Story 1: Will A Greece Default On Debt Trigger A World Recession? — Bubbles Bursting? — Greek Odious Debt Default On The Brink — Jump! — Greece Defaults! — Videos
Greece misses 1.5 billion euro IMF payment 01:12
Greece officially defaults 02:28
Greece defaults on $1.7 billion payment
Laura Branigan – Self Control
Donna Summer Last Dance
The History of Odious Debt
Not Much Difference Between U.S. and Greece
How Will Greece’s Default to the IMF Impact Europe?
Analysis: Who is to blame for Greece’s debt crisis?
Nightly Business Report — June 29, 2015
Greece’s Economic Disaster May Spread To Other Countries – Episode 704
SR381 – Why Greece Will Default
Keiser Report: Greece! Start Fresh (E777)
Keiser Report: IMF failed Greece long before bailout (E776)
Why Does Greece Have So Much Debt?
Greece Makes The First Move, Debt Is Illegal And Odious – Episode 694
Should Greece Answer The Debt Crisis By Pulling A Trump?
Greece and the Euro Breakup; Why the US Dollar Is Facing an Even Bigger Crisis
Ep. 89: Greece is a sideshow. U.S. is the Main Event.
Greek Economic Crisis: Three Things to Know
Parsons: Greece default will be ‘big time’ problem for U.S. banks
Greece on the Brink – Documentary [HD]
DONNA SUMMER – I feel love (1977) HD and HQ
Laura Branigan – Gloria 
Forever Young Laura Branigan
Greece’s bailout expires, country defaults on IMF payment
By ELENA BECATOROS and DEREK GATOPOULOS
y to fall into arrears on payments to the fund. The last country to do so was Zimbabwe in 2001.
After Greece made a last-ditch effort to extend its bailout, eurozone finance ministers decided in a teleconference late Tuesday that there was no way they could reach a deal before the deadline.
“It would be crazy to extend the program,” said Dutch Finance Minister Jeroen Dijsselbleom, who heads the eurozone finance ministers’ body known as the eurogroup. “So that cannot happen and will not happen.”
(AP) An elderly man passes a graffiti outside an old bank in Athens, Tuesday, June 30,… Full Image
“The program expires tonight,” Dijsselbleom said.The brinkmanship that has characterized Greece’s bailout negotiations with its European creditors and the IMF rose several notches over the weekend, when Prime Minister Alexis Tsipras announced he would put a deal proposal by creditors to a referendum on Sunday and urged a “No” vote.
The move increased fears the country could soon fall out of the euro currency bloc and Greeks rushed to pull money out of ATMs, leading the government to shutter its banks and impose restrictions on banking transactions on Monday for at least a week.
But in a surprise move Tuesday night, Deputy Prime Minister Yannis Dragasakis hinted that the government might be open to calling off the popular vote, saying it was a political decision.
The government decided on the referendum, he said on state television, “and it can make a decision on something else.”
(AP) A demonstrator waves a Greek flag during a rally organized by supporters of the YES… Full Image
It was unclear, however, how that would be possible legally as Parliament has already voted for it to go ahead.Greece’s international bailout expires at midnight central European time, after which the country loses access to billions of euros in funds. At the same time, Greece has said it will not be able to make a payment of 1.6 billion euros ($1.8 billion) to the IMF.
With its economy teetering on the brink, Greece suffered its second sovereign downgrade in as many days when the Fitch ratings agency lowered it further into junk status, to just one notch above the level where it considers default inevitable.
The agency said the breakdown of negotiations “has significantly increased the risk that Greece will not be able to honor its debt obligations in the coming months, including bonds held by the private sector.”
Fitch said it now considered a default on privately-held debt “probable.”
(AP) People stand in a queue to use an ATM outside a closed bank, next to a sign on the… Full Image
Hopes for an 11th-hour deal were raised when the Greek side announced it had submitted a new proposal Tuesday afternoon, and the eurozone’s 19 finance ministers held a teleconference to discuss it.But those hopes were quickly dashed.
German Chancellor Angela Merkel said she ruled out further negotiations with Greece before Sunday’s popular vote on whether to accept creditors’ demands for budget reforms.
“Before the planned referendum is carried out, we will not negotiate over anything new,” the dpa news agency quoted Merkel as saying.
Greece’s latest offer involves a proposal to tap Europe’s bailout fund — the so-called European Stability Mechanism, a pot of money set up after Greece’s rescue programs to help countries in need.
(AP) The word “NO”, referring to the upcoming referendum, is written in red paint outside… Full Image
Tsipras’ office said the proposal was “for the full coverage of (Greece’s) financing needs with the simultaneous restructuring of the debt.”Dijsselbloem said the finance ministers would “study that request as we should” and that they would hold another conference call Wednesday, as they had also received a second letter from Athens that they had not had time to read.
Dragasakis said the new letter “narrows the differences further.”
“We are making an additional effort. There are six points where this effort can be made. I don’t want to get into specifics. But it includes pensions and labor issues,” he said.
European officials and Greek opposition parties have been adamant that a “No” vote on Sunday will mean Greece will leave the euro and possibly even the EU.
(AP) Demonstrators shout slogans during a rally organized by supporters of the YES vote… Full Image
The government says this is scaremongering, and that a rejection of creditor demands will mean the country is in a better negotiating position.In Athens, more than 10,000 “Yes” vote supporters gathered outside parliament despite a thunderstorm, chanting “Europe! Europe!”
Most huddled under umbrellas, including Athens resident Sofia Matthaiou.
“I don’t know if we’ll get a deal. But we have to press them to see reason,” she said, referring to the government. “The creditors need to water down their positions, too.”
The protest came a day after thousands of government supporters advocating a “No” vote held a similar demonstration.
(AP) Demonstrators gather under the rain during a rally organized by supporters of the… Full Image
On Monday, European Commission President Jean-Claude Juncker made a new offer to Greece. Under that proposal, Tsipras would need to accept the creditors’ proposal that was on the table last weekend. He would also have to change his position on Sunday’s referendum.Commission spokesman Margaritis Schinas said the offer would also involve unspecified discussions on Athens’s massive debt load of over 300 billion euros, or around 180 percent of GDP. The Greek side has long called for debt relief, saying its mountainous debt is unsustainable.
A Greek government official said Tsipras had spoken earlier in the day with Juncker, European Central Bank chief Mario Draghi and European Parliament president Martin Schulz.
Meanwhile, missing the IMF payment will cut Greece off from new loans from the organization.
And with its bailout program expiring, Greece will lose access to more than 16 billion euros ($18 billion) in financial support it has not yet tapped, officials said. They spoke on condition of anonymity because talks about the program were still ongoing.
On the streets of Athens, long lines formed again at ATM machines as Greeks struggled with the new restrictions on banking transactions. Under credit controls imposed Monday, Greeks are now limited to ATM withdrawals of 60 euros ($67) a day and cannot send money abroad or make international payments without special permission.
The elderly have been hit particularly hard, with tens of thousands of pensions unpaid as of Tuesday afternoon. Many also found themselves completely cut off from any cash as they do not have bank cards.
The finance ministry said it would open about 1,000 bank branches across the country for three days beginning Wednesday to allow pensioners without bank cards to make withdrawals. But the limit would be set at 120 euros for the whole week.
With negotiations have broken off in dramatic fashion last week, a cacophony of voices on Syriza’s Left have vowed to prioritise domestic obligations unless creditors finally unlock the remainder of its €240bn bail-out programme. Greece only avoided going bust earlier this month after the government has asked for a Zambia-style debt bundling which will now be due on June 30.
The rhetoric is a far cry from February, when Greece’s finance minister pledged his government would “squeeze blood out of a stone” to meet its obligations to the Fund.
Although no nation has ever officially defaulted on its obligations in the post-Bretton Woods era, Greece would join an ignominious list of war-torn nations and international pariahs who have failed to pay back the Fund on time.
What happens after a default?
In choosing to bundle up four separate June repayments, Greece avoided triggering an immediate default.
But in the event of a delayed repayment, according to IMF protocol, Greece could be afforded a 30-day grace period, during which it would be urged to pay back the money as soon as possible, and before Ms Lagarde notifies her executive board of the late payment.
However, with talks have broken down in acrimonious fashion between the country and its creditors, Ms Lagarde has said she will renege on this and notify her board “immediately”.
Having spooked creditors and the markets of the possibility of a fatal breach of the sanctity of monetary union, Greece may well stump up the cash if an agreement to release the country more emergency aid is reached (that’s looking increasingly unlikely however).
But should no money be forthcoming however, the arrears process may well extend indefinitely.
Greece’s other creditor burden would also start piling up, with the government due to pay another €6.6bn to the European Central Bank in July and August.
Stopping the cash
Although the exact process is uncertain, falling into a protracted arrears procedure could have major consequences for continued financial assistance from Greece’s other creditors – the European Central Bank and European Commission.
“If Greece defaults to the IMF, then they are considered to be in default to the rest of the eurozone,” says Raoul Ruparel, head of economic research at Open Europe.
“Such a scenario would risk the European Financial Stability Facility (EFSF) cancelling all or part of its facility or even declaring the principal amount of the loan to be due immediately,” say analysts at Bank of America Merrill Lynch.
Should the EFSF take such a decisive move, it could activate a range of cross default clauses on Greek government bonds held by private investors and the ECB. These clauses state a default to one creditor institution applies to all.
The political and market damage that may ensue would be substantial. Popular sentiment in creditor nations would turn against the errant Greeks, while the position of the ECB in particular could quickly come under the spotlight.
The central bank has kept Greek banks on a tight leash, maintaining that it would only restore normal lending operations to the country once “conditions for a successful completion of the programme are in place”.
A wave of defaults may force the ECB into finally pulling the plug on the emergency assistance it has been providing in ever larger doses since February.
What would happen if Greece left the euro? In 60 seconds
Scrambling for funds
Whatever the outcome, Greece on many measures, is all but bankrupt.
In addition to the half a billion euros plus it owes the Fund this month, the Leftist government will still be paying back the IMF until 2030. In total, its repayment schedule stretches out over the next 42 years to 2057.
Greece makes new aid proposal, seeks debt restructuring
ATHENS (Reuters) – Greece has submitted to creditors a new two-year aid proposal calling for parallel debt restructuring, the office of Prime Minister Alexis Tsipras said on Tuesday, in what seemed like a last-ditch effort by Athens to resolve an impasse with lenders.
The statement came hours before Athens was set to default on a loan to the International Monetary Fund. It was unclear how creditors would respond.
“The Greek government proposed today a two-year deal with the ESM (European Stability Mechanism) to fully cover its financial needs and with parallel debt restructuring,” the government said in a statement.
“Greece remains at the negotiating table,” the statement said, adding that Athens would always seek a “viable solution to stay in the euro.”
If Greece defaults on its debt, it will be the biggest default by a country in history.
Greece is expected to miss a €1.5 billion ($1.7 billion) debt payment on Tuesday. That won’t be enough to put it in the record books yet, but it could eventually make Greece default on its entire debt load: €323 billion ($360 billion).
This isn’t the first time Greece has been on the brink. Greece already holds the record for the biggest default ever by a country from 2012 when it went into technical default and had to restructure about $138 billion of its debt. Back then, Greece was quickly bailed out by its European peers. That’s unlikely to happen now.
The Greek government pulled its negotiators from talks with European officials Friday after little progress was made on a debt payment plan and economic reforms. Greece has called for a referendum vote on July 5 on the latest proposal from Europe and the International Monetary Fund.
Greece already holds the record: Greece’s 2012 technical default shattered the previous record set by Argentina in 2001, when the South American nation defaulted on $95 billion in debt. While there are parallels between the two countries, experts say this potential Greek default could be much worse.
“Things are incredibly dire,” says Anna Gelpern, a Georgetown University professor. “For political reasons and market-confidence reasons, they need to deal with the debt…It’s not clear to me how they deal with it without defaulting on anyone.”
Greece won’t officially be in default right away. The International Monetary Fund generally gives countries a month after missing a debt payment before it declares a country in defaulted. However, the markets will most likely judge Greece to be in default by July 1.
Greece’s debt is spread out across the board. Greece owes money to the International Monetary Fund, Germany, France, Greek banks and several others.
But consider this: Whatever happens to Greece, it’s likely to be a long process. Argentina is still in default. But a key difference is that Greece has four times the debt load of Argentina — the next worst default — but Greece’s economy is only half the size of Argentina’s.
While Greece would be the biggest sovereign default, Lehman Brothers had over $600 billion in assets when it filed for bankruptcy in 2008. A Greek default would be smaller and unlikely to rattle the global financial system like Lehman, but it would have a long-lasting impact on the Greek people.
Here are some of the worst sovereign defaults since 2000.
1. Greece — $138 billion, March 2012. Despite going into a technical default, the Greek government is propped up by bailout funds from its European peers. Those bailout funds eventually lead to the current dilemma.
2. Argentina — $95 billion, November 2001. Argentina’s currency was “pegged” or equal to one U.S. dollar for years — a currency exchange that eventually proved to be completely inaccurate. Like Greece is doing this week, Argentina also clamped down on Argentines trying to take money out of the banks. It didn’t help. The country’s economy was nearly three times smaller just one year later, according to IMF data. In July 2014, Argentina went into a technical default after it missed a debt payment to its hold out creditors.
3. Jamaica — $7.9 billion, February 2010. Massive government overspending for years and rapid inflation pushed Jamaica into default five years ago. At the time, over 40% of the government’s budget went to paying debts. Its economy, which depends on tourism, suffered when the U.S. recession began in late 2008.
4. Ecuador — $3.2 billion, December 2008. Ecuador pulled a fast one on its creditors. With a debt payment looming, the Ecuardor’s government, led by President Rafael Correa, just said no to its creditors. He claimed the debt, some which was owned by American hedge funds, was “immoral.” Rich in resources, Ecuardor could have made debt payments, but intentionally chose not to.
Despite Lagarde’s initial reluctance, IMF on the hook for Greece
By By Anna Yukhananov | Reuters – 21 hours ago
By Anna Yukhananov
WASHINGTON (Reuters) – As French Finance Minister in 2010, Christine Lagarde opposed the involvement of the International Monetary Fund in Greece.
Now as the country stands on the edge of defaulting on a 1.6 billion euro ($1.8 billion) payment to the Fund, Lagarde’s tenure at the head of the IMF since 2011 will be shaped by Greece, which holds a referendum on Sunday that could pave the way to its exit from the euro.
By its own admission the Washington-based institution broke many of its rules in lending to Greece. It ended up endorsing austerity measures proposed by the European Commission and European Central Bank, its partners in the troika of Greece’s lenders, instead of leading talks as it had done with other countries such as Russia and in the Asian financial crisis.
“I think the IMF has missed the opportunity (on Greece), because it has not fully leveraged the lessons it learned from the previous crises it was involved in, due to this asymmetric relationship within the troika,” said Domenico Lombardi, a former IMF board member.
That the IMF lent to Greece at the behest of Europe, which has nominated every IMF Managing Director since the inception of the Fund in 1946, may expose the institution to greater scrutiny, especially as it has $24 billion in loans outstanding to Greece in its largest-ever program.
“When it was clear that the Greek program was underperforming, they did not push back sufficiently against the euro zone, which had at the time a misguided policy emphasis on only austerity,” said Jacob Funk Kirkegaard, a fellow at the Peterson Institute in Washington.
The involvement of the Fund in Greece and its continued support for decisions driven by eurozone governments caused a deep split in the institution.
Some IMF economists had misgivings about lending to Greece in 2010 within the constraints of the so-called “troika” of lenders, where the Fund would be the junior partner to the European Central Bank and the European Commission.
IMF board members also protested the “exceptional” size of the program, as Athens did not meet the Fund’s criteria for debt sustainability, meaning it would have trouble repaying.
Yet swayed by the fear that contagion in Athens could spread to French and German banks, the IMF agreed to participate in a joint 110-billion-euro bailout of Greece with the Europeans.
“The Europeans have a third of the voting rights (at the IMF), and they have appointed the managing director since the beginning, so essentially it is the governance that has driven the Greek program,” said Lombardi who is now with the Canada-based Center for International Governance Innovation.
Later, the Fund admitted that its projections for the Greek economy had been overly optimistic. Instead of growing after a year of austerity, Greece’s economy plunged into one of the worst recessions to ever hit a country in peacetime, with output falling 22 percent from 2008 to 2012.
While the euro zone’s insistence on drawing a direct link between euro membership and Greece’s debt sustainability and the negotiating tactics of the Greek government have exposed both to questions of credibility, the Fund stands charged as well.
“The IMF’s reputation, too, has been shaken from widespread criticism of the Greek program, including its own admission of its failures,” said Lombard Street Research economist Konstantinos Venetis.
TEMPTATION TO GO BIG
If Greece does default on all $24 billion it owes to the Fund, that will dwarf previous delinquencies from countries like Sudan, Zimbabwe and Somalia.
While the IMF was worried about contagion when it made the loans, it also had institutional incentives for wanting to bail out troubled countries, said Andrea Montanino, a former IMF board member who left the Fund in 2014 after participating in reviews of Greece’s second bailout in 2012.
“The IMF is in a preferred creditor status; the more you lend, the more you earn,” said Montanino, now with the Atlantic Council.
The IMF’s heavy involvement in large bailouts for euro zone countries, which included Ireland and Portugal, have enabled it to build up its reserve buffers in recent years. It is now aiming to store away some $28 billion by 2018.
From interest and charges on the Greek program alone, the IMF has earned some $3.9 billion since 2010, according to figures on the IMF’s website.
“I think the Greek lesson is in the future, the IMF will be much more careful,” said Montanino.
Greece is widely expected to miss a crucial payment to the International Monetary Fund (IMF) on Tuesday—hours before its bailout officially ends at midnight and the country is left with few, if any, financial lifelines.
Greek officials have already warned the country is unable to pay the 1.6 billion euros ($1.8 billion) due to the IMF by 6 p.m. ET, after reforms-for-aid talks with creditors broke down at the weekend.
Jeroen Dijsselbloem, the president of the Eurogroup, subsequently tweeted on Tuesday that there would be a teleconference to discuss an “official request” from the Greek government “received this afternoon” at 1 p.m. ET.
The Greek government on Tuesday proposed a new, two-year bailout deal with the European Stability Mechanism. This would be to “fully cover its financing needs and the simultaneous restructuring of debt,” according to a translated press release from the office of the Greek Prime Minister.
Yannis Behrakis | Reuters
A protester waves a Greek flag in front of the parliament building during a rally in Athens, Greece, June 22, 2015.
This comes at a time when Greece’s financial future is in jeopardy. The country will potentially have no access to external sources of cash, once its funding from the European Financial Stability Facility (EFSF) expires at midnight.
Meanwhile, Greece’s banking system is being kept afloat by emergency liquidity assistance (ELA) from the European Central Bank, which is up for review on Wednesday.
Against a backdrop of uncertainty, Tsipras has called a referendum on July 5 of the Greek people on whether to accept the bailout proposals—and accompanying austerity measures—proposed by creditors.
Tsipras has urged the public to vote “no” to more austerity.
“The Greek government will claim a sustainable agreement within the euro. This is the message of NO to a bad deal at the referendum on Sunday,” the translated statement from the prime minister’s office said on Tuesday.
‘Running out of notches’
Meanwhile, credit ratings agencies are increasingly nervous about the country’s solvency.
Fitch Ratings downgraded Greek banks on Monday to “Restricted Default,” after Athens imposed capital controls to prevent an exodus of deposits from Greece.
In addition, Standard & Poor’s (S&P) lowered Greece’s credit rating to CCC- from CCC, saying the probability of the country exiting the euro zone was now 50 percent.
Moritz Kraemer, chief rating officer of sovereign ratings at S&P, told CNBC on Tuesday that the group was “actually running out of notches” for Greece.
“We have the rating at CCC- and that’s pretty much the lowest rung that we have on our scale,” he told CNBC Europe’s “Squawk Box.”
If Greece misses its payment on Tuesday, then the IMF will consider it in “arrears” – a technical term used by the IMF, which is similar to default.
If a country is in arrears to the IMF, it means it won’t get any future aid until the bill is repaid.
Although the IMF payment is dominating headlines, S&P’s Kraemer said that Greece’s bailout program ending at midnight was just as significant.
“Basically after that we’re back to square one,” he said. “So even if there was to be a change of heart in Athens and they did decide to take the creditors’ offer, that’s legally no longer possible as the program would have elapsed.”
Greece’s debt crisis: It all started in 2001…
Yannis Behrakis | Reuters
From Wikipedia, the free encyclopedia
In international law, odious debt, also known as illegitimate debt, is a legal theory that holds that the national debt incurred by a regime for purposes that do not serve the best interests of the nation, should not be enforceable. Such debts are, thus, considered by this doctrine to be personal debts of the regime that incurred them and not debts of the state. In some respects, the concept is analogous to the invalidity of contracts signed under coercion.
When a despotic regime contracts a debt, not for the needs or in the interests of the state, but rather to strengthen itself, to suppress a popular insurrection, etc, this debt is odious for the people of the entire state. This debt does not bind the nation; it is a debt of the regime, a personal debt contracted by the ruler, and consequently it falls with the demise of the regime. The reason why these odious debts cannot attach to the territory of the state is that they do not fulfil one of the conditions determining the lawfulness of State debts, namely that State debts must be incurred, and the proceeds used, for the needs and in the interests of the State. Odious debts, contracted and utilised for purposes which, to the lenders’ knowledge, are contrary to the needs and the interests of the nation, are not binding on the nation – when it succeeds in overthrowing the government that contracted them – unless the debt is within the limits of real advantages that these debts might have afforded. The lenders have committed a hostile act against the people, they cannot expect a nation which has freed itself of a despotic regime to assume these odious debts, which are the personal debts of the ruler.
There are many examples of similar debt repudiation.
Patricia Adams, executive director of Probe International, a Canadian environmental and public policy advocacy organisation and author of Odious Debts: Loose Lending, Corruption, and the Third World’s Environmental Legacy, stated: “by giving creditors an incentive to lend only for purposes that are transparent and of public benefit, future tyrants will lose their ability to finance their armies, and thus the war on terror and the cause of world peace will be better served.” In a Cato Institute policy analysis, Adams suggested that debts incurred by Iraq during Saddam Hussein‘s reign were odious because the money was spent on weapons, instruments of repression, and palaces.
A 2002 article by economists Seema Jayachandran and Michael Kremer renewed interest in this topic. They propose that the idea can be used to create a new type of economic sanction to block further borrowing by dictators. Jayachandran proposed new recommendations in November 2010 at the 10th anniversary of the Jubilee movement at the Center for Global Development in Washington, D.C.
In December 2008, Ecuadorian President Rafael Correa attempted to default on Ecuador’s national debt, calling it illegitimate odious debt, because it was contracted by corrupt and despotic prior regimes. He succeeded in reducing the price of the debt letters before continuing paying the debt.
Story 1: Political Correctness Social Hysteria Over Confederate Flag Not Black On Black Homicides, Black Genocide In Abortion Mills, Drugs Induced Mental Illness Leading To Suicides and Mass Shootings — Get Serious People — Symbols Over Substance — The Night They Drove Old Dixie Down — Videos
The U.S. population’s distribution by race and ethnicity in 2010 was as follows; due to rounding, figures may not add up to the totals shown.
Virgil Kane is the name
And I served on the Danville train
‘Till Stoneman’s cavalry came
And tore up the tracks again In the winter of ’65
We were hungry, just barely alive
By May the 10th, Richmond had fell
It’s a time I remember, oh so well
The night they drove old Dixie down
And the bells were ringing
The night they drove old Dixie down
And the people were singing
They went, “Na, na, la, na, na, la
“Back with my wife in Tennessee
When one day she called to me
“Virgil, quick, come see,
There goes Robert E. Lee!
“Now, I don’t mind chopping wood
And I don’t care if the money’s no good
You take what you need
And you leave the rest
But they should never
Have taken the very best
The night they drove old Dixie down
And the bells were ringing
The night they drove old Dixie down
And all the people were singing
They went, “Na, na, la, na, na, la”Like my father before me
I will work the land
And like my brother above me
Who took a rebel standHe was just 18, proud and brave
But a Yankee laid him in his grave
I swear by the mud below my feet
You can’t raise a Kane back up
When he’s in defeatThe night they drove old Dixie down
And the bells were ringing
The night they drove old Dixie down
And all the people were singing
They went, “Na, na, la, na, na, la”The night they drove old Dixie down
And all the bells were ringing
The night they drove old Dixie down
And the people were singing
They went, “Na, na, la, na, na, la”
The Band, The Weight
South Carolina governor calls for Confederate flag’s removal
Charleston: Demands for removal of Confederate flag
Networks Omit How Democrat Governor In S.C. Raised Confederate Flag In 1962
Shooting reignites Confederate flag debate
Confederate Flag Debate
Confederate flag: A symbol of hate or history?
Walmart, Amazon, Sears, eBay to Stop Selling Confederate Flag Merchandise
CONFEDERATE FLAG BAN – Retailers & Government Boycotting the U.S. Confederate Flag
This is What “Political Correctness” Has Done to Our Society (Funny 1992 Sketch)
The History of Political Correctness (Complete)
Political Correctness: The Control of Thought and Speech
CULTURAL MARXISM: The Corruption of America
Bill Whittle on The Narrative: The origins of Political Correctness
Bill Whittle – Racism – Democrats and Republicans switch sides?
Confederate flag controversy amid S.C. grieving
Both the flags of the United States and state of South Carolina flew at half-mast to honor the nine victims of the Charleston church shooting. Yet the Confederate flag was not lowered. Elaine Quijano reports on the controversy.
The CONFEDERATE FLAG: Views from the Heart of Dixie
BATTLE OF GETTYSBURG
Battle Of Gettysburg | Civil War Documentary
Ken Burns The Civil War Episode 4 Simply Murder 1863 Ken Burns Documentary
Black on Black Crime —
Where is the damn outrage?
Ferguson Shooting, Myth Of Whites Killing Blacks, and Black On Black Crime
Why Isn’t Black on White Crime Reported in the Mainstream Media Like White on Black Crime?
PJTV: What the Bible Really Says About Abortion
Dr. Benjamin Carson Got Real on President Obama
78 percent of Abortions are Black or Hispanic Babies
Obama’s Eugenics Team Revealed by Dr. Webster Tarpley
Black Abortion Stats
Fit vs. UnFit, Eugenics, Planned Parenthood & Psychology, Mind Control Report
Against the USA, Naked Communist Conspiracy Theory, NWO, Mind Control Report
One World Government & Collectivism – G. Edward Griffin
War on the Weak: Eugenics in America
MAAFA 21 [A documentary on eugenics and genocide]
Margaret Sanger, Planned Parenthood’s Racist Founder
Hillary Clinton In Black Church “All Lives Matter”
Hillary Clinton Exposed, Movie She Banned From Theaters Full Movie
Eugenics Glenn Beck w/ Edwin Black author of “War Against the Weak” talk Al Gore & Margaret Sanger
A BRIEF HISTORY OF MENTAL ILLNESS
Elyn Saks: A tale of mental illness — from the inside
The Band 1994-4-22 Complete Show
The Band – The Last Waltz – Full Concert – 11/25/76 – Winterland (OFFICIAL)
The Band – The Last Waltz (full album)
The Complicated Political History Of The Confederate Flag
The Confederate flag flies near the South Carolina Statehouse, Friday, June 19, 2015, in Columbia, S.C. Tensions over the Confederate flag flying in the shadow of South Carolina’s Capitol rose this week in the wake of the killings of nine people at a black church in Charleston, S.C.
Rainier Ehrhardt/Associated Press
Last week’s tragic shooting at Mother Emanuel African Methodist Episcopal Church in Charleston, S.C., that killed nine black parishioners gathered for a Bible study has renewed the debate over one of the most controversial Southern symbols — the Confederate flag.
On Monday, a cascade of both Republicans and Democrats endorsed removing the Confederate flag from the statehouse in Columbia. South Carolina Republican Gov. Nikki Haley held a press conference Monday afternoon, flanked by a bipartisan coalition of lawmakers, to call for the flag to be removed. She was joined by the state’s Republican Sens. Lindsey Graham — who is running for president — and Tim Scott — the chamber’s only African-American Republican.
Demonstrators carry Confederate flags as they leave the entrance of the South Carolina Statehouse after the removal of the flag in Columbia, S.C., on July 1, 2000.
Eric Draper/Associated Press.
In December 1860, South Carolina was the first state to secede from the Union just months after Abraham Lincoln, from the anti-slavery Republican Party, was elected president. In April 1861, the first shots of the Civil War were fired at Fort Sumter, S.C.
Ten other states would eventually follow South Carolina in secession, forming the Confederate States of America. However, of the three flags the Confederacy would go on to adopt, none are the Confederate flag that is traditionally recognized today. The “Stars and Bars” flag, currently the subject of controversy, was actually the battle flag of Gen. Robert E. Lee’s Army of Northern Virginia.
After the war ended, the symbol became a source of Southern pride and heritage, as well as a remembrance of Confederate soldiers who died in battle. But as racism and segregation gripped the nation in the century following, it became a divisive and violent emblem of the Ku Klux Klan and white supremacist groups. It was also the symbol of the States’ Rights Democratic Party, or “Dixiecrats,” that formed in 1948 to oppose civil-rights platforms of the Democratic Party. Then-South Carolina Gov. Strom Thurmond was the splinter group’s nominee for president that same year; he won 39 electoral votes.
Now, the flag is a frequent emblem of modern white supremacist groups. The alleged Charleston shooter, Dylann Storm Roof, was photographed holding the Confederate flag in images on his website. Not all southerners, who believe the flag should be flown, however, see it as a racist symbol. They see it, instead, as a symbol of southern pride or as a way to remember ancestors who fought in the Civil War.
Why is it flying at the Statehouse in Columbia, S.C.?
The Confederate flag flies on the dome of the Statehouse in Columbia, S.C., in 2000.
Eric Draper/Associated Press
The flag was first flown over the state Capitol dome (passed by the Democratic Legislature) in 1962 to mark the centennial of the start of the Civil War, but many saw it as a reaction to the civil-rights movement and school desegregation. For nearly four decades, it continued to be a controversial issue in the Palmetto State. A 1994 nonbinding referendum placed on the GOP primary ballot found that three-in-four voters said the flag should keep flying. That same year, black ministers and the NAACP threatened a boycott of the state if the flag didn’t come down, and business leaders sued to remove the flag.
But in 2000, a compromise was reached — the battle flag would be removed from atop the dome and a smaller, square version would be placed at a less-prominent place on the Statehouse grounds — on a 20-foot pole next to the 30-foot Confederate monument. But that didn’t end the controversy, and many years of protests, criticism and boycotts followed.
What is the process to remove the flag in South Carolina?
The “Get In Step” marchers pass by a small group of Confederate Flag supporters Tuesday, April 4, 2000, near Wells, S.C., on their way to Orangeburg on the third day of the march to Columbia to have the flag taken down from the Statehouse.
Mary Ann Chastain /Associated Press
According to the 2000 change, a two-thirds majority in both the state House and Senate is required to remove the flag. However, there may be a workaround, and the law itself could be changed by a simple majority. ThePost & Courier has a running tally of state lawmakers and how they stand on the issue. At her press conference, Haley said if the Legislature doesn’t finish its session by acting to remove the flag, she will call an additional session.
Also under the 2000 compromise: lowering the flag requires approval of the Legislature, which is why even after Haley ordered the American and South Carolina flags ordered to half-staff following last Wednesday’s massacre, the Confederate flag remained at full staff.
What other states have had controversies about the Confederate flag?
Protesters close their eyes in silent prayer as they stand on the South Carolina Statehouse steps during a rally to take down the Confederate flag, Saturday, June 20, 2015, in Columbia, S.C.
Rainier Ehrhardt/Associated Press
Many Southern states’ current flags are inspired by the “Rebel flag.” Georgia’s flag was changed to incorporate part of the Confederate flag into its own in 1956. From 2001 to 2003, a new flag that removed the more prominent emblem was adopted, and instead itfeatured the state seal with past flags at the bottom. The design was widely panned, though, and, in 2003, a new state flag was adopted. The new design instead draws from parts of the actual flag of the Confederate States of America and not the Confederate battle flag.
Mississippi’s state flag remains the only one in the U.S. that still features the battle flag prominently. In 2001, Magnolia State voters decidedto keep the current flag by a wide margin. The University of Mississippi, or “Ole Miss,” has also faced controversy. In 1997, waving Confederate flags at football games was banned. “Colonel Reb,” their Confederate soldier mascot, was retired in 2003 and, “From Dixie With Love” was dropped from the marching band set list.
What have top Republicans and presidential candidates said about the flag?
The question of whether to remove the controversial flag has played a role in presidential politics thanks to the state’s early primary status.
Among current 2016 hopefuls, only Florida Gov. Jeb Bush has explicitly endorsed the controversial flag’s removal, noting he decided to remove it from the Florida statehouse grounds to a museum during his tenure.
Before Haley’s press conference, other GOP candidates, and potential candidates, had walked a line on the flag, either declining to weigh in or underscoring that it’s a decision that should be up to South Carolina. But afterward, there was a flood of support from many candidates. Here’s a brief roundup of where others stand and stood:
Wisconsin Gov. Scott Walker had said he wouldn’t weigh in until after funerals of the Charleston victims. But then he tweeted this afternoon, “I am glad @nikkihaley is calling for the Confederate flag to come down. I support her decision.”
Florida Sen. Marco Rubio said he hoped the state would “make the right choice for the people of South Carolina”; as a state legislator, he voted for a bill that would have kept the Confederate flag on the Florida Capitol grounds in order to protect historical monuments.
Former Texas Gov. Rick Perry also said in a statement that he supported Haley’s decision, saying it “honors the people of Charleston, and the families of the victims of last week’s horrific hate crime. Removing the flag is an act of healing and unity, that allows us to find a shared purpose based on the values that unify us. May God continue to be with the families of the victims in Charleston, and the great people of South Carolina.”
Former Arkansas Gov. Mike Huckabee said Sunday on NBC’s “Meet The Press” that the decision was “not an issue for someone running for president.”
Texas Sen. Ted Cruz told the Washington Post that it was a matter for South Carolinians to decide, but that “I understand the passions that this debate evokes on both sides.”
John Kasich would support removing the flag before Haley’s press conference and afterward he said, “the flag should come down.”
Mitt Romney, the 2012 GOP nominee, supported its removal in the past. He tweeted: “[T]o many, it is a symbol of racial hatred” and should be taken down.
Several Republican members of Congress have also said they support the Confederate flag’s removal; Senate Majority Leader Mitch McConnell, R-Ky., endorsed the flag’s removal, calling it “a painful reminder of racial oppression.” And, he added, “the time for a state to fly it has long since passed.”
After Haley’s press conference, Republican National Committee Chairman Reince Priebus also issued a statement saying that he “support[s] the call by Governor Haley and South Carolina leaders to remove the Confederate battle flag from state house grounds.”
African-American Pastor Horrified at How Many Black Babies Abortion Kills
BY REBECCA DOWNS
The Rev. Elaine Flake of Greater Allen A.M.E. Cathedral of New York has recently learned of and reacted to the statistics of black women having abortions in New York City.
Flake reacted in disbelief, initially wondering if the statistics were even true.
The Christian Post, reporting on the Rev., dedicates one paragraph to such statistics of black women, as well as links to a previous article of theirs:
As CP has reported, citing the New York City Department of Health and Mental Hygiene: “Black women in New York City aborted more than half of their pregnancies in 2012, topping the number of abortions recorded by women of every other racial or ethnic group in the city.” The report revealed that more than any other ethnic group in NYC, black women were the leading abortion patients and also had the highest pregnancy and miscarriage rates.
The Christian Post mostly focuses on Rev. Flake’s reactions to the abortion trend, as well as many other troubling statistics for the black community on marriage, miscarriages and out of wedlock pregnancies.
Millions of black babies have been aborted. The number amount to more than 16 million, actually. These rates create skewed ratio too, considering that, according to the 2010 census data, blacks made up 12.6% of the population. And, as Abort73.com broke down:
In 2009, a total of 286,623 blacks died in the U.S.14 That same year, an estimated 1.21 million abortions took place in the United States.15 If 35.4% were performed on black women, that means almost twice as many blacks were killed by abortion as by all other causes.
As the state health report mentions, it is not just that the abortion rate of black babies nationwide is alarming, but in New York City. As if such statistics could not be more of a cause for shock and concern, the rate at which black women abort their babies in New York City, the Reverend’s own back yard, is even more troubling.
In New York City, 37 percent of all pregnancies ended in abortion in 2012. According to 41 Percent NYC, that’s nearly twice the national average. Queens, where Greater Allen A.M.E. Cathedral of New York is located has an abortion rate that is lower than that, but only slightly so, at 35 percent.
These are overall abortion rates for New York City though. If the above statistics for New York City are not disturbing enough, the specifics for blacks in the area will be.
Black women obviously need support then, but are they really getting it? Unfortunately, the answer may be that they are not getting as much help as truly needed.
Rev. Flake mentions that she is not aware of women in her church having dealt personally with abortion, since no one has ever gone to her:
CP suggested that with such a large congregation in Queens, it was likely some women belonging to The Greater Allen A.M.E Cathedral have had to personally deal with the issue of abortion. Pastor Flake agreed that it was likely, saying, “I would imagine, I’m not sure. No one has ever come to me, but I would think with that kind of percentage that that could be the case.”
Women are suffering in silence through the confusion of unplanned pregnancies and the pain of abortion while they lacked the necessary support. Let Rev. Elaine Flake be an example of the church being more involved to help women then.
Rev. Flake was in attendance at the Women’s Power Breakfast and participated in a “Black Church Panel,” along with her husband, who also leads the church alongside her. The two events were part of a conference organized by the Rev. Al Sharpton’s National Action Network.
As the leader of a mega-church of 23,000 people and participating at such events, Rev. Elaine Flake is no stranger to taking initiative it would seem. Now that she is aware of the rate of which her race is being killed off in her own city, perhaps she and others will answer the call to end this genocide of innocent black babies in the womb.
Hillary Clinton’s speech Tuesday at a historic black church in Missouri was mostly well-received by the audience, but three words angered some of the activists she was hoping to appeal to.
Clinton spoke to frequent applause about religion, racism, access to education, repairing communities and the shooting last week in Charleston, S.C.
The church where Clinton spoke, Christ the King United Church of Christ, is in Florissant, Mo., fewer than 5 miles from where the rioting and protesting happened in Ferguson.
But she’s now facing criticism on social media after using the phrase “all lives matter” — which has been used by some as pushback to the phrase “black lives matter.” The latter phrase, which hung on a banner outside the church, was widely used by protesters in Ferguson and other cities.
Before using the phrase, Clinton was retelling an anecdote about the lessons she learned from her mother.
“I asked her, ‘What kept you going?’ Her answer was very simple. Kindness along the way from someone who believed she mattered. All lives matter.”
To some in the pews, what Clinton said fell flat. Or worse:
“With her statement that all lives matter, that blew a lot of support that she may have been able to engender here,” said Renita Lamkin, a pastor at the St. John AME Church in St. Charles. She is white and while protesting in Ferguson was hit in the gut with a rubber bullet. Her passion comes in part because her children are African-American.
“My children matter,” she said. “And I need to hear my president say that the lives of my children matter. That my little black children matter. Because right now our society does not say that they matter. Black lives matter. That’s what she needs to say.”
Clinton’s campaign points out she did say “black lives matter,” late last year. But that didn’t stop a flood of complaints on Facebook and Twitter after Clinton’s speech:
Gabrielle Kennedy, also in audience at the church, had a more charitable reaction.
“I knew when she said it that there would be people who would not be happy with that. But I am of the belief that it’s a process,” she said.
And some on Twitter defended Clinton’s comment, including Democratic strategist and former Bill Clinton campaign advisor Donna Brazile:
‘It Takes Time’
In nearby Ferguson, burned-out businesses are still boarded up on West Florissant Avenue. Charles Davis, owner of the Ferguson Burger Bar, counts his blessings.
“We were saved by God. Nothing happened to us,” Davis said.
But business still isn’t back to where it was. And neither is the community. Ferguson is trying to heal from the wound ripped open when a black 18-year-old was shot by a white police officer.
“It takes time. A year is not long enough. But what people should understand is a lot of changes that needed be made has been made,” he said.
Many of the activists who rose up after the shooting of Michael Brown were on hand when Clinton spoke.
She spoke about the recent shooting in Charleston, and asked, “How do we make sense of such an evil act? An act of racist terrorism perpetrated in a house of God?” Clinton also praised the ability of the families of the victims to look at the accused gunman and offer forgiveness.
After her speech, still in front of an audience, Clinton sat down for an hourlong discussion with community leaders. Kennedy, who was there, gives Clinton credit for coming to Missouri and listening.
“What you saw on that stage there, in the pulpit area there, how we take care of ourselves. This is us doing us, and it’s fabulous stuff,” Kennedy said.
A pastor delivered a final prayer before Clinton left. And in it, she called for this to be the beginning of a conversation. Not the end.
SSRI Stories is a collection of over 6,000 stories that have appeared in the media (newspapers, TV, scientific journals) in which prescription drugs were mentioned and in which the drugs may be linked to a variety of adverse outcomes including violence.
This updated site includes the stories from the previous site and new ones from 2011 to date. We have used a new “category” classification system on the new stories. We are working back through previously SSRI Stories to bring them into the new classification system. In the meantime use the search box in the upper right column to search through both the old and the new stories.
SSRI Stories focuses primarily on problems caused by selective serotonin reuptake inhibitors (SSRIs), of which Prozac (fluoxetine) was the first. For more see About SSRIs. Other medications prescribed as antidepressants that fit the “nightmares” theme of the collected stories are sometimes included.
Jefferson Airplane – White Rabbit (Grace Slick, Woodstock, aug 17 1969)
Jefferson Airplane – Somebody to love
Dylann Roof makes first South Carolina court appearance
Bond Hearing For Charleston Church Shooter Dylann Roof (Full Unedited): First Court Appearance
New video shows church group moments before shooting
Who is Dylann Roof?
Dylann Roof: Charleston Church Shooting | True News
Obama in 2004 on His Personal Drinking/Drug Use
‘I Got High': Obama Talks About His Use of Drugs
Obama Says Legalizing Drugs is Worthy of Debate
The REAL Reason for the Mass Shooting Epidemic in America
The Marketing of Madness: The Truth About
Is Depression a Mental Illness? No.
Psychotropic Drugs: The Hidden Dangers
SSRI Drugs are Dangerous!
SSRI Withdrawals – Do Natural Products Help?
Silent Side Effects of SSRI – Mass Murders and Suicide
Medicated to Death: SSRIs and Mass Killings
SSRI’s Behind Mass Shootings – Psych Speaks Out!
Friend: Dyllan Storm Roof Took Gun from His Mom – She Didn’t Trust Him With It (VIDEO)
Witnesses: Shooter said he was there ‘to shoot black…
Charleston Church Shootings: Special Report
Best 7 minutes on gun control I have ever seen!
In this segment of his Virtual State of the Union, the Virtual President talks about why politicians want to talk about gun control rather than crime control, and delivers the factual evidence and historical truths that make the case for the Second Amendment self-evident.
Dr Susan Gratia-Hupp – Survivor of the 1991 Kileen TX Lubys Shooting Massacre
Hupp and her parents were having lunch at the Luby’s Cafeteria in Killeen in 1991 when the Luby’s massacre commenced. The gunman shot 50 people and killed 23, including Hupp’s parents. Hupp later expressed regret about deciding to remove her gun from her purse and lock it in her car lest she risk possibly running afoul of the state’s concealed weapons laws; during the shootings, she reached for her weapon but then remembered that it was “a hundred feet away in my car.” Her father, Al Gratia, tried to rush the gunman and was shot in the chest. As the gunman reloaded, Hupp escaped through a broken window and believed that her mother, Ursula Gratia, was behind her. Actually however, her mother went to her mortally-wounded husband’s aid and was then shot in the head.
As a survivor of the Luby’s massacre, Hupp testified across the country in support of concealed-handgun laws. She said that if there had been a second chance to prevent the slaughter, she would have violated the Texas law and carried the handgun inside her purse into the restaurant. She testified across the country in support of concealed handgun laws, and was elected to the Texas House of Representatives in 1996. The law was signed by then-Governor George W. Bush.
The Animals – The House of the Rising Sun
“House Of The Rising Sun”
There is a house in New Orleans
They call the Rising Sun
And it’s been the ruin of many a poor boy
And God, I know I’m oneMy mother was a tailor
She sewed my new blue jeans
My father was a gamblin’ man
Down in New OrleansNow the only thing a gambler needs
Is a suitcase and trunk
And the only time he’s satisfied
Is when he’s on a drunk[Organ Solo]Oh mother, tell your children
Not to do what I have done
Spend your lives in sin and misery
In the House of the Rising SunWell, I got one foot on the platform
The other foot on the train
I’m goin’ back to New Orleans
To wear that ball and chainWell, there is a house in New Orleans
They call the Rising Sun
And it’s been the ruin of many a poor boy
And God, I know I’m one
The Moody Blues – Nights In White Satin
Charleston shooting: c’s stepmother defends ‘smart’ boy ‘drawn in by internet evil’
The stepmother of Dylann Roof, the 21-year-old charged with nine counts of murder for the shooting at a church in Charleston, has spoken out in his defence.
Paige Mann, who was married to Mr Roof’s father for 10 years and helped raise him, said that her stepson was so smart that he became bored in school and was a germophobe for some time.
“He went to catechism, he went to church,” Ms Mann said. “He was locked in his room looking up bad stuff on the computer.”
In an interview with the New York Daily News, she said: “Something on the computer drew him in – this is Internet evil. We just thought he was a lazy, this-generation kind of kid.”
Mr Roof’s manifesto, published online, shows how the 21-year-old’s views hardened after the shooting of Travyon Martin in Florida in 2012. Ms Paige claimed that it was only after her step-son began living with his mother over the past few years that he became a recluse.
Mr Roof sat with members of the Emanuel African Methodist Epsicopal Church for nearly an hour before he allegedly shot nine of them dead, including the pastor.
Divorce papers filed by Ms Paige in 2008 claim that Franklin Roof had hit her and that any hope Dylann had of a normal home left with her, it was reported by the Inquisitr.
According to the manifesto, which was updated just hours before the fatal attack, he believed that he had no choice but to carry out the attack on the church and “chose Charleston because it is the most historic city in my state”.
CHARLESTON SHOOTING – Disaster Being Used to Forward Gun Control Agenda
Charleston Shooting: “Hate Crimes” and White Fear
Fox News Host ‘Surprise’ as Obama ‘Quick’ Invoke Gun Control on Charleston Mass Shooting
Fox’s Steve Doocy and Guest Wonder Whether Charleston Shooting Part of ‘War on Christians’
O’Reilly Battles NC Victim’s Friend For Blaming Fox ‘Hate Speech’ for Charleston Shooting on CNN
Mass Murders caused by Pharma Meds… Not Guns!
Medicated to Death: SSRIs and Mass Killings
Chris Greene “SSRI Drugs are responsible for School Massacre”
Michael Savage, caller on how massacres occur at “gun-free” zones, not in armed places like Israel
Ft. Hood Shooting Reactions And The Horrors Of SSRIs
Affidavits spell out chilling case against Dylann Roof
As a subdued Dylann Roof made his first official appearance Friday on charges of killing nine people at a historic black church, police affidavits offered grim details of the murder case, including an allegation that the gunman fired multiple shots into each victim and stood over them to issue “a racially inflammatory statement.”
The documents also said that Roof’s father and uncle contacted police to positively identify the 21-year-old as the suspect after authorities issued photos of the gunman within hours of the attack at the Emanuel AME Church in downtown Charleston Wednesday evening.
As those details trickled out, the suspect’s family issued a statement expressing sadness and offering condolences to the families of the victims:
Dylann Roof’s father, according to the court documents, told investigators that his son owned a .45-caliber handgun. The documents note that .45-caliber casings were found at the scene of the shootings.
The affidavits allege that Roof, wearing a fanny pack apparently to hide a weapon, spent an hour with the parishioners before opening fire on the group. Before leaving the scene of the carnage, he allegedly “uttered a racially inflammatory statement” over the bodies to a witness who was apparently allowed to survive to convey the message.
Roof was returned to South Carolina after waiving his extradition rights following his arrest Thursday near Shelby, N.C., about 245 miles northwest of Charleston.
He appeared at ease when he allegedly told investigators shortly after his capture that he had launched the attack that left nine dead, a federal law enforcement official said. The official, who is not authorized to comment publicly, said that the suspect expressed no remorse and appeared “comfortable” with what he had done.
Authorities have determined that Roof legally obtained a .45-caliber handgun earlier this year, using money likely provided as birthday gift from his family, the official said. The weapon was purchased at gun store near Columbia, S.C.
Statements made by some family members of victims were particularly powerful.
Charleston shooting: What is a ‘hate crime’?
Appearing by video link from jail, the 21-year-old Roof, who was handcuffed and wore a striped jail jumpsuit, often pursed his lips, closed his eyes, or stared at the floor as the relatives of five victims spoke to the court at the bond hearing.
“You took something really precious away from me, I will never talk to her again, never hold her again, but I forgive you,” said the daughter of one of the victims, Ethel Lance. “You hurt me, you hurt a lot of people but God forgive you and I forgive you.”
Roof appeared wan and subdued, his distinctive bowl hair, shown in surveillance photos outside the church on the night of the killings, stringy and unkempt. He stood with his hands cuffed behind his back. Two heavily armed guards stood behind him.
Bethanee Middleton-Brown, sister of another victim, DePayne Middleton-Doctor, addressed the hearing amid sniffles and sobs in the tiny courtroom.
She said her sister “taught me me that we are the family that love built, we have no room for hate, so we have to forgive. And I pray to God for your soul and I also thank God that And I also thank God I won’t be around when your judgment day comes with him.”
Although the court legally could not issue any bond in on the murder charges, Magistrate James Gosnell Jr. set Roof’s bond on a related weapons possession charge at $1 million.
Roof, who often swallowed hard as the judge asked questions, spoke only three times, answering “yes, sir” and “no, sir” to questions about his employment status. Roof is unemployed.
At the opening of the emotional, 13-minute hearing, Gosnell addressed the court, saying Charleston is a strong, loving community with “big hearts.”
“We are going to reach out to everyone, all the victims, and we will touch them,” he said. “We have victims — nine of them — but we also have victims on the other side.
“There are victims on this young man’s side of the family. No one would have ever thrown them into the whirlwind of events that they have been thrown into … We must find it in their heart to also help his family as well.”
In Washington, meanwhile, Justice Department spokeswoman Emily Pierce said the federal inquiry into the church shooting is ongoing.
What happens to mass killers: the data behind the crimes
Pierce said the investigation will not only consider possible hate crime violations, but prosecutors also will review the shooting as a possible “act of domestic terrorism.”
“This heartbreaking episode was undoubtedly designed to strike fear and terror into this community, and the department is looking at this crime from all angles,” Pierce said.
Charleston, South Carolina Mayor Joseph Riley said although he doesn’t condone the death penalty, he thinks prosecutors will seek it in the Emanuel AME church shooting. VPC
Gov. Nikki Haley, speaking on NBC’s Today show on Friday, said that “we will absolutely will want him to have the death penalty” for the fatal shooting of nine members of a Bible study group at the Emanuel AME Church on Wednesday evening.
Charleston Mayor Joseph P. Riley Jr., said at a news conference Friday that though he’s not a proponent of the death penalty, it’s the law in South Carolina and he expects it will be sought in the church shooting. “If you are going to have a death penalty, certainly this case would merit it,” Riley said.
Shelby police officials did not interview Roof formally, according to WBTV, a Charlotte TV station, which quotes an unidentified source as saying the suspect was videotaped during the entire time he was at the Shelby police department.
The source told WBTV that Roof spoke freely, told investigators he had been planning the attack for a period of time, had researched the Emanuel AME Church and targeted it because it was a historic African-American church.
According to WBTV’s source, Roof told investigators he had a Glock handgun hidden behind a pouch he was wearing around his waist. He also told investigators he thought he’d only shot a few people and when told he actually had killed nine people, he appeared to be somewhat remorseful, according to the source.
During the recorded conversation, Roof reportedly told investigators he actually thought he would be caught in Charleston before fleeing and was headed to Nashville when he was captured. When asked why he was going to Nashville, he reportedly told investigators “I’ve never been there before.”
Police alleged that Roof opened fire on worshipers after sitting with them for at least an hour. The victims included the pastor, Clementa Pinckney, 41, who was also a state senator.
The 21-year-old man accused of killing nine people as they worshiped at a Charleston, South Carolina church has a criminal past. Dylann Roof was arrested twice this year and images of him posted to social media seem to show a racist ideology. WCNC
Roof allegedly told police he “almost didn’t go through with (the shooting) because everyone was so nice to him,” other sources told NBC News’ Craig Melvin.
Police say they thought Roof was the lone gunman within hours of the bloody attack on the church, which was founded in 1816. Asked whether authorities believe Roof had acted alone, Mullen said: “We don’t have any reason to believe anyone else was involved.”
A one-time acquaintance of Roof’s told the Associated Press that he would rant that “blacks were taking over the world” as the pair got drunk on vodka.
Roof railed that “someone needed to do something about it for the white race,” said the former friend, Joseph Meek Jr., according to the AP.
Story 1: Billionaires For Bush and Clinton — American People For Anyone Else — Nurse Ratchet Is Back — Money Cannot Buy You Love — It’s My Turn — Videos
Be it or be it not true that Man is shapen in iniquity and conceived in sin, it is unquestionably true that Government is begotten of aggression, and by aggression.
~Herbert Spencer, 1850
This is the gravest danger that today threatens civilization: State intervention, the absorption of all spontaneous social effort by the State; that is to say, of spontaneous historical action, which in the long-run sustains, nourishes and impels human destinies.
~Jose Ortega y Gasset, 1922
It [the State] has taken on a vast mass of new duties and responsibilities; it has spread out its powers until they penetrate to every act of the citizen, however secret; it has begun to throw around its operations the high dignity and impeccability of a State religion; its agents become a separate and superior caste, with authority to bind and loose, and their thumbs in every pot. But it still remains, as it was in the beginning, the common enemy of all well-disposed, industrious and decent men.
For more than 70 years, with few exceptions, more Americans have identified as Democrats than Republicans. But the share of independents, which surpassed the percentages of either Democrats or Republicans several years ago, continues to increase. Currently, 39% Americans identify as independents, 32% as Democrats and 23% as Republicans. This is the highest percentage of independents in more than 75 years of public opinion polling. Report:A Deep Dive Into Party Affiliation
Note: 1939-1989 yearly averages from the Gallup Organization interactive website. 1990-2014 yearly totals from Pew Research Center aggregate files. Based on the general public. Data unavailable for 1941. Independent data unavailable for 1951-1956.
One Flew Over The Cuckoo’s Nest – Randal back in action scene
i want my cigarettes
The Beatles – Can’t Buy Me Love (Live)
Hillary Clinton Announces Her Bid For President. Again.
This Aug. 24, 2012 photo provided by FDR Four Freedoms Park LLC, shows the New York City memorial park, honoring President Franklin D. Roosevelt, that has been completed 40 years after the original design was created. The Franklin D. Roosevelt Four Freedoms Park on the southern tip of 2-mile-long Roosevelt Island – between Manhattan and Queens – is being dedicated Wednesday, Oct. 17, 2012, in a ceremony to be attended by dignitaries including former President Bill Clinton and Mayor Michael Bloomberg. (AP Photo/FDR Four Freedoms Park LLC, Paul Warchol)
Clinton touts shared prosperity in campaign kick-off speech
Hillary Clinton’s 2016 Candidacy Announcement Expected on Sunday
Malzberg | Raffi Williams discusses Hillary Clinton’s Saturday “Re-Launch” of her Campaign
Hillary Clinton Launches Presidential Campaign In Nyc FULL SPEECH
Hillary the Scandals
Exposed: Hillary Clinton’s Sex Scandals
THE CLINTON CONSPIRACY – MUST WATCH
Google “Bill Clinton rape”
The Alex Jones Show (1st HOUR-VIDEO Commercial Free) Sunday June 14 2015: News
CNN Poll Shows Hillary Clinton “Shine Has Tarnished” And She Is Losing Support Of Independents
FNC: Hillary Clinton’s Favorability Down 11 Among Independents
Jeb LET’S-JUST-LEAVE-LAST-NAMES-OUT-OF-THIS Bush 2016 Presidential Campaign Announcement
Immigration Protesters Disrupt Jeb Bush Campaign Announcement – June 15, 2015
Conservative Heads Explode Over Jeb Bush Immigration Comments
Mark Levin comments on Jeb Bush’s statements about legal and illegal immigration
PJTV: No Jeb Bush and No Third Parties
Glenn Beck – “Jeb Bush is Hillary Clinton LITE”
Immigration by the Numbers — Off the Charts
America’s Immigration History
Top 10 Immigrant Countries
Immigration, World Poverty and Gumballs – Updated 2010
How Many Illegal Aliens Are in the US? – Walsh – 1
How Many Illegal Aliens Are in the United States? Presentation by James H. Walsh, Associate General Counsel of the former INS – part 1.
Census Bureau estimates of the number of illegals in the U.S. are suspect and may represent significant undercounts. The studies presented by these authors show that the numbers of illegal aliens in the U.S. could range from 20 to 38 million.
On October 3, 2007, a press conference and panel discussion was hosted by Californians for Population Stabilization (http://www.CAPSweb.org) and The Social Contract (http://www.TheSocialContract.com) to discuss alternative methodologies for estimating the true numbers of illegal aliens residing in the United States.
This is a presentation of five panelists presenting at the National Press Club, Washington, D.C. on October 3, 2007. The presentations are broken into a series of video segments:
How Many Illegal Aliens Are in the US? – Walsh – 2
Jeb Bush Urges ‘Earned Legal Status’ For 11 Million Illegal Aliens
Did Ann Coulter Save USA with funny & brilliant Immigration CPAC Speech?
Laura Ingraham slams Jeb Bush at CPAC
Jeb Bush to officially announce 2016 presidential run
Jeb Bush Finally Announces He Will Run for President
Jeb Bush – Just Another W?
Raw video: Jeb Bush speaks at Politics and Eggs
Diana Ross – Do You Know Where You’re Going To ( Theme From Soundtrack Mahogany )
Diana Ross It’s My Turn
JEB BUSH HAS OPTIMISTIC MESSAGE, FACES CHALLENGES IN ’16 BID
BY STEVE PEOPLES AND BRENDAN FARRINGTON
Jeb Bush is launching a Republican presidential bid months in the making Monday with a vow to get Washington “out of the business of causing problems” and to stay true to his beliefs – easier said than done in a bristling primary contest where his conservative credentials will be sharply challenged.
“I will campaign as I would serve, going everywhere, speaking to everyone, keeping my word, facing the issues without flinching,” Bush said in excerpts of a speech released by his campaign before his afternoon announcement. Bush was opening his campaign at a rally near his south Florida home at Miami Dade College, where the institution’s large and diverse student body symbolizes the nation he seeks to lead.
In an unusual twist for a political speech aimed at a national audience, Bush, who is bilingual, planned to speak partly in Spanish. The former Florida governor has made minority outreach a priority.
“In any language,” his speech said, “my message will be an optimistic one because I am certain that we can make the decades just ahead in America the greatest time ever to be alive in this world.”
In a video for the event, showing women, minorities and a disabled child, Bush says “the most vulnerable in our society should be in the front of the line and not the back.” This calls for “new leadership that takes conservative principles and applies them so that people can rise up.”
Neither his father, former President George H.W. Bush, nor his brother, former President George W. Bush, was expected to attend. The family was to be represented instead by Jeb Bush’s mother and former first lady, Barbara Bush, who once said that the country didn’t need yet another Bush as president, and by his son George P. Bush, recently elected Texas land commissioner.
Before the event, the Bush campaign came out with a new logo – Jeb! – that conspicuously leaves out the Bush surname.
Bush joins the race in progress in some ways in a commanding position. Bush has probably raised a record amount of money to support his candidacy and conceived of a new approach on how to structure his campaign, both aimed at allowing him to make a deep run into the GOP primaries.
But on other measures, early public opinion polls among them, he has yet to break out. While unquestionably one of the top-tier candidates in the GOP race, he is also only one of several in a large and capable Republican field that does not have a true front-runner.
In the past six months, Bush has made clear he will remain committed to his core beliefs in the campaign to come – even if his positions on immigration and education standards are deeply unpopular among the conservative base of the party that plays an outsized role in the GOP primaries.
Tea party leader Mark Meckler on Monday said Bush’s positions on education and immigration are “a nonstarter with many conservatives.”
“There are two political dynasties eyeing 2016,” said Meckler, a co-founder of the Tea Party Patriots, one of the movement’s largest organizations, and now leader of Citizens for Self-Governance. “And before conservatives try to beat Hillary, they first need to beat Bush.”
Yet a defiant Bush has showed little willingness to placate his party’s right wing.
“I’m not going to change who I am,” Bush said as he wrapped up a European trip on the weekend. “I respect people who may not agree with me, but I’m not going to change my views because today someone has a view that’s different.”
Bush is one of 11 major Republicans in the hunt for the nomination. Wisconsin Gov. Scott Walker and Ohio Gov. John Kasich are among those still deciding whether to join a field that could end up just shy of 20.
After touring four early-voting states, Bush quickly launches a private fundraising tour with stops in at least 11 cities before the end of the month. Two events alone – a reception at Union Station in Washington on Friday and a breakfast the following week on Seventh Avenue in New York – will account for almost $2 million in new campaign cash, according to invitations that list more than 75 already committed donors.
Jeb Bush Announces GOP Presidential Campaign
Enters crowded Republican field with the party faithful divided over the GOP’s direction
By BYRON TAU
Former Florida Gov. Jeb Bush announced his candidacy for the Republican presidential nomination on Monday, flipping the switch on an expansive campaign operation he has quietly been building for months.
Former Florida Governor Jeb Bush formally announces his campaign for the 2016 Republican presidential nomination on Monday, June 15, 2015 in Miami.PHOTO:REUTERS
“Here’s what it comes down to. Our country is on a very bad course. And the question is: What are we going to do about it? The question for me is: What am I going to do about it?” he said. “And I have decided. I am a candidate for president of the United States.”
Mr. Bush, who becomes the third member of his family to seek the nation’s highest office, spoke while delivering his official campaign speech at Miami-Dade College.
Earlier, he officially kicked off his candidacy by filing paperwork to run for president with the Federal Election Commission.
The son and brother of two U.S. presidents, Mr. Bush enters a presidential field crowded with young up-and-coming Republican talent and an electorate deeply divided about the future direction of both the Republican Party and the nation.
In laying out the case for his candidacy, Mr. Bush promised an uplifting message about the direction and future of the country.
“In any language, my message will be an optimistic one because I am certain that we can make the decades just ahead in America the greatest time ever to be alive in this world,” Mr. Bush said.
And the former Florida governor boasted about job and economic growth and tax cuts in the state over his tenure.
Jeb Bush is not that far off politically from brother George W., but the two have very different personalities and backgrounds. Photo: AP
Though Mr. Bush has built a sizable campaign war chest and attracted veteran operatives for both his campaign and his independent super PAC—polls show him barely registering above 10% in a crowded primary field.
He’ll also face a Republican primary electorate that has grown more conservative since his brother George W. Bush ran for election in 2000 on a platform of what he called compassionate conservatism.
READ MORE ON CAPITAL JOURNAL
Capital Journal is WSJ.com’s home for politics, policy and national security news.
On two issues in particular—immigration andeducation—Mr. Bush finds himself on the opposite side from many grassroots activists in the Republican Party. Mr. Bush has long supported changes to the nation’s immigration system that would allow illegal immigrants a path to legal status. He also has expressed support for national education standards opposed by many conservative activists.
Mr. Bush also faces the challenge of distancing himself in the voters’ eyes from his family name and legacy. His brother, George W. Bush, left office with sagging approval ratings due in part to his role as the architect of a divisive and unpopular war in Iraq.
Jeb Bush has spent months planning his entrance into the 2016 presidential campaign and he will enter with the most name recognition and money of his GOP field. WSJ’s Jerry Seib explains. Photo: AP
Mr. Bush unveiled a campaign logo on Monday that downplays his family’s last name. The stylized red logo contains only Mr. Bush’s first name with an exclamation point. His father, George H.W. Bush, and brother, George W. Bush, aren’t expected to attend his campaign kickoff.
Mr. Bush has been traveling the country in the past few months banking campaign cash for an independent group that is expected to support his efforts. With his deep ties to the Republican donor class and the business community, Mr. Bush has built a formidable operation and a major war chest.
Once he becomes an official candidate, he won’t be able to coordinate with the super PAC, which will be run out of Los Angeles. Mr. Bush’s official campaign is based in Florida.
Jeb Bush: I cry, I’m introverted, but I want to be president
Third member of the Bush dynasty finally to announce candidacy for Republican nomination
Jeb Bush, former Florida governor, in Tallinn, Estonia, on SaturdayPhoto: Bloomberg
By Joanna Walters, New York and Raf Sanchez, Miami
Jeb Bush will finally end months of speculation and announce he is running for the American presidency on Monday, in a campaign carefully calibrated to portray himself as a natural heir to the family dynasty and at the same time distance himself from his brother George W.
In a key-note interview, he described his father, the first President George Bush, as the “greatest man alive” and said the mere thought of him might make him cry.
But by contrast he was careful to differentiate himself from his brother. “Jeb is different from George,” he told CNN. “Jeb is who he is and his life story is different.”
Mr Bush plans to announce he is running for the White House in Miami on Monday, after months of unofficial campaigning.
He unveiled his campaign logo via social media site Twitter on Sunday, and immediately ran into teasing from the public that it is almost identical to the logo he used when he ran, successfully, for the governorship of Florida in 1998.
The logo is simply his first name in bright red with an exclamation mark and 2016 underneath. His governor’s campaign logo was also ‘Jeb!’
“It’s something that’s been lacking in the presidency, to have someone who’s been tempered by life, and along the way I will get to share that,” said Mr Bush, who at 62 is eighteen years older than Mr Rubio and eight years older even than the departing president.
Polls show the two men, along with Governor Scott Walker of Wisconsin, as the current front-runners for the Republican nomination.
Mr Bush will make his campaign announcement in his hometown of Miami and will be joined by his wife Columba, a Mexican-born woman who has largely shied away from the public spotlight.
The story of how they met as teenagers featured prominently in a video Mr Bush released shortly before the announcement.
“I need to share my heart to show a little bit about my life experience,” Mr Bush said in the video.
While it has been clear for months that Mr Bush intended to run he has used the time ahead of his formal announcement to raise funds for a superPAC, a nominally independent group that will support his candidacy.
Mr Bush is said to have already amassed a campaign war chest of more than $100 million, according to the website Politico.
But he is among the most moderate of the Republican contenders when it comes to domestic policy. Unlike others in his party he has not lashed out at national education standards and has taken a more measured tone on immigration.
Mr Bush, who speaks fluent Spanish, may be able to attract the votes of Hispanic voters who are an increasingly crucial voting group in US elections.
However, the conservative activists who play a major role in determining the Republican nominee may pressure Mr Bush to take a harsher line on immigration.
He has already backed away from his previous support for a “path to citizenship” for illegal immigrants who have lived and worked in the US for a long time. Mrs Clinton supports such a path, as does President Barack Obama.
Mr Bush has denied he was trying to cut himself off from his famous name, but admitted he had a difficult task to show the man beneath the family.
“I don’t have to dissociate myself from my family, you know, I love them but I know that for me to be successful I’m going to have to share my heart, tell my story,” he added.
“It’s important. It’s something that took a little bit of getting used to for me, personally, to be able to show my heart, because I’m kind of introverted, but it’s important to do,” he said.
He was asked about his father, who turned 91 on June 12 and whether he would be on his mind when he announces his own candidacy to follow in the family footsteps.
“I’m not going to think about that because Bushes are known to cry once in a while. It’s very emotional for me,” he said. “I love my dad. He’s just the greatest man alive,” he said.
Mr Bush said he was looking forward to telling a life story that was “full of warts and full of successes”, where he had had to make “tough decisions”.Most startling is that it completely leaves out the famous family name that has given him a head start in the 2016 presidential race.
Clinton formally launches 2016 campaign with focus on economic equality
Hillary Clinton on Saturday officially launched her 2016 presidential campaign, calling for a return to shared prosperity and asking American workers, students and others to trust her to fight for them.
Clinton made the announcement at an outdoor rally on New York City’s Roosevelt Island, two months after announcing her campaign with an online video.
“You have to wonder: When do I get ahead? I say now,” Clinton told the crowd in a roughly 46-minute speech. “You brought the country back. Now it’s your time to enjoy the prosperity. That is why I’m running for president of the United States.”
The former first lady, U.S. senator from New York and secretary of state is the Democratic frontrunner in the 2016 White House race.
Also in the race are Sen. Bernie Sanders, of Vermont, former Maryland Gov. Martin O’Malley and former Rhode Island Gov. Lincoln Chaffe.
She lost her 2008 bid for the Democratic presidential nomination to then-Sen. Obama.
Clinton, wearing her signature blue pantsuit, walked through the crowd en route to the stage for her speech.
She remarked that Franklin D. Roosevelt’s Four Freedoms are a “testament to our nation’s unmatched aspirations and a reminder of our unfinished work at home and abroad.”
Clinton also drew into focus what will likely be the key themes of her campaign including support for same-sex marriage, wage equality for women and all Americans, affordable college tuition and free child-care and pre-kindergarten.
“The top-25 hedge fund managers make more than all kindergarten teachers combined,” she said. “And they’re paying lower taxes.”
Clinton attempted to portray herself as a fierce advocate for those left behind in the post-recession economy, detailing a lifetime of work on behalf of struggling families. She said her mother’s difficult childhood inspired what she considers a calling.
“I have been called many things by many people,” Clinton said.” Quitter is not one of them.”
She said that attribute came from her late mother, Dorothy Rodham, in whom she would confide after hard days in the Senate and at the State Department.
“I wish my mother could have been with us longer,” Clinton said. “I wish she could have seen the America we are going to build together … where we don’t leave any one out or any one behind.”
Clinton was joined by her husband, former President Bill Clinton, and their daughter, Chelsea.
She also was critical in her speech of Republicans, suggesting they have reserved economic prosperity for the wealthy, in large part by cutting taxes for the country’s highest wage-earners.
She also accused them of trying to “wipe out tough rules on Wall Street,” take away health insurance from more than 16 million Americans without offering any “credible alternative” and turning their backs on “gay people who love each other.”
The Republican National Committee said in response that Clinton’s campaign was full of hypocritical attacks, partisan rhetoric and ideas from the past.
“Next year, Americans will reject the failed policies of the past and elect a Republican president,” RNC Press Secretary Allison Moore said.
Republicans also argued Clinton devoted only about five minutes of her speech to foreign policy.
Clinton now heads to four early-primary states, starting Saturday night in Iowa where she will talk with volunteers and others about grassroots-campaign efforts for the first-in-the-nation caucus state.
The organizational meeting will be simulcast to Clinton camps across the country and serve as a blueprint for them all 435 congressional districts.
She then travels to New Hampshire on June 15, South Carolina on June 17 and in Nevada on June 18.
Clinton vowed Saturday to roll out specific policy proposals in the coming weeks, including ones on rewriting the tax code and sustainable energy.
In what was her first major speech of her campaign, she also cited President Obama, Roosevelt and her husband, saying they embraced the idea that “real and lasting prosperity must be built by all and shared by all.”
Holding the event on an island between Queens and Manhattan raised some criticism about its accessibility by vehicle and public transportation.
The campaign estimated the event crowd, whose members needed a ticket, at 5,500. However, the number appeared smaller, and the overflow section was empty.
Hillary Rodham Clinton, in a speech that was at times sweeping and at times policy laden, delivered on Saturday a pointed repudiation of Republican economic policies and a populist promise to reverse the gaping gulf between the rich and poor at her biggest campaign event to date.
Under sunny skies and surrounded by flag-waving supporters on Roosevelt Island in New York, Mrs. Clinton pledged to run an inclusive campaign and to create a more inclusive economy, saying that even the new voices in the Republican Party continued to push “the top-down economic policies that failed us before.”
“These Republicans trip over themselves promising lower taxes for the wealthy and fewer rules for the biggest corporations without any regard on how that will make income inequality worse,” she said before a crowd estimated at 5,500, according to the campaign.
“I’m not running for some Americans, but for all Americans,” Mrs. Clinton said. “I’m running for all Americans.”
Offering her case for the presidency, she rested heavily on her biography. Her candidacy, she said, was in the name of “everyone who has ever been knocked down but refused to be knocked out.”
Mrs. Clinton portrayed herself as a fighter, sounding a theme her campaign had emphasized in recent days. “I’ve been called many things by many people, quitter is not one of them,” she said.
Standing on a platform set in the middle of a grassy memorial to Franklin D. Roosevelt on the East River island named after him, Mrs. Clinton invoked his legacy. She also praised President Obama and her husband, former President Bill Clinton, but declared that “we face new challenges” in the aftermath of the economic crisis.
While some Republican detractors have tried to make an issue of Mrs. Clinton’s age (if she won she would be 69 when she took office in January 2017), she sought to embrace it and to rebut the notion that she cannot stand for change or modernity. Offering her campaign contact information, she spoke about the lives of gay people, saying Republicans “turn their backs on gay people who love each other.”
In one of the biggest applause lines, she said: “I may not be the youngest candidate in this race, but I will be the youngest woman president in the history of the United States.”
Underscoring the point with a riff on an old Beatles song, Mrs. Clinton said: “There may be some new voices in the presidential Republican choir. But they’re all singing the same old song.”
“It’s a song called ‘Yesterday,’ ” she continued. “They believe in yesterday.”
Allison Moore, a spokeswoman for the Republican National Committee, called the speech “chock-full of hypocritical attacks, partisan rhetoric and ideas from the past that led to a sluggish economy.”
Who Is Running for President (and Who’s Not)?
Mrs. Clinton specified policies she would push for, including universal prekindergarten, paid family leave, equal pay for women, college affordability and incentives for companies that provide profit-sharing to employees. She also spoke of rewriting the tax code “so it rewards hard work at home” rather than corporations “stashing profits overseas.” She did not detail how she would achieve those policies or address their costs.
Mrs. Clinton spoke to the criticism that her wealth makes her out of touch with middle-class Americans, saying her candidacy is for “factory workers and food servers who stand on their feet all day, for the nurses who work the night shift, for the truckers who drive for hours.”
Uncomfortable with the fiery rhetoric of Senator Elizabeth Warren, the Massachusetts Democrat, Mrs. Clinton offered some stark statistics to address the concerns of the Democratic Party’s restless left. “The top 25 hedge fund managers make more than all of America’s kindergarten teachers combined, often paying a lower tax rate,” she said.
Mrs. Clinton said many Americans must be asking, “When does my family get ahead?” She added: “When? I say now.”
In a campaign in which Republicans have emphasized the growing threat of Islamic terrorism and an unstable Middle East, Mrs. Clinton hardly mentioned foreign policy. She did speak of her experience as a senator from New York after the Sept. 11, 2001, attacks.
“As your president, I’ll do whatever it takes to keep Americans safe,” she said, weaving the skyline and a view of the newly built One World Trade Center into her remarks.
For as much as the content of the speech mattered, the theater of it was equally important. For a campaign criticized for lacking passion, the event gave Mrs. Clinton the ability to create a camera-ready tableau of excitement.
The Brooklyn Express Drumline revved up the crowd assembled on a narrow stretch at the southern tip of the island. And Marlon Marshall, the campaign’s director of political engagement, rattled off statistics about the number of volunteers who have signed up and house parties held in the early nominating states. A section with giant screens set up for an overflow crowd stood nearly empty.
But a crowd of supporters and volunteers from the staunchly Democratic New York area does not exactly represent the electorate writ large. The real test for Mrs. Clinton and how the speech was perceived will be in Iowa, where she was to travel on Saturday evening for several events. Iowa, the first nominating state, shunned her the last time she sought the presidency, in 2008.
“I was disappointed she didn’t challenge Obama four years ago,” said Dominique Pettinato, a 24-year-old parole officer who lives in Brooklyn.
For some members of the skeptical liberal wing of the Democratic Party still concerned that Mrs. Clinton will embrace her husband’s centrist approach, the speech went only so far in convincing them otherwise.
“This was mostly a typical Democratic speech — much better than the direction Republicans offer America,” said Adam Green, a co-founder of Progressive Change Campaign Committee, a liberal advocacy group. But he said the speech had not offered “the bold economic vision that most Americans want and need.”
Mrs. Clinton did not broach one issue that liberals are increasingly frustrated by: trade. On Thursday, Senator Bernie Sanders, a socialist from Vermont who is also seeking the Democratic nomination, pointedly criticized Mrs. Clinton for not taking a position on a controversial trade bill Mr. Obama is pushing, as well as other contentious issues like the proposedKeystone XL oil pipeline and the renewal of the Patriot Act. “What is the secretary’s point of view on that?” Mr. Sanders asked of the act, which he voted against.
Mrs. Clinton had hardly stopped speaking Saturday when Bill Hyers, a senior strategist for Martin O’Malley, the former governor of Maryland, who is also seeking the Democratic presidential nomination, criticized her as vague on trade and other issues. Mr. O’Malley, he said, “has been fearless and specific in the progressive agenda we need.”
If there is one demographic Mrs. Clinton’s campaign is hoping to excite it is young women. It is an obvious connection that her 2008 campaign played down as it tried to present the former first lady as a strong commander in chief.
But on Saturday it was clear that Mrs. Clinton will make gender more central to her campaign this time. In her closing remarks, she called for a country “where a father can tell his daughter yes, you can be anything you want to be, even president of the United States.”
Story 1: American People Leaving Both Democratic and Republican Parties In Search of A Party With Principles and Leaders With Integrity and Defenders of The United States Constitution — A New Direction For America — Videos
Five Finger Death Punch – Wrong Side Of Heaven
Gallup: Partisan split at historic level
Gallup Poll: Americans Overwhelmingly Want GOP Congress to Set Country’s Agenda, Not Obama
Most Political Independents Ever In USA
How Are Conservative And Liberal Brains Different?
Poll Record High 42 Percent Americans Identify As Independents
Against the USA, Naked Communist Conspiracy Is Unfolding, NWO
1.U.S. acceptance of coexistence as the only alternative to atomic war.
2.U.S. willingness to capitulate in preference to engaging in atomic war.
3.Develop the illusion that total disarmament by the United States would be a demonstration of moral strength.
4.Permit free trade between all nations regardless of Communist affiliation
5.Extension of long-term loans to Russia & satellites.
6.Provide American aid to all nations regardless
7.Grant recognition of Red China. Admission of Red China to the U.N.
8.Set up East and West Germany as separate states under supervision of the U.N.
9.Prolong the conferences to ban atomic tests because the U.S. has agreed to suspend tests as long as negotiations are in progress.
10.Allow all Soviet satellites individual representation in the U.N.
11.Promote the U.N. as the only hope for mankind. Demand that it be set up as a one-world government with its own independent armed forces.
12.Resist any attempt to outlaw the Communist Party.
13.Do away with all loyalty oaths.
14.Continue giving Russia access to the U.S. Patent Office.
15.Capture one or both of the political parties.
16.Use technical decisions of the courts to weaken by claiming their activities violate civil rights.
17.Get control of the schools. Promote Communist propaganda. Soften the curriculum. Get control of teachers’ associations.
18.Gain control of all student newspapers.
19.Use student riots to foment public protests against programs or organizations which are under Communist attack.
20.Infiltrate the press. Get control of book-review assignments, editorial writing, policymaking positions.
21.Gain control of key positions in radio, TV, and motion pictures.
22.Continue discrediting American culture by degrading all forms of artistic expression. “eliminate all good sculpture from parks and buildings, substitute shapeless, awkward and meaningless forms.”
23.Control art critics and directors of art museums.
24.Eliminate all laws governing obscenity by calling them “censorship” and a violation of free speech.
25.Break down cultural standards of morality by promoting pornography and obscenity 26.Present homosexuality, degeneracy and promiscuity as “normal, natural, healthy.”
27.Infiltrate the churches and replace revealed religion with “social” religion. Discredit the Bible as a “religious crutch.”
28.Eliminate prayer or religious expression in the schools
29.Discredit the American Constitution by calling it inadequate, old-fashioned, a hindrance to cooperation between nations on a worldwide basis.
30.Discredit the American Founding Fathers.
31.Belittle all forms of American culture and discourage the teaching of American history
32.Support any socialist movement to give centralized control over any part of the culture; education, social agencies, welfare programs, mental health clinics, etc.
33.Eliminate all laws or procedures which interfere with the operation of communism
34.Eliminate the House Committee on Un-American Activities.
35.Discredit and eventually dismantle the FBI.
36.Infiltrate and gain control of more unions.
37.Infiltrate and gain control of big business.
38.Transfer some of the powers of arrest from the police to social agencies. Treat all behavioral problems as psychiatric disorders which no one but psychiatrists can understand or treat.
39.Dominate the psychiatric profession and use mental health laws as a means of gaining coercive control over those who oppose Communist goals.
40.Discredit the family. Encourage promiscuity, masturbation, easy divorce.
41.Emphasize the need to raise children away from the negative influence of parents. Attribute prejudices, mental blocks and retarding to suppressive influence of parents.
42.Create the impression that violence and insurrection are legitimate aspects of the American tradition; that students and special-interest groups should rise up and use “united force” to solve economic, political or social problems.
43.Overthrow all colonial governments before natives are ready for self-government.
44.Internationalize the Panama Canal.
45.Repeal the Connally reservation so the United States cannot prevent the World Court from seizing jurisdiction over domestic problems and individuals alike.
Mind Control, Psychology of Brainwashing, Sex & Hypnosis
Fit vs. UnFit, Eugenics, Planned Parenthood & Psychology, Mind Control Report
CORPORATE FASCISM: The Destruction of America’s Middle Class
CULTURAL MARXISM: The Corruption of America
Countdown to Financial Collapse – A Conversation with G. Edward Griffin
WRCFresnoTV — G. Edward Griffin — The Federal Reserve, Taxes, The I.R.S. & Solutions
Rammstein “We’re all living in America” (HD) English Subtitle
Series Id: LNS14000000
Series title: (Seas) Unemployment Rate
Labor force status: Unemployment rate
Type of data: Percent or rate
Age: 16 years and over
Series Id: LNS13327709
Series title: (seas) Total unemployed, plus all marginally attached workers plus total employed part time for economic reasons, as a percent of all civilian labor force plus all marginally attached workers
Labor force status: Aggregated totals unemployed
Type of data: Percent or rate
Age: 16 years and over
Percent/rates: Unemployed and mrg attached and pt for econ reas as percent of labor force plus marg attached
Series Id: LNS11300000
Series title: (Seas) Labor Force Participation Rate
Labor force status: Civilian labor force participation rate
Type of data: Percent or rate
Age: 16 years and over
Series Id: LNS12000000
Series title: (Seas) Employment Level
Labor force status: Employed
Type of data: Number in thousands
Age: 16 years and over
Series Id: LNS13000000
Series title: (Seas) Unemployment Level
Labor force status: Unemployed
Type of data: Number in thousands
Age: 16 years and over
Series Id: LNS15000000
Series title: (Seas) Not in Labor Force
Labor force status: Not in labor force
Type of data: Number in thousands
Age: 16 years and over
WASHINGTON, D.C. — After reaching a more than two-year high in early 2015, Americans’ satisfaction with the direction of the U.S. continues to fall. Twenty-six percent of Americans say they are satisfied with the way things are going in the nation in May, down slightly from 32% in January and February.
The latest data are from Gallup’s May 6-10 poll.
Satisfaction jumped nine points in January to 32%, a promising sign that Americans’ moods were improving after a year of lower figures throughout 2014, ranging between 20% and 27%. Since February, though, satisfaction has dipped only slightly each month, but these small drops have resulted in a six-point decline since the beginning of the year. Satisfaction remains below the 36% historical average for Gallup’s trend dating back to 1979.
The drop in Americans’ satisfaction with the way things are going parallels the recent decline in economic confidence. Americans had a more positive outlook on the economy at the dawn of 2015, but these views, like satisfaction, have edged down in recent months.
Views of the nation’s direction have certainly been brighter in the past. Majorities of Americans were typically satisfied with the direction of the U.S. between 1998 and mid-2002 — including a record high of 71% in February 1999. But satisfaction declined steadily in the latter half of President George W. Bush’s presidency as the public grew disillusioned with the war in Iraq and the national economy suffered. This dip in satisfaction culminated in 7% of Americans, a record low, saying they were satisfied with the direction of the nation in October 2008 as the global economy collapsed and the U.S. stock market plummeted.
Satisfaction improved significantly during the first year of President Barack Obama’s term — reaching 36% in August 2009. It has not returned to that level since, ranging between 11% and 33% throughout Obama’s time in office.
Americans Still List Economy, Gov’t and Unemployment as Top Problems
Though the 14% of Americans who name dissatisfaction with government, Congress and politicians as the top problem facing the U.S. has fallen five points since April, it still remains the most commonly mentioned problem — a distinction it has held for six months.
The economy in general (12%) and unemployment (10%) have remained at the top of the list for several years. But mentions of these issues are down significantly from their recent peaks — the economy reached a high of 37% in 2012, and unemployment reached a high of 39% in 2011.
Race relations and racism (8%), immigration (6%), a decline in moral, religious and family ethics (6%), the state of the healthcare system (5%) and terrorism (5%) were also among the most frequently cited problems facing the nation.
After years of dysfunctional government, the economy and unemployment dominating Americans’ mentions of the top problem facing the nation, fewer mention these problems now than in recent years. Still, these three problems remain at the forefront of Americans’ concerns, and may be driving Americans’ high level of dissatisfaction with the nation’s direction.
Meanwhile, mentions of unemployment as a top problem have dipped as more U.S. workers report their workplaces are hiring and the unemployment rate as reported by the BLS declines. But unemployment still remains one of the most frequently cited problems.
Results for this Gallup poll are based on telephone interviews conducted May 6-10, 2015, with a random sample of 1,024 adults, aged 18 and older, living in all 50 U.S. states and the District of Columbia. For results based on the total sample of national adults, the margin of sampling error is ±4 percentage points at the 95% confidence level. All reported margins of sampling error include computed design effects for weighting.
Each sample of national adults includes a minimum quota of 50% cellphone respondents and 50% landline respondents, with additional minimum quotas by time zone within region. Landline and cellular telephone numbers are selected using random-digit-dial methods.
Five Months Into GOP Congress, Approval Remains Low at 19%
by Andrew Dugan
Congressional job approval at 19%, essentially unchanged
Approval of GOP Congress similar among Republicans and Democrats
WASHINGTON, D.C. — Congressional job approval, currently at 19%, remains stuck near historical lows, despite a number of recent high-profile legislative achievements.
Over the past month, Congress has confirmed the stalled nomination of Attorney General Loretta Lynch and both chambers passed a bill that was signed into law regarding Medicare. Bills that would authorize limited congressional oversight on any international agreement with Iran and help victims of human trafficking passed the Senate with little or no opposition. The uptick in activity, though hardly historic, is notable compared with the past two Congresses. Those Congresses, marked by divided control of the two chambers, were known for their entrenched partisan gridlock and few legislative accomplishments. And Americans didn’t care for their inability to agree — they gave Congress its lowest approval ever over this time period. Gallup found in June 2013, six months into the previous Congress, that gridlock and ineffectiveness were the most frequently cited reason for Americans’ disapproval of Congress.
Several months into this new Congress, the accomplishments that have been realized could give one the impression that the gridlock is softening, particularly over the past month. But these achievements have had virtually no impact on Congress’s job approval compared with early April (15%).
And, of course, Congress is far from working perfectly now, even if the pace of work appears to have increased. Most dramatically, the Senate failed to overcome a Democratic filibuster Tuesday afternoon that would give the president enhanced authority in negotiating trade bills, though the May survey was conducted before this occurrence. Legislation authorizing the use of military force in Iraq and Syria to fight ISIS, proposed by the administration and which many members of Congress support, remains stalled.
GOP Congress Has Low Approval Among Republicans
A key reason the current 114th Congress appears to be having more legislative success than the two Congresses before it is that the House and Senate are now under one party’s control. Unified GOP control of Capitol Hill should, at least in theory, boost Republicans’ overall approval of Congress. But the expected “Republican rally” for Congress has yet to materialize — 21% of Republicans and Republican leaners approve of Congress, not much different from the 18% of independents and of Democrats who approve. Nor is Republican support notably higher than the 15% it reached in 2014, despite the decided Republican tilt of this year’s legislature.
After years of dysfunction, Congress is moving forward on key pieces of legislation. No longer shackled by split control — though still facing a president of the opposite party — the legislative branch is suddenly finding some areas of agreement. But even if it appears that the gridlock is easing, the overwhelming majority of Americans still disapprove of Congress. If Congress continues passing bipartisan legislation, more Americans might soften their stance. Still, it may be that Americans are largely not aware of or impressed by Congress’ recent legislative successes. Or it may be that the hit to Congress’ reputation over the last several years — evident not only in dismal job approval ratings, but also fallinglevels of trust and confidence — will take a long time to reverse.
Results for this Gallup poll are based on telephone interviews conducted May 6-10, 2015, with a random sample of 1,024 adults, aged 18 and older, living in all 50 U.S. states and the District of Columbia. For results based on the total sample of national adults, the margin of sampling error is ±4 percentage points at the 95% confidence level. All reported margins of sampling error include computed design effects for weighting.
Each sample of national adults includes a minimum quota of 50% cellphone respondents and 50% landline respondents, with additional minimum quotas by time zone within region. Landline and cellular telephone numbers are selected using random-digit-dial methods.
On Social Ideology, the Left Catches Up to the Right
by Jeffrey M. Jones
31% say they are socially liberal, 31% socially conservative
This is the first time conservatives have not outnumbered liberals
Conservatives maintain edge on economic issues
PRINCETON, N.J. — Thirty-one percent of Americans describe their views on social issues as generally liberal, matching the percentage who identify as social conservatives for the first time in Gallup records dating back to 1999.
Gallup first asked Americans to describe their views on social issues in 1999, and has repeated the question at least annually since 2001. The broad trend has been toward a shrinking conservative advantage, although that was temporarily interrupted during the first two years of Barack Obama’s presidency. Since then, the conservative advantage continued to diminish until it was wiped out this year.
The newfound parity on social ideology is a result of changes in the way both Democrats and Republicans describe their social views. The May 6-10 Gallup poll finds a new high of 53% of Democrats, including Democratic-leaning independents, describing their views on social issues as liberal.
Democrats were more likely to describe their views on social issues as moderate rather than liberal from 2001 to 2005. Since then, socially liberal Democrats have outnumbered socially moderate Democrats in all but one year.
Meanwhile, the 53% of Republicans and Republican leaners saying their views on social issues are conservative is the lowest in Gallup’s trend. The drop in Republicans’ self-identified social conservatism has been accompanied by an increase in moderate identification, to 34%, while the percentage identifying as socially liberal has been static near 10%.
These trends echo the pattern in Gallup’s overall ideology measure, which dates back to 1992 and shows increasing liberal identification in recent years. As with the social ideology measure, the longer-term shifts are mainly a result of increasing numbers of Democrats describing their views as liberal rather than moderate. That may reflect Democrats feeling more comfortable in describing themselves as liberal than they were in the past, as much as a more leftward shift in Democrats’ attitudes on political, economic and social issues.
Conservatives Still Lead Liberals on Economic Issues
In contrast to the way Americans describe their views on social issues, they still by a wide margin, 39% to 19%, describe their views on economic issues as conservative rather than liberal. However, as on social ideology, the gap between conservatives and liberals has been shrinking and is lower today than at any point since 1999, with the 39% saying they are economically conservative the lowest to date.
Currently, 64% of Republicans identify as conservative economically, which is down from 70% the previous two years and roughly 75% in the early years of the Obama presidency. During George W. Bush’s administration, Republicans were less likely to say they were economic conservatives, with as few as 58% doing so in 2004 and 2005. The trends suggest Republicans’ willingness to identify as economic conservatives, or economic moderates, is influenced by the party of the president in office, and perhaps the types of financial policies the presidential administration is pursuing at the time.
Democrats are also contributing to the trend in lower economic conservative identification. While the plurality of Democrats have consistently said they are economically moderate, Democrats have been more likely to identify as economic liberals than as economic conservatives since 2007. The last two years, there has been a 15-percentage-point gap in liberal versus conservative identification among Democrats on economic matters.
Americans’ growing social liberalism is evident not only in how they describe their views on social issues but also in changes in specific attitudes, such as increased support for same-sex marriage and legalizing marijuana. These longer-term trends may be attributable to changing attitudes among Americans of all ages, but they also may be a result of population changes, with younger, more liberal Americans entering adulthood while older, more conservative adults pass on. Gallup found evidence that population replacement is a factor in explaining changes in overall ideology using an analysis of birth cohorts over time.
The 2016 presidential election will thus be contested in a more socially liberal electorate — and a less economically conservative one — than was true of prior elections. Economically and socially conservative candidates may still appeal to the Republican Party base in the primaries, but it may be more important now than in the past for the GOP nominee to be a bit less conservative on social issues in order to appeal to the broader general electorate.
And while Americans are less economically conservative than in the past, economic conservatives still outnumber economic liberals by about 2-to-1. As a result, Democrats must be careful not to nominate a candidate who is viewed as too liberal on economic matters if their party hopes to hold the White House beyond 2016.
Results for this Gallup poll are based on telephone interviews conducted May 6-10, 2015, with a random sample of 1,024 adults, aged 18 and older, living in all 50 U.S. states and the District of Columbia. For results based on the total sample of national adults, the margin of sampling error is ±4 percentage points at the 95% confidence level. All reported margins of sampling error include computed design effects for weighting.
Each sample of national adults includes a minimum quota of 50% cellphone respondents and 50% landline respondents, with additional minimum quotas by time zone within region. Landline and cellular telephone numbers are selected using random-digit-dial methods.
Hillary Clinton is not the only Democratic comeback candidate on the 2016 ticket. Senate Democrats are betting on the past to rebuild their party for the future.
BY JOSH KRAUSHAAR
One of the most underappreciated stories in recent years is the deterioration of the Democratic bench under President Obama’s tenure in office. The party has become much more ideologically homogenous, losing most of its moderate wing as a result of the last two disastrous midterm elections. By one new catch-all measure, a party-strength index introduced by RealClearPolitics analysts Sean Trende and David Byler, Democrats are in their worst position since 1928. That dynamic has manifested itself in the Democratic presidential contest, where the bench is so barren that a flawed Hillary Clinton is barreling to an uncontested nomination.
But less attention has been paid to how the shrinking number of Democratic officeholders in the House and in statewide offices is affecting the party’s Senate races. It’s awfully unusual to see how dependent Democrats are in relying on former losing candidates as their standard-bearers in 2016. Wisconsin’s Russ Feingold, Pennsylvania’s Joe Sestak, Indiana’s Baron Hill, and Ohio’s Ted Strickland all ran underwhelming campaigns in losing office in 2010—and are looking to return to politics six years later. Party officials are courting former Sen. Kay Hagan of North Carolina to make a comeback bid, despite mediocre favorability ratings and the fact that she lost a race just months ago that most had expected her to win. All told, more than half of the Democrats’ Senate challengers in 2016 are comeback candidates.
On one hand, most of these candidates are the best choices Democrats have. Feingold and Strickland are running ahead of GOP Sens. Ron Johnson and Rob Portman in recent polls. Hill and Hagan boast proven crossover appeal in GOP-leaning states that would be challenging pickups. Their presence in the race gives the party a fighting chance to retake the Senate.
(RELATED: What’s Next In the House Benghazi Committee’s Hillary Clinton Investigation)
But look more closely, and the reliance on former failures is a direct result of the party having no one else to turn to. If the brand-name challengers didn’t run, the roster of up-and-coming prospects in the respective states is short. They’re also facing an ominous historical reality that only two defeated senators have successfully returned to the upper chamber in the last six decades. As political analyst Stu Rothenberg put it, they’re asking “voters to rehire them for a job from which they were fired.” Senate Democrats are relying on these repeat candidates for the exact same reason that Democrats are comfortable with anointing Hillary Clinton for their presidential nomination: There aren’t any better alternatives.
For a portrait of the Democrats’ slim pickings, just look at the political breakdown in three of the most consequential battleground states. Republicans hold 12 of Ohio’s 16 House seats, and all six of their statewide offices. In Wisconsin, Republicans hold a majority of the state’s eight House seats and four of five statewide partisan offices. In Pennsylvania, 13 of the 18 representatives are Republicans, though Democrats hold all the statewide offices. (One major caveat: Kathleen Kane, the Democrats’ once-hyped attorney general in the state, is under criminal investigation and has become a political punchline.) These are all Democratic-friendly states that Obama carried twice.
If Strickland didn’t run, the party’s hopes against Portman would lie in the hands of 30-year-old Cincinnati Councilman P.G. Sittenfeld, who would make unexpected history as one of the nation’s youngest senators with a victory. (Sittenfeld is still mounting a long-shot primary campaign against Strickland.) Without Feingold in Wisconsin, the party’s only logical option would be Rep. Ron Kind, who has regularly passed up opportunities for a promotion. Former Milwaukee Mayor Tom Barrett already lost to Gov. Scott Walker twice, and businesswoman Mary Burke disappointed as a first-time gubernatorial candidate last year. And despite the Democratic establishment’s publicized carping over Joe Sestak in Pennsylvania, the list of alternatives is equally underwhelming: His only current intra-party opposition is from the mayor of Allentown.
(RELATED: Hillary Clinton to Launch Her Campaign, Again)
In the more conservative states, the drop-off between favored recruits and alternatives is even more stark. Hagan would be a flawed nominee in North Carolina, but there’s no one else waiting in the wings. The strongest Democratic politician, Attorney General Roy Cooper, is running for governor instead. And in Indiana, the bench is so thin that even the GOP’s embattled governor, Mike Pence, isn’t facing formidable opposition. Hill, who lost congressional reelection campaigns in both 2004 and 2010, is not expected to face serious primary competition in the race to succeed retiring GOP Sen. Dan Coats.
Even in the two swing states where the party landed young, up-and-coming recruits to run, their options were awfully limited. In Florida, 32-year-old Rep. Patrick Murphy is one of only five House Democrats to represent a district that Mitt Romney carried in 2012—and his centrism has made him one of the most compelling candidates for higher office. The Democratic Senatorial Campaign Committee quickly rallied behind his campaign (in part to squelch potential opposition from firebrand congressman Alan Grayson). But if Murphy didn’t run, the alternatives would have been limited: freshman Rep. Gwen Graham and polarizing Democratic National Committee Chair Debbie Wasserman Schultz being the most logical alternatives.
In Nevada, Democrats boast one of their strongest challengers in former state Attorney General Catherine Cortez Masto, vying to become the first Latina ever elected to the Senate. But her ascension is due, in part, to the fact that other talented officeholders lost in the 2014 statewide wipeout. Democratic lieutenant-governor nominee Lucy Flores, hyped by MSNBC as a “potential superstar,” lost by 26 points to her GOP opponent. Former Secretary of State Ross Miller, another fast-rising pol, badly lost his bid for attorney general against a nondescript Republican. By simply taking a break from politics, Cortez Masto avoided the wave and kept her prospects alive for 2016.
(RELATED: Newly Released Clinton Email Detail Benghazi Correspondence)
DON’T MISS TODAY’S TOP STORIES
“Concise coverage of everything I wish I had hours to read about.”Chuck, Graduate StudentSign up form for the newsletter
This isn’t an assessment of Democratic chances for a Senate majority in 2017; it’s a glaring warning for the party’s longer-term health. If Clinton can’t extend the Democrats’ presidential winning streak—a fundamental challenge, regardless of the political environment—the party’s barren bench will cause even more alarm for the next presidential campaign. And if the Democrats’ core constituencies don’t show up for midterm elections—an outlook that’s rapidly becoming conventional wisdom—Democrats have serious challenges in 2018 as well. It’s why The New Yorker’s liberal writer John Cassidy warned that a Clinton loss next year could “assign [Republicans] a position of dominance.”
By focusing on how the electorate’s rapid change would hand Democrats a clear advantage in presidential races, Obama’s advisers overlooked how the base-stroking moves would play in the states. Their optimistic view of the future has been adopted by Clinton, who has been running to the left even without serious primary competition.
But without a future generation of leaders able to compellingly carry the liberal message, there’s little guarantee that changing demographics will secure the party’s destiny. The irony of the 2016 Senate races is that Democrats are betting on the past, running veteran politicians to win them back the majority—with Clinton at the top of the ticket. If that formula doesn’t work, the rebuilding process will be long and arduous.
Story 1: Part II, Nobody Does It Better Spying On People of The World — National Security Agency — Turnkey Tyranny Turned On The American People — NSA Budget $100 Billion Plus Paid By The American People — The Patriot Act Expires On June 1, 2015 — Both Republican and Democratic Parties Will Renew It! — Secret Security Surveillance State — Alive, Well and Growing — Videos
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Appellate Court Rules NSA’s Phone Data Collection Is Illegal
McConnell to Push for Pure PATRIOT Act Extension
INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE since 9/11
What You Didn’t Know About The NSA Bluffdale Spy Center – From Former NSA Director Bill Binney
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
30c3 keynote with Glenn Greenwald [30c3]
FISA Court: Telecoms okay with NSA data collection
US Supreme Court refuses to let Americans challenge FISA eavesdropping law
FISA Section 215: A Debate about Its Legality, Usefulness and Civil Liberties
The creepy spying power buried in the Patriot Act
Real Talk: The Patriot Act
Patriot Act Powers – GOP Fights To Renew NSA Surveillance Law – Fox & Friends
Marco Rubio blasts colleagues over renewing NSA spying powers
Rand Paul Stalling Patriot Act Extension!
The Obama Administration’s War on Whistleblowers–7 Whistleblowers speak at News Conference 04-27-15
Top NSA Whistleblower William Binney Exposes the Tyranny 3/20/15
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
Former NSA Head Exposes Agency’s Real Crimes
NSA Whistleblower William Binney: The Future of FREEDOM
‘NSA owns entire network anywhere in the world’ – whistleblower William Binney
NSA Whistle-Blower Tells All: The Program | Op-Docs | The New York Times
William Binney – The Government is Profiling You (The NSA is Spying on You)
Alleged NSA whistleblower warns of “turnkey tyranny” in U.S.
NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’
Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”
NSA Whistleblower Thomas Drake Prevails in Unprecedented Obama Admin Crackdown
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
29C3 Panel: Jesselyn Radack, Thomas Drake, William Binney on whistleblowing and surveillance
Everything We Know About NSA Spying: “Through a PRISM, Darkly” – Kurt Opsahl at CCC
FBI’s Patriot Act Abuse of National Security Letters and illegal NSA spying
Last Week Tonight with John Oliver: Government Surveillance (HBO)
The Lame Duck Show: Turn Key Tyranny Solutions
PBS Nova S36E11 The Spy Factory Full Documentary
Inside The NSA~Americas Cyber Secrets
Full Documentaries – National Security Agency Secrets – (NSA) Special Documentary
NSA can spy on 98 percent of the world
Glenn Becks “SURVEILLANCE STATE”
Glenn Greenwald on Domestic Surveillance: NSA Warrantless Wiretapping Controversy (2006)
Enemy of the State (1998) Predicts Edward Snowden’s Revelations
Enemy Of The State – The NSA Can Read The Time Off Your F**king Wristwatch!
Will Smith | Enemy of the State 1998 Movie Full HD
Ron Paul to Congress: DO NOT Extend the “PATRIOT” Act!
Congressman Ron Paul, MD – We’ve Been NeoConned
Why Shouldn’t I Work for the NSA?
(Good Will Hunting)
N.S.A. Phone Data Collection Is Illegal, Appeals Court Rules
By CHARLIE SAVAGE and JONATHAN WEISMAN
A federal appeals court in New York on Thursday ruled that the once-secret National Security Agency program that is systematically collecting Americans’ phone records in bulk is illegal. The decision comes as a fight in Congress is intensifying over whether to end and replace the program, or to extend it without changes.
In a 97-page ruling, a three-judge panel for the United States Court of Appeals for the Second Circuit held that a provision of the USA Patriot Actknown as Section 215 cannot be legitimately interpreted to allow the bulk collection of domestic calling records.
The ruling was certain to increase the tension that has been building in Congress as the provision of the act that has been cited to justify the bulk data collection program nears expiration. It will expire in June unless lawmakers pass a bill to extend it.
Thursday’s ruling did not come with any injunction ordering the program to cease, and it is not clear that anything else will happen in the judicial system before Congress has to make a decision about the expiring law.
It is the first time a higher-level court in the regular judicial system has reviewed the program.
The data collection had repeatedly been approved in secret by judges serving on the Foreign Intelligence Surveillance Court, known as the FISA court, which oversees national security surveillance. Those judges, who hear arguments only from the government, were willing to accept an interpretation of Section 215 that the appeals court on Thursday rejected.
The court, in a unanimous ruling written by Judge Gerard E. Lynch, held that Section 215 “cannot bear the weight the government asks us to assign to it, and that it does not authorize the telephone metadata program.” It declared the program illegal, saying, “We do so comfortably in the full understanding that if Congress chooses to authorize such a far-reaching and unprecedented program, it has every opportunity to do so, and to do so unambiguously.”
The House appears ready to pass a bill next week that would end the government’s bulk collection of phone records and replace it with a new program that would preserve the ability to analyze links between callers to hunt for terrorists but keep the bulk records in the hands of phone companies. That proposal however, has faced resistance from Senator Mitch McConnell, Republican of Kentucky, the Senate majority leader.
A similar bill died in the Senate in November after national-security hawks said it would be a gift to terrorists and Mr. McConnell urged Republicans to block an up-or-down vote on it with a filibuster. Mr. McConnell has urged a “clean extension” of Section 215 this time so the program can continue in its present form, and he said on Tuesday that he thought that was the “most likely” outcome.
But Alexander Abdo, who argued the case for the American Civil Liberties Union, praised the ruling.
“This decision is a victory for the rule of law that should spur Congress into action,” he said. “Modern technology has created tremendous opportunity, but it has also enabled surveillance on a scale inconsistent with free society. Today’s decision is an opportunity to redouble the defense of the constitutional principles that have made our nation what it is today.”
The appeals court sent the matter back to a Federal District Court judge to decide what to do next. The government could also appeal the ruling to the full appeals court, or to the Supreme Court. Parallel cases are pending before two other appeals courts that have not yet ruled.
Lawmakers who helped draft the bill that the House is about to pass, known as the USA Freedom Act, seized on the ruling as a triumph. Among them, Senators Patrick J. Leahy, Democrat of Vermont, and Mike Lee, Republican of Utah, said in a joint statement: “Congress should not reauthorize a bulk collection program that the court has found to violate the law. We will not consent to any extension of this program.”
But Mr. McConnell and Senator Richard M. Burr of North Carolina, chairman of the Senate Intelligence Committee, took to the Senate floor and gave no ground. Mr. McConnell blasted the House bill as “an untested, untried and more cumbersome system” that would neither “keep us safe or protect our privacy.”
“Section 215 helps us find a needle in the haystack,” he said. “But under the USA Freedom Act, there might not be a haystack at all.”
A senior Democratic senator suggested a compromise with Mr. McConnell, who has the power to decide which bills get brought up for a vote. The lawmaker suggested that Democrats might permit an extension of the existing statute for just a month in exchange for a promise by Mr. McConnell to allow a vote on the House bill in June.
Still, even if there were votes in Congress for a short-term extension of the existing statute to create more time for debating the USA Freedom Act, Thursday’s ruling would create a series of political and legal difficulties for keeping the program going in the interim.
The present FISA court order authorizing the bulk phone records program, issued in February by Judge James E. Boasberg of Federal District Court, expires on June 1. To bridge any gap between the existing program and a new one, the Obama administration would have to ask the FISA court to reauthorize the program for another round and a FISA judge would have to agree to do so, notwithstanding the Second Circuit’s ruling that Section 215 gives the court no authority to order phone companies to turn over customer records in bulk.
The FISA court is not directly subject to the Second Circuit’s authority — it has its own appeals court — but when Judge Boasberg issued the last order for the phone program he noted the existence of the litigation challenging the legal interpretation the FISA court had adopted, as well as the legislation pending in Congress. He required the government to file any application to renew the program again by May 22.
In a statement, Edward Price, a spokesman for the National Security Council, said the administration was still evaluating the ruling but reiterated that President Obama’s support for legislation that would transform the program is in line with the USA Freedom Act.
“Without commenting on the ruling today, the president has been clear that he believes we should end the Section 215 bulk telephony metadata program as it currently exists by creating an alternative mechanism to preserve the program’s essential capabilities without the government holding the bulk data,” he said.
The bulk phone records program traces back to October 2001. After the Sept. 11 attacks, President George W. Bush secretly authorized the N.S.A. to begin a group of surveillance and data-collection programs, without obeying statutory limits, for the purpose of hunting for hidden terrorist cells.
Over time, the legal basis for each component of that program, known as Stellarwind, evolved. In 2006, the administration persuaded a Federal District Court judge serving on the FISA Court, Malcolm J. Howard, to issue the first of many court orders blessing the phone records component, based on the idea that Section 215 could be interpreted as authorizing it.
Many other judges serving on the FISA court have subsequently renewed the program at roughly 90-day intervals. It came to light in June 2013 as part of the leaks by the intelligence contractor Edward J. Snowden, setting off a debate both about individual privacy rights and about whether the FISA court’s secret legal interpretation was founded.
Multiple lawsuits were filed in different districts challenging the program as both illegal under Section 215 and as unconstitutional. Different district court judges reached opposingconclusions about its legality.
Thursday’s ruling, in a case brought by the American Civil Liberties Union, is the first time an appeals court has weighed in. The ruling did not address the A.C.L.U.’s separate argument that bulk collection of records about Americans – regardless of the claimed legal basis – is unconstitutional.
It is not clear what other bulk data collection programs the government may have, although there have been some glimpses of others.
For example, it is known that the government also had a program between 2004 and 2011 that collected Americans’ email records in bulk – another component of the Stellarwind program. The government also recently acknowledged that the Drug Enforcement Administration collected bulk calling records between the United States and countries involved in drug trafficking from the early 1990s until 2013, using a similar legal theory.
In addition, the C.I.A. has used Section 215 to collect bulk records of international and foreign money transfers from companies like Western Union, although the government has not officially acknowledged that program.
HOW THE NSA CONVERTS SPOKEN WORDS INTO SEARCHABLE TEXT
Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.
But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.
Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documentsdescribe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.
The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
Spying on international telephone calls has always been a staple of NSA surveillance, but the requirement that an actual person do the listening meant it was effectively limited to a tiny percentage of the total traffic. By leveraging advances in automated speech recognition, the NSA has entered the era of bulk listening.
And this has happened with no apparent public oversight, hearings or legislative action. Congress hasn’t shown signs of even knowing that it’s going on.
The USA Freedom Act — the surveillance reform bill that Congress is currently debating — doesn’t address the topic at all. The bill would end an NSA program that does not collect voice content: the government’s bulk collection of domestic calling data, showing who called who and for how long.
Even if becomes law, the bill would leave in place a multitude of mechanisms exposed by Snowden that scoop up vast amounts of innocent people’s text and voice communications in the U.S. and across the globe.
Civil liberty experts contacted by The Intercept said the NSA’s speech-to-text capabilities are a disturbing example of the privacy invasions that are becoming possible as our analog world transitions to a digital one.
“I think people don’t understand that the economics of surveillance have totally changed,” Jennifer Granick, civil liberties director at the Stanford Center for Internet and Society, told The Intercept.
“Once you have this capability, then the question is: How will it be deployed? Can you temporarily cache all American phone calls, transcribe all the phone calls, and do text searching of the content of the calls?” she said. “It may not be what they are doing right now, but they’ll be able to do it.”
And, she asked: “How would we ever know if they change the policy?”
Indeed, NSA officials have been secretive about their ability to convert speech to text, and how widely they use it, leaving open any number of possibilities.
That secrecy is the key, Granick said. “We don’t have any idea how many innocent people are being affected, or how many of those innocent people are also Americans.”
I Can Search Against It
NSA whistleblower Thomas Drake, who was trained as a voice processing crypto-linguist and worked at the agency until 2008, told The Intercept that he saw a huge push after the September 11, 2001 terror attacks to turn the massive amounts of voice communications being collected into something more useful.
Human listening was clearly not going to be the solution. “There weren’t enough ears,” he said.
The transcripts that emerged from the new systems weren’t perfect, he said. “But even if it’s not 100 percent, I can still get a lot more information. It’s far more accessible. I can search against it.”
Converting speech to text makes it easier for the NSA to see what it has collected and stored, according to Drake. “The breakthrough was being able to do it on a vast scale,” he said.
More Data, More Power, Better Performance
The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s.
What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds.
In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited.
Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
“I would tell you we are not very good at that,” he said.
In an ideal environment like a news broadcast, he said, “we’re getting pretty good at being able to do these types of translations.”
A 2008 document from the Snowden archive shows that transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing:
(U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing.
Experts in speech recognition say that in the last decade or so, the pace of technological improvement has been explosive. As information storage became cheaper and more efficient, technology companies were able to store massive amounts of voice data on their servers, allowing them to continually update and improve the models. Enormous processors, tuned as “deep neural networks” that detect patterns like human brains do, produce much cleaner transcripts.
And the Snowden documents show that the same kinds of leaps forward seen in commercial speech-to-text products have also been happening in secret at the NSA, fueled by the agency’s singular access to astronomical processing power and its own vast data archives.
In fact, the NSA has been repeatedly releasing new and improved speech recognition systems for more than a decade.
The first-generation tool, which made keyword-searching of vast amounts of voice content possible, was rolled out in 2004 and code-named RHINEHART.
“Voice word search technology allows analysts to find and prioritize intercept based on its intelligence content,” says an internal 2006 NSA memo entitled “For Media Mining, the Future Is Now!”
The memo says that intelligence analysts involved in counterterrorism were able to identify terms related to bomb-making materials, like “detonator” and “hydrogen peroxide,” as well as place names like “Baghdad” or people like “Musharaf.”
RHINEHART was “designed to support both real-time searches, in which incoming data is automatically searched by a designated set of dictionaries, and retrospective searches, in which analysts can repeatedly search over months of past traffic,” the memo explains (emphasis in original).
As of 2006, RHINEHART was operating “across a wide variety of missions and languages” and was “used throughout the NSA/CSS [Central Security Service] Enterprise.”
But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.”
The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states.
A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
Extensive Use Abroad
Voice communications can be collected by the NSA whether they are being sent by regular phone lines, over cellular networks, or through voice-over-internet services. Previously released documents from the Snowden archive describe enormous efforts by the NSA during the last decade to get access to voice-over-internet content like Skype calls, for instance. And other documents in the archive chronicle the agency’s adjustment to the fact that an increasingly large percentage of conversations, even those that start as landline or mobile calls, end up as digitized packets flying through the same fiber-optic cables that the NSA taps so effectively for other data and voice communications.
The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America.
For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.”
The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
Keyword spotting extended to Iranian intercepts as well. A 2006 memoreported that RHINEHART had been used successfully by Persian-speaking analysts who “searched for the words ‘negotiations’ or ‘America’ in their traffic, and RHINEHART located a very important call that was transcribed verbatim providing information on an important Iranian target’s discussion of the formation of a the new Iraqi government.”
“Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
The memo offers an example from NSA Texas, where an analyst newly trained on the system used a keyword search to find previously unreported information on a target involved in drug-trafficking. In another case, an official at a Special Collection Service site in Latin America “was able to find foreign intelligence regarding a Cuban official in a fraction of the usual time.”
Analysts in Texas found the new technology a boon for spying. “From finding tunnels in Tijuana, identifying bomb threats in the streets of Mexico City, or shedding light on the shooting of US Customs officials in Potosi, Mexico, the technology did what it advertised: It accelerated the process of finding relevant intelligence when time was of the essence,” he wrote. (Emphasis in original.)
The author of the memo was also part of a team that introduced the technology to military leaders in Afghanistan. “From Kandahar to Kabul, we have traveled the country explaining NSA leaders’ vision and introducing SIGINT teams to what HLT analytics can do today and to what is still needed to make this technology a game-changing success,” the memo reads.
Extent of Domestic Use Remains Unknown
What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.”
The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
“The National Security Agency employs a variety of technologies in the course of its authorized foreign-intelligence mission,” spokesperson Vanee’ Vines wrote in an email to The Intercept. “These capabilities, operated by NSA’s dedicated professionals and overseen by multiple internal and external authorities, help to deter threats from international terrorists, human traffickers, cyber criminals, and others who seek to harm our citizens and allies.”
Vines did not respond to the specific questions about privacy protections in place related to the processing of domestic or domestic-to-international voice communications. But she wrote that “NSA always applies rigorous protections designed to safeguard the privacy not only of U.S. persons, but also of foreigners abroad, as directed by the President in January 2014.”
“I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept.
His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
“We went to the intelligence community and asked them to declassify a significant amount of material,” he said. The “vast majority” of that material was declassified, he said. But not all — including “facts that we thought could be declassified without compromising national security.”
Hypothetically, Medine said, the ability to turn voice into text would raise significant privacy concerns. And it would also raise questions about how the intelligence agencies “minimize” the retention and dissemination of material— particularly involving U.S. persons — that doesn’t include information they’re explicitly allowed to keep.
“Obviously it increases the ability of the government to process information from more calls,” Medine said. “It would also allow the government to listen in on more calls, which would raise more of the kind of privacy issues that the board has raised in the past.”
“I’m not saying the government does or doesn’t do it,” he said, “just that these would be the consequences.”
A New Learning Curve
Speech recognition expert Bhiksha Raj likens the current era to the early days of the Internet, when people didn’t fully realize how the things they typed would last forever.
“When I started using the Internet in the 90s, I was just posting stuff,” said Raj, an associate professor at Carnegie Mellon University’s Language Technologies Institute. “It never struck me that 20 years later I could go Google myself and pull all this up. Imagine if I posted something on alt.binaries.pictures.erotica or something like that, and now that post is going to embarrass me forever.”
The same is increasingly becoming the case with voice communication, he said. And the stakes are even higher, given that the majority of the world’s communication has historically been conducted by voice, and it has traditionally been considered a private mode of communication.
“People still aren’t realizing quite the magnitude that the problem could get to,” Raj said. “And it’s not just surveillance,” he said. “People are using voice services all the time. And where does the voice go? It’s sitting somewhere. It’s going somewhere. You’re living on trust.” He added: “Right now I don’t think you can trust anybody.”
“Things aren’t ephemeral anymore,” Taipale told The Intercept. “We’re living in a world where many things that were fleeting in the analog world are now on the permanent record. The question then becomes: what are the consequences of that and what are the rules going to be to deal with those consequences?”
Realistically, Taipale said, “the ability of the government to search voice communication in bulk is one of the things we may have to live with under some circumstances going forward.” But there at least need to be “clear public rules and effective oversight to make sure that the information is only used for appropriate law-enforcement or national security purposes consistent with Constitutional principles.”
Ultimately, Taipale said, a system where computers flag suspicious voice communications could be less invasive than one where people do the listening, given the potential for human abuse and misuse to lead to privacy violations. “Automated analysis has different privacy implications,” he said.
But to Jay Stanley, a senior policy analyst with the ACLU’s Speech, Privacy and Technology Project, the distinction between a human listening and a computer listening is irrelevant in terms of privacy, possible consequences, and a chilling effect on speech.
“What people care about in the end, and what creates chilling effects in the end, are consequences,” he said. “I think that over time, people would learn to fear computerized eavesdropping just as much as they fear eavesdropping by humans, because of the consequences that it could bring.”
Indeed, computer listening could raise new concerns. One of the internal NSA memos from 2006 says an “important enhancement under development is the ability for this HLT capability to predict what intercepted data might be of interest to analysts based on the analysts’ past behavior.”
Citing Amazon’s ability to not just track but predict buyer preferences, the memo says that an NSA system designed to flag interesting intercepts “offers the promise of presenting analysts with highly enriched sorting of their traffic.”
To Phillip Rogaway, a professor of computer science at the University of California, Davis, keyword-search is probably the “least of our problems.” In an email to The Intercept, Rogaway warned that “When the NSA identifies someone as ‘interesting’ based on contemporary NLP [Natural Language Processing] methods, it might be that there is no human-understandable explanation as to why beyond: ‘his corpus of discourse resembles those of others whom we thought interesting'; or the conceptual opposite: ‘his discourse looks or sounds different from most people’s.’”
If the algorithms NSA computers use to identify threats are too complex for humans to understand, Rogaway wrote, “it will be impossible to understand the contours of the surveillance apparatus by which one is judged. All that people will be able to do is to try your best to behave just like everyone else.”
EFF sued the Department of Justice (DOJ) on the 10th anniversary of the signing of the USA PATRIOT Act in October 2011 for answers about “secret interpretations” of a controversial section of the law. In June 2013, a leaked FISA court order publicly revealed that “secret interpretation”: the government was using Section 215 of the Patriot Act to collect the phone records of virtually every person in the United States.
Prior to the revelations, several senators warned that the DOJ was using Section 215 of the PATRIOT Act to support what government attorneys called a “sensitive collection program,” targeting large numbers of Americans. The language of Section 215 allows for secret court orders to collect “tangible things” that could be relevant to a government investigation – a far lower threshold and more expansive reach than a warrant based on probable cause. The list of possible “tangible things” the government can obtain is seemingly limitless, and could include everything from driver’s license records to Internet browsing patterns.
In response to a court order in our lawsuit, in September 2013, the government released hundreds of pages of previously secret FISA documents detailing the court’s interpretation of Section 215, including an opinion excoriating the NSA for misusing its mass surveillance database for years. In October 2013, the government released a second batch of documents related to Section 215, which showed, among other things, that the NSA had collected cell site location without notifying its oversight committees in Congress or the FISA court.
EFF’s lawsuit came after the DOJ failed to respond to a Freedom of Information Act (FOIA) request on the interpretation and use of Section 215. The suit demanded records describing the types of “tangible things” that have been collected so far, the legal basis for the “sensitive collection program,” and information on the how many people have been affected by Section 215 orders.
Through a PRISM, Darkly – Everything we know about NSA spying [30c3]
Published on Dec 30, 2013
Through a PRISM, Darkly
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.
Speaker: Kurt Opsahl
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Glenn Becks “SURVEILLANCE STATE”
Inside the NSA
Ed Snowden, NSA, and Fairy Tales
AT&T Spying On Internet Traffic
For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”
NSA Whistle-Blower Tells All – Op-Docs: The Program
The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.
NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post
He told you so: Bill Binney talks NSA leaks
William Benny – The Government is Profiling You (The NSA is Spying on You)
‘After 9/11 NSA had secret deal with White House’
The story of Whistleblower Thomas Drake
Whistleblowers, Part Two: Thomas Drake
NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013
Meet Edward Snowden: NSA PRISM Whistleblower
The Truth About Edward Snowden
N.S.A. Spying: Why Does It Matter?
Inside The NSA~Americas Cyber Secrets
NSA Whistleblower Exposes Obama’s Dragnet
AT&T whistleblower against immunity for Bush spy program-1/2
AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program
The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.
AT&T whistleblower against immunity for Bush spy program-2/2
Enemy Of The State 1998 (1080p) (Full movie)
Background Articles and Videos
Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau. The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001. Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.
The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity. William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.
There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.
During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”. One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.
In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon. The article suggested that the otherwise dispatched Stellar Wind is actually an active program.
PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[Notes 1]PRISM is a government codename for a data collection effort known officially as US-984XN. It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA). The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.” The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012. The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.
According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum. Clapper issued a statement and “fact sheet” to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.
Slide showing that much of the world’s communications flow through the US
Details of information collected via PRISM
PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC). PRISM was authorized by an order of the FISC. Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017. According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.
PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden. The leaked documents included 41 PowerPoint slides, four of which were published in news articles. The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012). The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”
The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States. The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.
According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally. Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”
Response from companies
The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.
Initial Public Statements
Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports. Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:
Slide listing companies and the date that PRISM collection began
Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”
Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.” “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”
Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”
Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.” “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”
Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”
Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”
In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.” “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.
“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.
Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.
On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant. Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”
The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.” The other companies held discussions with national security personnel on how to make data available more efficiently and securely. In some cases, these companies made modifications to their systems in support of the intelligence collection effort. The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel. These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers” and the companies’ denials.
While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission. Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said. Facebook, for instance, built such a system for requesting and sharing the information. Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.
Post-PRISM Transparency Reports
In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.
On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000″ user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.
Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.
Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.
Response from United States government
Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats. The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.” He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.” Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.” On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans. In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.
Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”
On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.” The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”
The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”
The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.” He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”
In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.
In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification, and others said that they had not been aware of the program. After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:
Senator John McCain (R-AZ)
June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”
Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee
June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.
June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”
June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”
Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee
June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”
Representative John Boehner (R-OH), Speaker of the House of Representatives
June 11 “He’s a traitor” (referring to Edward Snowden)
Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act
June 9, “This is well beyond what the Patriot Act allows.” “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”
Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.
June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”
June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”
Senator Mark Udall (D-CO)
June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.
Representative Todd Rokita (R-IN)
June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,
Senator Rand Paul (R-KY)
June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”
June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”
Representative Luis Gutierrez (D-IL)
June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”
The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.
Applicable law and practice
On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).” Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.” In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.” When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.” They do not need to specify which facilities or property that the targeting will be directed at.
After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret. The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.
If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.
If the provider rejects the directive, the A.G. may request an order from FISC to enforce it. A provider that fails to comply with FISC’s order can be punished with contempt of court.
Finally, a provider can petition FISC to reject the directive. In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order. The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.
The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”
Involvement of other countries
The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.
Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”
Germany did not receive any raw PRISM data, according to a Reuters report.
Israeli newspaper Calcalist discussed the Business Insider article about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.
In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”
In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)
The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,” and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”
Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.” Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.” He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.
In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case. An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.” Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.” Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.” In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.
In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers; the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.” George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.
The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.
On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.
Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California. When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”. The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style. Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”
Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.
Protests at Checkpoint Charlie in Berlin
The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”. He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.
The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.
William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.” David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.” Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority. The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”
Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”
Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.” The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.
Russia has offered to consider an asylum request from Edward Snowden.
Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”
A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”
A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.
ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority. The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.
ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections. A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.
Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail. It ran over budget, failed to accomplish critical goals, and was cancelled.
NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.
The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation. The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.
Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens. Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.
In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000. SAIC had also hired a former NSA director to its management; Bobby Inman. SAIC also participated in the concept definition phase of Trailblazer.
Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. 
The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” 
In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.” The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.
In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule. In 2006 the program was shut down, after having cost billions of US Dollars. Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.
The new project replacing Trailblazer is called Turbulence.
According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”
In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying. A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy. Drake gave info to DoD during its investigation of the matter. Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed. She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.
Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.
In 2003, the NSA IG (not the DoD IG) had declared Trailblazer an expensive failure. It had cost more than $1 billion.
In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative. Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.
In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun. Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.
In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union. None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.
In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917, part of President Barack Obama’s crackdown on whistleblowers and “leakers”. The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.
In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.
Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities. It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian. According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.
Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.
Slide showing that much of the world’s communications flow through the US.
Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).
NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.
Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian. The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.
According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.
Legality and FISA Amendments Act of 2008
The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.
The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”
Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.
ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS and Five Eyes). It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.
ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.
The system has been reported in a number of public sources. Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001, and by author James Bamford in his books on the National Security Agency of the United States. The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:
the Government Communications Headquarters of the United Kingdom,
the National Security Agency of the United States,
the Communications Security Establishment of Canada,
the Defence Signals Directorate of Australia, and
the Government Communications Security Bureau of New Zealand.
the National SIGINT Organisation (NSO) of The Netherlands
The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.
The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic. During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication, and could be intercepted at great distances. The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”
The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber. The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%. Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video. Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.
One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt. A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.
Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.
See also: Industrial espionage
Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes. Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon and the speech technology developed by the Belgian firm Lernout & Hauspie. An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.
In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.
Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.
According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits. The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.
The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.” The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK. At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.
The 2001 European Parliamentary (EP) report lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:
Likely satellite intercept stations
The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:
Hong Kong (since closed)
Australian Defence Satellite Communications Station (Geraldton, Western Australia)
Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)
Misawa Air Base (Japan) Map
GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
Sugar Grove (West Virginia, U.S.) Map
Yakima Training Center (Washington, U.S.) Map
GCSB Waihopai (New Zealand)
GCSB Tangimoana (New Zealand)
CFS Leitrim (Ontario, Canada)
Teufelsberg (Berlin, Germany) (closed 1992)
Other potentially related stations
The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:
Ayios Nikolaos (Cyprus – U.K.)
BadAibling Station (BadAibling, Germany – U.S.)
relocated to Griesheim in 2004
deactivated in 2008
Buckley Air Force Base (Aurora, Colorado)
Fort Gordon (Georgia, U.S.)
Gander (Newfoundland & Labrador, Canada)
Guam (Pacific Ocean, U.S.)
Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
Lackland Air Force Base, Medina Annex (San Antonio, Texas)
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.
Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T. The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.” Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.
The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.
The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T. Klein claims he was told that similar black rooms are operated at other facilities around the country.
Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.
Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case. A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.
PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States
Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security. The data mostly comes from the NSA, FBI, CIA, as well as other government sources.
Title II contains many of the most contentious provisions of the act. Supporters of the Patriot Act claim that these provisions are necessary in fighting the War on Terrorism, while its detractors argue that many of the sections of Title II infringe upon individual and civil rights.
The sections of Title II amend the Foreign Intelligence Surveillance Act of 1978 and its provisions in 18 U.S.C., dealing with “Crimes and Criminal Procedure“. It also amends the Electronic Communications Privacy Act of 1986. In general, the Title expands federal agencies’ powers in intercepting, sharing, and using private telecommunications, especially electronic communications, along with a focus on criminal investigations by updating the rules that govern computer crime investigations. It also sets out procedures and limitations for individuals who feel their rights have been violated to seek redress, including against the United States government. However, it also includes a section that deals with trade sanctions against countries whose government supports terrorism, which is not directly related to surveillance issues.
Two sections dealt with the interception of communications by the United States government.
Section 201 is titled Authority to intercept wire, oral, and electronic communications relating to terrorism. This section amended 18 U.S.C.§ 2516 (Authorization for interception of wire, oral, or electronic communications) of the United States Code. This section allows (under certain specific conditions) the United States Attorney General (or some of his subordinates) to authorize a Federal judge to make an order authorizing or approving the interception of wire or oral communications by the Federal Bureau of Investigation (FBI), or another relevant U.S. Federal agency.
The Attorney General’s subordinates who can use Section 201 are: the Deputy Attorney General, the Associate Attorney General, any Assistant Attorney General, any acting Assistant Attorney General, any Deputy Assistant Attorney General or acting Deputy Assistant Attorney General in the Criminal Division who is specially designated by the Attorney General.
The amendment added a further condition which allowed an interception order to be carried out. The interception order may now be made if a criminal violation is made with respect to terrorism (defined by 18 U.S.C.§ 2332):
Section 202 is titled Authority to intercept wire, oral, and electronic communications relating to computer fraud and abuse offenses, and amended the United States Code to include computer fraud and abuse in the list of reasons why an interception order may be granted.
Section 203: Authority to share criminal investigative information
Section 203 (Authority to share criminal investigation information) modified the Federal Rules of Criminal Procedure with respect to disclosure of information before the grand jury (Rule 6(e)). Section 203(a) allowed the disclosure of matters in deliberation by the grand jury, which are normally otherwise prohibited, if:
a court orders it (before or during a judicial proceeding),
a court finds that there are grounds for a motion to dismiss an indictment because of matters before the Grand Jury,
if the matters in deliberation are made by an attorney for the government to another Federal grand jury,
an attorney for the government requests that matters before the grand jury may reveal a violation of State criminal law,
the matters involve foreign intelligence or counterintelligence or foreign intelligence information. Foreign intelligence and counterintelligence was defined in section 3 of the National Security Act of 1947, and “foreign intelligence information” was further defined in the amendment as information about:
an actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power;
sabotage or international terrorism by a foreign power or an agent of a foreign power; or
clandestine intelligence activities by an intelligence service or network of a foreign power or by an agent of foreign power; or
information about a foreign power or foreign territory that relates to the national defense or the security of the United States or the conduct of the foreign affairs of the United States.’.
information about non-U.S. and U.S. citizens
203(a) gave the court the power to order a time within which information may be disclosed, and specified when a government agency may use information disclosed about a foreign power. The rules of criminal procedure now state that “within a reasonable time after such disclosure, an attorney for the government shall file under seal a notice with the court stating the fact that such information was disclosed and the departments, agencies, or entities to which the disclosure was made.”
Section 203(b) modified 18 U.S.C.§ 2517, which details who is allowed to learn the results of a communications interception, to allow any investigative or law enforcement officer, or attorney for the Government to divulge foreign intelligence, counterintelligence or foreign intelligence information to a variety of Federal officials. Specifically, any official who has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived from this could divulge this information to any Federal law enforcement, intelligence, protective, immigration, national defense, or national security official. The definition of “foreign intelligence” was the same as section 203(a), with the same ability to define “foreign intelligence” to be intelligence of a non-U.S. and U.S. citizen. The information received must only be used as necessary in the conduct of the official’s official duties.
The definition of “foreign intelligence information” is defined again in Section 203(d).
Section 203(c) specified that the Attorney General must establish procedures for the disclosure of information due to 18 U.S.C.§ 2517 (see above), for those people who are defined as U.S. citizens.
Section 204: Limitations on communication interceptions
Section 204 (Clarification of intelligence exceptions from limitations on interception and disclosure of wire, oral, and electronic communication) removed restrictions from the acquisition of foreign intelligence information from international or foreign communications. It was also clarified that the Foreign Intelligence Surveillance Act of 1978 should not only be the sole means of electronic surveillance for just oral and wire intercepts, but should also include electronic communication.
Section 205: Employment of translators by the FBI
Under section 205 (Employment of translators by the Federal Bureau of Investigation), the Director of the Federal Bureau of Investigation is now allowed to employ translators to support counterterrorism investigations and operations without regard to applicable Federal personnel requirements and limitations. However, he must report to the House Judiciary Committee and Senate Judiciary Committee the number of translators employed and any legal reasons why he cannot employ translators from federal, state, or local agencies.
Section 206: Roving surveillance authority
The Foreign Intelligence Surveillance Act of 1978 allows an applicant access to all information, facilities, or technical assistance necessary to perform electronic surveillance on a particular target. The assistance given must protect the secrecy of and cause as little disruption to the ongoing surveillance effort as possible. The direction could be made at the request of the applicant of the surveillance order, by a common carrier, landlord, custodian or other specified person. Section 206 (Roving surveillance authority under the Foreign Intelligence Surveillance Act of 1978) amended this to add:
or in circumstances where the Court finds that the actions of the target of the application may have the effect of thwarting the identification of a particular person.
This allows intelligence agencies to undertake “roving” surveillance: they do not have to specify the exact facility or location where their surveillance will be done. Roving surveillance was already specified for criminal investigations under 18 U.S.C.§ 2518(11), and section 206 brought the ability of intelligence agencies to undertake such roving surveillance into line with such criminal investigations. However, the section was not without controversy, as James X. Dempsey, the Executive Director of the Center for Democracy & Technology, argued that a few months after the Patriot Act was passed the Intelligence Authorization Act was also passed that had the unintended effect of seeming to authorize “John Doe” roving taps — FISA orders that identify neither the target nor the location of the interception (see The Patriot Debates, James X. Dempsey debates Paul Rosenzweig on section 206).
Section 207: Duration of FISA surveillance on agents of a foreign powe
Previously FISA only defined the duration of a surveillance order against a foreign power (defined in 50 U.S.C.§ 1805(e)(1)) . This was amended by section 207 (Duration of FISA surveillance of non-United States persons who are agents of a foreign power) to allow surveillance of agents of a foreign power (as defined in section 50 U.S.C.§ 1801(b)(1)(A)) for a maximum of 90 days. Section 304(d)(1) was also amended to extend orders for physical searches from 45 days to 90 days, and orders for physical searches against agents of a foreign power are allowed for a maximum of 120 days. The act also clarified that extensions for surveillance could be granted for a maximum of a year against agents of a foreign power.
Section 208: Designation of judges
Section 103(A) of FISA was amended by Section 208 (Designation of judges) of the Patriot Act to increase the number of federal district court judges who must now review surveillance orders from seven to 11. Of these, three of the judges must live within 20 miles (32 km) of the District of Columbia.
Section 209: Seizure of voice-mail messages pursuant to warrants
Section 209 (Seizure of voice-mail messages pursuant to warrants) removed the text “any electronic storage of such communication” from title 18, section 2510 of the United States Code. Before this was struck from the Code, the U.S. government needed to apply for a title III wiretap order before they could open voice-mails, however now the government only need apply for an ordinary search. Section 2703, which specifies when a “provider of electronic communication services” must disclose the contents of stored communications, was also amended to allow such a provider to be compelled to disclose the contents via a search warrant, and not a wiretap order. According to Vermont senator Patrick Leahy, this was done to “harmonizing the rules applicable to stored voice and non-voice (e.g., e-mail) communications”.
Section 210 & 211: Scope of subpoenas for records of electronic communications
The U.S. Code specifies when the U.S. government may require a provider of an electronic communication service to hand over communication records. It specifies what that provider must disclose to the government, and was amended by section 210 (Scope of subpoenas for records of electronic communications) to include records of session times and durations of electronic communication as well as any identifying numbers or addresses of the equipment that was being used, even if this may only be temporary. For instance, this would include temporarily assigned IP addresses, such as those established by DHCP.
Section 211 (Clarification of scope) further clarified the scope of such orders. 47 U.S.C.§ 551 (Section 631 of the Communications Act of 1934) deals with the privacy granted to users of cable TV. The code was amended to allow the government to have access to the records of cable customers, with the notable exclusion of records revealing cable subscriber selection of video programming from a cable operator.
Section 212: Emergency disclosure of electronic communications
Section 212 (Emergency disclosure of electronic communications to protect life and limb) amended the US Code to stop a communications provider from providing communication records (not necessarily relating to the content itself) about a customer’s communications to others. However, should the provider reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person then the communications provider can now disclose this information. The act did not make clear what “reasonably” meant.
A communications provider could also disclose communications records if:
a court orders the disclosure of communications at the request of a government agency (18 U.S.C.§ 2703)
the customer allows the information to be disclosed
if the service provider believes that they must do so to protect their rights or property.
Section 213 (Authority for delaying notice of the execution of a warrant) amended the US Code to allow the notification of search warrants to be delayed. This section has been commonly referred to as the “sneak and peek” section, a phrase originating from the FBI and not, as commonly believed, from opponents of the Patriot Act. The U.S. government may now legally search and seize property that constitutes evidence of a United States criminal offense without immediately telling the owner. The court may only order the delayed notification if they have reason to believe it would hurt an investigation — delayed notifications were already defined in 18 U.S.C.§ 2705 — or, if a search warrant specified that the subject of the warrant must be notified “within a reasonable period of its execution,” then it allows the court to extend the period before the notification is given, though the government must show “good cause”. If the search warrant prohibited the seizure of property or communications, then the search warrant could then be delayed.
Section 214: Pen register and trap and trace authority
FISA was amended by section 214 (Pen register and trap and trace authority under FISA) to clarify that pen register and trap and trace surveillance can be authorised to allow government agencies to gather foreign intelligence information. Where the law only allowed them to gather surveillance if there was evidence of international terrorism, it now gives the courts the power to grant trap and traces against:
those suspected of being involved with international terrorism,
those undertaking clandestine intelligence activities
Section 215: Access to records and other items under FISA
This section is commonly referred to as the “library records” provision because of the wide range of personal material that can be investigated.
FISA was modified by section 215 (Access to records and other items under the Foreign Intelligence Surveillance Act) to allow the Director of the FBI (or an official designated by the Director, so long as that official’s rank is no lower than Assistant Special Agent in Charge) to apply for an order to produce materials that assist in an investigation undertaken to protect against international terrorism or clandestine intelligence activities. The act specifically gives an example to clarify what it means by “tangible things”: it includes “books, records, papers, documents, and other items”.
Any order that is granted must be given by a FISA court judge or by a magistrate judge who is publicly designated by the Chief Justice of the United States to allow such an order to be given. Any application must prove that it is being conducted without violating the First Amendment rights of any U.S. citizens. The application can only be used to obtain foreign intelligence information not concerning a U.S. citizen or to protect against international terrorism or clandestine intelligence activities.
This section of the PATRIOT Act is controversial because the order may be granted ex parte, and once it is granted — in order to avoid jeopardizing the investigation — the order may not disclose the reasons behind why the order was granted.
The section carries a gag order stating that “No person shall disclose to any other person (other than those persons necessary to produce the tangible things under this section) that the Federal Bureau of Investigation has sought or obtained tangible things under this section”. Senator Rand Paul stated that the non-disclosure is imposed for one year, though this is not explicitly mentioned in the section.
In order to protect anyone who complies with the order, FISA now prevents any person who complies with the order in “good faith” from being liable for producing any tangible goods required by the court order. The production of tangible items is not deemed to constitute a waiver of any privilege in any other proceeding or context.
During a House Judiciary hearing on domestic spying on July 17, 2013 John C. Inglis, the deputy director of the surveillance agency, told a member of the House judiciary committee that NSA analysts can perform “a second or third hop query” through its collections of telephone data and internet records in order to find connections to terrorist organizations. “Hops” refers to a technical term indicating connections between people. A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with. NSA officials had said previously that data mining was limited to two hops, but Inglis suggested that the Foreign Intelligence Surveillance Court has allowed for data analysis extending “two or three hops”.
Section 216: Authority to issue pen registers and trap and trace devices
Section 216 (Modification of authorities relating to use of pen registers and trap and trace devices) deals with three specific areas with regards to pen registers and trap and trace devices: general limitations to the use of such devices, how an order allowing the use of such devices must be made, and the definition of such devices.
18 U.S.C.§ 3121 details the exceptions related to the general prohibition on pen register and trap and trace devices. Along with gathering information for dialup communications, it allows for gathering routing and other addressing information. It is specifically limited to this information: the Act does not allow such surveillance to capture the actual information that is contained in the communication being monitored. However, organisations such as the EFF have pointed out that certain types of information that can be captured, such as URLs, can have content embedded in them. They object to the application of trap and trace and pen register devices to newer technology using a standard designed for telephones.
Making and carrying out orders
It also details that an order may be applied for ex parte (without the party it is made against present, which in itself is not unusual for search warrants), and allows the agency who applied for the order to compel any relevant person or entity providing wire or electronic communication service to assist with the surveillance. If the party whom the order is made against so requests, the attorney for the Government, law enforcement or investigative officer that is serving the order must provide written or electronic certification that the order applies to the targeted individual.
If a pen register or trap and trace device is used on a packet-switched data network, then the agency doing surveillance must keep a detailed log containing:
any officer or officers who installed the device and any officer or officers who accessed the device to obtain information from the network;
the date and time the device was installed, the date and time the device was uninstalled, and the date, time, and duration of each time the device is accessed to obtain information;
the configuration of the device at the time of its installation and any subsequent modification made to the device; and
any information which has been collected by the device
This information must be generated for the entire time the device is active, and must be provided ex parte and under seal to the court which entered the ex parte order authorizing the installation and use of the device. This must be done within 30 days after termination of the order.
Orders must now include the following information:
the identifying number of the device under surveillance
the location of the telephone line or other facility to which the pen register or trap and trace device is to be attached or applied
if a trap and trace device is installed, the geographic limits of the order must be specified
This section amended the non-disclosure requirements of 18 U.S.C.§ 3123(d)(2) by expanding to include those whose facilities are used to establish the trap and trace or pen register or to those people who assist with applying the surveillance order who must not disclose that surveillance is being undertaken. Before this it had only applied to the person owning or leasing the line.
The following terms were redefined in the US Code’s chapter 206 (which solely deals with pen registers and trap and trace devices):
Pen register: defined in 18 U.S.C.§ 3127(3), the definition of such a device was expanded to include a device that captures dialing, routing, addressing, or signaling information from an electronics communication device. It limited the usage of such devices to exclude the capturing of any of the contents of communications being monitored. 18 U.S.C.§ 3124(b) was also similarly amended.
Trap and trace device: defined in 18 U.S.C.§ 3127(4), the definition was similarly expanded to include the dialing, routing, addressing, or signaling information from an electronics communication device. However, a trap and trace device can now also be a “process”, not just a device.
Contents:18 U.S.C.§ 3127(1) clarifies the term “contents” (as referred to in the definition of trap and trace devices and pen registers) to conform to the definition as defined in 18 U.S.C.§ 2510(8), which when used with respect to any wire, oral, or electronic communication, includes any information concerning the substance, purport, or meaning of that communication.
Section 217: Interception of computer trespasser communications
Section 217 (Interception of computer trespasser communications) firstly defines the following terms:
Protected computer: this is defined in 18 U.S.C.§ 1030(e)(2)(A), and is any computer that is used by a financial institution or the United States Government or one which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
Computer trespasser: this is defined in 18 U.S.C.§ 2510(21) and references to this phrase means
a person who accesses a protected computer without authorization and thus has no reasonable expectation of privacy in any communication transmitted to, through, or from the protected computer; and
does not include a person known by the owner or operator of the protected computer to have an existing contractual relationship with the owner or operator of the protected computer for access to all or part of the protected computer
Amendments were made to 18 U.S.C.§ 2511(2) to make it lawful to allow a person to intercept the communications of a computer trespasser if
the owner or operator of the protected computer authorizes the interception of the computer trespasser’s communications on the protected computer,
the person is lawfully engaged in an investigation,
the person has reasonable grounds to believe that the contents of the computer trespasser’s communications will be relevant to their investigation, and
any communication captured can only relate to those transmitted to or from the computer trespasser.
Section 218: Foreign intelligence information
Section 218 (Foreign intelligence information) amended 50 U.S.C.§ 1804(a)(7)(B) and 50 U.S.C.§ 1823(a)(7)(B) (both FISA sections 104(a) (7)(B) and section 303(a)(7)(B), respectively) to change “the purpose” of surveillance orders under FISA to gain access to foreign intelligence to “significant purpose”. Mary DeRosa, in The Patriot Debates, explained that the reason behind this was to remove a legal “wall” which arose when criminal and foreign intelligence overlapped. This was because the U.S. Department of Justice interpreted “the purpose” of surveillance was restricted to collecting information for foreign intelligence, which DeRosa says “was designed to ensure that prosecutors and criminal investigators did not use FISA to circumvent the more rigorous warrant requirements for criminal cases”. However, she also says that it is debatable whether this legal tightening of the definition was even necessary, stating that “the Department of Justice argued to the FISA Court of Review in 2002 that the original FISA standard did not require the restrictions that the Department of Justice imposed over the years, and the court appears to have agreed [which] leaves the precise legal effect of a sunset of section 218 somewhat murky.”
Section 219: Single-jurisdiction search warrants for terrorism
Section 219 (Single-jurisdiction search warrants for terrorism) amended the Federal Rules of Criminal Procedure to allow a magistrate judge who is involved in an investigation of domestic terrorism or international terrorism the ability to issue a warrant for a person or property within or outside of their district.
Section 220: Nationwide service of search warrants for electronic evidence
Section 220 (Nationwide service of search warrants for electronic evidence) gives the power to Federal courts to issue nationwide service of search warrants for electronic surveillance. However, only courts with jurisdiction over the offense can order such a warrant. This required amending 18 U.S.C.§ 2703 and 18 U.S.C.§ 2711.
Section 221: Trade sanctions
Section 221 (Trade sanctions) amended the Trade Sanctions Reform and Export Enhancement Act of 2000. This Act prohibits, except under certain specific circumstances, the President from imposing a unilateral agricultural sanction or unilateral medical sanction against a foreign country or foreign entity. The Act holds various exceptions to this prohibition, and the Patriot Act further amended the exceptions to include holding sanctions against countries that design, develop or produce chemical or biological weapons, missiles, or weapons of mass destruction. It also amended the act to include the Taliban as state sponsors of international terrorism. In amending Title IX, section 906 of the Trade sanctions act, the Taliban was determined by the Secretary of State to have repeatedly provided support for acts of international terrorism and the export of agricultural commodities, medicine, or medical devices is now pursuant to one-year licenses issued and reviewed by the United States Government. However, the export of agricultural commodities, medicine, or medical devices to the Government of Syria or to the Government of North Korea were exempt from such a restriction.
The Patriot Act further states that nothing in the Trade Sanctions Act will limit the application of criminal or civil penalties to those who export agricultural commodities, medicine, or medical devices to:
any foreign entity or individual who is subject to any restriction for involvement in weapons of mass destruction or missile proliferation.
Section 222: Assistance to law enforcement agencies
Section 222 (Assistance to law enforcement agencies) states that nothing in the Patriot Act shall make a communications provider or other individual provide more technical assistance to a law enforcement agency than what is set out in the Act. It also allows for the reasonable compensation of any expenses incurred while assisting with the establishment of pen registers or trap and trace devices.
Section 223: Civil liability for certain unauthorized disclosures
18 U.S.C.§ 2520(a) allows any person who has had their rights violated due to the illegal interception of communications to take civil action against the offending party. Section 223 (Civil liability for certain unauthorized disclosures) excluded the United States from such civil action.
If a court or appropriate department or agency determines that the United States or any of its departments or agencies has violated any provision of chapter 119 of the U.S. Code they may request an internal review from that agency or department. If necessary, an employee may then have administrative action taken against them. If the department or agency do not take action, then they must inform the notify the Inspector General who has jurisdiction over the agency or department, and they must give reasons to them why they did not take action.
A citizen’s rights will also be found to have been violated if an investigative, law enforcement officer or governmental entity discloses information beyond that allowed in 18 U.S.C.§ 2517(a).
U.S. Code Title 18, Section 2712 added
A totally new section was appended to Title 18, Chapter 121 of the US Code: Section 2712, “Civil actions against the United States”. It allows people to take action against the US Government if they feel that they had their rights violated, as defined in chapter 121,chapter 119, or sections 106(a), 305(a), or 405(a) of FISA. The court may assess damages no less than $US10,000 and litigation costs that are reasonably incurred. Those seeking damages must present them to the relevant department or agency as specified in the procedures of the Federal Tort Claims Act.
Actions taken against the United States must be initiated within two years of when the claimant has had a reasonable chance to discover the violation. All cases are presented before a judge, not a jury. However, the court will order a stay of proceedings if they determine that if during the court case civil discovery will hurt the ability of the government to conduct a related investigation or the prosecution of a related criminal case. If the court orders the stay of proceedings they will extend the time period that a claimant has to take action on a reported violation. However, the government may respond to any action against it by submitting evidence ex parte in order to avoid disclosing any matter that may adversely affect a related investigation or a related criminal case. The plaintiff is then given an opportunity to make a submission to the court, not ex parte, and the court may request further information from either party.
If a person wishes to discover or obtain applications or orders or other materials relating to electronic surveillance or to discover, obtain, or suppress evidence or information obtained or derived from electronic surveillance under FISA, then the Attorney General may file an affidavit under oath that disclosure or an adversary hearing would harm the national security of the United States. In these cases, the court may review in camera and ex parte the material relating to the surveillance to make sure that such surveillance was lawfully authorized and conducted. The court may then disclose part of material relating to the surveillance. However, the court is restricted in they may only do this “where such disclosure is necessary to make an accurate determination of the legality of the surveillance”. If it then determined that the use of a pen register or trap and trace device was not lawfully authorized or conducted, the result of such surveillance may be suppressed as evidence. However, should the court determine that such surveillance was lawfully authorised and conducted, they may deny the motion of the aggrieved person.
It is further stated that if a court or appropriate department or agency determines that an officer or employee of the United States willfully or intentionally violated any provision of chapter 121 of the U.S. Code they will request an internal review from that agency or department. If necessary, an employee may then have administrative action taken against them. If the department or agency do not take action, then they must inform the notify the Inspector General who has jurisdiction over the agency or department, and they must give reasons to them why they did not take action. (see for a similar part of the Act)
Section 224: Sunset
This article is outdated. Please update this article to reflect recent events or newly available information.(November 2010)
Section 224 (Sunset) is a sunset clause. Title II and the amendments made by the title originally would have ceased to have effect on December 31, 2005, with the exception of the below sections. However, on December 22, 2005, the sunset clause expiration date was extended to February 3, 2006, and then on February 2, 2006 it was further extended to March 10:
Title II sections that did not expire on March 10, 2006
Authority to share criminal investigation information : Authority to share Grand Jury information
Authority to share criminal investigation information : Procedures
Employment of translators by the Federal Bureau of Investigation
Designation of judges
Scope of subpoenas for records of electronic communications
Clarification of scope
Authority for delaying notice of the execution of a warrant
Modification of authorities relating to use of pen registers and trap and trace devices
Single-jurisdiction search warrants for terrorism
Assistance to law enforcement agencies
Further, any particular foreign intelligence investigations that are ongoing will continue to be run under the expired sections.
Section 225: Immunity for compliance with FISA wiretap
Section 225 (Immunity for compliance with FISA wiretap) gives legal immunity to any provider of a wire or electronic communication service, landlord, custodian, or other person that provides any information, facilities, or technical assistance in accordance with a court order or request for emergency assistance. This was added to FISA as section 105 (50 U.S.C.§ 1805).
Story 1: The Key To Identity Politics: Ignorance and Apathy of Voters — I Don’t Know and I Don’t Care — I Am A Woman and Will Vote For Hillary Clinton — I am Hispanic and Will Vote For Marco Rubio or Ted Cruz — I am Fat and Will Vote For Chris Christie — I am White and Will Vote For Rand Paul — I am Rich and Will Vote For Jeb Bush — I Make Stupid Remarks and Will Vote for Joe Biden — The Tyranny of Ignorance and Apathy — Garbage In — Garbage Out — Videos
Is The Best We Can Do?
George Carlin – It’s a big club and you ain’t in it
C.W. McCALL – CONVOY 1975 (Audio Enhanced)
Hillary Clinton Road Trips to Iowa
The Blues Brothers – Aretha Franklin
Exploring Liberty: The Problem of Political Ignorance
Ilya Somin is a Professor of Law at the George Mason University School of Law and is also a regular contributor at The Volokh Conspiracy, a group law blog.
Francis Fukuyama: Identity Politics
Hillary: ‘Let’s Keep Fighting’ For Women
Marco Rubio: Election Is ‘A Generational Choice About What Kind Of Country We Will Be’
Christie Proposes Income Cap on Social Security
Rand Paul on Civil Rights Act of 1964 – May 20, 2010
If Jeb Bush Is In, Who Will Win Wall Street’s Money?
Joe Biden Says Dumb Things
Blues Brothers 2000: Aretha Franklin – R-E-S-P-E-C-T (Respect)
C.W. McCall – I Don’t Know And I Don’t Care
George Carlin – Voting
The Best of George Carlin: Exposing our government and fall of humanity one joke at a time
Story 1: What a Difference A Day Makes — April Fools Day Celebrates Kerry and Obama Negotiations With The Mad Mullah Terrorists of Islamic Republic of Iran — I who have nothing — Just Walk Away — Breakaway — Dance With The One That Brought You — Videos
Wow! Angelina Jordan (8): “What a Difference a Day Make”
Exclusive Sen Tom Cotton says Iran is calling the shots
America’s Forum | Col. Derek Harvey discusses the Iran nuclear negotiations