, and supplies from a transport aircraft at a high altitude via free-fall parachute insertion. HALO andHAHO (High Altitude-High Opening) are also known as Military Free Fall (MFF). In the HALO technique, the parachutist opens his parachute at a low altitude after free-falling for a period of time to avoid detection by the enemy. Waugh also led the last combat special reconnaissance parachute insertion into enemy territory occupied by communist North Vietnamese Army (NVA) troops on June 22, 1971.[255]

Notable paramilitary officers

On October 25, 2003, paramilitary officers Christopher Mueller and William “Chief” Carlson were killed while conducting an operation to kill/capture high level al-Qa’ida leaders near Shkin, Afghanistan. Both these officers were honored with Stars on the CIA Memorial Wall at their Headquarters in Langley, Virginia.[256] “The bravery of these two men cannot be overstated,” Director of Central Intelligence George J. Tenet told a gathering of several hundred Agency employees and family members. “Chris and Chief put the lives of others ahead of their own. That is heroism defined.” Mueller, a former US Navy SEAL and Carlson, a former Army Special Forces soldier, Delta Force operator, and member of the Blackfeet Nation in Montana, died while on this covert operation. Both officers saved the lives of others, including Afghan soldiers, during the engagement with al-Qa’ida forces.[256][257][258] In Oliver North’s book American Heroes in Special Operations, a chapter is devoted to their story.[259]

Notable political action officers

  • Virginia Hall Goillot started as the only female paramilitary officer in the OSS. She shot herself in the leg while hunting in Turkey in 1932, which was then amputated below the knee. She parachuted into France to organize the resistance with her prosthesis strapped to her body. She was awarded theDistinguished Service Cross. She married an OSS officer named Paul Goillot and the two joined the CIA as paramilitary operations officers in SAD. Once aboard, Mrs. Goillot made her mark as a political action officer playing significant roles in the Guatemala and Guyana operations. These operations involved the covert removal of the governments of these two countries, as directed by the President of the United States.[260]
  • E. Howard Hunt (October 9, 1918 – January 23, 2007) was an Ivy league educated Naval officer who joined the CIA in 1949 after serving with the OSS in World War II. Hunt was a political action officer in what came to be called their Special Activities Division.[261] He became station chief in Mexico City in 1950, and supervised William F. Buckley, Jr., (Not to be confused with a famous SAD Paramilitary Officer of the same name) who worked for the CIA in Mexico during the period 1951–1952. Buckley, another SAD political action specialist, only served briefly in the CIA and went on to be considered the father of the modern American conservative movement. Buckley and Hunt remained lifelong friends.[262] Hunt ran Operation PBSUCCESS, which overthrew the government in Guatemala in 1954, was heavily involved in theBay of Pigs Invasion operation, frequently mentioned in the JFK assassination, and was one of the operatives in the Watergate scandal.[263]Hunt was also a well-known author with over 50 books to his credit. These books were published under several alias names and several were made into motion pictures.[264]
  • David Atlee Phillips Perhaps the most famous propaganda officer ever to serve in CIA, Phillips began his career as a journalist and amateur actor in Buenos Aires, Argentina. He joined the Agency in the 1950s and was one of the chief architects of the operation to overthrow Communist president Arbenz in Guatemala in 1954. He was later heavily engaged as a principal member of the Bay of Pigs Task Force at Langley, and in subsequent anti-Castro operations throughout the 1960s. He founded the Association of Former Intelligence Officers (AFIO) after successfully contesting a libel suit against him.

CIA Memorial Wall

Main article: CIA Memorial Wall

The CIA Memorial Wall is located at CIA headquarters in Langley, Virginia. It honors CIA employees who died in the line of duty.[265] As of August 6, 2012, there were 103 stars carved into the marble wall,[266] each one representing an officer. A majority of these were paramilitary officers.[265] A black book, called the “Book of Honor”, lies beneath the stars and is encased in an inch-thick plate of glass.[266] Inside this book are stars, arranged by year of death, and the names of 77 employees who died in CIA service alongside them.[265][266] The other names remain secret, even in death.[265]

See also

Declaration of war by the United States

From Wikipedia, the free encyclopedia

Franklin D. Roosevelt signs the declaration of war against Japan on December 8, 1941

A declaration of war is a formal declaration issued by a national government indicating that a state of war exists between that nation and another. The document Declarations of War and Authorizations for the Use of Military Force: Historical Background and Legal Implications gives an extensive listing and summary of statutes which are automatically engaged upon the US declaring war.

For the United States, Article One, Section Eight of the Constitution says “Congress shall have power to … declare War”. However, that passage provides no specific format for what form legislation must have in order to be considered a “declaration of war” nor does the Constitution itself use this term. Many[who?] have postulated “Declaration(s) of War” must contain that phrase as or within the title. Others oppose that reasoning. In the courts, the United States Court of Appeals for the First Circuit, in Doe v. Bush, said: “[T]he text of the October Resolution itself spells out justifications for a war and frames itself as an ‘authorization’ of such a war.”[1] in effect saying an authorization suffices for declaration and what some may view as a formal Congressional “Declaration of War” was not required by the Constitution.

This article will use the term “formal declaration of war” to mean Congressional legislation that uses the phrase “declaration of war” in the title. Elsewhere, this article will use the terms “authorized by Congress”, “funded by Congress” or “undeclared war” to describe other such conflicts.

History

The United States has formally declared war against foreign nations five separate times, each upon prior request by the President of the United States. Four of those five declarations came after hostilities had begun.[2] James Madison reported that in the Federal Convention of 1787, the phrase “make war” was changed to “declare war” in order to leave to the Executive the power to repel sudden attacks but not to commence war without the explicit approval of Congress.[3] Debate continues as to the legal extent of the President’s authority in this regard.

After Congress repealed the Gulf of Tonkin Resolution in January 1971 and President Richard Nixon continued to wage war in Vietnam, Congress passed the War Powers Resolution (Pub.L. 93–148) over the veto of Nixon in an attempt to rein in some of the president’s claimed powers. The War Powers Resolution proscribes the only power of the president to wage war which is recognized by Congress.

Declarations of war

Formal

The table below lists the five wars in which the United States has formally declared war against eleven foreign nations.[4] The only country against which the United States has declared war more than once is Germany, against which the United States has declared war twice (though a case could be made for Hungary as asuccessor state to Austria-Hungary).

In World War II, the Japanese attacked Pearl Harbor on December 7, 1941. Germany and Italy, led respectively by Adolf Hitler and Benito Mussolini, declared war on the United States, and the U.S. Congress responded in kind.[5][6]

War Declaration Opponent(s) Date of declaration Votes President Result
Senate House
War of 1812 Declaration of War upon the U.K.  United Kingdom June 18, 1812 19–13 79–49 James Madison Treaty of Ghent(December 24, 1814)
Mexican–American War “An Act providing for the Prosecution of the existing War between the United States and the Republic of Mexico.”[7] Mexico May 13, 1846 40–2 173–14 James K. Polk Treaty of Guadalupe Hidalgo (February 2, 1848)
Spanish–American War Declaration of War upon Spain  Spain April 25, 1898 42–35 310–6 William McKinley Treaty of Paris(December 10, 1898)
World War I Declaration of War upon Germany  Germany April 6, 1917 82–6 373–50 Woodrow Wilson Treaty of Berlin (August 25, 1921)
Declaration of War upon Austria-Hungary[8][9]  Austria-Hungary December 7, 1917 74–0 365–1 1921 U.S.–Austrian Peace Treaty (August 24, 1921), 1921 U.S.-Hungarian Peace Treaty (August 29, 1921)
World War II Declaration of War upon Japan  Japan December 8, 1941 82–0 388–1 Franklin D. Roosevelt V-J Day, Japanese Instrument of Surrender(September 2, 1945),Treaty of San Francisco(September 8, 1951)
Declaration of War upon Germany  Germany December 11, 1941 88–0 393–0 V-E Day, German Instrument of Surrender(May 8, 1945), Treaty on the Final Settlement with Respect to Germany (September 12, 1990), Treaty of Vienna with Austria (May 15, 1955)
Declaration of War upon Italy  Italy 90–0 399–0 Paris Peace Treaty(February 10, 1947)
Declaration of War upon Bulgaria  Bulgaria June 5, 1942 73–0 357–0
Declaration of War upon Hungary[8]  Hungary 360–0
Declaration of War upon Romania[8]  Romania 361-0

Military engagements authorized by Congress

In other instances, the United States has engaged in extended military combat that was authorized by Congress.

War or conflict Opponent(s) Initial authorization Votes President Result
U.S. Senate U.S. House
Quasi-War France Act Further to Protect the Commerce of the United States
July 9, 1798
18-4 John Adams Treaty of Mortefontaine
First Barbary War Tripoli February 6, 1802[10] Thomas Jefferson War ended 1805
Second Barbary War Algiers May 10, 1815[11] James Madison War ended 1816
Enforcing 1808 slave trade ban; naval squadron sent to African waters to apprehend illegal slave traders Slave traders and pirates “Act in addition to the acts prohibiting the Slave Trade” 1819 James Monroe 1822 first African-American settlement founded in Liberia, 1823 U.S. Navy stops anti-trafficking patrols
Redress for attack on U.S. Navy‘sUSS Water Witch  Paraguay 1858.[12] James Buchanan
Occupation of Veracruz  Mexico H.J.R. 251, 38 Stat. 770
April 22, 1914
337–37 Woodrow Wilson Force withdrawn after six months. However, the Joint Resolution was likely used to authorize the Pancho Villa Expedition. In the Senate, “when word reached the Senate that the invasion had gone forward before the use-of-force resolution had been approved, Republicans reacted angrily” saying it was a violation of the Constitution, but eventually after the action had already started, a resolution was passed after the action to “justify” it since Senators did not think it was a declaration of war.[13][14]
Intervention during the Russian Civil War  Russia 1918 [15] Woodrow Wilson
Lebanon crisis of 1958 Lebanese opposition, led by
Al-Mourabitoun
Progressive Socialist Party
H.J. Res. 117, Public Law 85-7, Joint Resolution “To promote peace and stability in the Middle East”, March 9, 1957[16] 72–19 355–61 Dwight D. Eisenhower U.S. forces withdrawn, October 25, 1958
Vietnam War Viet Cong
North Vietnam
Gulf of Tonkin Resolution, August 7, 1964 88–2 416–0 John F. Kennedy, Lyndon B. Johnson, Richard M. Nixon U.S. forces withdrawn under terms of the Paris Peace Accords signed January 27, 1973
Multinational Force in Lebanon Shia and Druze militias; Syria S.J.R. 159
September 29, 1983
54–46 253–156 Ronald W. Reagan Forces withdrawn in 1984
Persian Gulf War Iraq H.R.J. Res. 77
January 12, 1991.
52–47 250–183 George H.W. Bush The United Nations Security Council drew up terms for the cease-fire, April 3, 1991
War in Afghanistan Afghanistan
al-Qaeda
S.J. Res. 23
September 14, 2001
98–0 420–1 George W. Bush War ended on December 28, 2014
Iraq War[17] Iraq H.J. Res. 114,
March 3, 2003
77–23 296–133 George W. Bush Ba’athist Iraqi government deposed April 2003. U.S. combat operations ended August 31, 2010. War ended December 15, 2011. Destabilization of Iraq and emergence of ISIL in the region 2011–present.[18]

Military engagements authorized by United Nations Security Council Resolutions and funded by Congress

In many instances, the United States has engaged in extended military engagements that were authorized by United Nations Security Council Resolutions and funded by appropriations from Congress.

Military engagement Opponent(s) Initial authorization President Result
Korean War  North Korea
 China
UNSCR 84, 1950 Harry S. Truman Korean Armistice Agreement,[19] 1953
Multinational Force in Lebanon Shia militias, Druzemiltias, Syria UNSCR 425, 1978UNSCR 426, 1978 Jimmy Carter, Ronald Reagan U.S. forces withdrew in 1984
Persian Gulf War Iraq UNSCR 678, 1990 George H. W. Bush UNSCR 689, 1991
Bosnian War Republika Srpska UNSCR 770, 1992
UNSCR 776, 1992
UNSCR 836, 1993
Bill Clinton Reflagged as IFOR in 1995, Reflagged as SFORin 1996, Completed in 2004
Second Liberian Civil War Peacekeeping UNSCR 1497, 2003 George W. Bush U.S. forces are withdrawn in 2003 after theUNMIL is established.
Haitian coup d’état UNSCR 1529, 2004UNSCR 1542, 2004 2004
Libyan Civil War Libya UNSCR 1973, 2011 Barack Obama Debellation of the Libyan Arab Jamahiriya, October 31, 2011

Other undeclared wars

On at least 125 occasions, the President has acted without prior express military authorization from Congress.[20] These include instances in which the United States fought in the Philippine–American War from 1898–1903, in Nicaragua in 1927, as well as the NATO bombing campaign of Yugoslavia in 1999.

The United States’ longest war was fought between approximately 1840 and 1886 against the Apache Nation. During that entire 46-year period, there was never more than 90 days of peace.[citation needed]

The Indian Wars comprise at least 28 conflicts and engagements. These localized conflicts, with Native Americans, began with European colonists coming to North America, long before the establishment of the United States. For the purpose of this discussion, the Indian Wars are defined as conflicts with the United States of America. They begin as one front in the American Revolutionary War in 1775 and had concluded by 1918. The United States Army still maintains a campaign streamer for Pine Ridge 1890–1891 despite opposition from certain Native American groups.[21]

The American Civil War was not an international conflict under the laws of war, because the Confederate States of America was not a government that had been granted full diplomatic recognition as a sovereign nation by other sovereign states.[22][23] The CSA was recognized by the United States government as a belligerent power, a different status of recognition that authorized Confederate warships to visit non-U.S. ports. This recognition of the CSA’s status as a belligerent power did not impose any duty upon the United States to recognize the sovereignty of the Confederacy, and the United States never did so.

The War Powers Resolution

In 1973, following the withdrawal of most American troops from the Vietnam War, a debate emerged about the extent of presidential power in deploying troops without a declaration of war. A compromise in the debate was reached with the War Powers Resolution. This act clearly defined how many soldiers could be deployed by the President of the United States and for how long. It also required formal reports by the President to Congress regarding the status of such deployments, and limited the total amount of time that American forces could be deployed without a formal declaration of war.

Although the constitutionality of the act has never been tested, it is usually followed, most notably during the Grenada Conflict, the Panamanian Conflict, the Somalia Conflict, the Persian Gulf War, and the Iraq War[clarification needed]. The only exception was President Clinton’s use of U.S. troops in the 78-day NATO air campaign against Yugoslavia during the Kosovo War.[citation needed] In all other cases, the President asserted the constitutional authority to commit troops without the necessity of Congressional approval, but in each case the President received Congressional authorization that satisfied the provisions of the War Powers Act.

On March 21, 2011, a number of lawmakers expressed concern that the decision of President Barack Obama to order the U.S. military to join in attacks of Libyan air defenses and government forces exceeded his constitutional authority because the decision to authorize the attack was made without Congressional permission.[24]

See also

References

  1. Jump up^ Doe v. Bush, 03-1266, (March 13, 2003)”. FindLaw. Retrieved 20 June 2013.
  2. Jump up^ Henderson, Phillip G. (2000). The presidency then and now. Rowman & Littlefield. p. 51. ISBN 978-0-8476-9739-7.
  3. Jump up^ The Debates in the Federal Convention of 1787 reported by James Madison : August 17,The Avalon Project, Yale Law School, retrieved Feb 13, 2008
  4. Jump up^ Official Declarations of War by Congress
  5. Jump up^ BBC News, On This Day
  6. Jump up^ Whereas the Government of Germany has formally declared war against the government and the people of the United States of America… the state of war between the United States and the Government of Germany which has thus been thrust upon the United States is hereby formally declared. The War Resolution
  7. Jump up^ United States Congress (May 13, 1846). “An Act providing for the Prosecution of the existing War between the United States and the Republic of Mexico.” (PDF).Government of the United States of America. Government of the United States of America. Retrieved August 10, 2006.
  8. ^ Jump up to:a b c https://fas.org/sgp/crs/natsec/RL31133.pdf
  9. Jump up^ H.J.Res.169: Declaration of War with Austria-Hungary, WWI, United States Senate
  10. Jump up^ Key Events in the Presidency of Thomas Jefferson, Miller Center of Public Affairs, University of Virginia, (retrieved on August 10, 2010).
  11. Jump up^ Key Events in the Presidency of James Madison, Miller Center of Public Affairs, University of Virginia, (retrieved on August 10, 2010).
  12. Jump up^ Expenses – Paraguay Expedition, House of Representatives, 36th Congress, 1st Session, Mis. Doc. No. 86 (May 11, 1860), p. 142
  13. Jump up^ http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA416074
  14. Jump up^ http://www.wilsoncenter.org/sites/default/files/ACF18F1.pdf
  15. Jump up^ A History of Russia, 7th Edition, Nichlas V. Riasanovsky & Mark D. Steinberg, Oxford University Press, 2005.
  16. Jump up^ http://www.shafr.org/wp-content/uploads/2011/11/U.S.-Congress-Approval-of-the-Eisenhower-Doctrine-1957.pdf
  17. Jump up^ http://www.msnbc.msn.com/id/38944049/ns/politics-white_house
  18. Jump up^ Londoño, Ernesto (August 19, 2010). “Operation Iraqi Freedom ends as last combat soldiers leave Baghdad”. The Washington Post.
  19. Jump up^ s:Korean Armistice Agreement
  20. Jump up^ The President’s Constitutional Authority To Conduct Military Operations Against Terrorists and Nations Supporting Them
  21. Jump up^ Army Continues to Parade Wounded Knee Battle Streamer, National Congress of American Indians.
  22. Jump up^ “Preventing Diplomatic Recognition of the Confederacy, 1861–1865”. U.S. Department of State.
  23. Jump up^ McPherson, James M. (2007). This Mighty Scourge: Perspectives on the Civil War. Oxford University Press US. p. 65. ISBN 978-0-19-531366-6.
  24. Jump up^ Obama Attacked for No Congressional Consent on Libya, New York Times.

Further reading

External links

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 556-559

Listen To Pronk Pops Podcast or Download Show 546-555

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Is President Obama Sabotaging The Federal Bureau of Investigation Of Hillary Clinton’s Handling of Classified Documents? American People Want To Know — Will Hillary Clinton Be Indicted or Nominated? Yes Hillary Will Be Indicted For Violation of 18 U.S. Code § 793 and §798 and §1924 — Biden Backup to Replace Hillary Clinton — California Governor Jerry Brown To Enter Race? — Videos

Posted on October 17, 2015. Filed under: American History, Blogroll, Central Intelligence Agency (CIA), College, Communications, Computers, Congress, Corruption, Crime, Crisis, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Documentary, Education, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI), Federal Communications Commission, government spending, history, Homicide, Islam, Islam, Law, liberty, Life, Links, Literacy, Money, National Security Agency (NSA_, People, Philosophy, Photos, Police, Politics, Presidential Candidates, Security, Shite, Spying, Strategy, Sunni, Talk Radio, Terrorism, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

 

Story 1: Is President Obama Sabotaging The Federal Bureau of Investigation Of Hillary Clinton’s Handling of Classified Documents? American People Want To Know — Will Hillary Clinton Be Indicted or Nominated? Yes Hillary Will Be Indicted For Violation of 18 U.S. Code § 793 and  §798 and  §1924 — Biden Backup to Replace Hillary Clinton — California Governor Jerry Brown To Enter Race? — Videos

bill and hillary clinton Clinton snowden

Democratic presidential candidate Hillary Rodham Clinton meets with local residents at the Jones St. Java House, Tuesday, April 14, 2015, in LeClaire, Iowa. (AP Photo/Charlie Neibergall)

Hillary-Clinton-Young-Cons Hillary-FBI

FBI Probe: Hillary Clinton Could Face 10 Years In Prison

Obama Calls Clinton Secret Server A “Mistake,” Says Questions About Her Actions “Legitimate”

Firebrand Trey Gowdy Dismantles Ex-Staffer’s Claim That Benghazi Committee Is Partisan

MSNBC Panel: Even The President Says Hillary Clinton’s Emails Are A Legitimate Issue

Top Republican: Hillary Clinton still withholding Benghazi emails

Hillary Clinton’s Favorability Numbers at the Lowest Since 1992

Obama: Criticism Of Hillary Clinton’s Private Email ‘Ginned Up’ Because Of Politics

FBI FURY: OBAMA SABOTAGING HILLARY INVESTIGATION

Rand Paul: Clinton Fired an ambassador for using a private email server; 10-16-2015

Obama Tells ‘60 Minutes’ Hillary Clinton Made Email ‘Mistake’

MSNBC: CIA’s Most Closely Guarded Information Passed Through Clinton Email

Wife of Imprisoned CIA Whistleblower Jeffrey Sterling Speaks Out October 15, 2015

Unprecedented News Conference: Thursday, October 15, 2015, National Press Club, Washington

Jeffrey Sterling was convicted under the Espionage Act as a source for New York Times reporter James Risen’s book State of War. He began serving his three-and-a-half year prison sentence in June. His wife’s news conference was the first time the spouse of a CIA whistleblower has made such an appearance.
National Press Club President John Hughes opened the conference, which featured:
* Thomas Drake
* Delphine Halgand
* Ray McGovern
* Jesselyn Radack

Clinton’s Deleted Emails On ‘Cloud’ Server

The saga over Hillary Clinton’s private use of an email server continues. The FBI is now investigating deleted emails from a “cloud” storage system. On Friday October 2, 2015 Platte River and Clinton’s officials gave written consent for Datto Inc. (a Connecticut-based tech company) to release Clinton’s emails to the FBI. Deputy Press Secretary at the Republican National Committee, Raffi Williams, discusses what this means for Hillary Clinton’s presidential campaign. OANN’s Matt Schuck has this story.

Uh Oh! Hillary’s Emailgate Just Got Worse! MUCH WORSE! FBI Expands…

FBI’s Hillary email net expands

Judge Says Hillary Clinton’s Private Emails Were Classified, Violated Policy – America’s Newsroom

Could Hillary Clinton face prosecution over email scandal?

Minute Memo #174 – Clinton Hiding Benghazi Emails

Newly released emails of Hillary Clinton show new legal trouble up ahead.
According to investigative reporter Sharyl Attkinsson, Clinton deliberately hid information on the Benghazi terror attack in blatant violation of Freedom of Information Act requests.
According to Attkinsson:
“The newly-released batch of Hillary Clinton emails provides further proof that Freedom of Information (FOI) law has been blatantly violated.
The documents include material directly responsive to a FOI request I made back in 2012 after the Benghazi terrorist attacks on the U.S. compounds.
However, the material was not produced at the time, as required by law.
Once again, there appears to be nobody who holds government officials and agencies accountable for their routine violation of this law. So the infractions occur frequently and with impunity.
If nobody polices our government officials and agencies–if they are above the law–then how does a lawful society function?”

Judge Napolitano: FBI Will Recommend Hillary Clinton Be Indicted

Mark Levin: Hillary Clinton in Violation of Espionage Act • Hannity • 9/2/15 •

Newsmax Prime | Alan Dershowitz talks about the FBI investigating Hillary Clinton’s email server

Hillary Jokes About FBI Investigation

September 24, 2015: Sen. Tom Cotton questions NSA Director about Clinton Emails

 

‘Under Penalty of Perjury’: Judge Nap on Latest Twist in Hillary’s Email Scandal

Judge Andrew Napolitano appeared on “The Kelly File” tonight to weigh in on the latest developments in the Hillary Clinton email scandal.

A federal judge has demanded that Clinton and two of her most trusted aides go on the record “under penalty of perjury” regarding the private email server Clinton used during her time as Secretary of State.

Judge Napolitano noted that when the government suspected that Gen. Petraeus kept secure documents in his home, they raided it.

In Clinton’s case, Judge Napolitano pointed out, the government doesn’t suspect she has secure documents. It’s a known fact.

Not only that, but she gave a thumb drive with that secure information to her lawyer, Judge Napolitano added.

“Mrs. Clinton should be treated like anybody else who is obviously violating the law by failing to secure classified documents and keeping them in insecure venues not approved by the government,” Judge Napolitano stated.

He said that the federal judge’s use of the phrase “under penalty of perjury” is extremely significant, because it reminds Clinton that for the first time, she will be under oath.

Morrell confirms at least one foreign country have what was on Hillary’s email server.

Hillary Emails – Trey Gowdy Lays It Out

13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined

White House Covers Up Benghazi Terrorist Attack (INCLUDING NEW REPORTS)

CIA Contractor: I Told State Department Rep. Benghazi Was Terrorist Attack

White House Covers Up Benghazi Terrorist Attack – New BBC Science Documentary HD

Obama LIED About Benghazi Attack!!! (Lt. Col. Tony Shaffer Interview)

CIA Gun Runner: Hillary’s Benghazi Crimes Confirmed

SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria

Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood

Source: FBI probe of Clinton email focused on ‘gross negligence’ provision

By Catherine Herridge, Pamela Browne

Three months after Hillary Clinton’s use of a private email address and server while secretary of state was referred to the FBI, an intelligence source familiar with the investigation tells Fox News that the team is now focused on whether there were violations of an Espionage Act subsection pertaining to “gross negligence” in the safekeeping of national defense information.

Under 18 USC 793 subsection F, the information does not have to be classified to count as a violation. The intelligence source, who spoke on the condition of anonymity citing the sensitivity of the ongoing probe, said the subsection requires the “lawful possession” of national defense information by a security clearance holder who “through gross negligence,” such as the use of an unsecure computer network, permits the material to be removed or abstracted from its proper, secure location.

Subsection F also requires the clearance holder “to make prompt report of such loss, theft, abstraction, or destruction to his superior officer. “A failure to do so “shall be fined under this title or imprisoned not more than ten years, or both.”

The source said investigators are also focused on possible obstruction of justice. “If someone knows there is an ongoing investigation and takes action to impede an investigation, for example destruction of documents or threatening of witnesses, that could be a separate charge but still remain under a single case,” the source said. Currently, the ongoing investigation is led by the Washington Field Office of the FBI.

A former FBI agent, who is not involved in the case, said the inconsistent release of emails, with new documents coming to light from outside accounts, such as that of adviser Sidney Blumenthal, could constitute obstruction. In addition, Clinton’s March statement that there was no classified material on her private server has proven false, after more than 400 emails containing classified information were documented.

Clinton and her team maintain the use of a private account was allowed, and the intelligence was not classified at the time, but later upgraded. The latter claim is disputed by the intelligence community Inspector General, who represents the agencies involved, which concluded the information was classified from the start.

One of Clinton’s primary defenses is that the emails containing classified information, did not carry classification markings, but a leading national security defense attorney says that is no excuse under the law.

“The fact that something’s not marked or that the person may not know that it was classified would not be relevant at all in a prosecution under the Espionage Act,” defense attorney Edward MacMahon Jr. recently told Fox.

It is not known what relevant evidence, if any, has been uncovered by the FBI, or whether any charges will ultimately be brought, but Director James Comey told reporters in Washington D.C. on Oct. 1, “If you know my folks… they don’t give a rip about politics.”

On Thursday, a group of national security whistleblowers held a news conference in Washington at the National Press Club to highlight what they characterized as a double standard in these types of cases.

NSA whistleblower Thomas Drake was indicted in 2010 under the Espionage Act for sharing unclassified material with a Baltimore Sun reporter. Drake, who also went to Congress with his concerns about the NSA, said his goal was to expose government misconduct.

“This is the secretary of state, one of the most targeted individuals by other intelligence entities and agencies in the world using a private server to traffic highly sensitive information and no doubt including classified information and no doubt including info about sources and methods,”Drake said at Thursday’s event.

He added the whistleblowers’ treatment shows there is a law for the average citizen, and apparently a different set of rules for the powerful.

“But hey, I’m secretary of state,” Drake said in a sarcastic tone. ”Even Obama gave her cover.”

The charges against Drake were eventually dropped. He pled guilty to a misdemeanor, but in the process lost his ability to work in national security and depleted his life savings to mount a defense.

Former CIA officer Jeffrey Sterling also went to Congress with his complaints, but was sentenced in May to three-and-a-half years in prison for violating the Espionage Act by giving classified information to a New York Times reporter. Sterling, who is appealing the case, was also convicted on obstruction of justice charges because a single email was missing from his account, even though the government could not show he was responsible for that.

Clinton has acknowledged deleting some 30,000 emails she considered personal.

In 2015, former CIA Director General David Petraeus pled guilty to a misdemeanor admitting he mishandled classified materials by sharing notebooks with his former mistress and biographer, Paula Broadwell.

He also was ordered to pay a $100,000 fine. Sterling’s supporters said he shared far less classified information with the New York Times.

“Powerful and politically connected individuals accused of the same and much worse conduct receive, at most, a slap on the wrist. Like General David Petraeus who gave away more secret information, classified at a much higher level, to his mistress and received a sweetheart plea deal for a minor misdemeanor,”Jesselyn Radack, a whistleblower and former ethics adviser to the Department of Justice, said Thursday.

“Or Hillary Clinton – she got a primetime TV apologist political spin interview from President Obama himself,” Radack added.

http://www.foxnews.com/politics/2015/10/15/source-fbi-probe-clinton-email-focused-on-gross-negligence-provision/

Eight Laws Hillary Clinton Could Be Indicted For Breaking

Kenneth P. Bergquist

Brigadier General, U.S. Army (Ret)

As a former Justice Department official, I have, of late, been asked by both Democratic and Republican friends whether Hillary Clinton could be indicted for her email related actions. The simple answer is yes — she, and perhaps some of her senior staff, could be indicted for violating a number of federal criminal statutes. But for reasons that will be discussed later, it is unlikely that she will be.

Nevertheless, it is well worth discussing the various criminal provisions of federal law that she and others may have been violated based on mainstream news reports. Remember that news reporting can be incorrect or incomplete — and that Hillary Clinton, and anyone else involved, deserves every presumption of innocence. Also keep in mind that an indictment is not a conviction but rather the informed opinion of a grand jury that probable cause exists to believe one or more violations of federal criminal statutes have transpired.

This intellectual and legal research exercise should commence with a brief review of the basics of criminal jurisprudence: There are two elements of a criminal offense: the prohibited conduct as defined in statute; and the mens rea or mental intent of the individual or individuals engaging in the prohibited conduct. Thus, to gain a conviction on a criminal count in an indictment, a prosecutor must prove beyond a reasonable doubt that: (1) the prohibited conduct occurred, (2) the prohibited conduct was undertaken by the defendant, and (3) the defendant had the requisite mens rea or intent at the time.

1.) 18 U.S. Code § 793 – Gathering, transmitting or losing defense information
18 U.S. Code § 798 – Disclosure of classified information

A federal prosecutor would naturally focus first on the most serious allegations: willfully transmitting or willfully retaining Top Secret and Compartmented (TS/SCI) material using a private server system. The individual who transmits and the individual who receives and retains TS/SCI information on a private server jointly share the culpability for risking the compromise and exploitation of the information by hostile intelligence services. The prosecutor’s charging document would likely include felony counts under 18 U.S. Code § 793 and under 18 U.S. Code § 798 against each transmitting individual as well as separate counts against each receiving and retaining individual. Violation of either provision of the U.S. Code cited above is a felony with a maximum prison term of ten years.

The prohibited conduct is the insecure transmission of highly classified information, as well as the receipt and retention of highly classified information in an unapproved manner. The requisite mens rea is the willful commission of the prohibited conduct and the knowledge that compromised information could result in prejudice or injury to the United States or advantage to any foreign nation. Proof of intent to disclose the classified information is not required.

2.) U.S. Code § 1924 – Unauthorized removal and retention of classified documents or material

If the federal prosecutors are of a charitable disposition and an accused person has been cooperative, the felony charges under 18 U.S. Code § 793 and 18 U.S. Code § 798 may be “pled-down” to a single or to multiple misdemeanor counts under 18 U.S. Code § 1924. A misdemeanor conviction would probably result in a period of probation and a less significant fine. The prohibited conduct is the unauthorized removal of classified information from government control or its retention in an unauthorized location. The mens rea required is the intent to remove from government control or the intent to store the classified information in an unauthorized location.
3.) 18 U.S. Code § 2071(b) — Concealment, removal, or mutilation generally

To sustain a charge under 18 U.S. Code § 2071(b), a federal prosecutor need only prove that the accused transferred and held the only copies of official government records (whether classified or not), the very existence of which was concealed from government records custodians. The mens rea required is that an accused knows that official government records were transferred or removed from the control of government records custodians. Violation of 18 U.S. Code § 2071(b) is a felony with a maximum prison term of three years.

4.) 18 U.S. Code § 641 – Public money, property or records

Again, if the federal prosecutors are of a charitable disposition and accused has been cooperative, the felony charges under 18 U.S. Code § 2071(b) can be “pled down” to a misdemeanor under 18 U.S. Code § 641. The prohibited conduct is the conversion of official records (whether classified or not) to the accused’s exclusive use and the mens rea is simply the intent to do so. Conviction on the lesser misdemeanor charge would likely result in a period of probation and the imposition of a fine.

5.) 18 U.S. Code § 1505 – Obstruction of proceedings before departments, agencies, and committees

If it can be proven that an accused destroyed, withheld, or concealed the existence of official records being sought under subpoena by a committee of Congress, the accused can be convicted of obstruction under 18 U.S. Code § 1505. The prohibited conduct includes destruction, concealment and withholding of documents, thereby impeding or obstructing the committee’s rightful pursuit of information. The mens rea is knowledge of the committee’s interest in obtaining the official records in the accused’s custody or control. Violation of 18 U.S. Code § 1505 is a felony with a maximum prison term of five years.

6.) 18 U.S. Code § 1519 — Destruction, alteration, or falsification of records in federal investigations

If it can be proven that an accused knowingly concealed the existence of official records being sought by the Department of State Inspector General (DOS/IG) or by the Federal Bureau of Investigation (FBI), such accused can be convicted of obstruction. The prohibited conduct is the concealment and withholding of documents that impede or obstruct an investigation. The mens rea is the intent to conceal or withhold. Violation of 18 U.S. Code § 1519 is a felony with a maximum prison term of twenty years.

7.) 18 U.S. Code § 1031 — Fraud against the United States
18 U.S. Code § 1343 – Fraud by wire, radio or television
18 U.S. Code § 1346 — Definition of “scheme or artifice to defraud”
18 U.S. Code § 371 – Conspiracy to defraud the United States

If it can be proven that an accused arranged for the Department of State to hire an Information Technology (IT) specialist to primarily administer and maintain a private server system owned by the accused, then the accused can be convicted of conspiracy to commit honest services fraud and probably wire fraud. The prohibited conduct is having the United States pay an employee salary and/or official travel funds for performing private services on behalf of accused. The mens rea is simply the knowledge of the employee’s status as a public servant and that the government was not fully reimbursed for the costs to the government of such services. The wire fraud conviction can be sought if it can be proven that accused used electronic means of communication in undertaking such scheme or artifice to defraud.

8.) 18 U.S. Code § 371 – Conspiracy to commit a federal offense

If any accused and any third party can be proven to have colluded in any violation of federal, criminal law, then all involved can be charged with criminal conspiracy as well as being charged with the underlying offense.

Indictment?

The old adage, that a good prosecutor can get a ham sandwich indicted, is bad news for any public servant who risks the compromise of classified information or otherwise violates any of the other federal criminal statutes listed above. Specifically, this Administration has a history of vigorously prosecuting and winning convictions in the mishandling of classified information and other criminal violations of the public trust.

However, Hillary Clinton is anything but a ham sandwich; and she knows it. She and her senior aides will not even be formally investigated by this Justice Department, much less indicted. The president will allow Hillary Clinton and her aides to “tough it out” for as long it is politically possible. However, if and when the political and public opinion costs of a “tough it out” tactic become too great, President Obama will simply use that famous pen of his to issue a succinct pardon and make formal mockery of the concept of equal justice.

Kenneth Bergquist served as a Deputy Assistant Attorney General in the United States Department of Justice during the Reagan Administration and serves now as pro bono legal counsel to the Special Operations Education Fund (OPSEC).

Read more: http://dailycaller.com/2015/09/21/eight-laws-hillary-clinton-could-be-indicted-for-breaking/#ixzz3omBYzjeq

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 546-555

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

American People’s Verdict On Democratic Socialist Debate: Lying Lunatic Left — Hillary Clinton — Bernie Sanders — Martin O’Malley — Lincoln Chaffee — Guilty As Charged — Indict or Nominate or Pardon Hillary Clinton — Biden Biding Time Until Benghazi Testimony of Clinton — Worse Economic Recovery Since Great Depression and 7 Years of Economic Stagnation Under Obama — No Change — No Hope — Videos

Posted on October 14, 2015. Filed under: American History, Blogroll, Business, Central Intelligence Agency (CIA), Communications, Congress, Constitution, Corruption, Crime, Crisis, Data Storage, Defense Intelligence Agency (DIA), Defense Intelligence Agency (DIA), Employment, Faith, Family, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Foreign Policy, Fraud, Freedom, Genocide, government, history, Homicide, Illegal, Immigration, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Money, Narcissism, National Security Agency (NSA), Newspapers, People, Philosophy, Photos, Police, Political Correctness, Politics, Presidential Candidates, Press, Psychology, Radio, Rants, Raves, Regulations, Religious, Resources, Security, Speech, Strategy, Talk Radio, Taxation, Taxes, Television, Terrorism, Unemployment, Video, War, Wealth, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Story 1: American People’s Verdict On Democratic Socialist Debate: Lying Lunatic Left — Hillary Clinton — Bernie Sanders — Martin O’Malley — Lincoln Chaffee — Guilty As Charged — Indict or Nominate or Pardon Hillary Clinton —  Biden Biding Time Until Benghazi Testimony of Clinton — Worse Economic Recovery Since Great Depression and 7 Years of Economic Stagnation  Under Obama — No Change — No Hope — Videos

BILL-DAY-HILLARY-PHISHING hillary nsacartoon hillary emails  hillary-clinton-e-mails-cartoon-beeler Hillary-Clinton-s-shadowy-emails hillary-email-cartoon-cole

LAS VEGAS, NV - OCTOBER 13: (L-R) Democratic presidential candidates Jim Webb, U.S. Sen. Bernie Sanders (I-VT), Hillary Clinton, Martin O'Malley and Lincoln Chafee take the stage for a presidential debate sponsored by CNN and Facebook at Wynn Las Vegas on October 13, 2015 in Las Vegas, Nevada. The five candidates are participating in the party's first presidential debate. (Photo by Joe Raedle/Getty Images)

LAS VEGAS, NV – OCTOBER 13: (L-R) Democratic presidential candidates Jim Webb, U.S. Sen. Bernie Sanders (I-VT), Hillary Clinton, Martin O’Malley and Lincoln Chafee take the stage for a presidential debate sponsored by CNN and Facebook at Wynn Las Vegas on October 13, 2015 in Las Vegas, Nevada. The five candidates are participating in the party’s first presidential debate. (Photo by Joe Raedle/Getty Images)

Bernie Sanders vs. Hillary Clinton | Democratic Presidential Debate Analysis

Obama’s message to Democratic debate candidates

In a taped message to the Democratic candidates, President Barack Obama urged Democrats to work hard and fight to keep the White House in 2016.

Who were the winners and losers of the Democratic debate?

Bernie Sanders : People are sick of hearing about Hillary Clinton’s “damn emails”

Mom Of Benghazi Victim Demands Answers While Hillary Clinton Laughs Off Email Scandal

Winners and losers at first Democratic debate

Clinton and Sanders dominate first Democratic debate

The Best Moments From The First Democratic Primary Debate

Democratic debate CNN — democratic debate 2016 Full … Sanders,Clinton,Omalley,Webb,Chafee

Bernie Sanders continues to shock the political world

Hillary & Democrats May Not Cooperate With Benghazi Committee

Dem Debate #1: Mature Adults, Not Lunatics. Did Hillary or Bernie Win?

Emails Show Clinton Worked With George Soros To Run Shadow Gov’t

The real scandal surrounding Democratic presidential hopeful Hillary Clinton’s private email system may be that she was running, in concert with a private consulting firm tied closely to George Soros, an outsourced and parallel State Department answerable only to her and not President Obama, the Congress, or the American people.

INFOWARS Nightly News: CNN Democratic Debate Coverage Tuesday October 13 2015

Who Won The First Democratic Debate In Terms Of Body Language?

Carol Kinsey Goman

The major story of the first televised presidential debate in 1960 became the photogenic appeal of John F. Kennedy versus the sickly look of his opponent, Richard Nixon, who refused to wear makeup although his recent illness had left him with a pallid complexion. In addition, Kennedy looked directly at the camera when answering questions (rather that at the journalists who asked them), which made viewers see him as someone who was talking right to them and giving straight answers. To make matters worse, the cameras caught Nixon wiping perspiration from his forehead while Kennedy was pressing him on the issues.

When the debate ended, a large majority of television viewers recognized Kennedy as the winner. Radio listeners, who heard the debate but hadn’t seen it, gave the victory to Nixon.

Never again would politicians under estimate the importance of physical appearance and body language – especially when appearing on television. Today’s political figures are fully aware of, and heavily coached on, the impact of nonverbal communication.

And when it comes to nonverbal cues, everything matters: Gender, age, skin color, hair style, attractiveness, height, clothing, facial expressions, hand gestures, posture — audiences judge it all. Superficial? Maybe. But this potent (and often unconscious) process is also hardwired in the human brain.
There are two sets of nonverbal signals that are especially important for candidates to project: warmth and authority. Warmth cues project likeability and candor and authority cues denote power and status. The most appealing politicians (at least from a body language standpoint) are those whose behaviors encompass both sets of signals.

Which brings me to the first Democratic debate of the 2016 election cycle — and how I would grade the body language of the debaters.

Hillary Clinton, former secretary of state

Grade: A-

How she did it: Clinton is often described, by both supporters and critics, as strong, tough, and aggressive. So it was no surprise to see those qualities exhibited in her body language through expansive gestures, erect posture, and well-prepared responses.

Recommended by Forbes
MOST POPULAR Photos: The World’s Top-Earning YouTube Stars 2015
TRENDING ON FACEBOOK Bernie Sanders Clearly Won Tuesday’s Debate — On Twitter
SungardASVoice: How Cloud Orchestration Keeps Cloud Computing In Perfect Harmony

Leadership Presence And The GOP Debate
Hits And Misses From The Second GOP Debate
So, Who Won The First Republican Primary Debate of 2012? -Media Training

But Clinton’s body language won the debate by doing more than displaying authority. She successfully “warmed up” her image, with smiles, head nods in agreement/support of other’s comments, and (at one point) even laughter.

Visually, being the only woman on stage was also to her advantage. The contrast between Clinton and the rest of the (white, male) candidates was visually striking – especially for someone who wants to show how she would be different from previous presidents.

Bernie Sanders, senator of Vermont

Grade: B+

How he did it: Unlike Clinton, who (for better or worse) is a known national figure, Sanders needed to give the audience a clear picture of who he is and what he stands for – and he was very effective doing so last night. Sanders was animated and used gestures (like finger pointing and palms rotated down) to effectively emphasize his resolve – although at times, his movements were a bit jerky, instead of smooth. And for those who were wondering if a 74-year old could keep his energy high for two hours, the answer was a resounding “yes.”

Sanders nonverbal negatives include his leaning too often on the lectern (as if he needed physical support) and in his lack of warm cues. He is much more expressive when showing anger, disgust, and impatience – but rarely does he display joy or express optimism.

Martin O’Malley, former governor Maryland

Grade: C

How he did it: While he never had the “break through” moment his campaign was hoping for, nonverbally O’Malley had a significant nonverbal advantage: He looked fit and athletic – and he was the tallest person in the line up. Don’t discount the effect of these seemingly trivial facts. We are biased toward attractive, healthy people, and we unconsciously attribute leadership characteristics to tall people. (The effects of this are seen not only in politics, but in business. For example, in the U.S. population, 14.5% men are 6’ tall and over, but with CEOs of Fortune 500 companies, that statistic climbs to 58%.) But his softer, slower communication style often lacked the energy and passion needed to support his rhetoric. And his deadpan, almost angry expression when other candidates were speaking was tweeted about as the “death stare” – not a good look for someone who is usually seen as upbeat and happy.

Jim Webb, former senator of Virginia

Grade C-

How he did it: Webb is known as being “gruff” and “stiff,” and both of those qualities were displayed nonverbally: Outside of a slight lean backward and a shoulder shrug now and then, he rarely moved his body – adding to his stoic image.

Lincoln Chaffee, former governor of Rhode Island

Grade: D

How he did it: Chafee’s body language was filled with nervous facial gestures (lip licking was especially prevalent) and conflicting nonverbal messages, the most noticeable being a smile with tightened or compressed lips that made the otherwise warm signal look forced and inauthentic.

The only missing contender in last night’s debate was Vice President Joe Biden, who hasn’t declared his intention to run. Too bad. He is passionate and expressive. He would have been interesting to watch.

https://www.youtube.com/watch?v=DvjU0xLWrv4

 

EVIDENCE SHOWS CLINTON RAN A PARALLEL, OUTSOURCED STATE DEPT.

Clinton received help from George Soros to run shadow gov’t
The real scandal surrounding Democratic presidential hopeful Hillary Clinton’s private email system may be that she was running, in concert with a private consulting firm tied closely to George Soros, an outsourced and parallel State Department answerable only to her and not President Obama, the Congress, or the American people.

The media has tried to separate two dubious operations of Mrs. Clinton while she was at the State Department. The first is the private email server located in her Chappaqua, New York residence. The second is the fact that her government-paid State Department personal assistant, Huma Abedin, wife of disgraced New York “sexting” congressman Anthony Weiner, was simultaneously on the payroll of Teneo, a corporate intelligence firm that also hired former President Bill Clinton and former British Prime Minister Tony Blair as advisers. Abedin has been linked to the Muslim Brotherhood, which has recently buried the hatchet with longtime rival Saudi Arabia and common cause against the Assad government in Syria, the Houthi rebels in Yemen, and Iran.

It is clear that Mrs. Clinton used her private email system to seek advice on major foreign policy issues, from her friend and paid Clinton Foundation adviser Sidney Blumenthal providing private intelligence on Libya’s post-Qaddafi government and possible business ventures to Clinton friend Lanny Davis seeking favors from Mrs. Clinton. It should be noted that Davis was a paid lobbyist for the military junta of Honduras that overthrew democratically-elected President Manuel Zelaya in 2009. It also should be noted that Mrs. Clinton voiced her personal dislike for the late Libyan leader Muammar Qaddafi, when, after he was assassinated by U.S.-armed jihadist rebels, boasted, “We came, we saw, he died!”

It was highly unusual for Abedin to receive a U.S. government paycheck while also receiving a consultant’s salary from Teneo. Teneo was founded in 2011 by Doug Band, a former counselor to Bill Clinton. Teneo, which is as much a private intelligence firm as it is an investment company and “governance” consultancy, has its headquarters in New York and branches in Washington DC, Brussels, São Paulo, London, Dublin, Dubai, Hong Kong, Beijing, and Melbourne. With the exception of its investment arm, Teneo closely resembles the former CIA-connected firm where Barack Obama worked after he graduated from Columbia, Business International Corporation (BIC). Teneo’s marketing claims match those made by BIC during its heyday: Teneo works “exclusively with the CEOs and senior leaders of many of the world’s largest and most complex companies and organizations.”

Teneo has staked a position in the international news media with its recent purchase of the London-based firm Blue Rubicon, formed in part by the former home news editor for Channel 4 News in the United Kingdom. Teneo also recently acquired London’s Stockwell Group, which provides consultancy services to the National Bank of Greece and Pireaus Bank. It appears that Mrs. Clinton’s friends are cashing in on the global banking austerity being levied against Greece.

The head of Teneo Intelligence is Jim Shinn, a former assistant secretary for Asia for the Defense Department. What is troubling is that Teneo has been offering statements to the media designed to heighten tensions between NATO and Turkey on one side and Russia on the other over Russia’s military attacks on the Islamic State in Syria. Shinn’s intelligence chief in Teneo’s London office, Wolfgango Piccoli, who has worked for the Soros-linked Eurasia Group consultancy, told CNN that Russia’s “reinforcement of the Assad regime and the consolidation of separate areas of control is more likely to prolong the conflict by forcing a stalemate.” The Teneo statement came in a CNN report that suggests members of the Bashar al Assad government in Syria and Russian President Vladimir Putin and his government could be charged by international or “national” tribunals for war crimes in a manner similar to those convened on members of the Yugoslavian and Serbian governments.

The entire International Criminal Court (ICC) in The Hague and in Africa has fallen under the control of George Soros and his operatives. Soros has made no secret of his support for overthrowing Assad and Putin and he has resorted to a “weapon of mass migration” of Syrian, Iraqi, and other refugees into Europe in order to destabilize the entire continent and endanger its Christian culture and social democratic traditions. Mrs. Clinton and Soros extensively used Mrs. Clinton’s private email system to exchange, among other things, information on the political situation in Albania, a country where Soros’s operatives are plentiful and powerful. Soros is a major donor to the Clinton Foundation and Mrs. Clinton’s presidential campaign.

Soros also pressed Mrs. Clinton for State Department support for his American University of Central Asia, which, as seen with Soros’s Central European University in Budapest and its graduate ranks of pro-U.S. leaders throughout central and eastern Europe, is designed to manufacture a new generation of pro-U.S. leaders in the Central Asian states of the former Soviet Union.
The “wiping” of Mrs. Clinton’s email systems’ hard drives appear to be part of a classic case of an intelligence operation destroying data after being exposed.

The Clinton outsourcing of U.S. foreign policy not only involves Teneo but also the Clinton Foundation, for which Mrs. Clinton solicited donations from foreign sources while she served as Secretary of State. Moreover, in a classic example of racketeering, Bill Clinton was paid by Teneo as an adviser while his Clinton Foundation hired Teneo as as a consultant. The Clinton Foundation is directed by Bill and Hillary Clinton, along with their daughter Chelsea Clinton Mezvinsky. Mrs. Clinton’s private email use also extended to Clinton Foundation chief financial officer Andrew Kessel and longtime Bill Clinton friend Bruce Lindsey.

One of the emails sent via Mrs. Clinton’s private system was from her State Department counsel Cheryl Mills to Amitabh Desai, the head of foreign policy for the Clinton Foundation. Mills wanted Desai to arrange a meeting between Rwandan dictator Paul Kagame with the Democratic Republic of Congo strongman Joseph Kabila during Kagame’s visit to Kinshasa in 2012. This effort was conducted outside the State Department with the sole exception that Assistant Secretary of State for African Affairs Johnnie Carson, a close friend of Mrs. Clinton, was involved in the email exchange with Mills and Desai.

Other private email use involved Hollywood magnate Haim Saban, Loews heir Andrew Tisch, and Lynn de Rothschild, all of whom were peddling Israel’s interests to Hillary and Bill Clinton in return for sizable donations to the Clinton Foundation and Mrs. Clinton’s presidential campaign.

Under the Clinton Giustra Enterprise Partnership, the Clinton Foundation received generous financial support totaling some $31 million from Frank Giustra, a Canadian uranium mining magnate. Giustra relied on the Clintons to use their influence to open up lucrative uranium exploitation opportunities in places like Kazakhstan and Africa.

Senator Chuck Grassley (R-IA) has been stonewalled in his attempt to obtain more information about Teneo’s relationship with Mrs. Clinton, the Clinton Foundation, and Bill Clinton.

Wayne Madsen is an investigative journalist who consistently exposes cover-ups from deep within the government. Want to be the first to learn the latest scandal? Go to WayneMadsenReport.com subscribe today!

http://www.infowars.com/evidence-suggests-clinton-ran-a-parallel-outsourced-state-dept/

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 546-553

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Profiles in Perfidy: Obama and Kerry Lying To American People — The Traitorous Terrorist Treaty — Strategic Surrender To Terrorist Islamic Republic of Iran– No Dismantling and Destruction of Nuclear Infrastructure/Bomb Factories — No Surprise Inspections — No Economic Sanctions — No Limits on Missiles — No Sanctions On Individual Terrorists or Terrorism — The Sellout of America For Nobel Peace Prizes Will Result in Middle East Nuclear Arms Race, Proliferation and War — Iran Celebrates Victory and $150 Billion of Unfrozen Assets To Finance More Terrorism and Oppression — Congress Must Veto The Traitorous Terrorist Treaty — Terminate With Extreme Prejudice — Videos

Posted on July 14, 2015. Filed under: American History, Articles, Blogroll, British History, Bunker Busters, Business, Central Intelligence Agency (CIA), College, Communications, Congress, Constitution, Crime, Crisis, Diasters, Dirty Bomb, Documentary, Education, European History, history, Islam, Language, Law, liberty, Life, Links, media, Middle East, Money, Narcissism, National Security Agency (NSA_, Nuclear, Nuclear Proliferation, People, Philosophy, Photos, Physics, Political Correctness, Politics, Press, Psychology, Radio, Radio, Rants, Raves, Science, Security, Strategy, Talk Radio, Taxation, Taxes, Technology, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 504 July 14, 2015 

Pronk Pops Show 503 July 13, 2015

Pronk Pops Show 502 July 10, 2015

Pronk Pops Show 501 July 9, 2015

Pronk Pops Show 500 July 8, 2015

Pronk Pops Show 499 July 6, 2015

Pronk Pops Show 498 July 2, 2015

Pronk Pops Show 497 July 1, 2015

Pronk Pops Show 496 June 30, 2015

Pronk Pops Show 495 June 29, 2015

Pronk Pops Show 494 June 26, 2015

Pronk Pops Show 493 June 25, 2015

Pronk Pops Show 492 June 24, 2015

Pronk Pops Show 491 June 23, 2015

Pronk Pops Show 490 June 22, 2015

Pronk Pops Show 489 June 19, 2015

Pronk Pops Show 488 June 18, 2015

Pronk Pops Show 487 June 17, 2015

Pronk Pops Show 486 June 16, 2015

Pronk Pops Show 485 June 15, 2015

<