Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2
Wyden: No to warrantless searches by the FBI through National Security Letters
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
William Binney – The Government is Profiling You (The NSA is Spying on You)
NSA Surveillance and What To Do About It
Taking a Look at the NSA’s Massive Data Center
NSA’s Largest Spy Center Located in Utah (What you need to know)
NSA Whistleblower William Binney: The Future of FREEDOM
‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)
Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’
DOCUMENTARY: Edward Snowden – Terminal F (2015)
NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’
NSA paying US Companies hundreds of millions of dollars for access to data
“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying
Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)
Published on Jul 8, 2013
The NSA warrantless surveillance controversy (AKA “Warrantless Wiretapping”) concerns surveillance of persons within the United States during the collection of foreign intelligence by the U.S. National Security Agency (NSA) as part of the war on terror. Under this program, referred to by the Bush administration as the “terrorist surveillance program”, part of the broader President’s Surveillance Program, the NSA was authorized by executive order to monitor, without search warrants, the phone calls, Internet activity (Web, e-mail, etc.), text messaging, and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S. Critics, however, claimed that it was in an effort to attempt to silence critics of the Bush Administration and their handling of several hot button issues during its tenure. Under public pressure, the Bush administration ceased the warrantless wiretapping program in January 2007 and returned review of surveillance to the FISA court. Subsequently, in 2008 Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISA court requirements.
During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines. However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in “overcollection” of domestic communications in excess of the FISA court’s authority, but claimed that the acts were unintentional and had since been rectified.
All wiretapping of American citizens by the National Security Agency requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act. After the 9/11 attacks, Congress passed the Patriot Act, which granted the President broad powers to fight a war against terrorism. The George W. Bush administration used these powers to bypass the FISA court and directed the NSA to spy directly on al Qaeda in a new NSA electronic surveillance program. Reports at the time indicate that an “apparently accidental” “glitch” resulted in the interception of communications that were purely domestic in nature. This action was challenged by a number of groups, including Congress, as unconstitutional.
The exact scope of the program is not known, but the NSA is or was provided total, unsupervised access to all fiber-optic communications going between some of the nation’s largest telecommunication companies’ major interconnected locations, including phone conversations, email, web browsing, and corporate private network traffic. Critics said that such “domestic” intercepts required FISC authorization under the Foreign Intelligence Surveillance Act. The Bush administration maintained that the authorized intercepts are not domestic but rather foreign intelligence integral to the conduct of war and that the warrant requirements of FISA were implicitly superseded by the subsequent passage of the Authorization for Use of Military Force Against Terrorists (AUMF). FISA makes it illegal to intentionally engage in electronic surveillance under appearance of an official act or to disclose or use information obtained by electronic surveillance under appearance of an official act knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000 or up to five years in prison, or both. In addition, the Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine or up to five years in prison, or both.
After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence. The Times had posted the exclusive story on their website the night before, after learning that the Bush administration was considering seeking a Pentagon-Papers-style court injunction to block its publication. Critics of The Times have alleged that executive editor Bill Keller had withheld the story from publication since before the 2004 Presidential election, and that the story that was ultimately published by The Times was essentially the same as reporters James Risen and Eric Lichtblau had submitted in 2004. In a December 2008 interview with Newsweek, former Justice Department employee Thomas Tamm revealed himself to be the initial whistle-blower to The Times. The FBI began investigating leaks about the program in 2005, with 25 agents and 5 prosecutors on the case.
FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying
If you think you can handle the truth, well here it is folks
NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.
The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.
Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.
Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.
Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.
World War II and its aftermath
During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers. When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.
A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War. However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.
The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.:Vol I, p.79
In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock. Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities. Senator Frank Church uncovered previously unknown activity,such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro. The investigation also uncovered NSA’s wiretaps on targeted American citizens.
In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’. That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland. The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”. NSA employees must be retired for more than fifteen years to qualify for the memorial.
NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.
In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.
Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.
Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer. It was to be a realization of information processing at higher speeds in cyberspace.
The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.
Scope of surveillance
It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics and “commercial secrets”. In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring. Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).
A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East. The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.
The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk, and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year. It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.
Domestically, the NSA collects and stores metadata records of phone calls, including over 120 million US Verizon subscribers, as well as Internet communications, relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism. The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.
The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.
Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.
According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.
Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them. Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse; however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules. It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions; and that NSA officers have even used data intercepts to spy on love interests. The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies. A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.” In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”. Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.
Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”
Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.
An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.
On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents. This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.
Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”. On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.
The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance. The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country, and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.
NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).
Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.
As of the mid-1990s, the National Security Agency was organized into five Directorates:
The Operations Directorate, which was responsible for SIGINT collection and processing.
The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
The Support Services Directorate, which provided logistical and administrative support activities.
Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.
As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.
The main elements of the organizational structure of the NSA are:
F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.
G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.
I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
L – Installation and Logistics
M – Human Resources
Q – Security and Counterintelligence
R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.
S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
S1 – Customer Relations
S2 – Analysis and Production Centers, with the following so-called Product Lines:
S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
S3 – Data Acquisition, with these divisions for the main collection programs:
S31 – Cryptanalysis and Exploitation Services (CES)
S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”
S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms. A tool which details and maps the information collected by this unit is code-named Boundless Informant.
S34 – Collections Strategies and Requirements Center
S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program. Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.
T – Technical Directorate (TD)
Directorate for Education and Training
Directorate for Corporate Leadership
Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
Acquisitions and Procurement Directorate
Information Sharing Services (ISS), led by a chief and a deputy chief.
In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.
After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.
A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.
The NSA maintains at least two watch centers:
National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.
NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.
The number of NSA employees is officially classified but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.
In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities. In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke, and stated that the agency is “probably the biggest employer of introverts.” In 2013 Der Spiegel stated that the NSA had 40,000 employees. More widely, it has been described as the world’s largest single employer of mathematicians. Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.
The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices. Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.
The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.
Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information. Snowden claims he suggested such a rule in 2009.
The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion. As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph. The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.
NSA-produced video on the polygraph process
There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior. NSA’s brochure states that the average test length is between two and four hours. A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.
In 2010 the NSA produced a video explaining its polygraph process. The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.” AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video. George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.
After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.
The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.
When the NSA was created, the agency had no emblem and used that of the Department of Defense. The agency adopted its first of two emblems in 1963. The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.
The NSA’s flag consists of the agency’s seal on a light blue background.
The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions. It is made of black granite, and has 171 names carved into it, as of 2013 . It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.
NSANet (NSA’s intranet)
Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS
NSANet stands for National Security Agency Network and is the official NSA intranet. It is a classified network, for information up to the level of TS/SCI to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).
NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.
In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”. In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems. Some universities that do highly sensitive research are allowed to connect to it.
The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.
National Computer Security Center
The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government. NCSC was part of NSA, and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications. The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.
National Security Agency headquarters in Fort Meade, 2013
Headquarters for the National Security Agency is located at 39°6′32″N76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore, and 25 mi (40 km) northeast of Washington, DC. The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”. The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.
NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade. Built on 350 acres (140 ha; 0.55 sq mi) of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi), the site has 1,300 buildings and an estimated 18,000 parking spaces.
The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.” The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds. It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”
The facility has over 100 watchposts, one of them being the visitor control center, a two-story area that serves as the entrance. At the entrance, a white pentagonal structure, visitor badges are issued to visitors and security clearances of employees are checked. The visitor center includes a painting of the NSA seal.
The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“. The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank. NSA headquarters has its own post office, fire department, and police force.
Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.
Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”
Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year. In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power. In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.
One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.
When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.
Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew. In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders. COMSEC remained in Washington, D.C., until its new building was completed in 1968. In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan. The four NSA buildings became known as the “Big Four.” The NSA director moved to 2B when it opened.
On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.
The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement. FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.
An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,but her later revision does not. Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.
NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016. Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages. It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi). The center is 1,800,000 square feet (17 ha; 0.065 sq mi) and initially uses 60 megawatts of electricity.
On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative. It is expected to be operational by September 2013.
In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill, the latter expansion expected to be completed by 2015.
NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world. Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.
The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.
Thailand is a “3rd party partner” of the NSA along with nine other nations. These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.
Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.
The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD. The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.
NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.
According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.
The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.
NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.
According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”
As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.
Operations by the National Security Agency can be divided in three types:
Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill. Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked. In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.
NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.
The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.
The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques. This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.
Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.
NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations. The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.
NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.” However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law. The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.
George W. Bush administration
George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued. On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.
One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.
As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.
In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.
NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.
A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden. mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.
In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.
Barack Obama administration
In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws. United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.
Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.Rasmussen Reports found that 59% of Americans disapprove,Gallup found that 53% disapprove, and Pew found that 56% are in favor of NSA data collection.
Section 215 metadata collection
On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.
In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.
The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”
Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots” between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats. As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.
In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013 in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.
Under the PRISM program, which started in 2007, NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.
July 2015 – WikiLeaks: Espionage against German federal ministries
In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s. Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.
Claims of prevented terrorist attacks
Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack. However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.
Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.
NSA’s China hacking group
According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”
Syrian internet blackout
In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.
Suspected responsibility for hacking operations by the Equation Group
The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA. The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),:15 and the “unprecedented” ability to infect and be transmitted through the hard drivefirmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].:31
When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.
— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013
IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.
While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries. Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.
Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon
A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”
Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”
Role in scientific research and development[
NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.
Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.
NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipheralgorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.
The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design. In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”
The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition). NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.
The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.
The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.
A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it, since fundamental modifications have been made to Keccak in order to turn it into a standard. These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.
This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known. Both NIST and RSA are now officially recommending against the use of this PRNG.
Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials. The proposal was strongly opposed and key escrow requirements ultimately went nowhere. However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.
Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure. It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein. It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.
NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research, ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.
NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.
One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections. Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.
Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs
In the United States, at least since 2001, there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence. The government has made, in 2015, slight changes in how it uses and collects certain types of data, specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.
President Obama did make some changes to national security regulations and how much data can be collected and surveyed. The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified. Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required. Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.
As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal. It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.”  The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.” This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.
Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them. While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order, the NSA had access to emails, phone calls and cellular data users. With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months, which is arguably putting the telecommunications companies at a higher advantage.
This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act. Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful. The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.
Mark Levin Provides ProofObama Admin Wiretapped Trump Tower | Fox & Friends
Published on Mar 5, 2017
LIKE | COMMENT | SUBSCRIBE
Mark Levin Provides Proof Obama Admin Wiretapped Trump Tower | Fox & Friends
Trump Accuses Obama of Wiretapping – Is there any evidence of Collusion?
Intelligence Officer Claims Obama Was Involved In The Wiretapping
Bombshell! Trump Tweets, Obama Wire Tapped Trump Tower! “He Is Bad And Sick”! Dwarf’s Watergate!
Did President Obama Spy On Donald Trump? | True News
What Would It Mean If Former President Obama Wiretapped Trump Tower? | TODAY
News Trump ‘Donald Trump started this’ Host loses it with Sarah Huckabee Sanders’ wiretapping spin
Lindsey Graham on President Trump accuses Obama of wiretapping him Trump Tower phones
TOWERGATE UPDATE: Obama Faces Indictment for Wiretapping Trump Tower Says Fox
No, Presidents Can’t Order Wiretaps | AM Joy | MSNBC
Obama Wiretapped Trump Phone Before Election?
Obama Explains NSA Wiretapping
NSA wiretapping — a 4th Amendment violation? Blake Norvell at TEDxSMU
John Brennan, Obama involved in bugging Trump Campaign during election
NSA whistleblower Edward Snowden “My Greatest Fear … is turnkey tyranny”
EDWARD SNOWDEN Everything about Donald Trump
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
William Binney – The Government is Profiling You (The NSA is Spying on You)
United States of Secrets: William Binney
NSA Whistleblower William Binney: The Future of FREEDOM
AUTHOR: BRIAN BARRETT.BRIAN BARRETT SECURITY
IF THE FEDS DID WIRETAP TRUMP TOWER, IT’S NOT OBAMA WHO SHOULD WORRY
IT STARTED, LIKE so many eruptions these days, with a tweet.
Early Saturday morning, President Trump fired off a series of tweets accusing, without evidence, former President Barack Obama of wiretapping Trump Tower in the month before the election. Trump compared the alleged snooping to “Nixon/Watergate,” and intimated legal action.
What makes the broader allegation so extraordinary isn’t that it is new. Quite the contrary. Various reports that the Foreign Intelligence Surveillance Court granted Justice Department investigators a warrant to probe the Trump campaign’s ties with Russia surfaced in November. What makes Trump’s Twitter tirade so striking is what prompted it, and what it might imply if it’s true.
Anatomy of an Allegation
Baffling as it may be, it appears Trump’s accusation stems from a recent article published on Breitbart, the conservative news outlet formerly run by White House senior adviser Stephen Bannon.
“This is a somewhat stunning, in so far as the president of the United States doesn’t need to get his information about classified activity from Breitbart,” says Cato Institute fellow Julian Sanchez.
That story, “Mark Levin to Congress: Investigate Obama’s ‘Silent Coup’ Vs. Trump,” rehashes comments the titular conservative radio host made Thursday equating the previously reported FISA warrant with a “police state,” and accuses Obama of a politically motivated, covert attempt to undermine Trump and his associates.
It’s unclear just what prompted Levin’s rant, or why Trump glommed onto it. Although no one has confirmed a FISA investigation, or wiretaps in Trump Tower, several news outlets have reported the former’s existence. The most detailed account thus far, from the BBC in January, provided a timeline: The Justice Department sought a FISA warrant in June to intercept communications from two Russian banks suspected of facilitating donations to the Trump campaign. The judge reportedly rejected the warrant, as well as a narrower version sought in July. A new judge granted the order in mid-October, according to the BBC.
None of this necessarily makes Trump’s allegations true. Even if a FISA warrant exists, it does not mean Trump Tower is tapped or that Trump specifically is the target. Further complicating things, the existence of a wiretap would not necessarily confirm the existence of a FISA warrant. Almost half of the building’s 58 floors are dedicated to commercial and office space, and any one of them—not to mention the building’s residents—could be the target of an investigation unrelated to international espionage or election tampering.
“If he has evidence that he was wiretapped without a proper FISA order being sought, that would be a huge scandal, and he should produce whatever evidence he’s got,” says Sanchez. “It’s a pretty serious claim, and it’s striking he would make it without anything solid to back it up.”
Republican Senator Ben Sasse called on the president to clarify his claims, stating that “we are in the midst of a civilization-warping crisis of public trust.” Obama spokesperson Kevin Lewis strongly denied extra-judicial surveillance of any US citizens to Politico in response to the claims..
Look past the president’s conspiracy theories, though, and one fact stands out: However strongly Trump feels that he’s right, he’d better hope he’s wrong.
Tower of FISA
If nothing else, Trump’s tweets show he doesn’t understand how the FISA system works. If he did, he may have limited himself to tweeting about Arnold Schwartzenegger quitting The Apprentice this morning.
“While the order would have been requested by some part of the executive branch, Obama can’t order anything. Nor can Trump,” says former NSA lawyer April Doss, who stresses that her comments are based only on public information. “The order has to come from the court, and the court operates independently.”
FISA court judges serve seven-year appointments, so the court’s composition doesn’t ebb and flow with the political tides. What’s more, specific laws adopted in the wake of Watergate prevent the very activity Trump accuses Obama of.
“You can’t tap the phones of a political candidate for political purposes,” says Doss.
What you could tap them for? Acting as a foreign power, or as an agent of a foreign power. In other words, spying against US interests with both knowledge and intent.
Clearing that bar is difficult, by design. FISA warrants don’t allow for broad wiretaps of, say, every call going in and out of a specific office in a 58-story Manhattan skyscraper. Federal authorities must demonstrate not just probable cause, but that a given phone line serves primarily to undermine US interests. It’s difficult, for instance, to obtain a warrant to wiretap a shared office, for fear of picking up innocent third-party conversations.
“I have high confidence that a FISA court judge would not have authorized any warrant unless it met all the requirements under the statute,” says Doss.
Trump’s wiretap claims, then, carry presumably inadvertent implications. First, based on previous reporting and the nature of FISA courts, any wiretaps within Trump Tower would be legal. And they would stem from overwhelming evidence that the Trump campaign, or someone within it, has unsavory ties to Russia or another foreign power. Otherwise, it’s unlikely those wiretaps would exist at all.
If federal authorities did have cause to listen in on Trump Tower, though, and they provided enough evidence for a FISA court to approve the snooping, Obama is not the one who ought to worry.
With additional reporting by Andy Greenberg.
This story has been updated to include responses from Obama spokesperson Kevin Lewis and GOP Senator Ben Sasse, and to reflect that FISA court judges serve seven-year terms, not lifetime tenure.
Washington (AFP) – President Donald Trump is asking Congress to probe “potentially politically motivated investigations” during the 2016 campaign, the White House said Sunday.
The announcement came one day after Trump took to Twitter to accuse his predecessor Barack Obama of tapping his phones ahead of the November election, without providing evidence of the explosive charge.
An Obama spokesman has denied Trump’s accusation as “simply false.”
In his statement, White House Press Secretary Sean Spicer referred to unspecified reports of “potentially politically motivated investigations immediately ahead of the 2016 election” as “very troubling.”
“President Donald J. Trump is requesting that as part of their investigation into Russian activity, the congressional intelligence committees exercise their oversight authority to determine whether executive branch investigative powers were abused in 2016,” Spicer said.
He added that there would be no more comment on the matter from Trump or the White House.
Trump leveled his charges against Obama early Saturday, at the end of a week in which his administration was battered by controversy over communications between Russian officials and some of his senior aides including Attorney General Jeff Sessions.
“I’d bet a good lawyer could make a great case out of the fact that President Obama was tapping my phones in October, just prior to Election!” Trump wrote.
“How low has President Obama gone to tapp (sic) my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!” he wrote in another tweet, referring to the political scandal that toppled president Richard Nixon in 1974.
WEST PALM BEACH, Fla. — President Trump on Saturday accused former President Barack Obama of tapping his phones at Trump Tower the month before the election, taking to Twitter to call his predecessor a “bad (or sick) guy.”
Without offering any evidence or providing the source of his information, Mr. Trump fired off a series of Twitter messages claiming that Mr. Obama “had my ‘wires tapped.’ ” He likened the supposed tapping to “Nixon/Watergate” and “McCarthyism.”
A spokesman for Mr. Obama said any suggestion that the former president had ordered such surveillance was “simply false.”
Mr. Trump’s aides declined to clarify whether the president’s explosive allegations were based on briefings from intelligence or law enforcement officials — which could mean that Mr. Trump was revealing previously unknown details about an investigation — or on something else, like a news report.
His decision to lend the power of his office to such a charged claim against his predecessor — without offering any initial proof — was remarkable, even for a leader who has repeatedly shown himself willing to make assertions that are false or based on dubious sources.
It would have been difficult for federal agents, working within the law, to obtain a wiretap order to target Mr. Trump’s phone conversations. It would have meant that the Justice Department had gathered sufficient evidence to persuade a federal judge that there was probable cause to believe he had committed a serious crime or was an agent of a foreign power, depending on whether it was a criminal investigation or a foreign intelligence one.
Former officials pointed to longstanding laws and procedures intended to ensure that presidents cannot wiretap a rival for political purposes.
“A cardinal rule of the Obama administration was that no White House official ever interfered with any independent investigation led by the Department of Justice,” said Kevin Lewis, a spokesman for Mr. Obama. “As part of that practice, neither President Obama nor any White House official ever ordered surveillance on any U.S. citizen.”
But a senior White House official said that Donald F. McGahn II, the president’s chief counsel, was working on Saturday to secure access to what Mr. McGahn believed was an order issued by the Foreign Intelligence Surveillance Court authorizing some form of surveillance related to Mr. Trump and his associates.
The official offered no evidence to support the notion that such an order exists. If one does, it would be highly unusual for a White House to order the Justice Department to turn over such an investigative document, given the traditional independence of law enforcement matters.
It has been widely reported that there is a federal investigation, which began during the 2016 presidential campaign, into links between Trump associates and the Russians. That issue has dogged Mr. Trump for months.
In one message, which Mr. Trump sent from his Palm Beach, Fla., estate at 6:35 a.m., the president said he had “just found out” that his phones had been tapped before the election. Mr. Trump’s reference to “wires tapped” raised the possibility that he was referring to some other type of electronic surveillance and was using the idea of phone tapping loosely.
Two people close to Mr. Trump said they believed he was referring to a Breitbart News article, which aides said had been passed around among his advisers. Mark Levin, a conservative radio host, had also embraced the theory recently in a push against what right-leaning commentators have been calling the “deep state.”
The Breitbart article, published on Friday, claimed that there was a series of “known steps taken by President Barack Obama’s administration in its last months to undermine Donald Trump’s presidential campaign and, later, his new administration.”
If Mr. Trump was motivated to take to Twitter after reading the Breitbart article or listening to Mr. Levin, he was using a presidential megaphone to spread dark theories of a broad conspiracy aimed at undermining his presidential ambitions, and later his presidency.
Even with the Breitbart article circulating, several of Mr. Trump’s advisers were stunned by the president’s morning Twitter outburst. Those advisers said they were uncertain about what specifically Mr. Trump was referring to; one surmised that he may also have been referring to a months-old news report about a secret surveillance warrant for communications at his New York offices.
One senior law enforcement official from the Obama administration, who has direct knowledge of the F.B.I. investigation into Russia and of government wiretapping, said that it was “100 percent untrue” that the government had wiretapped Mr. Trump. The official, who asked for anonymity to discuss matters related to investigations and intelligence, said the White House owed the American people an explanation for the president’s allegations.
Ben Rhodes, a former top national security aide to Mr. Obama, said in a Twitter message directed at Mr. Trump on Saturday that “no president can order a wiretap” and added, “Those restrictions were put in place to protect citizens from people like you.”
The House and Senate Intelligence Committees are moving forward with their own investigations into Russia’s efforts to influence the election, and they have said they will examine links between Mr. Trump’s associates and the Russians.
Senator Chris Coons, Democrat of Delaware, said on Friday that he believed there were “transcripts” that would help document those contacts, though he said he had not yet seen them.
Mr. Trump claimed the Obama administration ordered the phoned at his building in New York tapped.CreditVictor J. Blue for The New York Times
“There are transcripts that provide very helpful, very critical insights into whether or not Russian intelligence or senior Russian political leaders — including Vladimir Putin — were cooperating, were colluding, with the Trump campaign at the highest levels to influence the outcome of our election,” Mr. Coons told Andrea Mitchell on MSNBC. “I believe they exist.”
In a written statement on Saturday, a spokesman for Mr. Coons said that the senator “did not imply that he is aware of transcripts indicating collusion between the Trump campaign and the Russians.” The spokesman, Sean Coit, said Mr. Coons “simply stated that a full review of all relevant transcripts and intelligence intercepts is necessary to determine if collusion took place.”
The New York Times reported in January that among the associates whose links to Russia are being scrutinized are Paul Manafort, Mr. Trump’s onetime campaign chairman; Carter Page, a businessman and foreign policy adviser to the campaign; and Roger Stone, a longtime Republican operative who said he was in touch with WikiLeaks at one point before it released a trove of emails from John D. Podesta, Hillary Clinton’s campaign chairman, last August. Mr. Stone later said he had communicated with WikiLeaks through an intermediary.
Mr. Trump appeared on Saturday to suggest that warrants had been issued by the Foreign Intelligence Surveillance Court. He claimed that the Obama administration had once been “turned down by court” in its supposed efforts to listen in on conversations by Mr. Trump and his associates.
In the fall, the F.B.I. examined computer data showing an odd stream of activity between a Trump Organization server and Alfa Bank, one of Russia’s biggest banks, whose owners have longstanding ties to Mr. Putin. While some F.B.I. officials initially believed that the computer activity indicated an encrypted channel between Moscow and New York, the bureau ultimately moved away from that view. The activity remains unexplained.
There is no confirmed evidence that the F.B.I. obtained a court warrant to wiretap the Trump Organization or was capturing communications directly from the Trump Organization.
During the transition, the F.B.I. — which uses FISA warrants to eavesdrop on the communications of foreign leaders inside the United States — overheard conversations between the Russian ambassador to the United States and Michael T. Flynn, whom Mr. Trump had named national security adviser.
Mr. Trump has pointedly and repeatedly questioned in conversations how it was that Mr. Flynn’s conversations were recorded, and wondered who could have issued a warrant.
After The Washington Post reported that Mr. Flynn and the ambassador, Sergey I. Kislyak, had discussed sanctions that the Obama administration had just imposed on Russia, Mr. Flynn was pushed out of his post by the White House because he had lied to Vice President Mike Pence about the nature of the calls.
The Breitbart article cited mainstream news reports and concluded — going beyond the public record — that the Obama administration had “obtained authorization to eavesdrop on the Trump campaign; continued monitoring the Trump team even when no evidence of wrongdoing was found; then relaxed the N.S.A. rules to allow evidence to be shared widely within the government.”
Mr. Levin, a day earlier, railed about what he called a “much bigger scandal,” claiming — again with no evidence — that Mr. Obama and his aides had used “the instrumentalities of the federal government, intelligence activity, to surveil members of the Trump campaign and put that information out in the public.”
Several senior members of Mr. Trump’s White House staff, including his spokesman, Sean Spicer, did not respond to an email requesting on-the-record responses to more than a half-dozen questions about Mr. Trump’s Twitter posts.
Representative Adam B. Schiff, the top Democrat on the House Intelligence Committee, denounced the “willingness of the nation’s chief executive to make the most outlandish and destructive claims without providing a scintilla of evidence to support them.”
Even some Republican lawmakers questioned Mr. Trump’s accusations. Senator Ben Sasse of Nebraska issued a statement demanding that the president reveal everything he knows about any wiretaps or warrants.
“The president today made some very serious allegations, and the informed citizens that a republic requires deserve more information,” Mr. Sasse said, adding that “we are in the midst of a civilization-warping crisis of public trust.”
Taping calls seems to hold a spot in Mr. Trump’s consciousness. He spent many years taping his own phone calls as a businessman. During the campaign, Mr. Trump’s staff members told reporters they feared that their offices were being bugged.
But Mr. Trump’s latest allegations represented a sharp change in his tone toward Mr. Obama.
The current president has frequently spoken about how much he admires Mr. Obama for the gracious way he handled the transition. But since taking office, Mr. Trump has frequently clashed with the intelligence agencies over the Russia inquiries, including efforts to examine the attempts by that country to influence the presidential election and the contacts between Mr. Trump’s aides and the Russian government.
In recent days, the president has appeared increasingly angry about leaks of information that he believes are coming from law enforcement and intelligence officials who are holdovers or recently departed from Mr. Obama’s administration.
People close to Mr. Trump have described him as determined to stop those people from sabotaging his administration. One adviser said on Friday that the president had been discussing a possible plan to try to prevent leaks from occurring. The adviser declined to elaborate on what the plan might entail.
Two senior administration officials said Mr. Trump had tried for two days to find a way to be on an offensive footing against the news articles resulting from leaks; one person close to Mr. Trump said his explosive claim was a result of that.
Mr. Trump’s mood was said to be volatile even before he departed for his weekend in Florida, with an episode in which he vented at his staff. The president’s ire was trained in particular on Mr. McGahn, his White House counsel, according to two people briefed on the matter.
Mr. Trump was said to be frustrated about the decision by Jeff Sessions, his attorney general, to recuse himself from participating in any investigations of connections between the Trump campaign and Russia. Mr. Trump has said there were no such connections. Mr. Trump, who did not learn that Mr. Sessions was recusing himself until after the decision was made, told aides that it gave an opening to his critics on the Russia issue.
Story 1: Trump Targets Terrorist Control vs. Clinton and Obama Talk Gun Control — Lying Lunatic Left Losers — Americans Armed Against Gun Grabbing Government Tyrants — Defend The Second Amendment — Videos
Oath of office of the President of the United States
“I do solemnly swear (or affirm) that I will faithfully execute the Office of President of the United States, and will to the best of my ability, preserve, protect and defend the Constitution of the United States.”
ARTICLE II, SECTION 3, United States Constitution
[The President] shall take Care that the Laws be faithfully executed….
John Lott on gun control: “The background check system itself is basically racist”
John Lott: Why More Guns Equal Less Crime
John Stossel -The Gun Violence Myth
Mark Levin discusses the gun control issue with John Lott (audio from 11-30-2015)
Trump threatens to run apart from GOP on gun control
Obama Calls for Assault Weapons Ban, New ‘No Fly, No Buy’ Law
Trump: People using PC terms against us to not report terror
Trump renews calls for Muslim ban, surveillance of mosques
Donald Trump Jr.: Extremists only understand force
Obama Criticises Donald Trump Over His Calls To Ban Muslims From US!!!!
CIA Director Warns of ISIS Using Refugee Streams to Move Operatives
Ben Shapiro: The Myth of the Tiny Radical Muslim Minority
CIA DIRECTOR TESTIFIES AT SENATE HEARING ON NATIONAL SECURITY
Obama goes on tirade against Trump over ‘radical Isl…
Former intel chair rips Pres. Obama’s anti-Trump speech
The 2nd Amendment Explained
Donald Trump Rally Speech 6/15/16: Atlanta, GA: Trump Blasts Hillary
Second Amendment of United States Constitution
Trump vs. Clinton: Two views on Orlando terror
Paul Ryan Interview Bill O’Reilly Factor Fox News Regarding Donald Trump
FULL: Donald Trump Orlando Terrorism Speech 6/13/16
LGBT Nightclub Orlando Trump ISLAMIC terrorism VS Obama Clinton HomeGrown Hate CRIME
Background Checks? Shooter Had Them in Spades
Why restrict ‘good’ gun owners, resident asks President Obama at town hall
Gunning For Hillary – Trump Says Clinton Will Abolish 2nd Amendment – Fox & Friends
Hillary Clinton on Second Amendment Gun Rights – June 5, 2016 – ABC This Week
The Clintons Are Coming For Your Guns
Hillary Clinton, If President, Vows To ‘Get Those Guns’ Out Of People’s Hands
Hillary Clinton Outlines Plan to Abolish the Second Amendment
Ginny Simone Reporting | S7 E1: “Obama: Our Biggest Threat To National Security”
Judge Napolitano: Obama Doesn’t Believe in the 2nd Amendment
Judge Napolitano Reacts to NY Times Criticism “Either We Have a 2nd Amendment or We Don’t”
Barack Obama On 2nd Amendment Rights
Trump: We need strong surveillance, we need intelligence
AK47 versus M16 – R. Lee Ermey
EDUCATE YOURSELF ~ Semi-Auto Firearms vs Fully-Automatic Firearms
The Truth About AK-47 Firepower
Lock n’ Load with R. Lee Ermey – Machine Guns
MG42 Machine Gun – “Hitler’s Buzz Saw”
CIA chief: IS working to send operatives to the West
CIA Director John Brennan will tell Congress on Thursday that Islamic State militants are training and attempting to deploy operatives for further attacks on the West and will rely more on guerrilla-style tactics to compensate for their territorial losses.
CIA Director John Brennan will tell Congress on Thursday that Islamic State militants are training and attempting to deploy operatives for further attacks on the West and will rely more on guerrilla-style tactics to compensate for their territorial losses.
In remarks prepared for the Senate Intelligence Committee, Brennan says IS has been working to build an apparatus to direct and inspire attacks against its foreign enemies, as in the recent attacks in Paris and Brussels — ones the CIA believes were directed by IS leaders.
“ISIL has a large cadre of Western fighters who could potentially serve as operatives for attacks in the West,” Brennan said, using another acronym for the group. He said IS probably is working to smuggle them into countries, perhaps among refugee flows or through legitimate means of travel.
Brennan also noted the group’s call for followers to conduct so-called lone-wolf attacks in their home countries. He called last week’s attack in Orlando a “heinous act of wanton violence” and an “assault on the values of openness and tolerance” that define the United States as a nation.
He said IS is gradually cultivating its various branches into an interconnected network. The branch in Libya is likely the most advanced and most dangerous, but IS is trying to increase its influence in Africa, he said. The IS branch in the Sinai has become the “most active and capable terrorist group in Egypt,” attacking the Egyptian military and government targets in addition to foreigners and tourists, such as the downing of a Russian passenger jet last October.
Other branches have struggled to gain traction, he says. “The Yemen branch, for instance, has been riven with factionalism. And the Afghanistan-Pakistan branch has struggled to maintain its cohesion, in part because of competition with the Taliban.”
He called IS a “formidable adversary,” but said the U.S.-led coalition has made progress combatting the group, which has had to surrender large swaths of territory in Iraq and Syria and has lost some of its leaders in airstrikes. IS has struggled to replenish its ranks of fighters, Brennan said, because fewer of them are traveling to Syria and others have defected.
“The group appears to be a long way from realizing the vision that Abu Bakr al-Baghdadi laid out when he declared the caliphate two years ago in Mosul,” Iraq, Brennan said.
He said the group’s ability to raise money has also been curtailed, although the group still continues to generate at least tens of millions of dollars in revenue each month, mostly from taxation and from sales of crude oil.
“Unfortunately, despite all our progress against ISIL on the battlefield and in the financial realm, our efforts have not reduced the group’s terrorism capability and global reach,” he said.
“In fact, as the pressure mounts on ISIL, we judge that it will intensify its global terror campaign to maintain its dominance of the global terrorism agenda.”
Story 1: Part 1: The Decline and Fall Of The Democratic Party Under Liar In Chief Obama — Hillary Clinton vs. Donald Trump in 2016 Presidential Election — Two Party Tyranny — What Difference Does It Make? — Donor Class Wins No Matter Who Wins — Make America Great Again! –Videos
Ray: A public servant who has a track record of not telling the truth
Judge Napolitano What if the two party system is a sham? – Fox Business
Donald Trump on GOP competition, Benghazi hearing
Kurtz: Paul Ryan, insufficiently conservative?
Rush Limbaugh: GOP donors installed Paul Ryan as House Speaker
Limbaugh: Donor/RINO Class Pushing Hard For Paul Ryan As Speaker Of The House
Both Parties Fear the Tea Party (Limbaugh)
Mark Levin on Paul Ryan’s radical pro Amnesty ideology
UN-led Mass Migration Destroying U.S. Nationhood
Understanding the Impact of Europe’s Migrant Crisis
Would Paul Ryan Be a Good Choice for House Speaker?
What We Can Expect If Congress Passes TPP
The Nuances Behind the Republican Presidential Debate
How Trump’s Attack on McCain Didn’t Go Far Enough
Iran Deal Courtesy of CFR New World Order Crowd
‘2030 Agenda’: Latest UN Plan for World Government
‘Two-party system an illusion, both funded from same source’
“MORE AND MORE PEOPLE “FED UP WITH THIS “RIGGED TWO-PARTY SYSTEM”!
The Two-Party System is Making America Ungovernable- Intelligence Squared U.S.
Andrew Horning on Breaking the Two Party System 1 18 2014
Reagan Warned Us About Obama
Mark Steyn on Racism, Slavery, and the Democratic Party
Rush To Beck: “We May Be Looking At Barack Obama Destroying The Democrat Party”
Mind blowing speech by Robert Welch in 1958 predicting Insiders plans to destroy America
Ron Paul – Judge Napolitano What if the two party system is a sham? – Fox Business
ObamaCare 101: What the Healthcare Law Means to You Part 1 of 3
Art Thompson, CEO of The John Birch Society, takes you into the new healthcare law. He identifies a pattern of government broken promises, revealing that if something sounds too good to be true, then it probably is. Find out what’s really in the new law and what you can expect long term.
ObamaCare 101: What the Healthcare Law Means to You Part 2 of 3
ObamaCare 101: What the Healthcare Law Means to You Part 3 of 3
John Birch Society: Oppose the Trans-Pacific Partnership (TPP)
William F. Jasper, Senior Editor for The New American magazine, explains how President Obama’s Trans-Pacific Partnership (TPP) is an “an all-out assault on our national sovereignty,” and how It would unconstitutionally transfer legislative powers from the U.S. Congress, our state legislatures, and our city and county governments to multi-national corporations and unaccountable international bureaucrats at the World Trade Organization, or WTO. Incredibly, it also would transfer judicial powers from our federal and state courts — which are bad enough — to globalist TPP judges at regional tribunals and the WTO.
DECLINE of EMPIRES: The Signs of Decay
Archie Bunker on Democrats
Archie Bunker predicts conditions under Obama
George Carlin – It’s a big club and you ain’t in it
Obama Job Approval Steady in 27th Quarter at 45.9%
by Jeffrey M. Jones
Average 45.9% approval similar to 46.1% in prior quarter
Obama has been under 50% approval for most of his presidency
Approval midrange compared with other presidents’ 27th quarters
PRINCETON, N.J. — President Barack Obama’s job approval rating in his 27th quarter in office, from July 20 to Oct. 19, averaged 45.9%, essentially unchanged from his 46.1% average for the prior quarter.
Obama’s daily approval ratings also varied little within his most recent quarter, averaging 46% nearly every week during the quarter. There were just two modest but notable exceptions. In late August, as U.S. stocks fell in response to concerns about problems in the Chinese economy, his weekly approval rating dipped to 44%. And in late September it rose to 48% during the week of Pope Francis’ U.S. trip, which included a widely covered visit with Obama at the White House.
Since he became president nearly seven years ago, Obama has averaged 47% job approval. There have been only five quarters when he had majority approval, with four of those occurring during the first year of his presidency, the so-called “honeymoon phase” when new presidents tend to be rated positively. The only other time Obama’s quarterly approval exceeded 50% was perhaps the most consequential one — the 16th quarter, in which he was re-elected.
Obama’s 27th Quarter Midrange Compared With Other Presidents
Obama is the sixth post-World War II president to serve a 27th quarter in office. Two of these — Dwight Eisenhower and Bill Clinton — were rated quite positively at this stage in their presidencies, with average approval ratings of 65.3% and 59.7%, respectively.
In contrast, Harry Truman (23.0%) and George W. Bush (33.2%) were decidedly unpopular at the same point of their presidencies. Truman’s 27th quarter average is the worst quarterly average for any president in Gallup’s polling history.
Obama’s 27th quarter average, along with Ronald Reagan’s, is between these two extremes. Reagan averaged 47.0% approval, slightly better than Obama’s 45.9%.
After presidents have served nearly seven years in office, Americans’ opinions of them are pretty well-established and unlikely to change unless a major international or domestic crisis occurs. Clinton’s and Bush’s approval ratings did not change between their 27th and 28thquarters. Truman, Eisenhower and Reagan saw modest improvements of a few percentage points.
Americans’ opinions of Obama have been steady this year, holding near 46%. If his approval ratings do not improve dramatically during the remainder of his presidency, his full-term approval rating average, currently 47%, will rank among the lowest for post-World War II presidents, tied with Gerald Ford’s and better than only Truman’s (45.4%) and Jimmy Carter’s (45.5%).
Obama’s relatively low approval ratings may be as much a function of the era in which he is governing as it is a reflection on his leadership, management and decision-making. There have been relatively few international crises that helped to boost his public support, as the 9/11 attacks and Iraq War did for Bush, and as similar crises have done for other presidents. Arguably the only “rally event” in Obama’s presidency was the capture of Osama bin Laden. Obama also took office during the Great Recession, and the economic recovery since it ended has been slow and uneven.
But Obama is also governing in a time of extreme partisan polarization. In Congress, that has meant political gridlock since Democrats lost control of the U.S. House in the 2010 midterm elections. In the American public, it is evident in his historically low support from the opposition party. Obama’s average 13% approval rating among Republicans is on pace to be the lowest job approval rating from the opposition party by a full 10 percentage points, behind Bush’s average 23% approval rating among Democrats. By comparison, Clinton averaged 27% approval among Republicans, and presidents before Clinton averaged 40% approval from the opposition.
Results for this Gallup poll are based on telephone interviews conducted July 20-Oct. 19, 2015, on the Gallup U.S. Daily survey, with a random sample of 45,663 adults, aged 18 and older, living in all 50 U.S. states and the District of Columbia. For results based on the total sample of national adults, the margin of sampling error is ±1 percentage point at the 95% confidence level. All reported margins of sampling error include computed design effects for weighting.
Each sample of national adults includes a minimum quota of 50% cellphone respondents and 50% landline respondents, with additional minimum quotas by time zone within region. Landline and cellular telephone numbers are selected using random-digit-dial methods.
In U.S., New Record 43% Are Political Independents
by Jeffrey M. Jones
Record 43% of Americans are political independents
Democrats maintain edge among those with a party preference
Democratic advantage smaller in 2014 than in 2013
PRINCETON, N.J. — An average 43% of Americans identified politically as independents in 2014, establishing a new high in Gallup telephone poll trends back to 1988. In terms of national identification with the two major parties, Democrats continued to hold a modest edge over Republicans, 30% to 26%.
Since 2008, the percentage of political independents — those who identify as such before their leanings to the two major parties are taken into account — has steadily climbed from 35% to the current 43%, exceeding 40% each of the last four years. Prior to 2011, the high in independent identification was 39% in 1995 and 1999.
The recent rise in political independence has come at the expense of both parties, but more among Democrats than among Republicans. Over the last six years, Democratic identification has fallen from 36% — the highest in the last 25 years — to 30%. Meanwhile, Republican identification is down from 28% in 2008 to 26% last year.
The latest results are based on aggregated data from 15 separate Gallup telephone polls conducted throughout 2014.
These changes have left both parties at or near low points in the percentage who identify themselves as core supporters of the party. Although the party identification data compiled in telephone polls since 1988 are not directly comparable to the in-person polling Gallup collected before then, the percentages identifying as Democrats prior to 1988 were so high that it is safe to say the average 30% identifying as Democrats last year is the lowest since at least the 1950s.
Republican identification, at 26%, is a shade higher than the 25% in 2013. Not since 1983, the year before Ronald Reagan’s landslide re-election victory, have fewer Americans identified as Republicans.
The decline in identification with both parties in recent years comes as dissatisfaction with government has emerged as one of the most important problems facing the country, according to Americans. This is likely due to the partisan gridlock that has come from divided party control of the federal government. Trust in the government to handle problems more generally is the lowest Gallup has measured to date, and Americans’ favorable ratings of both parties are at or near historical lows. Thus, the rise in U.S. political independence likely flows from the high level of frustration with the government and the political parties that control it.
Democrats’ Edge in Party Identification and Leaning Shrinks
Although independents claim no outright allegiance to either major party, it is well-known that they are not necessarily neutral when it comes to politics. When pressed, most independents will say they lean to one of the two major parties. For example, last year an average of 17% of Americans who initially identified as independents subsequently said they “leaned” Republican, 15% were independents who leaned Democratic, with the remaining 11% not expressing a leaning to either party.
Since partisan leaners often share similar attitudes to those who identify with a party outright, the relative proportions of identifiers plus leaners gives a sense of the relative electoral strength of the two political parties, since voting decisions almost always come down to a choice of the two major-party candidates. In 2014, an average 45% of Americans identified as Democrats or said they were Democratic-leaning independents, while 42% identified as Republicans or were Republican-leaning independents.
That the three-point Democratic edge was down from six points in 2013, and among Democrats’ smaller advantages the past 25 years. Democrats usually hold an advantage in this combined measure of party affiliation. In fact, the only year Republicans held a notable edge since Gallup began tracking independents’ political leanings was in 1991, the year Republican President George H.W. Bush’s approval ratings soared after the United States’ victory in the Persian Gulf War. Democrats’ high point came in 2008, in the final year of George W. Bush’s administration and the year Barack Obama was first elected president.
However, the three-point Democratic advantage for all of 2014 obscures the change that occurred during the year. On a quarterly basis, Democrats started out 2014 with a five-point edge, similar to their advantage in 2013. That dipped to two points by the third quarter. In the fourth quarter, likely in response to Republicans’ success in the 2014 midterm elections, Republicans held a slight advantage of one point.
Since 2008, Americans have been increasingly reluctant to identify with either the Republican or Democratic Party, and now a record 43% claimed political independence in 2014. Given historical trends, 2015 could bring a new record, as the percentage identifying as independents typically increases in the year before a presidential election, averaging a 2.5-point increase in the last six such years.
Although Democrats typically have an advantage in partisanship, that edge shrunk in 2014 and in the last months of the year the parties were essentially on equal footing. With each party controlling part of the federal government — Democrats the presidency and Republicans the Congress — they each will have a say in how the nation addresses its major challenges in the coming year. However, in recent years divided control of government has more often than not resulted in partisan gridlock, and Americans’ frustration with the frequent political stalemate is evident. Continued frustration with the government would likely encourage more Americans to identify as independents this year.
Results for this Gallup poll are based on telephone interviews conducted January-December 2014, with a combined random sample of 16,479 adults, aged 18 and older, living in all 50 U.S. states and the District of Columbia. For results based on the total sample of national adults, the margin of sampling error is ±1 percentage point at the 95% confidence level. All reported margins of sampling error include computed design effects for weighting.
Each sample of national adults includes a minimum quota of 50% cellphone respondents and 50% landline respondents, with additional minimum quotas by time zone within region. Landline and cellular telephone numbers are selected using random-digit-dial methods.
New Emails Reveal Obama White House Worked on Concocting Benghazi Lie DURING the Attacks
House Oversight and Government Reform Committee Chairman Darrell Issa said on Thursday that the Obama White House was contacting YouTube owner Google during the Benghazi terrorist attacks, working on the false narrative even before Americans were out of harm’s way and before the intelligence community examined available evidence.
The still classified Obama State Department email, according to Issa, shows that the Obama White House rushed to settle on the false narrative of the anti-Islamic YouTube video instigating the attacks, which was completely at odds with the conclusions reached by reports from the ground.
This new evidence destroys the Obama White House claims, communicated by Obama spokesman Jay Carney, that the White House obtained the false narrative from CIA talking points, since, according to Congressman Issa, the communication with YouTube was conducted by the Obama White House before any CIA talking points were concocted.
The subject line of the email, ironically sent at 9:11 p.m. (the attacks took place on 9/11/12) on the night of the attack, was “Update on Response to actions – Libya,” hours before the attack had ended.
“The e-mail shows the White House had hurried to settle on a false narrative — one at odds with the conclusions reached by those on the ground — before Americans were even out of harm’s way or the intelligence community had made an impartial examination of available evidence,” Issa said.
Issa has called for the Obama White House to declassify the email.
According to Issa, one of the items noted in the email stated, “White House is reaching out to U-Tube [sic] to advise ramifications of the posting of the Pastor Jon video.”
Issa scolded current Secretary of State, Democrat John Kerry, for just now turning over a classified version of the email, some 20 months after the attack, while calling on the regime to release a unclassified copy.
“Unfortunately, Secretary Kerry and the State Department continue to try to keep this information from the public, only turning this document over to Congress last month. While the information I have cited from this email is clearly unclassified, the State Department has attempted to obstruct its disclosure by not providing Congress with an unclassified copy of this document that redacted only classified portions outlining what the Department of Defense and the Secretary of State were doing in response to the attack in Benghazi that night.”
“This tactic prevents the release of the email itself,” said Issa.
Paul Ryan officially declares candidacy for House speaker
Rep. Paul Ryan officially announced his bid Thursday night to become the next House speaker after securing backing from the three major political factions inside the House GOP conference.
“I never thought I’d be speaker,” Ryan wrote in a letter to his Republican colleagues. “But I pledged to you that if I could be a unifying figure, then I would serve — I would go all in. After talking with so many of you, and hearing your words of encouragement, I believe we are ready to move forward as one, united team. And I am ready and eager to be our speaker.”
The Wisconsin Republican snapped up endorsements from a centrist Republican caucus called the Tuesday Group as well as from the more conservative Republican Study Committee.
“After hearing Paul lay out his vision for the future of the Republican conference, I am confident that he is the right person to lead the House going forward,” Rep. Bill Flores, chairman of the RSC, said in a statement Thursday. “He has the policy expertise, conservative principles and strong values we need in our next speaker.”
The endorsements came after Ryan won support from most members of the House Freedom Caucus — a group of about 40 hard-line conservatives — late Wednesday night.
“I’ve spoken with many of you over the past few days, and I can sense the hunger in our conference to get to work,” Ryan wrote. “I know many of you want to show the country how to fix our tax code, how to rebuild our military, how to strengthen the safety net, and how to lift people out of poverty. I know you’re willing to work hard and get it done, and I think this moment is ripe for real reform.”
Ryan, chairman of the House Ways and Means Committee and the 2012 Republican vice presidential nominee, announced Tuesday he would run for the top leadership job if he got support from all GOP factions. He gave his colleagues until Friday to decide whether to support him.
He had repeatedly said he did not want the job but was pressed to run by Republicans who see him as the best candidate to unite the GOP conference.
“Whatever our differences, we’re all conservatives,” Ryan wrote in his letter. “We were elected to defend the constitution. We share the same principles. We all believe America is the land of opportunity — the place where you should be able to go as far as your talents and hard work will take you.”
Republicans will choose a new speaker next week — voting in conference next Wednesday to pick their nominee and on the House floor next Thursday. Outgoing House Speaker John Boehner, R-Ohio, is set to resign next Friday.
The rebellious Freedom Caucus was Ryan’s biggest obstacle to becoming speaker. He did not win the group’s official backing because he fell short of its requirement that at least 80% of its members agree on an endorsement. He won support from about 70% of caucus members.
The caucus’ qualified support, combined with endorsements from the other two GOP groups, are enough to clear Ryan’s path — and possibly end the weeks-long leadership scramble inside the House GOP conference.
Eighty-one percent of Republican insiders say that the likelihood that Trump becomes their party’s nominee is more today than it was a month ago.
The odds that Donald Trump wins the Republican presidential nomination are going up.
Eighty-one percent of Republican insiders say the likelihood that Trump becomes their party’s nominee is more today than it was a month ago, and 79 percent of Democrats said the same. That’s according to the POLITICO Caucus, our weekly bipartisan survey of top strategists, operatives and activists in the early-voting states of Iowa, New Hampshire, South Carolina and Nevada.
Story Continued Below
“I can’t even describe the lunacy of him as our nominee. But reason has not applied to date in this race, and my hopes are fleeting that it will ever surface,” lamented an Iowa Republican, who like all participants was granted anonymity in order to speak freely.
“Predictions of his demise keep not coming true,” added a New Hampshire Republican.
Asserted a South Carolina Republican, “Donald Trump being the GOP nominee is now within the realm of possibility.”
Twenty-two percent of Caucus Republicans said Trump has a 50-50 shot at becoming the Republican nominee; the same percentage said he has a 30 percent chance. The rest of the respondents were divided, with the majority saying his odds are still less than 50 percent. But more than 8-in-10 GOP respondents said those are better odds than they gave Trump a month ago.
The results are notable because they represent a big shift in the thinking of POLITICO Caucus insiders, who this summer were deeplyskeptical of Trump’s staying power.
“Trump will be among 3-4 finalists well into April; of that there is no doubt,” an Iowa Republican said.
Added a New Hampshire Republican, who like all participants responded via an online survey: “Numbers are numbers and you have to give them credence. I remain skeptical that he has the ability to turn people out, come primary day, but I [have] been wrong about this campaign every step of the way so far.”
Several insiders pointed to both Trump’s persistent leads in polls and evidence of organization on the ground.
“I think he’s now mounting a serious campaign,” a South Carolina Republican said. “His stump speech had matured and even though the novelty of his candidacy is wearing off, his straight talk is appealing to people who are so sick of being lied to by the political class.”
Another Iowa Republican agreed, saying, “The more time that goes by that he continues to lead — the more likely it is he wins. That simple. Also, comparatively, he is building a real campaign. More so than many others.”
“Not sure why anyone should be so surprised that Trump’s campaign is getting so serious in terms of infrastructure build-out,” a New Hampshire Democrat said. “Trump may be a jerk, but he is an extremely successful jerk. He has the means and the smarts to compete everywhere — and he is not slowing down.”
That’s not the case in Nevada, noted several Republicans there, who said they see little evidence of a strong Trump ground game there.
But, one Republican from that state admonished: “He has demonstrated that he is durable in a way that Herman Cain, Michele [Bachmann] and Newt Gingrich were not. … A lot can happen in the next few months, but it is time for everyone to stop whistling past the graveyard and realize that this is real and he could be our standard-bearer.”
However, several insiders also predict that, though his odds have improved, the rest of the Republican Party will coalesce against him if he still appears to be a serious contender for the nomination when voting begins.
“Maybe, just maybe, Trump wins an early contest or two. That will trigger a much stronger Stop Trump movement,” a New Hampshire Republican said. “The party will nominate Bob Dole — in 2016 —before it will nominate Trump. And a Trump nomination would result in a third candidate emerging.”
Several insiders also said Trump couldn’t withstand waves of scrutiny stemming from attacks launched by super PACs and big donors that, they said, may be just around the corner.
“The summer of Trump has lasted longer than conventional wisdom suggested it would,” a South Carolina Republican said. “It’s going to take a sustained, multi-pronged paid media effort to educate voters that Trump is not a conservative and has flip-flopped on practically every issue. Major donors are quickly getting to the place where they are ready to fund such an effort.”
All eyes on Jeb
The pressure is on for Jeb Bush in next week’s GOP debate, insiders said. Forty-seven percent of Republicans, and 41 percent of Democrats, said the former Florida governor is the candidate with the most riding on the contest, set for next Wednesday in Boulder, Colo.
“Jeb really needs a knock-out performance — it needs to be all him with nobody even close. Otherwise those fumes he’s on are going to evaporate even quicker,” a New Hampshire Republican said.
An Iowa Republican said he doesn’t even need to go that far, but he does need to step up his performance.
“Riding at 6 percent in the polls has rattled Jeb’s donors and volunteers,” this insider said. “He doesn’t need a breakout performance, but he needs to be in the mix and in the top tier of the debate or risk getting shoved to the background and overshadowed by Rubio and others seeking to win over mainstream Republican voters.”
Marco Rubio was a distant second choice for which candidate was under the most pressure for a strong debate, pulling in 13 percent of the overall Republican vote and 24 percent of the Democratic vote.
“Rubio has been the one constant at third place, and it’s time he breaks out of that and starts cutting into Trump/Carson,” a South Carolina Democrat said. “It’s no longer ‘early’ and it’s not the final stretch, but this is the part of the horse race where jockeys know they have to start making their moves if they want to be in position to win.”
Fire-breathing scourge of Wall Street on the campaign trail — and reliable friend of Wall Street in the boardroom. That’s Hillary Clinton — and the big-money crowd thinks it’s in on the game.
For all her populist rhetoric against hedge-funders and the like, Clinton has received more donations from CEOs than any candidate in the GOP — you know, the party of the greedy rich.
More than 760 of Clinton’s presidential donors have listed their occupation as CEO or some variation, according to a Big Crunch analysis of federal election forms.
That’s as many as have given to Republican hopefuls Jeb Bush, Marco Rubio and Ted Cruz combined.
And it doesn’t even include people like hedge-fund CEO Robert Mercer, who prefers to list himself as a “financial consultant” — or those who’ve given instead to pro-Hillary super-PACs. (Or all the folks who’ve bought goodwill over the years by giving to the Clinton Foundation.)
Surprising? No. We’re talking about a woman who’s made millions from hefty six-figure fees for speeches to, among others, groups headed by those same CEOs.
She’s also raked in many millions more for her campaign from corporate lawyers, lobbyists and bankers.
Still, that hasn’t stopped her from declaring, “Wall Street, you’ve had your president. Now we need a president for Main Street.”
And never mind what that seems to imply about the guy in the Oval Office now. Or that just one of her speeches costs four times the average American’s salary.
Wall Street gets it. The fat cats figure she’s just saying what she must to placate her party’s Sanders-Warren hard-left wing.
As one hedge-fund manager told Politico: “Nobody takes it like she’s going after them personally.”
It’s just Hillary being Hillary. Which is to say, all things to all people.
A virulent strain of Clinton Derangement Syndrome, which scientists and Republicans thought had been wiped out at the end of the last century, is now afflicting millions of conservative Americans. Some Republicans so detest Hillary Clinton they are badly underestimating how likely she is, at this point in the campaign, to be America’s 45thpresident. Their denial is just as strong now as it was a month ago, before Clinton began a run of political victories that have enhanced her prospects, all while the roller derby/demolition derby that is the Republican nomination contest has continued to harm the GOP’s chances of winning back the White House.
To be sure, nothing ever happens in a linear or tidy fashion with the Clintons; she is certain to add more chapters to the Perils of Hillary saga before Election Day 2016. Bernie Sanders could still upend her in Iowa, New Hampshire, or both, which could throw the nomination battle into unadulterated bedlam. Even if Clinton is nominated, a strong Republican candidate could absolutely defeat her next November, with victory as simple as the party putting forth a nominee who is more likeable to voters and better on television. Indeed, many elite and grassroots Republicans believe Clinton’s personality, which they can’t stand, will keep her out of the Oval Office no matter what.
But October has been good to Clinton: a glittering debate performance, the decision of potential rival Joe Biden not to run (greatly simplifying her path to the nomination), the vanquishing of Republicans during her daylong Benghazi hearing, and a solid turn at the Iowa Democratic Party’s Jefferson-Jackson dinner Saturday night. All have improved Clinton’s odds of cruising into the White House twelve months hence, and have thrown into sharper relief some of the advantages she has had all along.
To state the obvious, Clinton faces two tasks to become commander-in-chief: get enough delegates to beat Sanders and then sew up 270 electoral votes. The more easily she can complete her first mission (especially compared to the wooly nomination battle of her eventual Republican opponent), the more easily achievable will be her second goal.
Here, then, are some of the advantages the Democratic frontrunner has now, many of which have been ignored or discounted by the people who want to beat her so badly they can’t think straight:
Hillary has shown she can handle Bernie Sanders, despite his plucky persona, raw grassroots appeal, and authentic authenticity.The Vegas debate and Clinton’s improved poll standing has given her and her team a revived notion that Sanders will end up a nuisance rather than a real threat. She has confidence she can face him down in the three debates remaining before Iowa. Without Biden in the race, Clinton is not going to have to play three-dimensional chess and can focus her energies on Sanders alone.
Bernie has shown he doesn’t quite understand how to play big moments in the big leagues.First the debate and now the Jefferson-Jackson dinner—Sanders prepared more for both evenings than the organic Vermonter normally would for any political event, but even his advisers concede that neither occasion represented the kind of performance that Sanders will eventually have to present if he is going to stop the prohibitive front-runner. He was very strong Saturday night but aides say they are still having trouble fully convincing him that not all campaign events are created equal.
Hillary is getting better at managing (and shaking off) the personal pang of her likability deficit.At the J-J dinner, in her recent television interviews, and in her Benghazi testimony, she is showing more of her real self (even the all-too-human tetchy, the airily dismissive, the lordly—without knee-jerk defensiveness or wide-eyed guile), and not getting tied in knots over how she is coming off. While this version of Hillary is still nails-on-a-chalkboard to her conservative critics, it is a huge improvement over the recent past and probably enough to win under the right circumstances.
Biden’s withdrawal means Clinton will lock up even more commitments from the Democratic establishment, giving her even more super delegates and making it easier to bounce back if Sanders wins Iowa, New Hampshire, or both. I reported in August that Clinton’s camp already had in hand private commitments from enough of the elected and party officials who are automatic delegates to the national convention next summer (so-called super delegates) that she was one fifth of her way to the nomination. That number has increased significantly in recent weeks and will go up now that Biden has passed on the race. This allows Team Clinton to make a robust argument about her inevitability and gives it a squadron of surrogates from the left, center, and right of the Democratic Party to wound Sanders, buck her up if she stumbles, and, eventually, argue that the senator should get out of the competition if she wins early.
Hillary has massive support from labor unions.The party’s most important constituency group in terms of ground troops and campaign resources is now moving decisively towards Clinton, also giving her more working-class cred and undermining one of Sanders’ strongest rhetorical plays—that she is out of touch with the economic grassroots. And long-invested unions will provide her important foot soldiers in the general election battlegrounds, as they have since time began for Democratic presidential nominees.
Hillary could be the de facto Democratic nominee by Feb. 8. Her team privately believes that, given the way expectations have been set up, even narrow wins in the two first-voting contests would not be discounted. Clinton has robust field operations in both states and could diligently grind her way to victories. Even Sanders’ top aides acknowledge that, barring other factors, it could be game, set, match if Hillary starts the voting year with twin wins, giving Brooklyn ample incentive to go all in there and try to put it away early.
Hillary’s husband now seems fired up and ready to go.Although a little rusty over the weekend in Iowa in his 2015 campaign trail debut, accounts from aides to both Clintons suggest the former president has learned lessons from his performance eight years ago, when he arguably hurt his wife’s chances as much as he helped her. He has been kept in the loop on the campaign’s thinking, receives polling information on a regular basis, and has participated in some strategy discussions with the team. The campaign seems happy with him, and he seems happy with the campaign, and that is a big change from 2008. Both campaign chairman John Podesta and campaign manager Robby Mook have good and confident relationships with the FPOTUS, who seems less ambivalent than last time about becoming the First Lad.
Hillary’s campaign is much less tense and fractious than was the 2008 team. There are fraught moments in Brooklyn, as in any campaign, and Clinton’s donors can get restive awfully quick, but this year’s model is one of relative peace and tranquility. Zen masters Podesta, Mook, and communications chief Jennifer Palmieri set the “been there, done that, seen that, dealt with that” sensibility.
Hillary’s team at last is convincing rich Democrats to come around to the super-PAC game.Clinton loyalist Guy Cecil is now topping Priorities USA and he has brought in a new cast of folks to supplement holdovers such as Paul Begala, Jim Messina, and Harold Ickes, all of whom have experience rubbing shoulders with the mega-wealthy and prying seven-figure checks out of their hands. Cecil knows how to leverage hot buttons like the Koch brothers and the threat of more conservative Supreme Court justices and unified GOP control of Washington to maintain momentum and encourage the participation of those previously reluctant to muck about in the big money world that many liberals despise and disdain.
Hillary has a first-class opposition research team that is saving nuggets to use once Republicans pick their nominee.Oppo veteran Christina Reynolds heads an operation that can afford to play a long game, teasing out incremental research in conjunction with allies such as the Democratic National Committee but knowing full well that holding back powerful tidbits until the late spring or summer, when the eventual Republican nominee will be most vulnerable, is supremely smart. The research operations of the Republican presidential campaigns, on the other hand, are currently focused on each other (although the independent group America Rising is hoping to make up the gap).
The Republican nominee is more likely to emerge bloodied, broke, and behind. A nominating calendar and delegate rules designed to avoid the kind of extended intra-party fight that crippled Mitt Romney’s general election effort will almost certainly be no match for a fifteen candidate field, a number of whom can make a decent argument that they’ll win the prize. The ferociousness and deep pockets of gladiators Donald Trump and Ted Cruz and the possibility that the party establishment will end up intervening with tens of millions of dollars in negative TV spots means a long, gory slog that might not find resolution until after the national convention in Cleveland in mid-July. (Of course, if Trump is ultimately the nomination victor, then “broke” should not be a factor.)
As the nominee, Hillary will effectively control the DNC and will exercise free rein over the convention.Even with Sanders a remaining foe, Hillaryland is coordinating fundraising with the national and state parties, strategizing about installing allies at the party headquarters in DC, and gaming out what the Philly convention will look like. If Clinton is the standard bearer, make no mistake: Brooklyn will convert the DNC into its wholly owned subsidiary and will take over every jot and tittle of convention planning and execution. This type of control typically leads to less friction and a smoother running enterprise, including on-message convention speakers.
Republicans are erroneously convinced they can beat Clinton solely with talk of Benghazi, e-mails, and other controversies that have nothing to do with the economy and the real lives of real people.Nowhere does the Fox News-Rush Limbaugh echo chamber more hurt Republican chances of beating Clinton than in the politics of scandal and controversy. To paraphrase the famous line attributed to Pauline Kael: everyone who conservatives know think the Clintons should be in prison. The problem is that swing voters don’t share that view in sufficient numbers to actually warrant banking a victory on placing those arguments front and center. Kevin McCarthy’s acknowledgement that the Benghazi committee was set up to damage Clinton politically has not just polluted the select committee’s efforts; it also means that one of the most effectively tried-and-true Team Clinton defenses (that any controversy that swirls around her is a ginned up political attack because Republicans don’t want to talk about real issues) has got legs straight through next November.
Hillary is ready for the debates.She won’t have as many debates in which to hone her skills as the eventual GOP nominee, but she has many other edges, including her 2008 experience; the fact that going forward she will face only one or two opponents—rather than nine or so—on the debate stage (much closer to the dynamics in a general election); her professionalized and experienced debate prep team (many of whom worked the same gig for Barack Obama); and her own fearsome, dogged, and scrupulous preparation.
Hillary’s pollster knows how to find issues that test 80-20 or 70-30, and the candidate knows how to translate them on the stump.While Republican presidential candidates thrash around competing to see who can be the most anti-immigrant, pro-tax cuts for the wealthy, anti-abortion and gay marriage, and pro-climate change-denying, Clinton’s pollster and strategist Joel Benenson is busy finding topics she can talk about in a general election that garner overwhelming support from the public across the political spectrum and will put the GOP nominee on the defensive. Nothing makes a Clinton running for president more confident and effective than having mainstream boldface issues to use as a cudgel.
Obama’s approval rating is holding at a level that would make Clinton’s path much easier. Yes, the economy is not going gangbusters. Yes, ObamaCare is not universally popular (to say the least). Yes, the world is filled with dangerous hot spots and looming, chilling threats. But barring some major change in his fortune, Obama’s current approval rating of around 46% is likely to sustain through Election Day, a high enough figure, history suggests, to keep him from being a drag on his party’s nominee and chosen successor.
Hillary’s team is already thinking about general election targeting.One of the pages Brooklyn has taken from the Obama playbook is to start thinking about the general election early. That includes using contests in caucuses and primaries states that will be battlegrounds next November to build up a team, target data, establish media relationships, and keep it all humming after the nominating contest and throughout the duration. It also includes living by the dictum “what’s mine is mine and what’s yours let’s negotiate over,” hawkishly protecting the nearly 250 electoral votes and voting groups Democrats have won consistently over the last several cycles while looking to expand the targeting efforts demographically and geographically.
Hillary would inherit a considerable demographic edge in a general election. Republicans have done next to nothing, and clearly much more harm than good since Mitt Romney lost in 2012, to make in-roads with the so-called coalition of the ascendant. Clinton would almost certainly have an overwhelming edge with African-Americans, Asians, Hispanics, LGBT voters, young people, and single women, and the future contours of the Republican nomination fight are not likely to make the party’s challenge with these groups any easier.
Hillary would also inherit a considerable Electoral College edge in a general election.The Democrats don’t have quite the Electoral College “lock” that the GOP had in the ‘70s and ‘80s but it is pretty close. A strong Republican nominee could make Clinton play defense in states such as Florida, Ohio, Iowa, and Colorado. But the safe Democrat states would give her a huge leg up, and demographic changes mean Clinton could be playing offense in places such as Georgia and Arizona under the right circumstances. Political pros in both parties believe some of the leading Republican contenders would give Clinton a chance to surpass her husband’s 1992 electoral vote total of 370 if they are her eventual competition.
Clinton advisers are well aware of these many advantages. They are staying largely mum for now, preferring to let the candidate’s recent positive media coverage speak for itself and not relinquish any tactical advantage of surprise.
They also know the FBI probe into her e-mails, Bill Clinton’s portfolio, or something new and super controversial could upend her standing at any time. And the raucous Republican nomination process could yet yield a strong general election opponent for her. This list is not meant to gloss over the considerable challenges Clinton is sure to face even if everything goes as planned on her side—not to mention if things start to go south. And a few savvy Republican operatives are ringing the alarm bell in private strategy sessions, urging the party to try to address as many of these deficits as soon as possible.
But don’t be surprised if reports soon surface mirroring what happened almost exactly eight years ago, when Clinton asked top advisers to secretly begin planning her vice presidential selection process—and her presidential transition. Republicans would surely see those steps as wildly premature, but given all of Clinton’s advantages now, she may consider it simply prudent planning.
Story 1: Playing The Blame Game — Avoiding Responsibility and Accountability — Government Failure! — 9/11: Trump Blames Bush — Clinton Blames Republicans ! — Videos
Hillary Clinton and the “Dark Forces” in Benghazi
Kenneth Timmerman, author of Dark forces: The Truth About What Happened in Benghazi, looks at Hillary Clinton’s next scheduled appearance before the Benghazi special committee and the Iranian nuclear deal. He cites evidence that the Iranians were behind the attack in Benghazi that killed four Americans on September 11, 2012. In addition, Timmerman says Iran was involved in the September 11, 2001, attacks. Timmerman also discusses Russian backing for Iran and the Russian role in attacking the opponents of Assad in Syria. Timmerman also looks at: Will Russia attack the Kurds? And who are the Kurds? Is Obama a Muslim? Will Israel strike Iran?
Donald Trump blames George W. Bush for 9/11
Did Donald Trump blame Bush for 9/11?
Jake Tapper calls out Jeb Bush for saying his brother is blameless for 9/11
9-11 WTC Attacks Original Sound
Who Was Really Behind the 9/11 Attacks?
George Bush Takes Questions After Meeting With 9/11 Commission – 4/29/2004
Richard Clarke, Former Counterterrorism Chief, Apologizes for 9/11
Why Government Failure Occurs: Richard Clarke on National Security Disasters (2008)
Your Government Failed You: Richard Clarke at the September 11 Commission on Counterterrorism (2004)
Richard Alan Clarke (born October 27, 1950) is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States.
Clarke worked for the State Department during the presidency of Ronald Reagan. In 1992, President George H.W. Bush appointed him to chair the Counter-terrorism Security Group and to a seat on the United States National Security Council. President Bill Clinton retained Clarke and in 1998 promoted him to be the National Coordinator for Security, Infrastructure Protection, and Counter-terrorism, the chief counter-terrorism adviser on the National Security Council. Under President George W. Bush, Clarke initially continued in the same position, but the position was no longer given cabinet-level access. He later became the Special Advisor to the President on cybersecurity. Clarke left the Bush administration in 2003.
Clarke came to widespread public attention for his role as counter-terrorism czar in the Clinton and Bush administrations in March 2004, when he appeared on the 60 Minutes television news magazine, released his memoir about his service in government, Against All Enemies, and testified before the 9/11 Commission. In all three instances, Clarke was sharply critical of the Bush administration’s attitude toward counter-terrorism before the 9/11 terrorist attacks, and of the decision to go to war with Iraq.
On March 24, 2004, Clarke testified at the public 9/11 Commission hearings. At the outset of his testimony Clarke offered an apology to the families of 9/11 victims and an acknowledgment that the government had failed: “I also welcome the hearings because it is finally a forum where I can apologize to the loved ones of the victims of 9/11…To the loved ones of the victims of 9/11, to them who are here in this room, to those who are watching on television, your government failed you. Those entrusted with protecting you failed you. And I failed you. We tried hard, but that doesn’t matter because we failed. And for that failure, I would ask, once all the facts are out, for your understanding and for your forgiveness.”
Many of the events Clarke recounted during the hearings were also published in his memoir. Clarke charged that before and during the 9/11 crisis, many in the Administration were distracted from efforts against Osama bin Laden’s Al-Qaeda organization by a pre-occupation with Iraq and Saddam Hussein. Clarke had written that on September 12, 2001, President Bush pulled him and a couple of aides aside and “testily” asked him to try to find evidence that Saddam was connected to the terrorist attacks. In response he wrote a report stating there was no evidence of Iraqi involvement and got it signed by all relevant agencies, including the Federal Bureau of Investigation and the CIA. The paper was quickly returned by a deputy with a note saying “Please update and resubmit.” After initially denying that such a meeting between the President and Clarke took place, the White House later reversed its denial when others present backed Clarke’s version of the events.
Clarke is currently Chairman of Good Harbor Consulting and Good Harbour International, two strategic planning and corporate risk management firms; an on-air consultant for ABC News, and a contributor to the Good Harbor Report, an online community discussing homeland security, defense, and politics. He is an adjunct lecturer at the Harvard Kennedy School and a faculty affiliate of its Belfer Center for Science and International Affairs. He has also become an author of fiction, publishing his first novel, The Scorpion’s Gate, in 2005, and a second, Breakpoint, in 2007.
Clarke wrote an op-ed for the Washington Post on May 31, 2009 harshly critical of other Bush administration officials, entitled “The Trauma of 9/11 Is No Excuse”. Clarke wrote that he had little sympathy for his fellow officials who seemed to want to use the excuse of being traumatized, and caught unaware by Al-Qaeda’s attacks on the USA, because their being caught unaware was due to their ignoring clear reports a major attack on U.S. soil was imminent. Clarke particularly singled out former Vice President Dick Cheney and former Secretary of State, Condoleezza Rice.
911 Press for Truth
Intelligence Stove Piping Is System Failure
Fannie Mae, Jamie Gorelick and The 911 Commission
911 Commission Co-Chair Explains Need for New Investigation
Jamie Gorelick for FBI director? Are you kidding me?
Inside Libya’s Militias
Libya War: What They Don’t Want You to Know
How Will History Judge U.S., Coalition Intervention in Libya?
Libyan No Fly Zone Necessary But Intervention Has Imperialist Objectives
Debate The Libyan Intervention: Humanitarian or an Aggression?
Democracy and Hypocrisy in Libya
Backlash? Wave of terror feared in Europe over Libya intervention
Semantics – The Rise and Fall of Muammar al Gaddafi
Why Did America and the West Intervene in Libya?
Former State Department officer Ethan Chorin explains, the United States and the West provided Muammar Qaddafi and his forces with many of the weapons they used to fight the rebels during the 2011 Libyan revolution. Therefore, the U.S. and NATO had a moral responsibility to help the anti-Qaddafi forces
US special forces already on ground in Libya – FoxNews 110324
Obama authorized CIA covert operation in Libya – FoxNews 110331
The Truth About The War On Libya Government Lies Revealed A Goverment Conspiracy 2011
SYRIA Retired General Suspects A US Covert Operation For Running Libya Arms To Syria
LIBYA TIMELINE SHOWING LIE AFTER LIE BY OBAMA ADMINISTRATION – LYBYAGATE COVERUP
Murder Of Chris Stevens In Benghazi Attack Ordered By American Military Leadership, Possibly Obama
Know The TRUTH ~ Step By Step ~ Bret Baier’s ~ ‘Death and Deceit in Benghazi’
FLASHBACK] Hillary Clinton blames youtube video for Benghazi
Obama and Hillary Blame Youtube Video for Benghazi Terrorist Attack as Coffins Arrive
Rand Paul Destroys Hillary Clinton Over Benghazi-Gate During Capitol Hill Press Conference
Benghazi Attack Cover Up! Obama Armed Al Qaeda?
Former CBS reporter Sharyl Attkisson: Emails Reveal White House Hid Truths About Benghazi Attack
Sharyl Attkisson: White House Hiding Photos of Obama on Night of Benghazi Attack
Benghazi Hearing Trey Gowdy — “I don’t give a damn whose careers are ruined
Hillary Ad Hammers Republicans On Bogus Benghazi Investigation
Why Is Hillary Clinton Blamed For The Benghazi Attack?
For The Record-Zero Footprint
Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood
Trump’s take on birthright citizenships
Mark Levin: No Birthright Citizenship – Hannity 8/19/2015
Mark Levin: The Citizenship Clause of 14th Amendment, birthright citizenship & illegal immigration
Donald Trump’s Tense Presser, Illegal Immigration, Birthright Citizenship Debate- Mark Levin Hannity
Jeb Bush dismisses Donald Trump’s immigration plans
Jamie Gorelick’s wall
By – The Washington Times – Thursday, April 15, 2004
The disclosure that Jamie Gorelick, a member of the September 11 commission, was personally responsible for instituting a key obstacle to cooperation between law enforcement and intelligence operations before the terrorist attacks raises disturbing questions about the integrity of the commission itself. Ms. Gorelick should not be cross-examining witnesses; instead, she should be required to testify about her own behavior under oath. Specifically, commission members need to ask her about a 1995 directive she wrote that made it more difficult for the FBI to locate two of the September 11 hijackers who had already entered the country by the summer of 2001.
On Tuesday, Attorney General John Ashcroft declassified a four-page directive sent by Ms. Gorelick (the No. 2 official in the Clinton Justice Department) on March 4, 1995, to FBI Director Louis Freeh and Mary Jo White, the New York-based U.S. attorney investigating the 1993 World Trade Center bombing. In the memo, Ms. Gorelick ordered Mr. Freeh and Ms. White to follow information-sharing procedures that “go beyond what is legally required,” in order to avoid “any risk of creating an unwarranted appearance” that the Justice Department was using Foreign Intelligence Surveillance Act (FISA) warrants, instead of ordinary criminal investigative procedures, in an effort to undermine the civil liberties of terrorism suspects.
At issue was the oft-noted wall of separation that prevented counterterrorism agents and federal prosecutors from communicating with one another prior to September 11. Information collected under special FISA warrants, which do not require a probable cause, was generally not to be shared with personnel responsible for enforcing federal criminal laws — where probable cause must be demonstrated for a warrant to be issued. As lawyers David Rivkin and Lee Casey noted on our Op-Ed page yesterday, the practical effect of the wall was that counterintelligence information was generally kept away from law enforcement personnel who were investigating al Qaeda activities. But Ms. Gorelick’s memo clearly indicated that the Clinton administration had decided as a matter of policy to go even beyond the law’s already stringent requirements in order to further choke off information sharing.
As Mr. Ashcroft noted during his testimony before the September 11 commission, all of this had a devastating effect into the investigation of al Qaeda operations in this country in the summer of 2001. For example, in late August, when the CIA told the FBI that Khalid Almidhar and Nawaf Alhazmi had entered the country, FBI investigators refused to permit criminal investigators with considerable knowledge about the most recent al Qaeda attack to join the manhunt. Also, a criminal search warrant to examine the computer of Zacarias Moussaoui, whose interest in flying aircraft had attracted attention, was rejected because FBI officials were afraid of breaching the wall.
Ms. Gorelick has been among the most partisan and aggressive Democratic panel members in questioning the anti-terror efforts of the Bush administration. The nation deserves a full accounting from Ms. Gorelick of why the Clinton administration felt it necessary to go the extra mile in order to hamper the capability of law enforcement and intelligence agents to talk to one another. If Ms. Gorelick fails to provide this, her actions would bring into serious doubt the credibility of the commission.
Ken Lay and Jack Abramoff must be green with envy over the all the mischief that has been accomplished by Jamie Gorelick, with scarcely any demonization in the press.
Imagine playing a central role in the biggest national defense disaster in 50 years. Imagine playing a central role in one of the biggest economic disasters in your country’s history. Imagine doing both as an un-elected official. Imagine getting filthy rich in the process, and even being allowed to sit self-righteously on a commission appointed to get to the bottom of the first disaster, which of course did not get to the bottom of that disaster or anything else for that matter.
Imagine ending, ruining or at least causing signficant quality deterioration in the lives of millions of people, most of whom will never know your name. Imagine counting your millions of dollars while people who tried to stop you from causing all this mayhem were getting blamed for most of the ills you actually contributed to.
Well, as un-imagineable as this is, there is one American who doesn’t have to imagine it. One Jamie Gorelick is this American. And without pretending that she caused the loss of countless thousands of lives and countless billions of dollars of wealth by herself, she certainly did push some of the early domino’s in catastrophic chain events that are a major factors in life in America today.
This is not a bad millineums’s work, when you think about it. Gorelick, an appointee of Bill Clinton, is the one who constructed the wall of separation that kept the CIA and the FBI from comparing notes and therefore invading the privacy of nice young men like, say, Muhammed Atta and Zacarius Moussaoui. While countless problems were uncovered in our intelligence operations in the wake of 9-11, no single factor comes close to in importance to Jamie Gorelick’s wall.
In fact, it was Gorelick’s wall, perhaps more than any other single factor, that induces some people to blame Clinton himself for 9-11 since he appointed her and she acted consistent with his philosophy of “crime fighting.” She put the wall into place as Deputy Attorney General in 1995.
And for good measure, she was appointed by Tom Daschle to serve on the “non partisan” 9-11 Commission. And we thought the fox in the henhouse was simply a metaphor. Of course, in a splendid example of “reaching across the aisle,” feckless Republican Slade Gorton of Washington did all he could to exonerate Gorelick in the commission. Thanks, Slade. God forbid the nation actually knows the truth.
But for Ms. Gorelick, one earth shaking catastrophe is just not enough. You might think that she caused enough carnage to us infidels on 9-11 as to qualify her for the 72 virgins upon her death. (this would also keep her consistent with several of Clinton’s philosophies).
Alas, that’s only part of her resume. Her fingerprints are all over the Fannie Mae-Freddie Mac mess, which is to say the mess that is central in the entire mortgage-housing crisis. Without so much as one scintilla of real estate or finance experience, she was appointed as Vice Chairman of Fannie Mae in 1997 and served in that role through 2003, which is when most of the systemic cancers that came home to roost today happened. She was instrumental in covering up problems with Fannie Mae while employed there and took multiple millions in bonuses as she helped construct this house of cards.
One example of falsified financial transactions that helped the company meet earnings targets for 1998, a “manipulation” that triggered multimillion-dollar bonuses for top executives. On March 25, 2002, Business Week Gorelick is quoted as saying, “We believe we are managed safely. Fannie Mae is among the handful of top-quality institutions.” One year later, Government Regulators “accused Fannie Mae of improper accounting to the tune of $9 billion in unrecorded losses”
As we know, the financial damage done by the housing related problems in this country are still incalculable. Ms. Gorelick’s evil tab is still growing.
But it doesn’t stop there. She managed to be on the wrong side of the Duke LaCrosse case, working for Duke University to protect that school from it’s damaging knee jerk reactions to the spectacularly unbelievable charges filed by a stripper. (excuse me, exotic dancer). So, even on a smaller scale, she continues to make money while working to ruin the lives of innocent Americans in defense of liberal dogma. At the Department of Defense, when she served as legal counsel there in 1993, she drafted the “Don’t ask /don’t tell” policy.
From what can be gleaned, it all comes from being well connected. She was educated (is that what they call it?) at Harvard undergrad and Harvard Law. From there, she kept getting appointed to positions above her experience level where she could flex her liberal muscles, add a resume item, and move upward. http://www.americanthinker.com/2008/09/mistress_of_disaster_jamie_gor.html#ixzz3p3M8KxQf
Follow us: @AmericanThinker on Twitter | AmericanThinker on Facebook
Story 1: Biden’s Big Lie: Trump Selling A “Sick Message” About Immigrants (aka Illegal Aliens) in America Based on Xenophobia — The Truth: Obama and Biden Betray Oath of Office By Not Enforcing Immigration Law — The American People Want The Immigration Laws Enforced — Trump on Immigration Plan: ‘Start by Building a Big, Beautiful, Powerful Wall’ — Live With It Liars! — Trump Fires Back From USS Iowa With All Three Guns Firing — Veteran Voter Victory For Trump! — Video
Biden thumps Trump for selling ‘sick message’
Biden Speaks Out on Trump’s ‘Xenophobia’: ‘This Will Pass’
Vice President Joe Biden spoke at a Hispanic Heritage Month reception today and took a moment to go after the “xenophobia” being pushed by Donald Trump.
He said with sincerity that people shouldn’t “be down right now” with all the GOP rhetoric, despite “one guy absolutely denigrating an entire group of people, appealing to the baser side of human nature, working on this notion of xenophobia.”
The veep assured the audience that “this will pass” and that the “sick message” they’re hearing-–presumably referring to politically divisive rhetoric––is a problem on both sides.
Biden still hasn’t made up his mind as to whether he’s running or not in 2016, recently saying it’s a tough decision, but his fiery rhetoric recently has gotten people talking.
FNN: Donald Trump speaks on the USS Iowa
Donald Trump spoke to supporters and veterans on September 15, 2015. Aboard the USS Iowa, Trump stated that, “illegal immigrants get better health care than our veterans. That is going to change.”
Karl Rove Destroys Joe Biden
Joe Biden Prevaricates about Law School Class Standing
JOE BIDEN — PLAGIARIST
Joe Biden Says Dumb Things
“The Best of Joe Biden’s Gaffe’s; A Continuing Series…”
Watch Joe Biden Rub, Touch And Kiss His Way To Beck-Like Creepiness
Joe Biden Kisses Woman on Lips at Rally
Vote For A Genuine Scumbag: Joe Biden For Prez
Trump on Immigration Plan: ‘Start by Building a Big, Beautiful, Powerful Wall’
• Mark Levin • Anchor Babies Are Not U.S. Citizens • Hannity • 8/19/15 •
Constitutional scholar Mark Levin disabuses the common notion that children of illegal immigrants are conferred U.S. citizenship by the 14th Amendment of the U.S. constitution. Levin meticulously reviews the history and language of the amendment to demonstrate that only an Act of Congress can grant citizenship to “anchor babies”.
Mark Levin: The Citizenship Clause of 14th Amendment, birthright citizenship & illegal immigration
Joe Biden hammers Trump for ‘sick message’ exploiting xenophobia
Vice President Joe Biden on Tuesday said Republican presidential contender Donald Trump was selling a “sick message” about immigrants in America based on xenophobia.
Biden, considering a run for the 2016 Democratic presidential nomination, told a small group of Latinos gathered at his home that they should not lose heart watching Trump climb in the polls while taking a hard line on immigration.
Trump, leading the pack of Republicans seeking their party’s 2016 nomination, has accused Mexico of sending criminals and rapists to the United States. He has promised to build a wall on the U.S.-Mexico border to keep out illegal immigrants and deport the 11 million illegal immigrants already in the United States.
Biden told his guests that he had seen Trump talking on television just before speaking to the poolside cocktail party, and decided to cast aside remarks his staff had prepared recognizing Hispanic Heritage Month.
“There’s one guy absolutely denigrating an entire group of people, appealing to the baser side of human nature, working on this notion of xenophobia in a way that hasn’t occurred in a long time,” Biden told the group of about 75 people.
“This isn’t about Democrat – Republican. It’s about a sick message. This message has been tried on America many times before. We always, always, always, always overcome,” he said.
Biden, who is Catholic, urged the group not to feel “down” about Trump’s popularity, noting that Pope Francis was about to visit the United States and likely would have a very different message about welcoming immigrants.
“The American people are with us. I know it doesn’t feel that way. But I’m telling you, the American people agree with us,” Biden said.
Biden, whose son Beau died recently, has said he is not sure he has the emotional capacity to make what would be his third run for president.
His poll numbers have climbed as he explores the possibility and as the Democratic frontrunner, Hillary Clinton, grapples with a controversy over her use of a private email server while secretary of state.
At the end of his remarks, a few people in the crowd shouted, “Run Joe, run!”
Biden, making the sign of the cross as he hurried away from the podium, said “Oh no, no, no, no, no” as if to stave off the topic.
Consequences of misinterpreting the 14thAmendment to the United States Constitution
Births to illegal alien mothers are adding more to the U.S. population each year than did immigration from all sources in an average year prior to 1965.
The Urban Institute estimates the cost of educating illegal alienchildren in the nation’s seven states with the highest concentration of illegal aliens was $3.1 billion in 1993 (which, with the growth of their population to 1.3 million, would be more like $5 billion in 2000). This estimate does not take into account the additional costs of bilingual education or other special educational needs.1
FAIR estimates there are currently between 287,000 and 363,000 children born to illegal aliens each year. This figure is based on the crude birth rate of the total foreign-born population (33 births per 1000) and official estimates of the size of the illegal alien population – between 8.7 and 11 million. It should be noted that the Bear Stearns investment firm and others have concluded that the actual number of illegal aliens in the United States could be as high as 20 million.2,3 Using this higher number would roughly double FAIR’s estimate to approximately 574,000 to 726,000 children born to illegal aliens each year!
As of 2001, the cost of having a baby in the U.S. ranged from $6,000 to $8,000 for a normal delivery and $10,000 to $12,000 for a cesarean birth (to as much as $14,000 in certain parts of the country).10 Assuming that an average birth in the year 2007 now costs $8,000, the total cost for 363,000 anchor babies would be approximately $3 billion. Assuming the more realistic number of 726,000 anchor babies, the total cost would be nearly $6 billion. American taxpayers pay a substantial part of this cost.
In 1994, California paid for 74,987 deliveries to illegal alien mothers, at a total cost of $215.2 million (an average of $2,842 per delivery). Illegal alien mothers accounted for 36 percent of all Medi-Cal funded births in California that year.1 A survey conducted under the auspices of the University of California, found that of new Hispanic mothers in California border hospitals, 15 percent had crossed the border specifically to give birth. Two-thirds of births in Los Angeles County hospitals are to illegal alien mothers who are in the U.S. in violation of our existing immigration laws.
Illegal aliens are not eligible for welfare benefits, but their citizen children qualify for Aid to Families with Dependent Children (AFDC) and other benefits granted to US citizens. Based on data collected in California for AFDC’s “children only” cases, the California Department of Social Services estimated that in fiscal 1994-1995, 193,800 children of illegal aliens received welfare, costing $553 million.
By not addressing this abuse of the Fourteenth Amendment and enforcing immigration law, the funds that state and local governments must provide to anchor babies amounts to a virtual tax on U.S. citizens to subsidize illegal aliens.
Rule of Law
By deliberately not addressing this loophole, Congress in effect rewards law-breakers and punishes those who have chosen to follow the rules and immigrate legally.
The 14th Amendment stipulates that Congress has the power to enforce its provisions by enactment of legislation, and the power to enforce a law is necessarily accompanied by the authority to interpret that law. Therefore, an act of Congress stating its interpretation of the 14th Amendment, as not to include the offspring of illegal aliens, would fall within Congress’s prerogative.
One Man, One Vote
Congressional district reapportionment weighted by the presence of illegal alien noncitizens is notably unfair to American citizens (both natural-born and naturalized), and clearly violates the principle of “one man, one vote”.
As the number of US House seats is fixed at 435, reapportionment means that if a given state gains a House district, another state must lose one. If non-citizens (illegal aliens) are counted in the decennial Census upon which districts are apportioned, then states with larger illegal alien populations are likely to end up with more districts and therefore more representation in the House. This effectively dilutes the votes citizens in states having relatively low proportions of illegal aliens.
United States Sovereignty
The Oath of Allegiance for Naturalized Citizens
“I hereby declare, on oath, that I absolutely and entirely renounce and abjure all allegiance and fidelity to any foreign prince, potentate, state, or sovereignty of whom or which I have heretofore been a subject or citizen; that I will support and defend the Constitution and laws of the United States of America against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; that I will bear arms on behalf of the United States when required by the law; that I will perform noncombatant service in the Armed Forces of the United States when required by the law; that I will perform work of national importance under civilian direction when required by the law; and that I take this obligation freely without any mental reservation or purpose of evasion; so help me God.”8
The Mexican government recently provided dual nationality to its citizens who naturalize in the United States. No longer looked upon by their countrymen with contempt, those who emigrate (and sneak in) to the United States are seen by Mexico as advocates for its presumed territorial claims to the American Southwest. Mass immigration, while acting as an overpopulation safety valve for Mexico, simultaneously strengthens Mexico’s political presence inside the United States. Mexican dual nationality serves to retain the allegiance of its citizens who become United States citizens, and to discourage assimilation – in spite of the oath of allegiance they take to America.
Unconstrained illegal immigration and disregard for the rule of law are not conducive toward maintaining US sovereignty. Special corporate and political interests want all the cheap foreign labor they can get. Misinterpreting the 14th Amendment and granting automatic birthright citizenship to children of illegal aliens is but one aspect of the dismantling of America.
In April, 2005, President Bush signed the Security Prosperity Partnership with Canada and Mexico, with the stated objective of ensuring the free movement of goods and people across the US border. This treaty, never ratified by Congress, is a significant step towards the North American Union where a sovereign United States will be merely a memory.
Population and environmental consequences
United States population is at roughly 300 million and is projected to double within the lifetimes of children born today.4 Approximately two-thirds of this population growth will be due to mass immigration – that is, immigrants, illegal aliens, and their descendents.5
The United States is past the point of environmental sustainability. Scientists have noted that a sustainable population at today’s consumption levels would be approximately 100 to 150 million people.6 A good and readable overview of the population-environment connection can be found at SUSPS. A visual presentation of the damage illegal immigration does to the environment near our southern border can be seen atDesertInvasion.US.
The United Kingdom, for example, formerly allowed Birthright citizenship. In 1981, because of immigration pressures, they restricted it to now require that one parent be a legal resident. In France birthright citizenship has been changed — now children between the ages of 16 and 22 of illegal alien parents must actively seek French citizenship.
It should be noted that on June 11, 2004 Irish voters voted in a national referendum to end automatic citizenship for any child born in Ireland regardless of the parents’ residence status. Ireland was the last member of the European Union to allow pregnant foreigners to gain residence and welfare benefits as a result of birth in the country. (Seattle Post Intelligencer, June 13, 2004.)
Millions of Americans
Millions of Americans have served in defense of the United States of America. Many have died to preserve the freedoms that we take for granted – freedoms granted to United States citizens by the US Constitution. Granting birthright citizenship to the children of illegal aliens whose first act in coming here is to break our laws, cheapens beyond recognition the meaning of our Constitution and the value of the lives lost fighting to preserve it.
Story 1: Donald Trump is a Libertarian-Leaning Conservative and Ted Cruz is Hard Core Conservative — Trump/Cruz Ticket? — Conservatives Intellectuals Need To Focus on Results Not Words — The Republican Party Is Not A Conservative Party — Conservatives and Libertarians Voters Have Been Abandoning Both The Democratic and Republican Parties Who Are Bought and Paid For By The Donor Base — The Tyranny of Two Party System — Corrupt Big Government Parties — The Decline and Fall of American Republic — Remembering 9/11 — Videos
History Documentary – World Trade Center attacks, Rise and Fall of the twin towers
911 Jumpers 9/11 in 18 min Plane Crashes Top World Trade Center Towers September 11 Terror Fact Vid